Skip to main content

An Anti-tampering Algorithm Based on an Artificial Intelligence Approach

  • Conference paper
Foundations of Intelligent Systems (ISMIS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7661))

Included in the following conference series:

Abstract

Home automation poses requirements, which are typically solved by AI methods. The paper focuses on the problem of protecting video-surveillance systems against tampering actions, and proposes a new algorithm. This is based on a model of the environment observed by the camera, which must be protected. The model is automatically learned by observing the video stream generated by the camera. The method is now implemented in a commercial system are the results reported from seven experimental sites shows an excellent performance outperforming state of the art algorithms described in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cook, D.J., Augusto, J., Jakkula, V.: Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing 5(4), 277–299 (2009)

    Article  Google Scholar 

  2. Simpson, R., Schreckenghost, D., LoPresti, E.F., Kirsch, N.: Plans and Planning in Smart Homes. In: Augusto, J.C., Nugent, C.D. (eds.) Designing Smart Homes. LNCS (LNAI), vol. 4008, pp. 71–84. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Ramos, C.: Ambient Intelligence – A State of the Art from Artificial Intelligence Perspective. In: Neves, J., Santos, M.F., Machado, J.M. (eds.) EPIA 2007. LNCS (LNAI), vol. 4874, pp. 285–295. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Mendola, D., Monfrecola, A., Moio, A., Giordana, A.: Horus: an agent based system for home automation. Technical report TR-01-2012 (2012)

    Google Scholar 

  5. Saglam, A.: Adaptive camera tamper detection for video surveillance (June 2009)

    Google Scholar 

  6. Ribnick, E., Atev, S., Masoud, O., Papanikolopoulos, N., Voyles, R.: Real-time detection of camera tampering. In: Proceedings of the IEEE International Conference on Video and Signal Based Surveillance, AVSS 2006, p. 10. IEEE Computer Society, Washington, DC (2006)

    Chapter  Google Scholar 

  7. Aha, D., Kibler, D., Albert, M.: Instance-based learning algorithms. Machine Learning 6, 37–66 (1991)

    Google Scholar 

  8. Djouadi, A., Snorrason, O., Garber, F.: The quality of training-sample estimates of the bhattacharyya coefficient. IEEE Transactions on Pattern Analysis and Machine Intelligence 12(1), 92–97 (1990)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moio, A., Giordana, A., Mendola, D. (2012). An Anti-tampering Algorithm Based on an Artificial Intelligence Approach. In: Chen, L., Felfernig, A., Liu, J., RaÅ›, Z.W. (eds) Foundations of Intelligent Systems. ISMIS 2012. Lecture Notes in Computer Science(), vol 7661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34624-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34624-8_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34623-1

  • Online ISBN: 978-3-642-34624-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics