Advertisement

An Anti-tampering Algorithm Based on an Artificial Intelligence Approach

  • Andrea Moio
  • Attilio Giordana
  • Dino Mendola
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7661)

Abstract

Home automation poses requirements, which are typically solved by AI methods. The paper focuses on the problem of protecting video-surveillance systems against tampering actions, and proposes a new algorithm. This is based on a model of the environment observed by the camera, which must be protected. The model is automatically learned by observing the video stream generated by the camera. The method is now implemented in a commercial system are the results reported from seven experimental sites shows an excellent performance outperforming state of the art algorithms described in the literature.

Keywords

Light Condition Video Stream Decision Module Current Image Smart Home 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cook, D.J., Augusto, J., Jakkula, V.: Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing 5(4), 277–299 (2009)CrossRefGoogle Scholar
  2. 2.
    Simpson, R., Schreckenghost, D., LoPresti, E.F., Kirsch, N.: Plans and Planning in Smart Homes. In: Augusto, J.C., Nugent, C.D. (eds.) Designing Smart Homes. LNCS (LNAI), vol. 4008, pp. 71–84. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  3. 3.
    Ramos, C.: Ambient Intelligence – A State of the Art from Artificial Intelligence Perspective. In: Neves, J., Santos, M.F., Machado, J.M. (eds.) EPIA 2007. LNCS (LNAI), vol. 4874, pp. 285–295. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Mendola, D., Monfrecola, A., Moio, A., Giordana, A.: Horus: an agent based system for home automation. Technical report TR-01-2012 (2012)Google Scholar
  5. 5.
    Saglam, A.: Adaptive camera tamper detection for video surveillance (June 2009)Google Scholar
  6. 6.
    Ribnick, E., Atev, S., Masoud, O., Papanikolopoulos, N., Voyles, R.: Real-time detection of camera tampering. In: Proceedings of the IEEE International Conference on Video and Signal Based Surveillance, AVSS 2006, p. 10. IEEE Computer Society, Washington, DC (2006)CrossRefGoogle Scholar
  7. 7.
    Aha, D., Kibler, D., Albert, M.: Instance-based learning algorithms. Machine Learning 6, 37–66 (1991)Google Scholar
  8. 8.
    Djouadi, A., Snorrason, O., Garber, F.: The quality of training-sample estimates of the bhattacharyya coefficient. IEEE Transactions on Pattern Analysis and Machine Intelligence 12(1), 92–97 (1990)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Andrea Moio
    • 1
  • Attilio Giordana
    • 1
  • Dino Mendola
    • 1
  1. 1.Penta Dynamic Solutions srlAlessandriaItaly

Personalised recommendations