Advertisement

Entry–Exit Video Surveillance: A Benchmark Dataset

  • V. Vinay KumarEmail author
  • P. Nagabhushan
  • S. N. Roopa
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1022)

Abstract

Techniques to automate video surveillance around places where cameras are forbidden due to privacy concerns are yet under-addressed. This can be achieved by building conceptual models and algorithms to investigate the credibility of monitoring of events using the video frames captured by mounting the cameras so as to have the view of the entrances of such camera-forbidden areas. Evaluation of these models and algorithms require standard datasets. The proposal here is to introduce a new benchmark dataset—“EnEx dataset” as no traces specific to the problem were found in the literature. The dataset comprises of video frames captured in 5 different locations accounting 90 entry–exit event pairs based on 9 different sequences involving 36 participants. Ground statistics of the dataset is reported. This work ventures a new sub-domain for research in the area of automated video surveillance.

Keywords

Automated video surveillance Dataset Entry–exit surveillance Appearance transformation Private areas 

Notes

Acknowledgements

The first author acknowledges Union Grants Commission, Government of India for providing financial aid to carry out this research work. The research scholars and students of the Department of studies in Computer Science, University of Mysore, Mysuru and the students of NIE Institute of Technology, Mysuru are acknowledged for their active participation in the efforts of collection of dataset and willingness to reveal their identities for publication with the consent of their respective educational institutions for research purposes only.

References

  1. 1.
    Westin, Alan F.: Privacy and Freedom, 5th edn. Atheneum, New York (1968)Google Scholar
  2. 2.
    von Silva-Tarouca Larsen, B.: Setting the Watch: Privacy and the Ethics of CCTV Surveillance, p. 226. Hart Publishing, Oxford (2011)Google Scholar
  3. 3.
    Macnish, K.: The Ethics of Surveillance: An Introduction. Taylor and Francis Group, London (2017)Google Scholar
  4. 4.
    Rajpoot, Q.M., Jensen, C.D.: Video surveillance: privacy issues and legal compliance, pp. 69–92 (2015).  https://doi.org/10.4018/978-1-4666-8502-4.ch004
  5. 5.
    Chen, A., Biglari-Abhari, M., Wang, K.: Trusting the computer in computer vision: a privacy-affirming framework (2017).  https://doi.org/10.1109/CVPRW.2017.178
  6. 6.
    Alexandrie, G.: Surveillance cameras and crime: a review of randomized and nat-ural experiments. J. Scand. Stud. Criminol. Crime Prev. 18(2), 210–222 (2017).  https://doi.org/10.1080/14043858.2017.1387410CrossRefGoogle Scholar
  7. 7.
    Mathur, G., Bundele, M.: Research on intelligent video surveillance techniques for suspicious activity detection critical review. In: 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), Jaipur, pp. 1–8 (2016)Google Scholar
  8. 8.
    Wang, X.: Intelligent multi-camera video surveillance: a review. Pattern Recognit. Lett. 34, 3–19 (2013).  https://doi.org/10.1016/j.patrec.2012.07.005CrossRefGoogle Scholar
  9. 9.
    Ibrahim, S.W.: A comprehensive review on intelligent surveillance systems. Commun. Sci. Technol. 1, 7–14 (2016)Google Scholar
  10. 10.
    Gray, D., Brennan, S., Tao, H.: Evaluating appearance models for recognition, reacquisition, and tracking. In: Proceedings of IEEE International Workshop on Performance Evaluation for Tracking and Surveillance (PETS) (2007)Google Scholar
  11. 11.
    Schwartz, W.R., Davis, L.S.: Learning discriminative appearance-based models using partial least squares. In: Proceedings of the XXII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI’2009), Rio de Janeiro, Brazil, 11–14 October 2009 (2009)Google Scholar
  12. 12.
    Cheng, D.S., Cristani, M., Stoppa, M., Bazzani, L., Murino, V.: Custom pictorial structures for re-identification. In: BMVC (2011)Google Scholar
  13. 13.
    Zheng, L., Wang, S., Shen, L., Tian, L., Bu, J., Tian, Q.: Person re-identification meets image search. Technical report (2015)Google Scholar
  14. 14.
    Ma, X., Zhu, X., Gong, S., Xie, X., Hu, J., Lam, K.-M., Zhong, Y.: Person re-identification by unsupervised video matching. Pattern Recognit. 65, 197–210 (2017). (PR)Google Scholar
  15. 15.
    Wang, T., Gong, S., Zhu, X., Wang, S.: Person re-identification by discriminative selection in video ranking. IEEE Trans. Pattern Anal. Mach. Intell. 38(12), 2501–2514 (2016). (TPAMI)Google Scholar
  16. 16.
    Wang, T., Gong, S., Zhu, X., Wang, S.: Person re-identification by video ranking. In: Proceedings of European Conference on Computer Vision (ECCV), Zurich, Switzerland, September 2014 (2014)Google Scholar
  17. 17.
    Liu, C., Gong, S., Loy, C.C.: On-the-fly feature importance mining for person re-identification. Pattern Recognit. 47(4), 1602–1615 (2014). (PR)Google Scholar
  18. 18.
    Gou, M., Karanam, S., Liu, W., Camps, O., Radke, R.J.: DukeMTMC4ReID: a large-scale multi-camera person re-identification dataset. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, pp. 1425–1434 (2017)Google Scholar
  19. 19.
    Baltieri, D., Vezzani, R., Cucchiara, R.: 3DPes: 3D people dataset for surveillance and forensics. In: Proceedings of the 1st International ACM Workshop on Multimedia Access to 3D Human Objects, Scottsdale, Arizona, USA, pp. 59–64, 28 November–1 December 2011 (2011)Google Scholar
  20. 20.
    Hirzer, M., et al.: Person re-identification by descriptive and discriminative classification. In: Image Analysis (2011)Google Scholar
  21. 21.
    Wang, S.M., Lewandowski, M., Annesley, J., Orwell, J.: Re-identification of pedestrians with variable occlusion and scale. In: IEEE International Conference on Computer Vision (ICCV), Barcelona, Spain, 6–13 November 2011 (2011). (2011 IEEE International Conference on Computer Vision Workshops (ICCV workshops))Google Scholar
  22. 22.
    Martinel, N., Micheloni, C., Piciarelli, C.: Distributed signature fusion for person re-identification. In: ICDSC (2012)Google Scholar
  23. 23.
    Bialkowski, A., et al.: A database for person re-identification in multi-camera surveillance networks. In: DICTA (2012)Google Scholar
  24. 24.
    Li, W., Zhao, R., Wang, X.: Human Re-identification with Transferred Metric Learning, pp. 31–44. Springer, Berlin (2012)Google Scholar
  25. 25.
    Li, W., Wang, X.: Locally aligned feature transforms across views. In: CVPR, pp. 3594–3601 (2013)Google Scholar
  26. 26.
    Li, W., et al.: DeepReId: deep filter pairing neural network for person re-identification. In: CVPR (2014)Google Scholar
  27. 27.
    Das, A., Chakraborty, A., Roy-Chowdhury, A.K.: Consistent re-identification in a cam-era network. In: ECCV (2014)Google Scholar
  28. 28.
    Figueira, D., et al.: The HDA+ data set for research on fully automated re-identification systems. In: ECCV Workshops (2014)Google Scholar
  29. 29.
    Karanam, S., Gou, M., Wu, Z., Rates-Borras, A., Camps, O., Radke, R.J.: A systematic evaluation and benchmark for person re-identification: features, metrics, and datasets. IEEE Trans. Pattern Anal. Mach. Intell. 99, 1–14 (2018)Google Scholar
  30. 30.
    Loy, C.C., Liu, C., Gong, S.: Person re-identification by manifold ranking. In: 2013 IEEE International Conference on Image Processing, Melbourne, VIC, pp. 3567–3571 (2013).  https://doi.org/10.1109/ICIP.2013.6738736; Author, F.: Article title. Journal 2(5), 99–110 (2016)
  31. 31.
    Zhao, R., Ouyang, W., Wang, X.: Unsupervised salience learning for person re-identification. In: 2013 IEEE Conference on Computer Vision and Pattern Recognition, Port-land, OR, pp. 3586–3593 (2013).  https://doi.org/10.1109/CVPR.2013.460
  32. 32.
    Al-Hmouz, R., Challa, S.: Optimal placement for opportunistic cameras using genetic algorithm. In: ICISSNIP, pp. 337–341 (2005)Google Scholar
  33. 33.
    Indu, S., Chaudhury, S.: Optimal sensor placement for surveillance of large spaces. In: Proceedings of ACM/IEEE International Conference on Distributed Smart Cameras, September 2009 (2009)Google Scholar
  34. 34.
    Pito, R.: A solution to the next best view problem for automated surface acquisition. IEEE Trans. Pattern Anal. Machl Intell. 21, 1016–1030 (1999)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Studies in Computer ScienceUniversity of MysoreMysuruIndia
  2. 2.Indian Institute of Information Technology AllahabadAllahabadIndia
  3. 3.MysuruIndia

Personalised recommendations