Abstract
Our human always bring biometric information such as face, fingerprints, palms, and iris; no matter where we are, but biometric is discriminative from one to another which has essential and unique characteristics. In this chapter, we will introduce algorithms of surveillance data analytics, especially using biometric features, and critically compare and evaluate the major algorithms of biometrics for digital surveillance. At the end of this chapter, human privacy and ethics issues will be taken into consideration Adams, Ferryman (Secur J 28(3):272–289, 2012), Bowyer (IEEE Technol Soc 23(1):9–19, 2004).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Adams A, Ferryman M (2012) The future of video analytics for surveillance and its ethical implications. Secur J 28(3):272–289
Akhtar Z, Rattani A (2017) A face in any form: new challenges and opportunities for face recognition technology. Computer 50(4):80–90
Aleksic PS (2009) Lip movement recognition. Encyclopedia of biometrics. Springer, New York, pp 904–908
Antoniou A, Angelov P (2016) A general purpose intelligent surveillance system for mobile devices using deep learning. In: International joint conference on neural networks (IJCNN)
Athitsos V, Wang H, Stefan A (2010) A database-based framework for gesture recognition. Pers Ubiquitous Comput 14(6):511–526
Azad R, Ahmadzadeh E, Azad B (2015) Real-time human face detection in noisy images based on skin color fusion model and eye detection. Intelligent computing, communication and devices, vol 309. Springer, Berlin, pp 435–447
Bansal A, Agarwal R, Sharma RK (2012) FAR and FRR based analysis of iris recognition system. In: IEEE international conference on signal processing, computing and control, pp 1–6
Bartlett MS, Movellan JR, Sejnowski TJ (2002) Face recognition by independent component analysis. IEEE Trans Neural Netw 13(6):1450–1464
Baym K (2009) A call for grounding in the face of blurred boundaries. J Comput-Mediat Commun 14(3):720–723
Behravan H, Faez K (2013) Introducing a new multimodal database from twins’ biometric traits. In: Iranian conference on electrical engineering, pp 1–6
Billon R, Nedelec A, Tisseau J (2008) Gesture recognition in flow based on PCA analysis using multiagent system. In: Proceedings of the 2008 international conference on advances in computer entertainment technology, pp 139–146
Biswas S, Bowyer KW, Flynn PJ (2011) A study of face recognition of identical twins by humans. In: International workshop on information forensics and security, pp 1–6
Bowyer W (2004) Face recognition technology: security versus privacy. IEEE Technol Soc 23(1):9–19
Bruce V, Young A (1986) Understanding face recognition. Br J Psychol 77:305–327
Brunelli R, Falavigna D (1995) Person identification using multiple cues. IEEE Trans Pattern Anal Mach Intell 17(10):955966
Bui H, Venkatesh S, West W (2001) Tracking and surveillance in wide-area spatial environments using the abstract Hidden Markov model. Pattern Recognit 15(1):177–195
Burton DK (1987) Text-dependent speaker verification using vector quantization source-coding. IEEE Trans Acoust Speech Signal Process 35(2):133–143
Calvel C, Ehrette T, Richard G (2005) Event detection for audio-based surveillance system. In: ICME, pp 1306–1309
Carrillo P, Kalva H, Magliveras S (2008) Compression independent object encryption for ensuring privacy in video surveillance. In: ICME, pp 273–276
Cavallaro A (2007) Privacy in video surveillance. IEEE Signal Process 24(2):168–169
Chen C, Vijayan KA, Andrew DB (2015) Robust textural features for real time face recognition. In: Imaging and multimedia analytics in a web and mobile world (SPIE 9408)
Chen D, Chang Y, Yan R, Yang J (2007) Tools for protecting the privacy of specific individuals in video. EURASIP J Adv Signal Process 1(1):107–116
Chen T, Chen Y, Lee S, Huang F (1998) Discriminant analysis of principal components for face recognition. In: IEEE international conference on automatic face and gesture recognition, pp 336–341
Chen X, Koskela M (2013) Online RGB-D gesture recognition with extreme learning machines. In: ACM on international conference on multimodal interaction, pp 467–474
Cheng H, Luo J, Chen X (2014) A windowed dynamic time warping approach for 3D continuous hand gesture recognition. In: IEEE international conference on multimedia and expo, pp 1–6
Chinomi K, Nitta N, lto Y, Babaguchi N (2008) PriSurv: privacy protected video surveillance system using adaptive visual abstraction. Advances in multimedia modeling, vol 4903. Lecture Notes in Computer Science. Springer, Berlin, pp 144–154
Cotton D, Uson M (2007) Image pixelization and dynamic range. Natl Radio Astron Obs 1(1):3–10
Cotton D, Uson M (2008) Pixelization and dynamic range in radio interferometry. Astron Instrum 490(1):455–460
Chan MT, Zhang Y, Huang TS (1998) Real-time lip tracking and bimodal continuous speech recognition. In: IEEE workshop on multimedia signal processing, pp 65–70
Chang K, Bowyer KW, Sarkar S, Victor B (2003) Comparison and combination of ear and face images in appearance-based biometrics. IEEE Trans Pattern Anal Mach Intell 25(9):1160–1165
Delac K, Grgic M, Grgic S (2005) Statistics in face recognition: analyzing probability distributions of PCA, ICA and LDA performance results. In: International symposium on image and signal processing and analysis, pp 289–294
Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: CVPR, pp 886–893
Delac K, Grgic M, Grgic S (2005) Independent comparative study of PCA, ICA, and LDA on the FERET data set. Int J Imaging Syst Technol 15(5):252–260
Dieckmann U, Plankensteiner P, Wagner T (1997) Sesam: a biometric person identification system using sensor fusion. Pattern Recognit Lett 18(9):827–833
Dong Y, Liu Y, Lian S (2016) Automatic age estimation based on deep learning algorithm. Neurocomputing 187:4–10
Draper BA, Baek K, Bartlett MS, Beveridge JR (2003) Recognizing faces with PCA and ICA. Comput Vis Image Underst 91(1–2):115–137
Dufaux F, Ebrahimi T (2008) H.264/AVC video scrambling for privacy protection. In: IEEE ICIP, pp 1688–1691
Dufaux F, Ebrahimi T (2010) A framework for the validation of privacy protection solutions in video surveillance. In: IEEE ICME, pp 66–71
Enzweiler M, Gavrila D (2008) Monocular pedestrian detection: survey and experiments. IEEE Trans Pattern Anal Mach Intell 31(12):2179–2195
Evermann J, Rehse J-R, Fettke P (2017) Predicting process behaviour using deep learning. Decis Support Syst 100:129–140
Faraj M, Bigun J (2007) Lip biometrics for digit recognition. Computer analysis of images and patterns, vol 4673. Lecture Notes in Computer Science. Springer, Berlin, pp 360–365
Fraser T (2004) Privacy law and video surveillance: guidance from the ontario courts. Mcinnes Cooper 3(1):10–13
Frischholz R, Dieckmann U (2000) Bioid: a multimodal biometric identification system. IEEE Comput 33(2):6468
Gadea C, Ionescu B, Ionescu D, Islam S, Solomon B (2012) Finger-based gesture control of a collaborative online workspace. In: IEEE international symposium on applied computational intelligence and informatics, pp 41–46
Gavrila M (1993) The analysis of human motion and its application for visual surveillance. Comput Vis Image Underst 73(1):82–98
Georghiades AS, Belhumeur PN, Kriegman DJ (2001) From few to many: illumination cone models for face recognition under variable lighting and pose. IEEE Trans Pattern Anal Mach Intell 23(6):643–660
Golfarelli M, Maio D, Maltoni D (1997) On the error-reject tradeoff in biometric verification systems. IEEE Trans Pattern Anal Mach Intell 19(7):786796
Gong S, Xiang T (2003) Recognition of group activities using dynamic probabilistic networks. In: IEEE ICCV, pp 742–750
Gottumukkal R, Asari VK (2004) An improved face recognition technique based on modular PCA approach. Pattern Recognit Lett 25(4):429–436
Gouaillier V (2009) Intelligent video surveillance: promises and challenges technological and commercial intelligence report. CRIM Technople Def Secur 3(2):9–68
Gu S, Han Q (2006) The application of chaos and DWT in image scrambling. In: Machine learning and cybernetics, pp 3729–3733
Gulzar N, Abbasi B, Wu E, Ozbal A, Yan W (2013) Surveillance privacy protection. Intelligent multimedia surveillance: current trends and research. Springer, Berlin, pp 83–105
Guo H, Wu X, Feng W (2017) Multi-stream deep networks for human action classification with sequential tensor decomposition. Signal Process 140:198–206
Hampapur A, Brown L, Connell J, Ekin A, Haas N, Lu M, Merkl H, Pankanti S (2005) Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Process 22(2):38–51
Hanmandlu M, Gupta D, Vasikarla S (2013) Face recognition using Elastic bunch graph matching. In: IEEE applied imagery pattern recognition workshop: sensing for control and augmentation, pp 1–7
Haritaoglu I, Harwood D, Davis LS (2000) W4: real-time surveillance of people and their activities. IEEE TPAMI 22(8):809–830
Herath S, Harandi M, Porikli F (2017) Going deeper into action recognition: a survey. Image Vis Comput 60:4–21
Hsieh CC, Liou DH, Lee D (2010) A real time hand gesture recognition system using motion history image. In: International conference on signal processing systems, vol 2, pp V2–394
Hu G, Gao Q (2011) Gesture analysis using 3D camera, shape features and particle filters. In: Canadian conference on computer and robot vision, pp 204–211
Iosifidis A, Tefas A (2012) View-invariant action recognition based on artificial neural networks. IEEE Trans Neural Netw Learn Syst 23(3):412–424
Ivanov Y, Bobick A (2000) Recognition of visual activities and interaction by stochastic parsing. IEEE Trans Pattern Anal Mach Intell 22(8):852872
Ishijima R, Ogawa K, Higuchi M, Komuro T (2014) Real-time typing action detection in a 3D pointing gesture interface. In: Augmented human international conference, pp 20
Jain AK (2007) Technology: biometric recognition. Nature 449(7158):38–40
Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20
Jian-wei Z, Shui-fa S, Xiao-li L, Bang-jun L (2009) Pitch in speaker recognition. In: International conference on hybrid intelligent systems, pp 33–36
Julie S (2000) High-tech surveillance tools and the fourth amendment: reasonable expectations of privacy in the technological age. Am Crim Law Rev 37(1):192–222
Kasabov N (1996) Foundations of neural networks, fuzzy systems, and knowledge engineering. The MIT Press, Boston
Kieran D, Yan W (2010) A Framework for an event driven video surveillance system. In: IEEE advanced video and signal based surveillance, Boston, pp 97–102
Kim P-S, Lee D-G, Lee S-W (2018) Discriminative context learning with gated recurrent unit for group activity recognition. Pattern Recognit 76:149–161
Klare B, Paulino AA, Jain AK (2011) Analysis of facial features in identical twins. In: International joint conference on biometrics, pp 1–8
Klette R (2014) Concise computer vision. Springer, London
Kovac J, Peer P, Solina F (2003) Human skin color clustering for face detection. In: IEEE EUROCON, pp 144–148
Kshirsagar VP, Baviskar MR, Gaikwad ME (2011) Face recognition using eigenfaces. In: IEEE computer research and development, pp 302–306
Kurakin A, Zhang Z, Liu Z (2012) A real time system for dynamic hand gesture recognition with a depth sensor. In: European signal processing conference, pp 1975–1979
Kurniawan F, Shafry M, Rahim M (2012) A review on 2D ear recognition. In: International colloquium on signal processing and its applications, pp 204–209
Langheinrich M (2001) Privacy by design - principles of privacy-aware ubiquitous systems. In: UbiComp, pp 273–291
Lawrence S, Giles CL, Tsoi AC, Back AD (1997) Face recognition: a convolutional neural-network approach. IEEE Trans Neural Netw 8(1):98–113
Le THN, Luu K, Seshadri K, Savvides M (2012) A facial aging approach to identification of identical twins. In: International conference on biometrics: theory, applications and systems, pp 91–98
Lee U, Tanaka J (2013) Finger identification and hand gesture recognition techniques for natural user interface. In: Asia Pacific conference on computer human interaction, pp 274–279
Li C, Xie C, Zhang B, Chen C, Han J (2018) Deep Fisher discriminant learning for mobile hand gesture recognition. Pattern Recognit 77:276–288
Li G, Ito Y, Yu X, Nitta N, Babaguchi N (2009) Recoverable privacy protection for video content distribution. EURASIP J Inf Secur 3(4):2–9
Li R, Nguyen M, Yan Q (2017) Morse codes enter using finger gesture recognition. In: IEEE digital image computing: techniques and applications, pp 1–8
Li R (2017) Vision-based Morse code recognition. Masters Thesis, Auckland University of Technology, Auckland, New Zealand
Li SZ, Lu JW (1999) Face recognition using the nearest feature line method. IEEE Trans Neural Netw 10(2):439–443
Li Y, Yuan W, Sang H, Li X (2013) Combination recognition of face and ear based on two-dimensional fisher linear discriminant. In: International conference on software engineering and service science, pp 922–925
Liu C, Wechsler H (1999) Comparative assessment of independent component analysis (ICA) for face recognition. In: International conference on audio- and video-based biometrics person authentication, pp 211–216
Lu J (2016) Empirical approaches for human behavior analytics. Masters thesis, Auckland University of Technology, New Zealand
Mahalingam G, Ricanek K (2013) Investigating the effects of gender and age group based differences in identical twins. In: National conference on computer vision, pattern recognition, image processing and graphics, pp 1–4
Maltoni D, Maio D, Jain A, Prabhakar S (2003) Handbook of fingerprint recognition. Springer, New York
Martin K, Plataniotis N (2008) Privacy protected surveillance using secure visual object coding. IEEE Trans Circuits Syst Video Technol 18(8):1152–1162
Milan P, Jonker W (2007) Security, privacy, and trust in modern data management. Springer, New York
Mozaffari S, Behravan H (2011) Twins facial similarity impact on conventional face recognition systems. In: Iranian conference on electrical engineering, pp 1–6
Muda L, Begam M, Elamvazuthi I (2010) Voice recognition algorithms using mel frequency cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques. J Comput 2(3)
Murthy R, Jadon RS (2010) Hand gesture recognition using neural networks. In: International advance computing conference, pp 134–138
Nandakumar K, Wan KW, Chan SMA, Ng WZT, Wang JG, Yau WY (2013) A multi-modal gesture recognition system using audio, video, and skeletal joint data. In: ACM international conference on multimodal interaction, pp 475–482
Nefian AV, Hayes MH (1999) An embedded HMM-based approach for face detection and recognition. In: International conference on acoustics, speech, and signal processing, pp 3553–3556
Newton M, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 17(2):232–243
Nguyen NT, Bui HH, Venkatesh S, West G (2003) Recognizing and monitoring high-level behavior in complex spatial environments. In: IEEE CVPR, pp 1–6
Niikura T, Watanabe Y, Komuro T, Ishikawa M (2012) In-air typing interface: realizing 3D operation for mobile devices. In: IEEE global conference on consumer electronics, pp 223–227
Nikhil S, Mohan S, Ramya B, Kadambi GR (2010) Design and development of a DSP processor based reconfigurable hand gesture recognition system for real time applications. In: International conference on signal and image processing, pp 39–44
Orwell G (2002) Go on, watch me: people are voluntarily surrendering their privacy. The Economist 75(4):1125–1192
Osuna E, Freund R, Girosi F (1997) Training support vector machines: an application to face detection. In: IEEE conference on computer vision and pattern recognition, pp 130–136
Pankanti S, Hampapur A, Brown L, Tian L, Ekin A, Connell J, Shu F, Lu M (2005) Enabling video privacy through computer vision. IEEE Secur Priv 3(3):50–57
Panwar M (2012) Hand gesture recognition based on shape parameters. In: International conference on computing communication and applications, pp 1–6
Paruchuri K, Cheung S, Hail W (2009) Video data hiding for managing privacy information in surveillance systems. EURASIP J Inf Secur 8(3):18
Pentland A (1991) Face recognition using eigenfaces. In: IEEE CVPR, pp 586–591
Pentland A, Moghaddam B, Starner T (1994) View-based and modular eigenspaces for face recognition. In: IEEE conference on computer vision and pattern recognition, pp 84–91
Phillips J, Moon H, Rauss J, Rizvi A (2000) The FERET evaluation methodology for face recognition algorithms. IEEE Trans Pattern Anal Mach Intell 22(10):252–274
Pollock A (2002) Method of electronic audio surveillance. Law J Libr 5(12):380–385
Prabhakar S, Jain A (2002) Decision-level fusion in fingerprint verification. Pattern Recognit 35(4):861874
Prabhakar S, Pankanti S, Jain A (2003) Biometric recognition: security and privacy concerns. IEEE Secur Priv 1(2):3342
Prasad JS, Saxena A, Javar N, Kaushik KB, Chakraborty P, Nandi GC (2010) Gesture recognition by stereo vision. In: International conference on intelligent interactive technologies and multimedia, pp 155–162
Promyarut I, Suvonvorn N, Limsiroratana S (2011) Video scrambling for privacy protection in surveillance system. In: International conference on circuits, system and simulation, pp 177–182
Qi YY, Hunt BR (1994) Signature verification using global and grid features. Pattern Recognit 27(12):1621–1629
Raheja JL, Shyam R, Kumar U, Prasad PB (2010) Real-time robotic hand control using hand gestures. In: International conference on machine learning and computing, pp 12–16
Remagnino P, Baumberg A, Grove T, Hogg D, Tan T, Worral A, Baker K (1997) An integrated traffic and pedestrian model-based vision system. In: BMVC, pp 380–389
Saini M, Atrey K, Mehrota S, Kankanhalli S (2012) \(W^3\)-privacy: understanding What, When and where inference channels in multi-camera surveillance video. Springer Multimed Tools Appl 68:135–158
Sagheer AE, Tsuruta N, Taniguchi R (2004) Arabic lip-reading system: a combination of hypercolumn neural network model with hidden Markov model. In: International conference on artificial intelligence and soft computing, pp 311–316
SanMiguel JC, Martinez JM, Garcia A (2009) An ontology for event detection and its application in surveillance video. In: IEEE AVSS, pp 220–225
Senior A (2009) Protecting privacy in video surveillance. Springer, London
Shailaja D, Gupta P (2006) A simple geometric approach for ear recognition. In: International conference on information technology, pp 164–167
Sigal L, Balan O, Black J (2010) Synchronized video and motion capture dataset and baseline algorithm for evaluation of articulated human motion. IJCV 87(1–2):4–27
Socek D, Kalva H, Magliveras S, Marques O, Culibrk D, Furht B (2007) New approaches to encryption and steganography for digital videos. Multimed Syst 13(3):191–204
Sohn H, AnzaKu E, Neve W, Ro M, Plataniotis K (2009) Privacy protection in video surveillance systems using scalable video coding. In: IEEE AVSS, pp 424–429
Song Y, Demirdjian D, Davis R (2012) Continuous body and hand gesture recognition for natural human-computer interaction. ACM Trans Interact Intell Syst 2(1)
Srinivas N, Aggarwal G, Flynn PJ, Vorder Bruegge RW (2012) Analysis of facial marks to distinguish between identical twins. IEEE Trans Inf Forensics Secur 7(5):1536–1550
Stergiopoulou E, Papamarkos N (2009) Hand gesture recognition using a neural network shape fitting technique. Eng Appl Artif Intell 22(8):1141–1158
Suarez J, Murphy RR (2012) Hand gesture recognition with depth images: a review. In: RO-MAN, pp 411–417
Sun Z, Paulino AA, Feng J, Chai Z, Tan T, Jain AK (2010) A study of multi biometric traits of identical twins. In: SPIE biometric technology for human identification, vol 7667. Orlando, USA
Suo J, Chen X, Shan S, Gao W, Dai Q (2012) A concatenational graph evolution aging model. IEEE Trans Pattern Anal Mach Intell 34(11):2083–2096
Swain M, Dash SK, Dash S, Mohapatra A (2012) An approach for iris plant classification using neural network. Int J Soft Comput 3(1):79
Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: IEEE conference on computer vision and pattern recognition, pp 586–591
Valenzise G, Gerosa L, Tagliasacchi M, Antonacci F, Sarti A (2007) Scream and gunshot detection and localization for audio surveillance. In: IEEE AVSS, pp 21–26
Vijayan V, Bowyer KW, Flynn PJ, Huang D, Chen L, Hansen M, Kakadiaris IA (2011) Twins 3D face recognition challenge. In: International joint conference on biometrics, pp 1–7
Viola P, Jones M (2004) Robust real-time face detection. Int J Comput Vis 57(2):137–154
Wang S, Chen L, Zhou Z, Sun X, Dong J (2016) Human fall detection in surveillance video based on PCANet. Multimed Tools Appl 75(19):11603–11613
Wei J, Huang DS, Zhang D (2008) Palmprint verification based on robust line orientation code. Pattern Recognit 41(5):1504–1513
Wren C, Azarbayejani A, Darrell T, Pentland A (1997) Pfinder: realtime tracking of the human body. IEEE PAMI 19(7):780785
Wu J, Cheng J, Zhao C, Lu H (2013) Fusing multi-modal features for gesture recognition. In: ACM on international conference on multimodal interaction, pp 453–460
Wu J, Pan G, Zhang D, Qi G, Li S (2009) Gesture recognition with a 3D accelerometer. In: Ubiquitous intelligence and computing, pp 25–38
Xu C, Liu Q, Ye M (2017) Age invariant face recognition and retrieval by coupled auto-encoder networks. Neurocomputing 222:62–71
Xu D (2006) A neural network approach for hand gesture recognition in virtual reality driving training system of SPG. In: International conference on pattern recognition, vol 3, pp 519–522
Yan W, Kankanhalli M (2008) Progressive audio scrambling in compressed domain. IEEE Trans Multimed 10(6):960–968
Yan W, Wu X, Liu F, Jain R (2018) Progressive scrambling for social media. IJDCF 10(2):1–13
Yuan Q, Gao W, Yao HX (2002) Robust frontal face detection in complex environment. In: IEEE international conference on pattern recognition, pp 25–28
Zhang B, Li W, Qing P, Zhang D (2013) Palm-print classification by global features. IEEE Trans Syst Man Cybern Syst 43(2):370–378
Zhang D, Shu W (1999) Two novel characteristic in palmprint verification: datum point invariance and line feature matching. Pattern Recognit 32(4):691702
Zhang Y (2016) Virtual keyboard based on single finger recognition. Master thesis, Auckland University of Technology, Auckland, New Zealand
Zhao W, Chellappa R, Krishnaswamy A, Wen J (1998) Discriminant analysis of principal components for face recognition. In: IEEE international conference on automatic face and gesture recognition, pp 336–341
Zhao ZQ, Huang DS, Sun BY (2004) Human face recognition based on multi-features using neural networks committee. Pattern Recognit Lett 25(12):1351–1358
Zhang L, Li L, Yang A, Shen Y, Yang M (2017) Towards contactless palmprint recognition: a novel device, a new benchmark, and a collaborative representation based identification approach. Pattern Recognit 69:199–212
Zhang T, Feng Z (2013) Dynamic gesture recognition based on fusing frame images. In: International conference on intelligent systems design and engineering applications, pp 280–283
Zhu C, Peng Y (2017) Discriminative latent semantic feature learning for pedestrian detection. Neurocomputing 238:126–138
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Yan, W.Q. (2019). Biometrics for Surveillance. In: Introduction to Intelligent Surveillance. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-10713-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-10713-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-10712-3
Online ISBN: 978-3-030-10713-0
eBook Packages: Computer ScienceComputer Science (R0)