Advertisement

Camera Sabotage Detection Based on LOG Histogram and Bhattacharyya Distance

  • Shuang Liang
  • Ning Liu
  • Guanxiang Wang
  • Wei Guo
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 143)

Abstract

Reliability is very important to video surveillance. It is well known that camera tampering or sabotage will lead to lower reliabilities of video surveillance systems. In this paper, we propose a new algorithm based on histograms to detect camera sabotage. We use LOG operator to calculate edge histograms and apply Bhattacharyya distance to compare similarities between histograms. Experiments show that our algorithm is more effective and more reliable than conventional algorithms.

Keywords

Camera sabotage histogram LOG Bhattacharyya distance 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chen, Y.: Study of moving object detection in Intelligent Video Surveillance System. In: Proceedings of 2010 2nd Computer Engineering and Technology (ICCET), vol. 7, pp. 62–66. IEEE (2010)Google Scholar
  2. 2.
    Chen, S., Luo, C., Chen, Y., Zhang, W., Hou, J., Qian, J.: Design of Large Space fire alarm controller based on intelligent video surveillance. In: Proceedings of 2011 Electric Information and Control Engineering(ICEICE), pp. 3179–3183. IEEE (2011)Google Scholar
  3. 3.
    Gil-Jiménez, P., López-Sastre, R.J., Siegmann, P., Acevedo-Rodríguez, J., Maldonado-Bascón, S.: Automatic Control of Video Surveillance Camera Sabotage. In: Mira, J., Álvarez, J.R. (eds.) IWINAC 2007. LNCS, vol. 4528, pp. 222–231. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Anil, A., Alptekin, T., Enis, C.A.: Camera Tamper Detection Using Wavelet Analysis For Video Surveillance. In: Proceedings of the 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, pp. 558–562 (2007)Google Scholar
  5. 5.
    Evan, R., Stefan, A., Osama, M., Nikolas, P., Richard, V.: Real-time Detection of Camera Tampering. In: AVSS 2006 Proceedings of the IEEE International Conference on Video and Signal Based Surveillance, p. 10. IEEE Computer Society Press, Washington, DC, USA (2006)Google Scholar
  6. 6.
    Rauber, T.W., Braun, T., Berns, K.: Probabilistic distance measures of the Dirichlet and Beta distributions. Pattern Recognition 41(2), 637–645 (2008)zbMATHCrossRefGoogle Scholar
  7. 7.
    Dubuisson, S.: The computation of the Bhattacharyya distance between histograms without histograms. In: 2010 2nd International Conference Image Processing Theory Tools and Application (IPTA 2010), pp. 373–378. IEEE (September 2010)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Shuang Liang
    • 1
    • 2
  • Ning Liu
    • 2
    • 3
  • Guanxiang Wang
    • 2
    • 3
  • Wei Guo
    • 1
    • 2
  1. 1.School of Mathematics and Information ScienceHebei Normal UniversityShijiazhuangChina
  2. 2.Beijing International Center for Mathematical ResearchPeking UniversityBeijingChina
  3. 3.School of Mathematical SciencesPeking UniversityBeijingChina

Personalised recommendations