Skip to main content

An Anti-tampering Algorithm Based on an Artificial Intelligence Approach

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNAI,volume 7661)

Abstract

Home automation poses requirements, which are typically solved by AI methods. The paper focuses on the problem of protecting video-surveillance systems against tampering actions, and proposes a new algorithm. This is based on a model of the environment observed by the camera, which must be protected. The model is automatically learned by observing the video stream generated by the camera. The method is now implemented in a commercial system are the results reported from seven experimental sites shows an excellent performance outperforming state of the art algorithms described in the literature.

Keywords

  • Light Condition
  • Video Stream
  • Decision Module
  • Current Image
  • Smart Home

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cook, D.J., Augusto, J., Jakkula, V.: Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing 5(4), 277–299 (2009)

    CrossRef  Google Scholar 

  2. Simpson, R., Schreckenghost, D., LoPresti, E.F., Kirsch, N.: Plans and Planning in Smart Homes. In: Augusto, J.C., Nugent, C.D. (eds.) Designing Smart Homes. LNCS (LNAI), vol. 4008, pp. 71–84. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  3. Ramos, C.: Ambient Intelligence – A State of the Art from Artificial Intelligence Perspective. In: Neves, J., Santos, M.F., Machado, J.M. (eds.) EPIA 2007. LNCS (LNAI), vol. 4874, pp. 285–295. Springer, Heidelberg (2007)

    CrossRef  Google Scholar 

  4. Mendola, D., Monfrecola, A., Moio, A., Giordana, A.: Horus: an agent based system for home automation. Technical report TR-01-2012 (2012)

    Google Scholar 

  5. Saglam, A.: Adaptive camera tamper detection for video surveillance (June 2009)

    Google Scholar 

  6. Ribnick, E., Atev, S., Masoud, O., Papanikolopoulos, N., Voyles, R.: Real-time detection of camera tampering. In: Proceedings of the IEEE International Conference on Video and Signal Based Surveillance, AVSS 2006, p. 10. IEEE Computer Society, Washington, DC (2006)

    CrossRef  Google Scholar 

  7. Aha, D., Kibler, D., Albert, M.: Instance-based learning algorithms. Machine Learning 6, 37–66 (1991)

    Google Scholar 

  8. Djouadi, A., Snorrason, O., Garber, F.: The quality of training-sample estimates of the bhattacharyya coefficient. IEEE Transactions on Pattern Analysis and Machine Intelligence 12(1), 92–97 (1990)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moio, A., Giordana, A., Mendola, D. (2012). An Anti-tampering Algorithm Based on an Artificial Intelligence Approach. In: Chen, L., Felfernig, A., Liu, J., Raś, Z.W. (eds) Foundations of Intelligent Systems. ISMIS 2012. Lecture Notes in Computer Science(), vol 7661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34624-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34624-8_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34623-1

  • Online ISBN: 978-3-642-34624-8

  • eBook Packages: Computer ScienceComputer Science (R0)