25th ICPR—Real-time Visual Surveillance as-a-Service (VSaaS) for smart security solutions

IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE IET Biometrics Pub Date : 2022-07-07 DOI:10.1049/bme2.12089
Michele Nappi, Hugo Proença, Guodong Guo, Sambit Bakshi
{"title":"25th ICPR—Real-time Visual Surveillance as-a-Service (VSaaS) for smart security solutions","authors":"Michele Nappi,&nbsp;Hugo Proença,&nbsp;Guodong Guo,&nbsp;Sambit Bakshi","doi":"10.1049/bme2.12089","DOIUrl":null,"url":null,"abstract":"<p>With the advent of ever-fast computing, real-time processing of visual data has been gaining importance in the field of surveillance. Also, automated decision-making by visual surveillance systems has been contributing to a huge leap in the capability of such systems, and of course their relevance in social security.</p><p>This special issue aimed to discuss cloud-based architectures of surveillance frameworks as a service. Such systems, especially when deployed to work in real-time, are required to be fast, efficient, and sustainable with a varying load of visual data.</p><p>Four papers were selected for inclusion in this special issue.</p><p>Wyzykowski et al. present an approach to synthesize realistic, multiresolution and multisensor fingerprints. Based in Anguli, a handcrafted fingerprint generator, they were able to obtain dynamic ridge maps with sweat pores and scratches. Then, a CycleGAN network was trained to transform these maps into realistic fingerprints. Unlike other CNN-based works, this framework is able to generate images with different resolutions and styles for the same identity. Finally, authors conducted a human perception analysis where 60 volunteers could hardly differentiate between real and high-resolution synthesized fingerprints.</p><p>Pawar and Attar address the problem of detection and localization of anomalies in surveillance videos, using pipelined deep autoencoders and one-class learning. Specifically, they used a convolutional autoencoder and sequence-to-sequence long short-term memory autoencoder in a pipelined fashion for spatial and temporal learning of the videos, respectively. In this setting, the principle of one-class classification for training the model on normal data and testing it on anomalous testing data was followed.</p><p>Tawfik Mohammed et al. describe a framework, implemented in a RAD (Rapid Application Development) paradigm, for performing iris recognition tests, based in the well-known Daugman's processing chain. They start by segmenting the iris ring using the Integro-differential operator, along with an edge-based Hough transform to isolate eyelids and eyelashes. After the normalization of the data (pseudo-polar domain), the features are encoded using 1D log Gabor kernel. Finally, the matching step is carried out using the Hamming distance.</p><p>Barra et al. describe an approach for automated head pose estimation that stems from a previous Partitioned Iterated Function Systems (PIFS)-based approach providing state-of-the-art accuracy with high computing cost and improve it by means of two regression models, namely Gradient Boosting Regressor and Extreme Gradient Boosting Regressor, achieving much faster response and an even lower mean absolute error on the yaw and roll axis, as shown by experiments conducted on the BIWI and AFLW2000 datasets.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 4","pages":"277-278"},"PeriodicalIF":1.8000,"publicationDate":"2022-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12089","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Biometrics","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/bme2.12089","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

With the advent of ever-fast computing, real-time processing of visual data has been gaining importance in the field of surveillance. Also, automated decision-making by visual surveillance systems has been contributing to a huge leap in the capability of such systems, and of course their relevance in social security.

This special issue aimed to discuss cloud-based architectures of surveillance frameworks as a service. Such systems, especially when deployed to work in real-time, are required to be fast, efficient, and sustainable with a varying load of visual data.

Four papers were selected for inclusion in this special issue.

Wyzykowski et al. present an approach to synthesize realistic, multiresolution and multisensor fingerprints. Based in Anguli, a handcrafted fingerprint generator, they were able to obtain dynamic ridge maps with sweat pores and scratches. Then, a CycleGAN network was trained to transform these maps into realistic fingerprints. Unlike other CNN-based works, this framework is able to generate images with different resolutions and styles for the same identity. Finally, authors conducted a human perception analysis where 60 volunteers could hardly differentiate between real and high-resolution synthesized fingerprints.

Pawar and Attar address the problem of detection and localization of anomalies in surveillance videos, using pipelined deep autoencoders and one-class learning. Specifically, they used a convolutional autoencoder and sequence-to-sequence long short-term memory autoencoder in a pipelined fashion for spatial and temporal learning of the videos, respectively. In this setting, the principle of one-class classification for training the model on normal data and testing it on anomalous testing data was followed.

Tawfik Mohammed et al. describe a framework, implemented in a RAD (Rapid Application Development) paradigm, for performing iris recognition tests, based in the well-known Daugman's processing chain. They start by segmenting the iris ring using the Integro-differential operator, along with an edge-based Hough transform to isolate eyelids and eyelashes. After the normalization of the data (pseudo-polar domain), the features are encoded using 1D log Gabor kernel. Finally, the matching step is carried out using the Hamming distance.

Barra et al. describe an approach for automated head pose estimation that stems from a previous Partitioned Iterated Function Systems (PIFS)-based approach providing state-of-the-art accuracy with high computing cost and improve it by means of two regression models, namely Gradient Boosting Regressor and Extreme Gradient Boosting Regressor, achieving much faster response and an even lower mean absolute error on the yaw and roll axis, as shown by experiments conducted on the BIWI and AFLW2000 datasets.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
第25届icpr -实时视觉监控即服务(VSaaS)智能安全解决方案
随着计算机技术的飞速发展,可视化数据的实时处理在监控领域变得越来越重要。此外,视觉监控系统的自动决策一直在为这类系统的能力带来巨大飞跃,当然,它们在社会安全方面也具有相关性。本期特刊旨在讨论基于云的监控框架架构即服务。这样的系统,特别是在部署为实时工作时,需要快速、高效和可持续地处理不同负载的可视化数据。四篇论文入选本期特刊。Wyzykowski等人提出了一种合成逼真、多分辨率和多传感器指纹的方法。基于Anguli,一个手工制作的指纹生成器,他们能够获得带有汗孔和划痕的动态脊图。然后,训练CycleGAN网络将这些地图转换成真实的指纹。与其他基于cnn的作品不同,该框架能够为同一身份生成不同分辨率和风格的图像。最后,作者进行了一项人类感知分析,让60名志愿者几乎无法区分真实指纹和高分辨率合成指纹。Pawar和Attar使用流水线深度自动编码器和单类学习解决了监控视频中异常的检测和定位问题。具体来说,他们分别以流水线方式使用卷积自编码器和序列到序列长短期记忆自编码器进行视频的空间和时间学习。在这种情况下,采用一类分类的原则,在正常数据上对模型进行训练,在异常测试数据上对模型进行测试。Tawfik Mohammed等人描述了一个框架,在RAD(快速应用开发)范例中实现,用于执行虹膜识别测试,基于著名的道格曼处理链。他们首先使用积分微分算子对虹膜环进行分割,并使用基于边缘的霍夫变换来分离眼睑和睫毛。在对数据进行归一化(伪极域)后,使用1D log Gabor核对特征进行编码。最后,利用汉明距离进行匹配。Barra等人描述了一种自动头部姿态估计方法,该方法源于先前基于分割迭代函数系统(PIFS)的方法,该方法提供了最先进的精度,但计算成本高,并通过两种回归模型(即梯度增强回归器和极端梯度增强回归器)对其进行了改进,从而实现了更快的响应和更低的横摆轴和横摇轴上的平均绝对误差。在BIWI和AFLW2000数据集上进行的实验表明。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IET Biometrics
IET Biometrics COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-
CiteScore
5.90
自引率
0.00%
发文量
46
审稿时长
33 weeks
期刊介绍: The field of biometric recognition - automated recognition of individuals based on their behavioural and biological characteristics - has now reached a level of maturity where viable practical applications are both possible and increasingly available. The biometrics field is characterised especially by its interdisciplinarity since, while focused primarily around a strong technological base, effective system design and implementation often requires a broad range of skills encompassing, for example, human factors, data security and database technologies, psychological and physiological awareness, and so on. Also, the technology focus itself embraces diversity, since the engineering of effective biometric systems requires integration of image analysis, pattern recognition, sensor technology, database engineering, security design and many other strands of understanding. The scope of the journal is intentionally relatively wide. While focusing on core technological issues, it is recognised that these may be inherently diverse and in many cases may cross traditional disciplinary boundaries. The scope of the journal will therefore include any topics where it can be shown that a paper can increase our understanding of biometric systems, signal future developments and applications for biometrics, or promote greater practical uptake for relevant technologies: Development and enhancement of individual biometric modalities including the established and traditional modalities (e.g. face, fingerprint, iris, signature and handwriting recognition) and also newer or emerging modalities (gait, ear-shape, neurological patterns, etc.) Multibiometrics, theoretical and practical issues, implementation of practical systems, multiclassifier and multimodal approaches Soft biometrics and information fusion for identification, verification and trait prediction Human factors and the human-computer interface issues for biometric systems, exception handling strategies Template construction and template management, ageing factors and their impact on biometric systems Usability and user-oriented design, psychological and physiological principles and system integration Sensors and sensor technologies for biometric processing Database technologies to support biometric systems Implementation of biometric systems, security engineering implications, smartcard and associated technologies in implementation, implementation platforms, system design and performance evaluation Trust and privacy issues, security of biometric systems and supporting technological solutions, biometric template protection Biometric cryptosystems, security and biometrics-linked encryption Links with forensic processing and cross-disciplinary commonalities Core underpinning technologies (e.g. image analysis, pattern recognition, computer vision, signal processing, etc.), where the specific relevance to biometric processing can be demonstrated Applications and application-led considerations Position papers on technology or on the industrial context of biometric system development Adoption and promotion of standards in biometrics, improving technology acceptance, deployment and interoperability, avoiding cross-cultural and cross-sector restrictions Relevant ethical and social issues
期刊最新文献
A Multimodal Biometric Recognition Method Based on Federated Learning Deep and Shallow Feature Fusion in Feature Score Level for Palmprint Recognition Research on TCN Model Based on SSARF Feature Selection in the Field of Human Behavior Recognition A Finger Vein Recognition Algorithm Based on the Histogram of Variable Curvature Directional Binary Statistics A Survey on Automatic Face Recognition Using Side-View Face Images
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1