| Introduction |
|
xiii | |
|
|
|
|
|
Chapter 1 Image Processing: Overview and Perspectives |
|
|
1 | (12) |
|
|
|
|
|
1 | (2) |
|
|
|
3 | (1) |
|
1.3 Strengths and weaknesses of image processing |
|
|
4 | (2) |
|
1.3.1 What are these theoretical problems that image processing has been unable to overcome? |
|
|
5 | (1) |
|
1.3.2 What are the problems that image processing has overcome? |
|
|
5 | (1) |
|
1.4 What is left for the future? |
|
|
6 | (3) |
|
|
|
9 | (4) |
|
Chapter 2 Focus on Railway Transport |
|
|
13 | (20) |
|
|
|
|
|
|
|
13 | (2) |
|
2.2 Surveillance of railway infrastructures |
|
|
15 | (6) |
|
|
|
15 | (1) |
|
2.2.2 Which architectures? |
|
|
16 | (1) |
|
2.2.3 Detection and analysis of complex events |
|
|
17 | (3) |
|
2.2.4 Surveillance of outside infrastructures |
|
|
20 | (1) |
|
|
|
21 | (7) |
|
2.3.1 Surveillance of buses |
|
|
22 | (1) |
|
2.3.2 Applications to railway transport |
|
|
23 | (5) |
|
|
|
28 | (2) |
|
|
|
30 | (3) |
|
Chapter 3 A Posteriori Analysis for Investigative Purposes |
|
|
33 | (14) |
|
|
|
|
|
|
|
|
|
|
|
|
|
33 | (1) |
|
3.2 Requirements in tools for assisted investigation |
|
|
34 | (2) |
|
3.2.1 Prevention and security |
|
|
34 | (1) |
|
3.2.2 Information gathering |
|
|
35 | (1) |
|
|
|
36 | (1) |
|
3.3 Collection and storage of data |
|
|
36 | (3) |
|
3.3.1 Requirements in terms of standardization |
|
|
37 | (1) |
|
3.3.2 Attempts at standardization (AFNOR and ISO) |
|
|
37 | (2) |
|
3.4 Exploitation of the data |
|
|
39 | (5) |
|
3.4.1 Content-based indexing |
|
|
39 | (4) |
|
3.4.2 Assisted investigation tools |
|
|
43 | (1) |
|
|
|
44 | (1) |
|
|
|
45 | (2) |
|
Chapter 4 Video Surveillance Cameras |
|
|
47 | (18) |
|
|
|
|
|
|
|
47 | (1) |
|
|
|
48 | (1) |
|
4.2.1 Financial constraints |
|
|
48 | (1) |
|
4.2.2 Environmental constraints |
|
|
49 | (1) |
|
4.3 Nature of the information captured |
|
|
49 | (4) |
|
|
|
50 | (1) |
|
4.3.2 3D or "2D + Z" imaging |
|
|
51 | (2) |
|
|
|
53 | (2) |
|
|
|
55 | (2) |
|
4.6 Interfaces: from analog to IP |
|
|
57 | (4) |
|
4.6.1 From analog to digital |
|
|
57 | (2) |
|
|
|
59 | (1) |
|
|
|
60 | (1) |
|
|
|
61 | (1) |
|
|
|
62 | (1) |
|
|
|
63 | (2) |
|
Chapter 5 Video Compression Formats |
|
|
65 | (22) |
|
|
|
|
|
|
|
65 | (1) |
|
|
|
66 | (4) |
|
5.2.1 Analog video signals |
|
|
66 | (1) |
|
5.2.2 Digital video: standard definition |
|
|
67 | (1) |
|
|
|
68 | (1) |
|
5.2.4 The CIF group of formats |
|
|
69 | (1) |
|
5.3 Principles of video compression |
|
|
70 | (4) |
|
|
|
70 | (3) |
|
5.3.2 Temporal redundancy |
|
|
73 | (1) |
|
5.4 Compression standards |
|
|
74 | (9) |
|
|
|
74 | (1) |
|
|
|
75 | (2) |
|
5.4.3 MPEG-4 Part 10/H.264 AVC |
|
|
77 | (2) |
|
5.4.4 MPEG-4 Part 10/H.264 SVC |
|
|
79 | (1) |
|
|
|
80 | (2) |
|
5.4.6 Summary of the formats used in video surveillance |
|
|
82 | (1) |
|
|
|
83 | (1) |
|
|
|
84 | (3) |
|
Chapter 6 Compressed Domain Analysis for Fast Activity Detection |
|
|
87 | (16) |
|
|
|
|
|
87 | (1) |
|
|
|
88 | (5) |
|
6.2.1 Use of transformed coefficients in the frequency domain |
|
|
88 | (2) |
|
6.2.2 Use of motion estimation |
|
|
90 | (1) |
|
|
|
91 | (2) |
|
6.3 Uses of analysis of the compressed domain |
|
|
93 | (7) |
|
6.3.1 General architecture |
|
|
94 | (2) |
|
6.3.2 Functions for which compressed domain analysis is reliable |
|
|
96 | (1) |
|
|
|
97 | (3) |
|
|
|
100 | (1) |
|
|
|
101 | (1) |
|
|
|
101 | (2) |
|
Chapter 7 Detection of Objects of Interest |
|
|
103 | (20) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
103 | (1) |
|
7.2 Moving object detection |
|
|
104 | (5) |
|
7.2.1 Object detection using background modeling |
|
|
104 | (3) |
|
7.2.2 Motion-based detection of objects of interest |
|
|
107 | (2) |
|
7.3 Detection by modeling of the objects of interest |
|
|
109 | (8) |
|
7.3.1 Detection by geometric modeling |
|
|
109 | (2) |
|
7.3.2 Detection by visual modeling |
|
|
111 | (6) |
|
|
|
117 | (1) |
|
|
|
118 | (5) |
|
Chapter 8 Tracking of Objects of Interest in a Sequence of Images |
|
|
123 | (24) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
123 | (1) |
|
8.2 Representation of objects of interest and their associated visual features |
|
|
124 | (3) |
|
|
|
124 | (1) |
|
8.2.2 Characteristics of appearance |
|
|
125 | (2) |
|
|
|
127 | (1) |
|
8.4 Object-tracking algorithms |
|
|
127 | (5) |
|
8.4.1 Deterministic approaches |
|
|
127 | (1) |
|
8.4.2 Probabilistic approaches |
|
|
128 | (4) |
|
8.5 Updating of the appearance models |
|
|
132 | (3) |
|
8.6 Multi-target tracking |
|
|
135 | (3) |
|
|
|
135 | (1) |
|
8.6.2 MCMC and RJMCMC sampling techniques |
|
|
136 | (2) |
|
8.6.3 Interactive filters, track graph |
|
|
138 | (1) |
|
8.7 Object tracking using a PTZ camera |
|
|
138 | (3) |
|
8.7.1 Object tracking using a single PTZ camera only |
|
|
139 | (1) |
|
8.7.2 Object tracking using a PTZ camera coupled with a static camera |
|
|
139 | (2) |
|
|
|
141 | (1) |
|
|
|
142 | (5) |
|
Chapter 9 Tracking Objects of Interest Through a Camera Network |
|
|
147 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
147 | (1) |
|
9.2 Tracking in a network of cameras whose fields of view overlap |
|
|
148 | (7) |
|
9.2.1 Introduction and applications |
|
|
148 | (2) |
|
9.2.2 Calibration and synchronization of a camera network |
|
|
150 | (3) |
|
9.2.3 Description of the scene by multi-camera aggregation |
|
|
153 | (2) |
|
9.3 Tracking through a network of cameras with non-overlapping fields of view |
|
|
155 | (6) |
|
9.3.1 Issues and applications |
|
|
155 | (1) |
|
9.3.2 Geometric and/or photometric calibration of a camera network |
|
|
156 | (1) |
|
9.3.3 Reidentification of objects of interest in a camera network |
|
|
157 | (3) |
|
9.3.4 Activity recognition/event detection in a camera network |
|
|
160 | (1) |
|
|
|
161 | (1) |
|
|
|
161 | (4) |
|
Chapter 10 Biometric Techniques Applied to Video Surveillance |
|
|
165 | (18) |
|
|
|
|
|
|
|
165 | (1) |
|
10.2 The databases used for evaluation |
|
|
166 | (2) |
|
10.2.1 NIST-Multiple Biometrics Grand Challenge (NIST-MBGC) |
|
|
167 | (1) |
|
10.2.2 Databases of faces |
|
|
167 | (1) |
|
|
|
168 | (5) |
|
|
|
168 | (1) |
|
10.3.2 Face recognition in biometrics |
|
|
169 | (1) |
|
10.3.3 Application to video surveillance |
|
|
170 | (3) |
|
|
|
173 | (4) |
|
10.4.1 Methods developed for biometrics |
|
|
173 | (1) |
|
10.4.2 Application to video surveillance |
|
|
174 | (2) |
|
10.4.3 Systems for iris capture in videos |
|
|
176 | (1) |
|
10.4.4 Summary and perspectives |
|
|
177 | (1) |
|
|
|
177 | (1) |
|
|
|
178 | (1) |
|
|
|
179 | (4) |
|
Chapter 11 Vehicle Recognition in Video Surveillance |
|
|
183 | (18) |
|
|
|
|
|
183 | (1) |
|
11.2 Specificity of the context |
|
|
184 | (1) |
|
11.2.1 Particular objects |
|
|
184 | (1) |
|
11.2.2 Complex integrated chains |
|
|
185 | (1) |
|
|
|
185 | (4) |
|
|
|
186 | (1) |
|
11.3.2 Global textured models |
|
|
187 | (1) |
|
|
|
188 | (1) |
|
11.4 Exploitation of object models |
|
|
189 | (5) |
|
11.4.1 A conventional sequential chain with limited performance |
|
|
189 | (1) |
|
11.4.2 Improving shape extraction |
|
|
190 | (1) |
|
11.4.3 Inferring 3D information |
|
|
191 | (1) |
|
11.4.4 Recognition without form extraction |
|
|
192 | (1) |
|
11.4.5 Toward a finer description of vehicles |
|
|
193 | (1) |
|
11.5 Increasing observability |
|
|
194 | (2) |
|
|
|
194 | (1) |
|
11.5.2 Multiple observers |
|
|
195 | (1) |
|
|
|
196 | (1) |
|
|
|
196 | (1) |
|
|
|
197 | (4) |
|
Chapter 12 Activity Recognition |
|
|
201 | (18) |
|
|
|
|
|
|
|
201 | (1) |
|
|
|
202 | (4) |
|
12.2.1 Levels of abstraction |
|
|
202 | (1) |
|
12.2.2 Modeling and recognition of activities |
|
|
203 | (3) |
|
12.2.3 Overview of the state of the art |
|
|
206 | (1) |
|
|
|
206 | (4) |
|
12.3.1 Objects of interest |
|
|
207 | (1) |
|
|
|
208 | (1) |
|
|
|
209 | (1) |
|
|
|
210 | (1) |
|
12.4 Suggested approach: the ScReK system |
|
|
210 | (2) |
|
|
|
212 | (3) |
|
12.5.1 Application at an airport |
|
|
213 | (1) |
|
12.5.2 Modeling the behavior of elderly people |
|
|
213 | (2) |
|
|
|
215 | (1) |
|
|
|
215 | (4) |
|
Chapter 13 Unsupervised Methods for Activity Analysis and Detection of Abnormal Events |
|
|
219 | (16) |
|
|
|
|
|
|
|
219 | (2) |
|
13.2 An example of a topic model: PLSA |
|
|
221 | (5) |
|
|
|
221 | (1) |
|
|
|
221 | (2) |
|
13.2.3 PLSA applied to videos |
|
|
223 | (3) |
|
13.3 PLSM and temporal models |
|
|
226 | (4) |
|
|
|
226 | (2) |
|
13.3.2 Motifs extracted by PLSM |
|
|
228 | (2) |
|
13.4 Applications: counting, anomaly detection |
|
|
230 | (3) |
|
|
|
230 | (1) |
|
|
|
230 | (1) |
|
|
|
231 | (2) |
|
13.4.4 Prediction and statistics |
|
|
233 | (1) |
|
|
|
233 | (1) |
|
|
|
233 | (2) |
|
Chapter 14 Data Mining in a Video Database |
|
|
235 | (16) |
|
|
|
|
|
|
|
|
|
235 | (1) |
|
|
|
236 | (1) |
|
14.3 Pre-processing of the data |
|
|
237 | (1) |
|
14.4 Activity analysis and automatic classification |
|
|
238 | (7) |
|
14.4.1 Unsupervised learning of zones of activity |
|
|
239 | (3) |
|
14.4.2 Definition of behaviors |
|
|
242 | (1) |
|
14.4.3 Relational analysis |
|
|
243 | (2) |
|
14.5 Results and evaluations |
|
|
245 | (3) |
|
|
|
248 | (1) |
|
|
|
249 | (2) |
|
Chapter 15 Analysis of Crowded Scenes in Video |
|
|
251 | (22) |
|
|
|
|
|
|
|
|
|
251 | (2) |
|
|
|
253 | (4) |
|
15.2.1 Crowd motion modeling and segmentation |
|
|
253 | (1) |
|
15.2.2 Estimating density of people in a crowded scene |
|
|
254 | (1) |
|
15.2.3 Crowd event modeling and recognition |
|
|
255 | (1) |
|
15.2.4 Detecting and tracking in a crowded scene |
|
|
256 | (1) |
|
15.3 Data-driven crowd analysis in videos |
|
|
257 | (5) |
|
15.3.1 Off-line analysis of crowd video database |
|
|
258 | (1) |
|
|
|
258 | (2) |
|
15.3.3 Transferring learned crowd behaviors |
|
|
260 | (1) |
|
15.3.4 Experiments and results |
|
|
260 | (2) |
|
15.4 Density-aware person detection and tracking in crowds |
|
|
262 | (6) |
|
|
|
263 | (1) |
|
15.4.2 Tracking detections |
|
|
264 | (1) |
|
|
|
265 | (3) |
|
15.5 Conclusions and directions for future research |
|
|
268 | (1) |
|
|
|
268 | (1) |
|
|
|
269 | (4) |
|
Chapter 16 Detection of Visual Context |
|
|
273 | (16) |
|
|
|
|
|
|
|
273 | (2) |
|
16.2 State of the art of visual context detection |
|
|
275 | (4) |
|
|
|
275 | (1) |
|
16.2.2 Visual description |
|
|
276 | (2) |
|
16.2.3 Multiclass learning |
|
|
278 | (1) |
|
16.3 Fast shared boosting |
|
|
279 | (2) |
|
|
|
281 | (4) |
|
16.4.1 Detection of boats in the Panama Canal |
|
|
281 | (2) |
|
16.4.2 Detection of the visual context in video surveillance |
|
|
283 | (2) |
|
|
|
285 | (1) |
|
|
|
286 | (3) |
|
Chapter 17 Example of an Operational Evaluation Platform: PPSL |
|
|
289 | (8) |
|
|
|
|
|
289 | (1) |
|
17.2 Use of video surveillance: approach and findings |
|
|
290 | (2) |
|
17.3 Current use contexts and new operational concepts |
|
|
292 | (1) |
|
17.4 Requirements in smart video processing |
|
|
293 | (1) |
|
|
|
294 | (3) |
|
Chapter 18 Qualification and Evaluation of Performances |
|
|
297 | (18) |
|
|
|
|
|
|
|
|
|
297 | (1) |
|
|
|
298 | (5) |
|
|
|
298 | (1) |
|
|
|
299 | (4) |
|
18.3 An evaluation program: ETISEO |
|
|
303 | (6) |
|
|
|
303 | (2) |
|
|
|
305 | (2) |
|
|
|
307 | (2) |
|
18.4 Toward a more generic evaluation |
|
|
309 | (3) |
|
|
|
310 | (2) |
|
|
|
312 | (1) |
|
|
|
312 | (1) |
|
|
|
313 | (1) |
|
|
|
314 | (1) |
| List of Authors |
|
315 | (6) |
| Index |
|
321 | |