scholarly journals Interesting Video Frames Capturing on Digital Video Development Platform

Author(s):  
D. Nethaji ◽  
Mary Joans ◽  
Mrs. S. J. Grace Shoba

Video surveillance has been a popular security tool for years. Video surveillance systems produce huge amounts of data for storage and display. Long-term human monitoring of the acquired video is impractical and in-effective. This paper presents a novel solution for real-time cases that identify and record only “interesting” video frames containing motion. In addition to traditional methods for compressing individual video images, we could identify and record only “interesting” video images, such as those images with significant amounts of motion in the field of view. The model would be built in simulink, one of tools in matlab and incorporated with davinci code processor, a video processor. That could significantly help reduce the data rates for surveillance-specific applications.

Author(s):  
A A Morozov ◽  
O S Sushkova ◽  
I A Kershner ◽  
A F Polupanov

The terahertz video surveillance opens up new unique opportunities in the field of security in public places, as it allows to detect and thus to prevent usage of hidden weapons and other dangerous items. Although the first generation of terahertz video surveillance systems has already been created and is available on the security systems market, it has not yet found wide application. The main reason for this is in that the existing methods for analyzing terahertz images are not capable of providing hidden and fully-automatic recognition of weapons and other dangerous objects and can only be used under the control of a specially trained operator. As a result, the terahertz video surveillance appears to be more expensive and less efficient in comparison with the standard approach based on the organizing security perimeters and manual inspection of the visitors. In the paper, the problem of the development of a method of automatic analysis of the terahertz video images is considered. As a basis for this method, it is proposed to use the semantic fusion of video images obtained using different physical principles, the idea of which is in that the semantic content of one video image is used to control the processing and analysis of another video image. For example, the information about 3D coordinates of the body, arms, and legs of a person can be used for analysis and proper interpretation of color areas observed on a terahertz video image. Special means of the object-oriented logic programming are developed for the implementation of the semantic fusion of the video data, including special built-in classes of the Actor Prolog logic language for acquisition, processing, and analysis of video data in the visible, infrared, and terahertz ranges as well as 3D video data.


2017 ◽  
Vol 01 (01) ◽  
pp. 1630007
Author(s):  
Fabio Persia ◽  
Daniela D’Auria

Security has been raised at major public buildings in the most famous and crowded cities all over the world following the terrorist attacks of the last years, the latest one at the Promenade des Anglais in Nice. For that reason, video surveillance systems have become more and more essential for detecting and hopefully even prevent dangerous events in public areas. In this work, we present an overview of the evolution of high-level surveillance event detection systems along with a prototype for anomaly detection in video surveillance context. The whole process is described, starting from the video frames captured by sensors/cameras till at the end some well-known reasoning algorithms for finding potentially dangerous activities are applied.


The problem of authenticating the video content is the major role of any automated video surveillance systems (AVS). This research work delivers an approach to authenticate the surveillance video which can be used by attorneys to prove their clients using Digital Watermarking. The digital watermark gives an assurance that the provided video surveillance frame is not tampered. In this paper, we proposed a robust video watermarking approach for an authentication of video surveillance applications. The digital watermark is embedded into the Discrete Wavelet domain of the identified key frames using holoentropy. Here, the pixel map will be optimallygenerated for the watermarking and the image embedding using the proposed classifier using Moth – flame - Rider optimization based Neural Network (MF-ROA-based NN) will generate the optimal map prediction based on the fitness measure, such as wavelet coefficient, energy, entropy, loop coefficient, and standard deviation, respectively. This optimal map is used for both embedding and extraction. The experimental results proves that the proposed systems can authenticate the surveillance video frames against various attacks when compared to the existing systems.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4419
Author(s):  
Hao Li ◽  
Tianhao Xiezhang ◽  
Cheng Yang ◽  
Lianbing Deng ◽  
Peng Yi

In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention. At present, many researchers focus on how to select the region of interest (RoI) accurately and then realize privacy protection in videos by selective encryption. However, relatively few researchers focus on building a security framework by analyzing the security of a video surveillance system from the system and data life cycle. By analyzing the surveillance video protection and the attack surface of a video surveillance system in a smart city, we constructed a secure surveillance framework in this manuscript. In the secure framework, a secure video surveillance model is proposed, and a secure authentication protocol that can resist man-in-the-middle attacks (MITM) and replay attacks is implemented. For the management of the video encryption key, we introduced the Chinese remainder theorem (CRT) on the basis of group key management to provide an efficient and secure key update. In addition, we built a decryption suite based on transparent encryption to ensure the security of the decryption environment. The security analysis proved that our system can guarantee the forward and backward security of the key update. In the experiment environment, the average decryption speed of our system can reach 91.47 Mb/s, which can meet the real-time requirement of practical applications.


Sign in / Sign up

Export Citation Format

Share Document