Making surveillance cameras more efficient

Mar 05, 2012 By Sean Nealon

A University of California, Riverside professor has recently co-authored a book about his surveillance camera research that has applications in everything from homeland security, environmental monitoring and home monitoring.

Amit K. Roy-Chowdhury, an associate professor in the Bourns College of Engineering, and Bi Song, one of Roy-Chowdhury’s former graduate students, wrote   “Camera Networks: The Acquisition and Analysis of Videos over Wide Areas.” It was published by Morgan & Claypool Publishers.

It is believed to be the first book on the topic of networks, an upcoming and increasingly important research area that builds on many concepts in image processing, systems theory, computer science, mathematics and statistics, Roy-Chowdhury said.

The book addresses issues such as constraints imposed by these different applications; visual challenges, such as tracking and recognition, illumination and clutter; positioning cameras; and processing and scene analysis algorithms.

Currently, it is common for a security person to monitor 30 screens in search of suspicious activity. Roy-Chowdhury’s research aims to make that person’s job easier by making the cameras smarter.

He is working to essentially train the cameras to recognize suspicious things. Once a suspicious object is identified, the security person will be cued to the cameras that focus on that object.

In addition, the cameras will be optimized so that object, say a person with a gun, can be tracked as they move. Also, the camera could be designed so it could zoom in on that person’s face so facial recognition software could be used to determine identity.

“The prevailing feeling is that the more cameras you have the more secure you are,” Roy-Chowdhury said. “That’s wrong. The real issue is how the feeds from those cameras are being monitored.”

Explore further: Greater safety and security at Europe's train stations

Provided by University of California, Riverside

not rated yet
add to favorites email to friend print save as pdf

Related Stories

New tool enhances view of muscles

Jan 23, 2012

Simon Fraser University associate professor James Wakeling is adding to the arsenal of increasingly sophisticated medical imaging tools with a new signal-processing method for viewing muscle activation details that have never ...

Chicago as urban microcosm

Feb 15, 2012

Quaint Boston can’t match Chicago’s bustle and sprawl, but the two cities are more alike than not in fundamental respects.  In fact, they’re surprisingly similar to Los Angeles, New ...

Recommended for you

Greater safety and security at Europe's train stations

13 hours ago

When a suspicious individual fleas on a bus or by train, then things usually get tough for the police. This is because the security systems of the various transportation companies and security services are ...

Fingerprints for freight items

13 hours ago

Security is a top priority in air freight logistics but screening procedures can be very time consuming and costly. Fraunhofer researchers intend to boost efficiency with a new approach to digital logistics, ...

On the way to a safe and secure smart home

14 hours ago

A growing number of household operations can be managed via the Internet. Today's "Smart Home" promises efficient building management. But often the systems are not secure and can only be retrofitted at great ...

DIY glove-based tutor indicates muscle-memory potential

Aug 31, 2014

A senior editor at IEEE Spectrum worked on a DIY project that enabled his 11-year-old son to improve his touch typing by use of a vibrating glove. His son was already "pretty quick on the keyboard," said ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

kevinrtrs
2.5 / 5 (2) Mar 05, 2012
About time that someone did this. All the tools are already available and just need to be put together in a coherent way to deliver the intelligence required to beef up security. Of course there's always the human element involved that no amount of technology will be able to overcome - the collusion between two or more human control points in a secure system.