Knowledge

Artificial intelligence for video surveillance

Source 📝

191:
discern significant events. With two monitors this is cut in half again. Given that many facilities have dozens or even hundreds of cameras, the task is clearly beyond human ability. In general, the camera views of empty hallways, storage facilities, parking lots or structures are exceedingly boring and thus attention quickly diminishes. When multiple cameras are monitored, typically employing a wall monitor or bank of monitors with split screen views and rotating every several seconds between one set of cameras and the next, the visual tedium is quickly overwhelming. While video surveillance cameras proliferated with great adoption by users ranging from car dealerships and shopping plazas to schools and businesses to highly secured facilities such as nuclear plants, it was recognized in hindsight that video surveillance by human officers (also called "operators") was impractical and ineffective. Extensive video surveillance systems were relegated to merely recording for possible forensic use to identify someone, after the fact of a theft, arson, attack or incident. Where wide angle camera views were employed, particularly for large outdoor areas, severe limitations were discovered even for this purpose due to insufficient resolution. In these cases it is impossible to identify the trespasser or perpetrator because their image is too tiny on the monitor.
371:
shopper heat-mapping of display areas (meaning how many people are in a certain area in retail space), and attendance at classes are developing uses. Humans are not as well qualified as A.I. to compile and recognize patterns consisting of very large data sets requiring simultaneous calculations in multiple remote viewed locations. There is nothing natively human about such awareness. Such multitasking has been shown to defocus human attention and performance. A.I.s have the ability to handle such data. For the purposes of security interacting with video cameras they functionally have better visual acuity than humans or the machine approximation to it. For judging subtleties of behaviors or intentions of subjects or degrees of threat, humans remain far superior at the present state of the technology. So the A.I. in security functions to broadly scan beyond human capability and to vet the data to a first level of sorting of relevance and to alert the human officer who then takes over the function of assessment and response.
323:
but with continued learning a public bus would be discriminated from a small truck and that from a motorcycle. With increasing sophistication, the system recognizes patterns in human behavior. For example, it might observe that individuals pass through a controlled access door one at a time. The door opens, the person presents their proximity card or tag, the person passes through and the door closes. This pattern of activity, observed repeatedly, forms a basis for what is normal in the view of the camera observing that scene. Now if an authorized person opens the door but a second "tail-gating" unauthorized person grabs the door before it closes and passes through, that is the sort of anomaly that would create an alert. This type of analysis is much more complex than the rule-based analytics. While the rule-based analytics work mainly to detect intruders into areas where no one is normally present at defined times of day, the behavioral analytics works where people are active to detect things that are out of the ordinary.
259:
ones further challenge the camera to actually be adequate to see a moving human intruder. At night, even in illuminated outdoor areas, a moving subject does not gather enough light per frame per second and so, unless quite close to the camera, will appear as a thin wisp or barely discernible ghost or completely invisible. Conditions of glare, partial obscuration, rain, snow, fog, and darkness all compound the problem. Even when a human is directed to look at the actual location on a monitor of a subject in these conditions, the subject will usually not be detected. The A.I. is able to impartially look at the entire image and all cameras' images simultaneously. Using statistical models of degrees of deviation from its learned pattern of what constitutes the human form it will detect an intruder with high reliability and a low false alert rate even in adverse conditions. Its learning is based on approximately a quarter million images of humans in various positions, angles, postures, and so forth.
150:, or mathematical procedures, which work like a flow-chart or series of questions to compare the object seen with hundreds of thousands of stored reference images of humans in different postures, angles, positions and movements. The A.I. asks itself if the observed object moves like the reference images, whether it is approximately the same size height relative to width, if it has the characteristic two arms and two legs, if it moves with similar speed, and if it is vertical instead of horizontal. Many other questions are possible, such as the degree to which the object is reflective, the degree to which it is steady or vibrating, and the smoothness with which it moves. Combining all of the values from the various questions, an overall ranking is derived which gives the A.I. the probability that the object is or is not a human. If the value exceeds a limit that is set, then the alert is sent. It is characteristic of such programs that they are 349:
many things that appear anomalous but are innocent in nature. For example, if students at a campus walk on a plaza, that will be learned as normal. If a couple of students decided to carry a large sheet outdoors flapping in the wind, that might indeed trigger an alert. The monitoring officer would be alerted to look at his or her monitor and would see that the event is not a threat and would then ignore it. The degree of deviation from norm that triggers an alert can be set so that only the most abnormal things are reported. However, this still constitutes a new way of human and A.I. interaction not typified by the traditional alarm industry mindset. This is because there will be many false alarms that may nevertheless be valuable to send to a human officer who can quickly look and determine if the scene requires a response. In this sense, it is a "tap on the shoulder" from the A.I. to have the human look at something.
177:, the A.I. learns what is normal behaviour for people, vehicles, machines, and the environment based on its own observation of patterns of various characteristics such as size, speed, reflectivity, color, grouping, vertical or horizontal orientation and so forth. The A.I. normalises the visual data, meaning that it classifies and tags the objects and patterns it observes, building up continuously refined definitions of what is normal or average behaviour for the various observed objects. After several weeks of learning in this fashion it can recognise when things break the pattern. When it observes such anomalies it sends an alert. For example, it is normal for cars to drive in the street. A car seen driving up onto a sidewalk would be an anomaly. If a fenced yard is normally empty at night, then a person entering that area would be an anomaly. 47: 244: 292:. In fact the security industry reports that over 98% of such alarms are false ones. Accordingly, the police give very low priority response to burglar alarms and can take from twenty minutes to two hours to respond to the site. By contrast, the video analytic-detected crime is reported to the central monitoring officer, who verifies with his or her own eyes that it is a real crime in progress. He or she then dispatches to the police who give such calls their highest priority. 280:
intruder becomes so pronounced when a live person is talking to them that they are very likely to desist from intrusion and to retreat. The security officer would describe the actions of the intruder so that the intruder had no doubt that a real person was watching them. The officer would announce that the intruder was breaking the law and that law enforcement was being contacted and that they were being video-recorded.
166:" because a human programmer must set rules for all of the things for which the user wishes to be alerted. This is the most prevalent form of A.I. for security. Many video surveillance camera systems today include this type of A.I. capability. The hard-drive that houses the program can either be located in the cameras themselves or can be in a separate device that receives the input from the cameras. 327:
vehicles driving the correct one-way in the lane. Someone thrown to the ground by an attacker would be an unusual event that would likely cause an alert. This is situation-specific. So if the camera viewed a gymnasium where wrestling was practiced the A.I. would learn it is usual for one human to throw another to the ground, in which case it would not alert on this observation.
31: 235:. When the object of interest, for example a human, violates a preset rule, for example that the number of people shall not exceed zero in a pre-defined area during a defined time interval, then an alert is sent. A red rectangle or so-called "bounding box" will typically automatically follow the detected intruder, and a short video clip of this is sent as the alert. 345:
miss some true positives but are plagued with overwhelming false alarms in an outdoor environment. Rule-based analytics reliably detect most true positives and have a low rate of false positives but cannot perform in active environments, only in empty ones. Also they are limited to the simple discrimination of whether an intruder is present or not.
209:
image on screen. The motion of leaves on trees blowing in the wind, litter along the ground, insects, birds, dogs, shadows, headlights, sunbeams and so forth all comprise motion. This caused hundreds or even thousands of false alerts per day, rendering this solution inoperable except in indoor environments during times of non-operating hours.
310:, traditional rule-based analytics are perfectly appropriate. In the example of a cell tower the rare time that a service technician may need to access the area would simply require calling in with a pass-code to put the monitoring response "on test" or inactivated for the brief time the authorized person was there. 383:
factory or of a refrigerated tractor-trailer would result in a long replacement time during which customers could not be served, resulting in loss of their business. A violent crime will have extensive public relations damage for an employer, beyond the direct liability for failing to protect the employee.
336:
behavior. For example, humans walk on sidewalks and sometimes on streets but they don't climb up the sides of buildings very often. Vehicles drive on streets but don't drive on sidewalks. Thus the anomalous behavior of someone scaling a building or a vehicle veering onto a sidewalk would trigger an alert.
344:
Typical alarm systems are designed to not miss true positives (real crime events) and to have as low of a false alarm rate as possible. In that regard, burglar alarms miss very few true positives but have a very high false alarm rate even in the controlled indoor environment. Motion detecting cameras
305:
While rule-based video analytics worked economically and reliably for many security applications there are many situations in which it cannot work. For an indoor or outdoor area where no one belongs during certain times of day, for example overnight, or for areas where no one belongs at any time such
217:
The next evolution reduced false alerts to a degree but at the cost of complicated and time-consuming manual calibration. Here, changes of a target such as a person or vehicle relative to a fixed background are detected. Where the background changes seasonally or due to other changes, the reliability
126:
in order to recognize humans, vehicles, objects, attributes, and events. Security contractors program the software to define restricted areas within the camera's view (such as a fenced off area, a parking lot but not the sidewalk or public street outside the lot) and program for times of day (such as
382:
Another reason that future security threats or losses are under-assessed is that often only the direct cost of a potential loss is considered instead of the spectrum of consequential losses that are concomitantly experienced. For example, the vandalism-destruction of a custom production machine in a
374:
Security in the practical world is economically determined so that the expenditure of preventative security will never typically exceed the perceived cost of the risk to be avoided. Studies have shown that companies typically only spend about one twenty-fifth the amount on security that their actual
322:
Using behavioral analytics, a self-learning, non-rule-based A.I. takes the data from video cameras and continuously classifies objects and events that it sees. For example, a person crossing a street is one classification. A group of people is another classification. A vehicle is one classification,
190:
Limitations in the ability of humans to vigilantly monitor video surveillance live footage led to the demand for artificial intelligence that could better serve the task. Humans watching a single video monitor for more than twenty minutes lose 95% of their ability to maintain attention sufficient to
386:
Behavioral analytics uniquely functions beyond simple security and, due to its ability to observe breaches in standard patterns of protocols, it can effectively find unsafe acts of employees that may result in workers comp or public liability incidents. Here too, the assessment of future incidents'
279:
One of the most powerful features of the system is that a human officer or operator, receiving an alert from the A.I., could immediately talk down over outdoor public address loudspeakers to the intruder. This had high deterrence value as most crimes are opportunistic and the risk of capture to the
326:
A fire breaking out outdoors would be an unusual event and would cause an alert, as would a rising cloud of smoke. Vehicles driving the wrong way into a one-way driveway would also typify the type of event that has a strong visual signature and would deviate from the repeatedly observed pattern of
262:
A one megapixel camera with the onboard video analytics was able to detect a human at a distance of about 350' and an angle of view of about 30 degrees in non-ideal conditions. Rules could be set for a "virtual fence" or intrusion into a pre-defined area. Rules could be set for directional travel,
258:
The detection of intruders using video surveillance has limitations based on economics and the nature of video cameras. Typically, cameras outdoors are set to a wide angle view and yet look out over a long distance. Frame rate per second and dynamic range to handle brightly lit areas and dimly lit
370:
The utility of artificial intelligence for security does not exist in a vacuum, and its development was not driven by purely academic or scientific study. Rather, it is addressed to real-world needs, and hence, economic forces. Its use for non-security applications such as operational efficiency,
348:
Something as complex or subtle as a fight breaking out or an employee breaking a safety procedure is not possible for a rule based analytics to detect or discriminate. With behavioral analytics, it is. Places where people are moving and working do not present a problem. However, the A.I. may spot
313:
But there are many security needs in active environments in which hundreds or thousands of people belong all over the place all the time. For example, a college campus, an active factory, a hospital or any active operating facility. It is not possible to set rules that would discriminate between
208:
to cameras. It was reasoned that an intruder's or perpetrator's motion would send an alert to the remote monitoring officer obviating the need for constant human vigilance. The problem was that in an outdoor environment there is constant motion or changes of pixels that comprise the total viewed
361:
to conserve computational demand. The 1 CIF resolution means that an object the size of a human will not be detected if the camera utilized is wide angle and the human is more than sixty to eighty feet distant depending on conditions. Larger objects like vehicles or smoke would be detectable at
158:
In addition to the simple rule restricting humans or vehicles from certain areas at certain times of day, more complex rules can be set. The user of the system may wish to know if vehicles drive in one direction but not the other. Users may wish to know that there are more than a certain preset
391:
showed that the cost to employers is about six times the direct insured cost, since uninsured costs of consequential damages include temporary replacement workers, hiring costs for replacements, training costs, managers' time in reports or court, adverse morale on other workers, and effect on
335:
The A.I. does not know or understand what a human is, or a fire, or a vehicle. It is simply finding characteristics of these things based on their size, shape, color, reflectivity, angle, orientation, motion, and so on. It then finds that the objects it has classified have typical patterns of
230:
relates to patterns and their classification. True video analytics can distinguish the human form, vehicles and boats or selected objects from the general movement of all other objects and visual static or changes in pixels on the monitor. It does this by
379:, or the ease with which unpleasant things like risk can be shunted from the conscious mind. Nevertheless, security is a major expenditure, and comparison of the costs of different means of security is always foremost amongst security professionals. 159:
number of people within a particular area. The A.I. is capable of maintaining surveillance of hundreds of cameras simultaneously. Its ability to spot a trespasser in the distance or in rain or glare is superior to humans' ability to do so.
154:
to a degree, learning, for example that humans or vehicles appear bigger in certain portions of the monitored image – those areas near the camera – than in other portions, those being the areas farthest from the camera.
676: 706: 628: 701: 76: 933: 666: 392:
customer and public relations. The potential of A.I. in the form of behavioral analytics to proactively intercept and prevent such incidents is significant.
661: 375:
losses cost them. What by pure economic theory should be an equivalence or homeostasis, thus falls vastly short of it. One theory that explains this is
696: 1042: 764: 218:
deteriorates over time. The economics of responding to too many false alerts again proved to be an obstacle and this solution was not sufficient.
173:" has been developed. This software is fully self-learning with no initial programming input by the user or security contractor. In this type of 781: 801: 711: 681: 671: 651: 621: 866: 691: 721: 98: 871: 856: 614: 357:
Because so many complex things are being processed continuously, the software samples down to the very low resolution of only
461:
The Appropriate and Effective Use of Security Technologies in U.S. Schools, A Guide for Schools and Law Enforcement Agencies
965: 896: 747: 204:
In response to the shortcomings of human guards to watch surveillance monitors long-term, the first solution was to add
1037: 716: 861: 358: 268: 913: 826: 59: 1017: 891: 69: 63: 55: 576:, Security Sales & Integration magazine (August 11, 2012) Security Sales & Integration, Framingham MA 953: 943: 686: 264: 243: 132: 17: 990: 958: 737: 416: 80: 995: 806: 752: 435: 151: 546: 918: 901: 881: 851: 401: 376: 247: 170: 139:
a trespasser breaking the "rule" set that no person is allowed in that area during that time of day.
123: 519: 923: 786: 232: 938: 846: 831: 791: 227: 876: 821: 773: 163: 119: 115: 985: 948: 796: 656: 492:
Visual sustained attention: Image degradation produces rapid sensitivity decrement over time
136: 506:
The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World
980: 928: 637: 491: 205: 475: 1005: 975: 886: 811: 742: 406: 388: 289: 143: 34: 1031: 970: 908: 128: 460: 816: 480:, ICPR 2008. 19th International Conference on, vol., no., pp.1,3, 8-11 Dec. 2008 520:
Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities
587:
The Impact of Crime on Business: A Model of Prevention, Detection & Remedy
307: 174: 147: 127:
after the close of business) for the property being protected by the camera
30: 411: 606: 242: 29: 610: 263:
object left behind, crowd formation and some other conditions.
489:
Nuechterlein, K.H., Parasuraman, R., & Jiang, Q. (1983).
40: 288:
The police receive a tremendous number of false alarms from
169:
A newer, non-rule based form of A.I. for security called "
563:, SDM Magazine (Sept 2015) BNP Media II, Troy Michigan 476:
How effective is human video surveillance performance?
436:"Video Analytics - an overview | ScienceDirect Topics" 589:, Journal of Management and Marketing Research (2009) 267:
for video surveillance is widely used in China. See
27:
Overview of artificial intelligence for surveillance
772: 763: 730: 644: 473:Sulman, N.; Sanocki, T.; Goldgof, D.; Kasturi, R., 340:
Varies from traditional mindset of security systems
314:legitimate people and criminals or wrong-doers. 68:but its sources remain unclear because it lacks 331:What the artificial intelligence 'understands' 112:Artificial intelligence for video surveillance 622: 387:costs falls short of the reality. A study by 318:Overcoming the problem of active environments 8: 561:Finding & Selling The Value of Analytics 162:This type of A.I. for security is known as " 18:Artificially intelligent video surveillance 769: 629: 615: 607: 601:, Liberty Mutual Insurance Company (2002) 548:What is Video Analytics, Simply Explained 99:Learn how and when to remove this message 427: 366:Quantification of situational awareness 782:3D reconstruction from multiple images 534:Intelligent Video Surveillance Systems 802:Simultaneous localization and mapping 7: 142:The A.I. program functions by using 353:Limitations of behavioral analytics 867:Automatic number-plate recognition 25: 872:Automated species identification 574:The Evolution of Video Analytics 508:, September 22, 2015 Basic Books 389:Liberty Mutual Insurance Company 146:. Machine vision is a series of 45: 1043:Applications of computer vision 857:Audio-visual speech recognition 213:Advanced video motion detection 702:Recognition and categorization 464:, Sandia National Laboratories 222:Advent of true video analytics 135:("A.I.") sends an alert if it 1: 966:Optical character recognition 897:Content-based image retrieval 536:, John Wiley Publisher (2012) 523:Academic Press, Waltham Mass. 254:Real-time preventative action 195:Earlier attempts at solution 1059: 862:Automatic image annotation 697:Noise reduction techniques 330: 269:Mass surveillance in China 124:video surveillance cameras 1014: 827:Free viewpoint television 892:Computer-aided diagnosis 200:Motion detection cameras 186:Statement of the problem 54:This article includes a 954:Moving object detection 944:Medical image computing 707:Research infrastructure 677:Image sensor technology 495:. Science, 220, 327-329 265:Artificial intelligence 133:artificial intelligence 83:more precise citations. 991:Video content analysis 959:Small object detection 738:Computer stereo vision 458:Green, Mary W. (1999) 417:Video content analysis 284:Verified breach report 250: 38: 996:Video motion analysis 807:Structure from motion 753:3D object recognition 585:Bressler, Martin S., 517:Davies, E. R. (2012) 478:, Pattern Recognition 440:www.sciencedirect.com 296:Behavioural analytics 246: 239:Practical application 33: 919:Foreground detection 902:Reverse image search 882:Bioimage informatics 852:Activity recognition 545:Hantman, Ken (2014) 402:Activity recognition 377:cognitive dissonance 248:Pedestrian detection 233:recognizing patterns 226:Machine learning of 171:behavioral analytics 986:Autonomous vehicles 924:Gesture recognition 787:2D to 3D conversion 599:Safety Index Report 532:Dufour, Jean-Yves, 362:greater distances. 301:Active environments 1038:Video surveillance 1001:Video surveillance 939:Landmark detection 847:3D pose estimation 832:Volumetric capture 792:Gaussian splatting 748:Object recognition 662:Commercial systems 251: 228:visual recognition 56:list of references 39: 1025: 1024: 934:Image restoration 877:Augmented reality 842: 841: 822:4D reconstruction 774:3D reconstruction 667:Feature detection 120:analyze the audio 116:computer software 109: 108: 101: 16:(Redirected from 1050: 949:Object detection 914:Face recognition 797:Shape from focus 770: 657:Digital geometry 631: 624: 617: 608: 602: 596: 590: 583: 577: 570: 564: 557: 551: 543: 537: 530: 524: 515: 509: 504:Pedro Domingos, 502: 496: 487: 481: 471: 465: 456: 450: 449: 447: 446: 432: 206:motion detectors 122:and images from 104: 97: 93: 90: 84: 79:this article by 70:inline citations 49: 48: 41: 21: 1058: 1057: 1053: 1052: 1051: 1049: 1048: 1047: 1028: 1027: 1026: 1021: 1010: 981:Robotic mapping 929:Image denoising 838: 759: 726: 692:Motion analysis 640: 638:Computer vision 635: 605: 597: 593: 584: 580: 571: 567: 558: 554: 544: 540: 531: 527: 516: 512: 503: 499: 488: 484: 472: 468: 457: 453: 444: 442: 434: 433: 429: 425: 398: 368: 355: 342: 333: 320: 303: 298: 286: 277: 256: 241: 224: 215: 202: 197: 188: 183: 105: 94: 88: 85: 74: 60:related reading 50: 46: 37:in a photograph 28: 23: 22: 15: 12: 11: 5: 1056: 1054: 1046: 1045: 1040: 1030: 1029: 1023: 1022: 1015: 1012: 1011: 1009: 1008: 1006:Video tracking 1003: 998: 993: 988: 983: 978: 976:Remote sensing 973: 968: 963: 962: 961: 956: 946: 941: 936: 931: 926: 921: 916: 911: 906: 905: 904: 894: 889: 887:Blob detection 884: 879: 874: 869: 864: 859: 854: 849: 843: 840: 839: 837: 836: 835: 834: 829: 819: 814: 812:View synthesis 809: 804: 799: 794: 789: 784: 778: 776: 767: 761: 760: 758: 757: 756: 755: 745: 743:Motion capture 740: 734: 732: 728: 727: 725: 724: 719: 714: 709: 704: 699: 694: 689: 684: 679: 674: 669: 664: 659: 654: 648: 646: 642: 641: 636: 634: 633: 626: 619: 611: 604: 603: 591: 578: 572:Gruber, Illy, 565: 552: 538: 525: 510: 497: 482: 466: 451: 426: 424: 421: 420: 419: 414: 409: 407:Crowd analysis 404: 397: 394: 367: 364: 354: 351: 341: 338: 332: 329: 319: 316: 302: 299: 297: 294: 290:burglar alarms 285: 282: 276: 273: 255: 252: 240: 237: 223: 220: 214: 211: 201: 198: 196: 193: 187: 184: 182: 179: 144:machine vision 118:programs that 107: 106: 64:external links 53: 51: 44: 35:Face detection 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1055: 1044: 1041: 1039: 1036: 1035: 1033: 1020: 1019: 1018:Main category 1013: 1007: 1004: 1002: 999: 997: 994: 992: 989: 987: 984: 982: 979: 977: 974: 972: 971:Pose tracking 969: 967: 964: 960: 957: 955: 952: 951: 950: 947: 945: 942: 940: 937: 935: 932: 930: 927: 925: 922: 920: 917: 915: 912: 910: 907: 903: 900: 899: 898: 895: 893: 890: 888: 885: 883: 880: 878: 875: 873: 870: 868: 865: 863: 860: 858: 855: 853: 850: 848: 845: 844: 833: 830: 828: 825: 824: 823: 820: 818: 815: 813: 810: 808: 805: 803: 800: 798: 795: 793: 790: 788: 785: 783: 780: 779: 777: 775: 771: 768: 766: 762: 754: 751: 750: 749: 746: 744: 741: 739: 736: 735: 733: 729: 723: 720: 718: 715: 713: 710: 708: 705: 703: 700: 698: 695: 693: 690: 688: 685: 683: 680: 678: 675: 673: 670: 668: 665: 663: 660: 658: 655: 653: 650: 649: 647: 643: 639: 632: 627: 625: 620: 618: 613: 612: 609: 600: 595: 592: 588: 582: 579: 575: 569: 566: 562: 559:Rice, Derek, 556: 553: 550: 549: 542: 539: 535: 529: 526: 522: 521: 514: 511: 507: 501: 498: 494: 493: 486: 483: 479: 477: 470: 467: 463: 462: 455: 452: 441: 437: 431: 428: 422: 418: 415: 413: 410: 408: 405: 403: 400: 399: 395: 393: 390: 384: 380: 378: 372: 365: 363: 360: 352: 350: 346: 339: 337: 328: 324: 317: 315: 311: 309: 300: 295: 293: 291: 283: 281: 274: 272: 270: 266: 260: 253: 249: 245: 238: 236: 234: 229: 221: 219: 212: 210: 207: 199: 194: 192: 185: 180: 178: 176: 172: 167: 165: 160: 156: 153: 152:self-learning 149: 145: 140: 138: 134: 130: 125: 121: 117: 113: 103: 100: 92: 82: 78: 72: 71: 65: 61: 57: 52: 43: 42: 36: 32: 19: 1016: 1000: 909:Eye tracking 765:Applications 731:Technologies 717:Segmentation 598: 594: 586: 581: 573: 568: 560: 555: 547: 541: 533: 528: 518: 513: 505: 500: 490: 485: 474: 469: 459: 454: 443:. Retrieved 439: 430: 385: 381: 373: 369: 356: 347: 343: 334: 325: 321: 312: 304: 287: 278: 261: 257: 225: 216: 203: 189: 168: 161: 157: 141: 129:surveillance 111: 110: 95: 86: 75:Please help 67: 817:Visual hull 712:Researchers 81:introducing 1032:Categories 687:Morphology 645:Categories 445:2020-11-01 423:References 308:cell tower 164:rule-based 148:algorithms 275:Talk-down 175:analytics 114:utilizes 722:Software 682:Learning 672:Geometry 652:Datasets 396:See also 89:May 2023 181:History 137:detects 77:improve 412:INDECT 131:. The 359:1 CIF 306:as a 62:, or 1034:: 438:. 271:. 66:, 58:, 630:e 623:t 616:v 448:. 102:) 96:( 91:) 87:( 73:. 20:)

Index

Artificially intelligent video surveillance

Face detection
list of references
related reading
external links
inline citations
improve
introducing
Learn how and when to remove this message
computer software
analyze the audio
video surveillance cameras
surveillance
artificial intelligence
detects
machine vision
algorithms
self-learning
rule-based
behavioral analytics
analytics
motion detectors
visual recognition
recognizing patterns

Pedestrian detection
Artificial intelligence
Mass surveillance in China
burglar alarms

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.