Journal article Open Access

The Future of Video Analytics for Surveillance and Its Ethical Implications

Adams, A. A.; Ferryman, J. M.


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.812016</identifier>
  <creators>
    <creator>
      <creatorName>Adams, A. A.</creatorName>
      <givenName>A. A.</givenName>
      <familyName>Adams</familyName>
      <affiliation>Meiji University (明治大学)</affiliation>
    </creator>
    <creator>
      <creatorName>Ferryman, J. M.</creatorName>
      <givenName>J. M.</givenName>
      <familyName>Ferryman</familyName>
      <affiliation>University of Reading</affiliation>
    </creator>
  </creators>
  <titles>
    <title>The Future of Video Analytics for Surveillance and Its Ethical Implications</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2017</publicationYear>
  <subjects>
    <subject>Surveillance</subject>
    <subject>CCTV</subject>
    <subject>Video Analytics</subject>
    <subject>Ethics</subject>
    <subject>Regulation</subject>
    <subject>Facial Recognition</subject>
    <subject>Computer Vision</subject>
    <subject>Cognitive Vision</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2017-06-19</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Journal article</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/812016</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.812015</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/opendepot</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="http://creativecommons.org/licenses/by-nc/2.0/">Creative Commons Non-Commercial (Any)</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">The current state of the art and direction of research in computer vision aimed at automating the analysis of CCTV images is presented. This includes low level identification of objects within the field of view of cameras, following those objects over time and between cameras, and the interpretation of those objects' appearance and movements with respect to models of behaviour (and therefore intentions inferred). The potential ethical problems (and some potential opportunities) such developments may pose if and when deployed in the real world are presented, and suggestions made as to the necessary new regulations which will be needed if such systems are not to further enhance the power of the surveillers against the surveilled. This record was migrated from the OpenDepot repository service in June, 2017 before shutting down.</description>
    <description descriptionType="Other">{"references": ["Adams, A. A. 2007. Regulating CCTV. Pages 3\u201314 of: Ethicomp 2007: Proceedings of the Ninth International Conference. Tokyo: Meiji University. \nAdams, A. A., Murata, K., &amp; Orito, Y. 2010. The Development of Japanese Data Protection. Policy and Internet, 2(2), 95\u2013126. Article 5. \nAdams, A. A., Murata, K., &amp; Orito, Y. 2012. Tender Electronic Eyes: Case Studies on CCTV Deployment in Japan. In Preparation. \nAnnesley, J., Colombo, A., Orwell, J. and Velastin, S. A. 2007. A Profile of MPEG-7 for Visual Surveillance. In Proceedings Fourth IEEE Advanced Video and Signal-Based Surveillance (AVSS), 482-487.\nBBC. 2003 (February). Pensioner Freed After FBI Bungle. news.bbc.co.uk/2/hi/uk_news/england/2799791.stm \nBBC. 2006 (January). Peeping Tom CCTV Workers Jailed. news.bbc.co.uk/2/hi/uk_news/england/merseyside/4609746.stm \nBBC. 2012 (October 3). High-Def CCTV Cameras Risk Backlash, Warns UK Watchdog.  www.bbc.co.uk/news/technology-19812385\nBazzani, L., Cristani, M., Perina, M. &amp; Murino, V. 2012. Multiple-Shot Person Re-Identification by Chromatic and Epitomic Analyses. In Pattern Recognition Letters, 33(7), 898-903.\nBen Shitrit, H., Berclaz, J., Fleuret, F. &amp; Fua, P. 2011. Tracking Multiple People under Global Appearance Constraints,\u00a0Computer Vision (ICCV), 2011 IEEE International Conference on, pp.137-144.\nBerger, A, M. 2000. Privacy Mode for Acquisition Cameras and Camcorders. U.S. Patent 6,067,399, Sony Corporation, 23 May 2000.\nBrin, D. 1998. The Transparent Society. Jackson, TN: Perseus. \nCezar, J., Jacques, S., &amp; Musse, S. R. 2010. Crowd Analysis Using Computer Vision Techniques. IEEE Signal Processing Magazine, 27(September), 66\u201377. \nCoetzer, B., Merwe, J. van der, &amp; Josephs, B. 2011. Information Management and Video Analytics: the Future of Intelligent Video Surveillance. InTech. http://tinyurl.com/78flxuy \nCoudert, F., Gemo, M., Beslay, L., &amp; Andritsos, F. (2011). Pervasive Monitoring: Appreciating Citizen's Surveillance as Digital Evidence in Legal Proceedings. In Imaging for Crime Detection and Prevention 2011 (ICDP 2011), 4th International Conference on (pp. 1-6).\nDee, H., &amp; Hogg, D. 2004. Detecting Inexplicable Behaviour. Pages 477\u2013486 of: Proceedings of the British Machine Vision Conference, The British Machine Vision Association. \nDee, H., &amp; Hogg, D. 2006. Navigational Strategies and Surveillance. Pages 73\u201381 of: Proceedings of the IEEE International Workshop on Visual Surveillance (ECCV-VS). IEEE Computer Society Press. \nDee, H. M. &amp; Velastin, S. A. 2008. How Close Are We To Solving the Problem of Automated Visual Surveillance?  A Review of Real-World Surveillance, Scientific Progress and Evaluative Mechanisms. Machine Vision and Applications, 19(5-6), 329-343.\nDick, A. R., &amp; Brooks, M. J. 2003. Issues in Automated Visual Surveillance. In: Sun et al. (2003). \nDoll\u00e1r, P., Wojek, C., Schiele, B. &amp; Perona, P. 2012. Pedestrian Detection: An Evaluation of the State of the Art, In Pattern Analysis and Machine Intelligence (PAMI), 34(4), 743-761.\nDonald, C.  2005.  How Many Monitors Should a CCTV Operator View? In CCTV Image. STL Publishing, London, England, pp. 355.\nDufaux, F. &amp; Ebrahimi, T. 2008. Scrambling for Privacy Protection in Video Surveillance Systems. In IEEE Transactions on Circuits and Systems for Video Technology, 18(8), 1168-1174.\nEvans, M., Boyle J. N. &amp; Ferryman, J. 2012, Vehicle Classification using Evolutionary Forests. Proceedings International Conference on Pattern Recognition Applications and Methods, pp 387-393.\nFlorence, J. 2006. Making the No Fly List Fly: A Due Process Model for Terrorist Watchlists. Yale Law Journal, 115(8), 2148\u20132181. www.yalelawjournal.org/pdf/115-8/Florence.pdf.\nGong, S., Loy, C. C., &amp; Xiang, T. 2011. Security and Surveillance. Springer. \nGoold, B. J. 2002. Privacy Rights and Public Spaces: CCTV and the Problem of the \"Unobservable Observer\". Criminal Justice Ethics 21(1) 21-27.\nHelbing, D., &amp; Molnar, P. 1995. Social Force Model for Pedestrian Dynamics. Physical Review E, 51.\nHempel, L., &amp; T\u00f6pfer, E. 2004. CCTV in Europe (Final Report). Tech. rept. Urban Eye Project: HPSE-CT2001-00094. \nHu, W., Tan, T., Wang, L., &amp; Maybank, S. 2004. A Survey on Visual Surveillance of Object Motions and Behaviour. IEEE Transactions on Systems, Man, and Cybernetics, 34, 334\u2013252.\nIndependent Police Complaints Commission (UK). 2007 (8 November). Stockwell One: Investigation into the shooting of Jean Charles de Menezes at Stockwell underground station on 22 July 2005. www.ipcc.gov.uk/Documents/stockwell\\_one.pdf. \nIntrona, L. D. (2000). Workplace Surveillance, Privacy and Distributive Justice. ACM SIGCAS Computers and Society, 30(4), 33-39.\nIntrona, L. D., &amp; Wood, D. 2004. Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems. Surveillance and Society, 2(2/3), 177\u2013198. \nJia, K. &amp; Gong, S. 2008. Generalized Face Super-Resolution. In IEEE Transactions on Image Processing, 17(6), 873-886.\nKo, T. 2011. Video Surveillance. InTech. Chap. A Survey on Behaviour Analysis in Video Surveillance Applications.  http://tinyurl.com/8hlveuk\nLee, S-W., Park, J., &amp; Lee, S-W. 2006. Low Resolution Face Recognition Based on Support Vector Data Description. Pattern Recognition, 39, 1809\u20131812.\nLewis, P. 2009. G20 protests death Ian Tomlinson death: Guardian video reveals police attack on man who died at G20 protest. The Guardian, 7th April. www.guardian.co.uk/uk/2009/apr/07/ian-tomlinson-g20-death-video.\nLiu, C., Shum, H-Y., &amp; Freeman, W. T. 2007. Face Hallucination: Theory and Practice. International Journal of Computer Vision, 75(1), 115\u2013134.\nLyall, S. 2009. Critics Assail British Police for Harsh Tactics During the G-20 Summit Meeting. New York Times, 30th May. www.nytimes.com/2009/05/31/world/europe/31police.html.\nMarketResearch.com. 2011 (January). Global Video Surveillance Market, Applications and Management Services Forecasts (2010-2015). www.marketresearch.com/MarketsandMarkets-v3719/Global-Video-Surveillance-Applications-Management-6083117/.\nMehran, R., Moore, E. R., &amp; M, Shah. 2010. A Streakline Representation of Flow in Crowded Scenes. In: European Conference on Computer Vision (ECCV).\nMoussaid, M., Perozo, N., Garnier, S., Helbing, D., &amp; Theraulaz, G. 2010. The Walking Behaviour of Pedestrian Social Groups and Its Impact on Crowd Dynamics. PloS ONE, 5(4).\nNorris, C., &amp; Armstrong, G. 1999. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg.\nOrrite, C., Martinez, F., Herrero, E., Ragheb, H. &amp; and Velastin, S. 2008. Independent Viewpoint Silhouette-based Human Action Modelling and Recognition, Proc. 1st International Workshop on Machine Learning for Vision-based Motion Analysis in conjunction with the European Conference on Computer Vision (ECCV).\nPark, J-S., &amp; Lee, S-W. 2008. An Example-Based Face Hallucination Method for Single-Frame, Low-Resolution Facial Images. IEEE Transactions on Image Processing, 17(10), 1806\u20131816. \nPatino, L., Bremond, F., Evans, M., Shahrokni, A. &amp; Ferryman, J. 2010. Video Activity and Reporting with Incremental Unsupervised Learning. In Proceedings Seventh IEEE Advanced Video and Signal-Based Surveillance (AVSS), 511-518.\nRagheb, H., Velastin, S., Remagnino, P. &amp; Ellis, T. 2008. ViHASi: Virtual Human Action Silhouette Data for the Evaluation of Silhouette-Based Action Recognition Methods, Proc. ACM International Workshop on Vision Networks for Behaviour Analysis in conjunction with the ACM Multimedia (MM).\nPETS2006. 2006. IEEE 2006 International Workshop on Performance Evaluation of Tracking and Surveillance. www.pets2006.net.\nPETS2007. 2007. IEEE 2007 International Workshop on Performance Evaluation of Tracking and Surveillance. www.pets2007.net.\nPETS2009. 2009 IEEE 2009 International Workshop on Performance Evaluation of Tracking and Surveillance. www.pets2009.net.\nPham, Q-C., Gond, L., Begard, J., Allezard, N. &amp; Sayd, P. Real Time Posture Analysis in a Crowd using Thermal Imaging. In Proceedings Computer Vision and Pattern Recognition (CVPR'07), pp 1-8.\nReeves, B., &amp; Nass, C. 2002. The Media Equation. 2nd edn. Stanford: CSLI.\nRowlands, M. 2011 (21 January). Statewatch Analysis \u2014 Six Months On: An Update on the UK Coalition Government's Commitment to Civil Liberties. www.statewatch.org/analyses/no-118-uk-civil-liberties-six-months-on.pdf.\nSenior, A., Pankanti, A., Brown, L., Ying-Li, T., Ekin, A., Connell, J., Chiao, F.-S., &amp; Lu, M. 2005. Enabling Privacy through Computer Vision. IEEE Security and Privacy, 3, 50\u201357.\nSochman, J. &amp; Hogg, D. C. 2011. Who Knows Who \u2013 Inverting the Social Force Model for Finding Groups. In Proceedings IEEE International Workshop on Socially Intelligent Surveillance and Monitoring (SISM), pp 830-837.\nSpindler, T., Wartmann, C., Hovestadt, L., Roth, D., Van Gool, L., &amp; Steffen, A. 2008. Privacy in Video Surveilled Spaces. Computer Security, 16(2), 199\u2013222.\nSun, C., Talbot, H., Ourselin, S., &amp; Adriaansen, T. (eds). 2003. Proceedings of the Seventh International Conference on Digital Image Computing: Techniques and Applications, DICTA 2003, 10-12 December 2003, Macquarie University, Sydney, Australia. CSIRO Publishing.\nThe Economist. 2012 (28 April). Video Surveillance: I Spy with My Big Eye.  www.economist.com/node/21553408\nTickner, A.H. &amp; Poulton, E.C.  1973. Monitoring up to 16 Synthetic Television Pictures Showing a Great Deal of Movement. Ergonomics, 16, 381-401.\nTweed, D. &amp; Ferryman, J. 2008. Enhancing Change Detection in Low-Quality Surveillance Video with Markov Random Fields\", Proc. 1st ACM International Workshop on Vision Networks for Behaviour Analysis (VNBA'08) (in conjunction with the ACM Multimedia Conference).\nValera, M., Velastin, S., Ellis A-L., &amp; Ferryman, J. 2011. Communication Mechanisms and Middleware for Distributed Video Surveillance, IEEE Transactions on Circuits and Systems for Video Technology, 21(12), 1795-1809.\nWelsh, B. P.  and Farrington, D. P. 2009. Public Area CCTV and Crime Prevention: An Update Systematic Review and Meta-Analysis. Justice Quarterly 26(4), 716-745.\nYilmaz, A., Javed, O., &amp; Shah, M. 2006. Object Tracking: A Survey. ACM Computing Surveys, 38(4), Article 13.\nZaidenberg, S., Boulay, B., &amp; Bremond, F. 2012. A Generic Framework for Video Understanding Applied to Group Behaviour Recognition, Proceedings of the IEEE Ninth International Conference on Advanced Video and Signal-Based Surveillance (AVSS 2012), 126-142.\nZhan, B., Monekosso, D. N., Remagnino, P., Velastin, S. A., &amp; Xu, L. Q. 2008. Crowd Analysis: A Survey. Mach. Vis. Appl., 19(5-6), 345\u2013357."]}</description>
  </descriptions>
</resource>
79
40
views
downloads
All versions This version
Views 7979
Downloads 4040
Data volume 11.8 MB11.8 MB
Unique views 7777
Unique downloads 3737

Share

Cite as