Conference PaperPDF Available

Some examples of video surveillance as a service applications

Authors:
  • SaTCIP Publisher Ltd.
  • SaTCIP d.o.o.

Abstract and Figures

Video Surveillance as a Service (VSaaS) has undergone significant scientific development since its inception. Development of cloud technologies significantly influenced surveillance market which is expected to entirely replace traditional surveillance systems. Economic analysis show positive growth of surveillance equipment and systems and in the coming years VSaaS is expected to have a larger stake of the security market. In the paper are given examples of Video Surveillance as a Service (VSaaS) applications in current surveillance systems implementations. We also review the existing literature and propose how to apply advancement into future frameworks. How to cite this article: Dašić, P.; Dašić, J. & Crvenković, B.: Some examples of video surveillance as a service applications. In: Proceedings of the 7th International Multidisciplinary Scientific Symposium "Sustainable Development Through Quality and Innovation in Engineering and Research" (SIMPRO-2016); Petroşani, Romania; 14-15 October 2016. Petroşani (Romania): University of Petroşani, 2016, pp. 367-370. ISSN 2344-4754.
Content may be subject to copyright.
7th International Multidisciplinary Symposium
SUSTAINABLE DEVELOPMENT THROUGH QUALITY AND INNOVATION IN
ENGINEERING AND RESEARCH”
UNIVERSITARIA
SIMPRO 2016
Some examples of video surveillance as a service applications
Predrag Dašića, Jovan Dašića, Bojan Crvenkovića
aSaTCIP Publisher Ltd. Vrnjačka Banja 36210, Serbia
bHigh Technical Mechanical School of Professional Studies, Trstenik 37240, Serbia
Abstract
Video Surveillance as a Service (VSaaS) has undergone significant scientific development since its inception. Development of cloud
technologies significantly influenced surveillance market which is expected to entirely replace traditional surveillance systems.
Economic analysis show positive growth of surveillance equipment and systems and in the coming years VSaaS is expected to have a
larger stake of the security market. In the paper are given examples of Video Surveillance as a Service (VSaaS) applications in
current surveillance systems implementations. We also review the existing literature and propose how to apply advancement into
future frameworks.
Keywords: Video Surveillance as a Service (VSaaS); Intelligent Video Surveillance as a Service (IVSaaS); cloud technology;
1. Introduction
Surveillance systems have been in use for several decades now since the invention of Closed-circuit television
(CCTV) cameras and tape recorders. Over time these systems advanced to using computer system and IP cameras to
capture, store and reproduce recordings which quickly reached limits in size, power requirements, processing, analysing
and especially storage. Main obstacle is that they are all on site based solutions. Cloud computing introduced a novel
approach to how data is being managed which reflected to video surveillance as well. This brought to the idea, utilizing
cloud computing enormous network, storage and processing capabilities (Dašic, et al. 2016). Video surveillance as a
Service has undergone significant scientific development since its inception. Notable research done in the area covers
universal environmental surveillance system (Chen, et al 2013), intelligent surveillance video analysis service (Chen, et
al. 2016; Tomforde, 2013), automatic configuration of video-surveillance (Conejero, 2015), remote display solution
(Song, et al. 2015). Authors (Dautov, and Paraskakis, 2013) introduced a novel approach to developing autonomic
cloud application platforms, based on vision of treating cloud platforms as sensor networks. This approach is based on
intelligent re-usage of existing solution strategies and products (specifically, Stream Reasoning and the Semantic Web
technology stack), to create a general-purpose autonomous framework.
Key areas of cloud based video surveillance are video-based detection and tracking (García-Rodríguez, and García-
Chamizo, 2011), video-based person identification, and large-scale surveillance systems. A significant percentage of
basic technologies for video-based detection and tracking were developed under a U.S. government-funded program
called Video Surveillance and Monitoring (VSAM) (Collins, et al. 2000).
2. Applications of Video Surveillance as a Service (VSaaS)
Applications of VSaaS include sectors of tourism (hotels, restaurants), healthcare (hospitals, care centres), education
(schools), finance (banks, trade centers), retail (shops, malls), data centers (high tech companies), airports (terminals,
runways), ports (incoming vessels), government (buildings, municipalities areas, landmarks, police, military), transport
(roads, highway, railway, parking areas), industrial (plants, equipment, open areas), telecommunication (equipment,
service centres). Alongside listed applications VSaaS is applicable in homes and estates of common people looking for
easy and affordable security measures. More on specific video streaming application can be found in publications for
* Corresponding author. Tel.: +38-1606-926-690; fax: +38-137-692-669.
E-mail address: dasicp58@gmail.com.
367
International Multidisciplinary Symposium - SIMPRO 2016:
urban traffic management (Esteve, et al. 2007), networking applications for emergency services (Frank, R. et al 2009),
vehicle surveillance system (Fu, 2010). Further, we will present and discuss current applications and supporting
technologies for Video Surveillance as a Service.
Remote access to live and recorded surveillance video using mobile devices is a standard feature in VSaaS. It is
applicable in both civilian and military environment with native encryption algorithm support for high security of
content flow. In paper by (Philp, et al. 2009) is proposed an addition security measure for video transmission using
watermarking as another layer of authentication. Authors (Abu-Lebdeh, et al. 2012) have developed a novel system
architecture for mobile video surveillance applications using 3GPP 4G Evolved Packet Core (EPC), with key
components of service architecture: service development platform (SDP) and the machine to machine (M2M) gateway.
Another application of VSaaS in mobile segment is the research done by (Paul and Park, 2013) who developed a system
for object classification and recognition using a mobile phone as image acquisition device. Images or video material is
sent to cloud system for analysis processing which then sends back the results of multiclass natural objects recognition
to mobile device. Analysis is performed using high dimensional feature vectors using clustering algorithm and classify
and recognize using native Bayes classifier. (Yu, et al. 2012) developed intrusion detection system (using machine
learning technique) for android mobile platform which performs robust people classification in diverse scenes in real-
time. Their video surveillance systems is intended to function within Wireless Sensor Networks (WSN) environment.
On Fig. 1 is given a graphical representation of VSaaS applications and features.
Fig. 1. Applications and features of VSaaS. Source: authors
VSaaS brought significant improvements in open area surveillance allowing the utilization of sophisticated tracking
and analysis software to run in real-time processing large amounts of data. VSaaS for open area surveillance can be
used virtually anywhere through simple internet networks, existing fiber networks or mobile 3G/4G networks providing
coverage for large urban areas. In paper by (Chen, et al. 2014) is given a proposal of a unified computational
framework, whose purpose is the integration simplification of various video analysis techniques. The framework is
developed upon cloud architecture which enable it to handle massive data analysis. Authors (Weng, et al. 2013)
developed an open mobile could architecture ―Pics-on-Wheel‖ for tracking taxi vehicles in urban environment which
can be used for surveillance purposes such as: vehicle location, driving duration, incident recording, driver monitoring
as well as provide detailed analytics. A multimedia surveillance backend system architecture was developed by (Dey, et
al. 2012) and is based on the Sensor Web Enablement framework and cloud based ―key-value‖ stores. Their framework
obtains data from camera/edge device simulators, splits media files and metadata and stores those in a segregated way
in cloud based data stores hosted on Amazons EC2.
Cloud-based video surveillance enables the possibility of smart interaction between software and on-site mechanical-
electrical devices. For example, one of the applications is the usage of robots in servicing incursions and other threats in
risk areas (e.g. nuclear facilities). (Park, et al. 2012, 2013) have developed sub-optimal decision making algorithms for
such robots where Unattended Ground Sensors (UGS) detect a threat and the robots service the alerts by visiting the
alert location and collecting evidence in the form of video and other images and transmit them to the operator.
Healthcare industry can greatly benefit from cloud based surveillance, especially from video analytics software such
as motion analysis. Authors (Lee, and Chung, 2012) developed an algorithm capable of detecting falls of patients in
368
Sustainable Development through Quality and Innovation in Engineering and Research
healthcare institutions and removing shadows from objects thus greatly increasing false detection. Such a system of
detection can be implemented to monitor patients movement in real-time by automatically notifying hospital staff of
unfortunate event such as falling or undesired movement.
VSaaS can be implemented for maritime video surveillance both ground-based, harbors and dock, and on-vessel
implementation. Authors (Auslander, et al. 2011) analysed and compared anomaly detection algorithms for local
maritime video surveillance. In paper by (Guo, 2012) were presented key technologies of intelligent monitoring for
middle line of the south to north water transfer. The application of VSaaS could improve real-time surveillance from
boats, mass transit screening for boat passengers, crane safety cameras for docks and perimeter security. (Gómez, et al.
2015) developed a surveillance system that possesses several highly advanced features which can be best utilized
through VSaaS application. The features include: 3D environment change detection, a multiview-based acquisition
method to monitor wide-sized indoor environments, analysis of the elements detected to identify intruders, new and
missed objects, fusion of color and 3D features to create an accurate 3D model of the scene, real-time surveillance
algorithm based on the tilt-angle movement and support for absence of illumination by automatic IR adjustment.
Cloud based video surveillance can serve as a data source for Applied behavior analysis (ABA) which can help
researcher to better understand human habits and behavior patterns. For example authors (Kröckel and Bodendorf,
2010) presented a concept of using data mining methods on images obtained by video surveillance. The analysis is
performed for customer trajectories, paths through the retail environment, while image processing is done using
OpenCV Computer Vision Library. Results about patterns and clusters are obtained by different method of data mining.
Education sector has proven to have reduced incidents (Tanner-Smith, 2016) with installed physical security measures.
Application of VSaaS in schools can greatly influence the early detection of incidents (fights, falls, unauthorized access,
vandalism), reduce overall security costs (less security personnel needed, less hardware and technical maintenance
personnel, no Digital Video Recording (DVR) devices required) and can provide behavioral analysis.
Military sector relies heavily on video surveillance for internal and as well mission purposes. Usage of drones,
robots, unmanned aircrafts accompanied with advanced data analytics is the backbone of military operations. One of the
developed techniques applicable in military environment is s 3-D imaging technique which pairs high-resolution night-
vision cameras with GPS to increase the capabilities of passive imaging surveillance. The technique was developed by
(Schwartz, 2011) and uses camera models and GPS to derive a registered point cloud from multiple night-vision
images. These point clouds are used to generate 3-D scene models and extract real-world positions of mission critical
objects. This enables precise geo-positioning in low-light environment. A supportive hardware solution comes from
company Avigilon, which developed Light Catcher technology capable of capturing video with color detail in extreme
low-light environments.
3. Conclusion
This paper presented modern applications of Video Surveillance as a Service from both scientific and general public
view. Available literature covers a wide scope of application issues and solutions, however more effort is needed in
automation of intelligent data analysis since the amount of data exceeds current software and hardware capabilities.
Beside intelligent data analysis more development is needed in area of video compression and transfer to support high
definition streaming without the need of using intermediary storage with pre-compression function. Maintaining secure
environments is of imperative importance especially in times of increased terrorist activities, political and economic
crisis and unstable conflict regions. VSaaS reduces overall costs and offers unsurpassed technological possibilities
compared to traditional systems which should be fully utilized.
References
Abu-Lebdeh, M., Belqasmi, F., Glitho, R., A 3GPP 4G evolved packet core-based system architecture for QoS-enabled
mobile video surveillance applications, 3rd International Conference on the Network of the Future, NOF 2012, art. no.
6464000, Tunis, Tunisia, pp. 102-107, (2012).
Auslander, B.; Gupta, K. Aha, D.W., Comparative evaluation of anomaly detection algorithms for local maritime video
surveillance, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland
Security and Homeland Defense X, SPIE, Orlando, Florida, United States (2011).
Chen, P.J., Chen, C.H., Chen, Y.C., Wang, J.H., Liao, T.S., Hwang, C.H., Universal environmental surveillance system with
instrument cloud technology, IEEE Instrumentation and Measurement Technology Conference, art. no. 6555534, pp. 845-
849, Minneapolis, USA (2013).
Chen, T.-S., Lin, M.-F., Chieuh, T.-C., Chang, C.-H., Tai, W.-H.: An intelligent surveillance video analysis service in cloud
environment, Proceedings of the International Carnahan Conference on Security Technology, pp. 16, Orlando, Florida,
USA, (2016).
Chen, Y.-L., Chen, T.-S., Yin, L.-C., Huang, T.-W., Wang, S.-Y., Chieuh, T.-C.: City eyes: An unified computational
framework for intelligent video surveillance in cloud environment, Proceedings of the IEEE International Conference on
Internet of Things, iThings, p. 324327, Taipei, Taiwan, (2014).
369
International Multidisciplinary Symposium - SIMPRO 2016:
Collins, R. et al. A system for video surveillance and monitoring, VSAM Final Report, Carnegie Mellon Univ., Pittsburgh,
PA, Tech. Rep. CMU-RI-TR-00-12, May 2000.
Conejero, J.M., Hernández, J., Clemente, P.J., Echeverría, R.R., Preciado, J.C., Figueroa, F.S. Automatic Configuration of
Video-Surveillance Applications: A Model-Driven Experience, IEEE Latin America Transactions, Vol. 13, No.8, pp.
2700-2708, (2015).
Dautov, R., Paraskakis, I. A vision for monitoring cloud application platforms as sensor networks, ACM International
Conference Proceeding Series, New Orleans, LA, USA, (2013).
Dašić, P., Dašić, J., Crvenković B. Service models for cloud computing: Video Surveillance as a Service (VSaaS), Bulletin of
the Transilvania University of Braşov, Vol. 9 (58) No. 1, Series I: Engineering Sciences, (2016).
Dey, S., Chakraborty, A., Naskar, S., Misra, P. Smart city surveillance: Leveraging benefits of cloud data stores, Proceedings
- Conference on Local Computer Networks, LCN, art. no. 6424076, pp. 868-876, Sheraton Sand Key, Clearwater Beach,
FL, USA (2012).
Esteve, M., Palau, C.E., Martínez-Nohales, J., Molina, B. A video streaming application for urban traffic management,
Journal of Network and Computer Applications, Vol.30, No.2, pp. 479-498, (2007).
Frank, R., Hourte, B., Jungels, D., Engel, T. Interoperable networking applications for emergency services, International
Journal of Multimedia and Ubiquitous Engineering, 4 (1), pp. 11-22, (2009).
Fu, X., Men, Y., Yuan, G. A multimedia database application for vehicle surveillance system, 2nd International Workshop on
Database Technology and Applications, DBTA2010 - Proceedings, art. no. 5659021, Wuhan, China, (2010).
García-Rodríguez, J., García-Chamizo, J.M. Surveillance and human-computer interaction applications of self-growing
models, Applied Soft Computing Journal, Vol.11, No.7, pp. 4413-4431, (2011).
Gómez, M.J., García, F., Martín, D., De La Escalera, A., Armingol, J.M. Intelligent surveillance of indoor environments based
on computer vision and 3D point cloud fusion, Expert Systems with Applications, Vol.42, No.21, art. no. 10103, pp.
8156-8171, (2015).
Guo, Q.-L. The application of the video surveillance technology in the mid-route of the south-to-north water, Applied
Mechanics and Materials, Vol.170-173, pp. 2037-2042, (2012).
Kankanhalli, M.S., Rui, Y. Application potential of multimedia information retrieval, Proceedings of the IEEE, Vol.96, No.4,
art. no. 4469876, pp. 712-720, (2008).
Kröckel, J., Bodendorf, F. Extraction and application of person trajectories in retail environments, Proc. of the IADIS Int.
Conf. Intelligent Systems and Agents 2010, Proc. of the IADIS European Conference on Data Mining 2010, Part of the
MCCSIS 2010, pp. 109-113, (2010).
Lee, Y.-S., Chung, W.-Y. Visual sensor based abnormal event detection with moving shadow removal in home healthcare
applications, Sensors, Vol.12, No.1, pp. 573-584, (2012).
Park, M., Darbha, S., Krishnamoorthy, K., Khargonekar, P.P., Pachter, M., Chandler, P. Sub-optimal stationary policies for a
class of stochastic optimization problems arising in robotic surveillance applications, ASME 2012 5th Annual Dynamic
Systems and Control Conference Joint with the JSME 2012, 11th Motion and Vibration Conference, DSCC 2012-
MOVIC 2012, Vol.III, pp. 263-272, (2012).
Paul, A.K., Park, J.S.: Multiclass object recognition using smart phone and cloud computing for augmented reality and video
surveillance applications, Proceeding of the International Conference on Informatics, Electronics and Vision, ICIEV
2013, Dhaka, Bangladesh, (2013).
Philp, A., Bradley, B., Stach, J., Rodriguez, T. Real-time application of digital watermarking to embed tactical metadata into
full motion video captured from unmanned aerial systems, Proceedings of SPIE - The International Society for Optical
Engineering, 7254, art. no. 725410, (2009).
Schwartz, J.M. Precise positioning surveillance in 3-D using night-vision stereoscopic photogrammetry, Proceedings of SPIE
- The International Society for Optical Engineering, Vol.8042, art. no. 80420A, (2011).
Song, B., Hassan, M.M., Tian, Y., Hossain, M.S., Alamri, A. Remote display solution for video surveillance in multimedia
cloud, Multimedia Tools and Applications, p. 22. Article in Press, (2015).
Tanner-Smith, E.E., Fisher, B.W. Visible School Security Measures and Student Academic Performance, Attendance, and
Postsecondary Aspirations, Journal of Youth and Adolescence, Vol.45, No.1, pp. 195-210, (2016).
Tomforde, S., Jänen, U., Hähner, J., Hoffmann, M. SmaCCS: Smart camera cloud services: Towards an intelligent cloud-
based surveillance system, Proceedings of the 10th International Conference on Informatics in Control, Automation and
Robotics, ICINCO 2013, Vol I, pp. 288-293, (2013).
Weng, J.T., Ku, I., Gerla, M. Surveillance service on the open mobile cloud, Wireless On-demand Network Systems and
Services (WONS), 10th Annual Conference, pp. 29-33, Banff, AB, (2013).
Wu, R., Deng, A., Chen, Y., Blasch, E., Liu, B. Cloud technology applications for area surveillance, Proceedings of the IEEE
National Aerospace Electronics Conference, NAECON, art. no. 7443044, pp. 89-94, Dayton, Ohio, USA, (2016)
Yu, H., Son, S., Kim, N., Lee, B. Implementation of WSN application service using people detection algorithm, International
Conference on ICT Convergence, art. no. 6386793, pp. 117-118, Jeju, South Korea, (2012).
370
... (2-10) Classifier cascade process. 46 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11) Principle of an identification process with face recognition system 51 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12) A pre-processed image divided into 64 51 (2-13) The Original LBP 52 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14) Circularly neighbor-groups for 3 different values of P and R 53 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15) Various texture primitives' detection by the 55 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16) Facial image split into 64 areas, with area's histogram 56 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17) Local Binary Pattern operator is robust against monotonic grey scale conversions 59 ...
... (2-10) Classifier cascade process. 46 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11) Principle of an identification process with face recognition system 51 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12) A pre-processed image divided into 64 51 (2-13) The Original LBP 52 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14) Circularly neighbor-groups for 3 different values of P and R 53 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15) Various texture primitives' detection by the 55 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16) Facial image split into 64 areas, with area's histogram 56 (2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17) Local Binary Pattern operator is robust against monotonic grey scale conversions 59 ...
... The video processing unit will receive and process image data from the sensing unit to detect scene events and target activity [15]. In addition, video surveillance system have been developed to utilize computer systems and IP cameras for capturing, storing and reproducing recordings that vastly reached size limits, power requirements, processing, analyzing and storage space [16] . ...
Thesis
Full-text available
The development of a robust and integrated multi-camera surveillance system is an important requirement to ensure public safety and security. Being able to re-identify and track one or more targets in different scenes with surveillance cameras remains an important and difficult problem due to clogging, significant change of views, and lighting across cameras. In a traditional surveillance system, human operators monitor objects based on visual information through surveillance cameras, and can simply record video frames in storage systems but retrieving important information about a target requires considerable time and effort In this thesis, traditional surveillance systems have been developed and supported by intelligent techniques that have ability to performance the parallel processing by employ multi-thread of all cameras to track people in the different scenes (places) in which the cameras were placed, in addition to retrieving important information very quickly. The system consists of the following stages: 1. Offline Phase: Create the database and then train the system. 2. Online Phase: recognizing the detected face(s) with trained datasets. 3. Tracking Phase: This stage includes. Test the person who has been recognized in the online phase then check if it is within the database or not, and Re-Construction Video to track a stranger. In the Offline Phase, Create a database that includes all the necessary information for authorized persons as well as create the feature vectors of the training image by using the LBPH algorithm, in the Online Phase, by employing (the AdaBoost) machine learning algorithm, the system first performs face detection and then face recognition to identify particular persons. For the first step, by using a cascade classifier with haar-like features the system selects the faces of people, who have 3 been detected and traced their apparition in all surveillance cameras. A Local Binary Patterns Histogram (LBPH) recognition algorithm is then used to recognize detected faces with a known dataset which was established in the Offline Phase. In the final stage of the system (Tracking Phase), which includes giving an alert in the event of a breach of the building by unauthorized persons and tracking their movement in all surveillance cameras with the deduction of frames that show the stranger to be used later in the reconstruction of video tracking. The experiments have shown that the proposed system has efficient and robust detection, recognition, and tracking of faces in surveillance multi-cameras are represented by 95% of the detection of faces, 89% of recognition, and more than 97% of the tracking of strangers which represent a high proportion compared to similar works with high speed in the retrieval and analysis of video content.
... Pacific Controls (PCS) VSaaS, 1000eyes, 3dEYE, Aegis AI, Angelcam, Arcules (Dašić et al., 2016) Virtualization as a Service (VaaS) VMware Infrastructure (Stefanski and Personett, 2009) Some of these cloud service model variants are presented in Table 1. Table 1 contains the state-of-the-art compilation of emerging cloud support services, examples of their providers (if applicable), and a reference to various scholarly write-ups, lectures, and literature where in-depth information can be mined about them. ...
Article
Full-text available
Rapid advancements in the infrastructure of Information and Communication Technology (ICT) have led to radically new but ubiquitous technology; cloud computing. Cloud computing has gracefully emerged offering services that possess on-demand scalability, huge computing power, and a utility-like availability, all at a relatively low cost. It has unsurprisingly become a paradigm shift in ICT, gaining adoptions in all forms of application i.e., personal, academic, business, or government. Not only for its cost-effectiveness but also for its inherent ability to meet business goals and provide strategic ICT resources. More recently there have been advances in cloud computing leading to the evolution of newer commercial cloud services, one of which is the Mobile backend as a Service (MBaaS). The MBaaS is important and required for a robust mobile application back-end data storage and management. Its wide adoption and importance stem from its ability to simplify application development and deployment. Also, MBaaS is robust, with the ability to cope with errors by providing nifty tools and other features. These enable rapid scaffolding of mobile applications. This paper reviews Mobile backend as a Service (MBaaS) and provides required background knowledge on some cloud services and their providers to enable stakeholders to make informed decisions and appropriate choices.
... Slika 2. Primer VSaaS radnog okvira [23] Postoji nekoliko izvedenih varijanti VSaaS servisa kao što su [11][12][15][16][17]:  Inteligentni video nadzor kao servis (Intelligent Video Surveillance-as-a-Service -IVSaaS),  Upravljani video nadzor kao servis (Managed Video Surveillance-as-a-Service -MVSaaS),  Cloud video nadzor (Cloud Video Surveillance -CVS) i  Online video nadzor (Online Video Surveillance as a Service -OVSaaS). ...
Conference Paper
Full-text available
Implementacija sistema za video nadzor omogućava monitoring i upravljanje saobraćaja kako bi se povećala bezbednost i sigurnost svih uĉesnika u saobraćaju. Takav sistem pruţa informacije u realnom vremenu o toku saobraćaja, zagušenjima i bilo kakvim potencijalnim bezbednosnim rizicima na razliĉitim delovima puta. Moderni sistemi imaju mogućnost kontrole semaforske signalizacije i preusmeravanju vozaĉa na alternativne pravce kako bi se optimizovao tok saobraćaja. Uzevši u obzir zahtevnost takvih operacija neophodni su ogromni raĉunarski resursi za njihovu obradu u realnom vremenu što se danas moţe ostvariti samo kroz korišćenje servisa cloud raĉunarstva i propratnih tehnologija. U radu je dat pregled postojećih informaciono-komunikacionih rešenja za video nadzor (VSaaS) saobraćaja korišćenjem cloud tehnologije kao i predlozi za njihovu implementaciju. How to cite this article: Dašić, P.; Dašić, J. & Crvenković, B.: Primena video nadzora kao cloud servisa (VSaaS) u oblasti saobraćaja. Rad po pozivu (Invitation Paper). U: Zborniku radova XV Međunarodnog savjetovanja "Saobraćajni, ekološki i ekonomski problemi i perspektive rješavanja u zemljama Zapadnog Balkana s osvrtom na Bosnu i Hercegovinu"; Vlašić, Bosna i Hercegovina (BiH); 19-20. maja 2017. Travnik (Bosna i Hercegovina): Internacionalni Univerzitet Travnik (IUT), 2017, pp. 80-95. ISSN 2232-8807.
... Cloud computing introduced a novel approach to how data is being managed which reflected video surveillance as well. This brought to the idea of utilising the cloud computing enormous network, storage and processing capabilities such as access control and advanced cloud search [1][2][3][4][5]. ...
Article
Full-text available
BACKGROUND: Patient safety in hospitals is of equal importance as providing treatments and urgent healthcare. With the development of Cloud technologies and Big Data analytics, it is possible to employ VSaaS technology virtually anywhere, for any given security purpose. AIM: For the listed benefits, in this paper, we give an overview of the existing cloud surveillance technologies which can be implemented for improving patient safety. MATERIAL AND METHODS: Modern VSaaS systems provide higher elasticity and project scalability in dealing with real-time information processing. Modern surveillance technologies can prove to be an effective tool for prevention of patient falls, undesired movement and tempering with attached life supporting devices. Given a large number of patients who require constant supervision, a cloud-based monitoring system can dramatically reduce the occurring costs. It provides continuous real-time monitoring, increased overall security and safety, improved staff productivity, prevention of dishonest claims and long-term digital archiving. CONCLUSION: Patient safety is a growing issue which can be improved with the usage of high-end centralised surveillance systems allowing the staff to focus more on treating health issues rather that keeping a watchful eye on potential incidents. How to cite this article: Dašić, P.; Dašić, J. and Crvenković, B.: Improving patient safety in hospitals through usage of cloud supported video surveillance. Open Access Macedonian Journal of Medical Sciences (OAMJMS), Vol. 5, Issue 2 (2017), pp. 101-106. eISSN 1857-9655. doi: 10.3889/oamjms.2017.042.
... Cloud computing introduced a novel approach to how data is being managed which reflected video surveillance as well. This brought to the idea of utilising the cloud computing enormous network, storage and processing capabilities such as access control and advanced cloud search [1][2][3][4][5]. ...
Article
Full-text available
Background: Patient safety in hospitals is of equal importance as providing treatments and urgent healthcare. With the development of Cloud technologies and Big Data analytics, it is possible to employ VSaaS technology virtually anywhere, for any given security purpose. Aim: For the listed benefits, in this paper, we give an overview of the existing cloud surveillance technologies which can be implemented for improving patient safety. Material and methods: Modern VSaaS systems provide higher elasticity and project scalability in dealing with real-time information processing. Modern surveillance technologies can prove to be an effective tool for prevention of patient falls, undesired movement and tempering with attached life supporting devices. Given a large number of patients who require constant supervision, a cloud-based monitoring system can dramatically reduce the occurring costs. It provides continuous real-time monitoring, increased overall security and safety, improved staff productivity, prevention of dishonest claims and long-term digital archiving. Conclusion: Patient safety is a growing issue which can be improved with the usage of high-end centralised surveillance systems allowing the staff to focus more on treating health issues rather that keeping a watchful eye on potential incidents.
... Postoji nekoliko izvedenih servisa poput [6][7][8][9][10]: Inteligentni video nadzor kao servis (Intelligent Video Surveillance-as-a-Service -IVSaaS), Upravljani video nadzor kao servis (Managed Video Surveillance-as-a-Service -MVSaaS or MVaaS), Cloud video nadzor (Cloud Video Surveillance -CVS) i Online video nadzor kao servis ...
Conference Paper
Full-text available
Razvoj tehnologije cloud računarstva je omogućio integraciju naprednih i skalabilnih platformi za skladištenje, obradu i distribuciju senzorskih podataka u tradicionalne sisteme nadzora. Video nadzor kao servis (VSaaS) je cloud servis koji obezbeđuje udaljene sigurnosne funkcije. Servis nudi visoko napredne funkcije sa elementima inteligentne obrade i predstavljanja podataka. U ovom radu ćemo opisati procese koji okružuju ovaj servis kao i ispitati postojeća rešenja radnih okvira za primenu u rudarskoj industriji kao i povezane tehnološke novine koje mogu poboljšati postojeća rešenja. U radu je dat pregled dostupne naučne literature uz predloge kako iskoristiti izvršena istraživanja u svrhu povećanja bezbednosti u rudarskoj indistriji. How to cite this article: Dašić, P.; Dašić, J. & Crvenković, B.: Primena video nadzora kao cloud servisa (VSaaS) u rudarstvu. U: Zborniku radova 2. Savetovanja sa međunarodnim učešćem "Održiva energetika 2017"; Vrnjačka Banja; 22-23. mart 2017. Beograd: Udruženje klaster komora za zaštitu životne sredine i održivi razvoj, 2017, str. 238-249. ISBN 978-86-80464-05-3.
... They also extended the MT-ABAC for distributed, multiple collaborative cloud providers in the hierarchy to support Intercloud scenarios with exchanging tokens approach. Access control is an integral part in cloud environment used in majority of service models such as Search as a Service (SaaS) [28,29], where access is managed for 115 IJIEM search privileges (public-private indices), and results representation and Video Surveillance as a Service (VSaaS) [30,31] where access control is of utmost importance for managing recorded media. An example of access managed search are scientific databases Scopus-Elsevier and WoS-Thomson Reuters. ...
Article
Full-text available
Cloud technology has been around for some time now and is gaining increased influence in almost every aspect of information technology services. As a consequence of above stated, cloud technology offers improvements to traditional security systems by converging logical (cloud network) and physical security (on-site devices). In this paper, we will discuss the application of Access Control as a Service (ACaaS) for software security systems. ACaaS defines a common policy format for security, the translation of the policy into deployment environments and represents an efficient, cost-effective mechanism for access control. How to cite this article: Dašić, P.; Dašić, J. and Crvenković, B.: Applications of access control as a service for software security. International Journal of Industrial Engineering and Management (IJIEM), Vol. 7, No 3 (2016), pp. 111-116. ISSN 2217-2661.
... In paper [19] applications of the Search as a Service (SaaS) are given. Search as a Service is used in other areas of cloud supported services such as various applications of Video Surveillance as a Service (VSaaS) [20,21]. ...
Article
Full-text available
Search as a Service (SaaS) is a cloud service model whose main focus is on enterprise search or site-specific web search. Modern companies require fast and accurate information from their internal databases, internal document stores, or through the content of a website. Having a reliable searching mechanism is essential for both internal company staff and for external customers. In this paper the overview of current state and technological advances of Search as a Service (SaaS) cloud service is given, as well as its security issues on current internet service platforms. How to cite this article: Dašić, P.; Dašić, J. and Crvenković, B.: Service models for cloud computing: Search as a service (SaaS). International Journal of Engineering and Technology, Vol. 8, Issue 5 (October-November 2016), pp. 2366-2373. ISSN 2319-8613. doi: 10.21817/ijet/2016/v8i5/160805034.
Article
Full-text available
Abstract: Technical development of cloud computing technology enabled the integration of powerful and scalable platform for storing, processing and distribution of sensory data. Video Surveillance as a Service (VSaaS) is a cloud computing service which provides remote security features. The service offers highly advanced features with elements of intelligent processing and data representation. In this paper we will describe the processes which envelops this cloud service as well examine existing framework solutions. How to cite this article: Dašić, P.; Dašić, J. and Crvenković, B.: Service models for cloud computing: Video surveillance as a service (VSaaS). Bulletin of the Transilvania University of Brasov, Series I: Engineering Sciences, Vol. 9, No. 2 (2016), pp. 83-90. ISSN 2065-2119.
Article
Full-text available
Cloud computing offers sufficient computing and storage resources that can be used to provide multimedia services. Migrating the existing multimedia service to cloud brings a new challenging issue, i.e., remote display of video contents. To reduce the bandwidth consumption especially for mobile users, it is desired to encode video before sending to client. Existing encoding methods have unique advantages and disadvantages, differing their performance under varying situations. Thus, we propose to use multi-encoder method to solve the real-time remote display problem for remote multimedia cloud. To select the most appropriate encoder, factors including cost, application requirement, network, client device and codec implementation are considered. In this paper, we form a non-linear programming model, and provide an example to illustrate how to apply the proposed model for getting desired optimization.
Article
Full-text available
Abstract A real-time detection algorithm for intelligent surveillance is presented. The system, based on 3D change detection with respect to a complex scene model, allows intruder monitoring and detection of added and missing objects, under different illumination conditions. The proposed system has two independent stages. First, a mapping application provides an accurate 3D wide model of the scene, using a view registration approach. This registration is based on computer vision and 3D point cloud. Fusion of visual features with 3D descriptors is used in order to identify corresponding points in two consecutive views. The matching of these two views is first estimated by a pre-alignment stage, based on the tilt movement of the sensor, later they are accurately aligned by an Iterative Closest Point variant (Levenberg-Marquardt ICP), which performance has been improved by a previous filter based on geometrical assumptions. The second stage provides accurate intruder and object detection by means of a 3D change detection approach, based on Octree volumetric representation, followed by a clusters analysis. The whole scene is continuously scanned, and every captured is compared with the corresponding part of the wide model thanks to the previous analysis of the sensor movement parameters. With this purpose a tilt-axis calibration method has been developed. Tests performed show the reliable performance of the system under real conditions and the improvements provided by each stage independently. Moreover, the main goal of this application has been enhanced, for reliable intruder detection by the tilting of the sensors using its built-in motor to increase the size of the monitored area.
Conference Paper
Nowadays, digital surveillance systems are ubiquitously installed and continuously generating huge amount of video data. More often than not, it requires human to identify potential threats. To address that problem, we propose a Platform-as-a-Service (PaaS) architecture to conduct large scale video analysis in more systematic and efficient ways. In addition, the video analysis application implemented on the proposed PaaS platform provides a more user friendly interface for analyzing video footage. In this paper, we present the construction and implementation steps of a real-world video analysis service based on our previous work for a citywide security service. We successfully integrated over 25 thousands of surveillance devices throughout the city. The integrations of the NVR/DVRs, license plate number recognition engine, and the camera health monitoring engine will be demonstrated. Finally, we conclude with discussions on why we believe the proposed solution has the potential to become the standard for deploying intelligent video surveillance network.
Conference Paper
Efficient area surveillance in the Big Data era requires the capability of quickly abstracting useful information from the overwhelmingly increasing amount of data. Real-time information fusion is imperative and challenging to mission critical surveillance tasks for variant applications. Cloud computing has been recognized as an ideal candidate for Big Data because of many attractive features including high elasticity, good scalability, supporting pay-as-you-go service models, and capability of overcoming the constraints in both software parallelism and hardware capacities. In this work, we demosntrate that container-based virtualization outperforms the hypervisor-based Cloud Computing platforms. Taking WAMI (Wide-Area Motion Imagery), FMV (Full Motion Video), and text data as case studies, our experimental studies validate the advantages of container-based Cloud for area surveillance applications.
Article
During purchase process customer support is an important factor to success for actual business stores. The paper at hand introduces a concept combining methods of image processing and data mining for the extraction and analysis of customer trajectories, e.g. paths through the retail environment, at the point of sale and the point of service. Raw data is captured by network cameras that are commonly used for private and small business surveillance. As the cameras are already installed and well accepted in most cases the concept goes conform to the demand of no interaction with the customers and minimum additional costs for the enterprises. Image processing is accomplished by using OpenCV Computer Vision Library (OpenCV 2009). Established knowledge, e.g. patterns and clusters, is extracted by different methods from the field of data mining.
Article
The number of video-surveillance applications has increased in the last years due to the increasing security requirements, especially in public buildings. In that sense, new types of applications have appeared with new services. As an example, digital applications allow the possibility of remotely controlling the video through internet. However, most of these applications are implemented ad-hoc. They are very tied to the programming level reducing thus their reusability, configurability and maintainability. In this setting, we propose a Model-Driven approach to develop video-surveillance applications. This approach is based on the utilization of a Domain Specific Language (DSL) that allows the design of these applications at the modeling level. The utilization of models enhance the reusability of the services provided by the systems but also aims at managing their variability making them highly configurable. The models built based on this DSL are then used by model transformations that are able to automatically generate the configuration of the applications so that they may be dynamically reconfigured. Moreover, the approach provides different versions of the system, namely a standalone application, a web application or an application for mobile devices. All these applications allow the remote control of the video installation and the integration of external services such as SMS alerts, vehicles' plate recognition or smart home control.
Article
Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys-the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51 % male, 77 % White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50 % male, 57 % White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.
Conference Paper
Mobile video surveillance applications have become ubiquitous and are used in both civilian and military settings. They enable the capture, storage and transmission of video images over the Internet or other networks. This paper proposes a novel system architecture for mobile video surveillance applications. We leverage the 3GPP 4G Evolved Packet Core (EPC) to enable features such as guaranteed quality of service (QoS), which is not possible with the Internet, and even differentiated QoS, which is not possible with the other networks currently used in mobile video applications. The key components of our proposed architecture are the service development platform (SDP) and the machine to machine (M2M) gateway. The SDP enables the development and management of QoS-enabled mobile video surveillance applications. The M2M gateway enables interactions with the M2M devices, such as motion detectors and cameras. We have built a prototype with the Fraunhofer Fokus OpenEPC as 3GPP 4G EPC infrastructure and three AXIS network cameras as M2M devices. The architecture is presented along with the prototype. Related work is also reviewed.