Surveillance in Action

Technologies for Civilian, Military and Cyber Surveillance

  • Panagiotis Karampelas
  • Thirimachos Bourlai

Table of contents

  1. Front Matter
    Pages i-xiv
  2. Surveillance of Human Features

    1. Front Matter
      Pages 1-1
    2. Nawaf Yousef Almudhahka, Mark S. Nixon, Jonathon S. Hare
      Pages 25-50
    3. Susan El-Naggar, Ayman Abaza, Thirimachos Bourlai
      Pages 77-104
    4. Mohammed A. M. Abdullah, Raid R. Al-Nima, Satnam S. Dlay, Wai L. Woo, Jonathon A. Chambers
      Pages 105-125
    5. Nnamdi Osia, Thirimachos Bourlai, Lawrence Hornak
      Pages 127-145
  3. Surveillance for Security and Defense

    1. Front Matter
      Pages 165-165
    2. Anastasios Kokkalis, Theodore I. Lekas
      Pages 185-194
    3. Evangelos Sakkopoulos, Emmanouil Viennas, Zafeiria-Marina Ioannou, Vassiliki Gkantouna, Efrosini Sourla, Mersini Paschou et al.
      Pages 217-240
  4. Cyber Surveillance

    1. Front Matter
      Pages 299-299
    2. Victor Pomponiu, Davide Cavagnino, Marco Botta
      Pages 301-331
    3. Praveen Rao, Charles Kamhoua, Laurent Njilla, Kevin Kwiat
      Pages 333-350
    4. Yifang Wei, Lisa Singh
      Pages 351-368
    5. A. D. Clark, J. M. Absher
      Pages 395-412

About this book


This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition.

The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection.

The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. 

The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master’s and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.


electronic surveillance homeland security privacy and surveillance border surveillance biometrics for surveillance cyber threats cybersecurity ethics of surveillance surveillance and privacy surveillance-related technologies

Editors and affiliations

  • Panagiotis Karampelas
    • 1
  • Thirimachos Bourlai
    • 2
  1. 1.Department of Informatics and ComputersHellenic Air Force AcademyAtticaGreece
  2. 2.Multispectral Imagery Lab, Lane Department of Computer Science and Electrical EngineeringWest Virginia UniversityMorgantownUSA

Bibliographic information