Skip to main content

Cloud-Based Video Surveillance System Using EFD-GMM for Object Detection

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10039))

Included in the following conference series:

  • 1407 Accesses

Abstract

Nowadays, new generation of video surveillance systems integrates lots of heterogeneous cameras to collect, process, and analyze video for detecting the objects of potential security threats. The existing systems tend to reach the limit in terms of scalability, data access anywhere, video processing overhead, and massive storage requirements. A novel cloud computing can provide scalable and powerful techniques for large-scale storage, processing, and dissemination of video data. Furthermore, the integration of cloud computing and video processing technology offers more possibilities for efficient deployment of surveillance systems. This paper deploys the framework of a cloud-based video surveillance system and proposes an EFD-GMM approach for object detection in the overhead video processing. A prototype surveillance system is also designed to validate the proposed approach. It finally shows that the proposed approach is more efficient than GMM in video processing of cloud-based system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Raty, T.D.: Survey on contemporary remote surveillance systems for public safety. IEEE Trans. Syst. Man Cybern. C Appl. Rev. 40(5), 493–515 (2010)

    Article  Google Scholar 

  2. Ren, Y.J., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)

    Google Scholar 

  3. Karimaa, A.: Video surveillance in the cloud: dependability analysis. In: Proceedings of 4th International Conference on Dependability, pp. 92–95 (2011)

    Google Scholar 

  4. Hossain, M.S., Hassan, M.M., Qurishi, M.A., Alghamdi, A..: Resource allocation for service composition in cloud-based video surveillance platform. In: Proceedings of IEEE International Conference on Multimedia and Expo Workshops, pp. 408–412 (2012)

    Google Scholar 

  5. Lin, C.F., Yuan, S.M., Leu, M.C., Tsai, C.T.: A framework for scalable cloud video recorder system in surveillance environment. In: Proceedings of 9th International Conference on Ubiquitous Intelligence & Computing and Autonomic & Trusted Computing, pp. 655–660 (2012)

    Google Scholar 

  6. Hossain, M.A.: Analyzing the suitability of cloud based multimedia surveillance systems. In: Proceedings of 15th IEEE International Conference on High Performance Computing and Communications (2013)

    Google Scholar 

  7. Neal, D., Rahman, S.: Video surveillance in the cloud. J. Crypt. Inf. Secur. 2(3) (2015)

    Google Scholar 

  8. Sabahi, F.: Cloud computing security threats and responses. In: Proceedings of 3rd International Conference on Communication Software and Networks, pp. 245–249 (2011)

    Google Scholar 

  9. Venters, W., Whitley, E.A.: A critical review of cloud computing: researching desires and realities. J. Inf. Technol. 27(3), 179–197 (2012)

    Article  Google Scholar 

  10. Hossain, M.A.: Framework for a Cloud-based Multimedia Surveillance System. J. Distrib. Sens. Netw. (2014)

    Google Scholar 

  11. Cucchiara, R., Prati, A., Vezzani, R.: Designing video surveillance systems as services. In: Proceedings of 2nd Workshop on Video Surveillance Projects, Italy (2011)

    Google Scholar 

  12. Li, J., Li, X.L., Yang, B., Sun, X.M.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015)

    Article  Google Scholar 

  13. Shi, J., Malik, J.: Normalized cuts and image segmentation. IEEE Trans. PAMI 22(8), 888–905 (2000)

    Article  Google Scholar 

  14. Li, S.Z.: Markov Random Field Modeling in Image Analysis. Springer, Heidelberg (2009)

    MATH  Google Scholar 

  15. Zhang, B.C., Perina, A., Li, Z.G., Murino, V., Liu, J.Z., Ji, R.R.: Bounding multiple gaussians uncertainty with application to object tracking. IJCV 118, 364–379 (2016)

    Article  MathSciNet  Google Scholar 

  16. Zhang, B.C., Li, Z.G., Perina, A., Bue, A.D., Murino V.: Adaptive local movement modelling (ALMM) for object tracking. In: IEEE Transactions on CSVT (2016)

    Google Scholar 

  17. Zhang, B.C., Perina, A., Murino, V., Bue, A.D.: Sparse representation classification with manifold constraints transfer. In: Proceedings of CVPR, pp. 4557–4565 (2015)

    Google Scholar 

  18. Mahmood, A.M., Maras, H.H., Elbasi, E.: Measurement of edge detection algorithms in clean and noisy environment. In: Proceedings of 8th International Conference on Application of Information and Communication Technologies, pp. 1–6 (2014)

    Google Scholar 

  19. Shen, R.: Building a cloud-enabled file storage infrastructure. Tech Republic White Paper, F5 Network (2013)

    Google Scholar 

  20. Sotomayor, B., Montero, R.S., Lorente, I.M., Foster, I.: Virtual infrastructure management in private and hybrid clouds. IEEE Internet Comput. 13(5), 14–22 (2009)

    Article  Google Scholar 

  21. Beloglazov, A., Buyya, R.: Energy efficient resource management in virtualized cloud data centers. In: Proceedings of 10th IEEE ACM International Symposium on Cluster, Cloud, and Grid Computing, pp. 826–831 (2010)

    Google Scholar 

  22. Liu, X.D., Yu, Y., Liu, B., Li, Z.: Bowstring-based dual-threshold computation method for adaptive canny edge detector. In: Proceedings of International Conference of Image and Vision Computing, New Zealand, pp. 13–18 (2013)

    Google Scholar 

  23. Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. Trans. Neural Netw. Learn. Syst. 26(7), 1403–1416 (2015)

    Article  MathSciNet  Google Scholar 

  24. Pan, Z.Q., Kwong, S., Sun, M.T., Lei, J.J.: Early MERGE mode decision based on motion estimation and hierarchical depth correlation for HEVC. IEEE Trans. Broadcast. 60(2), 405–412 (2014)

    Article  Google Scholar 

Download references

Acknowledgement

The work was supported in part by the Natural Science Foundation of China under Contract 61272052, 61473086, 61672079, 61601466, in part by PAPD, in part by CICAEET, and in part by the National Basic Research Program of China under Grant 2015CB352501. The work of B. Zhang was supported by the Program for New Century Excellent Talents University within the Ministry of Education, China, and Beijing Municipal Science & Technology Commission Z161100001616005. Ba-chang Zhang is the corresponding author.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baochang Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Li, C., Su, J., Zhang, B. (2016). Cloud-Based Video Surveillance System Using EFD-GMM for Object Detection. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48671-0_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48670-3

  • Online ISBN: 978-3-319-48671-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics