MiFor '10最新文献

筛选
英文 中文
When multimedia meets surveillance and forensics in people security 当多媒体在人们的安全中遇到监控和取证
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877987
R. Cucchiara
{"title":"When multimedia meets surveillance and forensics in people security","authors":"R. Cucchiara","doi":"10.1145/1877972.1877987","DOIUrl":"https://doi.org/10.1145/1877972.1877987","url":null,"abstract":"When new disciplines emerge, and their commercial applications arise, the market invents new terms and definitions. This is the case of new fields related to surveillance and forensics for people security, which are adopting multimedia, computer vision, content-based retrieval technologies massively.\u0000 Thus new tools of \"intelligent video analytics\", \"VCA\" (\"video-content-analysis\"), \"smart surveillance\", \"smart forensics\" etc. are invading the Web and the ICT market and many research projects in this area are spreading worldwide.\u0000 This talk aims at presenting the research advances in multimedia and related technologies for people security, that are spreading in applications of real-time video surveillance and off-line analysis of video footage for forensics purposes. In both contexts, two aspects must be taken into account: the data management and the data analysis. In the former aspect, since privacy, legal and security issues are involved, all technology advancements in reliable network transmission, watermarking, secure storing and delivering, transcoding and so on are explored and tailored to the application. In the latter aspect, the research in computer vision, audio analysis, sensor fusion, content-based retrieval, multimedia data mining and metadata analysis are merged with the common goal to extract in real-time or in a very fast way (to cope with the huge amount of data) all the possible knowledge about the scene evidence, the people aspect and the people behavior.\u0000 This talk, after a brief overview of the state-of-the-art, will focus in particular on this second aspect and in particular on the advances and the challenges of research in people detection, people action and activity analysis, behavior and event detection also in crowd scene covered by forest of cameras. Some recent projects of Modena's ImageLab will be presented together with some results in sensor fusion for people identification and tracking.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115073755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deluding image recognition in sift-based cbir systems 基于筛选的模糊图像识别系统
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877977
Thanh-Toan Do, Ewa Kijak, T. Furon, L. Amsaleg
{"title":"Deluding image recognition in sift-based cbir systems","authors":"Thanh-Toan Do, Ewa Kijak, T. Furon, L. Amsaleg","doi":"10.1145/1877972.1877977","DOIUrl":"https://doi.org/10.1145/1877972.1877977","url":null,"abstract":"Content-Based Image Retrieval Systems used in forensics related contexts require very good image recognition capabilities. Therefore they often use the SIFT local-feature description scheme as its robustness against a large spectrum of image distortions has been assessed. In contrast, the security of SIFT is still largely unexplored. We show in this paper that it is possible to conceal images from the SIFT-based recognition process by designing very SIFT-specific attacks. The attacks that are successful in deluding the system remove keypoints and simultaneously forge new keypoints in the images to be concealed. This paper details several strategies enforcing image concealment. A copy-detection oriented experimental study using a database of 100,000 real images together with a state-of-art image search system shows these strategies are effective. This is a very serious threat against systems, endangering forensics investigations.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信