Searched for: subject%3A%22CCTV%22
(1 - 14 of 14)
document
van Rooijen, A.L. (author), Bouma, H. (author), Pruim, R.H.R. (author), Baan, J. (author), Uijens, W.R. (author), van Mil, J.D. (author)
Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to...
conference paper 2020
document
Schutte, K. (author), Burghouts, G. (author), van der Stap, N. (author), Westerwoudt, V.L. (author), Bouma, H. (author), Kruithof, M.C. (author), Baan, J. (author), ten Hove, R.J.M. (author)
The bottleneck in situation awareness is no longer in the sensing domain but rather in the data interpretation domain, since the number of sensors is rapidly increasing and it is not affordable to increase human data-analysis capacity at the same rate. Automatic image analysis can assist a human analyst by alerting when an event of interest...
conference paper 2016
document
Bouma, H. (author), Baan, J. (author), ter Haar, F.B. (author), Eendebak, P.T. (author), den Hollander, R.J.M. (author), Burghouts, G.J. (author), Wijn, R. (author), van den Broek, S.P. (author), van Rest, J.H.C. (author)
In the security domain, cameras are important to assess critical situations. Apart from fixed surveillance cameras we observe an increasing number of sensors on mobile platforms, such as drones, vehicles and persons. Mobile cameras allow rapid and local deployment, enabling many novel applications and effects, such as the reduction of violence...
conference paper 2015
document
van Huis, J.R. (author), Bouma, H. (author), Baan, J. (author), Burghouts, G.J. (author), Eendebak, P.T. (author), den Hollander, R.J.M. (author), Dijk, J. (author), van Rest, J.H.C. (author)
Automatic detection of abnormal behavior in CCTV cameras is important to improve the security in crowded environments, such as shopping malls, airports and railway stations. This behavior can be characterized at different time scales, e.g., by small-scale subtle and obvious actions or by large-scale walking patterns and interactions between...
conference paper 2014
document
Bouma, H. (author), Baan, J. (author), Burghouts, G.J. (author), Eendebak, P.T. (author), van Huis, J.R. (author), Dijk, J. (author), van Rest, J.H.C. (author)
Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature computation and pickpocket recognition. This...
conference paper 2014
document
Marck, J.W. (author), Bouma, H. (author), Baan, J (author), de Oliveira Filho, J. (author), van der Brink, M. (author)
The capability to find individuals using CCTV cameras is important for surveillance applications at large areas such as railway stations, airports and shopping centers. However, it is laborious to track and trace people over multiple cameras post incident. In this paper, we describe the live demonstration of our interactive re-identification...
conference paper 2014
document
Bouma, H. (author), Vogels, J. (author), Aarts, O.A.J. (author), Kruszynski, K.J. (author), Wijn, R. (author), Burghouts, G.J. (author)
Camera surveillance and recognition of deviant behavior is important for the prevention of criminal incidents. A single observation of subtle deviant behavior of an individual may sometimes be insufficient to merit a follow-up action. Therefore, we propose a method that can combine multiple weak observations to make a strong indication that an...
conference paper 2013
document
Bouma, H. (author), Baan, J. (author), Landsmeer, S. (author), Kruszynski, K.J. (author), van Antwerpen, G. (author), Dijk, J. (author)
The capability to track individuals in CCTV cameras is important for e.g. surveillance applications at large areas such as train stations, airports and shopping centers. However, it is laborious to track and trace people over multiple cameras. In this paper, we present a system for real-time tracking and fast interactive retrieval of persons in...
conference paper 2013
document
Bouma, H. (author), Baan, J. (author), Borsboom, S. (author), van Zon, K. (author), Luo, X. (author), Loke, B. (author), Stoeller, B. (author), van Kuilenburg, H. (author), Dijk, J. (author)
To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most relevant and deviant patterns. We present a software...
conference paper 2013
document
Burghouts, G.J. (author), Schutte, K. (author)
Amsterdam, The Netherlands, 27th of May 2010. The national security authorities call out to secure the area around the central train station. 150 Security officers, both military and police, are instructed to guard the area and to pick out those people with hostile intent. Although the officers were very effective in assessing people’s...
conference paper 2011
document
Burghouts, G.J. (author), den Hollander, R. (author), Schutte, K. (author), Marck, J.W. (author), Landsmeer, S. (author), den Breejen, E. (author)
This paper discusses the decomposition of hostile intentions into abnormal behaviors. A list of such behaviors has been compiled for the specific case of public transport. Some of the deviant behaviors are hard to observe by people, as they are in the midst of the crowd. Examples are deviant walking patterns, prohibited actions such as taking...
conference paper 2011
document
van Voorthuijsen, G.P. (author), van Hoof, H.A.J.M. (author), Klima, M. (author), Roubik, K. (author), Bernas, M. (author), Pata, P. (author), TNO Defensie en Veiligheid (author)
The field of CCTV surveillance is topical and widely used in many different applications. The fundamental part of the CCTV system is a reliable image evaluation by a human observer, whose effectiveness is influenced by many variables. Optimization of the effectiveness is a multidimensional problem related to both technical and human...
conference paper 2006
document
van Hoof, H.A.J.M. (author), van Voorthuijsen, G.P. (author), van Calsteren, R. (author)
Welke factoren bepalen de effectiviteit van een centralist die naar CCTV-beelden kijkt? Aan de hand van een onderzoek dat TNO-FEL medio 2002 is gestart moet deze vraag eind 2003 uiterlijk begin 2004 te beantwoorden zijn. Hoe is het onderzoek opgezet?
article 2003
document
van Hoof, H.A.J.M. (author), van Voorthuijsen, G.P. (author)
Veel binnensteden hebben te kampen met een toegenomen onveiligheid, hetgeen maatschappelijke onrust veroorzaakt Dit heeft in diverse plaatsen in Nederland geleid tot programma's en projecten waarnee beoogd wordt de veiligheid op straat te verbetren. De belangrijkste doelstelling die men met deze projecten nastreeft, is het verbeteren van de...
article 2000
Searched for: subject%3A%22CCTV%22
(1 - 14 of 14)