Kien A. Hua Division of Computer Science University of Central Florida.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Spatial Database Systems. Spatial Database Applications GIS applications (maps): Urban planning, route optimization, fire or pollution monitoring, utility.
Activity Recognition Aneeq Zia. Agenda What is activity recognition Typical methods used for action recognition “Evaluation of local spatio-temporal features.
Visual Event Detection & Recognition Filiz Bunyak Ersoy, Ph.D. student Smart Engineering Systems Lab.
Image Indexing and Retrieval using Moment Invariants Imran Ahmad School of Computer Science University of Windsor – Canada.
Watching Unlabeled Video Helps Learn New Human Actions from Very Few Labeled Snapshots Chao-Yeh Chen and Kristen Grauman University of Texas at Austin.
ICIP 2000, Vancouver, Canada IVML, ECE, NTUA Face Detection: Is it only for Face Recognition?  A few years earlier  Face Detection Face Recognition 
Event prediction CS 590v. Applications Video search Surveillance – Detecting suspicious activities – Illegally parked cars – Abandoned bags Intelligent.
The Science of Digital Media Microsoft Surface 7May Metropolia University of Applied Sciences Display Technologies Seminar.
SMM5101 (ADVANCED MULTIMEDIA PROGRAMMING) Review of Multimedia Programming.
ADVISE: Advanced Digital Video Information Segmentation Engine
A Bayesian algorithm for tracking multiple moving objects in outdoor surveillance video Department of Electrical Engineering and Computer Science The University.
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
Robust Real-time Object Detection by Paul Viola and Michael Jones ICCV 2001 Workshop on Statistical and Computation Theories of Vision Presentation by.
MVL (Machine Vision Lab) UIC HUMAN MOTION VIDEO DATABASE Jezekiel Ben-Arie ECE Department University Of Illinois at Chicago Scripts, Queries, Recognition.
CS292 Computational Vision and Language Visual Features - Colour and Texture.
Project IST_1999_ ARTISTE – An Integrated Art Analysis and Navigation Environment Review Meeting N.1: Paris, C2RMF, November 28, 2000 Workpackage.
A fuzzy video content representation for video summarization and content-based retrieval Anastasios D. Doulamis, Nikolaos D. Doulamis, Stefanos D. Kollias.
Remote Surveillance System Presented by: Robarin Holdings Limited Telephone: Facsimile:
Real Time Abnormal Motion Detection in Surveillance Video Nahum Kiryati Tammy Riklin Raviv Yan Ivanchenko Shay Rochel Vision and Image Analysis Laboratory.
Microsoft Visual Basic 2012 CHAPTER ONE Introduction to Visual Basic 2012 Programming.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
What’s Making That Sound ?
Abstract Some Examples The Eye tracker project is a research initiative to enable people, who are suffering from Amyotrophic Lateral Sclerosis (ALS), to.
Spatial Database Souhad Daraghma.
Kien A. Hua Data Systems Lab Division of Computer Science University of Central Florida.
Chapter 7 Web Content Mining Xxxxxx. Introduction Web-content mining techniques are used to discover useful information from content on the web – textual.
Multimedia Information Retrieval and Multimedia Data Mining Chengcui Zhang Assistant Professor Dept. of Computer and Information Science University of.
Characterizing activity in video shots based on salient points Nicolas Moënne-Loccoz Viper group Computer vision & multimedia laboratory University of.
Introduction to Apache OODT Yang Li Mar 9, What is OODT Object Oriented Data Technology Science data management Archiving Systems that span scientific.
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
Implementing Codesign in Xilinx Virtex II Pro Betim Çiço, Hergys Rexha Department of Informatics Engineering Faculty of Information Technologies Polytechnic.
Stylization and Abstraction of Photographs Doug Decarlo and Anthony Santella.
Agenda Motion Imagery Challenges Overview of our Cloud Activities -Big Data -Large Data Implementation Lessons Learned Summary.
December 9, 2014Computer Vision Lecture 23: Motion Analysis 1 Now we will talk about… Motion Analysis.
Leonardo Guerreiro Azevedo Geraldo Zimbrão Jano Moreira de Souza Approximate Query Processing in Spatial Databases Using Raster Signatures Federal University.
A survey of different shape analysis techniques 1 A Survey of Different Shape Analysis Techniques -- Huang Nan.
Event retrieval in large video collections with circulant temporal encoding CVPR 2013 Oral.
March 31, 1998NSF IDM 98, Group F1 Group F Multi-modal Issues, Systems and Applications.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
Segmentation of Vehicles in Traffic Video Tun-Yu Chiang Wilson Lau.
Implementation of a Relational Database as an Aid to Automatic Target Recognition Christopher C. Frost Computer Science Mentor: Steven Vanstone.
Content-Based Image Retrieval QBIC Homepage The State Hermitage Museum db2www/qbicSearch.mac/qbic?selLang=English.
Semantic Extraction and Semantics-Based Annotation and Retrieval for Video Databases Authors: Yan Liu & Fei Li Department of Computer Science Columbia.
Big traffic data processing framework for intelligent monitoring and recording systems 學生 : 賴弘偉 教授 : 許毅然 作者 : Yingjie Xia a, JinlongChen a,b,n, XindaiLu.
2/20: Ch. 6 Data Management What is data? How is it stored? –Traditional management storage techniques; problems –DBMS.
Multimedia Systems and Communication Research Multimedia Systems and Communication Research Department of Electrical and Computer Engineering Multimedia.
Privacy-Enhanced Web Service Composition. Abstract Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources.
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
WBI/WCI - SKM 14 July Analysis and Knowledge Extraction from Video & Audio Rick Parent Jim Davis Raghu Machiraju Deleon Wang Department of Computer.
Lecture Capture: Student Perceptions, Expectations, and Behaviors Jack Barokas, Tel Aviv University Terena Networking Conference.
Date of download: 7/8/2016 Copyright © 2016 SPIE. All rights reserved. A scalable platform for learning and evaluating a real-time vehicle detection system.
Introduction to Spatial Computing CSE 555
Naifan Zhuang, Jun Ye, Kien A. Hua
Danfoss Visual Inspection System
IP Speed Dome Solution 2006-Feb-22.
Visual Information Retrieval
Hiba Tariq School of Engineering
NUUO Tools Welcome to NUUO general education service. This session allows users to have the overview of NUUO tools for system design. (Click)
Supervised Time Series Pattern Discovery through Local Importance
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
Geometric Hashing: An Overview
A Similarity Retrieval System for Multimodal Functional Brain Images
Multimedia Information Retrieval
Title of poster... M. Author1, D. Author2, M. Author3
Title of ePoster... M. Author1, D. Author2, M. Author3
Example of Event-Based Video Data (Touch-down Scenario)
Presentation transcript:

Kien A. Hua Division of Computer Science University of Central Florida

Live Video Computing (LVC) Data Systems Group, Department of Electrical Engineering and Computer Science 2 Conventional Computing Process data captured on disks Live Video Computing Process live video feeds

Platform for Software Development Data Systems Group, Department of Electrical Engineering and Computer Science 3 Current Approach: Customized software development Proposal: A Live Video Database Management System (LVDBMS) Motivation: A general platform enables rapid development of LVC applications much like database applications are developed today A special class of storage

We focus on Video Surveillance Data Systems Group, Department of Electrical Engineering and Computer Science 4

Video Surveillance Challenge  Problem: who is watching them Impractical to scale number of human operators as the number of cameras increases Issues include fatigue, taking breaks, distraction, …  Traditional video processing solutions are vertical applications e.g., a traffic monitoring application cannot be used to monitor patients in a hospital Data Systems Group, Department of Electrical Engineering and Computer Science 5 Cost effective to deploy many cameras Numerous live video streams

6 Domain-Specific Systems IP 1 SP 1 IP 2IP 3 SP 2SP 3 IP: Image Processor SP: Surveillance Processor Application specific, limited or no programming support A specific set of known cameras Observation Sharing similar underlying software Observation Sharing similar underlying software Systems customized for different applications

Live video streams as database content 7 LVDBMS Approach IP 1 SP 1 IP 2IP 3 SP 2SP 3 IP Different user groups share the cameras for different purposes IP: Image ProcessorSP: Surveillance Processor Query interface LVDBMS Programmable, not application specific

Cross-Camera Object Tracking  Object tracking is essential to a LVDBMS  Standard face recognition techniques Computationally expensive and may not be suitable for real-time applications Video frames may not have enough resolution for face analysis  Observation: We typically want to recognize reappearance of objects within minutes or hours Comparing overall appearance of objects is a much easier task Data Systems Group, Department of Electrical Engineering and Computer Science 8

Informatics-based Approach Data Systems Group, Department of Electrical Engineering and Computer Science 9 LOCATION ALOCATION B Insert at time t 1 Live Database Jane moves from A to B  A new object is used to retrieve similar objects recently captured by the database system  By logging the sequence in which the different cameras detect the same object we can track its trajectory Jane = Retrieve at time t 2

Object Representation Data Systems Group, Department of Electrical Engineering and Computer Science 10 Each snapshot of an object is represented as a visual feature vector (i.e., a point in the multidimensional space) Each object is represented as a point set allowing multiple views/orientations to contribute to representation Multifaceted Object Model

Object Feature Extraction  Object detected and segmented in stream  Feature vectors (FVs) extracted from sample frames  Object represented as bag of feature vectors over time in stream Data Systems Group, Department of Electrical Engineering and Computer Science 11 Video frames FV A point set Sample frame Window for point set extraction

Object Comparison Let X and X’ be two bags (point sets) Data Systems Group, Department of Electrical Engineering and Computer Science 12 Minimum sums of pairwise distances Squared distance

m: Matching Cardinality m = 1m = 2m = 3 A point set can be viewed as a polygon k is the cardinality of the bags. m ≤ k is the matching cardinality. It controls the number of facets considered by the system.

Dual-Layer Computation Framework Data Systems Group, Department of Electrical Engineering and Computer Science 14 Motion Imagery Processor Stream Processor Query results Process spatial operations over abstract objects to convert real-time imagery information into bit streams Process temporal operations over bit streams to detect events, i.e., correlate objects across video streams to detect complex events Camera as a special class of storage system A live video database management system

Distributed Live Video Database 15 Hardware Environment Query Results

16 Event Model – Spatial Event  Spatial event E s (t 1 ) = disjoint(O i (t 1 ), O j (t 1 ))  Spatial event stream Stream of spatial events on two objects E s = {T, T, T, T, T, T, F, F, F} o E s (t 1 ) = TE s (t 2 ) = TE s (t 3 ) = T E s (t 4 ) = T E s (t 5 ) = T E s (t 7 ) = F E s (t 6 ) = T E s (t 8 ) = F E s (t 9 ) = F Snapshot of an object

17 Event Model – Composite Event E c → E s | T o (E c1, E c2 ) | L o (E c1, E c2 ) Spatial Event e.g., Overlap(O 1, O 2 ) Temporal Operator e.g., before(E s1, E s2 ) Logical Operator e.g., E s1 and E s2 Composite Event

18 Query language ACTION ON EVENT E.g., archive the video for the last 15 minutes An event composition expression Processing window, e.g., last 15 minutes

19 Query Translation during before overlap o1 o2 overlap o3 o4 contains o1 o2 appears o3 (overlap(v1.o1,v1.o2) and overlap(v1.o3, v1.04)) before (contains(v2.o1, v2.o2) during appear(v2.03)) last 1000 Parse the expression to construct the execution tree Logical operator Temporal operator Spatial operator

20 Query Processing: Dual Layers Video Processor Stream Processor Results Convert video information into bit streams Process the bit streams to detect complex events

21 Distributed Processing Query (overlap(v1.o1, v1.o2) and overlap(v1.o3, v1.o4)) before (contains(v2.o1, v2.o2) during appears(v2.o3)) 1000 Query translation Sub-query results Further processing Results Sub-queries

Privacy Filters  Privacy filters can be defined using a privacy specification language  Privacy filters can be used to implement privacy policies – when and under what circumstances the identity of an individual may be observed or recorded  Privacy filters can be declared at the different levels of the system hierarchy, e.g., at the individual camera level or associated with specific queries or users

Privacy Views vs. Relational Views 23 IDNameAddress 12Fred12 East Bullard IDName 12Fred Physical table Table1 Name Fred View 1 defined from Table1 View2 defined from View1 F2F2 Terminal 1 F1F1 Terminal 2Terminal 3 User Without Privacy Filter User Privacy Filter Query Privacy Filter Video Stream F1F1 Privacy Filter 1 F2F2 Privacy Filter 2

Privacy Filter Examples 24 Video observed by all users Video observed by User 2 Removed from all consumers of this camera Plaque redacted from view of all users All moving objects hidden from User 2

Privacy Certification Having a standardized privacy specification language is an important step toward privacy certification A privacy specification language allows for a formal way to design, verify, test, and deploy privacy policies

Let me know when someone uses my laptop computers at home User Interface

LVDBMS: Summary  Object Tracking The multifaceted object model is more indicative of the objects The informatics-based approach to object tracking is effective. It does not require assumptions such as known topography or boundaries (walls, roads, etc.)  LVDBMS provides a general platform for live video computing A variety of video surveillance applications can be quickly developed atop the LVDBMS much like many applications are developed using a DBMS today  Current Limitation Limited object recognition capability Data Systems Group, Department of Electrical Engineering and Computer Science 27