Article Preview
Top1. Introduction
Physical security is unfortunately of prime concern today, and an extensive network of multimodal surveillance and security sensors is prevalent in many places in the world. They range from analogue closed-circuit television (CCTV) systems to sophisticated networks of infra-red and motion sensors in sensitive areas such as banks and museums. The London Underground and London Heathrow Airport have more than 5000 cameras for the purposes of physical security, for example (Valera & Velastin, 2008). Images from these systems are typically transmitted to a control room, where human security officers constantly watch the monitors to guard against physical intruders attempting unauthorized access. As events such as burglary attempts rarely occur, the security officers typically must continuously stare at monotonous images for long stretches of time. Constant alert vigilance for days on end is humanly difficult to maintain. Studies have shown that the optimal concentration spans for a person ranges between 25 and 30 minutes (Noyes & Bransby, 2002). This consequently increases the risk of suspicious activity going unnoticed. In the most unfortunate of situations, given the labour cost involved with hiring the requisite number of human operators to monitor a visual surveillance network, the feeds may be monitored only sparingly, or not at all, often merely serving as an archive to retroactively refer back to once an untoward incident in known to have occurred (Ko, 2008). It is thus important to remove the onus of detecting unwanted intruders from the human security officers with cognitive limits, to an automated system. This was the objective of the first author’s doctoral dissertation (Ahmed, 2013), on which the conference version of this paper was based (Ahmed et al., 2014), and thereby subsequently so is this extension.
The first author’s PhD thesis (Ahmed, 2013) proposed four algorithms where the computational, storage, and memory complexities are independent of time, making them suitable for online use. The thesis proposed the Kernel-based Online Anomaly Detection (KOAD), Kernel Estimation-based Anomaly Detection (KEAD), Kernel Principal Component Analysis (KPCA) and One-Class Neighbour Machine (OCNM) algorithms. This work is the first application of the stated algorithms to the problem of automated surveillance. KOAD (Ahmed et al., 2007) and KEAD (Ahmed, 2009) were initially developed with the problem of online anomaly detection in backbone IP (Internet Protocol) networks in mind. OCNM and KPCA were adapted in (Ahmed, 2013) for intruder detection in surveillance networks.
Results obtained during various stages of progress of this research were reported through timely publications (Ahmed et al., 2010; Ahmed, 2011; Ahmed et al., 2011; Ahmed & Pathan, 2012a; Ahmed et al., 2012; Ahmed & Pathan, 2012b; Ahmed et al., 2013a; Ahmed et al., 2013b; Ahmed & Pathan, 2013; Ahmed et al., 2013; Ahmed et al., 2014). Being a dissertation paper based on the first author’s doctoral research, results from these prior publications are summarised here.
This paper proceeds as follows. Section 2 introduces the basic mathematical principles. Section 3 presents our proposed algorithms. Section 4 describes our experimental setup and Section 5 presents results. Section 6 concludes the paper alongside suggesting future works.