Beruflich Dokumente
Kultur Dokumente
Keywords: Closed-circuit television, surveillance, audit and presenting observed results as evidence in
image processing, security, vehicle tracking, crowd- legal proceedings.
monitoring. Early steps in this development were to add manual
camera control (pan, tilt and zoom) in order to track
events or objects of particular types. As the number of
1. INTRODUCTION cameras in each system increased, they first exceeded
The installation of closed circuit television (CCTV) the number of monitoring screens (so requiring
cameras in urban environments is now commonplace sequential switching) and then exceeded the capability
and well-known. Public attitudes to these systems are in of the observing teams to watch events effectively.
two opposing categories: Their attention span is inevitably limited [1]. Adding
(a) concerns over invasion of privacy and fears of computational intelligence to alert the observers to the
authoritarian control of the population infrequent image sequences which contained events of
(b) welcoming the increased safety in public spaces possible importance was thus a natural development as
and reductions in antisocial behaviour. computing resources became both cheaper and more
Fears in category (a) are not surprising, since powerful.
within living memory, and in some cases until recently, The need for video recording arose to relieve the
there have been countries in Europe governed by observers from overload, to provide an audit capability
regimes with a strong commitment to the oppressive and for detailed studies of images leading up to an
monitoring and control of their citizens, and the incident Colour, including the use of infrared imaging,
continuous tracking of actual or supposed ‘dissidents’. has in many cases replaced monochrome, and digital
Support for category (b) arises from public encoding with compression, for storage and/or
concerns over both real and imagined risks of urban transmission, has become economical.
crime and terrorism. Controlling anti-social behaviour The availability of many powerful computers
and protection against terrorist threats is generally within the overall surveillance system has enabled the
perceived to have a high priority, making intrusive required increased automation, with the use of
monitoring relatively acceptable and encouraging the ‘computer intelligence’ to detect and analyse significant
installation of advanced surveillance systems. Recent events and alert human observers when appropriate.
uses of the phrase ‘homeland security’, and plans for Detection thresholds usually need to be biased in favour
technologically-advanced personal ID cards has made of false positives, since these can usually be quickly
this a topical issue. recognised and disregarded by a human observer,
Forms of visual monitoring which were once the whereas missing real incidents could be a serious
exclusive domain of well-funded secretive government deficiency.
security agencies are becoming readily available at an Decreasing cost and increasing processing
affordable cost to the public, and very sophisticated capability has made distributed multi-computer systems
systems are being developed and installed for general feasible and affordable, and able to include a significant
police uses. amount of pre-processing of images ‘per camera’ (as
opposed to sending the raw video data to a centralised
processor). Image compression methods have advanced
2. HISTORICAL STAGES OF DEVELOPMENT considerably, so that the data rates and storage required
CCTV based surveillance has developed from can be substantially reduced. Adoption of very efficient
simple systems comprising a camera connected directly but lossy image compression methods is not always
to a viewing screen with an observer in a control room, acceptable because of fears that the images may then be
watching for incidents of crime or vandalism or challenged and not be accepted as evidence in legal
searching for targeted individuals, to complex multi- proceedings.
camera systems with many computers. The computers When video recordings from CCTV systems are
carry out image processing, object recognition and required for legal purposes, it is necessary to ensure the
scene analysis, prior to presenting data to observers. feasibility of an independent and authenticated audit,
Sophisticated recording and playback techniques can be without which such recordings cannot be used as
provided, with searching capabilities, and suitable for evidence in court proceedings. Recorded image-
sequences associated with criminal events can often be
page 2 of 6
subjected to advanced off-line image enhancement Compensation is needed for the different apparent
methods, making it easier to identify the particular size of objects at various distances. Calibration for
individuals involved in the crime. Searching large camera angle is also essential. Variation of lighting
amounts of recorded video data may be required in levels and directions presents many problems to be
order to try to find other scenes containing the same overcome. In many monitoring situations in public
individuals. spaces, the cameras have to be mounted in places which
CCTV surveillance systems are required to have give very oblique images, making image interpretation
high availability and run continuously, and yet be more difficult.
extendible. For example, adding cameras and By monitoring density, it is possible to set
computing resources is often desired, but may need to thresholds above which safety might be endangered
be done without taking the existing system out of (Fig. 2). For example, entry to city-centre rail stations
operation. may have to be periodically closed during rush-hours in
A British newspaper reported in 2004 that over order to keep crowd density on platforms at a safe level.
four million CCTV cameras were deployed in the UK
[2]
(a) (b)
Fig. 3(a) Extracted motion-vector field –
Fig. 1 Pedestrian extraction from crowd-scene (from [5])
arrows show direction of motion
(a) ‘edges’ of pedestrians (b) area of pedestrians
page 3 of 6
Block matching is an alternative effective same vehicle at position x2 at time t2 immediately
technique. Typically, a rectangular block of pixels provides a lower bound for the velocity of travel
around a selected pixel in the first image is compared between these two points of distance(x1,x2)/(t2-t1). If
with a larger search block around the same pixel in the that is greater than the speed limit, then it can be
second image. concluded that the vehicle has exceeded the limit. Thus
with a complex network of cameras capable of
identifying particular vehicles (e.g. by registration
numbers) it is possible to detect extreme speed
violations without measuring speed, even when the
vehicles are moving within the junctions of a complex
highway network. Installing such systems has
implications for civil liberties, since the same data
provides information on the movements of particular
vehicles, and therefore has the potential to be used
(misused) to track individuals.
There is now considerable government interest in
the enhancement of such capabilities, for such
applications as ‘congestion charging’ (automatically
billing the owners of vehicles which are observed
Fig 3(b) Polar velocity plot derived from a travelling within city centres during chargeable periods
crowd flow estimate [5] of time) and ‘automated road pricing’ (toll-collection
with no toll-booths).
All pixel blocks in the search area are compared
with the one in the first image, and the one with greatest
similarity is used as an indicator of the estimated 5. PUBLIC ACCEPTANCE AND INVOLVEMENT
movement direction and speed (Fig 3(a)). An overview In most countries, cameras in public areas are not
of the movement may be obtained by a polar velocity now considered an invasion of privacy. They are a
plot (Fig.3(b)), which also enables unusual flows to be common sight at highway junctions, pedestrian
detected automatically (for example, a group of crossings and traffic-signal locations (for traffic
pedestrians moving very quickly in a non-standard monitoring) and in city centres, shopping malls, airports
direction). and rail stations (for person monitoring). The trends are
towards smaller cameras, which may not be readily
3.3 Detecting Unusual Behaviour visible (sometimes augmented by highly-visible dummy
Detection of individuals who remain in one place cameras to mislead criminals).
for long periods while surrounding crowds are moving, There is now public awareness and acceptance of
or of individuals moving in a different direction from ‘webcams’ observing places of interest and supplying
the majority, may be a potential indication of planned or images to the internet on a continuous basis. It is
actual criminal behaviour. Automatic detection of such becoming affordable to install internet-connected
events in the image sequences from a CCTV system cameras in and around the home, so that remote viewing
may be used to alert human observers, who can then is possible while away on vacation, etc. to provide
decide if the events are significant. Tracking of specific reassurance that the house has not burnt down, been
individuals is also possible. Distinguishing approaching flooded, or broken into by thieves. Of course making
and receding pedestrians (for example by automatic this data available over the internet does open a risk of
marking with different coloured tags) may be interception.
operationally useful.