skip to main content
research-article

An Autonomous System for Efficient Control of PTZ Cameras

Published:04 March 2022Publication History
Skip Abstract Section

Abstract

This article addresses the research problem of how to autonomously control Pan/Tilt/Zoom (PTZ) cameras in a manner that seeks to optimize the face recognition accuracy or the overall threat detection and proposes an overall system. The article presents two alternative schemes for camera scheduling: Grid-Based Grouping (GBG) and Elevator-Based Planning (EBP). The camera control works with realistic 3D environments and considers many factors, including the direction of the subject’s movement and its location, distances from the cameras, occlusion, overall recognition probability so far, and the expected time to leave the site, as well as the movements of cameras and their capabilities and limitations. In addition, the article utilizes clustering to group subjects, thereby enabling the system to focus on the areas that are more densely populated. Moreover, it proposes a dynamic mechanism for controlling the pre-recording time spent on running the solution. Furthermore, it develops a parallel algorithm, allowing the most time-consuming phases to be parallelized, and thus run efficiently by the centralized parallel processing subsystem. We analyze through simulation the effectiveness of the overall solution, including the clustering approach, scheduling alternatives, dynamic mechanism, and parallel implementation in terms of overall recognition probability and the running time of the solution, considering the impacts of numerous parameters.

REFERENCES

  1. [1] Benetti Michele, Gottardi Massimo, Mayr Tobias, and Passerone Roberto. 2018. A low-power vision system with adaptive background subtraction and image segmentation for unusual event detection. IEEE Transactions on Circuits and Systems I: Regular Papers 65, 11 (2018), 38423853.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Bochkovskiy Alexey, Wang Chien-Yao, and Liao Hong-Yuan Mark. 2020. YOLOv4: Optimal speed and accuracy of object detection. CoRR abs/2004.10934. arXiv: 2004.10934. Retrieved from https://arxiv.org/abs/2004.10934v1.Google ScholarGoogle Scholar
  3. [3] Boom Bastiaan J., Beumer G. M., Spreeuwers Luuk, and Veldhuis Raymond N. J.. 2006. The effect of image resolution on the performance of a face recognition system. In Proceedings of International Conference on Control, Automation, Robotics and Vision. 16.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Deng Jiankang, Guo Jia, Xue Niannan, and Zafeiriou Stefanos. 2019. ArcFace: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Dollár, Wojek Christian, Schiele Bernt, and Perona Pietro. 2009. Pedestrian detection: A benchmark. In Proceedings of Computer Vision and Pattern Recognition conference.Google ScholarGoogle Scholar
  6. [6] Esterle Lukas. 2017. Centralised, decentralised, and self-organised coverage maximisation in smart camera networks. In Proceedings of the 2017 IEEE 11th International Conference on Self-Adaptive and Self-Organizing Systems. 110.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Forsyth David A. and Ponce Jean. 2011. Computer Vision: A Modern Approach (Second Edition). Pearson.Google ScholarGoogle Scholar
  8. [8] Gross Ralph, Baker Simon, Matthews Iain, and Kanade Takeo. 2011. Face recognition across pose and illumination. In Handbook of Face Recognition, Li Stan Z. and Jain Anil K. (Eds.). Springer London, London, 197–221. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Hamandi Hayder and Sarhan Nabil J.. 2020. QRMODA and BRMODA: Novel analytical models of face recognition accuracy in terms of video capturing and encoding parameters. In Proceedings of the IEEE International Conference on Multimedia and Expo (July 2020). 16.Google ScholarGoogle Scholar
  10. [10] Kaur Jaskaranjit and Singh Harpreet. 2015. Performance evaluation of a novel hybrid clustering algorithm using birch and k-means. In Proceeding of the Annual IEEE India Conference. 16.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Kim Dongchil, Kim Kyoungman, and Park Sungjoo. 2019. Automatic PTZ camera control based on deep-q network in video surveillance system. In Proceeding of the International Conference on Electronics, Information, and Communication. 13.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Krahnstoever Nils, Yu Ting, Lim Ser-Nam, Patwardhan Kedar, and Tu Peter. 2008. Collaborative real-time control of active cameras in large scale surveillance systems. In Proceedings of the Workshop on Multi-camera and Multi-modal Sensor Fusion Algorithms and Applications.Google ScholarGoogle Scholar
  13. [13] Lewis Peter R., Esterle Lukas, Chandra Arjun, Rinner Bernhard, Torresen Jim, and Yao Xin. 2015. Static, dynamic, and adaptive heterogeneity in distributed smart camera networks. ACM Transactions on Autonomous and Adaptive Systems 10, 2, (June 2015), 30 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Lin Chih-Wei, Chen Kuan-Wen, Chen Shen-Chi, Chen Cheng-Wu, and Hung Yi-Ping. 2015. Large-area, multilayered, and high-resolution visual monitoring using a dual-camera system. In Proceeding of the ACM Transactions on Multimedia Computing, Communications, and Applications. 123.Google ScholarGoogle Scholar
  15. [15] Liu Weiyang, Wen Yandong, Yu Zhiding, Li Ming, Raj Bhiksha, and Song Le. 2017. SphereFace: Deep hypersphere embedding for face recognition. In Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition, Vol. 1. 1.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Maimon Oded Z. and Rokach Lior. 2005. Data Mining and Knowledge Discovery Handbook. Springer.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Mali Goutam and Misra Sudip. 2017. Topology management-based distributed camera actuation in wireless multimedia sensor networks. ACM Transactions on Autonomous and Adaptive Systems 12, 1, (April 2017), 33 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Mallikarjuna Chindukuri and Babu P. Chitti. 2016. Performance analysis of disk scheduling algorithms. International Journal of Computer Sciences and Engineering 4, 5 (2016), 180184.Google ScholarGoogle Scholar
  19. [19] Neves Joao C. and Proena Hugo. 2015. Dynamic camera scheduling for visual surveillance in crowded scenes using Markov random fields. In Proceeding of the IEEE International Conference on Advanced Video and Signal Based Surveillance. 16.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Piciarelli Claudio, Esterle Lukas, Khan Asif, Rinner Bernhard, and Foresti G. L.. 2015. Dynamic reconfiguration in camera networks: A short survey. IEEE Transactions on Circuits and Systems for Video Technology 26, 5 (2015), 965–977. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Piciarelli Claudio, Micheloni Christian, and Foresti Gian Luca. 2010. Occlusion-aware multiple camera reconfiguration. In Proceedings of the IEEE International Conference on Distributed Smart Cameras. 8894.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Rahman Khalidur, Ghani Noraida Abdul, Kamil Anton Abdulbasah, Mustafa Adli, and Chowdhury Md Ahmed Kabir. 2013. Modeling pedestrian travel time and the design of facilities: A queuing approach. PloS One 8, 5 (2013), e63503.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Schroff Florian, Kalenichenko Dmitry, and Philbin James. 2015. FaceNet: A unified embedding for face recognition and clustering. In Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition. 815823.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Thomas Sinnu S., Gupta Sumana, and Subramanian Venkatesh K.. 2017. Smart surveillance based on video summarization. In Proceeding of IEEE Region 10 Symposium. 15.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Xu Yiliang and Song Dezhen. 2010. Systems and algorithms for autonomous and scalable crowd surveillance using robotic PTZ cameras assisted by a wide-angle camera. Autonomous Robots 29, 1 (2010), 5366.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Yao Yi, Abidi Besma R., Kalka Nathan D., Schmid Natalia A., and Abidi Mongi A.. 2008. Improving long range and high magnification face recognition: Database acquisition, evaluation, and enhancement. Computer Vision and Image Understanding 111, 2 (August 2008), 111125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Zeng Jinhua, Zeng Jinfeng, and Qiu Xiulian. 2017. Deep learning based forensic face verification in videos. In Proceeding of the International Conference on Progress in Informatics and Computing. 7780.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Zhou Xuhui, Collins Robert T., Kanade Takeo, and Metes Peter. 2003. A master-slave system to acquire biometric imagery of humans at distance. In Proceedings of the ACM SIGMM International Workshop on Video Surveillance. ACM, New York, NY, 113120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Zhou Zihan, Wagner Andrew, Mobahi Hossein, Wright John, and Ma Yi. 2009. Face recognition with contiguous occlusion using markov random fields. In Proceedings of the IEEE International Conference on Computer Vision. 1050 –1057.Google ScholarGoogle Scholar

Index Terms

  1. An Autonomous System for Efficient Control of PTZ Cameras

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Autonomous and Adaptive Systems
        ACM Transactions on Autonomous and Adaptive Systems  Volume 16, Issue 2
        June 2021
        83 pages
        ISSN:1556-4665
        EISSN:1556-4703
        DOI:10.1145/3514173
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 March 2022
        • Accepted: 1 December 2021
        • Revised: 1 October 2021
        • Received: 1 September 2020
        Published in taas Volume 16, Issue 2

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!