Abstract
A desirable feature in smart cameras is the ability to autonomously detect any tampering event/attack that would prevent a clear view over the monitored scene. No matter whether tampering is due to atmospheric phenomena (e.g., few rain drops over the camera lens) or to malicious attacks (e.g., occlusions or device displacements), these have to be promptly detected to possibly activate countermeasures. Tampering detection is particularly challenging in battery-powered cameras, where it is not possible to acquire images at full-speed frame-rates, nor use sophisticated image-analysis algorithms.
We here introduce a tampering-detection algorithm specifically designed for low-power smart cameras. The algorithm leverages very simple indicators that are then monitored by an outlier-detection scheme: any frame yielding an outlier is detected as tampered. Core of the algorithm is the partitioning of the scene into adaptively defined regions, that are preliminarily defined by segmenting the image during the algorithm-configuration phase, and which shows to improve the detection of camera displacements. Experiments show that the proposed algorithm can successfully operate on sequences acquired at very low-frame rate, such as one frame every minute, with a very small computational complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Merkl, H., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Processing Magazine 22(2), 38–51 (2005)
Aksay, A., Temizel, A., Cetin, A.E.: Camera tamper detection using wavelet analysis for video surveillance. In: IEEE Int. Conf. on Advanced Video and Signal Based Surveillance, AVVS 2007, pp. 558–562. IEEE (2007)
Saglam, A., Temizel, A.: Real-time adaptive camera tamper detection for video surveillance. In: Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2009, pp. 430–435. IEEE (2009)
Gil-Jiménez, P., López-Sastre, R.J., Siegmann, P., Acevedo-Rodríguez, J., Maldonado-Bascón, S.: Automatic control of video surveillance camera sabotage. In: Mira, J., Álvarez, J.R. (eds.) IWINAC 2007. LNCS, vol. 4528, pp. 222–231. Springer, Heidelberg (2007)
Tsesmelis, T., Christensen, L., Fihl, P., Moeslund, T.B.: Tamper detection for active surveillance systems. In: IEEE Int. Conf. on Advanced Video and Signal Based Surveillance, AVVS 2013, pp. 57–62 (2013)
Bay, H., Tuytelaars, T., Van Gool, L.: SURF: speeded up robust features. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006, Part I. LNCS, vol. 3951, pp. 404–417. Springer, Heidelberg (2006)
Ribnick, E., Atev, S., Masoud, O., Papanikolopoulos, N., Voyles, R.: Real-time detection of camera tampering. In: IEEE Int. Conf. on Video and Signal Based Surveillance, AVSS 2006, pp. 10–10 (2006)
Harasse, S., Bonnaud, L., Caplier, A., Desvignes, M.: Automated camera dysfunctions detection. In: IEEE Southwest Symp. on Image Analysis and Interpretation, pp. 36–40 (2004)
Komorkiewicz, T.K.M., Gorgon, M.: FPGA implementation of camera tamper detection in real-time. In: Int. Conf. on Design and Architectures for Signal and Image Processing DASIP, pp. 1–8 (2012)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004)
Alippi, C., Boracchi, G., Camplani, R., Roveri, M.: Detecting external disturbances on the camera lens in wireless multimedia sensor networks. IEEE Trans. on Instr. and Meas. 59(11), 2982–2990 (2010)
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys (CSUR) 41(3), 15 (2009)
Gustafsson, F.: Adaptive Filtering and Change Detection. Wiley, October 2000
Achanta, R., Shaji, A., Smith, K., Lucchi, A., Fua, P., Susstrunk, S.: Slic superpixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 34(11), November
Kottke, D.P., Sun, Y.: Motion estimation via cluster matching. IEEE Transactions on Pattern Analysis and Machine Intelligence 16(11), 1128–1132 (1994)
Caliński, T., Harabasz, J.: A dendrite method for cluster analysis. Communications in Statistics-theory and Methods 3(1), 1–27 (1974)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Gaibotti, A., Marchisio, C., Sentinelli, A., Boracchi, G. (2015). Tampering Detection in Low-Power Smart Cameras. In: Iliadis, L., Jayne, C. (eds) Engineering Applications of Neural Networks. EANN 2015. Communications in Computer and Information Science, vol 517. Springer, Cham. https://doi.org/10.1007/978-3-319-23983-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-23983-5_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23981-1
Online ISBN: 978-3-319-23983-5
eBook Packages: Computer ScienceComputer Science (R0)