Skip to main content

Tampering Detection in Low-Power Smart Cameras

  • Conference paper
  • First Online:
Engineering Applications of Neural Networks (EANN 2015)

Abstract

A desirable feature in smart cameras is the ability to autonomously detect any tampering event/attack that would prevent a clear view over the monitored scene. No matter whether tampering is due to atmospheric phenomena (e.g., few rain drops over the camera lens) or to malicious attacks (e.g., occlusions or device displacements), these have to be promptly detected to possibly activate countermeasures. Tampering detection is particularly challenging in battery-powered cameras, where it is not possible to acquire images at full-speed frame-rates, nor use sophisticated image-analysis algorithms.

We here introduce a tampering-detection algorithm specifically designed for low-power smart cameras. The algorithm leverages very simple indicators that are then monitored by an outlier-detection scheme: any frame yielding an outlier is detected as tampered. Core of the algorithm is the partitioning of the scene into adaptively defined regions, that are preliminarily defined by segmenting the image during the algorithm-configuration phase, and which shows to improve the detection of camera displacements. Experiments show that the proposed algorithm can successfully operate on sequences acquired at very low-frame rate, such as one frame every minute, with a very small computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Merkl, H., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Processing Magazine 22(2), 38–51 (2005)

    Article  Google Scholar 

  2. Aksay, A., Temizel, A., Cetin, A.E.: Camera tamper detection using wavelet analysis for video surveillance. In: IEEE Int. Conf. on Advanced Video and Signal Based Surveillance, AVVS 2007, pp. 558–562. IEEE (2007)

    Google Scholar 

  3. Saglam, A., Temizel, A.: Real-time adaptive camera tamper detection for video surveillance. In: Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2009, pp. 430–435. IEEE (2009)

    Google Scholar 

  4. Gil-Jiménez, P., López-Sastre, R.J., Siegmann, P., Acevedo-Rodríguez, J., Maldonado-Bascón, S.: Automatic control of video surveillance camera sabotage. In: Mira, J., Álvarez, J.R. (eds.) IWINAC 2007. LNCS, vol. 4528, pp. 222–231. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Tsesmelis, T., Christensen, L., Fihl, P., Moeslund, T.B.: Tamper detection for active surveillance systems. In: IEEE Int. Conf. on Advanced Video and Signal Based Surveillance, AVVS 2013, pp. 57–62 (2013)

    Google Scholar 

  6. Bay, H., Tuytelaars, T., Van Gool, L.: SURF: speeded up robust features. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006, Part I. LNCS, vol. 3951, pp. 404–417. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Ribnick, E., Atev, S., Masoud, O., Papanikolopoulos, N., Voyles, R.: Real-time detection of camera tampering. In: IEEE Int. Conf. on Video and Signal Based Surveillance, AVSS 2006, pp. 10–10 (2006)

    Google Scholar 

  8. Harasse, S., Bonnaud, L., Caplier, A., Desvignes, M.: Automated camera dysfunctions detection. In: IEEE Southwest Symp. on Image Analysis and Interpretation, pp. 36–40 (2004)

    Google Scholar 

  9. Komorkiewicz, T.K.M., Gorgon, M.: FPGA implementation of camera tamper detection in real-time. In: Int. Conf. on Design and Architectures for Signal and Image Processing DASIP, pp. 1–8 (2012)

    Google Scholar 

  10. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  11. Alippi, C., Boracchi, G., Camplani, R., Roveri, M.: Detecting external disturbances on the camera lens in wireless multimedia sensor networks. IEEE Trans. on Instr. and Meas. 59(11), 2982–2990 (2010)

    Article  Google Scholar 

  12. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys (CSUR) 41(3), 15 (2009)

    Article  Google Scholar 

  13. Gustafsson, F.: Adaptive Filtering and Change Detection. Wiley, October 2000

    Google Scholar 

  14. Achanta, R., Shaji, A., Smith, K., Lucchi, A., Fua, P., Susstrunk, S.: Slic superpixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 34(11), November

    Google Scholar 

  15. Kottke, D.P., Sun, Y.: Motion estimation via cluster matching. IEEE Transactions on Pattern Analysis and Machine Intelligence 16(11), 1128–1132 (1994)

    Article  Google Scholar 

  16. Caliński, T., Harabasz, J.: A dendrite method for cluster analysis. Communications in Statistics-theory and Methods 3(1), 1–27 (1974)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giacomo Boracchi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Gaibotti, A., Marchisio, C., Sentinelli, A., Boracchi, G. (2015). Tampering Detection in Low-Power Smart Cameras. In: Iliadis, L., Jayne, C. (eds) Engineering Applications of Neural Networks. EANN 2015. Communications in Computer and Information Science, vol 517. Springer, Cham. https://doi.org/10.1007/978-3-319-23983-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23983-5_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23981-1

  • Online ISBN: 978-3-319-23983-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics