Skip to main content

Surveillance Data Capturing and Compression

  • Chapter
  • First Online:
Introduction to Intelligent Surveillance
  • 677 Accesses

Abstract

In this chapter, we will introduce surveillance data capturing using Finite State Machine (FSM) and critically evaluate the major technology of surveillance data compression. FSM has been used in the case of transmissions between different states within a system. It is important to study FSM in intelligent surveillance because FSM is an approach to bridge the gap between our real world and semantic space by using events. Moreover, a surveillance system records monitoring data all day long; to effectively tackle the input data of surveillance systems, technologies of data compression are indispensable which will be detailed at the second half of this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akazawa, Y., Okada, Y., Niijima, K. (2002). Real-time video based motion captured system based on color and edge distributions. In IEEE ICME (pp. 333–336).

    Google Scholar 

  2. Anderson, R. (2008). Security engineering. Indianapolis: Wiley.

    Google Scholar 

  3. Bhuyan, M. K. (2012). FSM-based recognition of dynamic hand gestures via gesture summarization using key video object planes. International Journal of Computer and Communication Engineering, 6, 248–259.

    Google Scholar 

  4. Black, P. (2008). Finite state machine. Dictionary of algorithms and data structures. U.S. National Institute of Standards and Technology.

    Google Scholar 

  5. Cover, T., & Thomas, J. (2006). Elements of information theory (2nd ed.). Hoboken: Wiley.

    MATH  Google Scholar 

  6. Devadze, S., & Sudnitson, A. (2008). Software environment for synthesis of testable FSM through decomposition. In Microelectronics (pp. 433–436)

    Google Scholar 

  7. Djordjevic, L., Stankovic, R., & Stojcev, K. (2005). Concurrent error detection in FSMs using transition checking technique. In International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (pp. 61–64).

    Google Scholar 

  8. Doi, T., Itoh, T., & Ogawa, H. (1979). A long-play digital audio disk system. JAES, 27(12), 975–981

    Google Scholar 

  9. Drineas, P., & Makris, Y. (2002). Non-intrusive design of concurrently self-testable FSMs. In Proceedings of the 11th Asian Test Symposium (pp. 33–38).

    Google Scholar 

  10. Dufaux, F., & Ebrahimi, T. (2008). H.264/AVC video scrambling for privacy protection. In IEEE ICIP (pp. 1688–1691).

    Google Scholar 

  11. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. Boston: MIT Press.

    MATH  Google Scholar 

  12. Gurevich, Y. (2000). Sequential abstract state machines capture sequential algorithms. ACM Transactions on Computational Logic, 1(1), 77–111.

    Article  MathSciNet  MATH  Google Scholar 

  13. Kieran, D., & Yan, W. (2010). A framework for an event driven video surveillance system. In IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) (pp. 97–102).

    Google Scholar 

  14. Klette, R. (2014). Concise computer vision. London: Springer.

    Book  MATH  Google Scholar 

  15. LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521, 436–444.

    Article  Google Scholar 

  16. Noorit, N., & Suvonvorn, N. (2014). Human activity recognition from basic actions using finite state machine. In International Conference on Advanced Data and Information Engineering (pp. 379–386). Springer.

    Google Scholar 

  17. Trinh, H. (2011). Detecting human activities in retail surveillance using hierarchical finite state machine. In IEEE ICASSP, Czech Republic.

    Google Scholar 

  18. Schwarz, H., Marpe, D., & Wiegand, T. (2007). Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Transactions on Circuits and Systems for Video Technology, 17(9), 1103–1120.

    Article  Google Scholar 

  19. Simone, D., Naccari, M., Tagliasacchi, M., Dufaux, F., Tubaro, S., & Ebrahimi, T. (2011). Subjective quality assessment of H.264/AVC video streaming with packet losses. EURASIP Journal on Image and Video Processing, 2, 1–12.

    Article  Google Scholar 

  20. Sommerville, I. (2010). Software engineering (9th ed.). Pearson. ISBN-13:978-013703515

    Google Scholar 

  21. Venkataraman, G., Reddy, M., & Pomeranz, I. (2003). GALLOP: Genetic algorithm based low power FSM synthesis by simultaneous partitioning and state assignment. In VLSI Design (pp. 533–538).

    Google Scholar 

  22. Woods, J. (2012). Multidimentional signal, image, and video processing and coding. Massachusetts: Elsevier.

    Google Scholar 

  23. Zeng, C., Saxena, N., & McCluskey, E. (1999). Finite state machine synthesis with concurrent error detection. In International Test Conference.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Yan, W.Q. (2017). Surveillance Data Capturing and Compression. In: Introduction to Intelligent Surveillance. Springer, Cham. https://doi.org/10.1007/978-3-319-60228-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60228-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60227-1

  • Online ISBN: 978-3-319-60228-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics