Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Application 2019
DOI: 10.5220/0007392100850095
|View full text |Cite
|
Sign up to set email alerts
|

Camera Tampering Detection using Generative Reference Model and Deep Learned Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Augmenting real images and videos with synthetic elements, on the other hand, bridges the gap much better between real and generated data, as only certain elements of the images are synthesized. Especially for surveillance purposes, such augmentations have been shown to produce good results for pedestrian anomalies [21], falling in water detection [24], camera tampering [22], and subtle anomalies such as dropping objects and animals in the frame, as seen in the work that the current paper is an extension of [20].…”
Section: Synthetic Datasetsmentioning
confidence: 99%
See 1 more Smart Citation
“…Augmenting real images and videos with synthetic elements, on the other hand, bridges the gap much better between real and generated data, as only certain elements of the images are synthesized. Especially for surveillance purposes, such augmentations have been shown to produce good results for pedestrian anomalies [21], falling in water detection [24], camera tampering [22], and subtle anomalies such as dropping objects and animals in the frame, as seen in the work that the current paper is an extension of [20].…”
Section: Synthetic Datasetsmentioning
confidence: 99%
“…This synthetic data can be generated through the use of ready-built game worlds such as GTA [17,18] or full-city simulations [19]. Otherwise, they can be created through the augmentation of already existing real-world images with synthetic elements [20][21][22]. While most synthetic data augmentation relies on time-consuming processes, with weeks being spent on frame rendering in some cases [21,23], others, such as the works on responsive anomaly generation [20] and fall synthesis [24], are using real-time rendering game engines to speed up and streamline the process.…”
Section: Introductionmentioning
confidence: 99%
“…As described in Section 1, we would like to solve the problem of robust estimation of the background and the foreground content from the video frames as described above. This step is intended as a preprocessing step to aid the segmentation and classification tasks, where one may use simple thresholding algorithms (Phansalkar et al, 2011) for segmentation or classification algorithms mentioned in Mantini and Shah (2019b). For demonstration purposes, we shall consider 2 short clips from UHCTD dataset to implement the proposed rSVDdpd algorithm as well as the usual SVD algorithm.…”
Section: Video Surveillance Background Modellingmentioning
confidence: 99%
“…The goal associated with any video surveillance data in presence of camera tampering is primarily to detect the presence of such tampering using classification algorithms, and the rest of the data are used for solving the computer vision problems. Several techniques have been developed to solve this problem (Mantini and Shah, 2019b;Sitara and Mehtre, 2019) based on sophisticated image processing and deep learning techniques intended to classify each frame as tampered or not. However, these techniques achieve good results only at the cost of an extensive amount of training data and computing power.…”
mentioning
confidence: 99%