Surveillance and Video Analytics: Factors Influencing the Performance
Total Page:16
File Type:pdf, Size:1020Kb
Surveillance and video analytics: factors influencing the performance ERNCIP thematic group video analytics and surveillance Jeroen van Rest, MSc., TNO 2015 The research leading to these results has received funding from the European Union as part of the European reference network for critical infrastructure protection project. EUR 27852 EN Surveillance and video analytics: factors influencing the performance This publication is a technical report by the Joint Research Centre, the European Commission’s in-house science service. It aims to provide evidence-based scientific support to the European policymaking process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. JRC science hub https://ec.europa.eu/jrc JRC100399 EUR 27852 EN ISBN 978-92-79-57771-0 ISSN 1831-9424 doi:10.2788/945388 © European Union, 2015 Reproduction is authorised provided the source is acknowledged. All images © European Union 2015 Contents Contents ............................................................................................................ 3 Acknowledgements .............................................................................................. 7 Abstract ............................................................................................................. 8 1 Introduction ................................................................................................. 10 1.1 The challenge .......................................................................................... 10 1.2 The approach .......................................................................................... 10 1.3 Reading guide ......................................................................................... 10 2 Surveillance ................................................................................................. 12 2.1 Surveillance as a risk management measure ............................................... 12 2.2 Surveillance purpose and effectiveness ....................................................... 13 2.3 Situational awareness .............................................................................. 14 2.4 Ethics, privacy and invasiveness ................................................................ 15 2.5 Typical components of a surveillance system ............................................... 16 2.6 Compartmentalisation .............................................................................. 16 3 Method ........................................................................................................ 18 3.1 Problem characteristics ............................................................................. 18 3.2 Morphological analysis .............................................................................. 18 3.2.1 Notation of a configuration ................................................................. 19 3.3 Principles for modelling surveillance systems ............................................... 19 3.3.1 System theory ................................................................................. 19 3.3.2 Levels of abstraction ......................................................................... 19 3.3.3 Security as a risk management strategy .............................................. 20 3.3.4 Design basis threat ........................................................................... 20 3.3.5 Surveillance effectiveness .................................................................. 21 3.3.6 Readiness and maturity ..................................................................... 21 4 Results ........................................................................................................ 22 4.1 Relevant factors for surveillance systems .................................................... 22 4.1.1 Dependencies between surveillance factors .......................................... 23 4.2 Relevant factors for video analytics ............................................................ 25 4.2.1 Dependencies between video analytics factors ...................................... 25 5 Instructions for use ....................................................................................... 28 5.1 Describing a threat or an incident .............................................................. 28 5.1.1 Example incident: Boston bombings .................................................... 28 5.2 Describing use cases ................................................................................ 28 5.2.1 Example use case: crowd control from airborne platform ....................... 28 5.3 Describing data sets ................................................................................. 29 3 5.3.1 Example data set: i-LIDS sterile zone .................................................. 29 5.4 Describing scientific work .......................................................................... 29 5.4.1 Example: Visual surveillance for moving vehicles .................................. 30 5.4.2 Example: event detection and analysis from video streams .................... 30 6 Conclusions, discussion and next steps ............................................................ 32 6.1 Myths, partial trusts and misconceptions ..................................................... 32 6.2 Discussion .............................................................................................. 32 6.2.1 Descriptions ..................................................................................... 33 6.2.2 Specificity ........................................................................................ 33 6.2.3 Cross-correlation matrix .................................................................... 33 6.3 Next steps .............................................................................................. 33 6.3.1 Disclose and develop test data sets for relevant video analytics use cases 33 6.3.2 Joint innovation ................................................................................ 34 6.3.3 Prevent and stop crises with dynamically deployed surveillance capabilities 34 6.3.4 Develop large-scale auto-calibration for robust and scalable video analytics 35 6.3.5 Develop metadata standards that cover these factors ............................ 36 6.3.6 Other potential applications of the MAS and MAVA ................................ 36 6.3.7 Potential topics other than video analytics ............................................ 36 References ......................................................................................................... 37 List of abbreviations and definitions ...................................................................... 39 List of figures ..................................................................................................... 43 List of tables ...................................................................................................... 44 Appendix A Profiling ....................................................................................... 45 Appendix B Relevant factors for surveillance systems .......................................... 46 B.1 Context, environment, asset and risk ......................................................... 46 B.1.1 Context ........................................................................................... 46 B.1.1.1 Weather .................................................................................... 46 B.1.1.2 Weather dynamics ...................................................................... 46 B.1.1.3 Privacy awareness ...................................................................... 46 B.1.1.4 Security awareness ..................................................................... 46 B.1.1.5 Intent ....................................................................................... 46 B.1.1.6 Relation .................................................................................... 46 B.1.2 Environment .................................................................................... 47 B.1.2.1 Type of environment ................................................................... 47 B.1.2.2 Type of object ............................................................................ 47 B.1.2.3 Existing infrastructure ................................................................. 47 B.1.2.4 Compartments present ................................................................ 47 4 B.1.2.5 Closed compartments ................................................................. 47 B.1.2.6 People density ........................................................................... 47 B.1.3 Risk ................................................................................................ 47 B.1.3.1 Risk cause ................................................................................. 47 B.1.3.1.1 Asset to protect ....................................................................... 48 B.1.3.1.2 Threat .................................................................................... 48 B.1.3.1.3 Vulnerability ............................................................................ 49 B.1.3.2 Resulting risk ............................................................................. 49 B.1.3.2.1 Chance ..................................................................................