James Ferryman

James Ferryman
University of Reading · School of Systems Engineering

About

127
Publications
31,559
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,995
Citations
Citations since 2017
25 Research Items
1588 Citations
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250

Publications

Publications (127)
Article
Full-text available
Wide area surveillance has become of critical importance, particularly for border control between countries where vast forested land border areas are to be monitored. In this paper, we address the problem of the automatic detection of activity in forbidden areas, namely forested land border areas. In order to avoid false detections, often triggered...
Chapter
Full-text available
Chapter 16, “FOLDOUT: A Through Foliage Surveillance System for Border Security” was previously published non-open access. It has now been changed to open access under a CC BY 4.0 license and the copyright holder updated to ‘The Author(s)’. The book has also been updated with this change.
Article
Full-text available
This paper investigates the use of Siamese networks for trajectory similarity analysis in surveillance tasks. Specifically, the proposed approach uses an auto‐encoder as a part of training a discriminative twin (Siamese) network to perform trajectory similarity analysis, thus presenting an end‐to‐end framework to perform an online motion pattern ex...
Article
The objective of the European Union (EU) in the field of external border protection is to safeguard the freedom of movement within the Schengen area, and to ensure efficient monitoring of people who cross EU's external borders. To achieve an effective and efficient border management, there is a need for applying enhanced technologies and methods th...
Article
In this work, we present a Fusion and Tracking system developed within the EU project FOLDOUT aimed to facilitate border guards work by fusing separate sensor information and presenting automatic tracking of objects detected in the surveillance area. The focus of FOLDOUT is on through-foliage detection in the inner and outermost regions of the EU....
Article
The objective of the European Union (EU) in the field of external border protection is to safeguard the freedom of movement within the Schengen area, and to ensure efficient monitoring of people who cross EU's external borders. To achieve an effective and efficient border management, there is a need for applying enhanced technologies and methods th...
Chapter
Full-text available
Improved methods for border surveillance are necessary to ensure an effective and efficient EU border management. In the border control context, as defined by the Schengen Border Code, border surveillance is defined as “the surveillance of borders between border crossing points and the surveillance of border crossing points outside the fixed openin...
Article
Full-text available
Pervasive and useR fOcused biomeTrics bordEr projeCT (PROTECT) is an EU project funded by the Horizon 2020 research and Innovation Programme. The main aim of PROTECT was to build an advanced biometric-based person identification system that works robustly across a range of border crossing types and that has strong user-centric features. This work p...
Article
Full-text available
Several measures for evaluating multi-target video trackers exist that generally aim at providing ‘end performance.’ End performance is important particularly for ranking and comparing trackers. However, for a deeper insight into trackers’ performance it would also be desirable to analyze key contributory factors (false positives, false negatives,...
Conference Paper
Full-text available
This work presents the 2nd Cross-Spectrum Iris/Periocular Recognition Competition (Cross- Eyed2017). The main goal of the competition is to promote and evaluate advances in cross-spectrum iris and periocular recognition. This second edition registered an increase in the participation numbers ranging from academia to industry: five teams submitted t...
Article
Privacy protection may be defined as replacing the original content in an image region with a (less intrusive) content having modified target appearance information to make it less recognizable by applying a privacy protection technique. Indeed, the development of privacy protection techniques also needs to be complemented with an established objec...
Conference Paper
Spoofing is an act to impersonate a valid user of any biometric systems in order to gain access. In a face biometric system, an imposter might use some fake masks that mimic the real user face. Existing countermeasures against spoofing adopt face texture analysis, motion detection and surface reflection analysis. For the purpose of face anti-spoofi...
Article
Full-text available
Iris localisation and segmentation are challenging and critical tasks in iris biometric recognition. Especially in non-cooperative and less ideal environments, their impact on overall system performance has been identified as a major issue. In order to avoid a propagation of system errors along the processing chain, this paper investigates iris fus...
Conference Paper
Full-text available
This work presents a novel dual-spectrum database containing both iris and periocular images synchronously captured from a distance and within a realistic indoor environment. This database was used in the 1st Cross-Spectrum Iris/Periocular Recognition Competition (Cross-Eyed 2016). This competition aimed at recording recent advances in cross-spectr...
Conference Paper
In an Internet of Things (IoT) camera-based monitoring application the transmission of images away from the video sensors for processing poses security and privacy risks. Hence, there is a need for an advanced trusted user-centric monitoring system that pushes the application of security and privacy protection closer to the sensor itself and which...
Article
Full-text available
This paper presents an open-source canopy height profile (CHP) toolkit designed for processing small-footprint full-waveform LiDAR data to obtain the estimates of effective leaf area index (LAIe) and CHPs. The use of the toolkit is presented with a case study of LAIe estimation in discontinuous-canopy fruit plantations. The experiments are carried...
Conference Paper
In the EU FP7 project IPATCH, we are researching components for a maritime piracy early detection and avoidance system for deployment on merchant vessels. The system combines information from on-board sensors with intelligence from external sources in order to give early warnings about piracy threats. In this paper we present the ongoing work with...
Conference Paper
Full-text available
Iris liveness detection methods have been developed to overcome the vulnerability of iris biometric systems to spoofing attacks. In the literature, it is typically assumed that a known attack modality will be perpetrated. Then liveness models are designed using labelled samples from both real/live and fake/spoof distributions, the latter derived fr...
Conference Paper
This paper presents an experimental study of different depth sensors. The aim is to answer the question, whether these sensors give accurate data for general depth image analysis. The study examines the depth accuracy between three popularly used depth sensors; ASUS Xtion Prolive, Kinect Xbox 360 and Kinect for Windows v2. The main attention is to...
Conference Paper
While a multitude of motion segmentation algorithms have been presented in the literature, there has not been an objective assessment of different approaches to fusing their outputs. This paper investigates the application of 4 different fusion schemes to the outputs of 3 probabilistic pixel-level segmentation algorithms. We performed an extensive...
Conference Paper
This paper presents the two datasets (ARENA and P5) and the challenge that form a part of the PETS 2015 workshop. The datasets consist of scenarios recorded by using multiple visual and thermal sensors. The scenarios in ARENA dataset involve different staged activities around a parked vehicle in a parking lot in UK and those in P5 dataset involve d...
Conference Paper
This paper presents a quantitative evaluation of a tracking system on PETS 2015 Challenge datasets using well-established performance measures. Using the existing tools, the tracking system implements an end-to-end pipeline that include object detection, tracking and postprocessing stages. The evaluation results are presented on the provided sequen...
Article
Full-text available
Anti-spoofing is attracting growing interest in biometrics, considering the variety of fake materials and new means to attack biometric recognition systems. New unseen materials continuously challenge state-of-the-art spoofing detectors, suggesting for additional systematic approaches to target anti-spoofing. By incorporating liveness scores into t...
Article
Several researchers have presented studies of temporal effects on iris reco gnition accuracy, with varying results on severity of observed effects. The sensitive topic continues to be adversely discussed and the difficulty of isolating performance-impacting factors is immanent. The impact of ageing on segmentation vs. feature extraction has been la...
Article
Full-text available
Multispectral iris recognition uses information from multiple bands of the electromagnetic spectrum to better represent certain physiological characteristics of the iris texture and enhance obtained recognition accuracy. This paper addresses the questions of single versus cross-spectral performance and compares score-level fusion accuracy for diffe...
Article
Full-text available
A Canopy Height Profile (CHP) procedure presented in Harding et al. (2001) for large footprint LiDAR data was tested in a closed canopy environment as a way of extracting vertical foliage profiles from LiDAR raw-waveform. In this study, an adaptation of this method to small-footprint data has been shown, tested and validated in an Australian sparse...
Article
Multibiometrics aims at improving biometric security in presence of spoofing attempts, but exposes a larger availability of points of attack. Standard fusion rules have been shown to be highly sensitive to spoofing attempts - even in case of a single fake instance only. This paper presents a novel spoofing-resistant fusion scheme proposing the dete...
Article
For general home monitoring, a system should automatically interpret people’s actions. The system should be non-intrusive, and able to deal with a cluttered background, and loose clothes. An approach based on spatio-temporal local features and a Bag-of-Words (BoW) model is proposed for single-person action recognition from combined intensity and de...
Article
This paper addresses the issue of activity understanding from video and its semantics-rich description. A novel approach is presented where activities are characterised and analysed at different resolutions. Semantic information is delivered according to the resolution at which the activity is observed. Furthermore, the multiresolution activity cha...
Article
Full-text available
This study has tested Canopy Height Profile (CHP) methodology as a way of effective Leaf Area Index (LAIe) and vertical vegetation profile retrieval at a single-tree level. Waveform and discrete airborne LiDAR data from five swaths as well as from the combined data of five swaths were used to extract LAIe of a single live Callitris glaucophylla tre...
Conference Paper
This paper describes the dataset and vision challenges that form part of the PETS 2014 workshop. The datasets are multisensor sequences containing different activities around a parked vehicle in a parking lot. The dataset scenarios were filmed from multiple cameras mounted on the vehicle itself and involve multiple actors. In PETS2014 workshop, 22...
Article
Full-text available
Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck's cargo takes. The theft takes place in very different forms, in the midst of many people who pose no threat. The threats range from...
Conference Paper
In this paper we propose an innovative approach for behaviour recognition, from a multicamera environment, based on translating video activity into semantics. First, we fuse tracks from individual cameras through clustering employing soft computing techniques. Then, we introduce a higher-level module able to translate fused tracks into semantic inf...
Article
This paper presents the PETS2009 outdoor crowd image analysis surveillance dataset and the performance evaluation of people counting, detection and tracking results using the dataset submitted to five IEEE Performance Evaluation of Tracking and Surveillance (PETS) workshops. The evaluation was carried out using well established metrics developed in...
Article
We present a method for the recognition of complex actions. Our method combines automatic learning of simple actions and manual definition of complex actions in a single grammar. Contrary to the general trend in complex action recognition, that consists in dividing recognition into two stages, our method performs recognition of simple and complex a...
Article
This paper presents a neuroscience inspired information theoretic approach to motion segmentation. Robust motion segmentation represents a fundamental first stage in many surveillance tasks. As an alternative to widely adopted individual segmentation approaches, which are challenged in different ways by imagery exhibiting a wide range of environmen...
Article
Analysis of human behaviour through visual information has been a highly active research topic in the computer vision community. This was previously achieved via images from a conventional camera, however recently depth sensors have made a new type of data available. This survey starts by explaining the advantages of depth imagery, then describes t...
Conference Paper
Full-text available
In this paper we present a set of activity recognition and localization algorithms that together assemble a large amount of information about activities on a parking lot. The aim is to detect and recognize events that may pose a threat to truck drivers and trucks. The algorithms perform zone-based activity learning, individual action recognition an...
Article
Full-text available
Full-waveform laser scanning data acquired with a Riegl LMS-Q560 instrument were used to classify an orange orchard into orange trees, grass and ground using waveform parameters alone. Gaussian decomposition was performed on this data capture from the National Airborne Field Experiment in November 2006 using a custom peak-detection procedure and a...
Conference Paper
A number of multi-camera solutions exist for tracking objects of interest in surveillance scenes. Generally, the approach follows the idea of either early fusion (where all cameras are used to make a decision about detection and tracking) or late fusion (where objects are detected and tracked in individual cameras independently, and then the result...
Conference Paper
Full-text available
This study has compared preliminary estimates of effective leaf area index (LAI) derived from fish-eye lens photographs to those estimated from airborne full-waveform small-footprint LiDAR data for a forest dataset in Australia. The full-waveform data was decomposed and optimized using a trust-region-reflective algorithm to extract denser point clo...
Article
Video surveillance is a part of our daily life, even though we may not necessarily realize it. We might be monitored on the street, on highways, at ATMs, in public transportation vehicles, inside private and public buildings, in the elevators, in front of our television screens, next to our baby?s cribs, and any spot one can set a camera.
Article
Full-text available
The current state of the art and direction of research in computer vision aimed at automating the analysis of CCTV images is presented. This includes low level identification of objects within the field of view of cameras, following those objects over time and between cameras, and the interpretation of those objects’ appearance and movements with r...
Conference Paper
One popular approach for multi-camera detection of pedestrians or other objects of interest in surveillance scenes is to perform background subtraction and project the resulting foreground mask images to a common scene plane using homographies. As the complexity of the scene increases, it is unavoidable that so called "ghost" detections should occu...
Conference Paper
Accurate information about vegetation/forest structure, health and growth is needed in many fields of forest management, environmental planning, resource management, fire risk assessment and soil moisture retrievals. Airborne laser scanning has proven over the last nearly two decades to be an invaluable tool in describing vegetation and providing 3...
Article
A method for the estimation of leaf area index, apparent foliage profile and total leaf area of trees from the last significant returns of airborne laser altimetry is presented, and tested, showing the growth of ten individual Eucalypt trees in New South Wales, Australia over a period of five years. Two airborne laser altimetry data sets were acqui...
Article
Forests of decision trees are a popular tool for classification applications. This paper presents an approach to evolving the forest classifier, reducing the time spent designing the optimal tree depth and forest size. This is applied to the task of vehicle classification for purposes of verification against databases at security checkpoints, or ac...
Article
A new generation of advanced surveillance systems is being conceived as a collection of multisensor components such as video, audio, and mobile robots interacting in a cooperating manner to enhance situation awareness capabilities to assist surveillance personnel. The prominent issues that these systems face are the improvement of existing intellig...
Conference Paper
Full-text available
In this work we present a novel approach for activity extraction and knowledge discovery from video employing fuzzy relations. Spatial and temporal properties from detected mobile objects are modeled with fuzzy relations. These can then be aggregated employing typical soft-computing algebra. A clustering algorithm based on the transitive closure ca...
Chapter
There is a rising demand for the quantitative performance evaluation of automated video surveillance. To advance research in this area, it is essential that comparisons in detection and tracking approaches may be drawn and improvements in existing methods can be measured. There are a number of challenges related to the proper evaluation of motion s...
Article
Full-text available
In this paper, we evaluate the Probabilistic Occupancy Map (POM) pedestrian detection algorithm on the PETS 2009 benchmark dataset. POM is a multi-camera generative detection method, which estimates ground plane occupancy from multiple background subtraction views. Occupancy probabilities are iteratively estimated by fitting a synthetic model of th...
Conference Paper
This paper presents the results of the crowd image analysis challenge of the PETS2010 workshop. The evaluation was carried out using a selection of the metrics developed in the Video Analysis and Content Extraction (VACE) program and the CLassification of Events, Activities, and Relationships (CLEAR) consortium. The PETS 2010 evaluation was perform...
Conference Paper
Full-text available
This paper describes the crowd image analysis challenge that forms part of the PETS 2010 workshop. The aim of this challenge is to use new or existing systems for i) crowd count and density estimation, ii) tracking of individual(s) within a crowd, and iii) detection of separate flows and specific crowd events, in a real-world environment. The datas...
Conference Paper
Calibrated cameras are an extremely useful resource for computer vision scenarios. Typically, cameras are calibrated through calibration targets, measurements of the observed scene, or self-calibrated through features matched between cameras with overlapping fields of view. This paper considers an approach to camera calibration based on observation...
Article
Full-text available
The present work presents a new method for activity extraction and reporting from video based on the aggregation of fuzzy relations. Trajectory clustering is first employed mainly to discover the points of entry and exit of mobiles appearing in the scene. In a second step, proximity relations between resulting clusters of detected mobiles and conte...
Conference Paper
Full-text available
A new class of shape features for region classification and high-level recognition is introduced. The novel Randomised Region Ray (RRR) features can be used to train binary decision trees for object category classification using an abstract representation of the scene. In particular we address the problem of human detection using an over segmented...
Conference Paper
Several pixel-based people counting methods have been developed over the years. Among these the product of scale-weighted pixel sums and a linear correlation coefficient is a popular people counting approach. However most approaches have paid little attention to resolving the true background and instead take all foreground pixels into account. With...
Conference Paper
Full-text available
This paper presents the results of the crowd image analysis challenge of the Winter PETS 2009 workshop. The evaluation is carried out using a selection of the metrics developed in the video analysis and content extraction (VACE) program and the classification of events, activities, and relationships (CLEAR) consortium. The evaluation highlights the...
Article
This paper describes the crowd image analysis challenge that forms part of the PETS 2009 workshop. The aim of this challenge is to use new or existing systems for i) crowd count and density estimation, ii) tracking of individual(s) within a crowd, and iii) detection of separate flows and specific crowd events, in a real-world environment. The datas...
Conference Paper
Urban surveillance footage can be of poor quality, partly due to the low quality of the camera and partly due to harsh lighting and heavily reflective scenes. For some computer surveillance tasks very simple change detection is adequate, but sometimes a more detailed change detection mask is desirable, eg, for accurately tracking identity when face...