Publications (7)0 Total impact

  • F. Matusek · K. Kraus · O. Martikainen · R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: This work presents a break-through feature package for Advanced Intelligent Video Surveillance Systems. The feature package selective ID protection in advanced high performance intelligent video surveillance was designed and implemented with two different approaches: A hardware based-solution, where an additional ILP processor was mounted in the SmartCam core board to execute such special tasks like Selective ID Protection of an object, a person or a vehicle, This guarantees that the overall performance of the SmartCam will be almost not affected through those tasks. The second approach is a software-based solution: the feature package was implemented on one of the available advanced SmartCam, without altering its HW structure. The implementation concept was based upon scrambling the selective ID/characteristics of the object/person/vehicle under consideration. Those characteristics must be predefined in the SmartCam. This feature package was implemented upon the request of a European security authority.
    No preview · Conference Paper · Apr 2010
  • [Show abstract] [Hide abstract]
    ABSTRACT: This chapter focuses on the management and the application development of distributed smart camera systems by observing the more general point of view of embedded sensor networks. The proposed approach relies on a model-based software engineering concept which allows a more unified and simplified design. Basically, the model-based system development concept provides high-level system functions and facilities for generating platform-specific code. This chapter outlines how this framework allows the integration of models at different levels, e.g., for exploiting low-level sensor data as well as high-level knowledge-based models for detection, classification, and representation of high-level situations in specific use cases. The usefulness of the presented approach shall be demonstrated in a real-world scenario targeting safety and security surveillance in a public airport environment.
    No preview · Chapter · Dec 2009
  • Source
    F. Matusek · G. Pujolle · R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper an analytical study and novel concept of software, hardware and engineering of a new device is presented: the video surveillance local control unit (VSLC). Engineering and performance parameters of the VSLC will be evaluated. Subsequently, the state-prevent-event process of the video surveillance system will be analyzed. Accordingly, a new spectrum of applications of video surveillance systems will be introduced. It is expected to achieve new real-time features, especially in critical situations. Finally, one of the applications is considered and analyzed within a case study.
    Full-text · Conference Paper · Dec 2008
  • F. Matusek · R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: The trade-off between privacy and security was a subject of intensive discussion. Giving up privacy does not necessarily result in greater security, and greater security does not necessarily require a loss of privacy. In this work, three different novel approaches are presented to store personal data obtained from intelligent video surveillance systems in an efficient and secure way. The storage process of this data poses a number of challenges e.g. storage optimization, query performance, security management, access control and performance management. Each of the proposed technique is evaluated and analyzed with respect to the above-mentioned challenges. Field test results showed that each of the technique can be successfully applied to hide/conceal privacy related data with a maximum storage as well as retrieval performance.
    No preview · Conference Paper · Nov 2008
  • S. Sutor · F. Matusek · R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper an innovative approach for utilizing advances of wireless mobility and computer vision for the application of video surveillance are given. Design and engineering of a high performance wireless self-contained surveillance unit is presented (WSSU). These WSSUs can be deployed in emergency cases, where no time for preparation and installation is available. Further, utilizing the performance of the WSSU, together with a mobile video surveillance local control (VSLC), an ad hoc video surveillance system is presented.
    No preview · Conference Paper · Jul 2008
  • S. Sutor · F. Matusek · F. Kruse · K. Kraus · R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: As the threat potential against critical infrastructure increases, more and more flexible, scalable, efficient, reliable and future-proof video surveillance technologies are required. This paper introduces an analytical study of performance parameters for large-scale video surveillance systems. Analog to computer network systems, performance parameters are defined: e.g. reliability, availability (instantaneous, interval and steady state) and survivability are defined, calculated, evaluated and analyzed. Moreover, a new important performance parameter, visual coverage-quality and redundancy levels are introduced. Two case studies are presented, which show that these factors are indispensable for designing the best possible configuration of a large-scale video surveillance systems.
    No preview · Conference Paper · Jan 2008
  • F. Matusek · S. Sutor · K. Kraus · F. Kruse · R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a novel architecture for high security, scalable video surveillance systems. The goal of this architecture concept was the creation of a virtually indestructible video surveillance system with the highest possible performance level, even under worst-case circumstances. First, the security management process used to build up such a system is introduced and analyzed, with the focus of how to achieve the highest possible security level. The presented system was subject to several test methods and phase levels to evaluate system performance. From the end user's point of view, all the achieved results verified the high performance and nearly indestructible characteristics of the system.
    No preview · Conference Paper · Jan 2008