PRIMORIS      Contacts      FAQs      INSTICC Portal
 

Tutorials

The role of the tutorials is to provide a platform for a more intensive scientific exchange amongst researchers interested in a particular topic and as a meeting point for the community. Tutorials complement the depth-oriented technical sessions by providing participants with broad overviews of emerging fields. A tutorial can be scheduled for 1.5 or 3 hours.



Secure our society - Computer Vision Techniques for Video Surveillance


Lecturer

Huiyu Zhou
Queen's University Belfast
United Kingdom
 
Brief Bio
Huiyu Zhou is a Lecturer in the School of Electronics, Electrical Engineering and Computer Science at Queen’s University Belfast, United Kingdom. He obtained a Bachelor of Engineering degree in Radio Technology from the Huazhong University of Science and Technology of China, and a Master of Science degree in Biomedical Engineering from the University of Dundee of United Kingdom, respectively. He was then awarded a Doctor of Philosophy degree in Computer Vision from the Heriot-Watt University, Edinburgh, United Kingdom. He has worked in the Guangxi Medical University (China), Elscint Ltd. (Israel), University of Essex (UK), University of London (UK), and Brunel University (UK). He has taken part in the consortiums of a number of research projects in medical image processing, computer vision, intelligent systems and data mining. Dr. Zhou has published over 120 peer reviewed papers in the field. He is the recipient of CVIU 2012 Most Cited Paper Award and was shortlisted for MBEC 2006 Nightingale Prize. He serves as the Editor-in-Chief of Recent Patents on Electrical & Electronic Engineering, and is on the Editorial Boards of several refereed journals.
Abstract

Abstract: Research in video surveillance has received overwhelming attention in the last three decades. Increased precautions are taken in security-sensitive areas, such as country borders, airports and government offices. Individuals are also seeking personalized security systems to continuously monitor their properties and valuable assets. To meet these requirements, cameras have been deployed to acquire sensory data, followed by thorough detection and assessment of threats on-line or off-line. Understanding and interpreting object behaviours based on video analysis has witnessed impressive progress in recent years. The performance of these surveillance systems is continuously improved. In this tutorial, we will summarize recent research progress in human detection and tracking, identification, activity/behaviour analysis, motion trajectory clustering and structure from motion.

Keywords: Computer vision; machine learning; video surveillance; behaviour analysis.


Aims and Learning Objectives:
This tutorial aims to cover the early stages of the video surveillance pipeline. Participants are expected to get new perspectives within the area of video surveillance. In more detail, the objectives of this tutorial are:
I) To become acquainted with computer vision techniques used for video surveillance tasks;
II) To experience theoretical and engineering project management for video surveillance;
III) To be able to evaluate the prospective usage of video surveillance techniques for real time operation.


Target Audience: This tutorial is intended for researchers and practitioners with background in general signal/image processing.
Prerequisite Knowledge of Audience: None.

Detailed Outline: The following is a list of tentative topics and the corresponding time allocations:
a) Introduction to video surveillance
b) Object detection and tracking
c) Human profiling
d) Activity recognition
e) Trajectory clustering
f) Structure from motion


Keywords

Computer vision; machine learning; video surveillance; behaviour analysis.

Target Audience

This tutorial is intended for researchers and practitioners with background in general signal/image processing.

Detailed Outline

The following is a list of tentative topics and the corresponding time allocations:

a) Introduction to video surveillance [10 minutes]
b) Object detection and tracking [20 minutes]
c) Human profiling [15 minutes]
d) Activity recognition [20 minutes]
e) Trajectory clustering [15 minutes]
f) Structure from motion [10 minutes]

Secretariat Contacts
e-mail: icpram.secretariat@insticc.org

footer