{"id":55,"date":"2008-05-22T04:32:29","date_gmt":"2008-05-22T10:32:29","guid":{"rendered":"http:\/\/www.imed.ws\/blog\/2008\/05\/22\/computer-vision-to-automate-surveillance\/"},"modified":"2008-05-22T04:32:29","modified_gmt":"2008-05-22T10:32:29","slug":"computer-vision-to-automate-surveillance","status":"publish","type":"post","link":"https:\/\/www.imed.ws\/blog\/2008\/05\/22\/computer-vision-to-automate-surveillance\/","title":{"rendered":"Computer Vision to Automate Surveillance"},"content":{"rendered":"<p>In recent years, automatic visual surveillance\u00c2\u00a0 has received considerable interest in the computer vision community. This is due to the increasing numbers of crimes from robbery to terrorist attacks, as well as the inability of human operators to monitor the increasingly growing numbers of surveillance cameras deployed in security sensitive areas such as government buildings and airports, or\u00c2\u00a0 public places such as shopping malls and streets. According to the British Security Industry Association, the number of CCTV cameras installed in the UK was estimated to be more than 4.25 million in 2004; this figure is expected to grow rapidly particularly after the terrorist attacks that London witnessed in July 2005.\u00c2\u00a0 Despite the huge increase of surveillance systems,\u00c2\u00a0 the question whether current surveillance systems work as a deterrent to crime is still debatable. Security systems should not only be able to predict when a crime is about to happen but, more importantly, they ought to identify the individuals suspected of committing crimes, say through the use of biometrics such as gait recognition.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, automatic visual surveillance\u00c2\u00a0 has received considerable interest in the computer vision community. This is due to the increasing numbers of crimes from robbery to terrorist attacks, as well as the inability of human operators to monitor the increasingly growing numbers of surveillance cameras deployed in security sensitive areas such as government buildings [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.imed.ws\/blog\/wp-json\/wp\/v2\/posts\/55"}],"collection":[{"href":"https:\/\/www.imed.ws\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.imed.ws\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.imed.ws\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.imed.ws\/blog\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":0,"href":"https:\/\/www.imed.ws\/blog\/wp-json\/wp\/v2\/posts\/55\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.imed.ws\/blog\/wp-json\/wp\/v2\/media?parent=55"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.imed.ws\/blog\/wp-json\/wp\/v2\/categories?post=55"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.imed.ws\/blog\/wp-json\/wp\/v2\/tags?post=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}