1,233
Views
9
CrossRef citations to date
0
Altmetric
Articles

Video surveillance and counterterrorism: the application of suspicious activity recognition in visual surveillance systems to counterterrorism

, , &

References

  • Adam, A., Rivlin, E., Shimshoni, I., & Reinitz, D. (2008, March). Robust real-time unusual event detection using multiple fixed-location monitors. IEEE Transactions on Pattern Analysis and Machine Intelligence, 30, 555–560.
  • Ali, S., Basharat, A., & Shah, M. (2007, October 14–20). Chaotic invariants for human action recognition. In Proceedings of IEEE international conference on Computer Vision, Rio de Janeiro, Brazil (pp. 1–8). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEE).
  • Al-Jazeera. (2010, April 2). Teenage widow behind Moscow blast. Al-Jazeera.
  • Al-Jazeera English. (2010, April 7). Second Moscow bomber identified — Europe. Al-Jazeera English.
  • Andrade, E., Fisher, R., & Blundsen, S. (2006, June 13–14). Detection of emergency events in crowded scenes. In Proceedings of IET international conference on Crime and Security, Savoy Place, London (pp. 528–533). England and Wales: Institute of Engineering Technology (IET).
  • Apuzzo, M., & Goldman, A. (2013). Enemies within. New York, NY: Simon and Schuster.
  • Audiencia Nacional, Juzgado Central de Instrucción. (2004). Sumario 20/2004, Vol. 216, no. 6, p. 84,062.
  • Baker, A., & Henry, K. (2010, May 2). Car bomb leads to evacuation in Times Square. New York Times.
  • Baker, A., & Zraick, K. (2009, September 20). Lawyer defends Queens imam arrested in terror inquiry. New York Times.
  • BBC News. (2004, March 12). Madrid attacks timeline. BBC News.
  • BBC News Special Reports. (2014a). London attacks. Retrieved from http://news.bbc.co.uk/2/shared/spl/hi/uk/05/londonblasts/whathappened/html/
  • BBC News Special Reports. (2014b). Madrid train attacks. Retrieved from http://news.bbc.co.uk/2/shared/spl/hi/guides/457000/457031/html/
  • Bidgood, J. (2013, April 24). On a field at M.I.T., 10,000 remember an officer who was killed. New York Times.
  • Black, M., & Anandan, P. (1993, May 11–14). A framework for the robust estimation of optical flow. In Proceedings of IEEE international conference on Computer Vision (pp. 231–236). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Bloomberg, M., Kelly, R., & Microsoft Corp. (2012, August 8). Mayor Bloomberg, Police Commissioner Kelly and Microsoft unveil new, state-of-the-art law enforcement technology that aggregates and analyzes existing public safety data in real time to provide a comprehensive view of potential threats and criminal activity. Press Release.
  • Brown, P. (2013, May 1). Carjacking victim recalls differing demeanors of bombing suspects. CNN.
  • Bruyelle, J.-L., O'Neill, C., El-Koursi, E.-M., Hamelin, F., & Sartori, N. (2014). Improving the resilience of metro vehicle and passengers for an effective emergency response to terrorist attacks. Safety Science, 62, 37–45. doi:10.1016/j.ssci.2013.07.022
  • Buesa, A., Heijs, J., Baumert, T., & González, J. (2007). The economic cost of March 11: Measuring the direct economic cost of the terrorist attack on March 11, 2004 in Madrid. Terrorism and Political Violence, 19, 489–509. doi:10.1080/09546550701590677
  • Campbell, B. (2009, September 25). United States of America v. Najibullah Zazi: Conspiracy to use weapons of mass destruction. US Dept. Justice.
  • Campbell, B., Knox, J., Berger, B., & Bitkower, D. (2009, September 24). Memorandum of law in support of the government's motion for a permanent order of detention; U.S. v. Zazi. US Dept. Justice.
  • Chan, A., Morrow, M., & Vasconcelos, N. (2009, June 25). Analysis of crowded scenes using holistic properties. In Proceedings of IEEE international workshop on performance evaluation of Tracking and Surveillance, Miami, FL (pp. 101–108). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Chan, A., & Vasconcelos, N. (2005, October 17–25). Mixtures of dynamic textures. In Proceedings of IEEE international conference on Computer Vision, Beijing (Vol. 1, pp. 641–647). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Chan, A. B., & Vasconcelos, N. (2008, May). Modeling, clustering, and segmenting video with mixtures of dynamic textures. IEEE Transactions on Pattern Analysis and Machine Intelligence, 30, 909–926. doi:10.1109/TPAMI.2007.70738
  • Chance, M., Sebastian, C., & Tkachenko, M. (2010, April 1). Russian police release subway bomb suspects’ photos. CNN.
  • Chen, D.-Y., & Huang, P. (2010, July 19–23). Dynamic human crowd modeling and its application to anomalous events detection. In Proceedings of IEEE international conference on Multimedia and Expo, Singapore (pp. 1582–1587). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Cho, S.-H., & Kang, H.-B. (2012, April 22–24). Integrated multiple behavior models for abnormal crowd behavior detection. In Proceedings of the IEEE Southwest Symposium on Image Analysis and Interpretation, Santa Fe, NM (pp. 113–116). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Computer Vision Pattern Recognition (CVPR). (2009). Performance Evaluation of Tracking and Surveillance (PETS). Retrieved from http://www.cvg.rdg.ac.uk/PETS2009/
  • Conwell, A. (2006, July 7). One year later, video shows warning by a London bomber. New York Times.
  • Cragin, K., & Daly, S. (2004). The dynamic terrorist threat. Santa Monica, CA: RAND.
  • Dempster, A., Laird, N., & Rubin, D. (1977). Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, 39 ( Series B), 1–38.
  • Drake, B. (2013). Most Americans see terrorism as part of life in the future. Fact Track. Retrieved from http://www.pewresearch.org
  • Dwyer, J. (2010, May 5). A suspect leaves clues at every turn. New York Times.
  • El Mundo. (2010, February 16). Spanish indictment on the investigation of 11 March. El Mundo ( in Spanish).
  • Elhamod, M., & Levine, M. (2013, June). Automated real-time detection of potentially suspicious behavior in public transport areas. IEEE Transactions on Intelligent Transportation Systems, 14, 688–699.
  • Farnebäck, G. (2003). Two-frame motion estimation based on polynomial expansion. In Proceedings of the Scandinavian Conference on Image Analysis, Halmstad (pp. 363–370). Springer.
  • Feng, J., Zhang, C., & Hao, P. (2010, August 23–26). Online learning with self-organizing maps for anomaly detection in crowded scenes. In Proceedings of IEEE international conference on Pattern Recognition, Istanbul (pp. 3599–3602). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Fischler, A., & Bolles, R. (1981, June). Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography. Communications of the ACM, 24, 381–395.
  • Fowler, P. (2010, May 2). NYPD looking for white male over attempted Times Square bombing. NewsRoom.
  • Frosdick, S., Chalmers, J., & Webb, M. (2005). Safety and security at sports grounds. Rothersthorpe: Paragon.
  • Globe Staff. (2013, April 28). 102 hours in pursuit of marathon suspects. Boston Globe.
  • Goode, E., & Kovaleski, S. (2013, April 19). Boy at home in U.S., swayed by one who wasn't. New York Times.
  • Greenberger, M. (2006). The need for closed circuit television in mass transit systems. Law Enforcement Executive Forum, February, 151.
  • Griffin, D., Johnston, K., & Lister, T. (2010, February 3). Source: Zazi's dad, uncle tried to destroy bomb-making chemicals. CNN.
  • Hall, S., Cooper, W., Marciani, L., & McGee, J. (2011). Security management for sports and special events. Champaign, IL: Human Kinetics.
  • Haralick, R., Shanmugam, K., & Dinstein, I. (1973, November). Textural features for image classification. IEEE Transactions on Systems, Man, and Cybernetics, SMC-3, 610–621.
  • Harding, L. (2010a, March 29). Moscow bombings: Putin vows to destroy group behind attacks. Guardian.
  • Harding, L. (2010b, March 30). Moscow metro death toll rises as national day of mourning begins. Guardian.
  • Helbing, D., Farkas, I., & Vicsek, T. (2000, September). Simulating dynamical features of escape panic. Nature, 407, 487–490.
  • Helbing, D., & Molnár, P. (1995, May). Social force model for pedestrian dynamics. Physical Review E, 51, 4282–4286.
  • Hoffman, B. (2006). Inside terrorism. New York, NY: Columbia University Press.
  • House of Commons. (2006, May 11). Report of the official account of the bombings in London on 7th July 2005. House of Commons.
  • Jiang, F., Wu, Y., & Katsaggelos, A. (2009, November 7–10). Detecting contextual anomalies of crowd motion in surveillance video. In Proceedings of IEEE international conference on Image Process, Cairo (pp. 1117–1120). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Khan, M. (2005, September 2). London bomber video aired on TV. BBC.
  • Kim, J., & Grauman, K. (2009, June 20–25). Observe locally, infer globally: A space-time MRF for detecting abnormal activities with incremental updates. In Proceedings of IEEE international conference on Computer Vision, Miami, FL (pp. 2921–2928). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Kotz, D. (2013, April 24). Injury toll from marathon bombs reduced to 264. Boston Globe.
  • Kratz, L., & Nishino, K. (2009, June 20–25). Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models. In Proceedings of IEEE international conference on Computer Vision and Pattern Recognition, Miami, FL (pp. 1446–1453). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Kratz, L., & Nishino, K. (2012, May). Tracking pedestrians using local spatio-temporal motion patterns in extremely crowded scenes. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34, 987–1002. doi:10.1109/TPAMI.2011.173
  • Levs, J. (2013, April 18). Boy, 8, one of 3 killed in bombings at Boston marathon; scores wounded. CNN.
  • Li, N., & Zhang, Z. (2011, July 6–8). Abnormal crowd behavior detection using topological methods. In Proceedings of ACIS international conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, Australia (pp. 13–18). Association for Information Systems Electronic Library (AISeL). Retrieved from http://aisel.aisnet.org/
  • Linkov, I., Wenning, R., & Kiker, G. (2007). Managing critical infrastructure risks. Springer.
  • Long, C. (2010, May 3). Official: Times Square bomb suspect did dry run days before. Associated Press.
  • Lucas, B., & Kanade, T. (1981, April). An iterative image registration technique with an application to stereo vision. In Proceedings of the DARPA Image Understanding Workshop, Washington, DC (pp. 121–130). Arlington, VA: DARPA.
  • Maddalena, L., & Petrosino, A. (2013, May). Stopped object detection by learning foreground model in videos. IEEE Transactions on Neural Networks and Learning Systems, 24, 723–735. doi:10.1109/TNNLS.2013.2242092
  • Mahadevan, V., Li, W., Bhalodia, V., & Vasconcelos, N. (2010, June 13–18). Anomaly detection in crowded scenes. In Proceedings of IEEE international conference on Computer Vision and Pattern Recognition, San Francisco, CA (pp. 1975–1981). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Mancas, M., Riche, N., Leroy, J., & Gosselin, B. (2011, September 11–14). Abnormal motion selection in crowds using bottom-up saliency. In Proceedings of IEEE international conference on Image Process, Brussels (pp. 229–232). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Markon, J., & Hsu, S. (2010, May 5). Probe in failed Times Square attack focusing on Pakistani Taliban. Washington Post.
  • Martin, R. (2000, April). A metric for ARMA processes. IEEE Transactions on Signal Processing, 48, 1164–1170. doi:10.1109/78.827549
  • McGuire, B., Cronan, J., & Jackson, R. (2010, May 4). United States of America v. Faisal Shahzad.
  • Mehran, R., Oyama, A., & Shah, M. (2009, June 20–25). Abnormal crowd behavior detection using social force model. In Proceedings of IEEE international conference on Computer Vision and Pattern Recognition, Miami, FL (pp. 935–942). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Murphy, P. (2006, May). Report into the London terrorist attacks on 7 July 2005. Intelligence and Security Committee [Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty's Stationery Office].
  • National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2012). Global terrorism database. Retrieved from http://www.start.umd.edu/gtd
  • Oh, S., Hoogs, A., Perera, A., Cuntoor, N., Chen, C.-C., Lee, J., … Desai, M. (2011). A large-scale benchmark dataset for event recognition in surveillance video. In Proceedings of IEEE international conference on Computer Vision and Pattern Recognition, Colorado Springs, CO. Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Osborn, A. (2010, March 29). Moscow bombing: Who are the black widows. Daily Telegraph.
  • Pathan, S., A-Hamadi, A., & Michaelis, B. (2010, December 7–10). Crowd behavior detection by statistical modeling of motion patterns. In Proceedings of international conference on Soft Computing and Pattern Recognition, Paris (pp. 81–86). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Pritch, Y., Rav-Acha, A., & Peleg, S. (2008, November). Nonchronological video synopsis and indexing. IEEE Transactions on Pattern Analysis and Machine Intelligence, 30, 1971–1984. doi:10.1109/TPAMI.2008.29
  • Reddy, V., Sanderson, C., & Lovell, B. (2011, June 21–23). Improved anomaly detection in crowded scenes via cell-based analysis of foreground speed, size and texture. In Proceedings of IEEE international conference on Computer Vision and Pattern Recognition, Colorado Springs, CO (pp. 55–61). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Regazzoni, C., Cavallaro, A., Wu, Y., Konrad, J., & Hampapur, A. (2010, September). Video analytics for surveillance: Theory and practice. IEEE Signal Processing Magazine, (5), 18–33. Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Reinares, F. (2010). The Madrid bombings and global Jihadism. Survival, 52(2), 83–104. doi:10.1080/00396331003764629
  • Richissin, T. (2004, March 14). Five arrested in Madrid train attacks. Baltimore Sun.
  • Ryan, R., Denman, S., Fookes, C., & Sridharan, S. (2011, August 30 – September 2). Textures of optical flow for real-time anomaly detection in crowds. In IEEE international conference on Advanced Video and Signal-based Surveillance, Klagenfurt University (pp. 230–235). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Saletan, W. (2010, May 13). Surveillance cameras and the Times Square bombing. Slate.
  • Saligrama, V., Konrad, J., & Jodoin, P.-M. (2010, September). Video anomaly identification. IEEE Signal Processing Magazine, 27(5), 18–33.
  • Schmidt, M. (2010, May 2). Security network planned for Midtown. New York Times.
  • Secret, M. (2012, November 16). Man convicted of a terrorist plot to bomb subways is sent to prison for life. New York Times.
  • Seelye, K., Rashbaum, W., & Cooper, M. (2013, April 19). 2nd bombing suspect caught after frenzied hunt paralyzes Boston. New York Times.
  • Serrano, R., & Cloud, D. (2010, May 8). Times Square bomb suspect had ties to key Pakistani militants. Los Angeles Times.
  • Smith, M., & Patterson, T. (2013, April 19). FBI: Help us id Boston bomb suspects. CNN.
  • Soatto, S., Doretto, G., & Wu, Y.-N. (2001, July 7–14). Dynamic textures. In Proceedings of IEEE international conference on Computer Vision (Vol. 2, pp. 439–446). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Springer, D., Regens, J., & Edger, D. (2009). Islamic radicalism and global jihad. Washington, DC: Georgetown University Press.
  • Staff, T. W. (2010, May 6). Day before bombing, Shahzad made a dry run in Manhattan, source says. CNN.
  • Sullivan, E., & Dozier, K. (2010, May 4). AP sources: Bomber trained at Pakistan terror camp. Washington Post.
  • Sullivan, E., & Pace, J. (2013, April 26). Zubeidat Tsarnaeva, bombing suspect's mom, also on terror list. Huffington Post.
  • Tarnopolsky, N. (2013, May 9). The Israeli technology that may have helped identify the alleged Boston bombers. Global Post.
  • Tipping, M. E., & Bishop, C. M. (1999). Mixtures of probabilistic principal component analyzers. Neural Computation, 11, 443–482. doi:10.1007/BF00162527
  • United Kingdom Centre for Applied Science and Technology. (2013). Imagery Library for Intelligent Detection Systems (i-LIDS). Retrieved from http://www.gov.uk/imagery-library-for-intelligent-detection-systems
  • University of California San Diego Statistical Visual Computing Laboratory. (2010). Anomaly detection dataset. Retrieved from http://www.svcl.ucsd.edu/projects/anomaly/
  • University of Minnesota Artificial Intelligence, Robotics and Vision Laboratory. (2009). Unusual crowd activity dataset. Retrieved from http://mha.cs.umn.edu
  • Wu, S., Moore, B., & Shah, M. (2010, June 13–18). Chaotic invariants of Lagrangian particle trajectories for anomaly detection in crowded scenes. In Proceedings of IEEE international conference on Computer Vision and Pattern Recognition, San Francisco, CA (pp. 2054–2060). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Xu, J., Denman, S., Fookes, C., & Sridharan, S. (2011, December 6–8). Unusual event detection in crowded scenes using bag of LBPs in spatio-temporal patches. In Proceeding of international conference on Digital Image Computing: Techniques and Applications, Noosa, Queensland (pp. 549–554). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Yamaguchi, K., Berg, A., Ortiz, L., & Berg, T. (2011, June 21–23). Who are you and where are you going? In Proceedings of IEEE international conference on Computer Vision and Pattern Recognition, Colorado Springs, CO (pp. 1345–1352). Princeton, NJ: Institute of Electrical and Electronic Engineers (IEEE).
  • Zach, C., Pock, T., & Bischof, H. (2007, September 12–14). A duality based approach for real time TV-L1 optical flow. In Fred A. Hamprecht, Christoph Schnörr, and Bernd Jähne (Eds.), Proceedings of DAGM, Heidelberg (Vol., pp. 214–223). Springer.
  • Zelnik-Manor, L., & Perona, P. (2005). Self-tuning spectral clustering (Vol. 17). Cambridge, MA: MIT Press.
  • Zhan, B., Monekosso, D., Remagnino, P., Velastin, S., & Xu, L.-Q. (2008, October). Crowd analysis: A survey. Machine Vision Applications, 19, 345–357.
  • Zhao, G., & Pietikäinen, M. (2007, June). Dynamic texture recognition using local binary patterns with an application to facial expressions. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, 915–928.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.