H.264 Based Architecture of Digital Surveillance Network in Application to Computer Visualization

Wei Zhao*, Raul Batista**, Jeffrey Fan***, Jichang Tan****
*-***Department of Electrical and Computer Engineering, Florida International University, Miami, USA.
****Department of Computer Science and Information Engineering, St. John's University, Taipei, Taiwan.
Periodicity:April - June'2010
DOI : https://doi.org/10.26634/jse.4.4.1169

Abstract

The majority of today’s video surveillance systems are analog based, requiring human interaction and are susceptible to multiple threats. Utilizing a fully digitized system incorporating the Vector Bank (VB), Laplacian of Gaussian (LoG), and Directional Discrete Cosine Transform (DDCT) to each surveillance camera in a surveillance network, the need for digital processing would be accomplished at each individual camera level, reducing the memory required at the network hub and providing a decentralized secure surveillance network. Detection and tracking of moving objects may be sensed by each independent surveillance camera in the network, processed using VB, LoG, and DDCT to drastically reduce bandwidth, and computation time of processing, ultimately reducing data bus traffic and transmission bandwidth. In this paper, the addition of a hardware based System on Chip (SoC) digital signal processing algorithms interfaced to H.264 architecture for the purpose of a fully redundant and autonomous multi-camera digital video surveillance network is discussed. Experimental results show the performance and its capability to detect, isolate and track the objects, while reducing computational time, channel bandwidth and overhead costs of the digital video surveillance network while increasing security. Such achievements prove to greatly improve computer visualization, and performance of the network.

Keywords

H.264, Vector Bank, Surveillance Network, Target Tracking.

How to Cite this Article?

Wei Zhao, Raul Batista, Jeffrey Fan and Jichang Tan (2010). H.264 Based Architecture of Digital Surveillance Network in Application to Computer Visualization. i-manager’s Journal on Software Engineering, 4(4),18-26. https://doi.org/10.26634/jse.4.4.1169

References

[1]. R. Goshorn, J. Goshorn, D. Goshorn, H. Aghajan (2007) Architecture for cluster-based automated surveillance network for detecting and tracking multiple persons. ICDSC07 (219-226)
[2]. K Trivedi, K. Huang and I. Mikic (2000) Intelligent environments and active camera networks. Proc. IEEE Int'l. Conf. on Systems, Man, and Cybernetics, pp. 804-809, Oct. 2000.
[3]. Airport Surveillance Network System, Moxa Company's picturepublication website:http://japan.moxa.com/ applic ations/Gigabit_Ethernet_Switches_for_Airport_Security_Mo nitoring.htm
[4]. Marvin E. Frerking (1993) Digital Signal Processing in Communication Systems
[5]. Iain E. G. Richardson. (2003) H.264 and MPEG-4 Video Compression: Video Coding for Next-generation Multimedia. John Wiley & Sons, Ltd.
[6]. Chen C.Y. Chien S.Y. Huang Y.W. Chen T.C. Wang T.C. Chen L.G. (2005) Analysis and Architecture Design of Variable Block Size Motion Estimation for H.264/AVC. IEEE Transactions on Circuits and Systems I, Volume PP, Issue 99.
[7]. Tung-Chien Chen, Chung-Jr Lian, and Liang-Gee Chen (2006) Hardware architecture design of an h.264/avc video codec. Asia and South Pacific Conference on Design Automation, ASPCDA06: 8 pp., Jan. 2006
[8]. Wei Zhao, Z. Luo, J. Fan, S. Tan (2008) Vector edge detection in H.264 Implementation ICESS: pp. 208-212
[9]. Wei Zhao, C. Castello, J. Fan (2008) Design considerations of SOPC-based H.264/AVC systems.
[10]. Li, D. (2000) Moving objects detection by block comparison, Electronics, Circuits and Systems, Vol. 1, pp. 341-344.
[11]. Cucchiara, R. Grana, C. Piccardi, M. and Prati, A. (2000) Statistic and knowledge-based moving object detection in traffic scenes, IEEE Proceedings. Intelligent Transportation Systems, pp. 27-32.
[12]. Gonzalez, R. C. and Woods, R. E. (2001) Digital image processing, Vol. 10, No. 2, pp. 585–611.
[13]. Cumani, A (1991). Edge Detection in Multispectral Images, CVGIP: Graphical Models and Image Processing. Vol. 53, pp. 40-51.
[14]. Novak, C.L. and Shafer, S.A. (1987) Color Edge Detection, Proceedings DARPA Image Understanding Workshop, Vol. I, pp. 35-37, Los Angeles, CA, USA.
[15]. R. Chen, Wei Zhao, Q. Liu, J. Fan (2008) Efficient H.264 architecture using modular bandwidth estimation.
[16]. Zeng, B. and Fu, J. (2008) Directional Discrete Cosine Transforms – A New Framework of Image coding, IEEE Transactions on Circuit and Systems for Video Technology, Vol. 18, No. 3.
[17]. Wei Zhao, C. Castello, J. Fan (2008) Design considerations of SOPC-based H.264/AVC systems.
[18]. S. Yalcin, H.F. Ates, and I. Hamzaoglu (2005) A high performance hardware architecture for an SAD reuse based hierarchical motion estimation algorithm for H.264 video coding.
[19]. Wei Zhao, J. Fan, A. Davari, (2009) H.264-based wireless surveillance sensors in application to target identification and tracking, IJSE: Vol. 4 No. 2, pp. 47-56
[20]. R. Chen, Wei Zhao, J. Fan, A. Davari (2009) Vector bank based multimedia codec system-on-a-chip (SoC) design", IEEE 10th International Symposium on Pervasive Systems, Algorithms and Networks, I-SPAN09, pp. 515-520
[21]. Kauff, P. and Schuur, K., (1998) Shape-adaptive DCT with block-based DC separation and ?DC correction, IEEE Trans. Circuits Syst. Video Technol., Vol. 8, No. 3, pp. 237–242.
[22]. Rao, K. R. and Yip, P. (1990) Discrete Cosine Transform—Algorithms, Advantages, Applications. London, U.K.
[23]. Ahmed, N. Natarajan, T. and Rao, K. R. (1974) Discrete cosine transform, IEEE Trans. Computer, Vol. 23, No. 1, pp. 90–93, Jan. 1974.
[24]. Bajcsy, A. Kovacic (1989) Multi resolution elastic matching. Computer Graphics and Image Processing.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.