The Design and Implementation of a Wireless Video Surveillance System | Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (original) (raw)

Published: 07 September 2015 Publication History

Abstract

Internet-enabled cameras pervade daily life, generating a huge amount of data, but most of the video they generate is transmitted over wires and analyzed offline with a human in the loop. The ubiquity of cameras limits the amount of video that can be sent to the cloud, especially on wireless networks where capacity is at a premium. In this paper, we present Vigil, a real-time distributed wireless surveillance system that leverages edge computing to support real-time tracking and surveillance in enterprise campuses, retail stores, and across smart cities. Vigil intelligently partitions video processing between edge computing nodes co-located with cameras and the cloud to save wireless capacity, which can then be dedicated to Wi-Fi hotspots, offsetting their cost. Novel video frame prioritization and traffic scheduling algorithms further optimize Vigil's bandwidth utilization. We have deployed Vigil across three sites in both whitespace and Wi-Fi networks. Depending on the level of activity in the scene, experimental results show that Vigil allows a video surveillance system to support a geographical area of coverage between five and 200 times greater than an approach that simply streams video over the wireless network. For a fixed region of coverage and bandwidth, Vigil outperforms the default equal throughput allocation strategy of Wi-Fi by delivering up to 25% more objects relevant to a user's query.

References

[1]

Motion JPEG Video Codec. http://www.digitalpreservation.gov/formats/fdd/fdd000063.shtml.

[2]

MPEG4/H264 Video Coding Standard. http://mpeg.chiariglione.org/standards/mpeg-4.

[3]

S. Biswas, J. Bicket, E. Wong, R. Musaloiu-E, A. Bhartia, and D. Aguayo. Large-scale measurements of wireless network behavior. In ACM SIGCOMM, 2015.

[4]

B. Coifman, D. Beymer, P. McLauchlan, and J. Malik. A real-time computer vision system for vehicle tracking and traffic surveillance. Elsevier Transportation Research Part C: Emerging Technologies, 6(4):271 -- 288, 1998.

[5]

T. Dao, A. K. Roy-Chowdhury, H. V. Madhyastha, S. V. Krishnamurthy, and T. L. Porta. Managing redundant content in bandwidth constrained wireless networks. In ACM CoNEXT, 2014.

[6]

A. Demers, S. Keshav, and S. Shenker. Analysis and simulation of a fair queueing algorithm. In ACM SIGCOMM, 1989.

[7]

Doodle Labs. Broadband TV Whitespace Transceiver. http://www.doodlelabs.com/products/radio-transceivers/sub-ghz-range/470-790-mhz-tvws-100.

[8]

Dropcam. Dropcam website. https://www.dropcam.com.

[9]

P. B. Gibbons, B. Karp, Y. Ke, S. Nath, and S. Seshan. Irisnet: An architecture for a worldwide sensor web. Pervasive Computing, IEEE, 2(4):22--33, 2003.

[10]

E. Gudis, L. Pullan, D. Berends, K. Kaighn, G. Van der Wal, G. Buchanan, S. Chai, and M. Piacentino. An embedded vision services framework for heterogeneous accelerators. In Computer Vision and Pattern Recognition Workshops (CVPRW), 2013 IEEE Conference on, pages 598--603, June 2013.

[11]

T. Gupta, R. P. Singh, A. Phanishayee, J. Jung, and R. Mahajan. Bolt: Data management for connected homes. In NSDI, 2014.

[12]

K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, and M. Satyanarayanan. Towards Wearable Cognitive Assistance. In ACM MobiSys, 2014.

[13]

S. Han, R. Nandakumar, M. Philipose, A. Krishnamurthy, and D. Wetherall. GlimpseData: Towards continuous vision-based personal analytics. In ACM MobiSys Workshop on Physical Analytics, 2014.

[14]

W. Hu, B. Amos, Z. Chen, K. Ha, W. Richter, P. Pillai, B. Gilbert, J. Harkes, and M. Satyanarayanan. The case for offload shaping. In HotMobile, 2015.

[15]

IDC. The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East, Dec. 2012. http://www.emc.com/leadership/digital-universe/2012iview/executive-summary-a-universe-of.htm.

[16]

S. Kozat, R. Venkatesan, and M. Mihcak. Robust perceptual image hashing via matrix invariants. In ICIP, 2004.

[17]

D. Lowe. Object recognition from local scale-invariant features, 1999.

[18]

mkomo.com. A History of Storage Cost. http://www.mkomo.com/cost-per-gigabyte-update.

[19]

V. Monga and B. Evans. Perceptual image hashing via feature points: Performance evaluation and tradeoffs. IEEE Trans. on Image Processing, 15(11):3452--3465, 2006.

[20]

V. Moshnyaga, K. Hashimoto, and T. Suetsugu. A Hardware Design of Camera-based User's Presence Detector. In IEEE International conference on Systems, Man and Cybernetics, 2008.

[21]

OpenVPN Technologies. OpenVPN Virtual Networking Device. https://openvpn.net.

[22]

B. Paczek. A real time vehicle detection algorithm for vision-based sensors. In L. Bolc, R. Tadeusiewicz, L. Chmielewski, and K. Wojciechowski, editors, Computer Vision and Graphics, volume 6375 of Lecture Notes in Computer Science, pages 211--218. Springer Berlin Heidelberg, 2010.

[23]

M. Ra, A. Sheth, L. Mummert, P. Pillai, D. Wetherall, and R. Govindan. Odessa: Enabling Interactive Perception Applicaitons on Mobile Devices. In ACM MobiSys, 2011.

[24]

M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The Case for VM-Based Cloudlets in Mobile Computing. IEEE Pervasive Computing, 8(4):14--23, 2009.

[25]

M. Shreedhar and G. Varghese. Efficient fair queuing using deficit round robin. In ACM SIGCOMM, 1995.

[26]

T. Sikora. The MPEG-4 video standard verification model. IEEE Trans. on Circuits and Systems for Video Technology, 7:19--31, 1997.

[27]

Spectrum Bridge Inc. Spectrum bridge database. http://www.spectrumbridge.com/Home.aspx.

[28]

T. Theocharides, G. Link, N. Vijakrishnan, M. Irwin, and W. Wolf. Embedded hardware face detection. In IEEE Conf. on VLSI Design, 2004.

[29]

Y.-L. Tian, L. Brown, A. Hampapur, M. Lu, A. Senior, and C. Shu. IBM Smart Surveillance System (S3): Event Based Video Surveillance System with an Open and Extensible Framework. Mach. Vision Appl., 19(5-6):315--327, Sept. 2008.

[30]

H. Wang, X. Bao, R. R. Choudhury, and S. Nelakuditi. Insight: Recognizing humans without face recognition. In ACM HotMobile, 2013.

[31]

T. Wang, G. Cardone, A. Corradi, L. Torresani, and A. T. Campbell. WalkSafe: A Pedestrian Safety App for Mobile Phone Users Who Walk and Talk While Crossing Roads. In ACM HotMobile, 2012.

[32]

C.-W. You, N. D. Lane, F. Chen, R. Wang, Z. Chen, T. J. Bao, M. Montes-de Oca, Y. Cheng, M. Lin, L. Torresani, and A. T. Campbell. CarSafe App: Alerting Drowsy and Distracted Drivers Using Dual Cameras on Smartphones. In MobiSys, 2013.

[33]

Z. Zhang, A. Scanlon, W. Yin, L. Yu, and P. L. Venetianer. Video surveillance using a multi-camera tracking and fusion system. In M2SFA2, 2012.

Information & Contributors

Information

Published In

cover image ACM Conferences

MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking

September 2015

638 pages

Copyright © 2015 ACM.

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 September 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. edge computing
  2. video surveillance
  3. wireless

Qualifiers

Funding Sources

Conference

Acceptance Rates

MobiCom '15 Paper Acceptance Rate 38 of 207 submissions, 18%;

Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

ePub

View this article in ePub.

ePub

Media

Figures

Other

Tables

Affiliations

Tan Zhang

University of Wisconsin, Madison, Madison, WI, USA

Aakanksha Chowdhery

Microsoft Research, Redmond, WA, USA

Paramvir (Victor) Bahl

Microsoft Research, Redmond, WA, USA

Kyle Jamieson

University College London, London, United Kingdom

Suman Banerjee

University of Wisconsin Madison, Madison, WI, USA