The Design and Implementation of a Wireless Video Surveillance System | Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (original) (raw)
Published: 07 September 2015 Publication History
Abstract
Internet-enabled cameras pervade daily life, generating a huge amount of data, but most of the video they generate is transmitted over wires and analyzed offline with a human in the loop. The ubiquity of cameras limits the amount of video that can be sent to the cloud, especially on wireless networks where capacity is at a premium. In this paper, we present Vigil, a real-time distributed wireless surveillance system that leverages edge computing to support real-time tracking and surveillance in enterprise campuses, retail stores, and across smart cities. Vigil intelligently partitions video processing between edge computing nodes co-located with cameras and the cloud to save wireless capacity, which can then be dedicated to Wi-Fi hotspots, offsetting their cost. Novel video frame prioritization and traffic scheduling algorithms further optimize Vigil's bandwidth utilization. We have deployed Vigil across three sites in both whitespace and Wi-Fi networks. Depending on the level of activity in the scene, experimental results show that Vigil allows a video surveillance system to support a geographical area of coverage between five and 200 times greater than an approach that simply streams video over the wireless network. For a fixed region of coverage and bandwidth, Vigil outperforms the default equal throughput allocation strategy of Wi-Fi by delivering up to 25% more objects relevant to a user's query.
References
[1]
Motion JPEG Video Codec. http://www.digitalpreservation.gov/formats/fdd/fdd000063.shtml.
[2]
MPEG4/H264 Video Coding Standard. http://mpeg.chiariglione.org/standards/mpeg-4.
[3]
S. Biswas, J. Bicket, E. Wong, R. Musaloiu-E, A. Bhartia, and D. Aguayo. Large-scale measurements of wireless network behavior. In ACM SIGCOMM, 2015.
[4]
B. Coifman, D. Beymer, P. McLauchlan, and J. Malik. A real-time computer vision system for vehicle tracking and traffic surveillance. Elsevier Transportation Research Part C: Emerging Technologies, 6(4):271 -- 288, 1998.
[5]
T. Dao, A. K. Roy-Chowdhury, H. V. Madhyastha, S. V. Krishnamurthy, and T. L. Porta. Managing redundant content in bandwidth constrained wireless networks. In ACM CoNEXT, 2014.
[6]
A. Demers, S. Keshav, and S. Shenker. Analysis and simulation of a fair queueing algorithm. In ACM SIGCOMM, 1989.
[7]
Doodle Labs. Broadband TV Whitespace Transceiver. http://www.doodlelabs.com/products/radio-transceivers/sub-ghz-range/470-790-mhz-tvws-100.
[8]
Dropcam. Dropcam website. https://www.dropcam.com.
[9]
P. B. Gibbons, B. Karp, Y. Ke, S. Nath, and S. Seshan. Irisnet: An architecture for a worldwide sensor web. Pervasive Computing, IEEE, 2(4):22--33, 2003.
[10]
E. Gudis, L. Pullan, D. Berends, K. Kaighn, G. Van der Wal, G. Buchanan, S. Chai, and M. Piacentino. An embedded vision services framework for heterogeneous accelerators. In Computer Vision and Pattern Recognition Workshops (CVPRW), 2013 IEEE Conference on, pages 598--603, June 2013.
[11]
T. Gupta, R. P. Singh, A. Phanishayee, J. Jung, and R. Mahajan. Bolt: Data management for connected homes. In NSDI, 2014.
[12]
K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, and M. Satyanarayanan. Towards Wearable Cognitive Assistance. In ACM MobiSys, 2014.
[13]
S. Han, R. Nandakumar, M. Philipose, A. Krishnamurthy, and D. Wetherall. GlimpseData: Towards continuous vision-based personal analytics. In ACM MobiSys Workshop on Physical Analytics, 2014.
[14]
W. Hu, B. Amos, Z. Chen, K. Ha, W. Richter, P. Pillai, B. Gilbert, J. Harkes, and M. Satyanarayanan. The case for offload shaping. In HotMobile, 2015.
[15]
IDC. The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East, Dec. 2012. http://www.emc.com/leadership/digital-universe/2012iview/executive-summary-a-universe-of.htm.
[16]
S. Kozat, R. Venkatesan, and M. Mihcak. Robust perceptual image hashing via matrix invariants. In ICIP, 2004.
[17]
D. Lowe. Object recognition from local scale-invariant features, 1999.
[18]
mkomo.com. A History of Storage Cost. http://www.mkomo.com/cost-per-gigabyte-update.
[19]
V. Monga and B. Evans. Perceptual image hashing via feature points: Performance evaluation and tradeoffs. IEEE Trans. on Image Processing, 15(11):3452--3465, 2006.
[20]
V. Moshnyaga, K. Hashimoto, and T. Suetsugu. A Hardware Design of Camera-based User's Presence Detector. In IEEE International conference on Systems, Man and Cybernetics, 2008.
[21]
OpenVPN Technologies. OpenVPN Virtual Networking Device. https://openvpn.net.
[22]
B. Paczek. A real time vehicle detection algorithm for vision-based sensors. In L. Bolc, R. Tadeusiewicz, L. Chmielewski, and K. Wojciechowski, editors, Computer Vision and Graphics, volume 6375 of Lecture Notes in Computer Science, pages 211--218. Springer Berlin Heidelberg, 2010.
[23]
M. Ra, A. Sheth, L. Mummert, P. Pillai, D. Wetherall, and R. Govindan. Odessa: Enabling Interactive Perception Applicaitons on Mobile Devices. In ACM MobiSys, 2011.
[24]
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The Case for VM-Based Cloudlets in Mobile Computing. IEEE Pervasive Computing, 8(4):14--23, 2009.
[25]
M. Shreedhar and G. Varghese. Efficient fair queuing using deficit round robin. In ACM SIGCOMM, 1995.
[26]
T. Sikora. The MPEG-4 video standard verification model. IEEE Trans. on Circuits and Systems for Video Technology, 7:19--31, 1997.
[27]
Spectrum Bridge Inc. Spectrum bridge database. http://www.spectrumbridge.com/Home.aspx.
[28]
T. Theocharides, G. Link, N. Vijakrishnan, M. Irwin, and W. Wolf. Embedded hardware face detection. In IEEE Conf. on VLSI Design, 2004.
[29]
Y.-L. Tian, L. Brown, A. Hampapur, M. Lu, A. Senior, and C. Shu. IBM Smart Surveillance System (S3): Event Based Video Surveillance System with an Open and Extensible Framework. Mach. Vision Appl., 19(5-6):315--327, Sept. 2008.
[30]
H. Wang, X. Bao, R. R. Choudhury, and S. Nelakuditi. Insight: Recognizing humans without face recognition. In ACM HotMobile, 2013.
[31]
T. Wang, G. Cardone, A. Corradi, L. Torresani, and A. T. Campbell. WalkSafe: A Pedestrian Safety App for Mobile Phone Users Who Walk and Talk While Crossing Roads. In ACM HotMobile, 2012.
[32]
C.-W. You, N. D. Lane, F. Chen, R. Wang, Z. Chen, T. J. Bao, M. Montes-de Oca, Y. Cheng, M. Lin, L. Torresani, and A. T. Campbell. CarSafe App: Alerting Drowsy and Distracted Drivers Using Dual Cameras on Smartphones. In MobiSys, 2013.
[33]
Z. Zhang, A. Scanlon, W. Yin, L. Yu, and P. L. Venetianer. Video surveillance using a multi-camera tracking and fusion system. In M2SFA2, 2012.
Information & Contributors
Information
Published In
MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
September 2015
638 pages
Copyright © 2015 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 07 September 2015
Permissions
Request permissions for this article.
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- European Research Council
- National Science Foundation
Conference
Acceptance Rates
MobiCom '15 Paper Acceptance Rate 38 of 207 submissions, 18%;
Overall Acceptance Rate 440 of 2,972 submissions, 15%
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- View Citations
- Downloads (Last 12 months)138
- Downloads (Last 6 weeks)14
Reflects downloads up to 21 Sep 2024
Other Metrics
Citations
- GAO YLIU SGUO BXU XBIAN HHAO JXU WYU Z(2024)Lightweight sensing-computing-decision collaboration enhancement for multi-mobile terminalsSCIENTIA SINICA Informationis10.1360/SSI-2024-008954:9(2136)Online publication date: 9-Sep-2024
- Mi LYuan TWang WDai HSun LZheng JChen GFu X(2024)Accelerated Neural Enhancement for Video Analytics With Video Quality AdaptationIEEE/ACM Transactions on Networking10.1109/TNET.2024.337510832:4(3045-3060)Online publication date: Aug-2024
- Zhang LXu JLu ZSong L(2024)CrossVision: Real-time On-Camera Video Analysis via Common RoI Load BalancingIEEE Transactions on Mobile Computing10.1109/TMC.2023.3301391(1-13)Online publication date: 2024
- Zhang LZhu HFei WLi YZhang MCao JGuo M(2024)Novas: Tackling Online Dynamic Video Analytics With Service Adaptation at Mobile Edge ServersIEEE Transactions on Computers10.1109/TC.2024.341667573:9(2220-2232)Online publication date: Sep-2024
- Alam QHaque IAbu-Ghazaleh N(2024)Learn to Compress (LtC): Efficient Learning-based Streaming Video AnalyticsNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10574920(1-9)Online publication date: 6-May-2024
- Sun LWang WYuan TMi LDai HLiu YFu X(2024)BiSwift: Bandwidth Orchestrator for Multi-Stream Video Analytics on EdgeIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621392(1181-1190)Online publication date: 20-May-2024
- Wang XYu RYang DGu HLi Z(2024)VeriEdge: Verifying and Enforcing Service Level Agreements for Pervasive Edge ComputingIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621128(2149-2158)Online publication date: 20-May-2024
- Huang YZharfan FHendrawan HGunawi HJiang J(2024)Concierge: Towards Accuracy-Driven Bandwidth Allocation for Video Analytics Applications in Edge Network2024 IEEE International Conference on Edge Computing and Communications (EDGE)10.1109/EDGE62653.2024.00017(59-66)Online publication date: 7-Jul-2024
- Chen TBu YZeng YXie LLu S(2024)RegionFilter: Region-aware video filtering mechanism on resource-constrained edge nodesComputer Networks10.1016/j.comnet.2024.110624251(110624)Online publication date: Sep-2024
- Szabó GPető J(2024)Intelligent wireless resource management in industrial camera systemsComputer Communications10.1016/j.comcom.2023.12.026216:C(68-85)Online publication date: 15-Feb-2024
- Show More Cited By
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Full Access
View options
View or Download as a PDF file.
eReader
View online with eReader.
ePub
View this article in ePub.
Media
Figures
Other
Tables
Affiliations
Tan Zhang
University of Wisconsin, Madison, Madison, WI, USA
Aakanksha Chowdhery
Microsoft Research, Redmond, WA, USA
Paramvir (Victor) Bahl
Microsoft Research, Redmond, WA, USA
Kyle Jamieson
University College London, London, United Kingdom
Suman Banerjee
University of Wisconsin Madison, Madison, WI, USA