|Home||Research||Publications||Activities||Collaborators||People||[PhD and Internship Projects]||Datasets||Contact|
Awards and Recognition
Invited Talks and Keynote Presentations
- Keynote speech: Professor Brian Lovell, International Joint Conference on Biometrics, Washington DC, USA, October 2011.
- Keynote speech: Professor Brian Lovell, The seventh IEEE workshop on embedded computer vision, Colorado Spring, CO, USA, 20 June 2011.
- Keynote speech: Professor Brian Lovell, The Future of Security Surveillance: Reliable Person and Vehicle Recognition, FutureCCTV09, Raffles Hotel, Singapore May 19-21, 2009
- Invited 1-Day Workshop: Professor Brian Lovell, Intelligent CCTV: Tricks of the Trade, FutureCCTV08, Singapore, 18 April 2008
- Keynote speech: Professor Brian Lovell, Intelligent CCTV Project with Queensland Transport, FutureCCTV08, Raffles Hotel, Singapore, 16-17 April 2008
- Keynote speech: Dr. Abbas Bigdeli, Intelligent CCTV Project with Queensland Transport, Transit Security and Infrastructure Design, Brisbane, 1 April 2008
Advanced Surveillance Team in Resilient Infrastructure Magazine[read more].
Eyes in the sky: how unmanned aircraft could patrol our beaches (and more)For the past hundred-odd years, commercial aviation has relied on a human pilot sitting behind the controls of an aircraft. Today, designers and engineers are beginning to ask: “Is it even necessary to have someone onboard? Can we have adequate control with the human pilot on the ground, rather than in the cockpit?”This school of thought is driving a revolution in aviation, with intelligent technology become thoroughly integrated into avionic systems and aeronautical processes. Sure, it might be a while before we see commercial airliners being piloted from the ground, but the development of miniature unmanned aircraft is well underway.[read more on "THE CONVERSATION"].
All-seeing eye: the future of surveillance and social mediaAdvanced surveillance and social media might seem like strange bedfellows. Until you look a bit closer, that is.Technologies developed for surveillance applications are typically designed with robustness in mind: that is, they should work reliably at all times in a variety of lighting conditions (indoor/outdoor) and effects (glare, saturation or shadows) [read more on "THE CONVERSATION"].
Something to watch over me: policing our national bordersCommercial ports, railway stations and other crucial infrastructure are at constant risk from security incidents that can halt operations and, more worryingly, put you and I in harm’s way.This is a reality around the world, and Australia is no different [read more on "THE CONVERSATION"].
Face-in-the-crowd biometrics: here’s looking secretly at youIn the surveillance world there are certain grand challenges – holy grails that researchers and those who use surveillance pursue doggedly, spurned on by the technical issues such challenges pose.Paramount in these is real-time face-in-the-crowd technology: a recognition system advanced enough to sift through large crowds of people, none of whom are consciously facing CCTV cameras, to get results [read more on "THE CONVERSATION"].
Big Brother is watching, but it’s nothing to fret about … honestIt’s hard to discuss public surveillance without immediately being asked about privacy issues. As technologists working on computer-based surveillance, it’s tempting to say this is outside our area of expertise, but we believe there may be a moral imperative to state our views on this thorny issue.Firstly, it would seem public perception of CCTV surveillance has changed over the years [read more on "THE CONVERSATION"].
You, yes you: welcome to the world of advanced surveillanceThe use of surveillance in public spaces is growing at an unprecedented pace in response to acts of terror and threats to critical infrastructure.But while it is relatively easy (albeit expensive) to install increasing numbers of cameras, it is quite another issue to adequately monitor surveillance video [read more on "THE CONVERSATION"].
Best of CeBIT 2010
Video-based Face Recognition software at CeBIT Australia was chosen as one of the highlights of CeBIT in the news.
CeBIT Australia is the leading business event in the Asia Pacific region for Information and Communications Technology, and the biggest ICT exhibit in the country. This year, the exhibit was hosting about 600 exhibitors and 30000 visitors.
The aim of this project is to demonstrate the capabilities of the Advanced Surveillance face recognition system on low resolution images from the internet. The SAFE AS team has developed a web interface and client-server platform to run face recognition on database of around 4000 labelled, low-resolution images obtained from trolling the internet and from the Labeled Faces in the Wild public dataset provided by University of Massachutsetts. When a query image is given, the labelled dataset images are ranked in order of similarity and presented to the user.
The aim of this project is to extend the application domain to mobile phones. The advantages of the face recognition algorithm developed from the research at Advanced Surveillance include its speed, robustness to environmental and pose factors and that it works well on low resolution images. Given its low computational requirements it is well suited to mobile applications, particularly for photos taken in varying conditions and via low quality mobile phone cameras. A prototype is being developed on the iPhone.
Intelligent CCTV for Proactive Security
|Video surveillance systems have attracted worldwide attention since they were used to such great effect to track the movements of the four suicide bombers in the days before their attack on the London Underground in July 2005. Despite their usefulness, most current surveillance systems only provide reactive security by enabling the analysis of activities after the terrorist attack has already occurred — what is needed is proactive security to help prevent future attacks. Intelligent Closed-Circuit TV (ICCTV) systems use powerful computers to analyse the video feeds to assist human operators to detect events of interest as they occur — an example might be recognising the face of a suspected terrorist in a crowded railway station. In this project, we plan to run long term trials of advanced ICCTV technologies in important and sensitive public spaces such as major ports and railway stations, so that we can address operational and capability deficiencies in current ICCTV systems. The field trial component of the proposal in conjunction with established vendors will ensure that the ICCTV research is focussed on operational and real-world deployment issues in the Australian context. The research component funded by NICTA aims to improve the counter-terrorism capabilities and sensitivities of ICCTV systems whilst reducing the false alarm rate.|
|This project, "Intelligent CCTV for Proactive Security," was funded in 2006-2008 by the National Security Science and Technology Unit of the Department of Prime Minister and Cabinet.|
Advanced Surveillance to Protect Critical Infrastructure
|Intelligent Video Surveillance using CCTV is a necessary tool for agencies to ensure public safety and protect critical infrastructure. Commercial ports, Railway stations and other critical infrastructure around Australia are at constant risk from security incidents that can put the public at risk and halt operations. The key objective in this project is to apply, develop, and deploy advanced technologies for real-time video analysis and presentation to actively identify and track people and vehicles (including small boats). Furthermore, 3D video analysis from calibrated cameras will be used for incident detection and anomalous behaviour identification.|
|This project, "Advanced Surveillance to Protect Critical Infrastructure," is funded in 2009-2011 by the National Security Science and Technology Unit of the Department of Prime Minister and Cabinet.|
Armadillo: Open Source C++ Linear Algebra Library
|Armadillo is a C++ linear algebra library (matrix maths) aiming towards a good balance between speed and ease of use. It's being developed as part of the SAFE AS project in order the provide a solid backbone for computationally intensive experimentation, while at the same time allowing for relatively painless transition of research code into production environments.|
- Demonstrated at IFSEC Security Trade Show (May 2009, Birmingham, UK)
- Demonstrated at IDEX Defence Trade Show (February 2009, Abu Dhabi, UAE)
- Demonstrated at ASIS Security Trade Show (September 2007, Las Vegas, USA)
- Demonstrated at CeBIT (May 2007, Sydney)
- Demonstrated at CeBIT (March 2010, Hannover)
- Demonstrated at CeBIT (May 2010, Sydney)
- Demonstrated as CeBIT (May 2011, Sydney)