Audio Surveillance: A Systematic Review

被引:158
作者
Crocco, Marco [1 ]
Cristani, Marco [2 ]
Trucco, Andrea [3 ]
Murino, Vittorio [1 ]
机构
[1] Ist Italiano Tecnol, Pattern Anal & Comp Vis, Pisa, Italy
[2] Univ Verona, Dept Comp Sci, Ca Vignal 2,Str Le Grazie 15, I-37134 Verona, Italy
[3] Univ Genoa, Dipartimento Ingn Navale Elettr Elettr & Telecomu, Via Opera Pia 11, I-16145 Genoa, Italy
关键词
Algorithms; Security; Automated surveillance; audio surveillance; multimodal surveillance; PASSIVE SOURCE LOCALIZATION; EVENT DETECTION; ROBUST LOCALIZATION; PROBABILISTIC MODEL; OBJECT LOCALIZATION; BAND SIGNALS; CLASSIFICATION; SOUND; TIME; INFORMATION;
D O I
10.1145/2871183
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Despite surveillance systems becoming increasingly ubiquitous in our living environment, automated surveillance, currently based on video sensory modality and machine intelligence, lacks most of the time the robustness and reliability required in several real applications. To tackle this issue, audio sensory devices have been incorporated, both alone or in combination with video, giving birth in the past decade, to a considerable amount of research. In this article, audio-based automated surveillance methods are organized into a comprehensive survey: A general taxonomy, inspired by the more widespread video surveillance field, is proposed to systematically describe the methods covering background subtraction, event classification, object tracking, and situation analysis. For each of these tasks, all the significant works are reviewed, detailing their pros and cons and the context for which they have been proposed. Moreover, a specific section is devoted to audio features, discussing their expressiveness and their employment in the above-described tasks. Differing from other surveys on audio processing and analysis, the present one is specifically targeted to automated surveillance, highlighting the target applications of each described method and providing the reader with a systematic and schematic view useful for retrieving the most suited algorithms for each specific requirement.
引用
收藏
页数:46
相关论文
共 159 条
[1]  
Aarabi P., 2001, Information Fusion, V2, P209, DOI 10.1016/S1566-2535(01)00035-5
[2]   Security monitoring using microphone arrays and audio classification [J].
Abu-El-Quran, Ahmad R. ;
Goubran, Rafik A. ;
Chan, Adrian D. C. .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2006, 55 (04) :1025-1032
[3]  
Anderssen M, 2010, PROC ANN BUCLD, P1
[4]  
[Anonymous], IEEE T SPEECH AUDIO
[5]  
[Anonymous], INT J SIGNAL PROCESS
[6]  
[Anonymous], 1992, Array Signal Processing: Concepts and Techniques
[7]  
[Anonymous], 2006, PROC IEEE INT C ACOU
[8]  
[Anonymous], 2006, COMPUT SCI, DOI DOI 10.4018/JDWM.2007070101
[9]  
[Anonymous], 2008, ISMIR
[10]  
[Anonymous], P INT C INT AUT SYST