Adams , A . A . ( 2007 ) Regulating CCTV. Pages 3 – 14 of: Ethicomp 2007: Proceedings of the Ninth International
Conference . Tokyo, Japan: Meiji University.
Adams , A . A . , Murata , K . and Orito , Y . ( 2010 ) The development of Japanese data protection . Policy and Internet
2 (2) : 93 – 124 .
Annesley , J . , Colombo , A . , Orwell , J . and Velastin , S . A . ( 2007 ) A profi le of MPEG-7 for visual surveillance . In:
Proceedings of the Fourth IEEE Advanced Video and Signal-Based Surveillance (AVSS) , London, IEEE Computer
Society: Online, doi:10.1109/AVSS.2007.4425358, pp. 482 – 487 .
BBC . ( 2003 ) (February). Pensioner freed after FBI bungle , news.bbc.co.uk/2/hi/uk_news/england/2799791.stm .
BBC . ( 2006 ) (January). Peeping tom CCTV workers jailed , news.bbc.co.uk/2/hi/uk_news/england/merseyside/
4609746.stm .
BBC . ( 2012 ) High-def CCTV cameras risk backlash, warns UK watchdog, 3 October , www.bbc.co.uk/news/technology-
19812385 .
Bazzani , L . , Cristani , M . , Perina , M . and Murino , V . ( 2012 ) Multiple-shot person re-identifi cation by chromatic
and epitomic analyses . Pattern Recognition Letters 33 (7) : 898 – 903 .
Ben Shitrit , H . , Berclaz , J . , Fleuret , F . and Fua , P . ( 2011 ) Tracking multiple people under global appearance
constraints . In: D.N. Metaxas, L. Quan, A. Sanfeliu and L.J. Van Gool (eds.) 2011 IEEE International Conference
On, Computer Vision (ICCV) , Barcelona. IEEE Computer Society, Online, doi:10.1109/ICCV.2011.6126235,
pp. 137 – 144 .
Berger , A. M. ( 2000 ) Privacy mode for acquisition cameras and camcorders . US Patent 6067399, Sony Corporation,
23 May .
Brin , D . ( 1998 ) The Transparent Society . Jackson, TN: Perseus .
Cezar , J . , Jacques , S . and Musse , S . R . ( 2010 ) Crowd analysis using computer vision techniques . I EEE Signal
Processing Magazine 27 (September) : 66 – 77 .
Coetzer , B . , van der Merwe , J . and Josephs , B . ( 2011 ) Information management and video analytics: The future of
intelligent video surveillance . In: W. Lin (ed.) Video Surveillance . Rijeka, Croatia: InTech , pp. 3 – 16 .
Coudert , F. , Gemo , M. , Beslay , L. and Andritsos , F. ( 2011 ) Pervasive monitoring: Appreciating citizen’s surveillance
as digital evidence in legal proceedings . Imaging for Crime Detection and Prevention (2011) (ICDP 2011),
4th International Conference On , London. IEEE Computer Society, Online, doi:10.1049/ic.2011.0130,
pp. 1 – 6 .
Dee , H . and Hogg , D . ( 2004 ) Detecting inexplicable behaviour . In: A. Hoppe, S. Barman and T. Ellis (eds). Proceedings
of the British Machine Vision Conference, The British Machine Vision Association , Kingston, London.
British Machine Vision Association (BMVA), pp. 73 – 81 .
Dee , H.M . and Hogg , D.C . ( 2009 ) Navigational strategies in behaviour modelling . A rtifi cial Intelligence 173 (2) :
329 – 342 .
Dee , H . M . and Velastin , S . A ( 2008 ) How close are we to solving the problem of automated visual surveillance?
Machine Vision and Applications : 19 (5 – 6) : 329 – 343 .
Dick , A . R . and Brooks , M . J . ( 2003 ) Issues in automated visual surveillance . In: C. Sun, H. Talbot, S. Ourselin and
T . Adriaansen (eds.). Proceedings 7th International Conference on Digital Image Computing: Techniques and
Applications, DICTA ’ 03 . Macquarie University, Sydney, Australia. CSIRO Publishing, pp. 195 – 204, 16 – 12
December .
Doll á r , P . , Wojek , C . , Schiele , B . and Perona , P . ( 2012 ) Pedestrian detection: An evaluation of the state of the art .
Pattern Analysis and Machine Intelligence (PAMI) 34 (4) : 743 – 761 .
Donald , C . ( 2005 ) How many monitors should a CCTV operator view? C CTV Image . Spring , p. 35 .
Dufaux , F . and Ebrahimi , T . ( 2008 ) Scrambling for privacy protection in video surveillance systems . I EEE
Transactions on Circuits and Systems for Video Technology 18 (8) : 1168 – 1174 .
Evans , M. , Boyle , J. N. and Ferryman , J. ( 2012 ) Vehicle classifi cation using evolutionary forests . In: P.L. Carmona,
J.S. S á nchez and A.L.N. Fred (eds.) Proceedings of the International Conference on Pattern Recognition
Applications and Methods , Vilamoura Portugal. SciTe Press, pp. 387 – 393 .
Florence , J . ( 2006 ) Making the no fl y list fl y: A due process model for terrorist watchlists . Yale Law Journal
115 (8) : 2148 – 2181 .
Gong , S . , Loy , C . C . and Xiang , T . ( 2011 ) Security and Surveillance . New York: Springer .
Goold , B . J . ( 2002 ) Privacy rights and public spaces: CCTV and the problem of the ‘ Unobservable observer ’ .
Criminal Justice Ethics 21 (1) : 21 – 27 .
Helbing , D . and Molnar , P . ( 1995 ) Social force model for pedestrian dynamics . P hysical Review E 51 (5) :
4282 – 4286 .
Hempel , L . and T ö pfer , E . ( 2004 ) CCTV in Europe (Final Report) . Technical Report, Urban Eye Project:
HPSE-CT2001-00094 .
Hu , W. , Tan , T. , Wang , L. and Maybank , S ( 2004 ) A survey on visual surveillance of object motions and behaviour .
IEEE Transactions on Systems, Man, and Cybernetics 34 (3) : 334 – 252 .
Independent Police Complaints Commission (UK) . ( 2007 ) Stockwell One: Investigation into the shooting of Jean
Charles de Menezes at Stockwell Underground Station on 22 July 2005, 8 November .
Introna , L . D . ( 2000 ) Workplace surveillance, privacy and distributive justice . ACM SIGCAS Computers and
Society 30 (4) : 33 – 39 .
Introna , L . D . and Wood , D . ( 2004 ) Picturing algorithmic surveillance: The politics of facial recognition systems .
Surveillance and Society 2 (2/3) : 177 – 198 .
Jia , K . and Gong , S . ( 2008 ) Generalized face super-resolution . IEEE Transactions on Image Processing 17 (6) :
873 – 886 .
Ko , T. ( 2011 ) Video surveillance . InTech. Chap. A survey on behaviour analysis in video surveillance applications.
http://tinyurl.com/8hlveuk .
Lee , S.- W. , Park , J. and Lee , S.- W. ( 2006 ) Low resolution face recognition based on support vector data description .
Pattern Recognition 39 (9) : 1809 – 1812 .
Lewis , P . ( 2009 ) Ian Tomlinson death: Guardian video reveals police attack on man who died at G20 protest . The
Guardian , 7 April. www.guardian.co.uk/uk/2009/apr/07/ian-tomlinson-g20-death-video .
Liu , C . , Shum , H .- Y . and Freeman , W . T . ( 2007 ) Face hallucination: Theory and practice . International Journal of
Computer Vision 75 (1) : 115 – 134 .
Lyall , S . ( 2009 ) Critics assail British Police for harsh tactics during the G-20 Summit Meeting . N ew York Times ,
30 May. www.nytimes.com/2009/05/31/world/europe/31police.html .
MarketResearch.com . ( 2011 ) Global video surveillance market, applications and management services forecasts
(2010 – 2015) , 1 January , www.marketresearch.com/MarketsandMarkets-v3719/Global-Video-Surveillance-
Applications-Management-6083117/ .
Mehran , R . , Moore , E . R . and Shah , M . ( 2010 ) A streakline representation of fl ow in crowded scenes . In: European
Conference on Computer Vision (ECCV ) , Berlin: Springer, 5 – 11 September. Heraklion, Greece .
Moussaid , M . , Perozo , N . , Garnier , S . , Helbing , D . and Theraulaz , G . ( 2010 ) The walking behaviour of pedestrian
social groups and its impact on crowd dynamics . PLoS ONE 5 (4) : e10047 .
Norris , C . and Armstrong , G . ( 1999 ) T he Maximum Surveillance Society: The Rise of CCTV . Oxford, UK: Berg .
Orrite , C . , Martinez , F . , Herrero , E . , Ragheb , H . and Velastin , S . ( 2008 ) Independent viewpoint silhouette-based
human action modelling and recognition . In: Proceedings of the 1st International Workshop on Machine Learning
for Vision-based Motion Analysis in Conjunction with the European Conference on Computer Vision (ECCV) ,
17 October. Marseille, France .
Park , J .- S . and Lee , S .- W . ( 2008 ) An example-based face hallucination method for single-frame, low-resolution
facial images . IEEE Transactions on Image Processing 17 (10) : 1806 – 1816 .
Patino , L . , Bremond , F . , Evans , M . , Shahrokni , A . and Ferryman , J . ( 2010 ) Video activity and reporting with
incremental unsupervised learning . In: P roceedings Seventh IEEE Advanced Video and Signal-Based Surveillance
(AVSS) , Sophia Antipolis, France. IEEE Computer Society: Online doi: 10.1109/ AVSS.2010.74, pp. 511 – 518 .
PETS . ( 2006 ) Proceedings of the IEEE 2006 Ninth International Workshop on Performance Evaluation of
Tracking and Surveillance . 18 June. http://www.cvg.rdg.ac.uk/PETS2006/PETS2006_PROCEEDINGS.pdf .
PETS . ( 2007 ) Proceedings of the IEEE 2007 Tenth International Workshop on Performance Evaluation of Tracking
and Surveillance . 14 October. http://pets2007.net/PETS2007_PROCEEDINGS.pdf .
PETS . ( 2009 ) Proceedings of the IEEE 2009 Twelfth International Workshop on Performance Evaluation of
Tracking and Surveillance . 25 June. http://www.cvg.rdg.ac.uk/PETS2009/PETS09_PROCEEDINGS.pdf .
Pham , Q .- C . , Gond , L . , Begard , J . , Allezard , N . and Sayd , P . ( 2007 ) Real time posture analysis in a crowd using
thermal imaging . In: Proceedings Computer Vision and Pattern Recognition (CVPR ’ 07) , Minneapolis. IEEE
Computer Society: Online doi: 10.1109/CVPR.2007.383496, pp. 1 – 8 .
Ragheb , H . , Velastin , S . , Remagnino , P . and Ellis , T . ( 2008 ) ViHASi: Virtual human action silhouette data
for the evaluation of silhouette-based action recognition methods . In: Proceedings of the ACM International
Workshop on Vision Networks for Behaviour Analysis in conjunction with the ACM Multimedia (MM) ,
31 October. Vancouver, Canada. Piscataway, NJ: IEE .
Reeves , B . and Nass , C . ( 2002 ) The Media Equation , 2nd edn. Stanford, CA: CSLI .
Rowlands , M . ( 2011 ) Statewatch analysis – Six months on: An update on the UK coalition government’s commitment
to civil liberties , 21 January , www.statewatch.org/analyses/no-118-uk-civil-liberties-six-months-on.pdf .
Senior , A . et al ( 2005 ) Enabling video privacy through computer vision . IEEE Security and Privacy 3 (3) :
50 – 57 .
Sochman , J . and Hogg , D . C . ( 2011 ) Who knows who – Inverting the social force model for fi nding groups .
In : Proceedings IEEE International Workshop on Socially Intelligent Surveillance and Monitoring (SISM) ,
Barcelona, Spain. IEEE Computer Society: Online, doi: 10.1109/1CCVW.2011.6130338, pp. 830 – 837 .
Spindler , T. , Wartmann , C. , Hovestadt , L. , Roth , D. , Van Gool , L. and Steffen , A. ( 2008 ) Privacy in video surveilled
spaces . Computer Security 16 (2) : 199 – 222 .
The Economist . ( 2012 ) (28 April). Video surveillance: I spy with my big eye , www.economist.com/node/
21553408 .
Tickner , A . H . and Poulton , E . C . ( 1973 ) Monitoring up to 16 synthetic television pictures showing a great deal of
movement . Ergonomics 16 (4) : 381 – 401 .
Tweed , D. and Ferryman , J. ( 2008 ) Enhancing change detection in low-quality surveillance video with markov
random fi elds . In: Proceedings of the 1st ACM International Workshop on Vision Networks for Behaviour
Analysis (VNBA ’ 08) (in conjunction with the ACM Multimedia Conference) . 31 October. Vancouver, Canada.
New York: ACM .
Valera , M . , Velastin , S . , Ellis , A - L . and Ferryman , J . ( 2011 ) Communication mechanisms and middleware
for distributed video surveillance . IEEE Transactions on Circuits and Systems for Video Technology 21 (12) :
1795 – 1809 .
Welsh , B . P . and Farrington , D . P . ( 2009 ) Public area CCTV and crime prevention: An updated systematic review
and meta-analysis . Justice Quarterly 26 (4) : 716 – 745 .
Yilmaz , A . , Javed , O . and Shah , M . ( 2006 ) Object tracking: A survey . ACM Computing Surveys 38 (4) : 1 – 45 .
Zaidenberg , S . , Boulay , B . and Bremond , F . ( 2012 ) A generic framework for video understanding applied
to group behaviour recognition . In: Proceedings of the IEEE Ninth International Conference on Advanced
Video and Signal-Based Surveillance (AVSS 2012) , Beijing, China. IEEE Computer Society: Online,
doi: 10.1109/AVSS.2012.1, pp. 126 – 142 .
Zhan , B . , Monekosso , D . N . , Remagnino , P . , Velastin , S . A . and Xu , L . Q . ( 2008 ) Crowd analysis: A survey .
Machine Vision and Applications 19 (5 – 6) : 345 – 357 .