WP1 - Re-evaluation of available AI techniques and architectures

Identification of limitations / constraints and possibilities to improve the technology to be adopted in conjunction with the specific requirements.

D1.1.

The current activity was dedicated to the centralization of the requirements that the Beneficiary has in the current activities, with a specific objective: the validation of the identity of the persons. Particular attention was paid to the analysis of the preliminary requirements in order to identify the hypotheses of use and define the operational work scenarios, as follows: scenario 1: identification of persons - search in a database of identities; Scenario 2: Re-identifying a person based on a reference - searching video streams / videos.

D1.2.

During the research of the person re-identification methods, there have been collected and analyzed a series of methods from the current literature that perform re-identification with closed data set based on the analysis of static, dynamic features, peculiarities of gait and skeleton; a number of heterogeneous, noise-robust, semi-supervised or unsupervised re-identification methods, end-to-end detection and re-identification methods, and re-identification of groups of individuals. Methods for hiding and anonymizing faces were analyzed, the possibility of processing on embedded hardware platforms was analyzed, and a number of multi-modal fusion methods were studied to improve identification results. More than 100 selected bibliographic references from the literature were reviewed.

D1.3.

The activity was dedicated to the analysis of sensors and video data sources, especially from the perspective of data models and standards to be implemented so that the solution covers as many video sources as possible, being agnostic to the type of existing video from the aforementioned point of view. Following this activity, the standards to be used for connecting video sources (ONVIF) were determined.

D1.4.

The activity aimed at analyzing the legislative framework in force, regarding the legal methods of acquisition and processing of personal data by the elements of the system to be implemented and how to secure the data flows that are conveyed by its elements. The main aspects of the study are the following: Presentation of the legislative framework on the protection of individuals concerning the processing of personal data and on the free movement of such data; Documentation on security techniques and mechanisms applied in communication networks; Documentation and analysis of available security services to ensure the security of an information system; Presentation of the cryptographic algorithms used to ensure the confidentiality and integrity of data; Propose methods for securing network communications that can be used in the project; Propose methods for processing video and image recordings, such as blurring portions of video recordings; Propose methods for securing information stored in databases: measures to protect access, measures to ensure data integrity, measures to ensure data confidentiality.

D1.5.

During the activity, we analyzed existing architectures, with the corresponding advantages and disadvantages. Two distinct working topologies were identified: (i) server-side processing, (ii) on-the-edge processing. Centralized systems helped the early networks in their development and were the only option before the emergence of decentralized systems, that were based on new hardware developments allowing proper processing performance even for nano-PC devices, embedded camera CPU, etc. Less prone to malfunctions and providing faster access times, decentralized systems have seen a considerable improvement over older systems. The developed solution will ensure compatibility with both architectures, often in complex projects co-existing a mix between these working topologies. Following the study carried out in this activity, it was concluded that the system created must support both types of architectures. This is actually a mixed architecture, which is based on both a distributed and a centralized processing component, minimizing the weaknesses of each topology and highlighting the strengths.

D1.6.

We identified 32 databases as follows: 12 image databases, 4 occlusion databases, 4 attack databases, 2 RGB-IR spectrum databases, 9 video databases, and a textual-visual database. The most important details about the selected databases were presented, and the main modern methods with top results on the selected databases were presented, showcasing the results of over 175 systems for the selected databases, most of them being recent works.