{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:16:48Z","timestamp":1760955408411},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1007\/s11042-013-1575-9","type":"journal-article","created":{"date-parts":[[2013,7,16]],"date-time":"2013-07-16T02:11:39Z","timestamp":1373940699000},"page":"573-598","source":"Crossref","is-referenced-by-count":6,"title":["Requirements for multimedia metadata schemes in surveillance applications for security"],"prefix":"10.1007","volume":"70","author":[{"given":"J.","family":"van Rest","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"F. A.","family":"Grootjen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Grootjen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Wijn","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"O.","family":"Aarts","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. L.","family":"Roelofs","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G. J.","family":"Burghouts","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H.","family":"Bouma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"L.","family":"Alic","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"W.","family":"Kraaij","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,7,17]]},"reference":[{"key":"1575_CR1","unstructured":"Alexander C (1977) A Pattern Language: Towns, Buildings, Construction"},{"key":"1575_CR2","unstructured":"Annesley J, Colombo A, Orwell J, Velastin S (2007) A profile of MPEG-7 for visual surveillance, IEEE Int. Conf. AVSS, 482\u2013487"},{"key":"1575_CR3","doi-asserted-by":"crossref","unstructured":"Bouma H, Vogels J, Aarts O, Kruszynski C, Wijn R, Burghouts G (2013) Behavioral profiling in CCTV cameras by combining multiple subtle suspicious observations of different surveillance operators, Proc. SPIE 8745","DOI":"10.1117\/12.2015869"},{"issue":"5","key":"1575_CR4","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1109\/TSMCC.2011.2135344","volume":"41","author":"GJ Burghouts","year":"2011","unstructured":"Burghouts GJ, Marck J (2011) Reasoning about threats: from observables to situation assessment. IEEE Trans Syst Man Cybern 41(5):608\u2013616","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"1575_CR5","unstructured":"Buschmann F, Meunier R, Rohnert H, Sommerlad P (1996) Pattern-Oriented Software Architecture, Volume 1: A System of Patterns. John Wiley & Sons"},{"key":"1575_CR6","unstructured":"CAVIAR: Context aware vision using image-based active recognition. http:\/\/homepages.inf.ed.ac.uk\/rbf\/CAVIAR\/"},{"key":"1575_CR7","unstructured":"CVML: Computer vision markup language. http:\/\/homepages.inf.ed.ac.uk\/tlist\/cvml\/spec.html"},{"key":"1575_CR8","first-page":"167","volume":"4","author":"D Doermann","year":"2000","unstructured":"Doermann D, Mihalcik D (2000) Tools and techniques for video performance evaluation. ICPR 4:167\u2013170","journal-title":"ICPR"},{"key":"1575_CR9","unstructured":"Dutch top sector high tech systems & materials: Roadmap security, passive sensors. http:\/\/www.htsm.nl\/Roadmaps\/Security"},{"key":"1575_CR10","unstructured":"ETISIO: Video understanding evaluation. http:\/\/www-sop.inria.fr\/orion\/ETISEO\/"},{"key":"1575_CR11","unstructured":"Fisher RB (2004) The PETS04 surveillance ground-truth data sets. Proc. 6th IEEE Int. Workshop on Performance Evaluation of Tracking and Surveillance, pp 1\u20135"},{"key":"1575_CR12","doi-asserted-by":"crossref","unstructured":"Francois AR, Nevatia R, Hobbs J, Bolles RC, Smith JR (2005) VERL: an ontology framework for representing and annotating video events. Multimedia, IEEE 12(4):76\u201386","DOI":"10.1109\/MMUL.2005.87"},{"key":"1575_CR13","unstructured":"HUMAN ML: Human markup language. https:\/\/www.oasis-open.org\/committees\/download.php\/60\/HM.Primary-Base-Spec-1.0.html"},{"key":"1575_CR14","unstructured":"I-LIDS: Imagery library for intelligent detection systems. Home Office, UK"},{"key":"1575_CR15","unstructured":"INCOSE, a consensus of the INCOSE fellows. http:\/\/www.incose.org"},{"key":"1575_CR16","unstructured":"Kester LJHM (2008) Designing networked adaptive interactive hybrid systems. IEEE Multisensor Fusion and Integration for Intelligent Systems, 2008, MFI 2008, pp 516\u2013521"},{"key":"1575_CR17","unstructured":"Kipp M (2013) Anvil: the video research annotation tool. http:\/\/www.anvil-software.org\/ accessed January 4th 2013"},{"key":"1575_CR18","doi-asserted-by":"crossref","unstructured":"Kipp M (2013) Anvil 4.0 Annotation of video and spoken language","DOI":"10.1093\/oxfordhb\/9780199571932.013.024"},{"key":"1575_CR19","doi-asserted-by":"crossref","unstructured":"La Vigne NG (2011) Evaluating the use of public surveillance cameras for crime control and prevention","DOI":"10.1037\/e718182011-001"},{"key":"1575_CR20","volume-title":"Building large knowledge-based systems: representation and inference in the CYC project","author":"DB Lenat","year":"1990","unstructured":"Lenat DB, Guha RV (1990) Building large knowledge-based systems: representation and inference in the CYC project. Addison\u2013Wesley, Reading"},{"key":"1575_CR21","first-page":"789","volume":"1","author":"T List","year":"2004","unstructured":"List T, Fisher RB (2004) CVML-an XML-based computer vision markup language. Int Conf Pattern Recog (ICPR) 1:789\u2013792","journal-title":"Int Conf Pattern Recog (ICPR)"},{"key":"1575_CR22","volume-title":"Surveillance studies: an overview","author":"D Lyon","year":"2007","unstructured":"Lyon D (2007) Surveillance studies: an overview. Polity Press, Cambridge"},{"key":"1575_CR23","first-page":"965","volume":"3","author":"VY Mariano","year":"2002","unstructured":"Mariano VY, Min J, Park J-H, Kasturi R, Mihalcik D, Li H et al (2002) Performance evaluation of object detection algorithms. ICPR 3:965\u2013969","journal-title":"ICPR"},{"key":"1575_CR24","unstructured":"Masolo C, Borgo S, Gangemi A, Guarino N, Oltramari A (2003) Ontology library (final). IST Project 2001\u201333052 WonderWeb Deliverable D18"},{"key":"1575_CR25","unstructured":"Milestone. http:\/\/www.milestonesys.com\/"},{"key":"1575_CR26","unstructured":"MPEG-7: Moving pictures expert group"},{"key":"1575_CR27","doi-asserted-by":"crossref","unstructured":"Neely H (2010) Modeling Threat Behaviors in Surveillance Video Metadata for Detection using an Analogical Reasoner, IEEE Aerospace conference","DOI":"10.1109\/AERO.2010.5446805"},{"key":"1575_CR28","doi-asserted-by":"crossref","unstructured":"Nghiem AT, Bremond F, Thonnat M, Valentin V (2007) ETISEO, performance evaluation for video surveillance systems. IEEE Conference On Advanced Video and Signal Based Surveillance, AVSS 2007, pp 476\u2013481","DOI":"10.1109\/AVSS.2007.4425357"},{"key":"1575_CR29","doi-asserted-by":"crossref","unstructured":"Niles I, Pease A (2001) Towards a Standard Upper Ontology. In: Welty C, Smith B (eds) Proceedings of the 2nd International Conference on Formal Ontology in Information Systems (FOIS-2001), Ogunquit, Maine, October 17\u201319, 2001","DOI":"10.1145\/505168.505170"},{"key":"1575_CR30","unstructured":"Noldus. www.noldus.com"},{"key":"1575_CR31","unstructured":"Online resource pickpocket video"},{"key":"1575_CR32","unstructured":"ONVIF: Open network video interface forum. http:\/\/www.onvif.org\/Home.aspx"},{"key":"1575_CR33","unstructured":"Over P, Awad G, Fiscus J, Antonishek B, Michel M, Smeaton AF, et al (2011) Proceedings of TRECVID 2010\u2014An overview of the goals, tasks, data, evaluation mechanisms, and metrics, Gaithersburg, Md., USA"},{"key":"1575_CR34","unstructured":"PETS: Performance evaluation of tracking and surveillance. http:\/\/pets2012.net"},{"key":"1575_CR35","unstructured":"PSIA: Physical security interoperability alliance. http:\/\/www.psialliance.org\/"},{"key":"1575_CR36","unstructured":"SanMiguel JC, Martinez JM, Garcia A (2009) An ontology for event detection and its application in surveillance video, IEEE Int. Conf. AVSS, pp 220\u2013225"},{"key":"1575_CR37","doi-asserted-by":"crossref","unstructured":"Schallauer P, Bailer W, Hofmann A, M\u00f6rzinger R (2009) SAM: An interoperable metadata model for multimodal surveillance applications. Proc. SPIE, 7344","DOI":"10.1117\/12.818481"},{"issue":"4","key":"1575_CR38","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1147\/rd.204.0336","volume":"20","author":"JF Sowa","year":"1976","unstructured":"Sowa JF (1976) Conceptual graphs for a database interface. IBM J Res Dev 20(4):336\u2013357","journal-title":"IBM J Res Dev"},{"key":"1575_CR39","unstructured":"Sowa JF (1984) Conceptual graphs. Information Processing in Mind and Machine, 39\u201344"},{"key":"1575_CR40","doi-asserted-by":"crossref","unstructured":"Steinberg AN, Bowman CL, White FE (1999) Revisions to the JDL data fusion model. Environmental Research Institute of Michigan Arlington VA","DOI":"10.1117\/12.341367"},{"key":"1575_CR41","unstructured":"Surveillance of Unattended Baggage and the Identification and Tracking of the Owner (SUBITO) consortium (December 2011), SUBITO Deliverable D100.2: Final Report"},{"key":"1575_CR42","doi-asserted-by":"crossref","unstructured":"Suzi\u0107 R (2005) A generic model of tactical plan recognition for threat assessment. Proc. SPIE","DOI":"10.1117\/12.603984"},{"key":"1575_CR43","unstructured":"TRECVID: TREC video retrieval evaluation. http:\/\/trecvid.nist.gov\/"},{"key":"1575_CR44","unstructured":"UK Home Office, Invitation to Tender Efficient Archive Retrieval & Auto Searching (EARS) CONTEST Project http:\/\/www.homeoffice.gov.uk\/publications\/science-research-statistics\/research-statistics\/home-office-science\/eoi-ears-hos , Accessed June 2012"},{"key":"1575_CR45","unstructured":"VIPER. http:\/\/viper-toolkit.sourceforge.net\/"},{"issue":"1","key":"1575_CR46","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MMUL.2007.23","volume":"14","author":"U Westermann","year":"2007","unstructured":"Westermann U, Jain R (2007) Toward a common event model for multimedia applications. IEEE Multimedia 14(1):19\u201329","journal-title":"IEEE Multimedia"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1575-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1575-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1575-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T09:08:29Z","timestamp":1563440909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1575-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,17]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,5]]}},"alternative-id":["1575"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1575-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,17]]}}}