Synopsis
This volume explores applications of video to surveillance, access control and perimeter protection. Concerns about computer, and information and communications securities are also addressed with proposed solutions. The development of advanced and innovative techniques are reported.