№1, 2026

ANALYSIS OF THE POSSIBILITIES OF APPLYING VIDEO ANALYTICS IN ENSURING CYBER SOVEREIGNTY
Irada Alakbarova

The analysis and evaluation of social processes occurring in society are important issues for the effective management of e-government, ensuring cyber sovereignty, and social and economic development in the country. In a rapidly digitalizing world, video surveillance systems play a major role in the national security of the country, infrastructure management in a certain area, transportation problems, and solving many important issues. Video analytics, which is part of the concept of social surveillance, is a technology that studies certain events and discovers knowledge by analyzing video data obtained from video surveillance systems in real time. The article analyzes and classifies scientific research in the field of video analytics, identifies the shortcomings and opportunities of existing methods and algorithms. The main focus is on detecting spatio-temporal features of deep learning models and recognizing and evaluating human behavior. The article also determines the role of video surveillance systems equipped with artificial intelligence technologies in ensuring the country's cyber sovereignty and national security, and proposes a new model for the intellectual analysis of video data in order to ensure cyber sovereignty (pp.50-60).

Keywords:Cybersovereignty, Videoanalytics, Video surveillance cameras, Video surveillance systems, Videodata analysis, Social surveillance, Deep learning
References
  • Abdulghani A. M. A., & Dalveren, G. G. M. (2022). Moving object detection in video with algorithms YOLO and faster R-CNN in different conditions. Avrupa Bilim ve Teknoloji Dergisi, (33), 40-54. https://doi.org/10.31590/ejosat.1013049
  • Alakbarova I.Y. Development of a model for the analysis of human behavior in a smart home environment, Problems of Information Society, 2023, 15(1), 19-28. https://doi.org/10.25045/jpis.v14.i1.08
  • Alguliyev R., M., Aliguliyev R., M., & Alakbarova I., Y. (2021). An Approach For Identifying Social Relationships Based on Videoimages Analysis. Problems of Information Technology, 9(2), 3-15. https://doi.org/10.25045/jpit.v12.i2.01
  • Al-Hashemi, S. Q. Y., Naghmash, M. S., & Ghandour, A. (2024). Development of Smart Video Surveillance Systems: Technical and Security Challenges in Urban Environments. Shifra, 2024, 24-38. https://orcid.org/0009-0008-6313-0845
  • Aravinda, C. V., Al-Shehari, T., Alsadhan, N. A., Shetty, S., Padmajadevi, G., & Reddy, K. U. K. (2025). A novel hybrid architecture for video frame prediction: combining convolutional LSTM and 3D CNN. Journal of Real-Time Image Processing, 22(50). https://doi.org/10.1007/s11554-025-01626-w
  • Bai, T., Zhao, H., Huang, L., Wang, Z., Kim, D. I., & Nallanathan, A. (2025). A Decade of Video Analytics at Edge: Training, Deployment, Orchestration, and Platforms. IEEE Communications Surveys & Tutorials. https://doi.org/10.1109/COMST.2025.3563377
  • Balovsyak, S., Derevyanchuk, O., Kovalchuk, V., Kravchenko, H., & Kozhokar, M. (2024). Face Mask Recognition by the Viola-Jones Method Using Fuzzy Logic. International Journal of Image, Graphics and Signal Processing (IJIGSP), 16(3), 39-51. https://doi.org/10.5815/ijigsp.2024.03.04
  • Banu, V. C., Costea, I. M., NeMLanu, F. C., & Bădescu, I. (2017, October). Intelligent video surveillance system. In Proceedings of the 23rd International Symposium for Design and Technology in Electronic Packaging (SIITME), 2017 IEEE, 208-212. IEEE.
  • Beghdadi, A., Asim, M., Almaadeed, N., & Qureshi, M. A. (2018, August). Towards the design of smart video-surveillance system. In Proceedings of the International Conference on Adaptive Hardware and Systems (AHS), 2018 NASA/ESA, 162-167. IEEE.
  • Bouchard B., Giroux S., Bouzouane A. (2006). A smart home agent for plan recognition of cognitively-impaired patients. Journal of Computers, 1(5), 53–62. https://doi.org/10.1007/11766247_3
  • Chaudhary S., Khan M.A., Bhatnagar C. Multiple anomalous activity detection in videos. Procedia Computer Science, 2018, no.125, 336–345.
  • Chen L., Nugent C., Mulvenna M., Finlay D., Hong X., Poland M. (2008), A logical framework for behaviour reasoning and assistance in a smart home. International Journal of Assistive Robotics and Mechatronics, 2008, 9(4), 20–34. https://www.researchgate.net/publication/ 228528877_A_logical_framework_for_behaviour_reasoning_and_assistance_in_a_smart_home
  • Dao, M. S., Zetsu, K., & Hoang, D. T. (2024, December). Spatial-temporal Graph Transformer Network for Spatial-temporal Forecasting. In Proceedings of the 2024 IEEE International Conference on Big Data (BigData), 1276-1281. IEEE. https://doi.org/10.1109/BigData62323. 2024.10825469
  • Dardour, A., El Haji, E., & Begdouri, M. A. (2025, June). Video surveillance and artificial intelligence for urban security in smart cities: A review of a selection of empirical studies from 2018 to 2024. In Proceedings of the Computer Sciences & Mathematics Forum, 10(1), 15. MDPI. https://doi.org/10.3390/cmsf2025010015
  • Dinesh J., S., R., Fenil, E.; Manogaran, G.; Vivekananda, G.N.; Thanjaivadivel, T.; Jeeva, S.; & Ahilan, A. (2019). Real time violence detection framework for football stadium comprising of big data analysis and deep learning through bidirectional LSTM. Computer Networks., 151, 191–200. https://doi.org/10.1016/j.comnet.2019.01.028
  • Do, T. T. T., Huynh, Q. T., Kim, K., & Nguyen, V. Q. (2025). A Survey on Video Big Data Analytics: Architecture, Technologies, and Open Research Challenges. Applied Sciences, 15(14), 1–40. https://doi.org/10.3390/app15148089
  • Elharrouss, O., Almaadeed, N., & Al-Maadeed, S. (2021). A review of video surveillance systems. Journal of Visual Communication and Image Representation, 77, 103116. https://doi.org/10.1016/j.jvcir.2021.103116
  • Francois A. R .J., Nevatia R., Hobbs J., Bolles R. C., Smith J. R., VERL: an ontology framework for representing and annotating video events. IEEE Multimedia, 2005, 12(4), 76–86. https://doi.org/10.1109/MMUL.2005.87
  • Fuchs, C. (2010). studiVZ: social networking in the surveillance society. Ethics and Information Technology, 12(2), 171-185. https://doi.org/10.1007/s10676-010-9220-z
  • Haibin Yu., Wenyan J., Zhen Li, Feixiang G., Ding Y., Hong Z., & Mingui S. (2019). A multisource fusion framework driven by user-defined knowledge for egocentric activity recognition. Journal on Advances in Signal Processing. 1(14), 1–23. . https://doi.org/10.1186/s13634-019-0612-x
  • Hashimova, K. (2025). The impact model of demographic indicators on Internet marketing processes. Problems of Information Society, 16(1), 43-50. https://doi.org/10.25045/jpis.v16.i1.05
  • Kalbo, N., Mirsky, Y., Shabtai, A., & Elovici, Y. (2020). The security of IP-based video surveillance systems. Sensors, 20(17), 480. https://doi.org/10.3390/s20174806
  • Ko K.E., Sim K.B. Deep convolutional framework for abnormal behavior detection in a smart surveillance system. Engineering Applications of Artificial Intelligence, 2018, vol.67, 226–234
  • Lara O.D., & Labrador M.A. (2013). A survey on human activity recognition using wearable sensors. IEEE Communications Surveys & Tutorials, 15(3), 1192–1209. https://doi.org/10.1109/SURV.2012.110112.00192.
  • Lee, C. S. (2019). Datafication, dataveillance, and the social credit system as China’s new normal. Online Information Review, 43(6), 952-970. https://doi.org/10.1108/OIR-08-2018-0231
  • Lippert, R. (2009). Signs of the surveillant assemblage: Privacy regulation, urban CCTV, and governmentality. Social and Legal Studies, 18(4), 505–522. https://doi.org/10.1177/0964663909345096
  • Lysova, T. (2022). Video surveillance and public space: Surveillance society vs. security state. What People Leave Behind, 221-236. https://doi.org/10.1007/978-3-031-11756-5_14
  • Ma H., Ji B., Wu H., & Xing L. (2024). Video data offloading techniques in Mobile Edge Computing: A survey Physical Communication, 62, https://doi.org/10.1016/j.phycom.2023.102261.
  • Mac Síthigh, D., & Siems, M. (2019). The Chinese social credit system: A model for other countries?. The Modern Law Review, 82(6), 1034-1071. https://doi.org/10.1111/1468-2230.12462
  • Mahmudova, R. S. (2024). Smart socio-technological infrastructures: cyber security risks and the human factor. Problems of Information Society 15(2), 49-60. http://doi.org/10.25045/jpis.v15.i2.06
  • Moon, J., Bukhari, M., Kim, C., Nam, Y., Maqsood, M., & Rho, S. (2024). Object detection under the lens of privacy: A critical survey of methods, challenges, and future directions. ICT Express, 10(5), 1124-1144. https://doi.org/10.1016 /j.icte.2024.07.005
  • Mueller, M. L. (2020). Against sovereignty in cyberspace. International studies review, 22(4), 779-801. https://doi.org/10.1093/isr/viz044
  • Myagmar-Ochir, Y., & Kim, W. (2023). A survey of video surveillance systems in smart city. Electronics, 12(17), 3567. https://doi.org/10.3390/electronics12173567
  • Pennisi A., Bloisi D.D., & Iocchi L. (2016). Online real-time crowd behavior detection in video sequences. Computer Vision and Image Understanding, 144, 166–176. https://doi.org/10.1016/j.cviu.2015.09.010
  • Pham, P. Vo, Hung, V. T. & Bac, L. H. (2010) GPU Implementation of Extended Gaussian Mixture Model for Background Subtraction. In Proceedings of the International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for theFuture (RIVF), 2010, 1–4. https://doi.org/10.1109/RIVF.2010. 5634007.
  • Ramasamy, D. P., Kanagaraj, K., & Kumarasamy, J. (2025). A hybrid heuristic model for video surveillance-based on object detection and video anomaly classification using optimized Bi-LSTM-RBF. Signal, Image and Video Processing, 19(6), 465. https://doi.org/10.1007/s11760-025-04002-0
  • Rudschies, C. (2022). Power in the modern ‘surveillance society’: From theory to methodology. Information Polity, 27(2), 275-289. https://doi.org/10.3233/IP-211536
  • Sabarivasan, N., & Thangavel, S. K. (2025, February). Keyframe Extraction Approaches for Intelligent Video Analysis. In Proceedings of the 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL), 1126-1133. IEEE.
  • Samaila, Y.A.; Sebastian, P.; Singh, N.S.S.; Shuaibu, A.N.; Ali, S.S.A.; Amosa, T.I.; Mustafa Abro, G.E.; & Shuaibu, I. (2024). Video anomaly detection: A systematic review of issues and prospects. Neurocomputing, 591, 127726. https://doi.org/10.1016/j.neucom.2024.127726
  • Sasithradevi A., & Mansoor Roomi, R. S. (2021). Generative Adversarial Networks for Image-to-Image Translation, Elsevier. 329-345. https://doi.org/10.1016/B978-0-12-823519-5.00008-7
  • Sreenu G., Saleem M., & Durai A. Intelligent video surveillance: a review through deep learning techniques for crowd analysis. Journal of Big Data, 2019, 6(48), 1–27. https://doi.org/10.1186/s40537-019-0212-5
  • Suthaharan S. (2014). Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning. Performance Evaluation Review, 41(4), 70–73. https://doi.org/10.1145/2627534.2627557
  • Taylor, J. A., Lips, M., & Organ, J. (2008). Identification practices in government: Citizen surveillance and the quest for public service improvement. Identity in the Information Society, 1, 135–154. https://doi.org/10.1007/s12394-009-0007-5
  • Varghese, R., & Sambath, M. (2024, April). YOLOv8: A novel object detection algorithm with enhanced performance and robustness. In Proceedings of the 2024 International conference on advances in data engineering and intelligent computing systems (ADICS), (1-6). IEEE. https://doi.org/10.1109/ADICS58448.2024.10533619
  • Wang T., Qiao M., Chen Y., Chen J., & Snoussi H. (2018). Video feature descriptor combining motion and appearance cues with length-invariant characteristics. Optik, 157, 1143–1154. https://doi.org/10.1016/ j.ijleo.2017.11.176
  • Wenqing W. (2020). Intelligent Video Surveillance Technology in Intelligent Transportation. Advances in Intelligent Transportation, 2020(4), 1–10. https://doi.org/10.1155/2020/8891449
  • Zamir, M., Ali, N., Naseem, A., Ahmed Frasteen, A., Zafar, B., Assam, M., & Attia, E. A. (2022). Face detection & recognition from images & videos based on CNN & Raspberry Pi. Computation, 10(9), 148. https://doi.org/10.3390/computation10090148
  • Zhao, X., Wang, S., Wang, H., He, T., Zhang, D., & Wang, G. (2023, October). HST-GT: Heterogeneous spatial-temporal graph transformer for delivery time estimation in warehouse-distribution integration E-commerce. In Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 3402-3411. https://dl.acm.org/doi/10.1145/3583780.3614 918
  • Zhou, Z., Wu, D., Peng, X., Zhu, Z., Wu, C. & Wu, J. (2013). Face Tracking Based on Particle Filter with Multi-feature Fusion, TELKOMNIKA Indonesian Journal of Electrical Engineering, 12(1), 558–564. http://dx.doi.org/10.11591/telkomnika.v12i1.3381