Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1963564.1963616acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiitmConference Proceedingsconference-collections
research-article

Unusual activity detection for video surveillance

Published: 27 December 2010 Publication History

Abstract

ideo surveillance has gained importance in law enforcement, security and military applications. The system consists of processing steps such as object detection, movement tracking, and activity monitoring. The paper contribution is to present the human activity analysis system that both detect a human with carrying or abandoning an object and segments the object from the human so that it can be tracked. Segmentation of objects is done from the background using advance Gaussian mixture model. The tracking algorithm considers the human as whole from frame to frame, it does not track the human parts such as limbs. Object features such as center of mass, size, and bounding box are used in this paper to estimate a matching between objects in consecutive frames. As the object is segmented and tracked, Bayesian inference framework is used for event analysis. This system uses a single camera view and unusual activity is detected using the detected objects and object tracking result. The operator is notified if an unusual activity is detected.

References

[1]
Lavee, G., Rivlin, E. and Rudzsky, M. 2009. Understanding Video Events: A Survey of Methods for Automatic Interpretation of Semantic Occurrences in Video. IEEE Transactions on Systems, Man, and Cybernetics, 39, 5 (Sep. 2009), 489--504.
[2]
Wang, L., Hu, W. and Tan, T. 2003. Recent Developments in Human Motion Analysis. Pattern Recognition, 36, 3 (March, 2003), 585--601.
[3]
Turaga, P., Chellappa, R., Subrahmanian, V. S. and Udrea, O. 2008. Machine Recognition of Human Activities: A Survey. IEEE Transactions on Circuits and Systems for Video Technology, 18, 11 (Nov. 2008), 1473--1488.
[4]
Teddy Ko. 2008. A Survey on Behavior Analysis in Video Surveillance for Homeland Security Applications. In Proceedings of the 37th IEEE International Conferences on Applied Imagery Pattern Recognition Workshop (Washington, DC, USA, October 15--17, 2008). AIPR'08, 1--8.DOI=http://doi.ieeecomputerssociety.org/10.1109/AIPR.2008.4906450.
[5]
Bajaj, M. and Agrawal, A. 2007. Development of a Smart Camera Surveillance System. In Proceedings of International Conference on Systemics, Cybernetics and Informatics (Pentagram Research Centre, Hyderabad, India, January, 2007), ICSCI'07, 44--48.
[6]
Bodor, R., Jackson, B. and Papanikolopoulos, N. 2003. Vision-Based Human Tracking and Activity Recognition. In Proceedings of the 11th Mediterranean Conference on Control and Automation, 01, 18--22.
[7]
Cucchiara, R., Grana, C., Piccardi, M. and Prati, A. 2003. Detecting Moving Objects, Ghosts and Shadows in Video Streams. IEEE Transactions on Pattern Analysis and Machine Intelligence, 25, 10, (Oct. 2003), 1337--1342.
[8]
McHugh, J. M., Konrad, J., Saligrama, V. and Jodoin, P. M. 2009. Foreground-Adaptive Background Subtraction. IEEE Signal Processing Letters, 16, 5 (May 2009), 390--393.DOI= 10.1109/LSP.2009.2016447
[9]
Otoom, A. F., Gunes, H. and Piccardi, M. 2008. Automatic Classification of Abandoned Objects for Surveillance of Public Premise. In Proceedings IEEE Congress on Image and Signal Processing, 4, (Sanya, China, 27--30 May 2008), 542--549. DOI=http://doi.ieeecomputersociety.org/10.1109/CISP.2008. 688
[10]
Dan, J. and Yuan, Y. 2007. A Multi-object Motion Tracking Method for Video Surveillance. In Proceedings IEEE 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 1,( Qingdao, China, 30 July--01 August 2007), 402--405. DOI=http://doi.ieeecomputersociety.org/10.1109/SNPD.2007.17.
[11]
Watada, J. and Musaand, Z. B. 2008. Tracking Human Motions for Security System. In Proceedings IEEE SICE Annual Conference, (Tokyo, 20--22 Aug. 2008), 3344--3349. DOI=http://doi.ieeecomputersociety.org/10.1109/SICE.2008.4655242.
[12]
Yang, J., Cheng, J. and Lu, H. 2009. Human Activity Recognition Based on the Blob Features. In Proceedings IEEE International Conference on Multimedia and Expo, (New York, June 28 --July 3 2009), 358--361. DOI=http://doi.ieeecomputersociety.org/10.1109/ICME.2009.5202508
[13]
Lv, F., Song, X., Wu, B., Kumar, V. and Singh, R. 2006. Left Luggage Detection using Bayesian Inference. In Proceedings 9th IEEE International Workshop on Performance Evaluation of Tracking and Surveillance, (New York, USA, June 2006), 83--90.
[14]
Chuang, C. H., Hsieh, J. W., Tsai, L. W., Chen, S. Y. and Fan, K. C. 2009. Carried Object Detection Using Ratio Histogram and its Application to Suspicious Event Analysis. IEEE Transactions on Circuits and Systems for Video Technology, 19, 6 (June 2009), 911--916.
[15]
Tang, Z. and Miao, Z. 2007. Fast Background Subtraction and Shadow Elimination Using Improved Gaussian mixture model. In Proceedings IEEE International Workshop on Haptic, Audio and Visual Environments and Games, (Ottawa, Oct. 2007), 38--41. DOI= 10.1109/HAVE.2007.4371583
[16]
Ribeiro, H. L. and Gonzaga, A. 2006. Hand Image Segmentation in Video Sequence by GMM: A Comparative Analysis. In Proceedings of SIBGRAPI'06, IEEE 19th Brazilian Symposium on Computer Graphics and Image Processing, (Manaus, Oct. 2006), 357--364. DOI= 10.1109/SIBGRAPI.2006.23
[17]
Li, Y. H., Xiong, C. Z., Yin, Y. X. and Liu Y. L. 2009. Moving Object Detection Based on Edged Mixture Gaussian Models. In Proceedings IEEE International Conference on Intelligent Systems and Applications, (Wuhan, May 2009), 1--5. DOI= 10.1109/IWISA.2009.5072961.
[18]
Al Najjar, M., Ghosh, S. and Bayoumi, M. 2009. Robust Object Tracking Using Corresponding Voting for Smart Surveillance Visual Sensing Nodes. In Proceedings of ICIP'2009, 16th IEEE International Conference on Image Processing, (Cairo, Nov. 2009), 1133--1136. DOI= 10.1109/ICIP.2009.5414523
[19]
Smith, K., Quelhas, P. and Gatica-Perez, D. 2006. Detecting Abandoned Luggage Items in a Public Space. In Proceedings Ninth IEEE International Workshop on Performance Evaluation of Tracking and Surveillance, (New York, USA, June 2006), 75--82.
[20]
Mahajan, D., Kwatra, N., Jain, S., Kalra, P. and Banerjee, S. 2004. A Framework for Activity Recognition and Detection of Unusual Activities. In Proceedings of ICVGIP '2004, Indian Conference on Vision, Graphics and Image Processing, (Kolkata, India, 16--18 Dec. 2004), 15--21 URL=http://www.cse.iitd.ac.in/vglab/research/research_group2/1/activmon/icvgip2004_paper.pdf

Cited By

View all
  • (2023)Knowledge discovery of suspicious objects using hybrid approach with video clips and UAV images in distributed environments: a novel approachWireless Networks10.1007/s11276-023-03394-629:8(3393-3416)Online publication date: 13-Jun-2023
  • (2023)Hybrid approach for suspicious object surveillance using video clips and UAV images in cloud-IoT-based computing environmentCluster Computing10.1007/s10586-023-03977-027:1(761-785)Online publication date: 17-Feb-2023
  • (2023)Detection and Classification of Leaf Blast Disease using Decision Tree Algorithm in Rice CropMathematics and Computer Science Volume 210.1002/9781119896715.ch4(49-58)Online publication date: 11-Jul-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
IITM '10: Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia
December 2010
355 pages
ISBN:9781450304085
DOI:10.1145/1963564
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 December 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. abandoned/carried object detection
  2. activity modeling
  3. behavior analysis
  4. human activity recognition
  5. video surveillance

Qualifiers

  • Research-article

Conference

IITM '10

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Knowledge discovery of suspicious objects using hybrid approach with video clips and UAV images in distributed environments: a novel approachWireless Networks10.1007/s11276-023-03394-629:8(3393-3416)Online publication date: 13-Jun-2023
  • (2023)Hybrid approach for suspicious object surveillance using video clips and UAV images in cloud-IoT-based computing environmentCluster Computing10.1007/s10586-023-03977-027:1(761-785)Online publication date: 17-Feb-2023
  • (2023)Detection and Classification of Leaf Blast Disease using Decision Tree Algorithm in Rice CropMathematics and Computer Science Volume 210.1002/9781119896715.ch4(49-58)Online publication date: 11-Jul-2023
  • (2022)Unusual Event Detection from SurveillanceComputational Methods and Data Engineering10.1007/978-981-19-3015-7_35(477-487)Online publication date: 9-Sep-2022
  • (2019)Abandoned or removed object detection from visual surveillanceMultimedia Tools and Applications10.1007/s11042-018-6472-978:6(7585-7620)Online publication date: 17-May-2019
  • (2018)Learning Algorithms for Anomaly Detection from ImagesInternational Journal of System Dynamics Applications10.4018/IJSDA.20150701034:3(43-69)Online publication date: 13-Dec-2018
  • (2017)Suspicious human activity recognition: a reviewArtificial Intelligence Review10.1007/s10462-017-9545-750:2(283-339)Online publication date: 28-Feb-2017
  • (2015)Walk This Way: Improving Pedestrian Agent-Based Models through Scene Activity AnalysisISPRS International Journal of Geo-Information10.3390/ijgi40316274:3(1627-1656)Online publication date: 2-Sep-2015
  • (2013)An interactive framework for abandoned and removed object detection in video2013 Annual IEEE India Conference (INDICON)10.1109/INDCON.2013.6725905(1-6)Online publication date: Dec-2013

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media