A Novel Approach Automatic Detection of Suspicious Behavior

Article Preview

Abstract:

We propose an efficient method for automatic detection of suspicious behavior in video surveillance data. First of all, we cluster a set of sequences labeled as normal or suspicious. Then, we assign new observation sequences to behavior clusters. We label a sequence as suspicious if it maps to an existing model of suspicious behavior or does not map to any existing model according to the corresponding HMMs. We evaluate our proposed method on a real-world video surveillance and find that the method is very effective at detecting suspicious behavior.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 962-965)

Pages:

2838-2841

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] N. Vaswani, A.R. Chowdhury, and R. Chellappa: Activity Recognition Using the Dynamics of the Configuration of Interacting Objects, in: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Proceedings, vol. 2(2003).

DOI: 10.1109/cvpr.2003.1211526

Google Scholar

[2] A. Gupta and L. S. Davis: Objects in Action: An Approach for Combining Action Understanding and Object Perception, in: IEEE Conference on Computer Vision and Pattern Recognition, CVPR, p.1–8 (2007).

DOI: 10.1109/cvpr.2007.383331

Google Scholar

[3] D. Duque, H. Santos, and P. Cortez: Prediction of Abnormal Behaviors for Intelligent Video Surveillance Systems, in: IEEE Symposium on Computational Intelligence and Data Mining, CIDM, p.362–367 (2007).

DOI: 10.1109/cidm.2007.368897

Google Scholar

[4] C. W. Geib and R. P. Goldman: A Probabilistic Plan Recognition Algorithm Based on Plan Tree Grammars, in: Artificial Intelligence, vol. 11, issue 173 (2009), p.1101–1132.

DOI: 10.1016/j.artint.2009.01.003

Google Scholar

[5] T. Xiang, and S. Gong: Activity Based Surveillance Video Content Modelling, in: Pattern Recognition, vol. 7, issue 41 (2008), p.2309–2326.

DOI: 10.1016/j.patcog.2007.11.024

Google Scholar

[6] R. Turner, Z. Ghahramani, and S. Bottone: Fast Online Anomaly Detection Using Scan Statistics, in: Machine Learning for Signal Processing (MLSP), p.385–390 (2010).

DOI: 10.1109/mlsp.2010.5589151

Google Scholar

[7] M. Brand, N. Oliver, and A. Pentland: Coupled Hidden Markov Models for Complex Action Recognition, in CVPR, p.994 – 999 (1997).

Google Scholar

[8] T. V. Duong, H. H. Bui, D. Q. Phung, and S. Venkatesh: Activity Recognition and Abnormality Detection with the Switching Hidden Semi-Markov Model, in CVPR, p.838–845 (2005).

DOI: 10.1109/cvpr.2005.61

Google Scholar

[9] D. Koller and N. Friedman, in: Probabilistic Graphical Models: Principles and Techniques, MIT Press, (2009).

Google Scholar