Академический Документы
Профессиональный Документы
Культура Документы
Introduction:
Human face and human behavioral pattern play an important role in person identification. Visual
information is a key source for such identifications. Surveillance videos provide such visual
information which can be viewed as live videos, or it can be played back for future references.
The recent trend of ‘automation’ has its impact even in the field of video analytics. Video
analytics can be used for a wide variety of applications like motion detection, human activity
prediction, person identification, abnormal activity recognition, vehicle counting, people
counting at crowded places, etc. In this domain, the two factors which are used for person
identification are technically termed as face recognition and gait recognition respectively.
Among these two techniques, face recognition is more versatile for automated person
identification through surveillance videos. Face recognition can be used to predict the orientation
of a person’s head, which in turn will help to predict a person’s behavior. Motion recognition
with face recognition is very useful in many applications such as verification of a person,
identification of a person and detecting presence or absence of a person at a specific place and
time. In addition, human interactions such as subtle contact among two individuals, head motion
detection, hand gesture recognition and estimation are used to devise a system that can identify
and recognize suspicious behavior among pupil in an examination hall successfully. This paper
provides a methodology for suspicious human activity detection through face recognition. Video
processing is used in two main domains such as security and research. Such a technology uses
intelligent algorithms to monitor live videos. Computational complexities and time complexities
are some of the key factors while designing a real-time system. The system which uses an
algorithm with a relatively lower time complexity, using less hardware resources and which
produces good results will be more useful for time-critical applications like bank robbery
detection, patient monitoring system, detecting and reporting suspicious activities at the railway
station, exam holes etc.
Existing System:
In existing systems require frequent rule-base updates and signature updates, and are not capable
of detecting unknown attacks. In contrast, anomaly detection systems, a subset of intrusion
detection systems, model the normal system/network behavior which enables them to be
extremely effective in finding and foiling both known as well as unknown or ‘‘zero day’’ attacks.
While anomaly detection systems are attractive conceptually, a host of technological problems
need to be overcome before they can be widely adopted. These problems include: high false
alarm rate, failure to scale to gigabit speeds, etc.
Proposed System:
In this system, we extract the optical flow of video data and propose a Convolution Neural
Networks model to deal with the problem. The proposed system extracts the spatial and temporal
features from video data and these features can be directly feed into the classifier for model
learning or inference. The experiments on our own made dataset show that the proposed model
achieves superior performance in comparison to current methods. The precision of the detection
can reach 86.5%.
Problem Statement:
Surveillance CCTV videos have a major contribution in unstructured big data. CCTV cameras
are implemented in all places where security having much importance. Manual surveillance
seems tedious and time consuming and they only capture & store CCTV footages. Security can
be defined in different terms in different contexts like theft identification, violence detection,
chances of explosion etc. In crowded public places the term security covers almost all type of
abnormal events. Among them violence detection is difficult to handle since it involves group
activity. The anomalous or abnormal activity analysis in a crowd video scene is very difficult due
to several real world constraints.
C. Leave D. Lean
As our CNN model is a binary classification, the precision and recall rate are the common
evaluation indexes. We compare our methods with other methods in Table II. Our method1
adopts the first method to obtain “flow image”, and our method2 adopts the second method to
obtain “flow image”. The experiments demonstrate that our methods have a better performance
in comparison to other methods. Our method2 is better in accuracy and precision, and our
method1 is better in recall rate. To summarize, our model has the ability to deal with many kinds
of abnormal behaviors and performs better in comparison to current methods. There are four
kinds of behaviors detected in Figure 4. If prediction of the sub-region sample is positive, it will
be marked in corresponding testing clip by red box, and system would store the testing clip then.
Hardware Interface
Mouse : Logitech.
Ram : 512 Mb.
Software Interface
REFERENCES
[1] Y. Cong, J. Yuan and J. Liu, “Sparse reconstruction cost for abnormal event detection,” IEEE
Conference on Computer Vision and Pattern Recognition, pp. 3449-3456, 2011.
[2] L. Kratz and K. Nishino, “Anomaly detection in extremely crowded scenes using spatio-
temporal motion pattern models,” IEEE Conference on Computer Vision and Pattern
Recognition, pp. 1446-1453, 2009.
[3] R. Mehran, A. Oyama and M. Shah, “Abnormal crowd behavior detection using social force
model,” IEEE Conference on Computer Vision and Pattern Recognition, pp. 935-942, 2009.
[4] Y. B. Wang, “An intelligent algorithm for detecting cheating behavior at the exam site,”
Chang Sha: National University of Defense Technology, 2011.
[5] J. Li, “Detection and analysis of abnormal behavior in electronic invigilating,” Tai Yuan:
Taiyuan University of Technology, 2013.
[6] D. Gowsikhaa, Manjunath and S. Abirami, “Suspicious human activity detection from
surveillance videos,” International Journal on Internet and Distributed Computing Systems, vol.
2, no. 2, 2012.
[8] S. W. Ji, W. Xu, M. Yang and K. Yu, “3D convolutional neural networks for human action
recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 1,
pp. 221-231, 2013.
[9] W. Z. Nie, W. Li, A. A. Liu, T. Hao and Y. T. Su, “3D convolutional networks-based mitotic
event detection in timelapse phase contrast microscopy image sequences of stem cell
populations,” IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp.
55-62, 2016.
[13] S. Baker, D. Scharstein, J. P. Lewis, et al, “A database and evaluation methodology for
optical flow,” International Journal of Computer Vision, vol. 92, no. 1, pp. 1-31, 2007.