Open Access   Article Go Back

Suspicious Activities and Anomaly Detection in Surveillance Video Using Multiple Instance Learning Techniques

M. Petchiammal Baby1 , T. Ratha Jeyalakshmi2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-08 , Page no. 48-53, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si8.4853

Online published on Apr 10, 2019

Copyright © M. Petchiammal Baby, T. Ratha Jeyalakshmi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Petchiammal Baby, T. Ratha Jeyalakshmi, “Suspicious Activities and Anomaly Detection in Surveillance Video Using Multiple Instance Learning Techniques,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.08, pp.48-53, 2019.

MLA Style Citation: M. Petchiammal Baby, T. Ratha Jeyalakshmi "Suspicious Activities and Anomaly Detection in Surveillance Video Using Multiple Instance Learning Techniques." International Journal of Computer Sciences and Engineering 07.08 (2019): 48-53.

APA Style Citation: M. Petchiammal Baby, T. Ratha Jeyalakshmi, (2019). Suspicious Activities and Anomaly Detection in Surveillance Video Using Multiple Instance Learning Techniques. International Journal of Computer Sciences and Engineering, 07(08), 48-53.

BibTex Style Citation:
@article{Baby_2019,
author = {M. Petchiammal Baby, T. Ratha Jeyalakshmi},
title = {Suspicious Activities and Anomaly Detection in Surveillance Video Using Multiple Instance Learning Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {07},
Issue = {08},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {48-53},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=914},
doi = {https://doi.org/10.26438/ijcse/v7i8.4853}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i8.4853}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=914
TI - Suspicious Activities and Anomaly Detection in Surveillance Video Using Multiple Instance Learning Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - M. Petchiammal Baby, T. Ratha Jeyalakshmi
PY - 2019
DA - 2019/04/10
PB - IJCSE, Indore, INDIA
SP - 48-53
IS - 08
VL - 07
SN - 2347-2693
ER -

           

Abstract

Surveillance videos are proficient to detain a diversity of sensible anomalies. In this work, we advise to find out anomalies by comparing both normal and irregular videos. To remain on away from annotating the irregular segments or clips in training videos, which is very time overwhelming, we recommend to learn anomaly during the deep multiple case position framework by stage averaging weakly labeled direction videos, i.e. the training labels are at video level instead of clip-level. In our approach, we think normal and anomalous videos as bags and video segments as instances in multiple instance learning (MIL), and mechanically learn a deep anomaly location form that predicts high anomaly scores for anomalous video segments. Furthermore, we begin sparsity and temporal softness constraints in the ranking loss function to improved localize anomaly during training. We also set up a new large-scale first of its kind dataset of 128 hours of videos. It consists of 1900 long and untrimmed real-world surveillance videos, with 13 practical anomalies such as fighting, road accident, burglary, break-in, etc. as well as normal activities. This dataset can be used for two tasks. First, general irregularity detection considering all anomaly in one group and all normal activities in another group. Second, for recognizing each of 13 abnormal actions. Our investigational consequence clarify that our MIL performance for anomaly detection achieves significant development on anomaly detection act as compared to the state-of-the-art Techniques. We present the consequences of several current deep learning baselines on anomalous action recognition. The low detection presentation of these baselines finds that the dataset taken is very hard and opens extra opportunities for opportunity work.

Key-Words / Index Term

Multiple instance learning, anomaly, dataset, surveillance video

References

[1]http://www.multitel.be/image/researchdevelopment/research-projects/boss.php.
[2] Unusual crowd activity dataset of university of Minnesota.Inhttp://mha.cs.umn.edu/movies/crowdactivity-all.avi.
[3] A. Adam, E. Rivlin, I. Shimshoni, and D. Reinitz. Robust real-time unusual event detection using multiple fixedlocation monitors. TPAMI, 2008.
[4] S. Andrews, I. Tsochantaridis, and T. Hofmann. Support vector machines for multiple-instance learning. In NIPS, pages 577–584, Cambridge, MA, USA, 2002. MIT Press.
[5] B. Anti and B. Ommer. Video parsing for abnormality detection. In ICCV, 2011.
[6] R. Arandjelovic, P. Gronat, A. Torii, T. Pajdla, and J. Sivic. ´ NetVLAD: CNN architecture for weakly supervised place recognition. In CVPR, 2016.
[7] A. Basharat, A. Gritai, and M. Shah. Learning object motion patterns for anomaly detection and improved object detection. In CVPR, 2008.
[8] C. Bergeron, J. Zaretzki, C. Breneman, and K. P. Bennett. Multiple instance ranking. In ICML, 2008.
[9] V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection: A survey. ACM Comput. Surv., 2009.
[10] X. Cui, Q. Liu, M. Gao, and D. N. Metaxas. Abnormal detection using interaction energy potentials. In CVPR, 2011.
[11] A. Datta, M. Shah, and N. Da Vitoria Lobo. Person-onperson violence detection in video data. In ICPR, 2002.
[12] T. G. Dietterich, R. H. Lathrop, and T. Lozano-Perez. Solv- ´ ing the multiple instance problem with axis-parallel rectangles. Artificial Intelligence, 89(1):31–71, 1997.
[13] S. Ding, L. Lin, G. Wang, and H. Chao. Deep feature learning with relative distance comparison for person re-identification. Pattern Recognition, 48(10):2993–3003, 2015.
[14] J. Duchi, E. Hazan, and Y. Singer. Adaptive subgradient methods for online learning and stochastic optimization. J. Mach. Learn. Res., 2011.
[15] Y. Gao, H. Liu, X. Sun, C. Wang, and Y. Liu. Violence detection using oriented violent flows. Image and Vision Computing, 2016.
[16] J. Kooij, M. Liem, J. Krijnders, T. Andringa, and D. Gavrila, Multi-modal human aggression detection. Computer Vision and Image Understanding, 2016.
[17] S. Mohammadi, A. Perina, H. Kiani, and M. Vittorio. Angry crowds: Detecting violent events in videos. In ECCV, 2016.
[18]T.Joachims. Optimizing search engines using clickthrough data. In ACM SIGKDD, 2002.