End-to-End Video Surveillance Framework for Anomaly Detection and Person Re-identification

被引:0
作者
Nandan, Rohan [1 ]
Lingeri, Rohan [1 ]
Mehta, Rohan [1 ]
Kanwal, Preet [1 ]
Atluri, Rishita [1 ]
机构
[1] PES Univ, 100 Feet Ring Rd BSK 3 Stage, Bangalore 560085, Karnataka, India
来源
DEEP LEARNING THEORY AND APPLICATIONS, PT I, DELTA 2024 | 2024年 / 2171卷
关键词
Semi-supervised; Video anomaly detection; DeepSORT; LSTM; MGFN; Person re-identification;
D O I
10.1007/978-3-031-66694-0_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unmanned surveillance systems represent a cutting-edge frontier in security technology, offering enhanced monitoring capabilities while minimizing reliance on constant human oversight. However, traditional approaches suffer from limitations due to manual monitoring, leading to potential lapses in critical event detection. In response, our project introduces a unique semi-supervised approach using the UCF-Crime dataset [1] to automate surveillance by integrating the state-of-the-art MGFN [2] model with our custom LSTM multi-class classifier and re-identification model. While MGFN [2] provides binary classification with an AUC of 86.98%, our implementation uses this along with our custom multi-class classifier which has an AUC of 83%, to predict specific categories of anomalies like burglary, abuse, and fighting. The detected offenders are noted and are looked for in every other feed of video as and when they appear using DeepSORT [3] re-identification model. Moreover, our system notifies authorities about anomalies and identifies individuals through a comprehensive dashboard interface. This fusion of models allows for more nuanced event detection, contributing to the advancement of surveillance technology and public safety.
引用
收藏
页码:328 / 339
页数:12
相关论文
共 28 条
  • [1] Amrutha C. V., 2020, 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA). Proceedings, P335, DOI 10.1109/ICIMIA48430.2020.9074920
  • [2] Detection of Suspicious Human Activity based on CNN-DBNN Algorithm for Video Surveillance Applications
    Basha, Alavudeen A.
    Parthasarathy, P.
    Vivekanandan, S.
    [J]. 2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [3] Bewley A, 2016, IEEE IMAGE PROC, P3464, DOI 10.1109/ICIP.2016.7533003
  • [4] Carreira J, 2018, Arxiv, DOI [arXiv:1705.07750, 10.48550/arXiv.1705.07750, DOI 10.48550/ARXIV.1705.07750, 10.48550/ARXIV.1705.07750]
  • [5] Chen C., 2015, P 2015 INT C PATT RE, P1776
  • [6] Chen YX, 2022, Arxiv, DOI arXiv:2211.15098
  • [7] Divya P.B., 2017, International Research Journal of Engineering and Technology (IRJET)
  • [8] He KM, 2015, Arxiv, DOI [arXiv:1512.03385, 10.48550/arXiv.1512.03385]
  • [9] Jocher G, 2023, Ultralytics YOLOv8
  • [10] Kalman R E, 1960, J BASIC ENG, V82, P35, DOI [10.1115/1.3662552, DOI 10.1115/1.3662552]