Anomalous Situations Recognition in Surveillance Images Using Deep Learning

被引:3
作者
Arshad, Qurat-ul-Ain [1 ]
Raza, Mudassar [1 ]
Khan, Wazir Zada [2 ]
Siddiqa, Ayesha [2 ]
Muiz, Abdul [2 ]
Khan, Muhammad Attique [3 ]
Tariq, Usman [4 ]
Kim, Taerang [5 ]
Cha, Jae-Hyuk [5 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Wah Campus, Islamabad 47040, Pakistan
[2] Univ Wah, Deptartment Comp Sci, Wah Cantt 47040, Pakistan
[3] HITEC Univ, Deptartment Comp Sci, Taxila 47080, Pakistan
[4] Prince Sattam Bin Abdulaziz Univ, Coll Business Adm, Management Informat Syst Dept, Al Kharj 16278, Saudi Arabia
[5] Hanyang Univ, Dept Comp Sci, Seoul 04763, South Africa
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 76卷 / 01期
关键词
Anomaly detection; anomalous events; anomalous behavior; anomalous objects; violence detection; deep learning; NETWORKS;
D O I
10.32604/cmc.2023.039752
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomalous situations in surveillance videos or images that may result in security issues, such as disasters, accidents, crime, violence, or terror-ism, can be identified through video anomaly detection. However, differentiat-ing anomalous situations from normal can be challenging due to variations in human activity in complex environments such as train stations, busy sporting fields, airports, shopping areas, military bases, care centers, etc. Deep learn-ing models' learning capability is leveraged to identify abnormal situations with improved accuracy. This work proposes a deep learning architecture called Anomalous Situation Recognition Network (ASRNet) for deep feature extraction to improve the detection accuracy of various anomalous image situations. The proposed framework has five steps. In the first step, pretraining of the proposed architecture is performed on the CIFAR-100 dataset. In the second step, the proposed pre-trained model and Inception V3 architecture are used for feature extraction by utilizing the suspicious activity recognition dataset. In the third step, serial feature fusion is performed, and then the Dragonfly algorithm is utilized for feature optimization in the fourth step. Finally, using optimized features, various Support Vector Machine (SVM) and K-Nearest Neighbor (KNN) based classification models are utilized to detect anomalous situations. The proposed framework is validated on the suspicious activity dataset by varying the number of optimized features from 100 to 1000. The results show that the proposed method is effective in detecting anomalous situations and achieves the highest accuracy of 99.24% using cubic SVM.
引用
收藏
页码:1103 / 1125
页数:23
相关论文
共 38 条
[1]   S-shaped and V-shaped gaining-sharing knowledge-based algorithm for feature selection [J].
Agrawal, Prachi ;
Ganesh, Talari ;
Oliva, Diego ;
Mohamed, Ali Wagdy .
APPLIED INTELLIGENCE, 2022, 52 (01) :81-112
[2]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[3]   A hybrid CNN and LSTM-based deep learning model for abnormal behavior detection [J].
Chang, Chuan-Wang ;
Chang, Chuan-Yu ;
Lin, You-Ying .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (09) :11825-11843
[4]   Deep learning and handcrafted features for one-class anomaly detection in UAV video [J].
Chriki, Amira ;
Touati, Haifa ;
Snoussi, Hichem ;
Kamoun, Farouk .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) :2599-2620
[5]   Deep Multi-view Representation Learning for Video Anomaly Detection Using Spatiotemporal Autoencoders [J].
Deepak, K. ;
Srivathsan, G. ;
Roshan, S. ;
Chandrakala, S. .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2021, 40 (03) :1333-1349
[6]  
Fernando T., 2020, PREPRINT
[7]   Securing the Deep Fraud Detector in Large-Scale E-Commerce Platform via Adversarial Machine Learning Approach [J].
Guo, Qingyu ;
Li, Zhao ;
An, Bo ;
Hui, Pengrui ;
Huang, Jiaming ;
Zhang, Long ;
Zhao, Mengchen .
WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), 2019, :616-626
[8]   An Entropy-Based Approach for Anomaly Detection in Activities of Daily Living in the Presence of a Visitor [J].
Howedi, Aadel ;
Lotfi, Ahmad ;
Pourabdollah, Amir .
ENTROPY, 2020, 22 (08)
[9]   A hybrid deep network based approach for crowd anomaly detection [J].
Ilyas, Zirgham ;
Aziz, Zafar ;
Qasim, Tehreem ;
Bhatti, Naeem ;
Hayat, Muhammad Faisal .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) :24053-24067
[10]   Abnormal behavior detection using streak flow acceleration [J].
Jiang, Jun ;
Wang, XinYue ;
Gao, Mingliang ;
Pan, Jinfeng ;
Zhao, Chengyuan ;
Wang, Jia .
APPLIED INTELLIGENCE, 2022, 52 (09) :10632-10649