Toward trustworthy human suspicious activity detection from surveillance videos using deep learning

被引:0
作者
Buttar, Ahmed Mateen [1 ]
Bano, Mahnoor [1 ]
Akbar, Muhammad Azeem [2 ]
Alabrah, Amerah [3 ]
Gumaei, Abdu H. [4 ]
机构
[1] Univ Agr Faisalabad, Dept Comp Sci, Faisalabad 38000, Pakistan
[2] LUT Univ, Software Engn Dept, Lappeenranta, Finland
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11543, Saudi Arabia
[4] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Dept Comp Sci, Al Kharj 11942, Saudi Arabia
关键词
Deep learning; Convolutional neural network (CNN); Long and short-term memory (LSTM); Gated recurrent unit (GRU); Confusion matrix;
D O I
10.1007/s00500-023-07971-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's world, suspicious or unusual activities express threats and danger to others. For the prevention of various security issues, an automatic video detection system is very important. It is difficult to consecutively monitor camera videos recorded in public places to detect any abnormal event, so an automated video detection system is needed. The study objective is to create an intelligent and trustworthy system that will take a video stream as input and detect what kind of suspicious activity is happening in that video to reduce the time that consumes watching the video. In this work, we use three models Convolutional Neural Network (CNN), GRU, and ConvLSTM model. These models are trained on the same dataset of 6 suspicious activities of humans that are: Running, Punching, Falling, Snatching, Kicking, and Shooting. The dataset consists of various videos related to each activity. Different deep learning techniques are applied in the proposed work: preprocessing, data annotation model training, and classification. The frames are extracted from the source video, and then features are calculated through the model in Inception v3, a Convolutional Neural Network variant. On the same dataset, the CNN model attains 91.55% accuracy, the ConvLSTM model attains 88.73% accuracy, and the GRU model attains 84.01% accuracy. The performance of the proposed models is evaluated using a confusion matrix, F1-Score, precision, and recall. The proposed model proved better than other models in terms of performance and accuracy. The findings of this study prove helpful unusual events by examining a person's abnormal behavior.
引用
收藏
页数:13
相关论文
共 28 条
[1]  
Amrutha C. V., 2020, 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA). Proceedings, P335, DOI 10.1109/ICIMIA48430.2020.9074920
[2]  
Anishchenko Lesya, 2018, 2018 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). Proceedings, P99, DOI 10.1109/USBEREIT.2018.8384560
[3]   A Dynamic DL-Driven Architecture to Combat Sophisticated Android Malware [J].
Bibi, Iram ;
Akhunzada, Adnan ;
Malik, Jahanzaib ;
Iqbal, Javed ;
Mussaddiq, Arslan ;
Kim, Sungwon .
IEEE ACCESS, 2020, 8 :129600-129612
[4]  
Butt U.M ..., 2020, International Journal of Advanced Computer Science and Applications, V11
[5]   An efficient subsequence search for video anomaly detection and localization [J].
Cheng, Kai-Wen ;
Chen, Yie-Tarng ;
Fang, Wen-Hsien .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) :15101-15122
[6]  
Desai Padmashree, 2022, Journal of Physics: Conference Series, V2161, DOI 10.1088/1742-6596/2161/1/012024
[7]   Video anomaly detection and localization via Gaussian Mixture Fully Convolutional Variational Autoencoder [J].
Fan, Yaxiang ;
Wen, Gongjian ;
Li, Deren ;
Qiu, Shaohua ;
Levine, Martin D. ;
Xiao, Fei .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2020, 195
[8]   Convolutional Two-Stream Network Fusion for Video Action Recognition [J].
Feichtenhofer, Christoph ;
Pinz, Axel ;
Zisserman, Andrew .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :1933-1941
[9]   Patient Monitoring by Abnormal Human Activity Recognition Based on CNN Architecture [J].
Gul, Malik Ali ;
Yousaf, Muhammad Haroon ;
Nawaz, Shah ;
Ur Rehman, Zaka ;
Kim, HyungWon .
ELECTRONICS, 2020, 9 (12) :1-14
[10]  
Htike KK, 2014, 2014 THIRD INTERNATIONAL CONFERENCE ON E-TECHNOLOGIES AND NETWORKS FOR DEVELOPMENT (ICEND), P79, DOI 10.1109/ICeND.2014.6991357