Multi-memory video anomaly detection based on scene object distribution

被引:3
作者
Li, Hongjun [1 ,2 ,3 ,4 ]
Chen, Jinyi [1 ]
Sun, Xiaohu [1 ]
Li, Chaobo [1 ]
Chen, Junjie [1 ,3 ,4 ]
机构
[1] Nantong Univ, Sch Informat Sci & Technol, 9 Seyuan Rd, Nantong 226019, Jiangsu, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210023, Jiangsu, Peoples R China
[3] Nantong Res Inst Adv Commun Technol, Nantong 226019, Jiangsu, Peoples R China
[4] TONGKE Sch Microelect, Nantong 226019, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Video anomaly detection; Scene object distribution; Multi-memory; Anomaly positioning; INTRUSION DETECTION SYSTEM; NETWORK; ATTACK;
D O I
10.1007/s11042-023-14956-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of surveillance equipment and the rise of intelligent surveillance, video anomaly detection has gradually become a research hotspot. Among them, for video processing, the three-channel video frame data can be directly used as the input of model, or some motion information can be extracted from the video frame, such as calculating optical flow, and then motion information and video frame can be input into the model together for anomaly detection. However, since the amount of background information in the overall situation is far greater than that of object information, abnormal objects are not concerned. In addition, there ia a phenomenon that objects close to the camera are more likely to be judged as anomalous due to the difference in viewpoint resulting in different sizes of objects captured in the scene. This paper proposes a multi-memory video anomaly detection algorithm based on scene object distribution. Firstly, add local anomaly branch to the model, and use memory modules to explicitly model the multiple normal modes of the global frame and the local object; secondly, scale the object to the same measurement standard according to the scene object distribution, which alleviates the impact of the view difference; finally, considering the difficulty of anomaly positioning, a new anomaly location method that combines global anomalies and local anomalies is proposed. The experimental results on the UCSD Ped2, CUHK Avenue and ShanghaiTech datasets have obtained AUC values of 96.75%, 84.34% and 77.08% respectively, which shows that the proposed method attains competitive detection accuracy.
引用
收藏
页码:35557 / 35583
页数:27
相关论文
共 52 条
[1]  
[Anonymous], 2014, PROCESSING INT C REC
[2]   A comparative study between single and multi-frame anomaly detection and localization in recorded video streams [J].
Bahrami, Maedeh ;
Pourahmadi, Majid ;
Vafaei, Abbas ;
Shayesteh, Mohammad Reza .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2021, 79
[3]   Smart anomaly detection for Slocum underwater gliders with a variational autoencoder with long short-term memory networks [J].
Bedja-Johnson, Zachary ;
Wu, Peng ;
Grande, Davide ;
Anderlini, Enrico .
APPLIED OCEAN RESEARCH, 2022, 120
[4]  
Bewley A, 2016, IEEE IMAGE PROC, P3464, DOI 10.1109/ICIP.2016.7533003
[5]   Video anomaly detection with multi-scale feature and temporal information fusion [J].
Cai, Yiheng ;
Liu, Jiaqi ;
Guo, Yajun ;
Hu, Shaobin ;
Lang, Shinan .
NEUROCOMPUTING, 2021, 423 :264-273
[6]   Video anomaly detection with spatio-temporal dissociation [J].
Chang, Yunpeng ;
Tu, Zhigang ;
Xie, Wei ;
Luo, Bin ;
Zhang, Shifu ;
Sui, Haigang ;
Yuan, Junsong .
PATTERN RECOGNITION, 2022, 122
[7]   Clustering Driven Deep Autoencoder for Video Anomaly Detection [J].
Chang, Yunpeng ;
Tu, Zhigang ;
Xie, Wei ;
Yuan, Junsong .
COMPUTER VISION - ECCV 2020, PT XV, 2020, 12360 :329-345
[8]   A Cooperative Intrusion Detection System for Sleep Deprivation Attack Using Neuro-Fuzzy Classifier in Mobile Ad Hoc Networks [J].
Chaudhary, Alka ;
Tiwari, V. N. ;
Kumar, Anil .
COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 2, 2015, 32 :345-353
[9]  
Chaudhary A, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), P178, DOI 10.1109/ICROIT.2014.6798326
[10]  
Chaudhary A, 2014, IEEE INT ADV COMPUT, P256, DOI 10.1109/IAdCC.2014.6779330