Violence Detection Method Based on Convolution Neural Network and Trajectory

被引:1
作者
Li, Jianxin [1 ]
Liu, Jie [1 ]
Li, Chao [2 ]
Cao, Wenliang [1 ]
Li, Bin [1 ]
Jiang, Fei [3 ]
Huang, Jinyu [4 ]
Guo, Yingxia [5 ]
Liu, Yang [1 ]
机构
[1] Dongguan Polytech, Sch Elect Informat, Dongguan 523808, Peoples R China
[2] Guangzhou Sontan Polytech Coll, Sch Informat Engn, Guangzhou 511300, Peoples R China
[3] Guangxi Int Business Vocat Coll, Sch Modern Circulat, Nanning 530000, Peoples R China
[4] Dongguan Hosp Integrated Tradit Chinese & Western, Facial Clin, Dongguan 523000, Peoples R China
[5] Dongguan Hosp Integrated Tradit Chinese & Western, Gastroscopy Dept, Dongguan 523000, Peoples R China
关键词
AI; decision support; violence detection; machine learning; convolutional neu-ral network; IDT algorithm; LOCALIZATION;
D O I
10.6688/JISE.202307_39(4).0005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The safety of people's lives and property is the primary factor for the success of urban construction. Therefore, in order to better maintain social stability and harmony, relying on computer technology to effectively detect violence and to make decision support has important theoretical and practical significance. Aiming at the shortcomings of traditional manual design feature extraction methods, this paper proposes a super automatic violence detection method based on the combination of Deep Learning and trajectory in AI systems. Firstly, aiming at the problem of complex time and high accuracy of traditional manual feature extraction, a deep spatiotemporal violence detection method based on three-dimensional convolution and trajectory in AI systems is proposed. We improve the IDT algorithm to extract the target trajectory, and carry out three-dimensional convolution and pooling operation to calculate the deep-seated temporal and spatial information in the video frame, so as to realize peer-to-peer detection in AI systems. Secondly, in order to further improve the acquired deep-seated time and space information and utilization rate and achieve high detection rate, the feature fusion of double stream convolution and threedimensional convolution is proposed, and the feature extraction of continuous video frame sequence is carried out by three-dimensional convolution neural network (C3D), which can effectively extract the fusion feature information of time and space in the classification layer, so as to obtain the final classification result. Finally, in order to solve the problem of too deep network level and slow convergence, dense convolution is introduced, which reduces the parameters of the network model and time complexity. Experimental results show that compared with other mainstream algorithms, this method is more effective and stable, and can be applied to the detection of violent abnormal behavior in video. Meanwhile, the method proposed in this paper has important theoretical value and practical significance for decision support of video surveillance system in AI systems.
引用
收藏
页码:777 / 796
页数:20
相关论文
共 41 条
[1]   Anomaly detection and localization in crowded scenes using connected component analysis [J].
Amraee, Somaieh ;
Vafaei, Abbas ;
Jamshidi, Kamal ;
Adibi, Peyman .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (12) :14767-14782
[2]   Abnormal event detection and localization in crowded scenes based on PCANet [J].
Bao, Tianlong ;
Karmoshi, Saleem ;
Ding, Chunhui ;
Zhu, Ming .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (22) :23213-23224
[3]  
Nievas EB, 2011, LECT NOTES COMPUT SC, V6855, P332, DOI 10.1007/978-3-642-23678-5_39
[4]  
Carreira J., 2018, arXiv
[5]   Quo Vadis, Action Recognition? A New Model and the Kinetics Dataset [J].
Carreira, Joao ;
Zisserman, Andrew .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :4724-4733
[6]   Random clustering forest for extended belief rule-based system [J].
Chen, Nan-Nan ;
Gong, Xiao-Ting ;
Wang, Ying-Ming ;
Zhang, Chun-Yang ;
Fu, Yang-Geng .
SOFT COMPUTING, 2021, 25 (06) :4609-4619
[7]   Data recovery in wireless sensor networks based on attribute correlation and extremely randomized trees [J].
Cheng, Hongju ;
Wu, Leihuo ;
Li, Ruixing ;
Huang, Fangwan ;
Tu, Chunyu ;
Yu, Zhiyong .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) :245-259
[8]   Using High-Bandwidth Networks Efficiently for Fast Graph Computation [J].
Cheng, Yongli ;
Jiang, Hong ;
Wang, Fang ;
Hua, Yu ;
Feng, Dan ;
Guo, Wenzhong ;
Wu, Yunxiang .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2019, 30 (05) :1170-1183
[9]  
Clarin C., 2006, P PCSC CIT, P150
[10]   Generative adversarial networks based on Wasserstein distance for knowledge graph embeddings [J].
Dai, Yuanfei ;
Wang, Shiping ;
Chen, Xing ;
Xu, Chaoyang ;
Guo, Wenzhong .
KNOWLEDGE-BASED SYSTEMS, 2020, 190