Abnormality Identification in Video Surveillance System using DCT

被引:15
作者
Balasundaram, A. [1 ]
Dilip, Golda [2 ]
Manickam, M. [3 ]
Sivaraman, Arun Kumar [4 ]
Gurunathan, K. [5 ]
Dhanalakshmi, R. [6 ]
Ashokkumar, S. [7 ]
机构
[1] Vellore Inst Technol VIT, Sch Comp Sci & Engn, Ctr Cyber Phys Syst, Chennai 600127, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Vadapalani Campus, Chennai 600026, Tamil Nadu, India
[3] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 603203, Tamil Nadu, India
[4] Vellore Inst Technol VIT, Sch Comp Sci & Engn, Chennai 600127, Tamil Nadu, India
[5] M Kumarasamy Coll Engn, Dept Informat Technol, Karur 639113, India
[6] KCG Coll Technol, Dept Comp Sci & Engn, Chennai 600097, Tamil Nadu, India
[7] SIMATS, Saveetha Sch Engn, Dept Comp Sci & Engn, Chennai 602105, Tamil Nadu, India
关键词
Abnormality detection; anomaly detection; DCT strategy; video surveillance;
D O I
10.32604/iasc.2022.022241
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the present world, video surveillance methods play a vital role in observing the activities that take place across secured and unsecured environment. The main aim with which a surveillance system is deployed is to spot abnormalities in specific areas like airport, military, forests and other remote areas, etc. A new block-based strategy is represented in this paper. This strategy is used to identify unusual circumstances by examining the pixel-wise frame movement instead of the standard object-based approaches. The density and also the speed of the movement is extorted by utilizing optical flow. The proposed strategy recognizes the unusual movement and differences by using discrete cosine transform coefficient. Our goal is to attain a trouble-free block-based Discrete Cosine Transform (DCT) strategy that promotes real-time abnormality detection. The proposed approach has been evaluated against an airport dataset and the outcome of unusual happenings occurred in is evaluated and reported.
引用
收藏
页码:693 / 704
页数:12
相关论文
共 19 条
[1]  
Bouttefroy P. L. M., 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP 2010), P149, DOI 10.1109/EUVIP.2010.5699125
[2]   APPLICATION OF NOVEL CLONAL ALGORITHM IN MULTIOBJECTIVE OPTIMIZATION [J].
Chen, Jianyong ;
Lin, Qiuzhen ;
Hu, Qingbin .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2010, 9 (02) :239-266
[3]   Detection and description of human running behaviour in sports video multimedia database [J].
Cheng, FX ;
Christmas, WJ ;
Kittler, J .
11TH INTERNATIONAL CONFERENCE ON IMAGE ANALYSIS AND PROCESSING, PROCEEDINGS, 2001, :366-371
[4]   Abnormal behavior detection based on regional optical flow [J].
Du J.-H. ;
Xu L. .
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2011, 45 (07) :1161-1166
[5]  
Efros AA, 2003, NINTH IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION, VOLS I AND II, PROCEEDINGS, P726
[6]  
Gonzalez R. C., 2009, Digital Image Processing, DOI DOI 10.1117/1.3115362
[7]   A Numerical Method for Preserving Curve Edges in Nonlinear Anisotropic Smoothing [J].
Hu, Shaoxiang ;
Liao, Zhiwu ;
Sun, Dan ;
Chen, Wufan .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2011, 2011
[8]   Viewing Sea Level by a One-Dimensional Random Function with Long Memory [J].
Li, Ming ;
Cattani, Carlo ;
Chen, Seng-Yong .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2011, 2011
[9]   Visiting Power Laws in Cyber-Physical Networking Systems [J].
Li, Ming ;
Zhao, Wei .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2012, 2012
[10]   Enclosed Laplacian Operator of Nonlinear Anisotropic Diffusion to Preserve Singularities and Delete Isolated Points in Image Smoothing [J].
Liao, Zhiwu ;
Hu, Shaoxiang ;
Sun, Dan ;
Chen, Wufan .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2011, 2011