GROUP BEHAVIOUR PROFILING FOR DETECTION OF ANOMALY IN CROWD

被引:5
作者
Palanisamy, Geetha [1 ]
Manikandan, T. T. [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Coll Engn, Chennai, Tamil Nadu, India
来源
2017 INTERNATIONAL CONFERENCE ON TECHNICAL ADVANCEMENTS IN COMPUTERS AND COMMUNICATIONS (ICTACC) | 2017年
关键词
Crowd; Group behavior; trajectories; clustering; abnormal events;
D O I
10.1109/ICTACC.2017.14
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Groups are the main entities that form the crowd. So understanding group level properties is vital and practically useful in a wide range of applications, especially for crowd abnormality detection. This paper aims to address the problem of modeling different behaviors captured in surveillance videos for the applications of normal behavior and abnormal behavior detection. A novel framework is developed for automatic behavior profiling and anomaly detection based on the clustering based group analysis. These behaviors can be effectively applied to public scenes with variety of crowd densities and distributions and are potentially important in many applications like crowd dynamic monitoring, crowd video classification and abnormal event detection in security surveillance.
引用
收藏
页码:11 / 15
页数:5
相关论文
共 50 条
[31]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[32]   Approaches for Anomaly Detection in Network : A Survey [J].
Sawant, Anuja A. ;
Game, Pravin S. .
2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
[33]   Adaptive Crowd Segmentation Based on Coherent Motion Detection [J].
Zheyi Fan ;
Jiao Jiang ;
Shuqin Weng ;
Zhonghang He ;
Zhiwen Liu .
Journal of Signal Processing Systems, 2018, 90 :1651-1666
[34]   A Hybrid Approach of HTTP Anomaly Detection [J].
Shi, Yang ;
Wang, Shupei ;
Zhao, Qinpei ;
Li, Jiangfeng .
WEB AND BIG DATA, 2017, 10612 :128-137
[35]   Seurat: A pointillist approach to anomaly detection [J].
Xie, YL ;
Kim, HA ;
O'Hallaron, DR ;
Reiter, MK ;
Zhang, H .
RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2004, 3224 :238-257
[36]   Anomaly Detection Method for Online Discussion [J].
Krammer, Peter ;
Habala, Ondrej ;
Mojzis, Jan ;
Hluchy, Ladislav ;
Jurkovic, Marek .
16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 :311-318
[37]   Exit selection process during crowd evacuation, modelled on the cockroach emergent behaviour [J].
Zajdel, M. ;
Filipowicz, B. .
BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2014, 62 (03) :557-563
[38]   A short review of deep learning methods for understanding group and crowd activities [J].
Felipe Borja-Borja, Luis ;
Saval-Calvo, Marcelo ;
Azorin-Lopez, Jorge .
2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018,
[39]   Detection of hierarchical crowd activity structures in geographic point data [J].
Salazar, J. Miguel ;
Lopez-Ramirez, Pablo ;
Siordia, Oscar S. .
PEERJ COMPUTER SCIENCE, 2022, 8
[40]   Detection of hierarchical crowd activity structures in geographic point data [J].
Salazar J.M. ;
López-Ramírez P. ;
Siordia O.S. .
PeerJ Computer Science, 2022, 8