Open Access Open Access  Restricted Access Subscription Access

Deep Learning model for Anomaly Detection in Video Surveillance: A CNN Approach

Shrushti Thigale, Prof. Jitendra Musale, Swapnil Shinde, Swamini Deshmane, Harshad Kale

Abstract


Suspicious activity encompasses a broad concept relating to actions, behaviors, or occurrences that give rise to concerns regarding potential illegality, threat, or ethical violations. This term is commonly employed in various domains such as law enforcement, cybersecurity, and financial sectors. Detecting and addressing suspicious activity often involves vigilant observation, data analysis, and the use of technology to identify patterns that deviate from established norms. Individual and community awareness is essential for recognizing and reporting such activities, contributing to the overall maintenance of safety and security. Effectively managing and responding to suspicious activity requires a combination of proactive measures, investigative tools, and collaborative efforts to prevent potential risks from escalating. With the increasing demand for robust security solutions, video surveillance systems play a crucial role in monitoring and safeguarding public spaces. This study focuses on enhancing the capabilities of video surveillance applications by employing Convolutional Neural Network (CNN) algorithms for the detection of suspicious activities. The proposed system leverages the power of deep learning to analyze video streams and identify anomalous behaviors indicative of potential threats or security breaches. The CNN algorithm is trained on a diverse dataset to learn and recognize patterns associated with normal activities as well as those considered suspicious. The model's ability to discern complex spatial and temporal relationships in video frames enables it to provide accurate and timely alerts. Key aspects of the CNN algorithm include feature extraction, spatial hierarchies, and temporal dependencies, enabling the system to discern subtle nuances in human behavior that may go unnoticed by traditional surveillance methods. The model is designed to adapt to dynamic environments and varying lighting conditions, ensuring robust performance in real-world scenarios. In the evaluation phase, the proposed system demonstrates promising results in terms of accuracy, precision, and recall, outperforming conventional video surveillance methods.

Full Text:

PDF

References


Miller, Z., Dickinson, B., and Hu, W. (2012). Gender prediction on twitter using stream algorithms with n-gram character features. International Journal of Intelligence Science, 2(04), 143.

Burger, J. D., Henderson, J., Kim, G., and Zarrella, G. (2011, July). Discriminating gender on Twitter. In Proceedings of the conference on empirical methods in natural language processing (pp. 1301-1309). Association for Computational Linguistics.

Verhoeven, B., Daelemans, W., and Plank, B. (2016). Twisty: a multilingual twitter stylometry corpus for gender and personality profiling. In Proceedings of the 10th Annual Conference on Language Resources and Evaluation (LREC 2016)/Calzolari, Nicoletta [edit.]; et al. (pp. 1-6)

Sumner, C., Byers, A., Boochever, R., and Park, G. J. (2012, December). Predicting dark triad personality traits from twitter usage and a linguistic analysis of tweets. In 2012 11th International Conference on Machine Learning and Applications (Vol. 2, pp. 386- 393). IEEE.

Wald, R., Khoshgoftaar, T. M., Napolitano, A., and Sumner, C. (2012, December). Using Twitter content to predict psychopathy. In 2012 11th International Conference on Machine Learning and Applications (Vol. 2, pp. 394-401). IEEE.

Zheng, X., Han, J., and Sun, A. (2018). A survey of location prediction on twitter. IEEE Transactions on Knowledge and Data Engineering, 30(9), 1652-1671.

Lee, K., Ganti, R. K., Srivatsa, M., and Liu, L. (2014, December). When twitter meets foursquare: tweet location prediction using foursquare. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 198207). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

M. A. Villalobos and E. Silva, ‘‘A statistical and machine learning model to detect money laundering: An application,’’ Actuarial Sci. Dept. Anahuac Univ., Tech. Rep., 2017. [Online]. Available:

V. Jayasree and R. V. S. Balan, ‘‘Money laundering regulatory risk evaluation using bitmap index-based decision tree,’’ J. Assoc. Arab Universities Basic Appl. Sci., vol. 23, no. 1, pp. 96–102, Jun. 2017.

M. B. Jamshidi, M. Gorjiankhanzad, A. Lalbakhsh, and S. Roshani, ‘‘A novel multiobjective approach for detecting money laundering with a neuro-fuzzy technique,’’ in Proc. IEEE 16th Int. Conf. Netw., Sens. Control (ICNSC), May 2019, pp. 454–458.


Refbacks

  • There are currently no refbacks.