An Novel Algorithm for Detecting the Suspicious Acts in

ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS AND
TECHNOLOGIES
(ICRACST’15)
25TH MARCH 2015
An Novel Algorithm for Detecting the Suspicious
Acts in Crowded Scenario
V.G.Janani,
Assistant Professor
Electronics and Communication Engineering
Velammal College of Engineering & Technology
Madurai,Tamilnadu,India
P.Malarvizhi,
Final Year Student
Electronics and Communication Engineering
Velammal College of Engineering & Technology
Madurai,Tamilnadu,India
K.Saranya,
Final Year Student
Electronics and Communication Engineering
Velammal College of Engineering & Technology
Madurai,Tamilnadu,India
K.Lavanya,
Final Year Student
Electronics and Communication Engineering
Velammal College of Engineering & Technology
Madurai,Tamilnadu,India
Abstract—Crowd analysis becomes the most active-oriented
research and trendy topic in computer vision nowadays. Long
term human monitoring in crowded scenario is impractical and
ineffective. Automatic abnormal motion detection using this
novel algorithm is therefore the key for successful in video
surveillance in dynamic scenario like airport terminals. The aim
of this paper provides a novel solution to abnormal detection in
real time video surveillance. We proposed an algorithm called
Histogram Oriented Particle Flow for motion detection. A fast
version of this algorithm is based on fusing the particle flow with
background subtraction step. Motion features are derived from
particle flow method. Finally a one class non linear SVM is
applied for the classification of suspicious behaviour in crowded
scenario.
Keywords-Abnormal Detection, Histogram Oriented Particle Flow
(HOPF), Non Linear One Class SVM
I.
INTRODUCTION
In many applications, such as video surveillance, content
based video coding, and human–computer interaction, moving
object detection is an important and fundamental problem. The
general technique for moving object detection is background
elimination under the situation of fixed cameras. Detection of
moving objects in video stream is the first related step of
information removal in many computer visualization
applications, including video surveillance, people tracking,
traffic monitoring, and semantic annotation of videos. Video
cameras are extensively used in surveillance application to
examine public areas, such as train stations, airports and
shopping centers. When crowds are intense, automatically
tracking individuals becomes a difficult task. Anomaly
detection is also known as outlier detection, which is
applicable in a variety of application. Activity analysis in
video sequences means interpreting human or moving object
behaviors and, specifically, detecting abnormal events, which
is the focus of this paper. Abnormal events are defined to have
the following properties: They are rare and they are
unexpected. According to this definition, examples of
abnormal events include a person’s slip or fall, a vehicle
driving on the wrong side of the road, and people running
abruptly. Among many possible abnormal events, we focus on
events that have different speeds and directions compared to
normal situations. There are generally two approaches to
detecting abnormal events: an object-based approach and a
feature-based approach. The object-based approach attempts
to detect and track moving objects individually from video
sequences. In contrast to the object-based approach, the
feature-based approach extracts low-level motion features
instead of tracking each moving object individually.
77
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS AND
TECHNOLOGIES
(ICRACST’15)
25TH MARCH 2015
For abnormal event detection tasks in video, we propose a
Descriptor encoding the movement information of the global
frame. Moreover, we adopt Histogram Oriented Particle Flow
method, one-class support vector machine (SVM), to
distinguish the abnormal event from the reference model. The
rest of the paper is organized as follows. In Section 2, related
works are briefly reviewed. In Section 3, the proposed
descriptor, Particle Flow is described to provide feature
vectors for classification algorithm. In Section 4, we present
experimental results on real world video scenes. Finally,
Section 5 concludes the paper.
II. RELATED WORKS
The detailed literature survey of our work is presented in
this section. Abnormality detection is classified into two
categories; trajectory analysis and motion analysis. Trajectory
analysis is based on object tracking and typically requires
normal environment to operate. Motion analysis is better
suitable for crowded scenes by analyzing patterns of
movement rather than attempting to distinguish object. Some
of the few existing works consider the relationship between
pedestrians’ social behaviors and their walking scenarios.
Recently, some methods [1], [2] utilize crowd flow and
semantic scene knowledge to detect abnormal activity and
obtained good results. But these methods can be only applied
for some simple scene (e.g. single sink/source, single crowd
flow). There have been attempts to model crowds based on
discriminative classifiers [3].The analysis of crowd behavior
and movements are of particular attention in video
surveillance domain [4].There are two main approaches in
solving the problem of understanding crowd behaviors. In the
conventional approach, which we refer as the “object based
“methods, a crowd is considered as a collection of individuals
[5],[6]. Therefore, to understand the crowd behavior it is
necessary to perform segmentation or detect objects to analyze
group behaviors [7].
Crowd-related scene understanding problems, such as
crowd segmentation [8], [9], crowd counting [10], movement
tracking in crowd [11], [12], and crowd activity perception
[13], have attracted the interest of many researchers. More
relevant to this paper are works on crowd motion pattern
extraction and abnormal event detection. There are a few
methods which directly extract motion patterns from optical
flow fields. In [14], video frames are initially characterized by
the histograms of the corresponding optical flow fields, and
further represented as points on a low-dimensional manifold
through a spatial-temporal Laplacian Eigen map method.
A video is thus represented as a trajectory of frames on the
manifold. After learning the trajectories of videos depicting
normal events, abnormal events can be detected by comparing
the trajectories of the videos with those of normal videos.
Cong et al. [15] introduced a multi scale histogram of optical
flow based on three different spatial-temporal templates to
extract optical flow field patterns of normal crowd behaviors,
and adopted a sparse method to determine a pattern subset as a
dictionary which can be used to reconstruct other elements.
Since only normal data are used for dictionary construction,
anomaly can be detected by comparing the sparse
reconstruction cost of a set of given data with a pre specified
threshold. Yassine et al. [16] proposed a direction model to
extract dominant directions in a block of optical flow field.
The novelty of this model is the use of multiple directions
descriptor at each position, which is suitable when there are
multiple moving objects with different movement directions in
a local region. After combining the blocks, a crowd of people
is segmented into several groups, each of which corresponds
to a particular type of movement pattern. The overall crowd
behavior is finally recognized through analyzing the
movement directions and speeds of the groups. On the other
hand, instead of analyzing the whole optical flow field, Chen
et al. [17] characterized crowd motion through a set of salient
points. This approach faces considerable complexity in
detection of objects, tracking trajectories, and recognizing
activities in dense crowds where the whole process is affected
by occlusions.
III. PROPOSED METHOD
Proposed method consists of four major modules: i.)ROI
Mask, ii) Boundary Detection, iii) Histogram Oriented Particle
Flow, iv) Non Linear one class SVM .The proposed method is
explored in Fig.1. Input video we have taken from public
datasets PEDS.
INPUT
VIDEO
HISTOGRAM
ORIENTED OF
PARTICLE
FLOW
FRAME
CONVERSION
BOUNDARY
DETECTION
&LABELING
GRAY SCALE
CONVERSION
ROI MASK
78
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS AND
TECHNOLOGIES
(ICRACST’15)
25TH MARCH 2015
NON LINEAR
ONE CLASS
SVM
Fig .1 B
DETECTION OF
ABNORMAL
BEHAVIOUR
lock Diagram to detect the abnormal pedestrians in crowded environment
A. ROI Mask
The first step in our image processing is to separate
foreground objects from backgrounds in images. To this end,
we first apply a binary region-of-interest (ROI) mask to the
image or frame [18]. Note that, for detecting abnormal events,
this manual operation is reasonable as we often want to focus
on specific areas in cameras’ viewing fields.
A region of interest (ROI) is a portion of an image that we
want to filter or perform some other operation on. So we
define an ROI by creating a binary mask, which is a binary
image that is the same size as the image we want to process
with pixels that define the ROI set to 1 and all other pixels set
to 0[18]. We can define more than one ROI in an image.
The regions can be geographic in nature, such as polygons that
encompass contiguous pixels, or they can be defined by a
range of intensities.
B. Boundary Detection
Boundary detection is a fundamental task in computer
vision, with broad applicability in areas such as feature
extraction, object recognition and image segmentation. The
majority of papers on edge detection have focused on using
only low-level cues, such as pixel intensity or color. Recent
work has started exploring the problem of boundary detection
based on higher-level representations of the image, such as
motion, surface and depth cues, segmentation, as well as
category specific information. In this paper we propose a
general formulation for boundary detection that can be
applied, in principle, to the identification of any type of
boundaries, such as general edges from low-level static cues,
and occlusion boundaries from motion and depth cues. We
generalize the classical view of boundaries from sudden signal
changes on the original low-level image input, to a locally
linear (planar or step-wise) model on multiple layers of the
input, over a relatively large image region [19]. The layers can
be interpretations of the image at different levels of visual
processing, which could be low-level (e.g., color or grey level
intensity), mid-level (e.g., segmentation, optical flow),or highlevel (e.g., object category segmentation). We can summarize
our assumptions as follows:
1. A boundary separates different image regions, which in
the absence of noise are almost constant, at some level of
image interpretation or processing. For example, at the lowest
level, a region could have constant intensity. At a higher-level,
it could be a region delimiting an object category, in which
case the output of a category-specific classifier would be
constant.
2. For a given image, boundaries in one layer often
coincide, in terms of position and orientation, with boundaries
in other layers. For example, discontinuities in intensity are
typically correlated with discontinuities in optical flow,
texture or other cues. Moreover, the boundary that aligns
across multiple layers typically corresponds to the semantic
boundaries that interest humans.
C. Histogram Oriented Particle Flow Method
In corner feature trajectories or optical flow estimation, are
sufficient to generate predictive model, they do not address the
problem of groups crowd and their focus isn’t on a basis for
further midlevel analysis of events.[20] Analyzing human
crowds is becoming an important issue in video surveillance
and one challenging task is to detect group-level crowd due to
their non-rigid shapes nature. Particle flow method has the
ability to track crowd trajectories . Fundamental to the success
of any algorithms for recognizing group activities is the ability
to track individuals (or group of individuals) under crowded
conditions. However, such group-level crowd result in
occlusions and the goal of extract trajectories for each
individual may not be possible. The key advantage of particle
video approach is that it is both spatially dense and temporally
long-range. In contrast, feature tracking is long range but
spatially sparse and optical flow is dense but temporally shortrange.
D. Non-Linear One Class SVM
In this paper, abnormal events are detected by nonlinear
one-class SVM classification methods. In general, a non-linear
one-class SVM algorithm shows high performance results
based on learning normal behavior frames. The research in the
79
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS AND
TECHNOLOGIES
(ICRACST’15)
25TH MARCH 2015
machine learning field focusing on improving the
effectiveness of pattern classification can be adapted to obtain
More accurate abnormal detection results. When some arts
of the image contain no motion during the training phase, the
one-class SVM algorithm is robust because it is based on the
global behavior of the frame. However, if the size of the block
is small, the SVM is not robust and can detect abnormal
situation when a movement occurs in this part. In abnormal
detection problems, it is supposed that the samples from a
positive class are obtainable [21]. The one-class SVM
framework is then suitable to the specificity of the abnormal
event detection where only normal scene data are available. In
machine learning, support vector machine (SVM) is initially
presented by Vapnik and Lerner , it is a method of statistical
learning theory that analyzes data and recognizes patterns,
used for classification and regression analysis[22]. By
adopting a kernel trick, which implicitly maps inputs into
high-dimensional feature space, SVM can effectively perform
Non- linear classification problems.
Fig.3(a)Starting Frame
Fig.3(b)Ending Frame
IV. EXPERIMENTAL RESULTS
A. Dataset
We had considered the two various inputs as video
sequences from PEDS datasets which is related to pedestrian
activities in crowd (like AVI or MPEG format).From that, we
evaluate the performance for ROI Mask, Bounding and
Labelling representations, Histogram Oriented Particle flow &
Non linear one class SVM Classification by simulations
conducted in MATLAB (version 2014).
Fig.4 (a) Starting Frame
Fig.4 (b) Ending Frame
C. Gray Scale Conversion
The RGB frame has been converted in to gray scale to
detect the pedestrians in an easier way.
Fig.5 Grayscale Conversion for the different view of data sets
Fig.2(a).PEDS(View_001) Dataset
Fig.2(b).PEDS(View_002) Dataset
B. Frame Conversion
Pedestrian videos from different view have been
converted to frames using MATLAB.
D. ROI Mask
Next to separate foreground objects from backgrounds, we
first apply binary ROI mask to an image. By applying the ROI
mask we can separate the particular crowded people by
80
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS AND
TECHNOLOGIES
(ICRACST’15)
25TH MARCH 2015
selecting pixel values. The ROI mask and selected regions are
obtained by applying the mask are shown in Fig.6
of features for the people present in crowded area has been
done by the Boundary Representation and Labeling.
a) PEDS(View_001) Dataset
Fig.8(a)&(b) Boundary Representation & Labeling Where red Color
Shows that Boundary representation and Green color resembles that labeling
of pedestrians in crowded environment
Fig. 6 (a) ROI mask
(b) Selected portion by applying mask
b) PEDS(View_002) Dataset
Fig. 7 (c) ROI mask
E.
F. Histogram Oriented Particle Flow method
After the Boundary representation and labeling process,
the crowd flow has been estimated by using Histogram
Oriented Particle flow method. The Dense Motion of Crowd
has been shown by red color and least motion shown as black
color in below fig through particle position and Histogram
Representation in an two dimensional manner.
(d) Selected portion by applying mask
Boundary Representation and Labeling
In this paper, from ROI Mask the people in crowded area
has been identified .Extraction of contour effects & Selection
Fig.9 (a )HOPF Algorithm for PEDS(View_001)Dataset
81
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS AND
TECHNOLOGIES
(ICRACST’15)
25TH MARCH 2015
College of Engineering & Technology) for allowing us to use
some of the published research results. We are also thankful to
the UG students of ECE, Velammal College of Engineering &
Technology for their valuable feedback. Finally, We are
indebted to Velammal College of Engineering & Technology
for encouraging our research work.
REFERENCES
Fig.9 (b)HOPF Algorithm for PEDS(View_002)Dataset
V. CONCLUSION
We have presented a new method for detecting abnormal
event detection of the global frame is proposed. The method
consists of two components: computing Histogram Oriented
Particle flow method, and applying a non-linear one-class
SVM for classification. The HOP feature descriptor, which is
obtained after applying ROI Mask and Boundary Detection for
fast implementation. The proposed detection algorithm has
been tested on several video datasets yielding successful
results in detecting abnormal events. The abnormal detection
may be applied on a region of interest or a specific tracked
object.To derive various features, first step in our processing is
to separate foreground objects from backgrounds using ROI
mask. In previous approaches, occlusion occurs so it is
difficult to detect an crowd behaviour. But these drawbacks
are overcomed by our method and it attains much lower
prediction errors than existing approaches. Further,We will
use the Non-Linear one class SVM to detect the abnormal
human activity from an normal one.
VI. ACKNOWLEDGMENT
Our Sincere thanks to Dr.S.Vasuki (Head of the
Electronics and Communication Department, Velammal
College of Engineering & Technology), we are grateful to
Assistant Prof. V.G.Janani (ECE Department, Velammal
[1] O. P. Popoola and K. Wang, “Video-based abnormal human behavior
recognition— A review,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.,
vol. 42, no. 6, pp. 865–878, Nov. 2012.
[2] R. T. Collins et al., A System for Video Surveillance and Monitoring,
vol. 2. Pittsburgh, PA, USA: Carnegie Mellon Univ., 2000.
[3] J. Candamo, M. Shreve, D. B. Goldgof, D. B. Sapper,and
R. Kasturi, “Understanding transit scenes: A survey on human
behavior-recognition algorithms,” IEEE Trans. Intell. Transp. Syst.,
vol. 11, no. 1, pp. 206–224, Mar. 2010.
[4] P. Metro. (2013, Oct. 1). Autonomous Operator of Parisian Transports
[Online]. Available: http://www.ratp.fr/
[5] F. Ziliani et al., “Performance evaluation of event detection solutions:
The creds experience,” in Proc. IEEE Conf. AVSS, Sep. 2005,
pp. 201–206.
[6] G. Lavee, E. Rivlin, and M. Rudzsky, “Understanding video events:
survey of methods for automatic interpretation of semantic occurrences
in video,” Technion-Israel Inst. Technol., Haifa, Israel, Tech. Rep.
CIS-2009-06, 2009.
[7] G. Lavee, E. Rivlin, and M. Rudzsky, “Understanding video events:
A survey of methods for automatic interpretation of semantic occurrences
in video,” IEEE Trans. Syst. Man, Cybern. C, Appl. Rev., vol. 39,
no. 5, pp. 489–504, Sep. 2009.
[8] D. Kosmopoulos and S. P. Chatzis, “Robust visual behavior recognition,”
IEEE Signal Process. Mag., vol. 27, no. 5, pp. 34–45, Sep. 2010.
[9] Á. Utasi and L. Czúni, “Detection of unusual optical flow patterns by
multilevel hidden Markov models,” Opt. Eng., vol. 49, no. 1, p. 017201,
2010.
[10] T. Xiang and S. Gong, “Incremental and adaptive abnormal behaviour
detection,” Comput. Vis. Image Understand., vol. 111, no. 1, pp. 59–73,
2008.
[11] T. Xiang and S. Gong, “Video behaviour profiling and abnormality
detection without manual labelling,” in Proc. IEEE 10th ICCV, vol. 2.
Oct. 2005, pp. 1238–1245.
[12] T. S. Haines and T. Xiang, “Delta-dual hierarchical Dirichlet processes:
A pragmatic abnormal behaviour detector,” in Proc. IEEE ICCV,
Nov. 2011, pp. 2198–2205.
[13] J. Varadarajan and J.-M. Odobez, “Topic models for scene analysis
and abnormality detection,” in Proc. 12th ICCV Workshops, 2009,
pp. 1338–1345.
[14] S. K wak and H. Byun, “Detection of dominant flow and abnormal
surveillance video,” Opt. Eng., vol. 50, no. 2, pp. 027202-1– 027202- 8
.
[15] J. Kim and K. Grauman, “Observe locally, infer globally: A space-time
MRF for detecting abnormal activities with incremental updates,” in
Proc. IEEE Conf. CVPR, Jun. 2009, pp. 2921–2928.
[16] Y. Benezeth, P.-M. Jodoin, and V. Saligrama, “Abnormality detection
using low-level co-occurring events,” Pattern Recognit. Lett., vol. 32,
no. 3, pp. 423–431, 2011.
[17] A. Adam, E. Rivlin, I. Shimshoni, and D. Reinitz, “Robust realtime
82
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS AND
TECHNOLOGIES
(ICRACST’15)
25TH MARCH 2015
unusual event detection using multiple fixed-location monitors,”
IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 3, pp. 555–560,
Mar. 2008.
[18] M. C. Casey, D. L. Hickman, A. Pavlou, and J. R. Sadler, “Smallscale
anomaly detection in panoramic imaging using neural models of
low-level vision,” Proc. SPIE, vol. 8042, pp. 80420X-1–80420X-11,
Jun. 2011.
[19] O. Boiman and M. Irani, “Detecting irregularities in images and in
video,” Int. J. Comput. Vis., vol. 74, no. 1, pp. 17–31, 2007.
[20] C. Bregler, “Learning and recognizing human dynamics in video
sequences,” in Proc. IEEE Conf. CVPR, Jun. 1997, pp. 568–574.
[21] T. Starner and A. Pentland, “Real-time American Sign Language
from video using hidden Markov models,” in Proc. Int. Symp.
Comput. Vis., Coral Gables, FL, USA, 1995.
[22] A. F. Bobick and J. W. Davis, “The recognition of human movement
using temporal templates,” IEEE Trans. Pattern Anal. Mach. Intell.,
vol. 23, no. 3, pp. 257–267, Mar. 2001.
[23] Y. Chen, G. Liang, K. K. Lee, and Y. Xu, “Abnormal behavior detection
by multi-SVM-based Bayesian network,” in Proc. ICIA, Jul. 2007,
pp. 298–303.
[24] C. Schuldt, I. Laptev, and B. Caputo, “Recognizing human actions:
A local SVM approach,” in Proc. 17th ICPR, vol. 3. 2004, pp. 32–36.
[25] B. Yao and L. Fei-Fei, “Modeling mutual context of object and human
pose in human-object interaction activities,” in Proc. IEEE Conf.
Jun. 2010, pp. 17–24.
[26] N. Dalal, B. Triggs, and C. Schmid, “Human detection using oriented
histograms of flow and appearance,” in Proc. ECCV, 2006, pp. 428–441.
[27] N. Dalal, “Finding people in images and videos,” Ph.D. dissertation,
Dept. Sci. Environ., Inst. Nat. Polytech. de Grenoble-INPG,
Saint-Martin-d’Hères, France, 2006.
[28] I. Laptev, M. Marszalek, C. Schmid, and B. Rozenfeld, “Learning
realistic human actions from movies,” in Proc. IEEE Conf. CVPR,
Jun. 2008, pp. 1–8.
[29] T.Wang, H. Snoussi, and F. Smach, “Detection of visual abnormal
via one-class SVM,” in Proc. Int. Conf. Pattern Recognit. IPCV, vol. 1.
2012, pp. 113–119.
[30] T. Wang and H. Snoussi, “Histograms of optical flow orientation for
visual abnormal events detection,” in Proc. IEEE 9th Int. Conf. AVSS,
Sep. 2012, pp. 13–18.
[31] UMN, Minneapolis, MN, USA. (2006). Unusual Crowd Activity Dataset
of University of Minnesota, Department of Computer Science and
Engineering .
[32] PETS, Vellore, India. (2009). Performance Evaluation of Tracking
and Surveillance (PETS) 2009 Benchmark Data. Multisensor
Sequences Containing Different Crowd Activities [Online]. Available:
http://www.cvg.rdg.ac.uk/pets2009/a.html
[33] B. K. Horn and B. G. Schunck, “Determining optical flow,” Artif. Intell.,
vol. 17, no. 1, pp. 185–203, 1981.
[34 ] V. N. Vapnik and A. Lerner, “Pattern recognition using generalized
portrait method,” Autom. Remote Control, vol. 24, no. 6, pp. 774–780,
1963.
[35] B. E. Boser, I. M. Guyon, and V. N. Vapnik, “A training algorithm for
optimal margin classifiers,” in Proc. ACM 5th Annu. Workshop COLT,
Pittsburgh, PA, USA, Jul. 1992, pp. 144–152.
[36] C. Piciarelli, C. Micheloni, and G. L. Foresti, “Trajectory-based
event detection,” IEEE Trans. Circuits Syst. Video Technol., vol. 18,
no. 11, pp. 1544–1554, Nov. 2008.
[37] N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector
Machines and Other Kernel-Based Learning Methods. Cambridge, U.K.:
Cambridge Univ. Press, 2000.
[38] B. Schölkopf, J. C. Platt, J. Shawe-Taylor, A. J. Smola, and
R. C. Williamson, “Estimating the support of a high-dimensional
Neural Comput.”, vol. 13, no. 7, pp. 1443–1471, 2001.
[39 ] B. Schölkopf and A. J. Smola, Learning With Kernels: Support Vector
Machines, Regularization, Optimization and Beyond. Cambridge, MA,
USA: MIT Press, 2002.
[40] V. Vapnik, The Nature of Statistical Learning Theory. New York, NY,
USA: Springer-Verlag, 2000.
[41] V. N. Vapnik, Statistical Learning Theory. Hoboken, NJ, USA: Wiley,
1998.
[42] O. Tuzel, F. Porikli, and P. Meer, “A Bayesian approach to background
modeling,” in Proc. IEEE Comput. Soc. Conf. CVPR Workshops,
Jun. 2005, p. 58.
[43] F. Porikli and A. Yilmaz, “Object detection and tracking,” in Video
Analytics for Business Intelligence. New York, NY, USA: SpringerVerlag, 2012, pp. 3–41.
[44] R. Mehran, A. Oyama, and M. Shah, “Abnormal crowd behavior
detection using social force model,” in Proc. IEEE Conf. CVPR, Miami,
FL, USA, Jun. 2009, pp. 935–942.
[45] Y. Cong, J. Yuan, and J. Liu, “Sparse reconstruction cost for abnormal
event detection,” in Proc. IEEE CVPR, Colorado Springs, CO, USA,
Jun. 2011, pp. 3449–3456.
[46] Y. Shi, Y. Gao, and R. Wang, “Real-time abnormal event detection in
complicated scenes,” in Proc. 20th ICPR, Istanbul, Turkey, Aug. 2010,
pp. 3653–3656.
83
All Rights Reserved © 2015 IJARTET