Deep Learning Approach For Suspicious Activity Detection From Surveillance Video
Deep Learning Approach For Suspicious Activity Detection From Surveillance Video
https://doi.org/10.22214/ijraset.2023.51438
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
Abstract: In today's uncertain world, video surveillance plays a vital role in maintaining indoor and outdoor security. Video
surveillance system components such as behaviour detection, behaviour understanding, and normal or suspicious activity
classification can be used for real-time applications. This article uses a hierarchical approach to detect various suspicious
activities such as loitering, fainting, and trespassing. This approach is based on motion properties between different objects.
First, various suspicious activities are defined using a semantic approach. Object detection is then performed by background
subtraction. Detected objects are classified as live (human) or non-live (bag). These objects need to be tracked and this is done
using correlation techniques. Finally, motion features and temporal information are used to classify events as normal or
suspicious. A semantics-based approach is used, resulting in low computational complexity and high efficiency of the approach.
Keywords: Video Surveillance; Suspicious Activities; Motion Features; Semantic Approach; Object Detection
I. INTRODUCTION
In recent years, there has been an increase in violence and crime rates around the world. Various tools are used to minimize or
control the situation. Video surveillance is the best option available for both private and public places. Video surveillance can be
effective in efficiently detecting anomalous/suspicious activity. Most of today's surveillance systems are operated by humans.
Therefore, human attention is always required to detect anomalous activity. Due to human involvement, the efficiency of the system
decreases over time due to the human fatigue factor. This problem can be solved by automating video surveillance. The function of
the automated system is to issue an alarm or other form of indication when a predefined abnormal activity occurs.
II. METHODOLOGY
A. System Model
The shows the flow of the system for the detection of suspicious activity. The different block is explained as follows-
1) Input Data: The input for the system is video stream. As the system is to be implemented to detect the suspicious activity its
input is to be taken from the CCTV. Background image acquisition- The illumination effect can be corrected by the background
image. A reference image/ standard background is taken as reference for the further image processing.
2) Image Preprocessing: The different image preprocessing techniques are used to improve the image so that the unwanted
distortions are get suppressed or some required features enhanced.
© IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
Fig 1. Workflow
1) Object Tracking: Use correlation-based tracking methods to track detected objects in the scene. This method places a small
tracking window in the center of the object on the first frame. This object is considered a target. Its color histogram is calculated
for each object in the frame. So, a red, green and blue histogram is calculated for each object. Objects are identical if their color
histograms in the current frame and the previous frame match. Knowing the color histogram allows us to track a particular
object over multiple frames. Also, when new objects enter the frame, they are easily identifiable.
2) Object Features Extraction: Once the object is fixed to the tracked frame, we need to extract its features. Most of the work uses
shape-based functions, but they require large training data sets with many variations in both animate and inanimate shapes. This
work uses the motion function. Objects are classified into four different categories based on their motion characteristics. Here is
the state diagram for this classification:
3) Defining the Suspicious Activities: There are lots of activities which come under the suspicious activity. But for the project
work we have selected the following activities-
4) Abandoned Luggage: Researchers define abandoned bag as- stationary object that is not touched by a person for some time
duration.
5) Unauthorized Access: In the restricted area the entry for common people is not allowed. If somebody tries to access the place
without any authentication then it is harmful and it should be detected. Loitering- If the presence of a person in a particular
place exists for a period longer than the time required for a activity then it is called as loitering.
© IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
detection, especially in images. However, convolutional neural networks are supervised and require labels as training signals. We
propose a spatiotemporal architecture for suspicious detection in videos containing crowded scenes.
If there is a new user then he/she has to click on register button to get registered before using the system. They need to fill basic
information.
© IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 3
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
1) Once registered, users can access the Login page to sign in to the system.
2) The Login page prompts users to enter the username and password they provided during registration
3) This authentication process allows users to securely access the system’s features and resources.
After login we are directed to the main processing page where the processing of the provided video is done and the video is
processed to tell if the suspicious activity is detected or not.
Fig 7. Processing
In the last step an email is generated and sent to the linked device about the result of the processing.
© IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at www.ijraset.com
V. CONCLUSION
Human behaviour in the natural environment is complex and highly variable. In this paper, we formulate the suspicious behaviour
detection of the security system. The accuracy achieved is about 95%. We found that YOLOv3 outperforms Faster R-CNN in terms
of image recognition processing time. Current feature extraction methods provide accurate results only in controlled environments.
Better feature extraction methods can be incorporated to improve results. However, due to the small amount of training data, there
were still some discrepancies between test results and ground truth comparisons. Therefore, our future improvement work is to
extend the training data set with suspicious videos of different activities and resolutions to achieve better detection and make the
model more viable. You can also develop more sophisticated algorithms for real-time applications.
VI. ACKNOWLEDGMENT
I am grateful to Dr. M. S. Rohokale and Dr. Sarang Patil (Department of Computer Engineering at SKN Sinhgad Institute of
Technology & Science, Lonavala) for their valuable guidance, help, cooperation, and encouragement.
I would like to extend my gratitude to SKN Sinhgad Institute of Technology & Science, Lonavala College for providing me
with this opportunity to enhance my knowledge and skills in Machine Learning. I am also thankful to my parents and family
members for their unwavering support, both morally and economically.
This acknowledgement would be incomplete without expressing my heartfelt thanks to everyone who has contributed directly or
indirectly to this work. Any inadvertent omission is purely unintentional and does not reflect a lack of gratitude on my part.
REFERENCES
[1] S. Zaidi, B. Jagadeesh, K. V. Sudheesh and A. A. Audre, ”Video Anomaly Detection and Classification for Human Activity Recognition,” 2017 International
Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), Mysore, 2017, pp. 544-548.
[2] M. Saab and J. Gotman, “A system to detect the onset of epileptic seizures in scalp EEG,” Clinical Neurophysiology, vol. 116, no. 2, pp. 427–442,2005.
[3] Sandesh Patil and Kiran Talele “Suspicious Movement Detection and Tracking based on Color Histogram”, 2015 International Conference Communication,
Information & Computing Technology (ICCICT), Jan. 16-17.
© IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 5