0% found this document useful (0 votes)
37 views5 pages

ATB Deep Learning-Based Alert Generation For Detecting Suspicious Activity

Ok

Uploaded by

sagar patole
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views5 pages

ATB Deep Learning-Based Alert Generation For Detecting Suspicious Activity

Ok

Uploaded by

sagar patole
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

Deep Learning-Based Alert Generation for

Detecting Suspicious Activity


Prof. Amit Bhosale
Prof. Sagar Patole Prof. Ms.Sayali Alate
Computer Engineering Department
Computer Engineering Department Computer Engineering Department
PES’s Collegeof Engineering
PES’s Collegeof Engineering PES’s Collegeof Engineering
Phaltan, India
Phaltan, India Phaltan, India
[email protected]
[email protected] [email protected]
Abstract— In the today’s world, video surveillance is of indicative of suspicious behavior. By leveraging deep
utmost importance. The integration of Deep Learning has learning techniques, the proposed approach achieves high
significantly advanced surveillance technologies. Various accuracy in detecting various types of suspicious activities,
systems have been developed to differentiate between different
thereby enhancing security surveillance systems' efficacy.
suspicious behaviors observed in live footage. Human behavior,
being highly unpredictable, presents a challenge in
Tejashri Subhash Bora [3] proposed Network (CNN)
determining its nature as suspicious or normal. To tackle this models for video surveillance applications. The primary
challenge, Deep Learning is employed to detect suspicious or goal is to identify and alert shop owners about suspicious
normal activity within academic environments. When a activities observed in surveillance footage. The authors
suspicious activity is predicted, an alert message is sent to the emphasize the significance of automated surveillance
relevant authority. Monitoring typically involves analyzing systems in enhancing security measures and reducing
consecutive frames extracted from the video feed. manual efforts required for monitoring. By leveraging CNN
models, the proposed system can effectively analyze video
Keywords—CNN Algorithm, Suspicious activity, Video
data and detect various suspicious behaviors accurately. The
capture.
study underscores the potential of deep learning techniques
in improving the efficiency and effectiveness of video
I. INTRODUCTION surveillance systems for ensuring public safety.
Detecting human behaviour in real-world environments
has numerous applications, spanning from intelligent video
surveillance to analyzing shopping behaviors. Video IV. PROPOSED METHODOLOGY
surveillance is widely applicable across indoor and outdoor The proposed system aims to utilize video footage obtained
settings, serving as a crucial component of security from cameras for monitoring activities in places such as
measures. Security cameras have become ubiquitous for banks or bus stations. It will promptly send alert messages to
safety and security purposes, integrating seamlessly into nearby police stations whenever any suspicious events are
daily life. E-surveillance stands as a prominent agenda within
detected. In this project, we focus on determining whether a
the Digital India development program initiated by the
person's behavior is suspicious or not. Nowadays, CCTV
Indian government, with video surveillance remaining a
pivotal aspect of this initiative. The proposed model will be cameras are ubiquitously installed, capturing videos stored
transformed into a desktop application capable of analyzing on centralized servers. However, manually scanning these
CCTV footage as input and issuing alerts to administrators videos to detect suspicious activity demands significant
upon detecting suspicious poses. Identifying suspicious human effort and time. To address this challenge, we
human activity entails recognizing specific human body parts propose automating this process using Deep Learning
and potentially tracking their movements. Algorithms. Specifically, convolutional neural networks will
be employed to identify potential suspicious activities.
II. PROBLEM DEFINITION A. Algorithm
Detecting suspicious human activity from surveillance video CNN: Convolutional Neural Networks (CNNs) exploit
is a dynamic research field within image processing and spatial correlations inherent in input data. In CNNs, each
computer vision. Video surveillance enables the monitoring layer of the neural network connects certain input neurons,
of human activities in both sensitive and public locations. forming what is known as a local receptive field. This field
This project aims to utilize neural networks to identify concentrates on hidden neurons, enabling efficient
suspicious human activity from video datasets. processing of complex visual information. CNNs represent
specific network architecture within deep learning
III. LITERATURE REVIEW algorithms, primarily tailored for tasks like image
Om M. Rajpurkar [1] focuses on utilizing transfer learning recognition that entail the analysis of pixel data. While
techniques to detect suspicious activities in surveillance various neural network architectures exist in the realm of
footage. The primary objective is to alert shop owners deep learning, CNNs stand out as the preferred choice for
promptly upon detecting such activities. The authors object identification and recognition due to their capability
emphasize the significance of real-time surveillance for to effectively capture and process spatial relationships
enhancing security measures. By employing transfer within visual data.
learning, the model can leverage pre-trained neural networks CNN Algorithm Steps: -
to adapt and learn from new data efficiently. This approach
not only improves detection accuracy but also reduces
 Convolution layer.
computational resources required for training. The study  ReLU layer.
underscores the importance of timely alerts in preventing  Pooling layer.
potential security threats, thereby enhancing safety in  Fully connected layer.
commercial establishments. Amruta C. V [2] presents a deep
learning-based approach for detecting suspicious activities Convolution layer :The convolutional layer serves as the
in surveillance videos. The primary focus is on fundamental component of a CNN. Comprising a collection
distinguishing between suspicious and normal activities, of filters, also known as kernels, this layer's parameters are
with the system promptly alerting the relevant authorities adjustable and refined during the training process. Typically
upon detection of suspicious behavior. The authors highlight smaller in size compared to the input image, each filter
the effectiveness of deep learning algorithms in handling undergoes convolution with the image, generating an
complex visual data and capturing intricate patterns activation map as a result.
ReLU layer: As a result, employing ReLU helps mitigate such footage from students may pose challenges, support
the exponential surge in computational demands for from civic authorities could facilitate access to footage
operating the neural network. When the CNN expands, the documenting criminal incidents that have occurred in the
computational expense of incorporating additional ReLUs recent past. This collaboration would significantly contribute
escalates linearly. to refining and strengthening the efficacy of the model.
Pooling layer: Pooling layers serve to decrease the
dimensions of feature maps, thereby diminishing the number
VI. CONCLUSION
of parameters to be learned and the computational workload
within the network. These layers effectively summarize the This system enables the detection of suspicious human
features within specific regions of the feature map produced activities and can be expanded to analyze and interpret
by a convolutional layer. people's behavior in various locations. The outcome of this
system is the ability to identify whether any suspicious
Fully connected layer: A fully connected layer denotes a
activity is occurring. In today's society, the significance of
neural network where each neuron applies a linear
CCTV footage is widely recognized, albeit often utilized for
transformation to the input vector using a weight matrix.
investigative purposes post-incident. In contrast, the
Consequently, all potential connections from layer to layer
proposed model offers the advantage of proactively
exist, ensuring that every input within the input vector
preventing crimes. It operates by continuously monitoring
impacts every output within the output vector.
and analyzing real-time CCTV footage. Upon analysis, if any
potential untoward incident is detected, the system promptly
alerts the relevant authorities to take necessary action, thus
B. Image Processing
averting the potential crime. Hence, the proposed system
Image preprocessing involves the procedures undertaken to represents a machine-based approach to identify criminal
format images before they are utilized for model training. activities in surveillance videos, addressing the growing need
Such preparation is essential to ready picture data for model for enhanced security measures amidst the rising incidence
input. of daily crimes. The system's outcome lies in its ability to
C. Feature Extraction identify anomalous actions in real-time.
Feature extraction involves the process of isolating only REFERENCES
the essential features from an image and producing the
output by eliminating any noise or unnecessary
interruptions. [1] Om M. Rajpurkar, Siddesh S. Kamble, Jayram P.
Nandagiri, and Anant V. Nimkar, “ALERT
D. Image Classification GENERATION ON DETECTION OF SUSPICIOUS
ACTIVITY USING TRANSFER LEARNING”
Image classification is a fundamental task in computer vision
aiming to interpret an entire image in its entirety. The 2020@IEEE Department of Computer Engineering
objective is to categorize the image as either suspicious or Sardar Patel Institute of Technology Mumbai, India
not. IEEE – 49239
[2] Amrutha C.V, C. Jyotsna, Amudha J. “Deep
E. Dataset Collection Learning Approach for Suspicious Activity Detection
The dataset consists of video files in the MP4 format, from Surveillance Video”2020@IEEE Dept. of
categorized into suspicious and normal forms. The videos Computer Science & Engineering, Amrita School of
depict various scenarios such as fighting, fire incidents, Engineering,Bengaluru, Amrita Vishwa Vidyapeetham,
attacks, and more (ICIMIA 2020) IEEE Xplore Part Number: CFP20K58-
ART; ISBN: 978-1-7281-4167-1.
F. Training and Testing Model
Training and testing are techniques employed to evaluate the [3] Tejashri Subhash Bora, Monika Dhananjay Rokade.
accuracy of a model, collectively known as Train/Test. The “HUMAN SUSPICIOUS ACTIVITY DETECTION
training data comprises a subset of the original dataset SYSTEM USING CNN MODEL FOR VIDEO
utilized for training the model, while the testing data is SURVEILLANCE” 2021@ijariie
employed to assess the model's accuracy. PG Student, Department of Computer Engg., SPCOE,
Maharashtra, India Assistant Prof., Department of
Computer Engg., SPCOE, Maharashtra, India Vol-7
V. FUTURE SCOPE Issue-3 2021 IJARIIE- ISSN(O)-23954396.
Identifying suspicious activity in public spaces like bus [4] Nipunjita Bordoloi, Anjan Kumar Talukdar,
stations and banks is the primary focus of our application, Kandarpa Kumar Sarma, “Suspicious Activity Detection
designed for user-friendly access. Currently, our model is from Videos using YOLOv3” Dept. of Electronics and
tailored to detect only five specific suspicious activities. Communication Engineering Gauhati University,
However, there is room for enhancement by expanding its Guwahati, Assam, India 2020@IEEE. 17th India Council
scope to include a wider range of suspicious behaviors. This International
can be achieved by augmenting the dataset with additional [5] Rachana Gugale, Abhiruchi Shendkar, Arisha
images, particularly those extracted from CCTV footage Chamadia, Swati Patra, Deepali Ahir. “Human
capturing instances of suspicious activity. While obtaining Suspicious Activity Detection using Deep Learning”.
Student, Department of Computer Engineering, M. E. Video using Discriminative Deep Belief Netwok”,
S. College of Engineering, Pune, India. Assistant International Journal of Control Theory and
Professor, Department of Computer Engineering, M. Applications Volume 10, Number 29
E. S. College of Engineering. Volume: 07 Issue: 06 -2017.
June 2020@irj.
[6] J. R. Medel and A. Savakis, “Anomaly detection U.M.Kamthe,C.G.Patil “Suspicious Activity
in video using predictive convolutional long short-term Recognition in Video Surveillance System”, Fourth
memory networks,” arXiv preprint arXiv:1612.00390, International Conference on Computing Communication
2016. Control and Automation (ICCUBEA), 2018.
[7] Monika D.Rokade, Dr. Yogesh Kumar Sharma, [11] H. Zhong, J. Shi and M. Visontai, “Detecting
"Deep and Machine Learning Approaches for unusual activity in video”, In Proc. 2004 IEEE Comput
Anomaly-Based Intrusion Detection of Imbalanced Vis. Pattern Recog., Vol. 2,
Network Traffic", IOSR Journal of Engineering, 2019.
pp. 819-826, 2014.
[8] Yuke Li “A Deep Spatiotemporal Perspective for
Understanding Crowd Behavior”, IEEE Transactions
on multimedia, Vol. 20, NO. 12, December 2018. [13]B.Benjdira,T.Khursheed,A.Koubaa,A.Amma
randK.Ouni,”Car Detection using Unmanned Aerial
[9] G. Sreenu and M. A. Saleem Durai “Intelligent Vehicles: Comparison between Faster R- CNN and
video surveillance: a review through deep learning YOLOv3,” 2019 1st International Conference on
techniques for crowd analysis” , Journal Big Unmanned Vehicle Systems- Oman (UVS), Muscat,
Data ,2019. Oman, 2019, pp. 1-6.
[10] Elizabeth Scaria, Aby Abahai T and Elizabeth
Isaac, “Suspicious Activity Detection in Surveillance

You might also like