Skip to main content

Designing a Deep Learning Model for Video Anomaly Detection-Based Surveillance

  • Conference paper
  • First Online:
ICT Analysis and Applications (ICT4SD 2023)

Abstract

Anomaly detection in surveillance videos is a crucial task for ensuring public safety and security. Traditional methods rely on rule-based or handcrafted feature-based approaches, which are often limited in their ability to detect complex and subtle anomalies. In recent years, deep learning models have shown promising results in detecting anomalies in video data. In this paper, we propose a deep learning model for video anomaly detection in surveillance videos. Our model utilizes a combination of convolutional neural networks (CNNs) and long short-term memory (LSTM) networks. The CNNs are used to extract spatial features from individual frames, while the LSTM networks are used to capture the temporal dependencies between frames. We propose to use a two-stage training process to train our model. In the first stage, we pretrain the CNNs on a large dataset of unlabeled images to learn generic features. In the second stage, we fine-tune the CNNs and train the LSTM networks on a smaller dataset of labeled surveillance videos. To evaluate our model, we will use the UCSD Pedestrian dataset, which contains video sequences of pedestrians walking in a busy street. We will compare our model's performance with proposed hybrid methods and demonstrate its ability to detect various anomalies, such as sudden changes in the number of pedestrians or the presence of unusually detected various anomalies in the scene. Our proposed model shows great potential for detecting anomalies in surveillance videos, which can greatly improve public safety and security in various settings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ren S, He K, Girshick R, Sun J (2015) Faster R-CNN: Towards realtime object detection with region proposal networks. Adv Neural Inf Process Syst 28:91–99

    Google Scholar 

  2. Wong SC, Stamatescu V, Gatt A, Kearney D, Lee I, McDonnell MD (2017) Track everything: Limiting prior knowledge in online multi-object recognition. IEEE Trans Image Process 26(10):4669–4683

    Article  MathSciNet  Google Scholar 

  3. Cattani L, Alinovi D, Ferrari G, Raheli R, Pavlidis E, Spagnoli C, Pisani F (2017) Monitoring infants by automatic video processing: a unified approach to motion analysis. Comput Biol Med 80:158–165

    Article  Google Scholar 

  4. Gupta U, Sharma S, Jyani U, Bhardwaj A, Sharma M (2022) Sign language detection for deaf and dumb students using deep learning: Dore Idioma. In: 2022 2nd International conference on innovative sustainable computational technologies (CISCT). IEEE, pp 1–5

    Google Scholar 

  5. Gupta U, Gupta D (2022) Bipolar fuzzy-based least squares twin bounded support vector machine. Fuzzy Sets Syst 449:120–161

    Article  MathSciNet  Google Scholar 

  6. Gahlot A, Gupta U (2016) Gaze-based authentication in cloud computing. Int J Comput Appl 1(1):14–20

    Google Scholar 

  7. Draper R (2018) They are watching you—and everything else on the planet. National Geog

    Google Scholar 

  8. Miller MT (2018) First responders at the crime scene. In: Crime scene investigation laboratory manual. Elsevier, pp 21–25

    Google Scholar 

  9. Sultani W, Chen C, Shah M (2018) Real-world anomaly detection in surveillance videos. In: 2018 IEEE/CVF conference on computer vision and pattern recognition

    Google Scholar 

  10. Chong YS (2017) Abnormal event detection in videos using spatiotemporal autoencoder

    Google Scholar 

  11. Hasan M, Choi J, Neumann J, Roy-Chowdhury AK (2016) Learning temporal regularity in video sequences

    Google Scholar 

  12. Bhagyalakshmi P, Indhumathi P, Lakshmi R (2019) Real time video surveillance for automated weapon detection, pp 465–470

    Google Scholar 

  13. Liu W, Luo W, Lian D, Gao S (2018) Future frame prediction for anomaly detection—a new baseline. In: Proceedings of IEEE computer society conference computer vision pattern recognition, pp 6536–6545

    Google Scholar 

  14. Adam A, Rivlin E, Shimshoni I, Reinitz D (2017) Robust real-time unusual event detection using multiple fixed-location monitors. IEEE Trans Pattern Anal Mach Intell 30(3):555–560

    Google Scholar 

  15. Lu J, Shi J, Jia J (2013) Abnormal event detection at 150 FPS in MATLAB. In: Proceedings of the IEEE international conference on computer vision, pp 2720–2727

    Google Scholar 

  16. Cheng M, Cai K, Li M (2020) RWF-2000: an open large scale video database for violence detection. In: Proceedings of international conference on pattern recognition, pp 4183–4190

    Google Scholar 

  17. Sultani W, Shah M, Chen C (2019) Real-world anomaly detection in surveillance videos

    Google Scholar 

  18. Bird N, Atev S, Caramelli N, Martin R, Masoud O, Papainkolopoulos N (2017) Real time, online detection of abandoned objects in public areas. In: Proceedings of IEEE international conference on robotics automation, vol 2006, no May, pp 3775–3780

    Google Scholar 

  19. Buda TS, Caglayan B, Assem H (2018) Deepad: a generic framework based on deep learning for time series anomaly detection. In: PacificAsia conference on knowledge discovery and data mining. Springer, pp 577–588

    Google Scholar 

  20. An J, Cho S (2015) Variational autoencoder based anomaly detection using reconstruction probability. Spec Lect IE 2(1):1–18

    Google Scholar 

  21. Gupta U, Meher P (2020) Statistical analysis of target tracking algorithms in thermal imagery. In: Cognitive informatics and soft computing: proceeding of CISC 2019. Springer Singapore, pp 635–646

    Google Scholar 

  22. Kumar S, Gupta S, Gupta U (2022) Discrete cosine transform features matching-based forgery mask detection for copy-move forged images. In 2022 2nd international conference on innovative sustainable computational technologies (CISCT). IEEE, pp 1–4

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jyoti Kukade .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kukade, J., Panse, P. (2023). Designing a Deep Learning Model for Video Anomaly Detection-Based Surveillance. In: Fong, S., Dey, N., Joshi, A. (eds) ICT Analysis and Applications. ICT4SD 2023. Lecture Notes in Networks and Systems, vol 782. Springer, Singapore. https://doi.org/10.1007/978-981-99-6568-7_23

Download citation

Publish with us

Policies and ethics