Learning context models for the recognition of scenarios

  • Sofia Zaidenberg
  • Oliver Brdiczka
  • Patrick Reignier
  • James Crowley
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 204)


This paper addresses the problem of automatic learning of scenarios. A ubiquitous computing environment must have the ability to perceive its occupants and their activities in order to recognize a context and to provide appropriate services. A context (a scenario) can be modeled as a temporal sequence of situations. Hard coding contexts by hand is a complex task. Our goal is to learn these context models based on a set of videos showing actors playing predefined scenarios. Once these models are learned, we can use them to classify new scenarios. Hidden Markov Models (HMMs) are particularly well suited for problems with a strong temporal structure; they are easily adaptable to variability of input and robust to noise. But two problems need to be addressed: how many HMMs do we need for all possible scenarios and how many states for each HMM. We propose in this paper an approach based on an incremental algorithm addressing these two problems. Under the best conditions we obtained the minimal error rate of 1.96% (2 errors in 102 validation entries).


Hide Markov Model Activity Recognition Context Model Incremental Algorithm Validation Sequence 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [1]
    R. Bodor, B. Jackson and N. Papanikolopoulos, “Vision-Based Human Tracking and Activity Recognition”, in ‘Proc. of the 11th Med. Conf. on Control and Automation’, 2003.Google Scholar
  2. [2]
    J.L. Crowley, J. Coutaz, G. Rey and P. Reigner, “Perceptual components for context awareness”, in ‘International conference on ubiquitous computing”, 2002.Google Scholar
  3. [3]
    Y.A. Ivanov and A.F. Bobick, “Recognition of Visual Activities and Interactions by Stochastic Parsing”, in ‘IEEE Trans. on Pattern Analysis and Machine Intelligence’, 2000.Google Scholar
  4. [4]
    P. Lichodzijewski, A. Zincir-Heywood and M. Heywood, “Dynamic Intrusion Detection Using Self Organizing Maps”, in ‘14th ACITSS’, 2002.Google Scholar
  5. [5]
    G. Ma and X. Lin, “Typical Sequences Extraction and Recognition”, in, Computer Vision in HCI: ECCV 2004 Workshop on HCI, Prague, Czech Republic, 2004.Google Scholar
  6. [6]
    D. Mahajan, N. Kwatra, S, Jain, P. Kalra and S. Banerjee, “A Framework for Activity Recognition and Detection of Unusual Activities”, in ‘ICCVGIP’, 2004.Google Scholar
  7. [7]
    I. McCowan, D. Gatica-Perez, S. Bengio, G. Lathoud, M. Barnard and D. Zhang, “Automatic Analysis of Multimodal Group Actions in Meetings”, in ‘IEEE Trans. PAMI’, 2005.Google Scholar
  8. [8]
    D. Minnen, I. Essa and T. Starner, “Expectation grammars; leveraging high-level expectations for activity recognition”, in ‘CVPR’, 2003.Google Scholar
  9. [9]
    D. Moore and I. Essa, “Recognizing multitasked activities using stochastic context-free grammar’, in ‘CVPR Workshop on Models vs Exemplars in Computer Vision’, 2001.Google Scholar
  10. [10]
    L.R. Rabiner, “A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition’, in A. Waibel & K.-F. Lee, ed., ‘Readings in Speech Recognition’, 1990.Google Scholar
  11. [11]
    G. Schwarz, “Estimating the dimension of a model”, in ‘Ann. Statist’, pp. 461–464, 1978.Google Scholar
  12. [12]
    Y. Shi, Y. Huang, D. Minnen, A.F. Bobick and LA, Essa, “Propagation Networks for Recognition of Partially Ordered Sequential Action”, in ‘CVPR (2)’, 2004.Google Scholar
  13. [13]
    N. Vaswani, A.R. Chowdhury and R. Chellappa, “Activity recognition using the dynamics of the configuration of interacting objects”, in ‘CVPR’, 2003.Google Scholar
  14. [14]
    D. Zhang, D. Gatica-Perez, S. Bengio, I. McCowan and G. Lathoud, “Multimodal Group Action Clustering in Meetings”, in ‘ACM 2nd Intern. Workshop on Video Surveillance and Sensor Networks in conj. with 12th ACM International Conference on Multimedia’, 2004.Google Scholar
  15. [15]
    H. Zhong, J. Shi and M. Visontai, “Detecting Unusual Activity in Video”, ‘CVPR’, 2004.Google Scholar
  16. [16]
    M. Zimmermann and H. Bunke, “Hidden Markov Model Length Optimization for Handwriting Recognition Systems”, in ‘IWFHR”, 2002.Google Scholar

Copyright information

© International Federation for Information Processing 2006

Authors and Affiliations

  • Sofia Zaidenberg
    • 1
  • Oliver Brdiczka
    • 1
  • Patrick Reignier
    • 1
  • James Crowley
    • 1
  1. 1.Laboratoire GRAVIRSaint-Ismier CedexFrance

Personalised recommendations