Classification of Abandoned and Unattended Objects, Identification of Their Owner with Threat Assessment for Visual Surveillance

  • Harsh Agarwal
  • Gursimar SinghEmail author
  • Mohammed Arshad Siddiqui
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1022)


Terrorism is on an ever-increasing rise and is one of the major threats the world is facing today. Terrorist attacks mostly take place in crowded areas such as railway stations and airports. They involve the use of explosives which are placed inside suspicious abandoned objects like bags, suitcases, etc. In this paper, we are proposing a model that can classify abandoned and unattended objects separately and backtrack to identify the owner as well as find the last known location of the owner in a social environment using visual surveillance feed in real time for rapid alert and action.


Video surveillance Human detection and tracking Background modeling Foreground analysis Scene perception 



We thank Mr. Anuj Khare, Mr. Chinmay Swaroop Saini, and Mr. Harshit Choubey (Undergraduate Students at IIITDM Jabalpur) for helping us in creating our own dataset. The videos in the dataset were shot at IIITDM Jabalpur campus not violating any ethical obligation and feature the above mentioned volunteers and authors with their consent.


  1. 1.
  2. 2.
    Video Surveillance Market by System, Offering, Vertical, and Geography—Global Forecast to 2023.
  3. 3.
    Zivkovic, Z., Van Der Heijden, F.: Efficient adaptive density estimation per image pixel for the task of background subtraction. Pattern Recogn. Lett. 27(7), 773–780 (2006)CrossRefGoogle Scholar
  4. 4.
    Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C.Y., Berg, A.C.: SSD: single shot multibox detector. In: European Conference on Computer Vision, pp. 21–37. Springer, Cham (2016)Google Scholar
  5. 5.
    Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: IEEE Computer Society Conference on Proceedings of CVPR 2005, vol. 1, pp. 886–893. IEEE (2005)Google Scholar
  6. 6.
    Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91–110 (2004)CrossRefGoogle Scholar
  7. 7.
    Muja, M., Lowe, D.G.: Fast approximate nearest neighbors with automatic algorithm configuration. In: VISAPP (1), vol. 2(331–340), p. 2 (2009)Google Scholar
  8. 8.
    Bishop, G., Welch, G.: An introduction to the Kalman filter. In: Proceedings of SIGGRAPH, Course, vol. 8(27599-3175), p. 59 (2001)Google Scholar
  9. 9.
    Baur, R., Efros, A., Hebert, M.: Statistics of 3d object locations in images (2008)Google Scholar
  10. 10.
    In: Ninth IEEE International Workshop on Performance Evaluation of Tracking and Surveillance 2006, PETS 2006 dataset.
  11. 11.
  12. 12.
    Pan, J., Fan, Q., Pankanti, S.: Robust abandoned object detection using region-level analysis. In: 2011 18th IEEE International Conference on Image Processing (ICIP), pp. 3597–3600. IEEE (2011)Google Scholar
  13. 13.
    Li, L., Luo, R., Ma, R., Huang, W., Leman, K.: Evaluation of an IVS system for abandoned object detection on PETS 2006 datasets. In: Proceedings of the IEEE Workshop PETS, pp. 91–98 (2006)Google Scholar
  14. 14.
    Tian, Y., Feris, R.S., Liu, H., Hampapur, A., Sun, M.T.: Robust detection of abandoned and removed objects in complex surveillance videos. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 41(5), 565–576 (2011)Google Scholar
  15. 15.
    Porikli, F., Ivanov, Y., Haga, T.: Robust abandoned object detection using dual foregrounds. EURASIP J. Adv. Signal Process. 2008, 30 (2008)zbMATHGoogle Scholar
  16. 16.
    Liao, H.H., Chang, J.Y., Chen, L.G.: A localized approach to abandoned luggage detection with foreground-mask sampling. In: IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance, 2008, AVSS’08, pp. 132–139. IEEE (2008)Google Scholar
  17. 17.
    Evangelio, R.H., Senst, T., Sikora, T.: Detection of static objects for the task of video surveillance. In: 2011 IEEE Workshop on Applications of Computer Vision (WACV), pp. 534–540. IEEE (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.PDPM Indian Institute of Information Technology Design & Manufacturing JabalpurJabalpurIndia

Personalised recommendations