Skip to main content

CCTV Image Sequence Generation and Modeling Method for Video Anomaly Detection Using Generative Adversarial Network

  • Conference paper
  • First Online:
Intelligent Data Engineering and Automated Learning – IDEAL 2018 (IDEAL 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11314))

Abstract

Video anomaly detection is one of the most attractive problem in various fields likes computer vision. In this paper, we propose a VAD classifier modeling method that learns in a supervised learning manner. The basic idea is to solve the problem of labeled data shortage through transfer learning. The key idea is to create an underlying model of transfer learning through the GAN of discriminator. We solved this problem by proposing a GAN model consisting of a generator that generates video sequences and a discriminator that follows LRCN structure. As a result of the experiment, The VAD classifier learned through GAN-based transfer learning obtained higher accuracy and recall than the pure LRCN classifier and other machine learning methods. Additionally, we demonstrated that the generator be able to stably generate the image similar to the actual data as the learning progressed. To the best of our knowledge, this paper is the first case to solve the VAD problem using the GAN model and the supervised learning manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fleck, S., Straßer, W.: Privacy sensitive surveillance for assisted living–a smart camera approach. In: Nakashima, H., Aghajan, H., Augusto, J.C. (eds.) Handbook of Ambient Intelligence and Smart Environments, pp. 985–1014. Springer, Boston (2010). https://doi.org/10.1007/978-0-387-93808-0_37

    Chapter  Google Scholar 

  2. Cong, Y., Yuan, J., Liu, J.: Sparse reconstruction cost for abnormal event detection. In: Computer Vision and Pattern Recognition, pp. 3449–3456 (2011)

    Google Scholar 

  3. Xu, D., Yan, Y., Ricci, E., Sebe, N.: Detecting anomalous events in videos by learning deep representations of appearance and motion. Comput. Vis. Image Underst. 156, 117–127 (2017)

    Article  Google Scholar 

  4. Tomé, A., Salgado, L.: Anomaly detection in crowded scenarios using local and global Gaussian mixture models. In: Blanc-Talon, J., Penne, R., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2017. LNCS, vol. 10617, pp. 363–374. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70353-4_31

    Chapter  Google Scholar 

  5. Popoola, O.P., Wang, K.: Video-based abnormal human behavior recognition—a review. IEEE Trans. Syst. Man Cybern. Part C 42(6), 865–878 (2012)

    Article  Google Scholar 

  6. Kiran, B.R., Thomas, D.M., Parakkal, R.: An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. arXiv:1801.03149 (2018)

    Article  Google Scholar 

  7. Li, T., Chang, H., Wang, M., Ni, B., Hong, R., Yan, S.: Crowded scene analysis: a survey. IEEE Trans. Circuits Syst. Video Technol. 25(3), 367–386 (2015)

    Article  Google Scholar 

  8. Donahue, J., et al.: Long-term recurrent convolutional networks for visual recognition and description. In: Computer Vision Pattern Recognition, pp. 2625–2634 (2015)

    Google Scholar 

  9. Ballas, N., Yao, L., Pal, C., Courville, A.: Delving deeper into convolutional networks for learning video representations. arXiv:1511.06432 (2015)

  10. Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. Computer Vision and Pattern Recognition, pp. 733–742 (2016)

    Google Scholar 

  11. Chong, Y.S., Tay, Y.H.: Abnormal event detection in videos using spatiotemporal autoencoder. In: Cong, F., Leung, A., Wei, Q. (eds.) ISNN 2017. LNCS, vol. 10262, pp. 189–196. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59081-3_23

    Chapter  Google Scholar 

  12. Srivastava, N., Mansimov, E., Salakhudinov, R.: Unsupervised learning of video representations using LSTMs. In: International Conference on Machine Learning, pp. 843–852 (2015)

    Google Scholar 

  13. Pan, S.J., Yang, Q.: A survey on transfer learning. Knowl. Data Eng. 22(10), 1345–1359 (2010)

    Article  Google Scholar 

  14. Goodfellow, I., et al.: Generative adversarial nets. In: Neural Information Processing Systems, pp. 2672–2680 (2014)

    Google Scholar 

  15. Mehran, R., Oyama, A., Shah, M.: Abnormal crowd behavior detection using social force model. In: Computer vision and pattern recognition, pp. 935–942 (2009)

    Google Scholar 

  16. Zhao, B., Fei-Fei, L., Xing, E.P.: Online detection of unusual events in videos via dynamic sparse coding. In: Computer Vision and Pattern Recognition, pp. 3313–3320 (2011)

    Google Scholar 

  17. Alahi, A., Goel, K., Ramanathan, V., Robicquet, A., Fei-Fei, L., Savarese, S.: Social LSTM: human trajectory prediction in crowded spaces. In: Computer Vision and Pattern Recognition, pp. 961–971 (2016)

    Google Scholar 

  18. Luo, W., Liu, W., Gao, S.: A revisit of sparse coding based anomaly detection in stacked RNN framework. In: ICCV, vol. 1, no. 2, pp. 3 (2017)

    Google Scholar 

  19. Medel, J.R., Savakis, A.: Anomaly detection in video using predictive convolutional long short-term memory networks. arXiv:1612.00390 (2016)

  20. Schlegl, T., Seeböck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Niethammer, M., Styner, M., Aylward, S., Zhu, H., Oguz, I., Yap, P.-T., Shen, D. (eds.) IPMI 2017. LNCS, vol. 10265, pp. 146–157. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59050-9_12

    Chapter  Google Scholar 

  21. Zenati, H., Foo, C.S., Lecouat, B., Manek, G., Chandrasekhar, V.R.: Efficient GAN-based anomaly detection. arXiv:1802.06222 (2018)

  22. Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434 (2015)

  23. Mahadevan, V., Li, W.-X., Bhalodia, V., Vasconcelos, N.: Anomaly detection in crowded scenes. In: Computer Vision and Pattern Recognition, pp. 1975–1981 (2010)

    Google Scholar 

  24. Catania, C.A., Bromberg, F., Garino, C.G.: An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection. Expert Syst. Appl. 39(2), 1822–1829 (2012)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by the ICT R&D program of MSIP/IITP. [2017-0-00306, Development of Multimodal Sensor-based Intelligent Systems for Outdoor Surveillance Robots].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sung-Bae Cho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shin, W., Cho, SB. (2018). CCTV Image Sequence Generation and Modeling Method for Video Anomaly Detection Using Generative Adversarial Network. In: Yin, H., Camacho, D., Novais, P., Tallón-Ballesteros, A. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2018. IDEAL 2018. Lecture Notes in Computer Science(), vol 11314. Springer, Cham. https://doi.org/10.1007/978-3-030-03493-1_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03493-1_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03492-4

  • Online ISBN: 978-3-030-03493-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics