Skip to main content

Suspicious Activity Detection Using Transfer Learning Based ResNet Tracking from Surveillance Videos

  • Conference paper
  • First Online:
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (SoCPaR 2020)

Abstract

Tracking objects in video surveillance is a challenging task for public security. The advent of the semantic approach has greatly raised the growth of anomaly detection. However, the current anomaly detection methods typically experience problems like inadequate use of movement patterns and inconsistency on various datasets. This research proposed a system to enhance the efficiency of anomaly detection in video surveillance. The proposed system consists of two parts that involves object tracking and suspicious activity detection. The overall framework detects and tracks the abnormal objects in video surveillance. The transfer learning-based ResNet tracking has been used for object tracking. Distance Metric Learning (DML) method has been used for detecting suspicious activities in video surveillance. The results are estimated to analyze the efficiency of the proposed method. The proposed network classifier is compared with the existing ResNet and VGG-16 network. The proposed method provides 99% accuracy that had high performance compared to other existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhou, J.T., Du, J., Zhu, H., Peng, X., Liu, Y., Goh, R.S.M.: Anomalynet: an anomaly detection network for video surveillance. IEEE Trans. Inf. Forensics Secur. 14, 2537–2550 (2019)

    Article  Google Scholar 

  2. Wang, T., Qiao, M., Deng, Y., Zhou, Y., Wang, H., Lyu, Q.: Abnormal event detection based on analysis of movement information of video sequence. Optik 152, 50–60 (2018)

    Article  Google Scholar 

  3. Wang, T., Qiao, M., Zhu, A., Niu, Y., Li, C., Snoussi, H.: Abnormal event detection via covariance matrix for optical flow based feature. Multimedia Tools Appl. 77, 17375–17395 (2018)

    Article  Google Scholar 

  4. Feng, Y., Yuan, Y., Lu, X.: Learning deep event models for crowd anomaly detection. Neurocomputing 219, 548–556 (2017)

    Article  Google Scholar 

  5. Li, A., Miao, Z., Cen, Y., Zhang, X.-P., Zhang, L., Chen, S.: Abnormal event detection in surveillance videos based on low-rank and compact coefficient dictionary learning. Pattern Recogn. 108, 107355 (2020)

    Article  Google Scholar 

  6. Slavic, G., Campo, D., Baydoun, M., Marin, P., Martin, D., Marcenaro, L.: Anomaly detection in video data based on probabilistic latent space models. arXiv preprint arXiv:2003, 07623 (2020)

  7. Yu, J., Yow, K.C., Jeon, M.: Joint representation learning of appearance and motion for abnormal event detection. Mach. Vis. Appl. 29, 1157–1170 (2018)

    Article  Google Scholar 

  8. Wang, T., Qiao, M., Zhu, A., Shan, G., Snoussi, H.: Abnormal event detection via the analysis of multi-frame optical flow information. Front. Comp. Sci. 14, 304–313 (2020)

    Article  Google Scholar 

  9. Al-Dhamari, A., Sudirman, R., Mahmood, N.H., Khamis, N.H., Yahya, A.: Online video-based abnormal detection using highly motion techniques and statistical measures. Telkomnika 17, 2039–2047 (2019)

    Article  Google Scholar 

  10. Revathi, A., Kumar, D.: An efficient system for anomaly detection using deep learning classifier. SIViP 11, 291–299 (2017)

    Article  Google Scholar 

  11. Fahn, C., Ling, J., Yeh, M., Huang, P., Wu, M.: Abnormal maritime activity detection in satellite image sequences using trajectory features. Int. J. Future Comput. Commun. 8(1), 29–33 (2019)

    Article  Google Scholar 

  12. Bouindour, S., Hittawe, M.M., Mahfouz, S., Snoussi, H.: Abnormal event detection using convolutional neural networks and 1-class SVM classifier. In: 8th International Conference on Imaging for Crime Detection and Prevention (ICDP 2017) (2017)

    Google Scholar 

  13. Athanesious, J.J., Chakkaravarthy, S.S., Vasuhi, S., Vaidehi, V.: Trajectory based abnormal event detection in video traffic surveillance using general potential data field with spectral clustering. Multimedia Tools Appl. 78, 19877–19903 (2019)

    Article  Google Scholar 

  14. Balasundaram, A., Chellappan, C.: An intelligent video analytics model for abnormal event detection in online surveillance video. J. Real Time Image Proc. 17, 915–930 (2018)

    Article  Google Scholar 

  15. Fang, Y., Zhou, D., Li, K., Liu, H.: Interface prostheses with classifier-feedback-based user training. IEEE Trans. Biomed. Eng. 64, 2575–2583 (2016)

    Google Scholar 

  16. Jönsson, H.: Motion event recognition using user feedback. Master’s theses in Mathematical Sciences (2018)

    Google Scholar 

  17. Wang, X., Xu, Y., Hu, H., Liu, M., Li, G.: Feedback-based metric learning for activity recognition. Expert Syst. Appl. 162, 112209 (2018)

    Article  Google Scholar 

  18. Manju, A., Valarmathie, P.: Video analytics for semantic substance extraction using OpenCV in python. J. Ambient Intell. Humaniz. Comput. 1–10 (2020)

    Google Scholar 

  19. Mathur, G., Bundele M.: Intelligent video surveillance techniques for suspicious activity detection critical review. In: International Conference on Recent Advances and Innovations in Engineering (ICRAIE), pp. 1–8 (2016)

    Google Scholar 

  20. Amrutha, C., Jyotsna, C., Amudha, J.: Deep learning approach for suspicious activity detection from surveillance video. In: 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), pp. 335–339 (2020)

    Google Scholar 

  21. Agrawal, M., Agrawal, S.: Suspicious event detection in real-time video surveillance system. In: Shukla R., Agrawal J., Sharma S., Chaudhari N., Shukla K. (eds) Social Networking and Computational Intelligence. LNNS, vol. 100, pp. 509–516. Springer, Singapore (2020)

    Google Scholar 

  22. Basha, A., Parthasarathy, P., Vivekanandan, S.: Detection of suspicious human activity based on CNN-DBNN algorithm for video surveillance applications. In: Innovations in Power and Advanced Computing Technologies (i-PACT), pp. 1–7 (2019)

    Google Scholar 

  23. Sheu, R.-K., Pardeshi, M., Chen, L.-C., Yuan, S.-M.: STAM-CCF: suspicious tracking across multiple camera based on correlation filters. Sensors 19, 3016 (2019)

    Article  Google Scholar 

  24. Sahoo, S.R., Dash R., Mahapatra, R.K., Sahu, B.: Unusual event detection in surveillance video using transfer learning. In: International Conference on Information Technology, pp. 319–324 (2019)

    Google Scholar 

  25. Dubey, S., Boragule, A., Jeon, M.: 3D ResNet with ranking loss function for abnormal activity detection in videos. In: International Conference on Control, Automation and Information Sciences (ICCAIS), pp. 1–6 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Shubhangi Kale or Raghunathan Shriram .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kale, S., Shriram, R. (2021). Suspicious Activity Detection Using Transfer Learning Based ResNet Tracking from Surveillance Videos. In: Abraham, A., et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_21

Download citation

Publish with us

Policies and ethics