Anomalous Event Detection Methodologies for Surveillance Application

Author(s):  
T. J. Narendra Rao ◽  
G N Girish ◽  
Mohit P. Tahiliani ◽  
Jeny Rajan

Automatic visual surveillance systems serve as in-place threat detection devices being able to detect and recognize anomalous activities which otherwise would lead to potentially harmful situations, and alert the concerned authorities to take appropriate counter actions. However, development of an efficient visual surveillance system is quite challenging. Designing an unusual activity detection mechanism which is accurate and real-time is the primary challenge. Review of literature carried out led to the inference that there are some attributes which are essential for a successful unusual event detection mechanism for surveillance application. The desired approach must detect genuine anomalies in real-world scenarios with acceptable accuracy, should adapt to changing environments and, should require less computational time and memory. In this chapter, an attempt has been made to provide an insight into some of the prominent approaches employed by researchers to solve these issues with a hope that it will benefit researchers towards developing a better surveillance system.

Author(s):  
T. J. Narendra Rao ◽  
G N Girish ◽  
Mohit P. Tahiliani ◽  
Jeny Rajan

Automatic visual surveillance systems serve as in-place threat detection devices being able to detect and recognize anomalous activities which otherwise would lead to potentially harmful situations, and alert the concerned authorities to take appropriate counter actions. However, development of an efficient visual surveillance system is quite challenging. Designing an unusual activity detection mechanism which is accurate and real-time is the primary challenge. Review of literature carried out led to the inference that there are some attributes which are essential for a successful unusual event detection mechanism for surveillance application. The desired approach must detect genuine anomalies in real-world scenarios with acceptable accuracy, should adapt to changing environments and, should require less computational time and memory. In this chapter, an attempt has been made to provide an insight into some of the prominent approaches employed by researchers to solve these issues with a hope that it will benefit researchers towards developing a better surveillance system.


2018 ◽  
Vol 27 (02) ◽  
pp. 1830001 ◽  
Author(s):  
Nor Nadirah Abdul Aziz ◽  
Yasir Mohd Mustafah ◽  
Amelia Wong Azman ◽  
Amir Akramin Shafie ◽  
Muhammad Izad Yusoff ◽  
...  

Video surveillance is one of the most active research topics in the computer vision due to the increasing need for security. Although surveillance systems are getting cheaper, the cost of having human operators to monitor the video feed can be very expensive and inefficient. To overcome this problem, the automated visual surveillance system can be used to detect any suspicious activities that require immediate action. The framework of a video surveillance system encompasses a large scope in machine vision, they are background modelling, object detection, moving objects classification, tracking, motion analysis, and require fusion of information from the camera networks. This paper reviews recent techniques used by researchers for detection of moving object detection and tracking in order to solve many surveillance problems. The features and algorithms used for modelling the object appearance and tracking multiple objects in outdoor and indoor environment are also reviewed in this paper. This paper summarizes the recent works done by previous researchers in moving objects tracking for single camera view and multiple cameras views. Nevertheless, despite of the recent progress in surveillance technologies, there still are challenges that need to be solved before the system can come out with a reliable automated video surveillance.


2016 ◽  
Vol 2016 ◽  
pp. 1-7 ◽  
Author(s):  
Jaeseok Shim ◽  
Yujin Lim

In the WSN- (wireless sensor network-) based surveillance system to detect undesired intrusion, all detected objects are not intruders. In order to reduce false alarms, human detection mechanism needs to determine if the detected object is a human. For human detection, physical characteristics of human are usually used. In this paper, we use the physical height to differentiate an intruder from detected objects. Using the measured information from sensors, we estimate the height of the detected object. Based on the height, if the detected object is decided as an intruder, an alarm is given to a control center. The experimental results indicate that our mechanism correctly and fast estimates the height of the object without complex computation.


Author(s):  
Lavanya Sharma ◽  
Nirvikar Lohan

In recent years, everyday objects and locating of people become an active area in IoT-based visual surveillance system. Internet of things (IoT) is basically transferring data with numerous other things. In visual surveillance systems, conventional methods are very easily susceptible to the environmental changes (i.e., illumination changing, slow motion in the background due to waving tree leaves, rippling of water, and variation in lightening condition). This chapter describes the current challenging issues present in literature along with major application areas, resources and dataset, tools and advantages of IoT-based visual surveillance systems.


Author(s):  
DOMENICO BLOISI ◽  
LUCA IOCCHI

Visual surveillance in dynamic scenes is currently one of the most active research topics in computer vision, many existing applications are available. However, difficulties in realizing effective video surveillance systems that are robust to the many different conditions that arise in real environments, make the actual deployment of such systems very challenging. In this article, we present a real, unique and pioneer video surveillance system for boat traffic monitoring, ARGOS. The system runs continuously 24 hours a day, 7 days a week, day and night in the city of Venice (Italy) since 2007 and it is able to build a reliable background model of the water channel and to track the boats navigating the channel with good accuracy in real-time. A significant experimental evaluation, reported in this article, has been performed in order to assess the real performance of the system.


Author(s):  
Lei Zhou ◽  
Wei Qi Yan ◽  
Yun Shu ◽  
Jian Yu

A large amount of surveillance videos and images need sufficient storage. In this article, an architecture of cloud-based surveillance systems and its modules will be designed, the Cloud-based Visual Surveillance System (CVSS) will be implemented on a private cloud using a Virtual Machine (VM). The users are able to link their cameras to the CVSS system so that the goal of this design can be achieved. The authors' CVSS system is able to push notification messages of captured videos to receivers, and their users could receive a surveillance video along with its events. The CVSS system fully makes use of the merits of cloud computing, which make it more advanced as stated in the evaluation section of this article. The contributions of this article are to be implemented in the CVSS system with: (1) video stream input, (2) intelligent visual surveillance, (3) real-time video transcoding and storage, (4) message pushing and media streaming output.


2018 ◽  
Vol 10 (1) ◽  
pp. 79-91 ◽  
Author(s):  
Lei Zhou ◽  
Wei Qi Yan ◽  
Yun Shu ◽  
Jian Yu

A large amount of surveillance videos and images need sufficient storage. In this article, an architecture of cloud-based surveillance systems and its modules will be designed, the Cloud-based Visual Surveillance System (CVSS) will be implemented on a private cloud using a Virtual Machine (VM). The users are able to link their cameras to the CVSS system so that the goal of this design can be achieved. The authors' CVSS system is able to push notification messages of captured videos to receivers, and their users could receive a surveillance video along with its events. The CVSS system fully makes use of the merits of cloud computing, which make it more advanced as stated in the evaluation section of this article. The contributions of this article are to be implemented in the CVSS system with: (1) video stream input, (2) intelligent visual surveillance, (3) real-time video transcoding and storage, (4) message pushing and media streaming output.


Author(s):  
Tannistha Pal

Images captured in severe atmospheric catastrophe especially in fog critically degrade the quality of an image and thereby reduces the visibility of an image which in turn affects several computer vision applications like visual surveillance detection, intelligent vehicles, remote sensing, etc. Thus acquiring clear vision is the prime requirement of any image. In the last few years, many approaches have been made towards solving this problem. In this article, a comparative analysis has been made on different existing image defogging algorithms and then a technique has been proposed for image defogging based on dark channel prior strategy. Experimental results show that the proposed method shows efficient results by significantly improving the visual effects of images in foggy weather. Also computational time of the existing techniques are much higher which has been overcame in this paper by using the proposed method. Qualitative assessment evaluation is performed on both benchmark and real time data sets for determining theefficacy of the technique used. Finally, the whole work is concluded with its relative advantages and shortcomings.


Sign in / Sign up

Export Citation Format

Share Document