Skip to main content

Anomaly Detection Model for Key Places Based on Improved YOLOv5

  • Conference paper
  • First Online:
  • 1037 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13339))

Abstract

In recent years, key places such as underground stations and train stations, which are crowded and highly mobile, have become key targets for abnormal behaviour such as violence by some extremists or violent elements. The public safety risks in key places cannot be ignored, and the need to detect abnormal behaviour in key places is urgent in order to protect the personal safety of the people in such key places. When abnormal people and abnormal events occur in key places, timely detection and early warning are required to prevent and protect the safety of the people in a timely manner. Therefore, a real-time anomaly detection system based on the improved YOLOv5 key place video is proposed for such key places with dense personnel, intricate and complex identities, low accuracy of anomalous behaviour detection and slow detection speed. The method improves the target recognition effect by improving the loss function and optimising the resolution. Test results show that under the same training conditions, the improved YOLOv5 network has a significantly higher correct rate of anomalous behaviour detection and a faster detection speed of anomalous behaviour compared with the original YOLOv5 network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classfication with deep convolutional neural networks. Advances in neural information processing systems, 25, 1097–1105 (2012)

    Google Scholar 

  2. Nair, V., Hinton, G.E.: Rectifified linear units improver-estricted boltzmann machines. International Conference on Machine Learning, pp. 807–814 (2010)

    Google Scholar 

  3. Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.R.: Improving neural networksby preventing coadaptation of feature detectors. arXiv preprint arXiv. (2012)

    Google Scholar 

  4. Ting-Ting, Z., Jian-Wu, Z., Chun-Sheng, G., et al.: A review of deep learning-based image target detection algorithms. Telecommun. Sci. 36(7), 92–106 (2020)

    Google Scholar 

  5. Ren, S.Q., He, K.M., Girshickr, R., et al.: Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1137–1149 (2017)

    Article  Google Scholar 

  6. Li, Z., Peng, C., Yu, G., et al.: Light-Head R-CNN: in Defense of Twostage Object Detector. [2017–11–22]. https://arxiv.org/pdf/1711.07264.pdf

  7. Cai, Z., Vasconcelos, N.: Cascade R-CNN: delving into high quality object detection. In: Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition. pp. 6154–6162. IEEE, Piscataway (2018)

    Google Scholar 

  8. Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Cheng-Yang, F., Berg, A.C.: SSD: Single Shot MultiBox Detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) Computer Vision – ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11–14, 2016, Proceedings, Part I, pp. 21–37. Springer International Publishing, Cham (2016). https://doi.org/10.1007/978-3-319-46448-0_2

    Chapter  Google Scholar 

  9. Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You onlylookonce: Unified, realtime object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp. 779–788 (2016)

    Google Scholar 

  10. Fu, C.Y., Liu, W., Ranga, A., et al.: Dssd: deconvolutional single shot detector [EB/OL]. [2017–01–23] . https://arxiv.org/pdf/1701.06659.pdf

  11. Lin, T.-Y., Doll´ar, P., Girshick, R.B., He, K., Hariharan, B., Belongie, S.J.: Feature Pyramid Networks for Object Detection. In: CVPR, vol. 1, no. 2, p. 4 (2017)

    Google Scholar 

  12. Wu, D., Lv, S., Jiang, M., et al.: Using channel pruning-based YOLO v4 deep learning algorithm for the real-time and accurate detection f apple flowers in natural environments. Comput. Electron. Agric. 178(5), 174–178 (2020)

    Google Scholar 

  13. Tan, S.L., Bei, X., Lu, G., Tan, X.: Real-time detection of personnel mask wear based on YOLOv5 network model. Laser Journal 42(02), 147–150 (2021)

    Google Scholar 

  14. Juan, Y., Shun, L.: A YOLOv5-based method for unauthorized building detection. Comput. Eng. Appl. 57(20), 236–244 (2021)

    Google Scholar 

  15. Gao, M.H., Yang, C.: A traffic target detection method based on improved convolutional neural network. Journal of Jilin University (Engineering Edition). 1–9 [2021–11–08]. https://doi.org/10.13229/j.cnki.jdxbgxb20210380

  16. Zheng, Z., Wang, P., Liu, W., et al.: Distance-IoU Loss: Faster and Better Learning for Bounding Box Regression. arXiv, 1911.08287 (2019)

    Google Scholar 

  17. Zhao, W., Qu, H.: Application of improved algorithm based on sphere OBB hybrid hierarchical bounding box in teaching. In: Journal of Physics: Conference Series, 1732(1), 012080 (2021)

    Google Scholar 

  18. Chen, Z., et al.: PIoU loss: towards accurate oriented object detection in complex environments. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12350, pp. 195–211. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58558-7_12

    Chapter  Google Scholar 

  19. Lin, T.Y., Dollar, P., Girshick, R., et al.: Feature pyramid networks for object detection. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE Computer Society (2017)

    Google Scholar 

  20. Zhang, W.-L., Nan, X.-Y.: A road vehicle tracking algorithm based on improved YOLOv5. Journal of Guangxi Normal University (Natural Science Edition):1–8 [2021–11–08]. https://doi.org/10.16088/j.issn.1001-6600.2021081303

  21. Lu, H., Zhang, Q.: A review of research on the application of deep convolutional neural networks in computer vision. Data Acquisition Process. 31(01), 1–17 (2016)

    Google Scholar 

  22. Kuznetsova, A., Maleva, T., Soloviev, V.: Detecting apples in orchards using YOLOv3 and YOLOv5 in general and close-up images. In: Han, M., Qin, S., Zhang, N. (eds.) Advances in Neural Networks – ISNN 2020: 17th International Symposium on Neural Networks, ISNN 2020, Cairo, Egypt, December 4–6, 2020, Proceedings, pp. 233–243. Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-64221-1_20

    Chapter  Google Scholar 

  23. Purkait, P., Zhao, C., Zach, C.: SPP-Net: Deep Absolute Pose Regression with Synthetic Views (2017)

    Google Scholar 

  24. He, K., Zhang, X., Ren, S., et al.: Deep residual learning for image recognition. In: Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); IEEE. pp. 770–8 (2016)

    Google Scholar 

  25. Malta, A., Mendes, M., Farinha, T.: Augmented reality maintenance assistant using YOLOv5. Appl. Sci. 11(11), 4758 (2021)

    Article  Google Scholar 

  26. Zhu, D., Xu, G., Zhou, J., et al.: Object detection in complex road scenarios: improved YOLOv4-tiny algorithm. In: 2021 2nd Information Communication Technologies Conference (ICTC) (2021)

    Google Scholar 

  27. Zbek, M.M., Syed, M., Ksz, L.: Subjective analysis of social distance monitoring using YOLO v3 architecture and crowd tracking system. Turk. J. Electr. Eng. Comput. Sci. 29(2), 1157–1170 (2021)

    Article  Google Scholar 

  28. Zhong, Z.F., Xia, Y.F., Zhou, D.P., Yan Y.T.: A lightweight target detection algorithm based on improved YOLOv4. Comput. Appl. 1–8 [2021–11–08]. http://kns.cnki.net/kcms/detail/51.1307.TP.20210929.1334.012.html

  29. Cheng, P., Zhang, Q., Tang, Z., Gui, W.: Research on mask wearing detection method based on YOLOv5 enhancement model. Comput. Eng. 1–12 [2021–11–08]. https://doi.org/10.19678/j.issn.1000-3428.0061502

  30. Qingping, L., Qilin, Z., Lei, X.: A remote sensing image target recognition method using improved YOLOv5 network. J. Air Force Early Warning Coll. 35(02), 117–120 (2021)

    Google Scholar 

  31. Redmon, J., Divvala, S., Girshick, R., et al.: You Only Look Once: Unified, Real-Time Object Detection. Computer Vision & Pattern Recognition. IEEE, 779–788 (2016)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the Open Research Fund of the Public Security Behavioral Science Laboratory, People’s Public Security University of China [Grants 2020SYS03], the Fundamental Research Funds for the Central Universities, People’s Public Security University of China (2021JKF215) and the Fund for the training of top innovative talents to support master’s degree program, People’s Public Security University of China (2021yjsky018).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuan Deyu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yuanxin, W., Deyu, Y., Meng, Y., Meng, D. (2022). Anomaly Detection Model for Key Places Based on Improved YOLOv5. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13339. Springer, Cham. https://doi.org/10.1007/978-3-031-06788-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06788-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06787-7

  • Online ISBN: 978-3-031-06788-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics