Skip to main content

Identification of Loitering Human Behaviour in Video Surveillance Environments

  • Conference paper
Artificial Computation in Biology and Medicine (IWINAC 2015)

Abstract

Loitering is a common behaviour of the elderly people. We goal is develop an artificial intelligence system that automatically detects loitering behaviour in video surveillance environments. The first step to identify this behaviour was used a Generalized Sequential Patterns that detects sequential micro-patterns in the input loitering video sequences. The test phase determines the appropriate percentage of inclusion of this set of micro-patterns in a new input sequence, namely those that are considered to form part of the profile, and then be identified as loitering. The system is dynamic; it obtains micro-patterns on a repetitive basis. During the execution time, the system takes into account the human operator and updates the performance values of loitering in shopping mall. The profile obtained is consistent with what has been documented by experts in this field and is sufficient to focus the attention of the human operator on the surveillance monitor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Srikant, R., Agrawal, R.: Mining sequential patterns: Generalizations and performance improvements. In: Apers, P.M.G., Bouzeghoub, M., Gardarin, G. (eds.) EDBT 1996. LNCS, vol. 1057, pp. 3–17. Springer, Heidelberg (1996)

    Google Scholar 

  2. Park, K., Lin, Y., Metsis, V., Le, Z., Makedon, F.: Abnormal human behavioural pattern detection in assisted living environmets. In: 3rd International Conference on Pervasive Technologies Related to Assistive Environments (2010)

    Google Scholar 

  3. Robertson, N., Reid, I., Brady, M.: Automatic human behaviour recognition and explanation for CCTV video surveillance. Security Journal 21(3), 173–188 (2008)

    Article  Google Scholar 

  4. Quian, H., Ou, Y., Wu, X., Meng, X., Xu, Y.: Support vector machine behaviour-based driver identification system. Journal of Robotics, 173–188 (2008)

    Google Scholar 

  5. Leo, M., Spagnolo, P., D’Orazio, R., Mazzeo, P., Distante, A.: Real-Time smart surveillance using motion analysis. Expert Systems 25(5), 314–337 (2010)

    Article  Google Scholar 

  6. Cuchiara, R., Prati, A., Vezzani, R.: A multi-camera vision system for fall detection and alarm generation. Expert Systems 24(5), 334–345 (2007)

    Article  Google Scholar 

  7. Chikhaoui, B., Wang, S., Pigot, H.: A new Algorithm Based on Sequential Pattern for person identification in ubiquitous environments. In: Proceedings of the Fourth International Workshop on Knowledge Discovery from Sensor Data, pp. 20–28 (2010)

    Google Scholar 

  8. Fern, X., Komireddy, C., Burnnet, M.: Mining Interpretable Human Strategies: A Case Study. In: 7th IEEE International Conference on Data Mining, pp. 475–480 (2007)

    Google Scholar 

  9. Chun, L.: Definition, detection, and evaluation of meeting events in airport surveillance videos. In: TRECVID Workshop (2008)

    Google Scholar 

  10. Charkraborty, B., Bagdanov, A., González, J., Roca, X.: Human action recognition using an ensemble of body-part detectors. Expert Systems (2011), doi:10.1111/j.1468-0394.2011.00610.x

    Google Scholar 

  11. Levenshtein, V.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady 10(8) (1966)

    Google Scholar 

  12. Hernández-Vela, A., Bautista, M., Perez-Sala, X., Ponce-López, V., Escalera, S., Baró, X., Angulo, C.: Probability-based dynamic time warping and bag-of-visual-and-depth-words for human gesture recognition in rgb-d. Pattern Recognition Letters 50, 112–121 (2014)

    Article  Google Scholar 

  13. Iglesias, A.: Modelado Automático del Comportamiento de Agentes Inteligentes. PhD dissertation Universidad Carlos III Madrid, Spain (2010)

    Google Scholar 

  14. Pillai, J., Vyas, O.P.: Overview of itemset utility mining and its applications. International Journal of Computer Applications 5(11), 9–13 (2010)

    Article  Google Scholar 

  15. Manganaris, S., Christensen, M., Zerkle, D., Hermiz, K.: A data mining analysis of RTID alarms. Computer Networks 34(4), 571–577 (2000)

    Article  Google Scholar 

  16. CAVIAR-Project: CAVIAR Project (May 20, 2009), http://home-pages.inf.ed.ac.uk/rbf/CAVIAR

  17. Williem, A., Vamsi, M., Boles, K., Wageeh, W.: Detecting Uncommon Trajectories. In: Digital Image Computing: Techniques and Applications, pp. 398–404 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Héctor F. Gómez A. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Gómez A., H.F. et al. (2015). Identification of Loitering Human Behaviour in Video Surveillance Environments. In: Ferrández Vicente, J., Álvarez-Sánchez, J., de la Paz López, F., Toledo-Moreo, F., Adeli, H. (eds) Artificial Computation in Biology and Medicine. IWINAC 2015. Lecture Notes in Computer Science(), vol 9107. Springer, Cham. https://doi.org/10.1007/978-3-319-18914-7_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18914-7_54

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18913-0

  • Online ISBN: 978-3-319-18914-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics