Skip to main content

An Immunological Approach to Raising Alarms in Video Surveillance

  • Conference paper
  • 1177 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3333))

Abstract

Inspired by the human immune system, and in particular the negative selection algorithm, we propose a learning mechanism that enables the detection of abnormal activities. Three types of detectors for detecting abnormal activity are developed using negative selection. Tracks gathered by people’s movements in a room are used for experimentation and results have shown that the classifier is able to discriminate abnormal from normal activities in terms of both trajectory and time spent at a location.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Makris, D., Ellis, T.: Path detection in video surveillance. Image and Vision Computing 20, 895–903 (2002)

    Article  Google Scholar 

  2. Stauffer, C., Grimson, W.E.L.: Learning patterns of activity using real-time tracking. IEEE Transactions on Pattern Analysis and Machine Intelligence 22, 747–757 (2000)

    Article  Google Scholar 

  3. Johnsom, N., Hogg, D.: Learning the distribution of object trajectories for event recognition. Image and Vision Computing 14, 609–615 (1996)

    Article  Google Scholar 

  4. Janeway, A.C., Travers, P.: Immunobiology: The Immune system in Health and Disease, 2nd edn. Garland Publishing, Inc., New York (1996)

    Google Scholar 

  5. Hofmeyr, S.A.: An interpretative introduction to the immune system. In: Cohen, I., Segel, L. (eds.) Design Principles for the Immune System and other Distributed Autonomous Systems. Oxford University Press, Oxford (2000)

    Google Scholar 

  6. Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: A change-detection algorithm inspired by the immune system (1995), http://citeseer.nj.nec.com/51699.html

  7. de Castro, L.N., Von Zuben, F.J.: Artificial immune systems: Part I: Basic theory and applications. Technical Report 01/99, DCA (1999)

    Google Scholar 

  8. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 7, 45–68 (2000)

    Google Scholar 

  9. Puglisi, S.: An immunological approach to network intrusion detection, Honours Thesis, Department of Computer Science, Curtin University of Technology (2002)

    Google Scholar 

  10. Kalman, R.: A new approach to linear filtering and prediction problems. Transaction of the ASME – Journal of Basic Engineering, 33–45 (1960)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sasmita, L., Liu, W., Venkatesh, S. (2004). An Immunological Approach to Raising Alarms in Video Surveillance. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds) Advances in Multimedia Information Processing - PCM 2004. PCM 2004. Lecture Notes in Computer Science, vol 3333. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30543-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30543-9_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23985-7

  • Online ISBN: 978-3-540-30543-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics