Skip to main content

Smart monitoring: employing person re-identification to uncover suspicious behavior

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

Person re-identification (Re-ID) includes matching people across multiple cameras plays an essential role in security, and surveillance, tracking people. People’s identification with multiple cameras presents significant challenges, particularly when behavior changes due to factors such as clothing variations, lighting conditions, and other people that affect multiple camera identification. A robust deep learning approach is proposed that aims to enhance the reliability of the re-identification model and novel technique for detecting suspicious activity using a combination of Euclidean Distance (ED) and Lookup Table(LUT). This model is trained on a publicly available VIPER dataset. We have also created our dataset to verify the validation through multiple cameras. The proposed model detects people by fine-tuning the YOLOv8 model, for trimming out objects along with individuals and afterward performing feature extraction and attribute evaluation. The feature extraction is performed in two steps: firstly, hand-crafted features used such as LOMO, which employs the HSV color space, and secondly, deep features retrieved from pre-trained neural networks models such as VGG16 and ResNet-50. The triplet loss and clustering methods are implemented to re-identify people and enable efficient interaction across multiple cameras or locations. The proposed Lookup Table (LUT) is developed through generated triplet loss features and a provided attribute matrix. It assists in the detection of suspicious activities based on information provided by identified individuals. In this research, a novel technique for activity detection is developed that combination of Euclidean Distance (ED) and Lookup Table(LUT) can accurately identify suspicious and non-suspicious actions. People have been detected using a re-identification model and used five camera configurations. The model achieves 90% accuracy in identifying suspicious and non-suspicious actions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ahmad, S., Scarpellini, G., Morerio, P., et al.: Event-driven re-id: A new benchmark and method towards privacy-preserving person re-identification. In: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, pp 459–468 (2022)

  2. Ahmed, W., Yousaf, M.: A deep autoencoder-based approach for suspicious action recognition in surveillance videos. Engineering 49(3), 3517–3532 (2024)

    MATH  Google Scholar 

  3. Almasawa, M.O., Elrefaei, L.A., Moria, K.: A survey on deep learning-based person re-identification systems. IEEE Access 7, 175228–175247 (2019)

    Article  MATH  Google Scholar 

  4. Cheema, Y., Cheema, M.N., Nazir, A., et al.: A novel approach for improving open scene text translation with modified gan. Vis. Comput. 1–13 (2024)

  5. Chen, D., et al .: Improving deep visual representation for person re-identification by global and local image-language association. In: Proceedings of the European conference on computer vision (ECCV), pp 54–70 (2018)

  6. Dwivedi, N., et al.: A novel approach for suspicious activity detection with deep learning. Multimed Tools Appl 82(21), 32397–32420 (2023)

    Article  MATH  Google Scholar 

  7. Eisenbach, M., Kolarow, A., Vorndran, A., et al.: Evaluation of multi feature fusion at score-level for appearance-based person re-identification. In: 2015 International Joint Conference on Neural Networks (IJCNN), IEEE, pp 1–8 (2015)

  8. Fayyaz, M., et al.: Person re-identification with features-based clustering and deep features. Neural Comput. Appl. 32(14), 10519–10540 (2020)

    Article  MATH  Google Scholar 

  9. Feng, Y., Wang, Y., Luo, J. Video-based person re-identification using gated convolutional recurrent neural networks. arXiv preprint arXiv:2003.09717. (2020)

  10. Gray, D., Tao, H.: Viewpoint invariant pedestrian recognition (viper) dataset v1.0. https://www.researchgate.net/publication/261596035_Viewpoint_Invariant_Pedestrian_Recognition_VIPeR_Dataset_v10. (2007)

  11. Kanwal, S., et al.: Person re-identification using adversarial haze attack and defense: a deep learning framework. Comput. Electric. Eng. 96, 107542 (2021)

    Article  MATH  Google Scholar 

  12. KhoKhar, F.A., Shah, J.H., Khan, M.A., et al.: A review on federated learning towards image processing. Comput. Electric. Eng. 99, 107818 (2022)

    Article  MATH  Google Scholar 

  13. Khokhar, F.A., et al.: Harnessing deep learning for faster water quality assessment: identifying bacterial contaminants in real time. Vis. Comput. (2024). https://doi.org/10.1007/s00371-024-03382-7

    Article  MATH  Google Scholar 

  14. Lavi, B., Ullah, I., Fatan, M., et al.: Survey on reliable deep learning-based person re-identification models: Are we there yet? arXiv preprint arXiv:2005.00355 (2020)

  15. Machaca, L., Huaman, J., Clua, E., et al.: Trade re-id–live person re-identification using tracking and anomaly detection. In: Computer Vision and Pattern Recognition (2022)

  16. Ming, Z., et al.: Deep learning-based person re-identification methods: A survey and outlook of recent works. Image and Vision Computing p 104394 (2022)

  17. Razalli, H., Alkawaz, M.H., Suhemi, A.S.: Smart iot surveillance multi-camera monitoring system. In: 2019 IEEE 7th Conference on Systems, pp. 167–171. Process and Control (ICSPC), IEEE (2019)

  18. Rezaee, K., et al.: A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance. Pers. Ubiquitous Comput. 28(1), 135–151 (2024)

    Article  MATH  Google Scholar 

  19. Selvi, E., et al.: Suspicious actions detection system using enhanced cnn and surveillance video. Electronics 11(24), 4210 (2022)

    Article  MATH  Google Scholar 

  20. Singh, N., et al.: A comprehensive survey on person re-identification approaches: various aspects. Multimed. Tools Appl. 81(11), 15747–15791 (2022)

    Article  MathSciNet  Google Scholar 

  21. Sinitca, A.M., Shalugin, E.D., Lyanova, A.I., et al. Scaledyolov4 based person re-identification system. In: 2022 Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), IEEE, pp 443–446 (2022)

  22. Song, C., Huang, Y., Ouyang, W., et al.: Mask-guided contrastive attention model for person re-identification. Conference on Computer Vision and Pattern Recognition (CVPR) pp 1179–1188 (2018)

  23. Wang, C.Y., Liao, H.Y.M., Wu, Y.H., et al.: Cspnet: A new backbone that can enhance learning capability of cnn. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp 390–391 (2020a)

  24. Wang, G.A., et al.: Cross-modality paired-images generation for rgb-infrared person re-identification. Comput. Vis. Pattern Recogn. 34(07), 12144–12151 (2020)

  25. Yin, J., Fan, Z., Chen, S., et al.: In-depth exploration of attribute information for person re-identification. Appl. Intell. 50(11), 3607–3622 (2020)

    Article  MATH  Google Scholar 

  26. Zhang, Z., Zhang, H., Liu, S., et al.: Part-guided graph convolution networks for person re-identification. Durrani 120, 108155 (2021)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fahad Ahmed Khokhar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rehman, R., Shah, J.H., Khokhar, F.A. et al. Smart monitoring: employing person re-identification to uncover suspicious behavior. SIViP 19, 9 (2025). https://doi.org/10.1007/s11760-024-03579-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11760-024-03579-2

Keywords