Abstract
This paper proposes a framework to aid video analysts in detecting suspicious activity within the tremendous amounts of video data that exists in today’s world of omnipresent surveillance video. Ideas and techniques for closing the semantic gap between low-level machine readable features of video data and high-level events seen by a human observer are discussed. An evaluation of the event classification and detection technique is presented and a future experiment to refine this technique is proposed. These experiments are used as a lead to a discussion on the most optimal machine learning algorithm to learn the event representation scheme proposed in this paper.
Similar content being viewed by others
References
Atluri V, Chun S (2004) An authorization model for geospatial data. IEEE Trans Dependable Sec Comput 1: 238–254
Bertino E et al (2000) An access control model for video database systems. In: Conference on Information and Knowledge Management, McLean, Virginia
Bertino E et al (2003) A hierarchical access control model for video database systems. ACM Trans Inf Sys 21:155–191
Chen T et al (2005) Computer vision workload analysis: case study of video surveillance systems. Intel Technol J 9(2):doi 10.1535/itj.0902
Natick MA (1992) MathWorks, Matlab Reference Guide
Rui Y, Anandan P (2000) Segmenting visual actions based on spatiotemporal motion patterns. In: IEEE Conference on Computer Vision and Pattern Recognition, June
Shi J, Malik J (1997) Normalized cuts and image segmentation. In: IEEE Conference on Computer Vision and Pattern Recognition. San Juan, Puerto Rico, June
Wang L, Khan L (2007) Automatic image annotation and retrieval using weighted feature selection. Multimed Tools Appl in press
Zelnik-Manor L, Irani M (2001) Event-based analysis of video. In: Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, December
Zhang H, Kankanhali A, Smoliar W (1993) Automatic partitioning of full-motion video. Multimedia Syst 1:10–28
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lavee, G., Khan, L. & Thuraisingham, B. A framework for a video analysis tool for suspicious event detection. Multimed Tools Appl 35, 109–123 (2007). https://doi.org/10.1007/s11042-007-0117-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-007-0117-8