skip to main content
10.1145/3193025.3193026acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdspConference Proceedingsconference-collections
research-article

Abnormal trajectory detection for security infrastructure

Authors Info & Claims
Published:25 February 2018Publication History

ABSTRACT

In this work, an approach for the automatic analysis of people trajectories is presented, using a multi-camera and card reader system. Data is first extracted from surveillance cameras and card readers to create trajectories which are sequences of paths and activities. A distance model is proposed to compare sequences and calculate similarities. The popular unsupervised model One-Class Support Vector Machine (One-Class SVM) is used to train a detector. The proposed method classifies trajectories as normal or abnormal and can be used in two modes: off-line and real-time. Experiments are based on data simulation corresponding to an attack scenario proposed by a security expert. Results show that the proposed method successfully detects the abnormal sequences in the scenario with very low false alarm rate.

References

  1. W. Lao, J. Han, and P. H. De With, "Automatic video-based human motion analyzer for consumer surveillance system," IEEE Transactions on Consumer Electronics, vol. 55, no. 2, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Antonakaki, D. Kosmopoulos, and S. J. Perantonis, "Detecting abnormal human behaviour using multiple cameras," Signal Processing, vol. 89, no. 9, pp. 1723--1738, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Laxhammar and G. Falkman, "Online learning and sequential anomaly detection in trajectories," IEEE transactions on pattern analysis and machine intelligence, vol. 36, no. 6, pp. 1158--1173, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. C. Lee and R. Nevatia, "Hierarchical abnormal event detection by real time and semi-real time multi-tasking video surveillance system", Machine vision and applications, vol. 25, no. 1, pp. 133--143, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. T. Morris and M. M. Trivedi, "A survey of vision-based trajectory learning and analysis for surveillance," IEEE transactions on circuits and systems for video technology, vol. 18, no. 8, pp. 1114--1127, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Morris, B. T., & Trivedi, M. M. (2008, September). Learning and classification of trajectories in dynamic scenes: A general framework for live video analysis. In Advanced Video and Signal Based Surveillance, 2008. AVSS'08. IEEE Fifth International Conference on(pp. 154--161). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. Brandle, D. Bauer, and S. Seer, "Track-based finding of stopping pedestrians-a practical approach for analyzing a public infrastructure," in Intelligent Transportation Systems Conference, 2006. ITSC'06. IEEE. IEEE, 2006, pp. 115--120.Google ScholarGoogle Scholar
  8. B. Scholkopf, R. C. Williamson, A. J. Smola, J. Shawe-Taylor, J. C. Platt et al., "Support vector method for novelty detection." in NIPS, vol. 12, 1999, pp. 582--588. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Piciarelli, C. Micheloni, and G. L. Foresti, "Trajectory-based anomalous event detection," IEEE Transactions on Circuits and Systems for video Technology, vol. 18, no. 11, pp. 1544--1554, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Albrecht and M. Muller, "Dynamic time warping," Information Retreival for Music and Motion, pp. 70--83, 2009.Google ScholarGoogle Scholar
  11. L. M. Manevitz and M. Yousef, "One-class svms for document classification," Journal of Machine Learning Research, vol. 2, no. Dec, pp. 139--154, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C.-C. Chang and C.-J. Lin, "Libsvm: a library for support vector machines," ACM Transactions on Intelligent Systems and Technology (TIST), vol. 2, no. 3, p. 27, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Abnormal trajectory detection for security infrastructure

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICDSP '18: Proceedings of the 2nd International Conference on Digital Signal Processing
      February 2018
      198 pages
      ISBN:9781450364027
      DOI:10.1145/3193025

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 February 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader