期刊论文详细信息
Journal of Big Data
Deep anomaly detection through visual attention in surveillance videos
Nasaruddin Nasaruddin1  Afdhal Afdhal1  Kahlil Muchtar2  Alvin Prayuda Juniarta Dwiyantoro3 
[1] Department of Electrical and Computer Engineering, Syiah Kuala University, 23111, Aceh, CO, Indonesia;Telematics Research Center (TRC) Universitas Syiah Kuala, 23111, Aceh, CO, Indonesia;Department of Electrical and Computer Engineering, Syiah Kuala University, 23111, Aceh, CO, Indonesia;Telematics Research Center (TRC) Universitas Syiah Kuala, 23111, Aceh, CO, Indonesia;Nodeflux, 12730, Jakarta, CO, Indonesia;Nodeflux, 12730, Jakarta, CO, Indonesia;
关键词: Visual attention approach;    Convolutional neural network (CNN);    Integrated surveillance system;    Anomaly classification;   
DOI  :  10.1186/s40537-020-00365-y
来源: Springer
PDF
【 摘 要 】

This paper describes a method for learning anomaly behavior in the video by finding an attention region from spatiotemporal information, in contrast to the full-frame learning. In our proposed method, a robust background subtraction (BG) for extracting motion, indicating the location of attention regions is employed. The resulting regions are finally fed into a three-dimensional Convolutional Neural Network (3D CNN). Specifically, by taking advantage of C3D (Convolution 3-dimensional), to completely exploit spatiotemporal relation, a deep convolution network is developed to distinguish normal and anomalous events. Our system is trained and tested against a large-scale UCF-Crime anomaly dataset for validating its effectiveness. This dataset contains 1900 long and untrimmed real-world surveillance videos and splits into 950 anomaly events and 950 normal events, respectively. In total, there are approximately ~ 13 million frames are learned during the training and testing phase. As shown in the experiments section, in terms of accuracy, the proposed visual attention model can obtain 99.25 accuracies. From the industrial application point of view, the extraction of this attention region can assist the security officer on focusing on the corresponding anomaly region, instead of a wider, full-framed inspection.

【 授权许可】

CC BY   

【 预 览 】
附件列表
Files Size Format View
RO202104275341142ZK.pdf 2303KB PDF download
  文献评价指标  
  下载次数:6次 浏览次数:9次