Paper 4143
Paper 4143
Paper 4143
IJARSCT
International Journal of Advanced Research in Science, Communication and Technology (IJARSCT)
Abstract: We intend to develop a real-time programme for detecting suspicious behaviour of persons in
public settings. Our tool may be used to monitor areas where there is a risk of robbery or a gun assault,
such as malls, airports, and train stations. To train our system, we will use deep learning and neural
networks. This model will then be implemented as a mobile and desktop app, taking real-time CCTV footage
as input and sending an alarm to the administrator's smartphone if a suspicious stance is detected. Human
suspicious behaviour is associated with the identification of human bodily parts and perhaps tracking their
travels. Its real-world applications range from gaming to AR/VR, healthcare, and gesture detection. In
comparison to the image data domain, there has been very limited research into using CNNs to video
categorization. This is due to the fact that videos are more complicated than photos since they have another
dimension - temporal. Unsupervised learning, which takes use of temporal connections between frames, has
proven effective for video analysis. Some techniques to suspicious behaviour employ CPU rather than GPU,
allowing suspicious activity to execute on low-cost hardware such as embedded systems and mobile phones.
Keywords: Suspicious behaviour, Machine Learning, CNN, Random Forest (RF) and KNN, CCTV.
I. INTRODUCTION
Human suspicious activity is one of the key problems in computer vision that has been studied for more than 15 years. It is
important because of the sheer number of applications which can benefit from suspicious activity. For example, human
suspicious activity is used in applications including video surveillance, animal tracking and behavior understanding, sign
language detection, advanced human-computer interaction, and marker less motion capturing. Low-cost depth sensors
have limitations like limited to indoor use, and their low resolution and noisy depth information make it difficult to
estimate human poses from depth images. Hence, we plan to use neural networks to overcome these problems. Suspicious
human activity recognition from surveillance video is an active research area of image processing and computer vision.
Through the visual surveillance, human activities can be monitored in sensitive and public areas such as bus stations,
railway stations, airports, banks, shopping malls, school and colleges, parking lots, roads, etc. to prevent terrorism, theft,
accidents and illegal parking, vandalism, fighting, chain snatching, crime and other suspicious activities. It is very difficult
to watch public places continuously, therefore an intelligent video surveillance is required that can monitor the human
activities in real-time and categorize them as usual and unusual activities; and can generate an alert. Mostly, of the
research being carried out is on images and not videos. Also, none of the papers published tries to use CNNs to detect
suspicious activities.
V. CONCLUSION
A system that processes real-time CCTV data to detect any suspicious behaviour would assist to improve security and
reduce the need for human involvement. Great advancements have been achieved in the realm of human suspicious
activity, allowing us to better serve the numerous applications that it is capable of using CNN. Furthermore, research in
adjacent domains such as Activity Tracking can significantly improve its productive application in a variety of fields.
REFERENCES
[1] Sabokrou, Mohammad & Fathy, Mahmood & Mojtaba, H. & Klette, Reinhard,“Real-Time Anomaly Detection and
Localization in Crowded Scenes”.Conference: Computer Vision and Pattern Recognition (CVPR)At: Boston,
MassachusettsVolume: GROW Workshop (2015).
[2] Mahmudul Hasan, Jonghyun Choi, Jan Neumann, Amit K. Roy-Chowdhury, Larry S. Davis, “Learning Temporal
Regularity in Video Sequences”, https://doi.org/10.48550/arXiv.1604.04574
[3] Jefferson Ryan Medel, Andreas Savakis, “Anomaly Detection in Video Using Predictive Convolutional Long Short-
Term Memory Networks”, https://doi.org/10.48550/arXiv.1612.00390
[4] Yong Shean Chong, Yong Haur Tay, “Abnormal Event Detection in Videos using Spatiotemporal Autoencoder”,
https://doi.org/10.48550/arXiv.1701.01546