SlideShare a Scribd company logo
1 of 1
Download to read offline
Anomaly Detection in Surveillance Videos
Aishwarya Phanse, Tariq Haque, Liya Zhang
Ø Video surveillance gains an increasing demand to improve
public safety, reduce crime rate, help catch criminals and
curb illegal activities.
Ø The goal of our project is to identify anomalies in
surveillance videos to enhance monitoring capabilities of law
enforcement agencies to improve public safety.
Ø Some recent researches include:
- Detection of 13 anomalous activities from 128 hours, 1900
long and untrimmed surveillance videos by Waqas Sultani et
al. using a deep Multiple Instance Learning ranking model
with Conv 3D and TCNN.
- Deploying AnomalyNet consisting of motion fusion block and
feature transfer block for anomaly detection using sparse
long short-term memory (SLSTM) by researchers Joey Tianyi
Zhou et al..
376 videos
The shape of the training data is
(376, 300, 128, 128, 1)
This indicates:
1. There are 376 videos.
2. Each video has 300 frames.
3. The dimension of each frame is
128x128 pixels.
4. Only 1 channel for each frame,
i.e., all videos are gray scale.
MODEL 4: Conv3D 3D CNN can capture both temporal and
spatial information and hence, are useful to build function to
model videos that have both temporal and spatial information.
In 3D convolution neural network, kernels are also 3
dimensional. Due to lack of memory the model may be
disadvantaged in learning a long sequence.
Layers (Type) Output Shape Number of
Parameters
ConvLSTM2D None, 300, 128,128,40 59,200
Batchnormalization None, 300, 128,128,40 160
ConvLSTM2D None, 300, 128,128,40 115,360
Batchnormalization None, 300, 128,128,40 160
ConvLSTM2D None, 300, 128,128,40 115,360
Batchnormalization None, 300, 128,128,40 160
Flatten None, 19660800 0
Dense None, 1 19,660,801
MODEL 1: CNN-LSTM combined CNN and LSTM layers where
Conv2D (Keras) layers learn features in frames of a video
followed by LSTM. To make sure that CNN is applied to each
image of a video and passed to LSTM as a single time step, CNN
layers are wrapped in a TimeDistributed Layer.
MODEL 2: ConvLSTM is a integration of CNN and LSTM where
instead of doing matrix multiplication, convolution operation is
conducted at each gate of a LSTM cell thereby, capturing the
underlying spatial features by convolution operations in
multiple-dimensional data.
MODEL 3: VGG-16 LSTM VGG-16 has 16 layers. We connected
the last layer of the VGG-16 network with LSTM, then a flatten
and output layer with sigmoid as activation function,
binary_crossentroy as loss function and adam as optimizer.
Ø We have achieved a significant progress in achieving a
maximum accuracy of 54.19 % in prediction of anomalous
videos.
Ø However, we believe that there is a significant need to
carry this research forward especially by changing model
architecture to improve prediction accuracy.
Ø In addition, of having used only 376 of the 1900 available
videos due to computational restrictions; we believe that
prediction can further improve if complete dataset is used.
DATA PROCESS
METHODOLOGY
RESULTS
CONCLUSION
Model Model Input Shape
Validation
Accuracy
CNN LSTM (376, 300, 128, 128, 1) 53.98%
ConvLSTM (376, 300, 128, 128, 1) 54.19%
VGG-16 LSTM (376, 300, 128, 128, 1) 53.98%
Conv3D (376, 300, 128, 128, 1) 53.98%
Ø We would also like to highlight that we
have sampled videos based on 300 frames
in the middle of video. While, this is a
regularly adopted method, other methods
for sampling should also be explored in
the pursuit of prediction accuracy.

More Related Content

Similar to Machine Learning

JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
ijma
 
Final PPT.pptx (1).pptx
Final PPT.pptx (1).pptxFinal PPT.pptx (1).pptx
Final PPT.pptx (1).pptx
gopikahari7
 

Similar to Machine Learning (20)

JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motion
 
video comparison
video comparison video comparison
video comparison
 
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionSecure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
 
Video Denoising using Transform Domain Method
Video Denoising using Transform Domain MethodVideo Denoising using Transform Domain Method
Video Denoising using Transform Domain Method
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
 
Final PPT.pptx (1).pptx
Final PPT.pptx (1).pptxFinal PPT.pptx (1).pptx
Final PPT.pptx (1).pptx
 
Future semantic segmentation with convolutional LSTM
Future semantic segmentation with convolutional LSTMFuture semantic segmentation with convolutional LSTM
Future semantic segmentation with convolutional LSTM
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
 
A Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption AlgorithmsA Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption Algorithms
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A VIDEO COMPRESSION TECHNIQUE UTILIZING SPATIO-TEMPORAL LOWER COEFFICIENTS
A VIDEO COMPRESSION TECHNIQUE UTILIZING SPATIO-TEMPORAL LOWER COEFFICIENTSA VIDEO COMPRESSION TECHNIQUE UTILIZING SPATIO-TEMPORAL LOWER COEFFICIENTS
A VIDEO COMPRESSION TECHNIQUE UTILIZING SPATIO-TEMPORAL LOWER COEFFICIENTS
 
Convolutional Neural Networks cnn pre.pptx
Convolutional Neural Networks cnn pre.pptxConvolutional Neural Networks cnn pre.pptx
Convolutional Neural Networks cnn pre.pptx
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
 
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
TARGET DETECTION AND CLASSIFICATION PERFORMANCE ENHANCEMENT USING SUPERRESOLU...
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
 
An overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importanceAn overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importance
 

Recently uploaded

一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理
cyebo
 
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
pyhepag
 
Fuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyFuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertainty
RafigAliyev2
 
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotecAbortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
pyhepag
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
pyhepag
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
DilipVasan
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理
pyhepag
 

Recently uploaded (20)

Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp online
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptx
 
basics of data science with application areas.pdf
basics of data science with application areas.pdfbasics of data science with application areas.pdf
basics of data science with application areas.pdf
 
2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理
 
Slip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp ClaimsSlip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp Claims
 
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
 
Fuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyFuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertainty
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
 
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotecAbortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
 
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
 
社内勉強会資料  Mamba - A new era or ephemeral
社内勉強会資料   Mamba - A new era or ephemeral社内勉強会資料   Mamba - A new era or ephemeral
社内勉強会資料  Mamba - A new era or ephemeral
 
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
 
How I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonHow I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prison
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
 
Machine Learning for Accident Severity Prediction
Machine Learning for Accident Severity PredictionMachine Learning for Accident Severity Prediction
Machine Learning for Accident Severity Prediction
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
 
Artificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfArtificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdf
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdf
 

Machine Learning

  • 1. Anomaly Detection in Surveillance Videos Aishwarya Phanse, Tariq Haque, Liya Zhang Ø Video surveillance gains an increasing demand to improve public safety, reduce crime rate, help catch criminals and curb illegal activities. Ø The goal of our project is to identify anomalies in surveillance videos to enhance monitoring capabilities of law enforcement agencies to improve public safety. Ø Some recent researches include: - Detection of 13 anomalous activities from 128 hours, 1900 long and untrimmed surveillance videos by Waqas Sultani et al. using a deep Multiple Instance Learning ranking model with Conv 3D and TCNN. - Deploying AnomalyNet consisting of motion fusion block and feature transfer block for anomaly detection using sparse long short-term memory (SLSTM) by researchers Joey Tianyi Zhou et al.. 376 videos The shape of the training data is (376, 300, 128, 128, 1) This indicates: 1. There are 376 videos. 2. Each video has 300 frames. 3. The dimension of each frame is 128x128 pixels. 4. Only 1 channel for each frame, i.e., all videos are gray scale. MODEL 4: Conv3D 3D CNN can capture both temporal and spatial information and hence, are useful to build function to model videos that have both temporal and spatial information. In 3D convolution neural network, kernels are also 3 dimensional. Due to lack of memory the model may be disadvantaged in learning a long sequence. Layers (Type) Output Shape Number of Parameters ConvLSTM2D None, 300, 128,128,40 59,200 Batchnormalization None, 300, 128,128,40 160 ConvLSTM2D None, 300, 128,128,40 115,360 Batchnormalization None, 300, 128,128,40 160 ConvLSTM2D None, 300, 128,128,40 115,360 Batchnormalization None, 300, 128,128,40 160 Flatten None, 19660800 0 Dense None, 1 19,660,801 MODEL 1: CNN-LSTM combined CNN and LSTM layers where Conv2D (Keras) layers learn features in frames of a video followed by LSTM. To make sure that CNN is applied to each image of a video and passed to LSTM as a single time step, CNN layers are wrapped in a TimeDistributed Layer. MODEL 2: ConvLSTM is a integration of CNN and LSTM where instead of doing matrix multiplication, convolution operation is conducted at each gate of a LSTM cell thereby, capturing the underlying spatial features by convolution operations in multiple-dimensional data. MODEL 3: VGG-16 LSTM VGG-16 has 16 layers. We connected the last layer of the VGG-16 network with LSTM, then a flatten and output layer with sigmoid as activation function, binary_crossentroy as loss function and adam as optimizer. Ø We have achieved a significant progress in achieving a maximum accuracy of 54.19 % in prediction of anomalous videos. Ø However, we believe that there is a significant need to carry this research forward especially by changing model architecture to improve prediction accuracy. Ø In addition, of having used only 376 of the 1900 available videos due to computational restrictions; we believe that prediction can further improve if complete dataset is used. DATA PROCESS METHODOLOGY RESULTS CONCLUSION Model Model Input Shape Validation Accuracy CNN LSTM (376, 300, 128, 128, 1) 53.98% ConvLSTM (376, 300, 128, 128, 1) 54.19% VGG-16 LSTM (376, 300, 128, 128, 1) 53.98% Conv3D (376, 300, 128, 128, 1) 53.98% Ø We would also like to highlight that we have sampled videos based on 300 frames in the middle of video. While, this is a regularly adopted method, other methods for sampling should also be explored in the pursuit of prediction accuracy.