SlideShare a Scribd company logo
1 of 6
Download to read offline
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1616
Intelligent Video Surveillance System using Deep Learning
Neha Kardile, Rutuja Deshmukh, Vaibhav Kalhapure, Project Guide: Prof. Devidas Jaybhay
Department of Computer Engineering, G.H.Raisoni College of Engineering, Chas, Ahmednagar.
-------------------------------------------------------------------***----------------------------------------------------------------------
Abstract- Abnormal activity detection plays a very
important role in surveillance applications. To capture the
abnormal activity of humans without the intervention of
the system i.e. automatically captures the video can be
implemented. Human fall detection, suddenly jumping
down which has an important application in the field of
safety and security. Proposed system use for detecting
roadside human activities or behavior by using the
Probabilistic Neural Network (PNN) method for classifying
activities or behavior between training dataset and testing
videos. The partitions between classes of normal activities
have also been learned using multi-PNNs. recognizing
human activity has become a trend in smart surveillance
that contains several challenges, such as performing
effective detection of huge video data streams, while
maintaining low computational complexity. Current
activity recognition techniques are using convolutional
neural network (CNN) model with computationally
complex classifiers, creating hurdles in obtaining quick
responses for abnormal activity, so this paper proposes a
framework for activity detection. First, we detect abnormal
activity with humans in the surveillance stream using an
effective CNN model. The detected individual is tracked
throughout the video stream via an ultra –fast object
tracker called ‘minimum output sum of squared error’
{MOSSE), Next, for each
Tracked individual, pyramidal convolutional features are
extracted from two consecutive frames using the efficient
LiteFlowNet CNN. Finally, a novel deep skip connection
gated recurrent unit is trained to learn different temporal
changes in the sequence of frames for activity recognition
and detection. We finish by the result indicate the
efficiency of the proposed technique.
Keywords: Recognition, Video cameras, surveillance
systems.
I. INTRODUCTION
During these recent years, applications of video
surveillance have attracted more and more researchers.
Consequently, various types of modeling, as well as several
techniques of analysis and detection of human activities,
are suggested. Particularly, many pieces of research are
involved in the recognition and detection of human
activities in general and especially abnormal activities. One
important application is the supervision of elderly and
disabled people at home in care centers, or hospitals.
Recognition of human activities is a recent field that is
interested to provide techniques and methods allowing the
detection and classification of human activities, and
extended now to recognize normal or abnormal activities.
The motivation behind the latter is to provide an
immediate intervention to preserve the lives of individuals
or to ensure them some services they are unable to do by
themselves. Being recent and interesting, this field has
attracted the attention of several researchers who try to
find solutions to the problems faced in studying such types
of activities. However, the proposals made for this until
now are those used for the recognition of normal human
activities with minor modifications. These proposals are
still very restricted because of the very limited number of
works and surveys in this field. Moreover, they are not
efficient and suffer from several limitations and technical
difficulties. To this end, we propose in this paper an
overview and an analysis of the existing works, to offer the
researchers a general view of what exists in this field and
to provide them with a tool being a help to them propose
new approaches. For this, the manuscript is organized as
follows. In the second section, we present a definition of
the abnormal activities, their various types, as well as some
examples of abnormal activities of a group or a single
person. We then discuss in the third section the
motivations that led to the advent of this research axis and
the development of techniques allowing the analysis and
recognition of human activities in general and abnormal
activities in particular. The fourth section is devoted to the
proposed approaches in the literature for the detection of
abnormal activities. In this section, we present for each
proposal, the purpose for which it is set up, its different
stages, and the means used for its validation. Subsequently,
we discuss some aspects affecting or influencing the
effectiveness and credibility of the classification of human
activities. The sixth section presents the three modes of
automatic learning (supervised, unsupervised, and semi-
supervised). Thereafter, we enumerate the encountered
limitations to be taken into consideration to improve the
systems of recognition and identification of abnormal
activities. Finally, we finish with a conclusion where we
summarize our study.
II. RELATED WORK
This paper is much work on abnormal behavior detection
took a supervised learning approach. Diverse contributions
have been made in the development of behavior
recognizers for smart building surveillance applications. In
automatic roaders, human surveillance, the vehicle or
human activities and behaviors are detected and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1617
recognized for monitoring and warning purposes, for
detecting human behavior.
Types of an anomaly to detect object or behavior some are
as follows:
1. Video-based abnormal human behavior recognition
Fig. 1 Example of difference from walking or jogging
This technique only focuses on updating anomalous human
activity detection. The hidden Markov Model (HMM) and
Dynamic Bayesian Network Model (DBNM) [1] are using to
detect suspicious behavior as shown in Fig. 1
2. Motion detection, tracking, and classification for
automated video surveillance
Fig. 2. Tracking of moving object
III. EXISTING SYSTEM
 In the existing system, the video surveillance
system is designed for human operators to
observe protected
 Space or to record video data for further detection.
 But watching surveillance video is a labor-
intensive need to be controlled.
 It is also a very tedious and time-consuming job
and human observers can easily lose attention.
IV. PROPOSED SYSTEM
Fig 3. The proposed activity recognition framework for
surveillance applications
V. ARCHITECTURE DIAGRAM
1. Capturing video
OpenCV is an open-source python library that contains
various functions for image and video operations. With
OpenCV, we can capture a video from the camera.
cv2.VideoCapture () method is defined to get a video
capture object for camera. Create an infinite loop and use
the read () method to read the frames using above created
object. Cv2.imshow () method is used to show the frames
in the video. Loop will break when the user clicks a specific
key.
2. Motion detection
In the proposed work, Motion detection is performed by
using OpenCV and Pandas library. Captured videos are
treated as a stack of pictures called frames. Different
frames are compared to the static frame which has no
movements. We compared two images by comparing the
intensity value of each pixel. Firstly, we convert a color
image into a grayscale image, then a gray-scale image is
converted to GuassianBlur so that change can be easily
found. After that difference between the static background
and the current frame is found out. If we found to change
between them is greater than 30 it will show white color.
Then contour of the moving object.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1618
3. Feature extraction
Feature extraction is the process of identifying the
important features of the data. It reduces an initial set of
raw data to more manageable groups for processing. So
here, we will start with reading colored images, using the
imread () method. Using the shape function, the shape of
the image is found out. Suppose the shape for the image is
375*500. So the number of features will be 187500. If you
want to change the shape of the image that is also can be
done by using reshape function from NumPy where we
specify the dimension of the image. For this scenario, the
image has a dimension (375, 500, and 3). This three
represent the RGB value as well as the number of channels.
Now we will use the previous method to create the
features. The total number of features will be for this case
375*500*3 = 562500. This colored image has a 3D matrix
of dimension (375*500 * 3) where 375 denotes the height,
500 stands for the width and 3 is the number of channels.
To get the average pixel values for the image, we will use a
for a loop. Now we will make a new matrix that will have
the same height and width but only 1 channel. To convert
the matrix into a 1D array we will use the Numpy library.
CT is found out.
4. Classifier
An important step for surveillance activity recognition is to
detect, localize, and track each individual throughout the
video stream. This task is not feasible with object detectors
that are trained on general categories of data. For this
purpose, we fine-tuned a lightweight CNN model for
human detection with new data and enabled it to work in a
changing surveillance environment. It is superior to state-
of-the-art methods, its effectiveness is verified from
experiment. This architecture makes our system able to
achieve LSTM-level accuracy while being more efficient
than the LSTM.
VI. SEQUENCE DIAGRAM
VII. SUPPORT VECTOR MACHINE (SVM)
 R-transform is used to extract periodic, scale &
translation invariant features.
 Different algorithms are used as a non-linear
technique to overcome the similarities among
different classes of activities.
 SVM (Support Vector Machine) Algorithm is used
for training & recognition of activities due to its
suitability for time dependent sequential data in
this research.
VIII.RESULTS
Fig: Input for Abnormal Activity Detection
 From here we’ll take the file as an input for
detection.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1619
Fig: Input file for detecting abnormal activity
 Here we can choose any video stream for
detection process.
We need to click on open to open the file.
Fig: Output of Abnormal Detection
Fig: Output shows as a normal activity
 After opening video, system will start processing
on that video to detect abnormal activity, it will
show result as an abnormal activity through that
video.
 Whenever abnormal activity happen, system will
detect that activity and label it as ‘abnormal’.
 If there is no abnormal activity detected then it
will label as ‘Normal’.
IX. APPLICATIONS
Traffic Monitoring
The system will provide an easy way to monitor the traffic
and give the appropriate result.
Parking Lots
The system will help in parking lots for security purposes
also, visible security cameras will help you detect thieves
from breaking into cars.
Security
This system will help in the security field on various
platforms like parking lots, home security.
Monitoring Operations
The system will make it easy to monitor the various
abnormal activities and suspicious events.
X. TABLE
Threat Vulnerabil
ity
Asset Impact Control
Recommendati
ons
System
Failure
Overheati
ng in
server
room.
Air
conditionin
g system is
old.
Serve
r.
All
service
will be
unavaila
ble for at
least 2-3
hours.
Setup new air
conditioner.
Malicious
Human
DDOS
Attack.
Firewall is
not
configured
properly.
Serve
r.
Resource
s will be
unavaila
ble or not
work
properly.
Monitor &
configure the
firewall.
Accidenta
l or
purposely
attack of
human.
CCTV
doesn’t
have
secured
shield or
cover.
CCTV
.
CCTV
will get
damaged.
Setup shield or
proper covering
the CCTV.
Accuracy. Low
performanc
e of
algorithm
or training
dataset.
Serve
r.
It will
show
result
with low
accuracy.
Monitor & reset
working of
functions.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1620
XI. CONCLUSION
The proposed system aims to open a new door in the field
of video surveillance and provide the result on the basis to
detect abnormal activities. It will help the user to monitor
any abnormal activities or suspicious events. It's been very
difficult to monitor abnormal activities in various fields
like security, crime prevention, traffic monitoring. It will
help the user by sending an alert message when an
abnormal condition is identified. The number of
parameters currently included is an attempt to cover all
the basic aspects of video surveillance and other
overlooked parameters which deserve recognition. This
work is interested in the recognition of abnormal human
activities by providing a brief analysis of the recent
research tasks in this field of video surveillance. We have
implemented the CNN to detect abnormal activities.
Finally, through this analysis of the recent research tasks
in this field of video surveillance and provide the result on
the basis to detect abnormal activities.
REFERENCES
[1] VRIGKAS, Michalis, NIKOU, Christopher’s, ET
KAKADIARIS, Iohannis A. A review of human activity
recognition methods. Frontiers in Robotics and AI, 2015,
vol. 2, p. 28.
[2] POPULAR, Oluwatoyin P. ET WANG, Kejun. Video-based
abnormal human behavior recognition—A review. IEEE
Transactions on Systems, Man, and Cybernetics, Part C
(Applications and Reviews), 2012, vol. 42, no 6, p. 865-878
[3] BENABBAS, Yassin, IHADDADENE, Nacim, ET DJERABA,
Chaabane. Motion pattern extraction and event detection
for automatic visual surveillance. EURASIP Journal on
Image and Video Processing, 2010, vol. 2011, no 1, p.
163682.
[4] HUNG, Ya-Xuan, CHIANG, Chih-Yen, HSU, and Steen J., et
al. Abnormality detection for improving elder's daily life
independence. In: International Conference on Smart
Homes and Health Telematics. Springer Berlin Heidelberg,
2010. p. 186-194.
[5]ADAM, Amit, RIVLIN, Ehud, SHIMSHONI, Ilan, et al.
Robust real-time unusual event detection using multiple
fixed-location monitors.
[6] SHIN, Jae Hyuk, LEE, Boreom, ET PARK, Kwang Suk.
Detection of abnormal living patterns for the elderly living
alone using support vector data description. IEEE
Transactions on Information Technology in Biomedicine,
2011, vol. 15, no 3, p. 438-448.
[7] PALANIAPPAN, Adithyan, BHARGAVI, R., ET VAIDEHI,
V. Abnormal human activity recognition using SVM based
approach. In: Recent Trends in Information Technology
(ICRTIT), 2012 International Conference on. IEEE, 2012. p.
97-102.
[8] A. Datta, M. Shah and N. Lobo, “Person-on-person
violence detection in video data”, Proceedings of the 16th
International Conference on Pattern Recognition, vol. 1, pp.
433-438, 2002.
[9] Paolo Rota, Nicola Conci, Nicu Sebe, and James M Rehg,
"Real-life violent social interaction detection",
International Conference on Image Processing, pp. 3456–
3460, 2002.
[10] M. Drulea, and S. Nedevschi, “Total Variation
Regularization of Local-Global Optical Flow”, IEEE Int. Con.
Intelligent Transportation Systems, pp. 318-323, 2011.
[11] E. ESEN, M. ARABACI, and M. SOYAL,”Fight Detection
in Surveillance Videos”, Int. Workshop on Content-Based
Multimedia Indexing, pp. 131-135, Jun 2013.
[12] CAVIAR Test Case Scenarios,
http://groups.inf.ed.ac.uk/vision/CAVIAR/CAVIARDATA1
Daniel Gutchess, M Trajkovics, Eric Cohen-Solal, Damian
Lyons, and Anil K Jain, “A background model initialization
algorithm for video surveillance,” in ComputerVision,
2001. ICCV 2001. Proceedings. EighthIEEE International
Conference on. IEEE, 2001, vol. 1, pp. 733–740.
[13] Varun Chandola, Arindam Banerjee, and Vipin Kumar,
"Anomaly detection: A survey," ACM computing surveys
(CSUR), vol. 41, no. 3, pp. 15, 2009.
[14] Yael Pritch, Alex Rav-Acha, and Shmuel Peleg,
"Nonchronological video synopsis and indexing," IEEE
transactions on pattern analysis and machine
intelligence,vol. 30, no. 11, pp. 1971–1984, 2008.
[15] Chris Stauffer and W Eric L Grimson, “Adaptive
background mixture models for real-time tracking,” in
Computer Vision and Pattern Recognition, 1999. IEEE
Computer Society Conference on. IEEE, 1999, vol. 2,
pp.246–252.
[16]Olivier Barnich and Marc Van Droogenbroeck, "Vibe: A
universal background subtraction algorithm for video
sequences," IEEE Transactions on Image processing, vol.
20, no. 6, pp. 1709–1724, 2011.
[17] Pierre-Luc St-Charles, Guillaume-Alexandre Bilodeau,
and Robert Bergevin, “Subsense: A universal change
detection method with local adaptive sensitivity,” IEEE
Transactions on Image Processing, vol. 24, no. 1, pp. 359–
373, 2015.
[18] Yi Wang, Pierre-Marc Jodoin, Fatih Porikli, Janusz
Konrad, Yannick Benezeth, and Prakash Ishwar, “Cdnet
2014: an expanded change detection benchmark dataset,”
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1621
in Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition Workshops, 2014, pp. 387–394.
[19] Timo Ojala, Matti Pietikainen, and Topi Maenpaa,
“Multiresolution gray-scale and rotation invariant texture
classification with local binary patterns,” IEEE
Transactions on pattern analysis and machine intelligence,
vol. 24, no. 7, pp. 971–987, 2002.
[20] Kaiming He, Georgia Gkioxari, Piotr Doll´ar, and Ross
Girshick, "Mask r-CNN," in Computer Vision (ICCV), 2017
IEEE International Conference on. IEEE, 2017, pp. 2980–
2988.
[21] Marc Braham and Marc Van Droogenbroeck, “Deep
background subtraction with scene-specific convolutional
neural networks,” in Systems, Signals and Image
Processing (IWSSIP), 2016 International Conference on.
IEEE, 2016, pp. 1–4.
[22] Jonathan Long, Evan Shelhamer, and Trevor Darrell,
“Fully convolutional networks for semantic segmentation,”
in Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, 2015, pp. 3431– 3440.
[23] Andrews Sobral, "Bgslibrary: An OpenCV c++
background subtraction library,” in IX Workshop de Visao
Computacional (WVC2013), 2013, vol. 7.
[24] Xavier Glorot and Yoshua Bengio, “Understanding the
difficulty of training deep feedforward neural networks,” in
Proceedings of the Thirteenth International Conference on
Artificial Intelligence and Statistics, 2010, pp. 249–256.
[25] Lucas P Cinelli, Lucas A Thomaz, Allan F da Silva,
Eduardo AB da Silva, and Sergio L Netto, “Foreground
segmentation for anomaly detection in surveillance videos
using deep residual networks,".
IEEE conference templates contain guidance text for
composing and formatting conference papers. Please
ensure that all template text is removed from your
conference paper prior to submission to the
conference. Failure to remove template text from your
paper may result in your paper not being published.

More Related Content

What's hot

imageprocessing-abstract
imageprocessing-abstractimageprocessing-abstract
imageprocessing-abstractJagadeesh Kumar
 
Concealed weapon detection using image processing
Concealed weapon detection using image processingConcealed weapon detection using image processing
Concealed weapon detection using image processingMOHAMMED MAHDI ADAM
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMAyush Dixit
 
IOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationIOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationNikhil Jadav
 
Eye ball cursor movement using opencv
Eye ball cursor movement using opencvEye ball cursor movement using opencv
Eye ball cursor movement using opencvVenkat Projects
 
Smart Mirror using Raspberry PI
Smart Mirror using Raspberry PISmart Mirror using Raspberry PI
Smart Mirror using Raspberry PIPrathmesh Gavankar
 
image compression using matlab project report
image compression  using matlab project reportimage compression  using matlab project report
image compression using matlab project reportkgaurav113
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract documentRohith Palakurthi
 
smart note taker
smart note takersmart note taker
smart note takerveena jl
 
Intelligent surveillance system
Intelligent surveillance system Intelligent surveillance system
Intelligent surveillance system Abin Titus John
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking systemArjun Singh
 
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Universitat Politècnica de Catalunya
 

What's hot (20)

imageprocessing-abstract
imageprocessing-abstractimageprocessing-abstract
imageprocessing-abstract
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
Smart mirror
Smart mirrorSmart mirror
Smart mirror
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
Concealed weapon detection using image processing
Concealed weapon detection using image processingConcealed weapon detection using image processing
Concealed weapon detection using image processing
 
Touchless Technology
Touchless TechnologyTouchless Technology
Touchless Technology
 
Eye gaze2
Eye gaze2Eye gaze2
Eye gaze2
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
 
Image segmentation
Image segmentation Image segmentation
Image segmentation
 
IOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationIOT: Home Automation using Android Application
IOT: Home Automation using Android Application
 
Eye ball cursor movement using opencv
Eye ball cursor movement using opencvEye ball cursor movement using opencv
Eye ball cursor movement using opencv
 
Smart Mirror using Raspberry PI
Smart Mirror using Raspberry PISmart Mirror using Raspberry PI
Smart Mirror using Raspberry PI
 
Eye mouse
Eye mouseEye mouse
Eye mouse
 
image compression using matlab project report
image compression  using matlab project reportimage compression  using matlab project report
image compression using matlab project report
 
Seminar report Of Touchless Touchscreen
Seminar report Of Touchless TouchscreenSeminar report Of Touchless Touchscreen
Seminar report Of Touchless Touchscreen
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract document
 
smart note taker
smart note takersmart note taker
smart note taker
 
Intelligent surveillance system
Intelligent surveillance system Intelligent surveillance system
Intelligent surveillance system
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
 

Similar to Deep Learning Video Surveillance

Human Activity Recognition
Human Activity RecognitionHuman Activity Recognition
Human Activity RecognitionIRJET Journal
 
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading  TrackAnalysis of Human Behavior Based On Centroid and Treading  Track
Analysis of Human Behavior Based On Centroid and Treading TrackIJMER
 
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human ActivitesIRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human ActivitesIRJET Journal
 
Development of Human Tracking in Video Surveillance System for Activity Anal...
Development of Human Tracking in Video Surveillance System  for Activity Anal...Development of Human Tracking in Video Surveillance System  for Activity Anal...
Development of Human Tracking in Video Surveillance System for Activity Anal...IOSR Journals
 
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET Journal
 
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET Journal
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
 
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET-  	  Full Body Motion Detection and Surveillance System ApplicationIRJET-  	  Full Body Motion Detection and Surveillance System Application
IRJET- Full Body Motion Detection and Surveillance System ApplicationIRJET Journal
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...IRJET Journal
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...IRJET Journal
 
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET-  	  Behavior Analysis from Videos using Motion based Feature ExtractionIRJET-  	  Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Behavior Analysis from Videos using Motion based Feature ExtractionIRJET Journal
 
Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...IAEME Publication
 
IRJET- Prediction of Anomalous Activities in a Video
IRJET-  	  Prediction of Anomalous Activities in a VideoIRJET-  	  Prediction of Anomalous Activities in a Video
IRJET- Prediction of Anomalous Activities in a VideoIRJET Journal
 
Background Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior DetectionBackground Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior DetectionIJERA Editor
 
IRJET - Direct Me-Nevigation for Blind People
IRJET -  	  Direct Me-Nevigation for Blind PeopleIRJET -  	  Direct Me-Nevigation for Blind People
IRJET - Direct Me-Nevigation for Blind PeopleIRJET Journal
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...IRJET Journal
 
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemIRJET Journal
 
A Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal FeaturesA Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal FeaturesCSCJournals
 
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...IRJET Journal
 
IRJET- Smart Mirror using Eye Gaze Tracking
IRJET- Smart Mirror using Eye Gaze TrackingIRJET- Smart Mirror using Eye Gaze Tracking
IRJET- Smart Mirror using Eye Gaze TrackingIRJET Journal
 

Similar to Deep Learning Video Surveillance (20)

Human Activity Recognition
Human Activity RecognitionHuman Activity Recognition
Human Activity Recognition
 
Analysis of Human Behavior Based On Centroid and Treading Track
Analysis of Human Behavior Based On Centroid and Treading  TrackAnalysis of Human Behavior Based On Centroid and Treading  Track
Analysis of Human Behavior Based On Centroid and Treading Track
 
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human ActivitesIRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
 
Development of Human Tracking in Video Surveillance System for Activity Anal...
Development of Human Tracking in Video Surveillance System  for Activity Anal...Development of Human Tracking in Video Surveillance System  for Activity Anal...
Development of Human Tracking in Video Surveillance System for Activity Anal...
 
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
 
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
 
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET-  	  Full Body Motion Detection and Surveillance System ApplicationIRJET-  	  Full Body Motion Detection and Surveillance System Application
IRJET- Full Body Motion Detection and Surveillance System Application
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...
 
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET-  	  Behavior Analysis from Videos using Motion based Feature ExtractionIRJET-  	  Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
 
Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...
 
IRJET- Prediction of Anomalous Activities in a Video
IRJET-  	  Prediction of Anomalous Activities in a VideoIRJET-  	  Prediction of Anomalous Activities in a Video
IRJET- Prediction of Anomalous Activities in a Video
 
Background Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior DetectionBackground Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior Detection
 
IRJET - Direct Me-Nevigation for Blind People
IRJET -  	  Direct Me-Nevigation for Blind PeopleIRJET -  	  Direct Me-Nevigation for Blind People
IRJET - Direct Me-Nevigation for Blind People
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
 
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
 
A Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal FeaturesA Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal Features
 
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
 
IRJET- Smart Mirror using Eye Gaze Tracking
IRJET- Smart Mirror using Eye Gaze TrackingIRJET- Smart Mirror using Eye Gaze Tracking
IRJET- Smart Mirror using Eye Gaze Tracking
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

Deep Learning Video Surveillance

  • 1. © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1616 Intelligent Video Surveillance System using Deep Learning Neha Kardile, Rutuja Deshmukh, Vaibhav Kalhapure, Project Guide: Prof. Devidas Jaybhay Department of Computer Engineering, G.H.Raisoni College of Engineering, Chas, Ahmednagar. -------------------------------------------------------------------***---------------------------------------------------------------------- Abstract- Abnormal activity detection plays a very important role in surveillance applications. To capture the abnormal activity of humans without the intervention of the system i.e. automatically captures the video can be implemented. Human fall detection, suddenly jumping down which has an important application in the field of safety and security. Proposed system use for detecting roadside human activities or behavior by using the Probabilistic Neural Network (PNN) method for classifying activities or behavior between training dataset and testing videos. The partitions between classes of normal activities have also been learned using multi-PNNs. recognizing human activity has become a trend in smart surveillance that contains several challenges, such as performing effective detection of huge video data streams, while maintaining low computational complexity. Current activity recognition techniques are using convolutional neural network (CNN) model with computationally complex classifiers, creating hurdles in obtaining quick responses for abnormal activity, so this paper proposes a framework for activity detection. First, we detect abnormal activity with humans in the surveillance stream using an effective CNN model. The detected individual is tracked throughout the video stream via an ultra –fast object tracker called ‘minimum output sum of squared error’ {MOSSE), Next, for each Tracked individual, pyramidal convolutional features are extracted from two consecutive frames using the efficient LiteFlowNet CNN. Finally, a novel deep skip connection gated recurrent unit is trained to learn different temporal changes in the sequence of frames for activity recognition and detection. We finish by the result indicate the efficiency of the proposed technique. Keywords: Recognition, Video cameras, surveillance systems. I. INTRODUCTION During these recent years, applications of video surveillance have attracted more and more researchers. Consequently, various types of modeling, as well as several techniques of analysis and detection of human activities, are suggested. Particularly, many pieces of research are involved in the recognition and detection of human activities in general and especially abnormal activities. One important application is the supervision of elderly and disabled people at home in care centers, or hospitals. Recognition of human activities is a recent field that is interested to provide techniques and methods allowing the detection and classification of human activities, and extended now to recognize normal or abnormal activities. The motivation behind the latter is to provide an immediate intervention to preserve the lives of individuals or to ensure them some services they are unable to do by themselves. Being recent and interesting, this field has attracted the attention of several researchers who try to find solutions to the problems faced in studying such types of activities. However, the proposals made for this until now are those used for the recognition of normal human activities with minor modifications. These proposals are still very restricted because of the very limited number of works and surveys in this field. Moreover, they are not efficient and suffer from several limitations and technical difficulties. To this end, we propose in this paper an overview and an analysis of the existing works, to offer the researchers a general view of what exists in this field and to provide them with a tool being a help to them propose new approaches. For this, the manuscript is organized as follows. In the second section, we present a definition of the abnormal activities, their various types, as well as some examples of abnormal activities of a group or a single person. We then discuss in the third section the motivations that led to the advent of this research axis and the development of techniques allowing the analysis and recognition of human activities in general and abnormal activities in particular. The fourth section is devoted to the proposed approaches in the literature for the detection of abnormal activities. In this section, we present for each proposal, the purpose for which it is set up, its different stages, and the means used for its validation. Subsequently, we discuss some aspects affecting or influencing the effectiveness and credibility of the classification of human activities. The sixth section presents the three modes of automatic learning (supervised, unsupervised, and semi- supervised). Thereafter, we enumerate the encountered limitations to be taken into consideration to improve the systems of recognition and identification of abnormal activities. Finally, we finish with a conclusion where we summarize our study. II. RELATED WORK This paper is much work on abnormal behavior detection took a supervised learning approach. Diverse contributions have been made in the development of behavior recognizers for smart building surveillance applications. In automatic roaders, human surveillance, the vehicle or human activities and behaviors are detected and International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1617 recognized for monitoring and warning purposes, for detecting human behavior. Types of an anomaly to detect object or behavior some are as follows: 1. Video-based abnormal human behavior recognition Fig. 1 Example of difference from walking or jogging This technique only focuses on updating anomalous human activity detection. The hidden Markov Model (HMM) and Dynamic Bayesian Network Model (DBNM) [1] are using to detect suspicious behavior as shown in Fig. 1 2. Motion detection, tracking, and classification for automated video surveillance Fig. 2. Tracking of moving object III. EXISTING SYSTEM  In the existing system, the video surveillance system is designed for human operators to observe protected  Space or to record video data for further detection.  But watching surveillance video is a labor- intensive need to be controlled.  It is also a very tedious and time-consuming job and human observers can easily lose attention. IV. PROPOSED SYSTEM Fig 3. The proposed activity recognition framework for surveillance applications V. ARCHITECTURE DIAGRAM 1. Capturing video OpenCV is an open-source python library that contains various functions for image and video operations. With OpenCV, we can capture a video from the camera. cv2.VideoCapture () method is defined to get a video capture object for camera. Create an infinite loop and use the read () method to read the frames using above created object. Cv2.imshow () method is used to show the frames in the video. Loop will break when the user clicks a specific key. 2. Motion detection In the proposed work, Motion detection is performed by using OpenCV and Pandas library. Captured videos are treated as a stack of pictures called frames. Different frames are compared to the static frame which has no movements. We compared two images by comparing the intensity value of each pixel. Firstly, we convert a color image into a grayscale image, then a gray-scale image is converted to GuassianBlur so that change can be easily found. After that difference between the static background and the current frame is found out. If we found to change between them is greater than 30 it will show white color. Then contour of the moving object.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1618 3. Feature extraction Feature extraction is the process of identifying the important features of the data. It reduces an initial set of raw data to more manageable groups for processing. So here, we will start with reading colored images, using the imread () method. Using the shape function, the shape of the image is found out. Suppose the shape for the image is 375*500. So the number of features will be 187500. If you want to change the shape of the image that is also can be done by using reshape function from NumPy where we specify the dimension of the image. For this scenario, the image has a dimension (375, 500, and 3). This three represent the RGB value as well as the number of channels. Now we will use the previous method to create the features. The total number of features will be for this case 375*500*3 = 562500. This colored image has a 3D matrix of dimension (375*500 * 3) where 375 denotes the height, 500 stands for the width and 3 is the number of channels. To get the average pixel values for the image, we will use a for a loop. Now we will make a new matrix that will have the same height and width but only 1 channel. To convert the matrix into a 1D array we will use the Numpy library. CT is found out. 4. Classifier An important step for surveillance activity recognition is to detect, localize, and track each individual throughout the video stream. This task is not feasible with object detectors that are trained on general categories of data. For this purpose, we fine-tuned a lightweight CNN model for human detection with new data and enabled it to work in a changing surveillance environment. It is superior to state- of-the-art methods, its effectiveness is verified from experiment. This architecture makes our system able to achieve LSTM-level accuracy while being more efficient than the LSTM. VI. SEQUENCE DIAGRAM VII. SUPPORT VECTOR MACHINE (SVM)  R-transform is used to extract periodic, scale & translation invariant features.  Different algorithms are used as a non-linear technique to overcome the similarities among different classes of activities.  SVM (Support Vector Machine) Algorithm is used for training & recognition of activities due to its suitability for time dependent sequential data in this research. VIII.RESULTS Fig: Input for Abnormal Activity Detection  From here we’ll take the file as an input for detection.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1619 Fig: Input file for detecting abnormal activity  Here we can choose any video stream for detection process. We need to click on open to open the file. Fig: Output of Abnormal Detection Fig: Output shows as a normal activity  After opening video, system will start processing on that video to detect abnormal activity, it will show result as an abnormal activity through that video.  Whenever abnormal activity happen, system will detect that activity and label it as ‘abnormal’.  If there is no abnormal activity detected then it will label as ‘Normal’. IX. APPLICATIONS Traffic Monitoring The system will provide an easy way to monitor the traffic and give the appropriate result. Parking Lots The system will help in parking lots for security purposes also, visible security cameras will help you detect thieves from breaking into cars. Security This system will help in the security field on various platforms like parking lots, home security. Monitoring Operations The system will make it easy to monitor the various abnormal activities and suspicious events. X. TABLE Threat Vulnerabil ity Asset Impact Control Recommendati ons System Failure Overheati ng in server room. Air conditionin g system is old. Serve r. All service will be unavaila ble for at least 2-3 hours. Setup new air conditioner. Malicious Human DDOS Attack. Firewall is not configured properly. Serve r. Resource s will be unavaila ble or not work properly. Monitor & configure the firewall. Accidenta l or purposely attack of human. CCTV doesn’t have secured shield or cover. CCTV . CCTV will get damaged. Setup shield or proper covering the CCTV. Accuracy. Low performanc e of algorithm or training dataset. Serve r. It will show result with low accuracy. Monitor & reset working of functions.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1620 XI. CONCLUSION The proposed system aims to open a new door in the field of video surveillance and provide the result on the basis to detect abnormal activities. It will help the user to monitor any abnormal activities or suspicious events. It's been very difficult to monitor abnormal activities in various fields like security, crime prevention, traffic monitoring. It will help the user by sending an alert message when an abnormal condition is identified. The number of parameters currently included is an attempt to cover all the basic aspects of video surveillance and other overlooked parameters which deserve recognition. This work is interested in the recognition of abnormal human activities by providing a brief analysis of the recent research tasks in this field of video surveillance. We have implemented the CNN to detect abnormal activities. Finally, through this analysis of the recent research tasks in this field of video surveillance and provide the result on the basis to detect abnormal activities. REFERENCES [1] VRIGKAS, Michalis, NIKOU, Christopher’s, ET KAKADIARIS, Iohannis A. A review of human activity recognition methods. Frontiers in Robotics and AI, 2015, vol. 2, p. 28. [2] POPULAR, Oluwatoyin P. ET WANG, Kejun. Video-based abnormal human behavior recognition—A review. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2012, vol. 42, no 6, p. 865-878 [3] BENABBAS, Yassin, IHADDADENE, Nacim, ET DJERABA, Chaabane. Motion pattern extraction and event detection for automatic visual surveillance. EURASIP Journal on Image and Video Processing, 2010, vol. 2011, no 1, p. 163682. [4] HUNG, Ya-Xuan, CHIANG, Chih-Yen, HSU, and Steen J., et al. Abnormality detection for improving elder's daily life independence. In: International Conference on Smart Homes and Health Telematics. Springer Berlin Heidelberg, 2010. p. 186-194. [5]ADAM, Amit, RIVLIN, Ehud, SHIMSHONI, Ilan, et al. Robust real-time unusual event detection using multiple fixed-location monitors. [6] SHIN, Jae Hyuk, LEE, Boreom, ET PARK, Kwang Suk. Detection of abnormal living patterns for the elderly living alone using support vector data description. IEEE Transactions on Information Technology in Biomedicine, 2011, vol. 15, no 3, p. 438-448. [7] PALANIAPPAN, Adithyan, BHARGAVI, R., ET VAIDEHI, V. Abnormal human activity recognition using SVM based approach. In: Recent Trends in Information Technology (ICRTIT), 2012 International Conference on. IEEE, 2012. p. 97-102. [8] A. Datta, M. Shah and N. Lobo, “Person-on-person violence detection in video data”, Proceedings of the 16th International Conference on Pattern Recognition, vol. 1, pp. 433-438, 2002. [9] Paolo Rota, Nicola Conci, Nicu Sebe, and James M Rehg, "Real-life violent social interaction detection", International Conference on Image Processing, pp. 3456– 3460, 2002. [10] M. Drulea, and S. Nedevschi, “Total Variation Regularization of Local-Global Optical Flow”, IEEE Int. Con. Intelligent Transportation Systems, pp. 318-323, 2011. [11] E. ESEN, M. ARABACI, and M. SOYAL,”Fight Detection in Surveillance Videos”, Int. Workshop on Content-Based Multimedia Indexing, pp. 131-135, Jun 2013. [12] CAVIAR Test Case Scenarios, http://groups.inf.ed.ac.uk/vision/CAVIAR/CAVIARDATA1 Daniel Gutchess, M Trajkovics, Eric Cohen-Solal, Damian Lyons, and Anil K Jain, “A background model initialization algorithm for video surveillance,” in ComputerVision, 2001. ICCV 2001. Proceedings. EighthIEEE International Conference on. IEEE, 2001, vol. 1, pp. 733–740. [13] Varun Chandola, Arindam Banerjee, and Vipin Kumar, "Anomaly detection: A survey," ACM computing surveys (CSUR), vol. 41, no. 3, pp. 15, 2009. [14] Yael Pritch, Alex Rav-Acha, and Shmuel Peleg, "Nonchronological video synopsis and indexing," IEEE transactions on pattern analysis and machine intelligence,vol. 30, no. 11, pp. 1971–1984, 2008. [15] Chris Stauffer and W Eric L Grimson, “Adaptive background mixture models for real-time tracking,” in Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on. IEEE, 1999, vol. 2, pp.246–252. [16]Olivier Barnich and Marc Van Droogenbroeck, "Vibe: A universal background subtraction algorithm for video sequences," IEEE Transactions on Image processing, vol. 20, no. 6, pp. 1709–1724, 2011. [17] Pierre-Luc St-Charles, Guillaume-Alexandre Bilodeau, and Robert Bergevin, “Subsense: A universal change detection method with local adaptive sensitivity,” IEEE Transactions on Image Processing, vol. 24, no. 1, pp. 359– 373, 2015. [18] Yi Wang, Pierre-Marc Jodoin, Fatih Porikli, Janusz Konrad, Yannick Benezeth, and Prakash Ishwar, “Cdnet 2014: an expanded change detection benchmark dataset,”
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1621 in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2014, pp. 387–394. [19] Timo Ojala, Matti Pietikainen, and Topi Maenpaa, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,” IEEE Transactions on pattern analysis and machine intelligence, vol. 24, no. 7, pp. 971–987, 2002. [20] Kaiming He, Georgia Gkioxari, Piotr Doll´ar, and Ross Girshick, "Mask r-CNN," in Computer Vision (ICCV), 2017 IEEE International Conference on. IEEE, 2017, pp. 2980– 2988. [21] Marc Braham and Marc Van Droogenbroeck, “Deep background subtraction with scene-specific convolutional neural networks,” in Systems, Signals and Image Processing (IWSSIP), 2016 International Conference on. IEEE, 2016, pp. 1–4. [22] Jonathan Long, Evan Shelhamer, and Trevor Darrell, “Fully convolutional networks for semantic segmentation,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 3431– 3440. [23] Andrews Sobral, "Bgslibrary: An OpenCV c++ background subtraction library,” in IX Workshop de Visao Computacional (WVC2013), 2013, vol. 7. [24] Xavier Glorot and Yoshua Bengio, “Understanding the difficulty of training deep feedforward neural networks,” in Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010, pp. 249–256. [25] Lucas P Cinelli, Lucas A Thomaz, Allan F da Silva, Eduardo AB da Silva, and Sergio L Netto, “Foreground segmentation for anomaly detection in surveillance videos using deep residual networks,". IEEE conference templates contain guidance text for composing and formatting conference papers. Please ensure that all template text is removed from your conference paper prior to submission to the conference. Failure to remove template text from your paper may result in your paper not being published.