SlideShare a Scribd company logo
DYNAMIC SCENE UNDERSTANDING
USING
TEMPORAL ASSOCIATION RULES
MSC THESIS DEFENSE
6/6/2012 1
Introduction
• Computer Vision:
Analysis of visual data in an intelligent manner
• Low-level vision (1)
• High-level vision (2)
• The transition from:
Static Images  Video Content
6/6/2012 2
Motivation
6/6/2012 3
Kuettel et al.
Dynamic Scene Analysis
• Interaction of multiple agents in a specific
context and particular environment
• Activities reoccur over time and co-occur in
time
• Scene analysis gives an understanding of:
– where objects are located,
– what is happening,
– how they interact over a
period of time
6/6/2012 4
Dynamic scene: other problems
6/6/2012 5
Hospedales et al.
Dynamic scene: other problems
6/6/2012 6
Ali et al.
Related Work
• All the works start with some feature
extraction.
• Existing works in the literature are:
1. Trajectory-based
o Many require object detection
o Difficulties in handling occlusions
2. Optical Flow based
o Tracks motion between frames
o Preferable for complex videos as
it is fast and robust
6/6/2012 7
Video Scene Understanding Using Multi-scale Analysis [Yang et al.]
6/6/2012 8
─ Uses optical flow and
Bag-of-words representation
─ Each pixel is assigned
a codeword
─ Use diffusion maps - Clustering reveals the motion patterns, done using a spectral
analysis technique
• Trajectories used to find a set of behavior rules ,
followed by clustering
• Hidden Markov Models are used to detect primitive
events
• Event rule representation is based on Stochastic
Context-Free Grammar and extended with temporal
logic
• Event rule induction is performed to discover the hidden
temporal structures between primitive events using the
Minimum Description Length algorithm
Trajectory Series Analysis based Event Rule Induction for Visual
Surveillance [Zhang et al.]
Random Field Topic Model for Semantic Region Analysis in Crowded Scenes from
Tracklets [Zhou et al.]
6/6/2012 9
• tracklets are observed within a short period
• A Random Field Topic Model is integrated with
Markov Random Field to enforce spatial and
temporal coherence during the learning process
• Tracklets are grouped into one topic
• Pairwise MRF: connects neighboring tracklets
• Tracklets which are spatially and temporally close,
have similar distributions over semantic regions
Random Field Topic Model for Semantic Region Analysis
in Crowded Scenes from Tracklets [Zhou et al.]
General Steps
(1) Feature
Extraction
(2) Event
Modeling
(3) Event
Recognition
Atomic Event
• Involves a single object
• Represented by motion patterns
• Indicates the spatial properties
Composite Event
• Multiple atomic events taking
place in space & time: complex
activities
• Behavioral interaction: results in
spatio-temporal patterns
6/6/2012 10
Problem Statement
Given, a video of a scene acquired by a static
camera:
– Identify regions of different dynamics
– Learn spatio-temporal patterns in the scene and
interpret the semantics within
– Detect abnormal events based on a normalcy
model
6/6/2012 11
Proposed Methodology:
Outline
6/6/2012 12
Traffic Scene: Junction Dataset
Hospedales et al.
6/6/2012 13
Datasets
Traffic Scene: Roundabout Dataset
Hospedales et al.
6/6/2012 14
Datasets
Proposed
Methodology
6/6/2012 15
6/6/2012 16
Feature Extraction: Mean-shift Tracking
17
1. We need to detect and track objects of interest, i.e. vehicles.
2. Target characterization
a) By a circular region in the image i.e. color PDF of target
pixels
3. Target localization
a) Update the model in frame
6/6/2012 18
Resulting Object Trajectories
Roundabout: 157Junction: 208
6/6/2012 19
Proposed
Methodology
6/6/2012 20
Spectral Clustering: Data Representation
o Nodes (1,2,..,n) –
Trajectories
o Edge weights (w) –
Similarity measure
(Dynamic Time Warping
Distance)
1 2 ..
.. n
w
w
Graph 
Adjacency
matrix
t1 t2 … tn
t1 0 0.5 … 0.75
t2 0.5 0 … 0.66
… … … … …
tn 0.75 0.66 … 06/6/2012 21
We aim to clustering trajectories into distinct events in the
scene.
Spectral Clustering: Steps
(n x n) Affinity
Matrix
• Form Laplacian Matrix: Compute K largest
eigenvectors
• K estimated from the distortion score
Eigenvector
Matrix
• Cluster eigenvectors
• Assign trajectory points to corresponding
clusters
K-means
Clustering
6/6/2012 22
Event Models
A
B
C
D
E
F
G
H
6/6/2012 23
6/6/2012 24
Video Association Mining
• We want to uncover unknown patterns in the
scene
• We want to focus is on relationships occurring
within time-intervals rather than just points in
time
• Temporal Pattern Mining: Used to discover
interesting patterns in the scene
• Association Rule Mining: Helps predict future
scene dynamics
6/6/2012 25
Proposed
Methodology
6/6/2012 26
What is a Frequent Pattern?
• Frequent Temporal Pattern (FTP): Occurs many
times in the data; indicates co-occurring and
recurring activities in the scene
• A temporal pattern composed of k events is called
a k-pattern
• Relationships amongst events are encoded using
Allen’s temporal logic
• Each temporal pattern is appended with its time
duration
C
A
B
relationship
event
duration
3-pattern
6/6/2012
27
Allen’s First-Order Interval Logic
startX < startY < endX < endY
duration = startY ─ endX
6/6/2012 28
Interval-Based Event Miner: Algorithm
Level-by-Level Discovery Process
• IEMiner: based on the Apriori principle of item-set
mining
• Apriori principle: Every subset of a frequent k-pattern set
also has to be frequent
(1)
Candidate
Generation
(2)
Support
Counting
Frequent k-patterns
Candidate (k+1)-patterns
6/6/2012 29
Input: List of Event Sequences
• Each event sequence consists of a
sequence of triplets:
{event_label,start_time,end_time}
No Event Sequence
1 A 0 5 B 0 9 C 9 11
2 C 0 7 A 3 11 B 9 11
3 A 0 11 C 1 6 D 1 5
4 A 0 4 C 0 3 E 6 7 G 7 11
Obtain single
frequent events
Event Count
A 4
B 2
C 4
D 1
E 1
G 1
6/6/2012 30
FREQUENT
(1) Candidate Generation
Bottom-up approach
FIRST STEP:
GENERATE SET OF 2-PATTERNS
6/6/2012 31
No Event Sequence
1 A 0 5 B 0 9 C 9 11
2 C 0 7 A 3 11 B 9 11
3 A 0 11 C 1 6 D 1 5
4 A 0 4 C 0 3 E 6 7 G 7 11
Form composite
events
C
A
A
B
A starts B
C overlaps A
.
.
.
(1) Candidate Generation
Bottom-up approach
SECOND STEP: GENERATE(K+1)-PATTERNS FROM FREQUENT
K-PATTERNS AND 2-PATTERNS
LEVEL 2: K = 2
6/6/2012
32
C
A
A
B
A starts B
C overlaps A
.
.
.
A
A
A equals C
A overlaps B
.
.
.
C
B
Candidate 3-patterns
C
A
B
overlaps(C overlaps A) B
.
.
.
2-patterns2-patterns
(2) Support Counting
Single-pass Procedure
6/6/2012 33
• support of a TP indicates the number of
event sequences in which the pattern occurs
• For a pattern to be classified as frequent, it
should have a support value higher than
the user-specified min. support threshold
Determine frequency of
candidate patterns by
counting occurrences
(1) Candidate Generation
Bottom-up approach
SECOND STEP: GENERATE(3+1)-PATTERNS FROM FREQUENT
3-PATTERNS AND 2-PATTERNS
LEVEL 3: K = 3
6/6/2012 34
.
.
.
A
C equals D
A overlaps B
.
.
.
D
B
Candidate 4-patterns
.
.
C
A
B
meets
(B overlaps A) C
2-patterns3-patterns
C
C
A
B
D
equals (meets
(B overlaps A) C) D
(2) Support Counting
Single-pass Procedure
6/6/2012 35
Determine frequency of
candidate patterns by
counting occurrences
• At each iteration: Increment the level
• Terminates when the Candidate Set is EMPTY
Minimum Support Threshold
vs.
Number of Frequent Patterns
Junction Dataset
0.02 vs. 92 patterns
Roundabout Dataset
0.02 vs. 29 patterns
6/6/2012 36
Pruning Redundant Patterns
• Our pruning criteria:
6/6/2012 37
Relation_1 Relation_2
overlaps overlaps
during during
equals equals
CASE 1
Relation_1 Relation_2
overlaps starts
during
equals finishes
CASE 2
6/6/2012 38
k-patterns before after
2-patterns 55 40
3-patterns 33 26
4-patterns 4 3
k-patterns before after
2-patterns 23 17
3-patterns 5 4
4-patterns 1 1
JUNCTION
ROUNDABOUT
Pruning Redundant Patterns
CASE 3 overlaps(C overlaps A) A
Proposed
Methodology
6/6/2012 39
Learning Association Rules
• Temporal association rules (TAR) describe time-
dependent correlations
• TARs are constructed from pairs of FTPs: The
left-hand side is a sub-pattern of the right-hand
pattern
k-pattern(X)  k+1-pattern(Y)
• A rule’s strength is measured
by:
and rules are retained if confidence value is above
a threshold
6/6/2012 40
TAR: Example
6/6/2012
41
A
B
C
A
B
2-pattern
support = 4.35%
3-pattern
support = 4.35%
Proposed
Methodology
6/6/2012 42
Traffic Scene Model: Junction
6/6/2012 43
starts(A,B) [4] 
meets(starts(A,B),C) [9]
{50%}
before(starts(D,C),G)[5.5] 
overlaps(before(starts(D,C),G),E)
[4] {50%}
before(G,F) [4] 
during(before(G,F),H) [5]
{100%}
during(F,H) [3.5] 
before(during(F,H),A) [4]
{50%}
JUNCTION
6/6/2012 44
Traffic Scene Model: Roundabout
6/6/2012 45
before(starts(B,A),D)
[7] 
finishes(before(starts
(B,A),D),C) [2]
{100%}
before(F,B) [7] 
finishes(before(F,B),
A) [3]
{100%}
ROUNDABOUT
6/6/2012 46
Proposed
Methodology
6/6/2012 47
6/6/2012 48
(0) Trajectory Classification
• The classification problem entails classifying
trajectories from test sequences to event categories:
{A,B,C,…}
• Classification is based on the nearest-neighbor scheme
3??? B
B
A A B
A A B 2??
A
1? C C
C C
D D
D
D D
6/6/2012 49
(1) Spatial Outliers
• In the physical scene layout, these events deviate
from the normal direction-of-flow
• The trajectory direction is computed as:
• The test trajectory direction is compared to cluster
prototypes direction using the DTW distance
measure
• Abnormal trajectories exceed the threshold defined
per event cluster
6/6/2012 50
outlier
Junction:
ILLEGAL
U-TURN
6/6/2012 51
outlier
Roundabout:
REVERSE
DRIVING
6/6/2012 52
(2) Spatio-temporal Anomaly Detection
• Abnormal activities at this stage violate both
spatial and temporal constraints
• Hierarchical pattern matching
(level 1 to level k): Patterns from test sequence
are matched against the trained sets of FTPs
– Level 1: Single Frequent Events
– Level 2: 2-patterns
– Level 3: 3-patterns
– Level 4: 4-patterns
• Next…
6/6/2012 53
(2) Spatio-temporal Anomaly Detection
• Law of transitivity has to be incorporated in the
pattern-matching process, in order to reduce false
positives
• If duration of test patterns exceeds a threshold with
respect to duration of trained frequent patterns,
indicates the presence of a rare event
6/6/2012 54
C
B
C
A
A
B
A before B C equals A C before B
Anomaly Detection: Accuracy
• Based on the ground truth:
– True Positives (TP): normal test sequence is classified as
normal
– True Negatives (TN): abnormal test sequence is classified
as abnormal
– False Positives (FP): abnormal behavior classified as
normal
– False Negatives (FN): normal behavior classified as
abnormal
6/6/2012 55
starts(F,A)
Fire-truck interrupting traffic flow
Junction
A
F
6/6/2012 56
Approach Accuracy
Ours 97.37%
Loy et al. 90%
Zen et al. 92.36%
overlaps (D,A)
Incorrect traffic flow
Roundabout
A
D
6/6/2012 57
Approach Accuracy
Ours 97.62%
Zen et al. 86.4%
Contributions
• Clustering of motion
trajectories using a spatial
technique and the DTW
measure
• Utilizing interval-based
temporal mining techniques
for event recognition in
dynamic scenes
• Hierarchical spatio-temporal
anomaly detection based on
quantitative measures
6/6/2012 58
A DCB
C
A
B
D
Point-based
Interval-based
duration
Future Directions
• Using a fully unsupervised robust visual
surveillance tracking system
• Performing motion segmentation and anomaly
detection in real-time
• Applying this approach to more complex
scenarios as well as other domains
6/6/2012 59
Conclusion
• The goal is to organize the video into different
event groups and find their temporal
dependencies
• Single-agent events are modeled by trajectories
• Multi-agent interactions are represented by
temporal patterns
• Association rules are useful in predicting future
activities
• Ability to model individual behavior of vehicles
in the scene, helps in localizing anomalies
6/6/2012 60
Motion Segmentation: Spectral Clustering
• We aim to clustering trajectories into distinct
events in the scene.
• Spectral clustering
– obtains data points in a low-dimensional space
– ability to deal with non-convex shaped clusters
6/6/2012 65
Mean-shift Tracking
• Mean-shift theory: find the center of mass for
ROI, move circle to centre of mass and
continue until convergence
1) Obtain target model and location
2) Minimize the distance between the target
and candidate model
3) Kernel is moved from previous location
to current location until convergence
6/6/2012 66

More Related Content

Similar to Dynamic scene understanding using temporal association rules

[20240415_LabSeminar_Huy]Deciphering Spatio-Temporal Graph Forecasting: A Cau...
[20240415_LabSeminar_Huy]Deciphering Spatio-Temporal Graph Forecasting: A Cau...[20240415_LabSeminar_Huy]Deciphering Spatio-Temporal Graph Forecasting: A Cau...
[20240415_LabSeminar_Huy]Deciphering Spatio-Temporal Graph Forecasting: A Cau...
thanhdowork
 
Project Risk Analysis in Aerospace Industry
Project Risk Analysis in Aerospace IndustryProject Risk Analysis in Aerospace Industry
Project Risk Analysis in Aerospace Industry
Intaver Insititute
 
Quantiative Risk Analysis for the Aerospace Industry
Quantiative Risk Analysis for the Aerospace IndustryQuantiative Risk Analysis for the Aerospace Industry
Quantiative Risk Analysis for the Aerospace Industry
Intaver Insititute
 
Object Detection and Tracking using Statistical and Stochastic Techniques
Object Detection and Tracking using Statistical and Stochastic TechniquesObject Detection and Tracking using Statistical and Stochastic Techniques
Object Detection and Tracking using Statistical and Stochastic Techniques
VasuhiSamydurai1
 
Presentation iswc
Presentation iswcPresentation iswc
Presentation iswc
SydGillani
 
IEEE Projects 2014-2015
IEEE Projects 2014-2015IEEE Projects 2014-2015
IEEE Projects 2014-2015
Finalyear Projects
 
Operation research-Network analysis (Critical Path Method)
Operation research-Network analysis (Critical Path Method)Operation research-Network analysis (Critical Path Method)
Operation research-Network analysis (Critical Path Method)
Kamel Attar
 
Program on Mathematical and Statistical Methods for Climate and the Earth Sys...
Program on Mathematical and Statistical Methods for Climate and the Earth Sys...Program on Mathematical and Statistical Methods for Climate and the Earth Sys...
Program on Mathematical and Statistical Methods for Climate and the Earth Sys...
The Statistical and Applied Mathematical Sciences Institute
 
Lecture_2_Stats.pdf
Lecture_2_Stats.pdfLecture_2_Stats.pdf
Lecture_2_Stats.pdf
paijitk
 
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
YONG ZHENG
 
From Unsupervised to Semi-Supervised Event Detection
From Unsupervised to Semi-Supervised Event DetectionFrom Unsupervised to Semi-Supervised Event Detection
From Unsupervised to Semi-Supervised Event Detection
Vincent Chu
 
Talk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detectionTalk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detectionMahfuzul Haque
 
20151216 convergence of quasi dynamic assignment models
20151216 convergence of quasi dynamic assignment models 20151216 convergence of quasi dynamic assignment models
20151216 convergence of quasi dynamic assignment models
Luuk Brederode
 
Session-aware Linear Item-Item Models for Session-based Recommendation (WWW 2...
Session-aware Linear Item-Item Models for Session-based Recommendation (WWW 2...Session-aware Linear Item-Item Models for Session-based Recommendation (WWW 2...
Session-aware Linear Item-Item Models for Session-based Recommendation (WWW 2...
민진 최
 
Nicolay presentation
Nicolay presentationNicolay presentation
Nicolay presentation
rbhar
 

Similar to Dynamic scene understanding using temporal association rules (20)

[20240415_LabSeminar_Huy]Deciphering Spatio-Temporal Graph Forecasting: A Cau...
[20240415_LabSeminar_Huy]Deciphering Spatio-Temporal Graph Forecasting: A Cau...[20240415_LabSeminar_Huy]Deciphering Spatio-Temporal Graph Forecasting: A Cau...
[20240415_LabSeminar_Huy]Deciphering Spatio-Temporal Graph Forecasting: A Cau...
 
Project Risk Analysis in Aerospace Industry
Project Risk Analysis in Aerospace IndustryProject Risk Analysis in Aerospace Industry
Project Risk Analysis in Aerospace Industry
 
Quantiative Risk Analysis for the Aerospace Industry
Quantiative Risk Analysis for the Aerospace IndustryQuantiative Risk Analysis for the Aerospace Industry
Quantiative Risk Analysis for the Aerospace Industry
 
ECCV WS 2012 (Frank)
ECCV WS 2012 (Frank)ECCV WS 2012 (Frank)
ECCV WS 2012 (Frank)
 
Object Detection and Tracking using Statistical and Stochastic Techniques
Object Detection and Tracking using Statistical and Stochastic TechniquesObject Detection and Tracking using Statistical and Stochastic Techniques
Object Detection and Tracking using Statistical and Stochastic Techniques
 
Presentation iswc
Presentation iswcPresentation iswc
Presentation iswc
 
Background subtraction
Background subtractionBackground subtraction
Background subtraction
 
IEEE Projects 2014-2015
IEEE Projects 2014-2015IEEE Projects 2014-2015
IEEE Projects 2014-2015
 
Unit 5
Unit 5Unit 5
Unit 5
 
Operation research-Network analysis (Critical Path Method)
Operation research-Network analysis (Critical Path Method)Operation research-Network analysis (Critical Path Method)
Operation research-Network analysis (Critical Path Method)
 
Program on Mathematical and Statistical Methods for Climate and the Earth Sys...
Program on Mathematical and Statistical Methods for Climate and the Earth Sys...Program on Mathematical and Statistical Methods for Climate and the Earth Sys...
Program on Mathematical and Statistical Methods for Climate and the Earth Sys...
 
Lecture_2_Stats.pdf
Lecture_2_Stats.pdfLecture_2_Stats.pdf
Lecture_2_Stats.pdf
 
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...
 
From Unsupervised to Semi-Supervised Event Detection
From Unsupervised to Semi-Supervised Event DetectionFrom Unsupervised to Semi-Supervised Event Detection
From Unsupervised to Semi-Supervised Event Detection
 
Report
ReportReport
Report
 
Talk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detectionTalk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detection
 
20151216 convergence of quasi dynamic assignment models
20151216 convergence of quasi dynamic assignment models 20151216 convergence of quasi dynamic assignment models
20151216 convergence of quasi dynamic assignment models
 
Session-aware Linear Item-Item Models for Session-based Recommendation (WWW 2...
Session-aware Linear Item-Item Models for Session-based Recommendation (WWW 2...Session-aware Linear Item-Item Models for Session-based Recommendation (WWW 2...
Session-aware Linear Item-Item Models for Session-based Recommendation (WWW 2...
 
Nicolay presentation
Nicolay presentationNicolay presentation
Nicolay presentation
 
Report
ReportReport
Report
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Dynamic scene understanding using temporal association rules

  • 1. DYNAMIC SCENE UNDERSTANDING USING TEMPORAL ASSOCIATION RULES MSC THESIS DEFENSE 6/6/2012 1
  • 2. Introduction • Computer Vision: Analysis of visual data in an intelligent manner • Low-level vision (1) • High-level vision (2) • The transition from: Static Images  Video Content 6/6/2012 2
  • 4. Dynamic Scene Analysis • Interaction of multiple agents in a specific context and particular environment • Activities reoccur over time and co-occur in time • Scene analysis gives an understanding of: – where objects are located, – what is happening, – how they interact over a period of time 6/6/2012 4
  • 5. Dynamic scene: other problems 6/6/2012 5 Hospedales et al.
  • 6. Dynamic scene: other problems 6/6/2012 6 Ali et al.
  • 7. Related Work • All the works start with some feature extraction. • Existing works in the literature are: 1. Trajectory-based o Many require object detection o Difficulties in handling occlusions 2. Optical Flow based o Tracks motion between frames o Preferable for complex videos as it is fast and robust 6/6/2012 7
  • 8. Video Scene Understanding Using Multi-scale Analysis [Yang et al.] 6/6/2012 8 ─ Uses optical flow and Bag-of-words representation ─ Each pixel is assigned a codeword ─ Use diffusion maps - Clustering reveals the motion patterns, done using a spectral analysis technique • Trajectories used to find a set of behavior rules , followed by clustering • Hidden Markov Models are used to detect primitive events • Event rule representation is based on Stochastic Context-Free Grammar and extended with temporal logic • Event rule induction is performed to discover the hidden temporal structures between primitive events using the Minimum Description Length algorithm Trajectory Series Analysis based Event Rule Induction for Visual Surveillance [Zhang et al.]
  • 9. Random Field Topic Model for Semantic Region Analysis in Crowded Scenes from Tracklets [Zhou et al.] 6/6/2012 9 • tracklets are observed within a short period • A Random Field Topic Model is integrated with Markov Random Field to enforce spatial and temporal coherence during the learning process • Tracklets are grouped into one topic • Pairwise MRF: connects neighboring tracklets • Tracklets which are spatially and temporally close, have similar distributions over semantic regions Random Field Topic Model for Semantic Region Analysis in Crowded Scenes from Tracklets [Zhou et al.]
  • 10. General Steps (1) Feature Extraction (2) Event Modeling (3) Event Recognition Atomic Event • Involves a single object • Represented by motion patterns • Indicates the spatial properties Composite Event • Multiple atomic events taking place in space & time: complex activities • Behavioral interaction: results in spatio-temporal patterns 6/6/2012 10
  • 11. Problem Statement Given, a video of a scene acquired by a static camera: – Identify regions of different dynamics – Learn spatio-temporal patterns in the scene and interpret the semantics within – Detect abnormal events based on a normalcy model 6/6/2012 11
  • 13. Traffic Scene: Junction Dataset Hospedales et al. 6/6/2012 13 Datasets
  • 14. Traffic Scene: Roundabout Dataset Hospedales et al. 6/6/2012 14 Datasets
  • 17. Feature Extraction: Mean-shift Tracking 17 1. We need to detect and track objects of interest, i.e. vehicles. 2. Target characterization a) By a circular region in the image i.e. color PDF of target pixels 3. Target localization a) Update the model in frame
  • 19. Resulting Object Trajectories Roundabout: 157Junction: 208 6/6/2012 19
  • 21. Spectral Clustering: Data Representation o Nodes (1,2,..,n) – Trajectories o Edge weights (w) – Similarity measure (Dynamic Time Warping Distance) 1 2 .. .. n w w Graph  Adjacency matrix t1 t2 … tn t1 0 0.5 … 0.75 t2 0.5 0 … 0.66 … … … … … tn 0.75 0.66 … 06/6/2012 21 We aim to clustering trajectories into distinct events in the scene.
  • 22. Spectral Clustering: Steps (n x n) Affinity Matrix • Form Laplacian Matrix: Compute K largest eigenvectors • K estimated from the distortion score Eigenvector Matrix • Cluster eigenvectors • Assign trajectory points to corresponding clusters K-means Clustering 6/6/2012 22
  • 25. Video Association Mining • We want to uncover unknown patterns in the scene • We want to focus is on relationships occurring within time-intervals rather than just points in time • Temporal Pattern Mining: Used to discover interesting patterns in the scene • Association Rule Mining: Helps predict future scene dynamics 6/6/2012 25
  • 27. What is a Frequent Pattern? • Frequent Temporal Pattern (FTP): Occurs many times in the data; indicates co-occurring and recurring activities in the scene • A temporal pattern composed of k events is called a k-pattern • Relationships amongst events are encoded using Allen’s temporal logic • Each temporal pattern is appended with its time duration C A B relationship event duration 3-pattern 6/6/2012 27
  • 28. Allen’s First-Order Interval Logic startX < startY < endX < endY duration = startY ─ endX 6/6/2012 28
  • 29. Interval-Based Event Miner: Algorithm Level-by-Level Discovery Process • IEMiner: based on the Apriori principle of item-set mining • Apriori principle: Every subset of a frequent k-pattern set also has to be frequent (1) Candidate Generation (2) Support Counting Frequent k-patterns Candidate (k+1)-patterns 6/6/2012 29
  • 30. Input: List of Event Sequences • Each event sequence consists of a sequence of triplets: {event_label,start_time,end_time} No Event Sequence 1 A 0 5 B 0 9 C 9 11 2 C 0 7 A 3 11 B 9 11 3 A 0 11 C 1 6 D 1 5 4 A 0 4 C 0 3 E 6 7 G 7 11 Obtain single frequent events Event Count A 4 B 2 C 4 D 1 E 1 G 1 6/6/2012 30 FREQUENT
  • 31. (1) Candidate Generation Bottom-up approach FIRST STEP: GENERATE SET OF 2-PATTERNS 6/6/2012 31 No Event Sequence 1 A 0 5 B 0 9 C 9 11 2 C 0 7 A 3 11 B 9 11 3 A 0 11 C 1 6 D 1 5 4 A 0 4 C 0 3 E 6 7 G 7 11 Form composite events C A A B A starts B C overlaps A . . .
  • 32. (1) Candidate Generation Bottom-up approach SECOND STEP: GENERATE(K+1)-PATTERNS FROM FREQUENT K-PATTERNS AND 2-PATTERNS LEVEL 2: K = 2 6/6/2012 32 C A A B A starts B C overlaps A . . . A A A equals C A overlaps B . . . C B Candidate 3-patterns C A B overlaps(C overlaps A) B . . . 2-patterns2-patterns
  • 33. (2) Support Counting Single-pass Procedure 6/6/2012 33 • support of a TP indicates the number of event sequences in which the pattern occurs • For a pattern to be classified as frequent, it should have a support value higher than the user-specified min. support threshold Determine frequency of candidate patterns by counting occurrences
  • 34. (1) Candidate Generation Bottom-up approach SECOND STEP: GENERATE(3+1)-PATTERNS FROM FREQUENT 3-PATTERNS AND 2-PATTERNS LEVEL 3: K = 3 6/6/2012 34 . . . A C equals D A overlaps B . . . D B Candidate 4-patterns . . C A B meets (B overlaps A) C 2-patterns3-patterns C C A B D equals (meets (B overlaps A) C) D
  • 35. (2) Support Counting Single-pass Procedure 6/6/2012 35 Determine frequency of candidate patterns by counting occurrences • At each iteration: Increment the level • Terminates when the Candidate Set is EMPTY
  • 36. Minimum Support Threshold vs. Number of Frequent Patterns Junction Dataset 0.02 vs. 92 patterns Roundabout Dataset 0.02 vs. 29 patterns 6/6/2012 36
  • 37. Pruning Redundant Patterns • Our pruning criteria: 6/6/2012 37 Relation_1 Relation_2 overlaps overlaps during during equals equals CASE 1 Relation_1 Relation_2 overlaps starts during equals finishes CASE 2
  • 38. 6/6/2012 38 k-patterns before after 2-patterns 55 40 3-patterns 33 26 4-patterns 4 3 k-patterns before after 2-patterns 23 17 3-patterns 5 4 4-patterns 1 1 JUNCTION ROUNDABOUT Pruning Redundant Patterns CASE 3 overlaps(C overlaps A) A
  • 40. Learning Association Rules • Temporal association rules (TAR) describe time- dependent correlations • TARs are constructed from pairs of FTPs: The left-hand side is a sub-pattern of the right-hand pattern k-pattern(X)  k+1-pattern(Y) • A rule’s strength is measured by: and rules are retained if confidence value is above a threshold 6/6/2012 40
  • 43. Traffic Scene Model: Junction 6/6/2012 43 starts(A,B) [4]  meets(starts(A,B),C) [9] {50%} before(starts(D,C),G)[5.5]  overlaps(before(starts(D,C),G),E) [4] {50%} before(G,F) [4]  during(before(G,F),H) [5] {100%} during(F,H) [3.5]  before(during(F,H),A) [4] {50%}
  • 45. Traffic Scene Model: Roundabout 6/6/2012 45 before(starts(B,A),D) [7]  finishes(before(starts (B,A),D),C) [2] {100%} before(F,B) [7]  finishes(before(F,B), A) [3] {100%}
  • 49. (0) Trajectory Classification • The classification problem entails classifying trajectories from test sequences to event categories: {A,B,C,…} • Classification is based on the nearest-neighbor scheme 3??? B B A A B A A B 2?? A 1? C C C C D D D D D 6/6/2012 49
  • 50. (1) Spatial Outliers • In the physical scene layout, these events deviate from the normal direction-of-flow • The trajectory direction is computed as: • The test trajectory direction is compared to cluster prototypes direction using the DTW distance measure • Abnormal trajectories exceed the threshold defined per event cluster 6/6/2012 50
  • 53. (2) Spatio-temporal Anomaly Detection • Abnormal activities at this stage violate both spatial and temporal constraints • Hierarchical pattern matching (level 1 to level k): Patterns from test sequence are matched against the trained sets of FTPs – Level 1: Single Frequent Events – Level 2: 2-patterns – Level 3: 3-patterns – Level 4: 4-patterns • Next… 6/6/2012 53
  • 54. (2) Spatio-temporal Anomaly Detection • Law of transitivity has to be incorporated in the pattern-matching process, in order to reduce false positives • If duration of test patterns exceeds a threshold with respect to duration of trained frequent patterns, indicates the presence of a rare event 6/6/2012 54 C B C A A B A before B C equals A C before B
  • 55. Anomaly Detection: Accuracy • Based on the ground truth: – True Positives (TP): normal test sequence is classified as normal – True Negatives (TN): abnormal test sequence is classified as abnormal – False Positives (FP): abnormal behavior classified as normal – False Negatives (FN): normal behavior classified as abnormal 6/6/2012 55
  • 56. starts(F,A) Fire-truck interrupting traffic flow Junction A F 6/6/2012 56 Approach Accuracy Ours 97.37% Loy et al. 90% Zen et al. 92.36%
  • 57. overlaps (D,A) Incorrect traffic flow Roundabout A D 6/6/2012 57 Approach Accuracy Ours 97.62% Zen et al. 86.4%
  • 58. Contributions • Clustering of motion trajectories using a spatial technique and the DTW measure • Utilizing interval-based temporal mining techniques for event recognition in dynamic scenes • Hierarchical spatio-temporal anomaly detection based on quantitative measures 6/6/2012 58 A DCB C A B D Point-based Interval-based duration
  • 59. Future Directions • Using a fully unsupervised robust visual surveillance tracking system • Performing motion segmentation and anomaly detection in real-time • Applying this approach to more complex scenarios as well as other domains 6/6/2012 59
  • 60. Conclusion • The goal is to organize the video into different event groups and find their temporal dependencies • Single-agent events are modeled by trajectories • Multi-agent interactions are represented by temporal patterns • Association rules are useful in predicting future activities • Ability to model individual behavior of vehicles in the scene, helps in localizing anomalies 6/6/2012 60
  • 61. Motion Segmentation: Spectral Clustering • We aim to clustering trajectories into distinct events in the scene. • Spectral clustering – obtains data points in a low-dimensional space – ability to deal with non-convex shaped clusters 6/6/2012 65
  • 62. Mean-shift Tracking • Mean-shift theory: find the center of mass for ROI, move circle to centre of mass and continue until convergence 1) Obtain target model and location 2) Minimize the distance between the target and candidate model 3) Kernel is moved from previous location to current location until convergence 6/6/2012 66

Editor's Notes

  1. template
  2. No need
  3. Put what’s going on video
  4. The aim is to organize the video into sets of events with associated temporal dependencies
  5. All applications
  6. Automatically segment the scene into semantic regions and learn their models
  7. Event - The occurrence of an activity in a particular place during a time interval Primitive events Composite events – combination of atomic events
  8. And (2) are not the problem modify
  9. OUTLINE…highlight n put everywhere
  10. London: busy traffic intersection
  11. London
  12. OUTLINE
  13. Color == feature space (using histograms)
  14. Vehicle trajectories More than 25 fps Smoothen using a moving average filter
  15. OUTLINE
  16. -Learned from tracking -Model – category of activities with similar semantic meaning -CENTROID TRAJECTORIES
  17. Interesting == recurrent TPM is better than sequence mining coz rich set of relations (Allen) rather than just follows!
  18. OUTLINE
  19. K >=2
  20. Mention the TIME DURATION here Support missing here
  21. IEMiner details…illustrate steps with event sequences
  22. Each event sequence is 12 seconds long
  23. Extend frequent k-pattern sets, one item at a time
  24. Extend frequent k-pattern sets, one item at a time
  25. Extend frequent k-pattern sets, one item at a time
  26. OUTLINE
  27. OUTLINE: The traffic light sequence is accurately modeled by the forward TARs
  28. OUTLINE
  29. Put this as AD
  30. Explain in detaillllllll
  31. 5 different anomalies were detected (name these) Having extracted trajectories from this sequence Traffic violations Put the comparison results table here
  32. Infrequent temporal pattern Horizontal n vertical together!