SlideShare a Scribd company logo
Intelligent Security
Application for Unusual Event Detection
Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul
Gippsland School of Information Technology, Monash University, Victoria 3842, Australia
Email: {Mahfuzul.Haque, Manzur.Murshed, Manoranjan.Paul}@infotech.monash.edu.au

1

Abstract
The goal of this research project is to develop intelligent software that can see and detect unusual events from
surveillance video stream. As the growing number of security camera is challenging the reliability of existing security
systems which are still relying on human monitors, this project exploits computer vision and artificial intelligence for
developing intelligent security application that can aid human monitors taking early actions against malicious events.

2

Motivation

5

Event Detection

Frame # 1

6

Frame # 75

Frame # 150

Frame # 225

Frame # 300

Performance Evaluation
First Frame

Test Frame

Ideal Result

Actual Result

Image source: http://www.alert-sec.co.uk/Images/control_room.jpg

Security control room: too many cameras, too many screens!

3

Foreground Region Detection
Background
Model

Current Scene

Foreground Region

First, active foreground regions are separated using an adaptive model of
the scene background [1][2], and then scene level features are extracted
from those regions.

4

7

The Application

8

References

Temporal Feature Analysis

Total Foreground Area (%)

Frame # 1

Frame # 75

Frame # 150

Frame # 225

Frame # 300

Total 270 temporal features are computed
from the time varying scene level features.
Finally, top ranked features are mapped to
high level event models.
Observed Data
Smoothed Data

Time

[1] Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul, On Stable Dynamic Background
Generation Technique using Gaussian Mixture Models for Robust Object Detection, IEEE
International Conference On Advanced Video and Signal Based Surveillance (AVSS), New Mexico,
USA, 2008.
[2] Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul, Improved Gaussian Mixtures for
Robust Object Detection by Adaptive Multi-Background Generation, International Conference
on Pattern Recognition (ICPR), Tampa, Florida, USA, 2008.

More Related Content

What's hot

A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systems
ijsrd.com
 
Researchers create 'self aware' algorithm to ward off hacking attempts
Researchers create 'self aware' algorithm to ward off hacking attemptsResearchers create 'self aware' algorithm to ward off hacking attempts
Researchers create 'self aware' algorithm to ward off hacking attempts
Roen Branham
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Hai Nguyen
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
GauthamSK4
 
Cognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureCognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecure
SparkCognition
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
Redington Value Distribution
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
UltraUploader
 
Alive 2016
Alive 2016Alive 2016
Alive 2016
Omkar Tembe
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET Journal
 
IET SSCS 2018
IET SSCS 2018IET SSCS 2018
IET SSCS 2018
MoojanPordelkhaki
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
IRJET Journal
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
Pete Burnap
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
IRJET Journal
 
Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
Raja Ram
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
IRJET Journal
 
Analyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testingAnalyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testing
Engr Md Yusuf Miah
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
Mohamed Elfadly
 

What's hot (18)

A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systems
 
Researchers create 'self aware' algorithm to ward off hacking attempts
Researchers create 'self aware' algorithm to ward off hacking attemptsResearchers create 'self aware' algorithm to ward off hacking attempts
Researchers create 'self aware' algorithm to ward off hacking attempts
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Cognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureCognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecure
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
 
Alive 2016
Alive 2016Alive 2016
Alive 2016
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
 
IET SSCS 2018
IET SSCS 2018IET SSCS 2018
IET SSCS 2018
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
 
Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
Analyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testingAnalyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testing
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 

Viewers also liked

Comprar electrodomésticos
Comprar electrodomésticosComprar electrodomésticos
Comprar electrodomésticos
tiendaazul11
 
Life Lessons Learned While Job Searcing
Life Lessons Learned While Job SearcingLife Lessons Learned While Job Searcing
Life Lessons Learned While Job Searcing
Stefan Talley
 
Kulturne potrebe zadra – sociološko istraživanje public24042015
Kulturne potrebe zadra – sociološko istraživanje public24042015Kulturne potrebe zadra – sociološko istraživanje public24042015
Kulturne potrebe zadra – sociološko istraživanje public24042015Krešimir Krolo
 
"><img src="x">
"><img src="x">"><img src="x">
Oss 2009- How Open Source Software Can Save the ICT Industry
Oss 2009- How Open Source Software Can Save the ICT IndustryOss 2009- How Open Source Software Can Save the ICT Industry
Oss 2009- How Open Source Software Can Save the ICT Industry
sayanc
 
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდებაenuqishvili
 
Mal-material açiqlamasi1
Mal-material açiqlamasi1Mal-material açiqlamasi1
Mal-material açiqlamasi1Elnur Ahmedov
 
Poster: EII Workshop 2007
Poster: EII Workshop 2007Poster: EII Workshop 2007
Poster: EII Workshop 2007
Mahfuzul Haque
 
Vállalkozz okosan profitálj biztosan
Vállalkozz okosan profitálj biztosanVállalkozz okosan profitálj biztosan
Vállalkozz okosan profitálj biztosan
Orsolya Turay
 
TOSHIBA Consumer/Household Batteries
TOSHIBA Consumer/Household BatteriesTOSHIBA Consumer/Household Batteries
TOSHIBA Consumer/Household Batteries
SYSTEMS SUNLIGHT S.A.
 
Wakala
WakalaWakala
Tricolich Fedor Victorovich
Tricolich Fedor VictorovichTricolich Fedor Victorovich
Tricolich Fedor Victorovich
prosvsports
 
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본Myeongnyun Mission Church
 
Vitamins (sp13 bty-001) ppt
Vitamins (sp13 bty-001) pptVitamins (sp13 bty-001) ppt
Vitamins (sp13 bty-001) ppt
Zohaib HUSSAIN
 
Palermo
PalermoPalermo
Palermo
stafylidou
 
Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015
Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015
Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015
Lindsey Collumbell ChartPR MCIPR CMktr MCIM
 

Viewers also liked (17)

Comprar electrodomésticos
Comprar electrodomésticosComprar electrodomésticos
Comprar electrodomésticos
 
Life Lessons Learned While Job Searcing
Life Lessons Learned While Job SearcingLife Lessons Learned While Job Searcing
Life Lessons Learned While Job Searcing
 
Kulturne potrebe zadra – sociološko istraživanje public24042015
Kulturne potrebe zadra – sociološko istraživanje public24042015Kulturne potrebe zadra – sociološko istraživanje public24042015
Kulturne potrebe zadra – sociološko istraživanje public24042015
 
"><img src="x">
"><img src="x">"><img src="x">
"><img src="x">
 
Oss 2009- How Open Source Software Can Save the ICT Industry
Oss 2009- How Open Source Software Can Save the ICT IndustryOss 2009- How Open Source Software Can Save the ICT Industry
Oss 2009- How Open Source Software Can Save the ICT Industry
 
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება
 
Mal-material açiqlamasi1
Mal-material açiqlamasi1Mal-material açiqlamasi1
Mal-material açiqlamasi1
 
Poster: EII Workshop 2007
Poster: EII Workshop 2007Poster: EII Workshop 2007
Poster: EII Workshop 2007
 
Vállalkozz okosan profitálj biztosan
Vállalkozz okosan profitálj biztosanVállalkozz okosan profitálj biztosan
Vállalkozz okosan profitálj biztosan
 
TOSHIBA Consumer/Household Batteries
TOSHIBA Consumer/Household BatteriesTOSHIBA Consumer/Household Batteries
TOSHIBA Consumer/Household Batteries
 
Wakala
WakalaWakala
Wakala
 
Tricolich Fedor Victorovich
Tricolich Fedor VictorovichTricolich Fedor Victorovich
Tricolich Fedor Victorovich
 
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본
 
Vitamins (sp13 bty-001) ppt
Vitamins (sp13 bty-001) pptVitamins (sp13 bty-001) ppt
Vitamins (sp13 bty-001) ppt
 
Palermo
PalermoPalermo
Palermo
 
Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015
Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015
Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015
 
Ppt it
Ppt itPpt it
Ppt it
 

Similar to Poster: Monash Research Month 2009

ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
IRJET Journal
 
Cyber threat detection by siem tools
Cyber threat detection by siem toolsCyber threat detection by siem tools
Cyber threat detection by siem tools
mrigakshi goel
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
International Journal of Reconfigurable and Embedded Systems
 
Poster: Monash Research Month 2008
Poster: Monash Research Month 2008Poster: Monash Research Month 2008
Poster: Monash Research Month 2008
Mahfuzul Haque
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
IRJET Journal
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
IJECEIAES
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
Venkat Projects
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
IRJET Journal
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptx
MathanE5
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
IJECEIAES
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
Axis Communications
 
Motion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyMotion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- Survey
IRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET Journal
 
Artificial_intelligence_in_cctv_survelliance FINAL.pptx
Artificial_intelligence_in_cctv_survelliance FINAL.pptxArtificial_intelligence_in_cctv_survelliance FINAL.pptx
Artificial_intelligence_in_cctv_survelliance FINAL.pptx
hariprasad279825
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET Journal
 
BE-EEE-8th sem-Presentation Artificial intelligence in security managenent
BE-EEE-8th sem-Presentation Artificial intelligence in security managenentBE-EEE-8th sem-Presentation Artificial intelligence in security managenent
BE-EEE-8th sem-Presentation Artificial intelligence in security managenent
MOHAMMED SAQIB
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
IRJET Journal
 
Poster_PamelaDempster_40096050
Poster_PamelaDempster_40096050Poster_PamelaDempster_40096050
Poster_PamelaDempster_40096050
Pamela Dempster
 
Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...
IAESIJAI
 

Similar to Poster: Monash Research Month 2009 (20)

ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
 
Cyber threat detection by siem tools
Cyber threat detection by siem toolsCyber threat detection by siem tools
Cyber threat detection by siem tools
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
Poster: Monash Research Month 2008
Poster: Monash Research Month 2008Poster: Monash Research Month 2008
Poster: Monash Research Month 2008
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptx
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 
Motion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyMotion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- Survey
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
Artificial_intelligence_in_cctv_survelliance FINAL.pptx
Artificial_intelligence_in_cctv_survelliance FINAL.pptxArtificial_intelligence_in_cctv_survelliance FINAL.pptx
Artificial_intelligence_in_cctv_survelliance FINAL.pptx
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
 
BE-EEE-8th sem-Presentation Artificial intelligence in security managenent
BE-EEE-8th sem-Presentation Artificial intelligence in security managenentBE-EEE-8th sem-Presentation Artificial intelligence in security managenent
BE-EEE-8th sem-Presentation Artificial intelligence in security managenent
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
 
Poster_PamelaDempster_40096050
Poster_PamelaDempster_40096050Poster_PamelaDempster_40096050
Poster_PamelaDempster_40096050
 
Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...
 

More from Mahfuzul Haque

Dependency inversion using ports and adapters
Dependency inversion using ports and adaptersDependency inversion using ports and adapters
Dependency inversion using ports and adapters
Mahfuzul Haque
 
Resilient machine learning systems for health analytics
Resilient machine learning systems for health analyticsResilient machine learning systems for health analytics
Resilient machine learning systems for health analytics
Mahfuzul Haque
 
Talk 2012-icmew-event
Talk 2012-icmew-eventTalk 2012-icmew-event
Talk 2012-icmew-event
Mahfuzul Haque
 
Talk 2011-buet-perception-event
Talk 2011-buet-perception-eventTalk 2011-buet-perception-event
Talk 2011-buet-perception-event
Mahfuzul Haque
 
Talk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detectionTalk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detection
Mahfuzul Haque
 
Talk 2009-monash-seminar-perception
Talk 2009-monash-seminar-perceptionTalk 2009-monash-seminar-perception
Talk 2009-monash-seminar-perception
Mahfuzul Haque
 
Talk 2009-monash-seminar-intelligent-video-surveillance
Talk 2009-monash-seminar-intelligent-video-surveillanceTalk 2009-monash-seminar-intelligent-video-surveillance
Talk 2009-monash-seminar-intelligent-video-surveillance
Mahfuzul Haque
 
Talk 2009-monash-open-day-surveillance
Talk 2009-monash-open-day-surveillanceTalk 2009-monash-open-day-surveillance
Talk 2009-monash-open-day-surveillance
Mahfuzul Haque
 
Talk 2007-monash-seminar-behavior-recognition-framework
Talk 2007-monash-seminar-behavior-recognition-frameworkTalk 2007-monash-seminar-behavior-recognition-framework
Talk 2007-monash-seminar-behavior-recognition-framework
Mahfuzul Haque
 
Kb hmm
Kb hmmKb hmm
Kb gait-recognition
Kb gait-recognitionKb gait-recognition
Kb gait-recognition
Mahfuzul Haque
 
Kb behaviour-recognition
Kb behaviour-recognitionKb behaviour-recognition
Kb behaviour-recognition
Mahfuzul Haque
 
Talk 2012-icmew-perception
Talk 2012-icmew-perceptionTalk 2012-icmew-perception
Talk 2012-icmew-perception
Mahfuzul Haque
 
Poster: Monash Research Month 2007
Poster: Monash Research Month 2007Poster: Monash Research Month 2007
Poster: Monash Research Month 2007
Mahfuzul Haque
 
Poster: ICPR 2008
Poster: ICPR 2008Poster: ICPR 2008
Poster: ICPR 2008
Mahfuzul Haque
 
Poster: ICME 2010
Poster: ICME 2010Poster: ICME 2010
Poster: ICME 2010
Mahfuzul Haque
 
Poster: EII Winter School 2007
Poster: EII Winter School 2007Poster: EII Winter School 2007
Poster: EII Winter School 2007
Mahfuzul Haque
 
Poster: AVSS 2012
Poster: AVSS 2012Poster: AVSS 2012
Poster: AVSS 2012
Mahfuzul Haque
 
Poster: MMSP 2008
Poster: MMSP 2008Poster: MMSP 2008
Poster: MMSP 2008
Mahfuzul Haque
 

More from Mahfuzul Haque (19)

Dependency inversion using ports and adapters
Dependency inversion using ports and adaptersDependency inversion using ports and adapters
Dependency inversion using ports and adapters
 
Resilient machine learning systems for health analytics
Resilient machine learning systems for health analyticsResilient machine learning systems for health analytics
Resilient machine learning systems for health analytics
 
Talk 2012-icmew-event
Talk 2012-icmew-eventTalk 2012-icmew-event
Talk 2012-icmew-event
 
Talk 2011-buet-perception-event
Talk 2011-buet-perception-eventTalk 2011-buet-perception-event
Talk 2011-buet-perception-event
 
Talk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detectionTalk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detection
 
Talk 2009-monash-seminar-perception
Talk 2009-monash-seminar-perceptionTalk 2009-monash-seminar-perception
Talk 2009-monash-seminar-perception
 
Talk 2009-monash-seminar-intelligent-video-surveillance
Talk 2009-monash-seminar-intelligent-video-surveillanceTalk 2009-monash-seminar-intelligent-video-surveillance
Talk 2009-monash-seminar-intelligent-video-surveillance
 
Talk 2009-monash-open-day-surveillance
Talk 2009-monash-open-day-surveillanceTalk 2009-monash-open-day-surveillance
Talk 2009-monash-open-day-surveillance
 
Talk 2007-monash-seminar-behavior-recognition-framework
Talk 2007-monash-seminar-behavior-recognition-frameworkTalk 2007-monash-seminar-behavior-recognition-framework
Talk 2007-monash-seminar-behavior-recognition-framework
 
Kb hmm
Kb hmmKb hmm
Kb hmm
 
Kb gait-recognition
Kb gait-recognitionKb gait-recognition
Kb gait-recognition
 
Kb behaviour-recognition
Kb behaviour-recognitionKb behaviour-recognition
Kb behaviour-recognition
 
Talk 2012-icmew-perception
Talk 2012-icmew-perceptionTalk 2012-icmew-perception
Talk 2012-icmew-perception
 
Poster: Monash Research Month 2007
Poster: Monash Research Month 2007Poster: Monash Research Month 2007
Poster: Monash Research Month 2007
 
Poster: ICPR 2008
Poster: ICPR 2008Poster: ICPR 2008
Poster: ICPR 2008
 
Poster: ICME 2010
Poster: ICME 2010Poster: ICME 2010
Poster: ICME 2010
 
Poster: EII Winter School 2007
Poster: EII Winter School 2007Poster: EII Winter School 2007
Poster: EII Winter School 2007
 
Poster: AVSS 2012
Poster: AVSS 2012Poster: AVSS 2012
Poster: AVSS 2012
 
Poster: MMSP 2008
Poster: MMSP 2008Poster: MMSP 2008
Poster: MMSP 2008
 

Recently uploaded

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Poster: Monash Research Month 2009

  • 1. Intelligent Security Application for Unusual Event Detection Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul Gippsland School of Information Technology, Monash University, Victoria 3842, Australia Email: {Mahfuzul.Haque, Manzur.Murshed, Manoranjan.Paul}@infotech.monash.edu.au 1 Abstract The goal of this research project is to develop intelligent software that can see and detect unusual events from surveillance video stream. As the growing number of security camera is challenging the reliability of existing security systems which are still relying on human monitors, this project exploits computer vision and artificial intelligence for developing intelligent security application that can aid human monitors taking early actions against malicious events. 2 Motivation 5 Event Detection Frame # 1 6 Frame # 75 Frame # 150 Frame # 225 Frame # 300 Performance Evaluation First Frame Test Frame Ideal Result Actual Result Image source: http://www.alert-sec.co.uk/Images/control_room.jpg Security control room: too many cameras, too many screens! 3 Foreground Region Detection Background Model Current Scene Foreground Region First, active foreground regions are separated using an adaptive model of the scene background [1][2], and then scene level features are extracted from those regions. 4 7 The Application 8 References Temporal Feature Analysis Total Foreground Area (%) Frame # 1 Frame # 75 Frame # 150 Frame # 225 Frame # 300 Total 270 temporal features are computed from the time varying scene level features. Finally, top ranked features are mapped to high level event models. Observed Data Smoothed Data Time [1] Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul, On Stable Dynamic Background Generation Technique using Gaussian Mixture Models for Robust Object Detection, IEEE International Conference On Advanced Video and Signal Based Surveillance (AVSS), New Mexico, USA, 2008. [2] Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul, Improved Gaussian Mixtures for Robust Object Detection by Adaptive Multi-Background Generation, International Conference on Pattern Recognition (ICPR), Tampa, Florida, USA, 2008.