SlideShare a Scribd company logo
1 of 19
Carried out by:
Likhitha S (1GG20CS015)
Navyashree P (1GG20CS023)
Pragathi G S (1GG21CS414)
Sindhu K L (1GG21CS419)
DEPARTMENT OF CSE
VII SEM
PROJECT PHASE – I SEMINAR
ON
Suspicious Activity Detection Using-AI &ML
Under the Guidence of:
Dr. Vasanth G
Professor and HOD
Department of CSE
1
GOVERNMENT ENGINEERING COLLEGE
CONTENTS
 Abstract
 Introduction
 System Requirements
 Literature review
 Problem Identification
 Objectives
 System Design
 Conclusion
 References
14 January 2021 Dept.of CSE,GECR 2
ABSTRACT
14 DECEMBER 2023 Dept.of CSE,GECR 3
•Suspicious human activity recognition from surveillance video is an active research area of
image processing and computer vision.
•Through the visual surveillance, human activities can be monitored in sensitive and public
areas such as stations, airports, school and colleges, roads, etc. to prevent terrorism, theft,
accidents and illegal parking, vandalism, fighting, chain snatching, crime and other suspicious
activities.
•It is very difficult to watch public places continuously, therefore an intelligent video
surveillance is required that can monitor the human activities in real-time and categorize them
as usual and unusual activities; and can generate an alert.
INTRODUCTION
 Suspicious activity detection involves the use of algorithms and technologies to identify
behavior or events that deviate from normal patterns, indicating potential threats or illgal
actions.
 This can apply to various domains, such as cybersecurity, finance, or surveillance.
Techniques include anomaly detection, machine learning, and pattern recognition to flag
activities that might be indicative of fraud, security breaches, or other unauthorized actions.
 The goal is to enhance proactive monitoring and security measures by quickly identifying
and responding to potentially harmful activities.
14 DECEMBER 2023 Dept.Of CSE,GECR 4
INTRODUCTION OF PROJECT
 Suspicious Human Activity Recognition from Video Surveillance is an active research area of image
processing and computer vision which involves recognition of human activity and categorizes them into
normal and abnormal activities.
 Abnormal activities are the unusual or suspicious activities rarely performed by the human at public
places, such as left luggage for explosive attacks, theft, running crowd, fights and attacks, vandalism and
crossing borders.
 Normal activities are the usual activities performed by the human at public places, such as running,
boxing, jogging and walking, hand waving and clapping. Now-a-days, use of video surveillance is
increasing day by day to monitor the human activity which prevents the suspicious activities of the
human.
14 DECEMBER 2023 Dept.Of CSE,GECR 5
SYSTEM REQUIREMENTS
 O/S : Windows 7.
 Language : Python
 Front End : Anaconda Navigator –
Spyder
14 DECEMBER 2023 Dept.Of CSE,GECR 6
 System : Pentium IV 2.4 GHz
 Hard Disk : 200 GB
 Ram : 4GB
HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTS
14 DECEMBER 2023 Dept.Of CSE,GECR 7
LITERATURE REVIEW
YEAR TITLE AUTHOR ABSTRACT LIMITATIONS
2022 Suspicious
activity detection
from video
surveillance
K. Kranthi Kumar , B.
Hema Kumari , T.
Saikumar , U. Sridhar
, G. Srinivas , G. Sai
Karan Reddy
With the rise in criminal activity in
urban and suburban areas, it is more
important than ever to prevent them
and detect them.
The system's storage capacity
was restricted, and it could be
used in surveillance regions
with a high-tech form of video
capture.
2021 Alert Generation
on Detection of
Suspicious
Activity Using
Transfer
Learning
Om M. Rajpurkar,
Siddesh S. Kamble,
Jayram P. Nandagiri
and Anant V. Nimkar
The goal of this paper is to identify
suspicious activity for Surveillance and
alert the shop owners when suspicious
activity is detected.
The behavior is not sufficient
criteria for alerting the owner
of shoplifters, robbers and
break-in in the store.
2021 Suspicious Action
Detection in
Intelligent
Surveillance
System
Manisha Mudgal,
Deepika Punj and
Anuradha Pillai
For a human it is very difficult
to monitor surveillance videos
continually, therefore a smart and
intelligent system is required that can
do real time monitoring of all activities
Sometimes video with
complex background takes
more time in processing and
tracking of object may take
time.
14 DECEMBER 2023 Dept.Of CSE,GECR 8
YEAR TITLE AUTHOR ABSTRACT LIMITATIONS
2021 Interactive Video
Surveillance as an
Edge Service Using
Unsupervised
Feature Queries
Seyed Yahya
Nikouei, Yu Chen ,
Alex J. Aved ,
and Erik Blasch
This article proposes
interactive video surveillance
as an edge service (I-ViSE)
based on unsupervised
feature queries.
The operators may not be always
able to provide simple, concise, and
accurate queries.
2020 An Ensemble
Framework for
Anomaly Detection
in Surveillance
Videos
Yumna Zahid ,
Muhammad Atif
Tahir , Nouman M.
Durrani
Anomaly detection
has shown promising
applications for suspicious
activity detection.
Does not quantify precise
classication of the anomaly,
especially for suspicious activity.
2020 Deep Learning
Approach for
Suspicious Activity
Detection from
Surveillance Video
Amrutha C.V, C.
Jyotsna, Amudha J.
Deep learning approach
is used to detect suspicious or
normal activity.
It greatly affects
the efficiency of the system.
14 DECEMBER 2023 Dept.Of CSE,GECR 9
YEAR TITLE AUTHOR ABSTRACT LIMITATIONS
2020 Unusual Crowd Activity
Detection
Arun Kumar
Jhapate ,
Sunil Malviya
,and
Monika Jhapate
The system focuses on
recognizing suspicious
activities and target to achieve
a technique which is able to
detect suspicious activity.
Multi user action cannot be
recognized by this system,
moreover it is difficult for the
system to recognize group or
crowd based activities.
2019 Automated Invigilation
System for Detection of
Suspicious
Activities during
Examination
Md Adil, Rajbala
Simon, Sunil
Kumar Khatri
This system model will use
automated video as feed to
monitor students activities
during examination in real-
time
It requires multiple camera
in the classroom from
different angle for
surveillance
2017 Suspicious human activity
recognition: a review
Rajesh Kumar
Tripathi1,Anand
Singh Jalal1 .
It include a brief introduction
of the suspicious human
activity recognition
with its issues and challenges.
The disadvantage being
obtrusive and restrict user’s
movement
14 DECEMBER 2023 Dept.Of CSE,GECR 10
PROBLEM STATEMENT
• Activity detection is a critical component of video surveillance systems. These operators
keep an eye on numerous displays at once, looking for unusual activity.
•Multiple screens cannot be monitored by a human operator at the same time. As a result,
obtaining timely and reliable activity data becomes extremely challenging. This is why we
require an automated method, and the suspicious activity detection system has provided us
with the ideal option.
•Suspicious activity detection systems based on video can either replace or assist human
operators in monitoring odd behavior. They get a quick and precise answer from the system.
EXISTING SYSTEM
14 DECEMBER 2023 Dept.Of CSE,GECR 11
•In existing system, Suspicious Human Activity Recognition for Video Surveillance System, we
detected cheating activities in examination hall. We used SURF (Speed Up Robust Features) to
extract interest points, and use SURF method to match and find the corresponding features.
• We used some algorithms to classify the suspicious activities.
•We also use Viola Jones object detectors for finding the faces and labelling the activities. We also
use tracking algorithms to track detectors in the input video. The proposed techniques use fast
detectors and they are robust.
•In addition to the detectors and tracking algorithms, we used text labelling to avoid false
classification, if detectors and tracking algorithms fail to track the faces.
PROPOSED SYSTEM
 In proposed system, the suspicious activity video image dataset was taken as input. Then, we have to
implement the pre-processing step. In this step, we have to resize the original image as well as grey scale
conversion. After that, we have to extract the features from the pre-processed image by local binary pattern
(LBP).
 Then, we have to implement the image splitting such as test and train. Test is used for predicting and train is
used for evaluating the model.
 After that, we have to implement the deep and machine learning algorithm such as Convolutional Neural
Network and RF. The experimental results shows that some performance metrics such as accuracy, loss value
and detect or classify the different types of activities.
14 DECEMBER 2023 Dept.Of CSE,GECR 12
OBJECTIVES
14 DECEMBER 2023 Dept.Of CSE,GECR 13
The main objective of our process is,
•To recognize or to classify the suspicious activity effectively.
•To implement the different classification algorithms.
•To enhance the overall performance for classification algorithms.
•To visualize the graph.
SYSTEM ARCHITECTURE &
DESIGN
14 DECEMBER 2023 Dept.Of CSE,GECR 14
Suspicious
Dataset
Input Video
Resize
Gray scale
Preprocessing
Feature Extraction LBP
Image Splitting
Train
Test
Classification CNN
RF
Performance
Accuracy
Error rate
Recognition Suspicious Activity
ADVANTAGES
 It is efficient for large number of datasets.
 Time consumption is low.
 The prediction is efficient when compared with existing.
 Easy to detect illigal activities.
14 DECEMBER 2023 Dept.Of CSE,GECR 15
14 DECEMBER 2023 Dept.Of CSE,GECR 16
EXPECTED OUTCOMES
•In existing system, Suspicious Human Activity Recognition for Video Surveillance System, we detected
cheating activities in examination hall. We used SURF (Speed Up Robust Features) to extract interest
points, and use SURF method to match and find the corresponding features.
• We used some algorithms to classify the suspicious activities.
•We also use Viola Jones object detectors for finding the faces and labelling the activities. We also use
tracking algorithms to track detectors in the input video. The proposed techniques use fast detectors and
they are robust.
•In addition to the detectors and tracking algorithms, we used text labelling to avoid false classification, if
detectors and tracking algorithms fail to track the faces.
CONCLUSION
14 DECEMBER 2023 Dept.Of CSE,GECR 17
•We conclude that, the video dataset was taken from dataset repository as input. We
are developed the two different classification algorithms such as CNN and RF.
•Finally, the result shows that some performance metrics such as accuracy and error
rate. Then, we are recognized the suspicious activities and compare the algorithms
based on results.
REFERENCES
 [1] A. O Oredein, “Checking Examination Malpractice in Nigerian Schools, Nigerian Journal of Educational Research
and Evaluation”, Vol: 5, No: 1, pg: 82-90, 2004.
 [2] Alexander Alahi, Raphael Ortiz, Pierre, Vandergheynst, “Fast Retina Keypoint (FREAK)”, IEEE, Computer Vision
and Pattern Recognition, pages: 510- 517, 2012.
 [3] Faisal Bashir, David Usher, Pablo Casaverde, Marc Friedman, “Video Surveillance for Biometrics: Long-Range
Multi-Biometric System, Advanced Video and Signal Based Surveillance”, AVSS ’08 IEEE Fifth International
Conference, 175-182, 2008.
 [4] Gang Yu, Junsong Yuan, Zicheng Liu, “Predicting human activities using Spatio-temporal Structure of interest
points”, ACM multimedia conference, pages: 1049-1052, 2012.
14 DECEMBER 2023 Dept.Of CSE,GECR 18
Thank You

More Related Content

Similar to SUSPICIOUS activity detection using surveillance camara.pptx

IRJET- Prediction of Anomalous Activities in a Video
IRJET-  	  Prediction of Anomalous Activities in a VideoIRJET-  	  Prediction of Anomalous Activities in a Video
IRJET- Prediction of Anomalous Activities in a VideoIRJET Journal
 
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human ActivitesIRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human ActivitesIRJET Journal
 
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...IRJET Journal
 
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceIRJET Journal
 
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET Journal
 
Background Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior DetectionBackground Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior DetectionIJERA Editor
 
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET Journal
 
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...IRJET Journal
 
Real Time Detection of Moving Object Based on Fpga
Real Time Detection of Moving Object Based on FpgaReal Time Detection of Moving Object Based on Fpga
Real Time Detection of Moving Object Based on Fpgaiosrjce
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection SystemIRJET Journal
 
A Smart Target Detection System using Fuzzy Logic and Background Subtraction
A Smart Target Detection System using Fuzzy Logic and Background SubtractionA Smart Target Detection System using Fuzzy Logic and Background Subtraction
A Smart Target Detection System using Fuzzy Logic and Background SubtractionIRJET Journal
 
IRJET- Object Detection in Real Time using AI and Deep Learning
IRJET- Object Detection in Real Time using AI and Deep LearningIRJET- Object Detection in Real Time using AI and Deep Learning
IRJET- Object Detection in Real Time using AI and Deep LearningIRJET Journal
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification ToolIRJET Journal
 
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...IRJET Journal
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET Journal
 
IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET Journal
 
Human Activity Recognition
Human Activity RecognitionHuman Activity Recognition
Human Activity RecognitionIRJET Journal
 
Deep-learning based single object tracker for night surveillance
Deep-learning based single object tracker for night surveillance  Deep-learning based single object tracker for night surveillance
Deep-learning based single object tracker for night surveillance IJECEIAES
 

Similar to SUSPICIOUS activity detection using surveillance camara.pptx (20)

IRJET- Prediction of Anomalous Activities in a Video
IRJET-  	  Prediction of Anomalous Activities in a VideoIRJET-  	  Prediction of Anomalous Activities in a Video
IRJET- Prediction of Anomalous Activities in a Video
 
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human ActivitesIRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
IRJET- Tracking and Recognition of Multiple Human and Non-Human Activites
 
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
 
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video Surveillance
 
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
 
Background Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior DetectionBackground Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior Detection
 
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET- A Review Analysis to Detect an Object in Video Surveillance System
IRJET- A Review Analysis to Detect an Object in Video Surveillance System
 
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
 
F011113741
F011113741F011113741
F011113741
 
Real Time Detection of Moving Object Based on Fpga
Real Time Detection of Moving Object Based on FpgaReal Time Detection of Moving Object Based on Fpga
Real Time Detection of Moving Object Based on Fpga
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 
A Smart Target Detection System using Fuzzy Logic and Background Subtraction
A Smart Target Detection System using Fuzzy Logic and Background SubtractionA Smart Target Detection System using Fuzzy Logic and Background Subtraction
A Smart Target Detection System using Fuzzy Logic and Background Subtraction
 
IRJET- Object Detection in Real Time using AI and Deep Learning
IRJET- Object Detection in Real Time using AI and Deep LearningIRJET- Object Detection in Real Time using AI and Deep Learning
IRJET- Object Detection in Real Time using AI and Deep Learning
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification Tool
 
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics
 
Q180305116119
Q180305116119Q180305116119
Q180305116119
 
Human Activity Recognition
Human Activity RecognitionHuman Activity Recognition
Human Activity Recognition
 
Deep-learning based single object tracker for night surveillance
Deep-learning based single object tracker for night surveillance  Deep-learning based single object tracker for night surveillance
Deep-learning based single object tracker for night surveillance
 

Recently uploaded

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 

Recently uploaded (20)

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 

SUSPICIOUS activity detection using surveillance camara.pptx

  • 1. Carried out by: Likhitha S (1GG20CS015) Navyashree P (1GG20CS023) Pragathi G S (1GG21CS414) Sindhu K L (1GG21CS419) DEPARTMENT OF CSE VII SEM PROJECT PHASE – I SEMINAR ON Suspicious Activity Detection Using-AI &ML Under the Guidence of: Dr. Vasanth G Professor and HOD Department of CSE 1 GOVERNMENT ENGINEERING COLLEGE
  • 2. CONTENTS  Abstract  Introduction  System Requirements  Literature review  Problem Identification  Objectives  System Design  Conclusion  References 14 January 2021 Dept.of CSE,GECR 2
  • 3. ABSTRACT 14 DECEMBER 2023 Dept.of CSE,GECR 3 •Suspicious human activity recognition from surveillance video is an active research area of image processing and computer vision. •Through the visual surveillance, human activities can be monitored in sensitive and public areas such as stations, airports, school and colleges, roads, etc. to prevent terrorism, theft, accidents and illegal parking, vandalism, fighting, chain snatching, crime and other suspicious activities. •It is very difficult to watch public places continuously, therefore an intelligent video surveillance is required that can monitor the human activities in real-time and categorize them as usual and unusual activities; and can generate an alert.
  • 4. INTRODUCTION  Suspicious activity detection involves the use of algorithms and technologies to identify behavior or events that deviate from normal patterns, indicating potential threats or illgal actions.  This can apply to various domains, such as cybersecurity, finance, or surveillance. Techniques include anomaly detection, machine learning, and pattern recognition to flag activities that might be indicative of fraud, security breaches, or other unauthorized actions.  The goal is to enhance proactive monitoring and security measures by quickly identifying and responding to potentially harmful activities. 14 DECEMBER 2023 Dept.Of CSE,GECR 4
  • 5. INTRODUCTION OF PROJECT  Suspicious Human Activity Recognition from Video Surveillance is an active research area of image processing and computer vision which involves recognition of human activity and categorizes them into normal and abnormal activities.  Abnormal activities are the unusual or suspicious activities rarely performed by the human at public places, such as left luggage for explosive attacks, theft, running crowd, fights and attacks, vandalism and crossing borders.  Normal activities are the usual activities performed by the human at public places, such as running, boxing, jogging and walking, hand waving and clapping. Now-a-days, use of video surveillance is increasing day by day to monitor the human activity which prevents the suspicious activities of the human. 14 DECEMBER 2023 Dept.Of CSE,GECR 5
  • 6. SYSTEM REQUIREMENTS  O/S : Windows 7.  Language : Python  Front End : Anaconda Navigator – Spyder 14 DECEMBER 2023 Dept.Of CSE,GECR 6  System : Pentium IV 2.4 GHz  Hard Disk : 200 GB  Ram : 4GB HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTS
  • 7. 14 DECEMBER 2023 Dept.Of CSE,GECR 7 LITERATURE REVIEW YEAR TITLE AUTHOR ABSTRACT LIMITATIONS 2022 Suspicious activity detection from video surveillance K. Kranthi Kumar , B. Hema Kumari , T. Saikumar , U. Sridhar , G. Srinivas , G. Sai Karan Reddy With the rise in criminal activity in urban and suburban areas, it is more important than ever to prevent them and detect them. The system's storage capacity was restricted, and it could be used in surveillance regions with a high-tech form of video capture. 2021 Alert Generation on Detection of Suspicious Activity Using Transfer Learning Om M. Rajpurkar, Siddesh S. Kamble, Jayram P. Nandagiri and Anant V. Nimkar The goal of this paper is to identify suspicious activity for Surveillance and alert the shop owners when suspicious activity is detected. The behavior is not sufficient criteria for alerting the owner of shoplifters, robbers and break-in in the store. 2021 Suspicious Action Detection in Intelligent Surveillance System Manisha Mudgal, Deepika Punj and Anuradha Pillai For a human it is very difficult to monitor surveillance videos continually, therefore a smart and intelligent system is required that can do real time monitoring of all activities Sometimes video with complex background takes more time in processing and tracking of object may take time.
  • 8. 14 DECEMBER 2023 Dept.Of CSE,GECR 8 YEAR TITLE AUTHOR ABSTRACT LIMITATIONS 2021 Interactive Video Surveillance as an Edge Service Using Unsupervised Feature Queries Seyed Yahya Nikouei, Yu Chen , Alex J. Aved , and Erik Blasch This article proposes interactive video surveillance as an edge service (I-ViSE) based on unsupervised feature queries. The operators may not be always able to provide simple, concise, and accurate queries. 2020 An Ensemble Framework for Anomaly Detection in Surveillance Videos Yumna Zahid , Muhammad Atif Tahir , Nouman M. Durrani Anomaly detection has shown promising applications for suspicious activity detection. Does not quantify precise classication of the anomaly, especially for suspicious activity. 2020 Deep Learning Approach for Suspicious Activity Detection from Surveillance Video Amrutha C.V, C. Jyotsna, Amudha J. Deep learning approach is used to detect suspicious or normal activity. It greatly affects the efficiency of the system.
  • 9. 14 DECEMBER 2023 Dept.Of CSE,GECR 9 YEAR TITLE AUTHOR ABSTRACT LIMITATIONS 2020 Unusual Crowd Activity Detection Arun Kumar Jhapate , Sunil Malviya ,and Monika Jhapate The system focuses on recognizing suspicious activities and target to achieve a technique which is able to detect suspicious activity. Multi user action cannot be recognized by this system, moreover it is difficult for the system to recognize group or crowd based activities. 2019 Automated Invigilation System for Detection of Suspicious Activities during Examination Md Adil, Rajbala Simon, Sunil Kumar Khatri This system model will use automated video as feed to monitor students activities during examination in real- time It requires multiple camera in the classroom from different angle for surveillance 2017 Suspicious human activity recognition: a review Rajesh Kumar Tripathi1,Anand Singh Jalal1 . It include a brief introduction of the suspicious human activity recognition with its issues and challenges. The disadvantage being obtrusive and restrict user’s movement
  • 10. 14 DECEMBER 2023 Dept.Of CSE,GECR 10 PROBLEM STATEMENT • Activity detection is a critical component of video surveillance systems. These operators keep an eye on numerous displays at once, looking for unusual activity. •Multiple screens cannot be monitored by a human operator at the same time. As a result, obtaining timely and reliable activity data becomes extremely challenging. This is why we require an automated method, and the suspicious activity detection system has provided us with the ideal option. •Suspicious activity detection systems based on video can either replace or assist human operators in monitoring odd behavior. They get a quick and precise answer from the system.
  • 11. EXISTING SYSTEM 14 DECEMBER 2023 Dept.Of CSE,GECR 11 •In existing system, Suspicious Human Activity Recognition for Video Surveillance System, we detected cheating activities in examination hall. We used SURF (Speed Up Robust Features) to extract interest points, and use SURF method to match and find the corresponding features. • We used some algorithms to classify the suspicious activities. •We also use Viola Jones object detectors for finding the faces and labelling the activities. We also use tracking algorithms to track detectors in the input video. The proposed techniques use fast detectors and they are robust. •In addition to the detectors and tracking algorithms, we used text labelling to avoid false classification, if detectors and tracking algorithms fail to track the faces.
  • 12. PROPOSED SYSTEM  In proposed system, the suspicious activity video image dataset was taken as input. Then, we have to implement the pre-processing step. In this step, we have to resize the original image as well as grey scale conversion. After that, we have to extract the features from the pre-processed image by local binary pattern (LBP).  Then, we have to implement the image splitting such as test and train. Test is used for predicting and train is used for evaluating the model.  After that, we have to implement the deep and machine learning algorithm such as Convolutional Neural Network and RF. The experimental results shows that some performance metrics such as accuracy, loss value and detect or classify the different types of activities. 14 DECEMBER 2023 Dept.Of CSE,GECR 12
  • 13. OBJECTIVES 14 DECEMBER 2023 Dept.Of CSE,GECR 13 The main objective of our process is, •To recognize or to classify the suspicious activity effectively. •To implement the different classification algorithms. •To enhance the overall performance for classification algorithms. •To visualize the graph.
  • 14. SYSTEM ARCHITECTURE & DESIGN 14 DECEMBER 2023 Dept.Of CSE,GECR 14 Suspicious Dataset Input Video Resize Gray scale Preprocessing Feature Extraction LBP Image Splitting Train Test Classification CNN RF Performance Accuracy Error rate Recognition Suspicious Activity
  • 15. ADVANTAGES  It is efficient for large number of datasets.  Time consumption is low.  The prediction is efficient when compared with existing.  Easy to detect illigal activities. 14 DECEMBER 2023 Dept.Of CSE,GECR 15
  • 16. 14 DECEMBER 2023 Dept.Of CSE,GECR 16 EXPECTED OUTCOMES •In existing system, Suspicious Human Activity Recognition for Video Surveillance System, we detected cheating activities in examination hall. We used SURF (Speed Up Robust Features) to extract interest points, and use SURF method to match and find the corresponding features. • We used some algorithms to classify the suspicious activities. •We also use Viola Jones object detectors for finding the faces and labelling the activities. We also use tracking algorithms to track detectors in the input video. The proposed techniques use fast detectors and they are robust. •In addition to the detectors and tracking algorithms, we used text labelling to avoid false classification, if detectors and tracking algorithms fail to track the faces.
  • 17. CONCLUSION 14 DECEMBER 2023 Dept.Of CSE,GECR 17 •We conclude that, the video dataset was taken from dataset repository as input. We are developed the two different classification algorithms such as CNN and RF. •Finally, the result shows that some performance metrics such as accuracy and error rate. Then, we are recognized the suspicious activities and compare the algorithms based on results.
  • 18. REFERENCES  [1] A. O Oredein, “Checking Examination Malpractice in Nigerian Schools, Nigerian Journal of Educational Research and Evaluation”, Vol: 5, No: 1, pg: 82-90, 2004.  [2] Alexander Alahi, Raphael Ortiz, Pierre, Vandergheynst, “Fast Retina Keypoint (FREAK)”, IEEE, Computer Vision and Pattern Recognition, pages: 510- 517, 2012.  [3] Faisal Bashir, David Usher, Pablo Casaverde, Marc Friedman, “Video Surveillance for Biometrics: Long-Range Multi-Biometric System, Advanced Video and Signal Based Surveillance”, AVSS ’08 IEEE Fifth International Conference, 175-182, 2008.  [4] Gang Yu, Junsong Yuan, Zicheng Liu, “Predicting human activities using Spatio-temporal Structure of interest points”, ACM multimedia conference, pages: 1049-1052, 2012. 14 DECEMBER 2023 Dept.Of CSE,GECR 18

Editor's Notes

  1. Prof. Savitha T, Archana M, Bhuvana A, Dharithri ISE Department,