SlideShare a Scribd company logo
1 of 1
Download to read offline
Intelligent Security
Application for Unusual Event Detection
Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul
Gippsland School of Information Technology, Monash University, Victoria 3842, Australia
Email: {Mahfuzul.Haque, Manzur.Murshed, Manoranjan.Paul}@infotech.monash.edu.au

1

Abstract
The goal of this research project is to develop intelligent software that can see and detect unusual events from
surveillance video stream. As the growing number of security camera is challenging the reliability of existing security
systems which are still relying on human monitors, this project exploits computer vision and artificial intelligence for
developing intelligent security application that can aid human monitors taking early actions against malicious events.

2

Motivation

5

Event Detection

Frame # 1

6

Frame # 75

Frame # 150

Frame # 225

Frame # 300

Performance Evaluation
First Frame

Test Frame

Ideal Result

Actual Result

Image source: http://www.alert-sec.co.uk/Images/control_room.jpg

Security control room: too many cameras, too many screens!

3

Foreground Region Detection
Background
Model

Current Scene

Foreground Region

First, active foreground regions are separated using an adaptive model of
the scene background [1][2], and then scene level features are extracted
from those regions.

4

7

The Application

8

References

Temporal Feature Analysis

Total Foreground Area (%)

Frame # 1

Frame # 75

Frame # 150

Frame # 225

Frame # 300

Total 270 temporal features are computed
from the time varying scene level features.
Finally, top ranked features are mapped to
high level event models.
Observed Data
Smoothed Data

Time

[1] Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul, On Stable Dynamic Background
Generation Technique using Gaussian Mixture Models for Robust Object Detection, IEEE
International Conference On Advanced Video and Signal Based Surveillance (AVSS), New Mexico,
USA, 2008.
[2] Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul, Improved Gaussian Mixtures for
Robust Object Detection by Adaptive Multi-Background Generation, International Conference
on Pattern Recognition (ICPR), Tampa, Florida, USA, 2008.

More Related Content

What's hot

A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systemsijsrd.com
 
Researchers create 'self aware' algorithm to ward off hacking attempts
Researchers create 'self aware' algorithm to ward off hacking attemptsResearchers create 'self aware' algorithm to ward off hacking attempts
Researchers create 'self aware' algorithm to ward off hacking attemptsRoen Branham
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Hai Nguyen
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkGauthamSK4
 
Cognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureCognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureSparkCognition
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superwormUltraUploader
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle PatternsIRJET Journal
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityIRJET Journal
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity InnovationPete Burnap
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET Journal
 
Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004Anton Chuvakin
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesRaja Ram
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET Journal
 
Analyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testingAnalyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testingEngr Md Yusuf Miah
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 

What's hot (18)

A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systems
 
Researchers create 'self aware' algorithm to ward off hacking attempts
Researchers create 'self aware' algorithm to ward off hacking attemptsResearchers create 'self aware' algorithm to ward off hacking attempts
Researchers create 'self aware' algorithm to ward off hacking attempts
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Cognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureCognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecure
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
 
Alive 2016
Alive 2016Alive 2016
Alive 2016
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
 
IET SSCS 2018
IET SSCS 2018IET SSCS 2018
IET SSCS 2018
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
 
Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
Analyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testingAnalyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testing
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 

Viewers also liked

Comprar electrodomésticos
Comprar electrodomésticosComprar electrodomésticos
Comprar electrodomésticostiendaazul11
 
Life Lessons Learned While Job Searcing
Life Lessons Learned While Job SearcingLife Lessons Learned While Job Searcing
Life Lessons Learned While Job SearcingStefan Talley
 
Kulturne potrebe zadra – sociološko istraživanje public24042015
Kulturne potrebe zadra – sociološko istraživanje public24042015Kulturne potrebe zadra – sociološko istraživanje public24042015
Kulturne potrebe zadra – sociološko istraživanje public24042015Krešimir Krolo
 
Oss 2009- How Open Source Software Can Save the ICT Industry
Oss 2009- How Open Source Software Can Save the ICT IndustryOss 2009- How Open Source Software Can Save the ICT Industry
Oss 2009- How Open Source Software Can Save the ICT Industrysayanc
 
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდებაenuqishvili
 
Mal-material açiqlamasi1
Mal-material açiqlamasi1Mal-material açiqlamasi1
Mal-material açiqlamasi1Elnur Ahmedov
 
Poster: EII Workshop 2007
Poster: EII Workshop 2007Poster: EII Workshop 2007
Poster: EII Workshop 2007Mahfuzul Haque
 
Vállalkozz okosan profitálj biztosan
Vállalkozz okosan profitálj biztosanVállalkozz okosan profitálj biztosan
Vállalkozz okosan profitálj biztosanOrsolya Turay
 
TOSHIBA Consumer/Household Batteries
TOSHIBA Consumer/Household BatteriesTOSHIBA Consumer/Household Batteries
TOSHIBA Consumer/Household BatteriesSYSTEMS SUNLIGHT S.A.
 
Tricolich Fedor Victorovich
Tricolich Fedor VictorovichTricolich Fedor Victorovich
Tricolich Fedor Victorovichprosvsports
 
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본Myeongnyun Mission Church
 
Vitamins (sp13 bty-001) ppt
Vitamins (sp13 bty-001) pptVitamins (sp13 bty-001) ppt
Vitamins (sp13 bty-001) pptZohaib HUSSAIN
 

Viewers also liked (17)

Comprar electrodomésticos
Comprar electrodomésticosComprar electrodomésticos
Comprar electrodomésticos
 
Life Lessons Learned While Job Searcing
Life Lessons Learned While Job SearcingLife Lessons Learned While Job Searcing
Life Lessons Learned While Job Searcing
 
Kulturne potrebe zadra – sociološko istraživanje public24042015
Kulturne potrebe zadra – sociološko istraživanje public24042015Kulturne potrebe zadra – sociološko istraživanje public24042015
Kulturne potrebe zadra – sociološko istraživanje public24042015
 
"><img src="x">
"><img src="x">"><img src="x">
"><img src="x">
 
Oss 2009- How Open Source Software Can Save the ICT Industry
Oss 2009- How Open Source Software Can Save the ICT IndustryOss 2009- How Open Source Software Can Save the ICT Industry
Oss 2009- How Open Source Software Can Save the ICT Industry
 
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება
10 ცხოველი, რომელიც 2020 წლამდე გადაშენდება
 
Mal-material açiqlamasi1
Mal-material açiqlamasi1Mal-material açiqlamasi1
Mal-material açiqlamasi1
 
Poster: EII Workshop 2007
Poster: EII Workshop 2007Poster: EII Workshop 2007
Poster: EII Workshop 2007
 
Vállalkozz okosan profitálj biztosan
Vállalkozz okosan profitálj biztosanVállalkozz okosan profitálj biztosan
Vállalkozz okosan profitálj biztosan
 
TOSHIBA Consumer/Household Batteries
TOSHIBA Consumer/Household BatteriesTOSHIBA Consumer/Household Batteries
TOSHIBA Consumer/Household Batteries
 
Wakala
WakalaWakala
Wakala
 
Tricolich Fedor Victorovich
Tricolich Fedor VictorovichTricolich Fedor Victorovich
Tricolich Fedor Victorovich
 
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본
20131229 주일예배, 사61장01 11절, 하나님의 은혜의 해 요약본
 
Vitamins (sp13 bty-001) ppt
Vitamins (sp13 bty-001) pptVitamins (sp13 bty-001) ppt
Vitamins (sp13 bty-001) ppt
 
Palermo
PalermoPalermo
Palermo
 
Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015
Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015
Talk by Lindsey Collumbell to Junior PR professionals, 13th May 2015
 
Ppt it
Ppt itPpt it
Ppt it
 

Similar to Poster: Monash Research Month 2009

ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksIRJET Journal
 
Cyber threat detection by siem tools
Cyber threat detection by siem toolsCyber threat detection by siem tools
Cyber threat detection by siem toolsmrigakshi goel
 
Poster: Monash Research Month 2008
Poster: Monash Research Month 2008Poster: Monash Research Month 2008
Poster: Monash Research Month 2008Mahfuzul Haque
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...IJECEIAES
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Venkat Projects
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptxMathanE5
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET Journal
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...IJECEIAES
 
Motion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyMotion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyIRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET Journal
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET Journal
 
BE-EEE-8th sem-Presentation Artificial intelligence in security managenent
BE-EEE-8th sem-Presentation Artificial intelligence in security managenentBE-EEE-8th sem-Presentation Artificial intelligence in security managenent
BE-EEE-8th sem-Presentation Artificial intelligence in security managenentMOHAMMED SAQIB
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationIRJET Journal
 
Poster_PamelaDempster_40096050
Poster_PamelaDempster_40096050Poster_PamelaDempster_40096050
Poster_PamelaDempster_40096050Pamela Dempster
 
Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...IAESIJAI
 
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptxIntroduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptxMkknowledgehub
 

Similar to Poster: Monash Research Month 2009 (20)

ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
 
Cyber threat detection by siem tools
Cyber threat detection by siem toolsCyber threat detection by siem tools
Cyber threat detection by siem tools
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
Poster: Monash Research Month 2008
Poster: Monash Research Month 2008Poster: Monash Research Month 2008
Poster: Monash Research Month 2008
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptx
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 
Motion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyMotion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- Survey
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
 
BE-EEE-8th sem-Presentation Artificial intelligence in security managenent
BE-EEE-8th sem-Presentation Artificial intelligence in security managenentBE-EEE-8th sem-Presentation Artificial intelligence in security managenent
BE-EEE-8th sem-Presentation Artificial intelligence in security managenent
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
 
Poster_PamelaDempster_40096050
Poster_PamelaDempster_40096050Poster_PamelaDempster_40096050
Poster_PamelaDempster_40096050
 
Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...
 
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptxIntroduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
Introduction-to-Theft-Automatic-Detection-IoT-Project (1).pptx [Repaired].pptx
 

More from Mahfuzul Haque

Dependency inversion using ports and adapters
Dependency inversion using ports and adaptersDependency inversion using ports and adapters
Dependency inversion using ports and adaptersMahfuzul Haque
 
Resilient machine learning systems for health analytics
Resilient machine learning systems for health analyticsResilient machine learning systems for health analytics
Resilient machine learning systems for health analyticsMahfuzul Haque
 
Talk 2011-buet-perception-event
Talk 2011-buet-perception-eventTalk 2011-buet-perception-event
Talk 2011-buet-perception-eventMahfuzul Haque
 
Talk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detectionTalk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detectionMahfuzul Haque
 
Talk 2009-monash-seminar-perception
Talk 2009-monash-seminar-perceptionTalk 2009-monash-seminar-perception
Talk 2009-monash-seminar-perceptionMahfuzul Haque
 
Talk 2009-monash-seminar-intelligent-video-surveillance
Talk 2009-monash-seminar-intelligent-video-surveillanceTalk 2009-monash-seminar-intelligent-video-surveillance
Talk 2009-monash-seminar-intelligent-video-surveillanceMahfuzul Haque
 
Talk 2009-monash-open-day-surveillance
Talk 2009-monash-open-day-surveillanceTalk 2009-monash-open-day-surveillance
Talk 2009-monash-open-day-surveillanceMahfuzul Haque
 
Talk 2007-monash-seminar-behavior-recognition-framework
Talk 2007-monash-seminar-behavior-recognition-frameworkTalk 2007-monash-seminar-behavior-recognition-framework
Talk 2007-monash-seminar-behavior-recognition-frameworkMahfuzul Haque
 
Kb behaviour-recognition
Kb behaviour-recognitionKb behaviour-recognition
Kb behaviour-recognitionMahfuzul Haque
 
Talk 2012-icmew-perception
Talk 2012-icmew-perceptionTalk 2012-icmew-perception
Talk 2012-icmew-perceptionMahfuzul Haque
 
Poster: Monash Research Month 2007
Poster: Monash Research Month 2007Poster: Monash Research Month 2007
Poster: Monash Research Month 2007Mahfuzul Haque
 
Poster: EII Winter School 2007
Poster: EII Winter School 2007Poster: EII Winter School 2007
Poster: EII Winter School 2007Mahfuzul Haque
 

More from Mahfuzul Haque (19)

Dependency inversion using ports and adapters
Dependency inversion using ports and adaptersDependency inversion using ports and adapters
Dependency inversion using ports and adapters
 
Resilient machine learning systems for health analytics
Resilient machine learning systems for health analyticsResilient machine learning systems for health analytics
Resilient machine learning systems for health analytics
 
Talk 2012-icmew-event
Talk 2012-icmew-eventTalk 2012-icmew-event
Talk 2012-icmew-event
 
Talk 2011-buet-perception-event
Talk 2011-buet-perception-eventTalk 2011-buet-perception-event
Talk 2011-buet-perception-event
 
Talk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detectionTalk 2010-monash-seminar-panic-driven-event-detection
Talk 2010-monash-seminar-panic-driven-event-detection
 
Talk 2009-monash-seminar-perception
Talk 2009-monash-seminar-perceptionTalk 2009-monash-seminar-perception
Talk 2009-monash-seminar-perception
 
Talk 2009-monash-seminar-intelligent-video-surveillance
Talk 2009-monash-seminar-intelligent-video-surveillanceTalk 2009-monash-seminar-intelligent-video-surveillance
Talk 2009-monash-seminar-intelligent-video-surveillance
 
Talk 2009-monash-open-day-surveillance
Talk 2009-monash-open-day-surveillanceTalk 2009-monash-open-day-surveillance
Talk 2009-monash-open-day-surveillance
 
Talk 2007-monash-seminar-behavior-recognition-framework
Talk 2007-monash-seminar-behavior-recognition-frameworkTalk 2007-monash-seminar-behavior-recognition-framework
Talk 2007-monash-seminar-behavior-recognition-framework
 
Kb hmm
Kb hmmKb hmm
Kb hmm
 
Kb gait-recognition
Kb gait-recognitionKb gait-recognition
Kb gait-recognition
 
Kb behaviour-recognition
Kb behaviour-recognitionKb behaviour-recognition
Kb behaviour-recognition
 
Talk 2012-icmew-perception
Talk 2012-icmew-perceptionTalk 2012-icmew-perception
Talk 2012-icmew-perception
 
Poster: Monash Research Month 2007
Poster: Monash Research Month 2007Poster: Monash Research Month 2007
Poster: Monash Research Month 2007
 
Poster: ICPR 2008
Poster: ICPR 2008Poster: ICPR 2008
Poster: ICPR 2008
 
Poster: ICME 2010
Poster: ICME 2010Poster: ICME 2010
Poster: ICME 2010
 
Poster: EII Winter School 2007
Poster: EII Winter School 2007Poster: EII Winter School 2007
Poster: EII Winter School 2007
 
Poster: AVSS 2012
Poster: AVSS 2012Poster: AVSS 2012
Poster: AVSS 2012
 
Poster: MMSP 2008
Poster: MMSP 2008Poster: MMSP 2008
Poster: MMSP 2008
 

Recently uploaded

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Poster: Monash Research Month 2009

  • 1. Intelligent Security Application for Unusual Event Detection Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul Gippsland School of Information Technology, Monash University, Victoria 3842, Australia Email: {Mahfuzul.Haque, Manzur.Murshed, Manoranjan.Paul}@infotech.monash.edu.au 1 Abstract The goal of this research project is to develop intelligent software that can see and detect unusual events from surveillance video stream. As the growing number of security camera is challenging the reliability of existing security systems which are still relying on human monitors, this project exploits computer vision and artificial intelligence for developing intelligent security application that can aid human monitors taking early actions against malicious events. 2 Motivation 5 Event Detection Frame # 1 6 Frame # 75 Frame # 150 Frame # 225 Frame # 300 Performance Evaluation First Frame Test Frame Ideal Result Actual Result Image source: http://www.alert-sec.co.uk/Images/control_room.jpg Security control room: too many cameras, too many screens! 3 Foreground Region Detection Background Model Current Scene Foreground Region First, active foreground regions are separated using an adaptive model of the scene background [1][2], and then scene level features are extracted from those regions. 4 7 The Application 8 References Temporal Feature Analysis Total Foreground Area (%) Frame # 1 Frame # 75 Frame # 150 Frame # 225 Frame # 300 Total 270 temporal features are computed from the time varying scene level features. Finally, top ranked features are mapped to high level event models. Observed Data Smoothed Data Time [1] Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul, On Stable Dynamic Background Generation Technique using Gaussian Mixture Models for Robust Object Detection, IEEE International Conference On Advanced Video and Signal Based Surveillance (AVSS), New Mexico, USA, 2008. [2] Mahfuzul Haque, Manzur Murshed, and Manoranjan Paul, Improved Gaussian Mixtures for Robust Object Detection by Adaptive Multi-Background Generation, International Conference on Pattern Recognition (ICPR), Tampa, Florida, USA, 2008.