A Preliminary Study on Deep-Learning Based Screaming Sound Detection

In addition to the traditional video surveillance, various audio processing techniques can also be added to the existing CCTV cameras. They can be used as additional features to help in analyzing the scene better and autonomously detecting violence or any unwanted activity in the scene. For this purpose, a deep learning based scream sound detection approach is proposed in this paper. MFCC features after interpolation are used as input of the system. The proposed system is experimented using a self-recorded scream database and with controlled and calculated parameters 100 % accuracy is achieved.

[1]  Haizhou Li,et al.  Scream detection for home applications , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.

[2]  Luca Maria Gambardella,et al.  Deep, Big, Simple Neural Nets for Handwritten Digit Recognition , 2010, Neural Computation.

[3]  Yoshua Bengio,et al.  Exploring Strategies for Training Deep Neural Networks , 2009, J. Mach. Learn. Res..

[4]  Chai Wutiwiwatchai,et al.  Thai polysyllabic word recognition using fuzzy-neural network , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[5]  Chai Wutiwiwatchai,et al.  Text-dependent speaker identification using neural network on distinctive Thai tone marks , 1999, IJCNN'99. International Joint Conference on Neural Networks. Proceedings (Cat. No.99CH36339).

[6]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[7]  Chai Wutiwiwatchai,et al.  Thai Text-Dependent Speaker Identification by ANN with Two Different Time Normalization Techniques , 2022 .

[8]  Luca Maria Gambardella,et al.  Deep Big Simple Neural Nets Excel on Handwritten Digit Recognition , 2010, ArXiv.

[9]  Seok-Pil Lee,et al.  Analysis on Scream and Ambient Noise for Security System with Audio Capability , 2014 .

[10]  Karsten P. Ulland,et al.  Vii. References , 2022 .

[11]  Geoffrey E. Hinton,et al.  Deep Boltzmann Machines , 2009, AISTATS.

[12]  Pascal Vincent,et al.  Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Chang-Soo Kim,et al.  An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control , 2012 .