Video Anomaly Identification [ a Statistical Approach ]

T his article describes a family of unsupervised approaches to video anomaly detection based on statistical activity analysis. Approaches based on activity analysis provide intriguing possibilities for region-of-interest (ROI) processing since relevant activities and their locations are detected prior to higher-level processing such as object tracking, tagging , and classification. This strategy is essential for scalability of video analysis to cluttered environments with a multitude of objects and activities. Activity analysis approaches typically do not involve object tracking, and yet they inherently account for spatiotem-poral dependencies. They are robust to clutter arising from multiple activities and contamination arising from poor background subtraction or occlusions. They can sometimes also be employed for fusing activities from multiple cameras. We illustrate successful application of activity analysis to anomaly detection in various scenarios, including the detection of abandoned objects, crowds of people, and illegal U-turns. INTRODUCTION Video camera networks are ubiquitous. Over 30 million cameras produce close to 4 billion hours of video footage per week in the United States alone [1]. This proliferation is taking place since, unlike other sensing modalities, visible-light cameras provide excellent space-time resolution, long capture range, wide field of view, and low latency. Consequently, large-scale camera networks can provide pervasive, wide-area monitoring to protect national infrastructures. Such a protection necessitates careful video analysis in suitable data space (such as pho-tometric, behavior, and attitude) and with appropriate objectives, from counting objects and object localization to identifying suspicious movement of people or assets. Our focus in this article is on identifying anomalous activity in space and time. Currently, this type of video analysis

[1]  W. Eric L. Grimson,et al.  Unsupervised Activity Perception in Crowded and Complicated Scenes Using Hierarchical Bayesian Models , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  M. Shah,et al.  Abnormal crowd behavior detection using social force model , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[3]  Jung-Hwan Oh,et al.  Real Time Video Data Mining for Surveillance Video Streams , 2003, PAKDD.

[4]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[5]  Kevin Smith,et al.  Detecting Abandoned Luggage Items in a Public Space , 2006 .

[6]  Rama Chellappa,et al.  "Shape Activity": a continuous-state HMM for moving/deforming shapes with application to abnormal activity detection , 2005, IEEE Transactions on Image Processing.

[7]  Venkatesh Saligrama,et al.  Motion segmentation and abnormal behavior detection via behavior clustering , 2008, 2008 15th IEEE International Conference on Image Processing.

[8]  Michal Irani,et al.  Detecting Irregularities in Images and in Video , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[9]  Venkatesh Saligrama,et al.  Motion detection with an unstable camera , 2008, 2008 15th IEEE International Conference on Image Processing.

[10]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[11]  Christophe De Vleeschouwer,et al.  Visual event recognition using decision trees , 2010, Multimedia Tools and Applications.

[12]  Andrew J. Bulpitt,et al.  Learning spatio-temporal patterns for predicting object behaviour , 2000, Image Vis. Comput..

[13]  Tieniu Tan,et al.  A survey on visual surveillance of object motion and behaviors , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[14]  Mubarak Shah,et al.  Probabilistic Modeling of Scene Dynamics for Applications in Visual Surveillance , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[15]  Christopher S. Madden,et al.  A framework for determining overlap in large scale networks , 2009, 2009 Third ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC).

[16]  Ehud Rivlin,et al.  Robust Real-Time Unusual Event Detection using Multiple Fixed-Location Monitors , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  K. Grauman,et al.  Observe locally, infer globally: A space-time MRF for detecting abnormal activities with incremental updates , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[18]  Lawrence Carin,et al.  Infinite Hidden Markov Models for Unusual-Event Detection in Video , 2008, IEEE Transactions on Image Processing.

[19]  Kuntal Sengupta,et al.  Framework for real-time behavior interpretation from traffic video , 2005, IEEE Transactions on Intelligent Transportation Systems.

[20]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[21]  Mubarak Shah,et al.  A differential geometric approach to representing the human actions , 2008, Comput. Vis. Image Underst..

[22]  Zhanyi Hu,et al.  Pointwise Motion Image (PMI): A Novel Motion Representation and Its Applications to Abnormality Detection and Behavior Recognition , 2009, IEEE Trans. Circuits Syst. Video Technol..

[23]  Venkatesh Saligrama,et al.  Behavior Subtraction , 2012, IEEE Transactions on Image Processing.

[24]  Christophe Rosenberger,et al.  Abnormal events detection based on spatio-temporal co-occurences , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[25]  Trista Pei-chun Chen,et al.  Computer Vision Workload Analysis: Case Study of Video Surveillance Systems , 2005 .

[26]  Venkatesh Saligrama,et al.  Activity Based Matching in Distributed Camera Networks , 2010, IEEE Transactions on Image Processing.

[27]  Ronen Basri,et al.  Actions as space-time shapes , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[28]  Wolfram Burgard,et al.  Utilizing Learned Motion Patterns to Robustly Track Persons , 2003 .

[29]  Kuo-Chin Fan,et al.  Carried Object Detection Using Ratio Histogram and its Application to Suspicious Event Analysis , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[30]  Venkatesh Saligrama,et al.  Foreground-Adaptive Background Subtraction , 2009, IEEE Signal Processing Letters.

[31]  Gian Luca Foresti,et al.  Trajectory-Based Anomalous Event Detection , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[32]  Zhaolin Cheng,et al.  Calibrating Distributed Camera Networks , 2008, Proceedings of the IEEE.

[33]  Alex Pentland,et al.  A Bayesian Computer Vision System for Modeling Human Interactions , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[34]  Lifeng Sun,et al.  A Sequential Monte Carlo Approach to Anomaly Detection in Tracking Visual Events , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[35]  Shaogang Gong,et al.  Video Behavior Profiling for Anomaly Detection , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[36]  David C. Hogg,et al.  Learning the Distribution of Object Trajectories for Event Recognition , 1995, BMVC.

[37]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[38]  W. Eric L. Grimson,et al.  Learning Patterns of Activity Using Real-Time Tracking , 2000, IEEE Trans. Pattern Anal. Mach. Intell..