2014
DOI: 10.1117/12.2066851
|View full text |Cite
|
Sign up to set email alerts
|

Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall

Abstract: Rest, "Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall," Proc. SPIE, Vol. 9253, (2014). http://dx.doi. org/10.1117/12.2066851 Copyright 2014 Society of Photo-Optical Instrumentation Engineers (SPIE). One print or electronic copy may be made for personal use only.Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited. Automatic d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 23 publications
0
15
0
Order By: Relevance
“…A tracker based automatic detection of suspicious behavior of pickpockets in a shopping mall related work is also been proposed in a research paper [7].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…A tracker based automatic detection of suspicious behavior of pickpockets in a shopping mall related work is also been proposed in a research paper [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the first processor, the system embarks by sending a tag request. If the vehicle carries a valid RFID tag, it sets or resets corresponding bits to the second processor [7]. After executing all these steps, it reveals the information in Liquid Crystal Display.…”
Section: Software Designmentioning
confidence: 99%
“…Using factor analysis, the essential attributes useful for describing snatch thefts are extracted and represented in the form of action-vectors. We show that action-vectors perform better than existing 1 http://www.iith.ac.in/vilg/datasets/ state-of-the-art feature descriptors while leveraging a lot of existing video data containing human actions to effectively represent snatch thefts.…”
Section: Introductionmentioning
confidence: 97%
“…Most of the existing literature on detecting anomalous activities like snatching uses datasets collected in controlled laboratory settings with no crowd or background and with an excellent viewing angle of the activity. Even when conducted in crowded scenes as in [1], the entire pickpocket incident is staged with apriori knowledge of how the incident is going to take place which makes anal-ysis a lot easier. So, to analyze real-life thefts, we present a dataset called Snatch 1.0 1 collected from unconstrained surveillance footage.…”
Section: Introductionmentioning
confidence: 99%
“…Positioning technologies are now omnipresent in mobile devices, such as smart phones, tablets, and laptops, which makes them potentially interesting for the study of behaviour in naturalistic settings. It could, for instance, be used to identify people with early warnings signs for depression ( Saeb et al, 2015 ; Palmius et al, 2017 ), partly or fully replace self-reported diaries in traffic research ( Stopher et al, 2002 ; Wolf, 2006 ; Bohte and Maat, 2009 ; Schuessler and Axhausen, 2009 ), determine how populations behave after a disaster, such as an earthquake ( Bengtsson et al, 2011 ), or to automatically detect active pickpockets in a shopping mall ( Bouma et al, 2014 ). Surprisingly, behavioural scientists have so far used positioning technologies only sparingly.…”
Section: Introductionmentioning
confidence: 99%