Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X 2011
DOI: 10.1117/12.884579
|View full text |Cite
|
Sign up to set email alerts
|

Increasing the security at vital infrastructures: automated detection of deviant behaviors

Abstract: This paper discusses the decomposition of hostile intentions into abnormal behaviors. A list of such behaviors has been compiled for the specific case of public transport. Some of the deviant behaviors are hard to observe by people, as they are in the midst of the crowd. Examples are deviant walking patterns, prohibited actions such as taking photos and waiting without taking the train. We discuss our visual analytics algorithms and demonstrate them on CCTV footage from the Amsterdam train station.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…Choosing the threshold is not part of the responsibilities of the algorithm, and may be difficult to choose in practice, since most real world data is unlikely to be distributed homogeneously. 5 A difference in local densities may suggest different thresholds, as is depicted in Figure 2.…”
Section: Fixed or Dynamic Thresholdmentioning
confidence: 99%
See 1 more Smart Citation
“…Choosing the threshold is not part of the responsibilities of the algorithm, and may be difficult to choose in practice, since most real world data is unlikely to be distributed homogeneously. 5 A difference in local densities may suggest different thresholds, as is depicted in Figure 2.…”
Section: Fixed or Dynamic Thresholdmentioning
confidence: 99%
“…In section 4 we will first show results of a synthetic experiment, after which we evaluate behavior detected from video data in order to find anomalous actions. Finally in section 5 we will discuss what we can learn from this, and consider future work. …”
Section: Introductionmentioning
confidence: 99%
“…It consists of five building blocks (see figure 2): visual processing, fusion engine, event description, action classifier, and the description generator. The visual processing [14] incorporates three steps. First the extraction of meaningful objects and their properties from video by (1) detection of moving objects [15], (2) a trained object detector for specific classes like persons and cars [16,17], and (3) computation of other features (e.g.…”
Section: System Overviewmentioning
confidence: 99%
“…The visual processing [7] of a scene starts with the detection of meaningful objects and their properties. The detection of objects is performed in two ways.…”
Section: Visual Processingmentioning
confidence: 99%