2017
DOI: 10.1007/s11042-017-5196-6
|View full text |Cite
|
Sign up to set email alerts
|

Motion anomaly detection and trajectory analysis in visual surveillance

Abstract: Motion anomaly detection through video analysis is important for delivering autonomous situation awareness in public places. Surveillance scene segmentation and representation is the preliminary step to implementation anomaly detection. Surveillance scene can be represented using Region Association Graph (RAG), where nodes represent regions and edges denote connectivity among the regions. Existing RAG-based analysis algorithms assume simple anomalies such as moving objects visit statistically unimportant or ab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 61 publications
0
4
0
Order By: Relevance
“…In the last decade variety of methods have been proposed to identify and locate abnormal or prohibited events. The proposed methods can be broadly classified into three major categories i.e., (i) Classical methods [17], [22], [25], [26], [27], [28], (ii) Deep learning methods [4], [6], [7], [8], [29], [30], and (iii) Hybrid methods [13], [21], [31]. A significant research effort has been dedicated towards the manual feature extraction followed by well-established classifiers like one-class support vector machine (OC-SVM) [28], [9], clustering mechanisms like K-nearest neighbor (KNN) [21] and a hardware-friendly classifier KUGDA proposed in [32].…”
Section: Methods For Abnormal Event Detectionmentioning
confidence: 99%
“…In the last decade variety of methods have been proposed to identify and locate abnormal or prohibited events. The proposed methods can be broadly classified into three major categories i.e., (i) Classical methods [17], [22], [25], [26], [27], [28], (ii) Deep learning methods [4], [6], [7], [8], [29], [30], and (iii) Hybrid methods [13], [21], [31]. A significant research effort has been dedicated towards the manual feature extraction followed by well-established classifiers like one-class support vector machine (OC-SVM) [28], [9], clustering mechanisms like K-nearest neighbor (KNN) [21] and a hardware-friendly classifier KUGDA proposed in [32].…”
Section: Methods For Abnormal Event Detectionmentioning
confidence: 99%
“…Current state-of-the-art research on anomaly detection commonly uses existing datasets to train and evaluate their models [5,25,26]. Common datasets include UCSD Ped2 [27], CUHK Avenue [14], and ShanghaiTech [15].…”
Section: Anomaly Datasetsmentioning
confidence: 99%
“…Two anomalies with regard to the trajectories of moving entities are presented in [ 118 , cf. 146 , 147 ], namely the positional outlier , which is positioned in a low-density area of the trajectory space, and the angular outlier , which has a direction different from regular trajectories. The subfield of graph mining has also acknowledged several specific classes of anomalies, with anomalous vertices , edges, and subgraphs being the basic forms [ 18 , 20 , 112 , 113 , 148 , 149 ].…”
Section: Theorymentioning
confidence: 99%