Recognition of suspicious behavior using case-based reasoning
详细信息    查看全文
  • 作者:Li-min Xia ; Bao-juan Yang ; Hong-bin Tu
  • 关键词:visual attention mode ; case ; based reasoning ; suspicious behavior ; order factor ; span factor
  • 刊名:Journal of Central South University of Technology
  • 出版年:2015
  • 出版时间:January 2015
  • 年:2015
  • 卷:22
  • 期:1
  • 页码:241-250
  • 全文大小:1,678 KB
  • 参考文献:1. KULIC D, NAKAMURA Y. Incremental learning of human behaviors using hierarchical hidden Markov models [C]// IEEE International Conference on Intelligent Robots and Systems. Taipei: Intelligent Robots and Systems (IROS), 2010: 4649-655.
    2. ZHOU Han-ning, KIMBER D. Unusual event detection via multi-camera video mining [C]// 18th International Conference on Pattern Recognition. Hong Kong: CICPR, 2006: 1161-166.
    3. NAPHADE M R, HUANG T S. A probabilistic framework for semantic indexing and retrieval in video [C]// IEEE International Conference on Multimedia and Expo. New York: IEEE Press, 2000: 475-78.
    4. NIU F, ABDEL-MOTTALEB M. HMM-based segmentation and recognition of human behaviors from video sequences [C]// IEEE International Conference on Multimedia and Expo. Amsterdam: IEEE Press, 2005: 804-07.
    5. LI He-ping, HU Zhan-yi, WU Yi-hong, WU Fu-chao. Behavior modeling and abnormality detection based on semi-supervised learning method [J]. Journal of Software, 2007, 18(3): 527-37. (in Chinese) CrossRef
    6. ZHU Xu-dong, LIU Zhi-jing. Human abnormal behavior recognition based on topic hidden Markov mode [J]. Computer Science, 2012, 39(3): 251-75. (in Chinese)
    7. XIANG T, GONG S G. Video behavior profiling and abnormality detection without manual labeling [C]// Proceedings of the IEEE International Conference on Computer Vision. Beijing: IEEE Press, 2005: 1238-245.
    8. ZHANG Jun, LIU Zhi-jing. A method of abnormal action recognition in variable scenarios [J]. Journal of Image and Graphics, 2009, 14(10): 2097-101. (in Chinese)
    9. BREGONZIO M, GONG S G, XIANG T. Recognizing action as clouds of space-time interest points [C]// IEEE Conference on Computer Vision and Pattern Recognition. Miami: IEEE Press, 2009: 1948-955.
    10. RYOO M S, AGGARWAL J K. Recognition of composite human behaviors through context-free grammar based representation [C]// IEEE Computer Society Conference on Computer Vision and Pattern Recognition. New York: IEEE Computer Society, 2006: 1709-718.
    11. ELHAMOD M. Automated real-time detection of potentially suspicious behavior in public transport area [J]. IEEE Transactions on Intelligent Transportation Systems, 2013, 14(2): 688-99. CrossRef
    12. ELHAMOD M, LEVINE M D. Real-time semantics-based detection of suspicious behaviors in public spaces [C]// 2012 Ninth Conference on Computer and Robot Vision. Toronto: IEEE Press, 2012: 268-75. CrossRef
    13. WILIEM A, MADASU V, BOLES W, YARCAGADDA P K. A context-based approach for detecting suspicious behaviors [C]// Digital Image Computing: Techniques and Applications. Melbourne: IEEE Press, 2009: 156-53.
    14. XIA Li-min, HUANG Jin-xia, TAN Lun-zheng. Human action recognition based on chaotic invariants [J]. Journal of Central South University, 2013, 20(11): 3171-179. CrossRef
    15. LAI Jie-ling, YI Yang. Key frame extraction based on visual attention model [J]. Journal of Visual Communication and Image Representation, 2012, 23(1): 114-25. CrossRef
    16. ITTI L, KOCH C. A saliency-based search mechanism for overt and covert shifts of visual attention [J]. Vision Research, 2000, 40(10/11/12): 1489-506. CrossRef
    17. NIE Y, MA K H. Adaptive rood pattern search for fast block-matching motion estimation [J]. IEEE Transactions on Image Processing, 2002, 11(12): 1442-449. CrossRef
    18. PARK S, AGGARWAL J K. Simultaneous tracking of multiple body parts of interacting persons [J]. Computer Vision and Image Understanding, 2006, 102(1): 1-1. CrossRef
    19. PARK S, AGGARWAL J K. Recognition of composite human behaviors through context-free grammar based representation [C]// 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. New York: IEEE Press, 2006: 1709-718.
    20. VLACHOS M, KOLLIOS G, GUNOPULOS D. Discovering similar multidimensional trajectories[C]// 18th International Conference on Data Engineering, San Jose: IEEE Computer Society, 2002: 673-84.
    21. CAVIAR test case scenarios [
  • 作者单位:Li-min Xia (1)
    Bao-juan Yang (1)
    Hong-bin Tu (1)

    1. School of Information Science and Engineering, Central South University, Changsha, 410075, China
  • 刊物类别:Engineering
  • 刊物主题:Engineering, general
    Metallic Materials
    Chinese Library of Science
  • 出版者:Central South University, co-published with Springer
  • ISSN:2227-5223
文摘
A novel method case-based reasoning was proposed for suspicious behavior recognition. The method is composed of three departs: human behavior decomposition, human behavior case representation and case-based reasoning. The new approach was proposed to decompose behavior into sub-behaviors that are easier to recognize using a saliency-based visual attention model. New representation of behavior was introduced, in which the sub-behavior and the associated time characteristic of sub-behavior were used to represent behavior case. In the process of case-based reasoning, apart from considering the similarity of basic sub-behaviors, order factor was proposed to measure the similarity of a time order among the sub-behaviors and span factor was used to measure the similarity of duration time of each sub-behavior, which makes the similarity calculations more rational and comprehensive. Experimental results show the effectiveness of the proposed method in comparison with other related works and can run in real-time for the recognition of suspicious behaviors.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700