Deep Guard: A Comprehensive Deep Learning System for Unmasking Suspicious Activities in Surveillance Footage

Year : 2023 | Volume :01 | Issue : 01 | Page : 23-28
By

    Piyush Jain

  1. Shreyash Chole

  2. Rishabh Nath Tiwari

  3. Samiullah Siddiqui

  1. Student, Department of Computer Engineering, NBN Sinhgad School of Engineering, Sinhgad Rd, Ambegaon Budruk, Maharashtra, India
  2. Student, Department of Computer Engineering, NBN Sinhgad School of Engineering, Sinhgad Rd, Ambegaon Budruk, Maharashtra, India
  3. Student, Department of Computer Engineering, NBN Sinhgad School of Engineering, Sinhgad Rd, Ambegaon Budruk, Maharashtra, India
  4. Student, Department of Computer Engineering, NBN Sinhgad School of Engineering, Sinhgad Rd, Ambegaon Budruk, Maharashtra, India

Abstract

These days, video surveillance is quite vital. Technology has evolved considerably as machine learning, artificial intelligence, and deep learning become increasingly widespread. There are several algorithms that assist in identifying distinct kinds of suspicious behaviour from live footage by combining the techniques. A person’s behaviour is the most unpredictable thing, and it can be quite challenging to determine whether it is normal or suspicious. Video surveillance is automated to address this. On CCTV cameras, it is currently not feasible to manually watch every incident. It is a waste of time to manually look for the identical occurrence in the recorded video, even if it has already occurred. An emerging area in automated video surveillance systems is the analysis of anomalous events in video.To identify questionable or odd behaviour in the academic setting and notify the relevant authorities if any suspicious conduct is found, a deep learning technique is employed. For surveillance purposes, a collection of still photos from a video is commonly employed. Each frame is divided into two halves. In the first phase, the features are computed from the video frames; in the second, the classifier uses the retrieved features to determine whether the class is normal or suspicious.

Keywords: Suspicious Activity, Video Surveillance, Deep Learning, GPU (Graphic Processing Unit), Electronic article surveillance (EAS)

[This article belongs to International Journal of Satellite Remote Sensing(ijsrs)]

How to cite this article: Piyush Jain, Shreyash Chole, Rishabh Nath Tiwari, Samiullah Siddiqui , Deep Guard: A Comprehensive Deep Learning System for Unmasking Suspicious Activities in Surveillance Footage ijsrs 2023; 01:23-28
How to cite this URL: Piyush Jain, Shreyash Chole, Rishabh Nath Tiwari, Samiullah Siddiqui , Deep Guard: A Comprehensive Deep Learning System for Unmasking Suspicious Activities in Surveillance Footage ijsrs 2023 {cited 2023 Nov 29};01:23-28. Available from: https://journals.stmjournals.com/ijsrs/article=2023/view=127577


Browse Figures

References

  1. Karuppuswami, M. I. M. Ghazali, S. Mondal, and P. Chahal, “Wireless eas sensor tags for volatile profiling in food packages,” in 2018 IEEE 68th Electronic Components and Technology Conference (ECTC), pp. 2174–2179, 2018.
  2. D. M. Dinama, Q. A’yun, A. D. Syahroni, I. A. Sulistijono, and A. Risnumawan, “Human detection and tracking on surveillance video footage using convolutional neural networks,” in 2019 International Electronics Symposium (IES), pp. 534–538, 2019.
  3. Popa, L. Rothkrantz, Z. Yang, P. Wiggers, R. Braspenning, and C. Shan, “Analysis of shopping behavior based on surveillance system,” in 2010 IEEE International Conference on Systems, Man and Cybernetics, pp. 2512–2519, 2010.
  4. Dawar and N. Kehtarnavaz, “Continuous detection and recognition of actions of interest among actions of non-interest using a depth camera,” in 2017 IEEE International Conference on Image Processing (ICIP), pp. 4227– 4231, 2017.
  5. H. Chuang, J.-W. Hsieh, and K.-C. Fan, “Suspicious object detection and robbery event analysis,” in 2007 16th International Conference on Computer Communications and Networks, pp. 1189–1192, 2007.
  6. Kaneko, “Fractal analysis of a grocery store shopping path,” in 2016 2nd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE), pp. 1–7, 2015, IEEE Xplore.
  7. Valecha, A. Varma, I. Khare, A. Sachdeva, and M. Goyal, “Prediction of consumer behaviour using random forest algorithm,”2019, 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), pp. 1– 6, 2018.
  8. Zuo, K. Yada, T. Li, and P. Chen, “Application of network analysis techniques for customer in-store behavior in supermarket,”,2019, IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1861–1866, 2018.
  9. Zuo and K. Yada, “Using statistical learning theory for purchase behavior prediction via direct observation of in-store behavior,” in 2016, 2nd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE), pp. 1–6, 2015, IEEE Xplore.
  10. Peker, A. Kocyigit, and P. E. Eren, “An empirical comparison of customer behavior modeling approaches for shopping list prediction,” in 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp.1220–1225,IEEE Xplore.

Regular Issue Subscription Original Research
Volume 01
Issue 01
Received October 27, 2023
Accepted November 8, 2023
Published November 29, 2023