SlideShare una empresa de Scribd logo
1 de 18
AN INDUSTRY ORIENTED
MAJOR PROJECT
ON
“SUSPICIOUS ACTIVITY DETECTION”
Computer Science & Engineering
Mahaveer Institute of Science & Technology
2019-2020
Our Team
Programmer
Working on creating and developing
modules of the software.
Module Designing
Dr. R. NAKEERAN
HOD. CSE Dept
Under the Guidance of
K.SUDHAKAR
Asst. Professor/Assoc. Professor
GAJULA ANJALI PRABHU SANKEERTH
[16E31A05B9]
MUHAMMAD MUSHAHID ALI
[16E31A05D2]
Documentation
Made available of all the documents,
policies and terms.
Specify Documents/Policy
Project Coordinator
SRINIVAS REDDY
Asst. Professor/Assoc. Professor
Agenda
Topics
 Abstract
 Introduction
 Existing System
 Proposed System
 Hardware Requirements
 Software Requirements
 System Modules
 Implementation Output Screens
 Conclusion
 References
ABSTRACT
4
With the increase in the number of anti-social activities that
have been taking place, security has been given utmost
importance lately. Many organizations have installed CCTVs
for constant monitoring of people and their interactions.
01
For a developed country with a population of 64 million,
every person is captured by a camera ~ 30 times a day.
02
A lot of video is generated and stored for certain time
duration( India: 30 days). A 704x576 resolution image
recorded at 25fps will generate roughly 20GB per day.
Since constant monitoring of data by humans to judge if
the events are abnormal is a near impossible task as it
requires a workforce and their constant attention. This
creates a need to automate the same. Also, there is a
need to show in which frame and which parts of it contain
the unusual activity which aid the faster judgment of that
unusual activity being abnormal. The method involves
generating motion influence map for frames to represent
the interactions that are captured in a frame.
03
5
Introduction
 In this project we need to detect person behaviour as suspicious
or not, now a day’s everywhere CCTV cameras are installed
which capture videos and store at centralized server and
manually scanning those videos to detect suspicious activity
from human required lots of human efforts and time. To
overcome from such issue author is asking to automate such
process using Machine Learning Algorithms. To automate that
process first we need to build training model using huge number
of images (all possible images which describe features of
suspicious activities) and ‘Convolution Neural Network’ using
TENSOR FLOW Python module. Then we can upload any video
and then application will extract frames from uploaded video and
then that frame will be applied on train model to predict its class
such as ‘suspicious or normal.
Existing Proposed
The existing
system is based
on manual
checking, this
requires
manpower and
time and we
would not get any
exact result.
To automate that
process first we need to
build training model
using huge number of
images (all possible
images which describe
features of suspicious
activities) and
‘Convolution Neural
Network’ using TENSOR
FLOW Python module.
HARDWARE
REQUIREMENTS
PROCESSOR
Intel Pentium
or Intel i3
RAM
1024MB to
4096MB
(1-4GB)
Monitor
15 inch
color
Hard Disk
500 GB
KeyBoard
Standard
102 Keys
SOFTWARE
REQUIREMENTS
OPERATING SYSTEM
Windows10
Technology
Python 3.6
IDE
PyCharm
9
Optical flow of blocks (optFlowofblocks.py)
The module optical flow of blocks is
provided with a frame and the optical flow of
a frame. It divides the frame into blocks of
size m * n and sums all the optical flows in
each block and returns it along with details
like m, n, size and center of blocks.
10
Motion Influence Generator
(motionInfluenceGenerator.py)
This module is provided with
training or testing video and it
calculates the motioninfluence map
for each frame in that video and
also returns the size of the blocks in
the motioninfluence map.
11
Megablock Generator (createMegaBlocks.py)
This module has 2 functionalities :
a) Generating megablocks and returning them (testing)Megablocks are
generated by grouping motion influence blocks into a bigger sized blocksas
motions of closely situated blocks are similar. A set of megablocks of size
(number of frames* number of megablocks in each row * number of
megablocks each column) is returned.
b) Generating megablocks and returning codewords (training)After repeating
the above process but before returning the set of megablocks, each set
ofmegablocks present in the same frame position is applied kmeans
clustering on and the meanscalled codewords are only returned to the
calling module.
12
Training module (training.py)
Training module calls motion
influence generator and megablock
generator to obtaincodewords on a
training video input. It then stores
codewords in a .npy(NumPY file).
13
Testing module (testing.py)
Testing module calls motion influence generator
and megablock generator to obtain megablocks
on a testing video input. It then constructs a
minimum distance matrix after loading the stored
codewords, checks if a megablock is unusual by
comparing it against a threshold value and
displays unusual megablocks and frames.
Simple PowerPoint Presentation
Simple PowerPoint Presentation
Simple PowerPoint Presentation
Simple PowerPoint Presentation
You can simply impress your audience and
add a unique zing and appeal to your
Presentations. Easy to change colors, photos
and Text. You can simply impress your
audience and add a unique zing and appeal to
your Presentations.
OUTSCREENSLIDES….
THE
OUTSCREENS
D E S I G N O U T L E T S
15
CONCLUSION
Finally,
Thus the Suspicious Human Activities can
be detected using this system. Further, this
system can be extended to detect and
understand the activities of people in
various scenarios. This system is currently
developed for detecting the activities of
people in a stationary background. This
system can be further extended to detect
human activities in places with mobile
background.
REFERENCE
[1] Dong-Gyu Lee, Heung-Il Suk, Sung-Kee Park and Seong-Whan Lee “Motion Influence Map for
Unusual Human Activity Detection and Localization in Crowded Scenes” IEEE transactions on circuits
and systems for video technology, vol. 25, no. 10, October 2015
[2] Data set – http://mha.cs.umn.edu/Movies/Crowd-Activity-All.avi
[3] Data set - http://www.svcl.ucsd.edu/projects/anomaly/
[4] T. Xiang and S. Gong, “Video behavior profiling for anomaly detection,” IEEE Trans. Pattern Anal.
Mach. Intell., vol. 30, no. 5, pp. 893–908, May 2008.
[5] F. Jiang, J. Yuan, S. A. Tsaftaris, and A. K. Katsaggelos, “Anomalous video event detection using
spatiotemporal context,” Comput. Vis. Image Understand., vol. 115, no. 3, pp. 323–333, 2011.
6] B. D. Lucas and T. Kanade, “An iterative image registration technique with an application to stereo
vision,” in Proc. 7th Int. Joint Conf. Artif. Intell., San Francisco, CA, USA, Aug. 1981, pp. 674–679.
[7] OpenCV Python documentation at http://docs.opencv.org/3.0-
beta/doc/py_tutorials/py_tutorials.html
[8] OpenCV references at http://opencv-python-tutroals.readthedocs.io/en/latest/ 16
ANY QUERIES?
Thank You!

Más contenido relacionado

La actualidad más candente

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
Plant disease detection and classification using deep learning
Plant disease detection and classification using deep learning Plant disease detection and classification using deep learning
Plant disease detection and classification using deep learning
JAVAID AHMAD WANI
 

La actualidad más candente (20)

Introduction to object detection
Introduction to object detectionIntroduction to object detection
Introduction to object detection
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Chapter 4 software project planning
Chapter 4 software project planningChapter 4 software project planning
Chapter 4 software project planning
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
Internship report on AI , ML & IIOT and project responses full docs
Internship report on AI , ML & IIOT and project responses full docsInternship report on AI , ML & IIOT and project responses full docs
Internship report on AI , ML & IIOT and project responses full docs
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Captcha seminar
Captcha seminar Captcha seminar
Captcha seminar
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access Control
 
Software Engineering Solved Past Paper 2020
Software Engineering Solved Past Paper 2020 Software Engineering Solved Past Paper 2020
Software Engineering Solved Past Paper 2020
 
AGE AND GENDER DETECTION.pptx
AGE AND GENDER DETECTION.pptxAGE AND GENDER DETECTION.pptx
AGE AND GENDER DETECTION.pptx
 
Plant disease detection and classification using deep learning
Plant disease detection and classification using deep learning Plant disease detection and classification using deep learning
Plant disease detection and classification using deep learning
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Report
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Online news 365
Online news 365Online news 365
Online news 365
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
 
3.abstract (computer forensic)
3.abstract (computer forensic)3.abstract (computer forensic)
3.abstract (computer forensic)
 
Synopsis tic tac toe
Synopsis tic tac toeSynopsis tic tac toe
Synopsis tic tac toe
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
 
Computer vision basics
Computer vision basicsComputer vision basics
Computer vision basics
 
Sixth sense technology(seminar presentation)
Sixth sense technology(seminar presentation)Sixth sense technology(seminar presentation)
Sixth sense technology(seminar presentation)
 

Similar a Suspicious Activity Detection

Similar a Suspicious Activity Detection (20)

IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
Motion capture for Animation
Motion capture for AnimationMotion capture for Animation
Motion capture for Animation
 
IRJET- Prediction of Anomalous Activities in a Video
IRJET-  	  Prediction of Anomalous Activities in a VideoIRJET-  	  Prediction of Anomalous Activities in a Video
IRJET- Prediction of Anomalous Activities in a Video
 
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
 
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIReal Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
 
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection System
 
Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4
 
Human pose detection using machine learning by Grandel
Human pose detection using machine learning by GrandelHuman pose detection using machine learning by Grandel
Human pose detection using machine learning by Grandel
 
IRJET - Human Pose Detection using Deep Learning
IRJET - Human Pose Detection using Deep LearningIRJET - Human Pose Detection using Deep Learning
IRJET - Human Pose Detection using Deep Learning
 
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionSecure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
 
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCVAdvanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Suspicious Activity Detection

  • 1. AN INDUSTRY ORIENTED MAJOR PROJECT ON “SUSPICIOUS ACTIVITY DETECTION” Computer Science & Engineering Mahaveer Institute of Science & Technology 2019-2020
  • 2. Our Team Programmer Working on creating and developing modules of the software. Module Designing Dr. R. NAKEERAN HOD. CSE Dept Under the Guidance of K.SUDHAKAR Asst. Professor/Assoc. Professor GAJULA ANJALI PRABHU SANKEERTH [16E31A05B9] MUHAMMAD MUSHAHID ALI [16E31A05D2] Documentation Made available of all the documents, policies and terms. Specify Documents/Policy Project Coordinator SRINIVAS REDDY Asst. Professor/Assoc. Professor
  • 3. Agenda Topics  Abstract  Introduction  Existing System  Proposed System  Hardware Requirements  Software Requirements  System Modules  Implementation Output Screens  Conclusion  References
  • 4. ABSTRACT 4 With the increase in the number of anti-social activities that have been taking place, security has been given utmost importance lately. Many organizations have installed CCTVs for constant monitoring of people and their interactions. 01 For a developed country with a population of 64 million, every person is captured by a camera ~ 30 times a day. 02 A lot of video is generated and stored for certain time duration( India: 30 days). A 704x576 resolution image recorded at 25fps will generate roughly 20GB per day. Since constant monitoring of data by humans to judge if the events are abnormal is a near impossible task as it requires a workforce and their constant attention. This creates a need to automate the same. Also, there is a need to show in which frame and which parts of it contain the unusual activity which aid the faster judgment of that unusual activity being abnormal. The method involves generating motion influence map for frames to represent the interactions that are captured in a frame. 03
  • 5. 5 Introduction  In this project we need to detect person behaviour as suspicious or not, now a day’s everywhere CCTV cameras are installed which capture videos and store at centralized server and manually scanning those videos to detect suspicious activity from human required lots of human efforts and time. To overcome from such issue author is asking to automate such process using Machine Learning Algorithms. To automate that process first we need to build training model using huge number of images (all possible images which describe features of suspicious activities) and ‘Convolution Neural Network’ using TENSOR FLOW Python module. Then we can upload any video and then application will extract frames from uploaded video and then that frame will be applied on train model to predict its class such as ‘suspicious or normal.
  • 6. Existing Proposed The existing system is based on manual checking, this requires manpower and time and we would not get any exact result. To automate that process first we need to build training model using huge number of images (all possible images which describe features of suspicious activities) and ‘Convolution Neural Network’ using TENSOR FLOW Python module.
  • 7. HARDWARE REQUIREMENTS PROCESSOR Intel Pentium or Intel i3 RAM 1024MB to 4096MB (1-4GB) Monitor 15 inch color Hard Disk 500 GB KeyBoard Standard 102 Keys
  • 9. 9 Optical flow of blocks (optFlowofblocks.py) The module optical flow of blocks is provided with a frame and the optical flow of a frame. It divides the frame into blocks of size m * n and sums all the optical flows in each block and returns it along with details like m, n, size and center of blocks.
  • 10. 10 Motion Influence Generator (motionInfluenceGenerator.py) This module is provided with training or testing video and it calculates the motioninfluence map for each frame in that video and also returns the size of the blocks in the motioninfluence map.
  • 11. 11 Megablock Generator (createMegaBlocks.py) This module has 2 functionalities : a) Generating megablocks and returning them (testing)Megablocks are generated by grouping motion influence blocks into a bigger sized blocksas motions of closely situated blocks are similar. A set of megablocks of size (number of frames* number of megablocks in each row * number of megablocks each column) is returned. b) Generating megablocks and returning codewords (training)After repeating the above process but before returning the set of megablocks, each set ofmegablocks present in the same frame position is applied kmeans clustering on and the meanscalled codewords are only returned to the calling module.
  • 12. 12 Training module (training.py) Training module calls motion influence generator and megablock generator to obtaincodewords on a training video input. It then stores codewords in a .npy(NumPY file).
  • 13. 13 Testing module (testing.py) Testing module calls motion influence generator and megablock generator to obtain megablocks on a testing video input. It then constructs a minimum distance matrix after loading the stored codewords, checks if a megablock is unusual by comparing it against a threshold value and displays unusual megablocks and frames.
  • 14. Simple PowerPoint Presentation Simple PowerPoint Presentation Simple PowerPoint Presentation Simple PowerPoint Presentation You can simply impress your audience and add a unique zing and appeal to your Presentations. Easy to change colors, photos and Text. You can simply impress your audience and add a unique zing and appeal to your Presentations. OUTSCREENSLIDES…. THE OUTSCREENS D E S I G N O U T L E T S
  • 15. 15 CONCLUSION Finally, Thus the Suspicious Human Activities can be detected using this system. Further, this system can be extended to detect and understand the activities of people in various scenarios. This system is currently developed for detecting the activities of people in a stationary background. This system can be further extended to detect human activities in places with mobile background.
  • 16. REFERENCE [1] Dong-Gyu Lee, Heung-Il Suk, Sung-Kee Park and Seong-Whan Lee “Motion Influence Map for Unusual Human Activity Detection and Localization in Crowded Scenes” IEEE transactions on circuits and systems for video technology, vol. 25, no. 10, October 2015 [2] Data set – http://mha.cs.umn.edu/Movies/Crowd-Activity-All.avi [3] Data set - http://www.svcl.ucsd.edu/projects/anomaly/ [4] T. Xiang and S. Gong, “Video behavior profiling for anomaly detection,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 5, pp. 893–908, May 2008. [5] F. Jiang, J. Yuan, S. A. Tsaftaris, and A. K. Katsaggelos, “Anomalous video event detection using spatiotemporal context,” Comput. Vis. Image Understand., vol. 115, no. 3, pp. 323–333, 2011. 6] B. D. Lucas and T. Kanade, “An iterative image registration technique with an application to stereo vision,” in Proc. 7th Int. Joint Conf. Artif. Intell., San Francisco, CA, USA, Aug. 1981, pp. 674–679. [7] OpenCV Python documentation at http://docs.opencv.org/3.0- beta/doc/py_tutorials/py_tutorials.html [8] OpenCV references at http://opencv-python-tutroals.readthedocs.io/en/latest/ 16