Abnormal Behavior Recognition using Non

advertisement
Advanced Science and Technology Letters
Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents 2015), pp.127-132
http://dx.doi.org/10.14257/astl.2015.87.26
Abnormal Behavior Recognition using Non-Overlapped
Multi-Camera – focused on Stalking and Violence
Hwa-Jin Park1, Hye-Young Kim2
1
Dept. of Multimedia, Sookmyung Women’s University,
Seoul, Korea
phj2000@sookmyung.ac.kr
2
Department of Game Software, School of Games, Hongik University, Jochiwon-eup,
Chungcheongnam-do, 339-701,Korea
hykim@hongik.ac.kr
Abstract. Proposed in this paper is an algorithm which determines whether
violence and stalking are being carried out in the images captured from multi
cameras. To decide the presence of violence and stalking, each object’s features
are identified and classified into three groups. Recognition processes for each
dangerous behavior are systemized for implementation, which would be one of
future research.
Keywords: abnormal behavior recognition, stalking, violence, multi-camera
surveillance
1
Introduction
As reflected social concerns on safety, social requests for surveillance system with
CCTV or IP camera are increasing recently. But the existing surveillance system
where cameras simply record and save images, doesn’t recognize anything. It detects
someone who is moving using IR sensors and gives an alarm if considered as
unlawful entry.
Recently lots of research has been in progress on detection of abnormal or
dangerous behaviors before the occurrence of accidents based on images taken from
CCTV or IP camera. Some research used a stereo camera to solve an occluding issue
easily. But it is not applicable since a single camera is installed in most of existing
installed cameras. Other research aimed at recognizing human behaviors such as
walking, running, sitting, standing from a single camera, which is a basis of
recognizing human intention. Some of dangerous behaviors such as unlawful entry,
smoking, and loitering can be detected from one camera, while stalking, tracing and
tailing need some other multi cameras’ image to understand. Hence, this research
focuses on recognition of abnormal behaviors such as trace, tail, stalking and violence
by a way of using multi cameras as a final goal. The first step to achieve this goal
would be to identify required features and plan the extracting method, and classify
them systemically.
ISSN: 2287-1233 ASTL
Copyright © 2015 SERSC
Advanced Science and Technology Letters
Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents)
2
Multi cameras in networked surveillance system
Generally each area can be monitored by one camera. This research performed in
such a situation that each camera has set in a sequence of id number in one direction
so that a passenger can be expected to appear in the next camera when he keeps upon
going in the same direction. Each camera will provide information about exiting and
entering objects to the next camera in the direction of each object. It means we can
continuously trace all objects even though there is a gap between cameras.
Fig.1. shows the diagram of networked surveillance system.
3 Violence and stalking recognition from non-overlapped multi
cameras
3.1 Definition of violence and stalking behaviors
The word “stalking” means a following someone stealthily or waiting in ambush. The
stalker follows someone to the extent that one feels attacked or murdered, which can
be defined as violent behavior. Such stalking behavior can be prevented in advance by
a way of detecting and warning what might be lead to dangerous situations such as
detaining, assaulting, and murdering. Following or shadowing can be recognized as
stalking, if such behavior is characterized as below. (1) Following a target in the same
direction for at least 2 or 3 minutes. (2) If the target stops, the follower also stops, and
if the target turns, the follower hesitates to go further for a second and starts to follow
again. (3) The follower always comes close to the target within a certain distance. (4)
The approaching speed is maintained at a fixed level. (5) Although the follower
possibly passes the target, he always goes behind the target.
The term “violence” is generally defined as direct and physical compelling power
such as physical attacks, which usually occur in a provocative manner between two
persons. Such violent behavior which would be detected from screens is defined in
this research as below. If the size and frequency of changes of the object abruptly
increase since the shape of an object heavily changes in the occasion of violence, it is
regarded as occurrence of violence. In other words, the system would recognize
128
Copyright © 2015 SERSC
Advanced Science and Technology Letters
Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents)
changes in the size of the object such as height and width and if they exceed the preset rate of the changes and the frequency of the changes, it alarms.
3.2 Classification of features
We have to interpret, save, and share the characteristics data of the object in all videos
as well as the relating data near the object with other cameras so that we can observe
the stalking behavior for a long time and detect it as stalking. The characteristics of
the object would be detected in each individual camera as below. Firstly, group
characteristics can be categorized by the characteristics which identify a follower, the
follower’s behaviors, and the characteristics that the follower goes within a certain
distance. The identifying characteristics form positions, heights, and colors (hair,
shirt-sleeves, and pants). The behavioral characteristics consist of speeds and tracks.
All these characteristics data will be saved in every second. The group characteristics
of each individual n will be extracted from objects, followers and following within a
certain distance. The newly-defined, Member feature of a specific area means all
objects with a certain distance. Follower (n) feature means all objects which are ahead
of n in the same direction, while following (n) means all objects which are behind n in
the same direction.
Each feature are expressed in mathematics,
• Features for identification
Position: p(t) = (x(t), y(t), z(t))
Color: haircolor = color(top(blob)),
upcloth = color(mid(blob)), lowcloth= color(low(blob))
Height: height = (top(blob)) – bottom(blob))
• Features for behaviors
dp
Velocity: v(t) =
dt
Trace =tr ∑v(t)i = trace(∑v(t)i ), i = 1,2
• Features for group(n):
Member(n, m, t, min, max) = {m | n, m∈image(t), min<dist(n, m)<max},
where n, m are blobs
Follower(n, m) = {m |∀m ∈ member(n, m, t, min, max),
cos(angle(v(n), (p(m)-p(n))> 0, cos(angle(v(n),v(m)) > 0},
Following(n, m) = {m |∀m ∈ member(n, m, t, min, max),
cos(angle(v(n),(p(m)-p(n)) <0, cos(angle(v(n),v(m)) > 0}
Member does not include a companion of n by setting a min value because friends
usually go close to each other. To reduce a processing time, features regarding two
objects n and m can simultaneously perform since if m is a member of n at a certain t,
n is also a member of m at the same time. Similarly, Follower and Following are also
reciprocal.
Copyright © 2015 SERSC
129
Advanced Science and Technology Letters
Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents)
3.3 Detecting Process of Stalking Behavior
We will be able to save an identifying time by providing neighboring cameras with
the data containing the information of objects who exit from each camera’s screen
rather than tracing out the identical object by analyzing the object data of all cameras.
We can estimate the identicalness and an expected entering time considering a
distance at a certain time and an ongoing speed. We can also use each individual’s
behavioral information for detecting out the identicalness.
With the basis of these, we perform the following detecting process so as to find
out whether there is a stalker or not.
1. Find out whether there is an object who goes close by above 90 percentage,
using member which has group characteristics data saved for the last 3 minutes
by each individual object.
2. If there is an object in 1, find out whether he or she has identical tracks with
individual objects and if one does, it is considered as stalking.
Violence can occur more frequently in the case of being followed by someone. But
once violence occurs, a process of detecting it is dependent upon the fluctuation of a
change in the object. In other words, if the position of the object is not much different
but its vertical and horizontal size changes a lot at the same time, such behavior
would be regarded as violence.
4
Implementation design
We should extract three dimensional data from one source camera. Hence, we will
adopt a three dimensional space modeling by using a position and an angle of a
camera. z=0 because moving objects walk in the street, buildings and on the ground.
The position and serial numbers of all cameras should be set in advance. Each camera
should extract moving objects by using binarization, AVD (absolute value difference),
morphological filtering, and group them as a blob. To get rid of overlapped blobs or
shadows, a single blob should be extracted utilizing the height information of each
individual. Also the values of three dimensional characteristics will be saved by a way
of three dimensional modeling.
This is an algorithm for recognizing violence and stalking using multi cameras.
For each camera
1
Assign serial number to each camera in order according to location
2
Set 3 D tracker referring to 3D model using camera’s height and angle
3
For each frame
3.1
Detect objects
3.2
For each object
3.2.1 Convert to 3D data
3.2.2 Record all features in section 3.2
3.2.3 In case of an incoming object, check where it is coming from.
130
Copyright © 2015 SERSC
Advanced Science and Technology Letters
Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents)
3.2.3.1 In case of a new object, record an entering time
3.2.3.2 In case of a continuous object from the previous camera, link
it into the data of previous one in order to keep upon tracing.
3.2.4 Check a violence occurrence of the object
3.2.4.1 Increase potential violence counting if there is a big change
in a size of the object (pre-defined)
3.2.4.2 Give an alarm if potential violence counting is greater than
the pre-defined metric data for violence
3.2.5 Check a stalking occurrence of object comparing the elapsed time
with a pre-defined duration time (ex. 10 min)
3.2.5.1 With member feature for predefined duration time, list
objects appeared more than 90 %
3.2.5.2 Consider as stalking and give an alarm if one, a member
which satisfies 3.2.5.1, has the same trajectory with the
object’s
3.3
Save the outgoing object’s list if an object in the previous frame is not
seen in this frame
Fig 2, 3, and 4 show cases of violence occurrence, alarm message, and success rate of
violent behavior recognition.
Fig. 2. Cases of violence
Fig. 3. Alarm message
Table 1. Success rate of violent behavior recognition
Situation Category
Recognition rate
success
90%
failure
10%
success
80%
failure
20%
Violent
Non-Violent
5
Conclusion and Future Studies
This paper studied the recognition system detecting out abnormal behaviors that needs a longterm observation using multi cameras. It also defined characteristics and calibration
methodologies that would be required in the system. Though the possibility of errors would not
Copyright © 2015 SERSC
131
Advanced Science and Technology Letters
Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents)
be so low due to surrounding lights and shaking cameras, it is expected to be solved if censors
are adopted in this preliminary phase of the study. The future work could be done so as to
increase the possibility of recognition by a way of integrating censors as well as implement the
recognition system provided in this paper
References
1. Zhao, T., Nevatia, R.: Tracking multiple humans in complex situations. IEEE transactions
on pattern analysis and machine intelligence, vol.26, no.9, pp.1208-1220, 2004
2. Krumm, J., Harris, S., Meyers, B., Brumitt, B., Hale, M., Shafer, S.: Multi-Camera multiperson tracking for easyliving. Third IEEE International Workshop on Visual Surveillance,
2000
3. Park, J., Do, Y.: Dividing Occluded Pedestrians in wide angle images for the vision-based
surveillance and monitoring,” Journal of Sensor Science and Technology, vol.24, no.1,
pp.54-61, 2015
4. Venetianer, P. L., Zhang, Z., Yin, W., Lipton, A. J., Venetianer, P. L., Zhang, Z., Yin, W.
and Lipton, A. J.: Stationary target detection using the object video surveillance system. in
Proc. IEEE Int. Conf. Advanced Video Signal Based Surveillance, pp. 242-247, London,
UK (2007)
5. Oh, S., Moon, S., Choi, S.: Intelligence security and surveillance system in sensor network
environment using integrated heterogeneous sensors. The Journal of Korean institute of
communications and information sciences, vol.38C,no.07,pp.551-562, 2013
6. Niu, W., Long, J., Han, D., Wang, Y.: Human Activity Detection and Recogntion for Video
Surveillance. IEEE ICME 2004, vol.1, pp.719-722,
7. Merad, D., Aziz, K.: Fast people counting head detection from skeleton graph. IEEE
international conf. on advanced video and signal based surveillance, pp. 233-240, 2010.
132
Copyright © 2015 SERSC
Download