SUSPICIOUS ACTIVITY DETECTION

34
SUSPICIOUS ACTIVITY DETECTION Student: Dane Brown 2713985 Supervisor : James Connan and Mehrdad Ghaziasgar

description

Student: Dane Brown 2713985 Supervisor : James Connan and Mehrdad Ghaziasgar. SUSPICIOUS ACTIVITY DETECTION. OVERVIEW. INTRODUCTION DESIGN DECISIONS IMPLEMENTATION PROJECT PLAN DEMO. INTRODUCTION. Extremely high crime rate in South Africa Car break-in rate was 16000 in 2009 - PowerPoint PPT Presentation

Transcript of SUSPICIOUS ACTIVITY DETECTION

Page 1: SUSPICIOUS ACTIVITY DETECTION

SUSPICIOUS ACTIVITY DETECTION

Student: Dane Brown 2713985

Supervisor : James Connan and Mehrdad Ghaziasgar

Page 2: SUSPICIOUS ACTIVITY DETECTION

OVERVIEW INTRODUCTION

DESIGN DECISIONS

IMPLEMENTATION

PROJECT PLAN

DEMO

Page 3: SUSPICIOUS ACTIVITY DETECTION

INTRODUCTION Extremely high crime rate in South Africa

Car break-in rate was 16000 in 200918 times the rate of USACarjacking is the most common crime in South AfricaCosting tax payers billions of rands!

Page 4: SUSPICIOUS ACTIVITY DETECTION

INTRODUCTION cont.

2006 2007 2008 200913000

13500

14000

14500

15000

15500

16000

16500

Carjackings 2006-2009

Page 5: SUSPICIOUS ACTIVITY DETECTION

INTRODUCTION cont. CCTV cameras

Human monitoredCurrent solution ineffectiveContinued high break-in rate

Page 6: SUSPICIOUS ACTIVITY DETECTION

INTRODUCTION cont. Pioneered revolutionary system

Uses computer vision techniquesAutomatically detects suspicious activity from a

video feedDetection happens in real-time

Page 7: SUSPICIOUS ACTIVITY DETECTION

INTRODUCTION cont. Pioneered revolutionary system

Page 8: SUSPICIOUS ACTIVITY DETECTION

DESIGN DECISIONS Classification methods

Machine learning such as Haar-like features with Adaboost

Generally training 2000+ sample frames

Why not a classification method?

Trade-off between speed, complexity and accuracy

There are simpler and more robust ways to

differentiate suspicious and normal behaviour.

Page 9: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION Original frame in RGB colour

Page 10: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. Gray Scale and Frame differencing

Page 11: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. Motion History Image (MHI)

Page 12: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. Blob and movement detection (using MHI)

Page 13: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. Blob and movement detection

Page 14: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. Blob and movement detection

Page 15: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines normal activity

Park car

Page 16: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines normal activity

Park car

Page 17: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines normal activity

Get out

Page 18: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines normal activity

Walk away

Page 19: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines normal activity

Walk away

Page 20: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines normal activity

Get back in

Page 21: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines normal activity

Drive away

Page 22: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines normal activity

Drive away

Page 23: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines suspicious activity

Loitering next to a vehicle is suspicious

Page 24: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines suspicious activity

Loitering next to a vehicle is suspicious

Page 25: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines suspicious activity

Loitering next to a vehicle is suspicious

Page 26: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines suspicious activity

Loitering next to a vehicle is suspicious

Page 27: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines suspicious activity

Loitering next to a vehicle is suspicious

Page 28: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines suspicious activity

Loitering next to a vehicle is suspicious

Page 29: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines other suspicious activity

Parking, but not leaving the vehicle

Page 30: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. System determines other suspicious activity

Accelerating too fast

Page 31: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. Suspicious activity detected!

Page 32: SUSPICIOUS ACTIVITY DETECTION

1. Normal activity - typical drive away

2. Suspicious - two men loitering

3. Suspicious - Stationary

4. Suspicious - Acceleration

DEMO

Page 33: SUSPICIOUS ACTIVITY DETECTION

REFERENCES Davis, J. W. (2005). Motion History Image. Retrieved 2010,

from The Ohia State University.

Green, B. (2002). Histogram, Thresholding and Image Centroid Tutorial. Retrieved 2010, from Drexel University site.

Trip Atlas. (2010). Retrieved from Carjacking: http://tripatlas.com/Carjacking#South%20Africa

  Hijacking. (2010). Retrieved from Arrive Alive:

http://www.arrivealive.co.za/pages.aspx?i=2364 

Page 34: SUSPICIOUS ACTIVITY DETECTION

QUESTIONS AND ANSWERSThank You!