SUSPICIOUS ACTIVITY DETECTION

14
SUSPICIOUS ACTIVITY DETECTION Student: Dane Brown 2713985 Supervisor : James Connan Co-Supervisor : Mehrdad Ghaziasgar

description

Student: Dane Brown 2713985 Supervisor : James Connan Co-Supervisor : Mehrdad Ghaziasgar . SUSPICIOUS ACTIVITY DETECTION. OVERVIEW. INTRODUCTION USER INTERFACE CHANGES DESIGN DECISIONS IMPLEMENTATION TOOLS USED PROJECT PLAN DEMO. INTRODUCTION . - PowerPoint PPT Presentation

Transcript of SUSPICIOUS ACTIVITY DETECTION

Page 1: SUSPICIOUS ACTIVITY DETECTION

SUSPICIOUS ACTIVITY DETECTION

Student: Dane Brown 2713985

Supervisor : James ConnanCo-Supervisor : Mehrdad Ghaziasgar

Page 2: SUSPICIOUS ACTIVITY DETECTION

OVERVIEW INTRODUCTION

USER INTERFACE CHANGES

DESIGN DECISIONS

IMPLEMENTATION

TOOLS USED

PROJECT PLAN

DEMO

Page 3: SUSPICIOUS ACTIVITY DETECTION

INTRODUCTION What does the system regard as normal activity

Park car, get out, walk away, get back in, drive away

What does the system regard as suspicious?

Loitering next to a vehicle is suspicious

Page 4: SUSPICIOUS ACTIVITY DETECTION

USER INTERFACE CHANGES

Page 5: SUSPICIOUS ACTIVITY DETECTION

DESIGN DECISIONS Haar feature-extraction

Typically the training 1000+ sample frames containing normal activity and suspicious activity

What not haar feature-extraction?

Performance is good only on a very fast machine

There are simpler and more robust ways to differentiate

suspicious and normal behaviour.

Page 6: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION Gray Scale and Frame differencing

Page 7: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. Thresholding and Motion History Image (MHI)

Page 8: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. Blob and movement detection

Page 9: SUSPICIOUS ACTIVITY DETECTION

IMPLEMENTATION cont. Suspicious activity detected!

Page 10: SUSPICIOUS ACTIVITY DETECTION

TOOLS USED cont.

Kubuntu 10.04 Opencv with ffmpeg – video manipulation VirtualDub – open source video editor

Page 11: SUSPICIOUS ACTIVITY DETECTION

PROJECT PLAN

GOAL DUE DATETesting Till the end of term 4

Hand in term 3 Documentation 15 September 2010

Final Demo and Final Documentation End of term 4

Page 12: SUSPICIOUS ACTIVITY DETECTION

REFERENCES Davis, J. W. (2005). Motion History Image. Retrieved 2010,

from The Ohia State University.

Bouakaz, S. (2003). Image Processing and Analysis Reference. Retrieved 2010, from Université Claude Bernard Lyon 1.

Green, B. (2002). Histogram, Thresholding and Image Centroid Tutorial. Retrieved 2010, from Drexel University site.

Page 13: SUSPICIOUS ACTIVITY DETECTION

DEMO 1.Introduction – normal car driving

past

2. Normal activity – typical drive away

3. Suspicious – Two men loitering

Page 14: SUSPICIOUS ACTIVITY DETECTION

QUESTIONS AND ANSWERSThank You!