Smart Video Surveillance Using Deep Learning
Keywords:
Abstract
There is a lot of assessment happening in the business about video observation among them; the occupation of CCTV accounts has been blocked. CCTV cameras are put all around the spots for perception and security. Somewhat recently, there have been progressions in profound learning calculations for reconnaissance. These progressions have shown a fundamental pattern in profound reconnaissance and guaranteeing radical proficiency. The normal employments of deep learning are theft, violence revelation, and area of the chances of impact. This project aims to distinguish strange occasions or peculiarities in recordings utilizing Spatio-temporal autoencoder. We will present a Spatio-temporal autoencoder for this video observation project, which depends on a 3D convolution organization. We train an auto-encoder in this deep learning project for unusual occasion detection on normal videos. We recognize the strange occasion’s dependent on the Euclidean distance of the custom video feed and the casings anticipated by the auto-encoder.
References
- V. Singh and M. Kankanhalli, “Adversary aware surveillance systems,” Information Forensics and Security, IEEE Transactions on, vol. 4, no. 3, pp. 552–563, 2009.
- S. Avidan, “Ensemble tracking,” IEEE transactions on pattern analysis and machine intelligence, pp. 261–271, 2007.
- X. Yu, K. Chinomi, T. Koshimizu, N. Nitta, Y. Ito, and N. Babaguchi, “Privacy protecting visual processing for secure video surveillance,” in ICIP, 2008, pp. 1672–1675.
- Y. Cong, H. Gong, S. Zhu, and Y. Tang, “Flow mosaicking: Real-time pedestrian counting without scene-specific learning,” in CVPR, 2009, pp. 1093–1100.
- H. Zhong, J. Shi, and M. Visontai, “Detecting unusual activity in video,” in CVPR, 2004.
- A. M. Cheriyadat and R. J. Radke, “Detecting Dominant Motions in Dense Crowds,” Selected Topics In Signal Processing, IEEE Journal Of, vol. 2, no. 4, pp. 568–581, 2008.
- C. Loy, T. Xiang, and S. Gong, “Detecting and discriminating behavioral anomalies,” Pattern Recognition, vol. 44, no. 1, pp. 117–132, 2011
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.