Suspicious Activity Detection - University of the Western Cape
Download
Report
Transcript Suspicious Activity Detection - University of the Western Cape
Student: Dane Brown 2713985
Supervisor : James Connan
Co-Supervisor : Mehrdad Ghaziasgar
OVERVIEW
INTRODUCTION
USER INTERFACE CHANGES
DESIGN DECISIONS
IMPLEMENTATION
TOOLS USED
PROJECT PLAN
DEMO
INTRODUCTION
What
does the system regard as normal activity
Park car, get out, walk away, get back in, drive away
What
does the system regard as suspicious?
Loitering next to a vehicle is suspicious
USER INTERFACE CHANGES
DESIGN DECISIONS
Haar
feature-extraction
Typically the training 1000+ sample frames containing
normal activity and suspicious activity
What
not haar feature-extraction?
Performance is good only on a very fast machine
There are simpler and more robust ways to differentiate
suspicious and normal behaviour.
IMPLEMENTATION
Gray Scale and Frame differencing
IMPLEMENTATION cont.
Thresholding and Motion History Image (MHI)
IMPLEMENTATION cont.
Blob and movement detection
IMPLEMENTATION cont.
Suspicious activity detected!
TOOLS USED cont.
Kubuntu 10.04
Opencv with ffmpeg – video manipulation
VirtualDub – open source video editor
PROJECT PLAN
GOAL
DUE DATE
Testing
Till the end of term 4
Hand in term 3 Documentation
15 September 2010
Final Demo and Final Documentation
End of term 4
REFERENCES
Davis, J. W. (2005). Motion History Image. Retrieved 2010,
from The Ohia State University.
Bouakaz, S. (2003). Image Processing and Analysis
Reference. Retrieved 2010, from Université Claude Bernard
Lyon 1.
Green, B. (2002). Histogram, Thresholding and Image
Centroid Tutorial. Retrieved 2010, from Drexel University
site.
DEMO
1.Introduction – normal car driving
past
2. Normal activity – typical drive away
3. Suspicious – Two men loitering