下載/瀏覽Download
Download
Report
Transcript 下載/瀏覽Download
Using Inactivity to Detect
Unusual behavior
Dickinson, P.; Hunter, A.
Motion and video Computing, 2008. WMVC 2008. IEEE
Workshop on, Issue Date: 8-9 Jan. 2008 , Page(s): 1 - 6
Presenter : Siang Wang
Advisor :
Dr. Yen - Ting Chen
Date :
2014.11.26
2
Outline
Introduction
Methods
Evaluation
Conclusions
3
Introduction
Automated visual surveillance systems are
often intended to detect interesting, unusual
or abnormal activity in a monitored scene.
4
Introduction
Interest has develop around the potential of
automated surveillance to support homebased care of peoples.
Elderly
Vulnerable people
5
Introduction
The costs associated with providing
traditional methods of assistive care to ageing
populations is rising, and set to rise much
further in the future.
The applications of surveillance in
residential care homes have been considered.
6
Introduction
The detection of unusual patterns of behavior
Anomalies indicate a requirement for
intervention by a care provider.
Developing a “transparent” model which is
readily interpretable
7
Introduction
Behavior recognition are largely based on
learning time-series models of specific
activities.
The observation is about the behavior of a
person in their home, and particularly that of
an elderly person, is fairly sedentary.
8
Introduction
A probabilistic spatial map of inactivity
mixture of Gaussians (MoG) in 2 dimensional
space
Conjunction with Hidden Markov Model
(HMM) framework
9
Introduction
Markov Model
10
Introduction
Hidden Markov Model
11
Methods
Foreground segmentation technique
The corresponding eigenvectors
1
𝑒𝑡
and
2
𝑒𝑡
An oriented bounding box (OBB) around the
silhouette
12
S. McKenna and H. Nait-Charif. Summarising contextual activity and
detecting unusual inactivity in a supportive home environment. Pattern
Analysis and Applications, 7(4):386 – 401, 2004.
Methods
13
Methods
Detect trajectory start and end points by
calculating a mean target velocity,𝑣𝑡 , for
each image frame, over a time window w
(1)
𝑇𝑖𝑛 , 𝑉𝑖𝑛 , 𝑉𝑚𝑣 represent the only
configurable parameters for our system
14
Methods
The probability of observing some trajectory
end point xi is then given by :
15
Methods
Expectation Maximization (EM) algorithm
E-step : the expectation step calculates the
posterior probability
16
Methods
Expectation Maximization (EM) algorithm
M-step : The model parameters are then reestimated from the statistics of the training data
17
Methods
Expectation Maximization (EM) algorithm
M-step : The model parameters are then reestimated from the statistics of the training data
18
Methods
Different values for the configurable
parameters 𝑇𝑖𝑛 , 𝑉𝑖𝑛 and 𝑉𝑚𝑣
19
Methods
20
Methods
21
Methods
Different values for the configurable
parameters 𝑇𝑖𝑛 , 𝑉𝑖𝑛 and 𝑉𝑚𝑣
More sensitive
𝑉𝑖𝑛 > ( 𝑇𝑖𝑛 or 𝑉𝑚𝑣 )
Less sensitive
𝑉𝑖𝑛 < ( 𝑇𝑖𝑛 or 𝑉𝑚𝑣 )
22
Methods
The Hidden Markov Model Framework
First :
Parameter
𝜆𝑛𝑚
normal sequences of inactivity
events
𝜃𝑜𝑝𝑡
the inactivity map
𝜒𝑗
the training data , j = {0 . . . 𝑁𝑠 }
23
Methods
The Hidden Markov Model Framework
Second :
Parameter
λth
inferred threshold model
X𝑜𝑏𝑠
detect unusual sequences by
comparing the model likelihoods
over
24
Methods
𝜋𝑘 is the probability of a sequence
initializing in state 𝑞𝑘 in 𝜆𝑛𝑚
𝑋𝑗 (1) is the first data point in sequence 𝑋𝑗
25
Methods
The transition probabilities A between the
states are constructed in similar fashion
𝑁𝑥 is the number of data points in sequence
𝑋𝑗
26
Methods
The Threshold Model
is identical 𝜆𝑛𝑚 apart from the transition matrix
A
27
Methods
The trajectory end points 𝑋𝑜𝑏𝑠 are extracted
using equation 1, with same values of 𝑇𝑖𝑛 ,
𝑉𝑖𝑛 , and 𝑉𝑚𝑣
28
Evaluation
Filmed two sets of test sequences for each scene
Comprised small variations on the scripted
activities
Displayed the types of unusual or abnormal
behaviors
29
Evaluation
30
Conclusion
2D MoG model
Learned using EM
Build a pair of HMMs
normal sequences of inactivity
arbitrary behavior
31
Conclusion
The advantage of the proposed system
is not dependent on identifying specific
activities
is tolerant to small variations in normal
behavior
is unsupervised and having only a few
configurable parameters
32
Thanks for your attention