Skip to main content

Artificial Intelligence for Low Level Suspicious Activity Detection

  • Conference paper
  • First Online:
Applications of Advanced Computing in Systems

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

Human activity detection using video surveillance system is the processing of consecutive video frames and analysing any suspicious activity occurring in the video. Detection of human activities comes under the areas of artificial intelligence with image analysis and computer vision as sub-domain. The paper deals with detection of harmful or troublesome human activities using the matching of features obtained by SIFT, so that the further suspicious action can be prevented by alerting the concerned system. The paper narrates about the detection of suspicious activity such as holding a gun, wielding a knife, or punching based on their features. The proposed approach analyses the video frame by frame by observing the suspicious object as well as its activities in the video, and implements SIFT for extraction of features and mean shift algorithm (MSA) for object tracking. This paper gives an apparent idea of developing the system detecting suspicious activities of humans.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Salem FGI (2017) Suspicious human activity detection from surveillance videos, Cankaya Universitesi

    Google Scholar 

  2. Uddin Khan N, Arya KV, Pattanaik M (2010) An efficient image noise removal and enhancement method. IEEE

    Google Scholar 

  3. Inamori S, Yamauchi S, Fukuhara K (1993) A method of noise reduction on image processing. IEEE Trans Consum Electron 39(4):801–805

    Article  Google Scholar 

  4. Piccardi, M (2004) Background subtraction techniques: a review. IEEE

    Google Scholar 

  5. Radzi SSM, et al (2014) Extraction of moving objects using frame differencing, ghost and shadow removal. IEEE

    Google Scholar 

  6. Comaniciu D, Ramesh V, Meer P (2000) Real-time tracking of non-rigid objects using mean shift. IEEE

    Google Scholar 

  7. Bhattacherjee S, Somashekhar GC (2017) Artificial Intelligence to Impart Surveil- lance, Tracking, Actuation on Suspicious Activities. IEEE

    Google Scholar 

  8. Lowe DG (1999) Object recognition from local scale-invariant features. IEEE

    Google Scholar 

  9. Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vision 60(2):91–110

    Article  Google Scholar 

  10. Jindal R, Vatta S (2010) Sift: Scale invariant feature transform. IJARIIT 1:1–5

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishal Gond .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thombare, P., Gond, V., Satpute, V.R. (2021). Artificial Intelligence for Low Level Suspicious Activity Detection. In: Kumar, R., Dohare, R.K., Dubey, H., Singh, V.P. (eds) Applications of Advanced Computing in Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-33-4862-2_23

Download citation

Publish with us

Policies and ethics