1 / 30

Anomaly Detection - Traffic Video Surveillance

Anomaly Detection - Traffic Video Surveillance. Ziming Zhang, Yucheng Zhao and Yiwen Wan. Outline. Introduction &Motivation Problem Statement Paper Summeries Discussion and Conclusions. What are Anomalies?.

elise
Download Presentation

Anomaly Detection - Traffic Video Surveillance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Anomaly Detection -Traffic Video Surveillance Ziming Zhang, Yucheng Zhao and Yiwen Wan

  2. Outline • Introduction&Motivation • Problem Statement • Paper Summeries • Discussion and Conclusions

  3. What are Anomalies? • Anomaly is a pattern in the data that does not conform to the expected behaviour • Also referred to as outliers, exceptions, peculiarities, surprise, etc.

  4. Anomaly Detection -Video Traffic Surveillance • Vehicle behavior is represented as trajectories • When trajectory does conform to dominant pattern it is detected as anomaly or outlier • Collective Anomalies outlier outlier

  5. Problem Description & Definition Data Input: Spatio-temperal trajectories of moving objects

  6. Problem Description & Definition • Scene Modeling: • Scene Representation: interest points/path • Learning Model:unsupervised/supervised

  7. Problem Description & Definition Activity Analysis: virtual fencing, speed profiling, path classification, anomaly detection, online activity analysis and object interaction characterization

  8. Key Challenges • Accurate and efficient representation of trajectories • Defining a representative normal pattern is challenging • The boundary between normal and outlying behaviour is often not precise • Availability of labelled data for training/validation • Data might contain noise • Normal behaviour keeps evolving

  9. 3 paper SummariesP1:Event Detection Using Trajectory Clustering and 4-D Histogram CláudioRosito Jung, Member, IEEE, LucianoHennemann, and SoraiaRauppMusse IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 18, NO. 11, NOVEMBER 2008

  10. Framework Input Trajectories Representation …… (x3,y3) Initial Clustering (x2,y2) (x1,y1) (xn,yn) Cluster Representation using 4-D histogram F=(x1-x2,y1-y2,x2-x3,y2-y3…xn-xn-1,yn-yn-1) Event Detection

  11. Framework Input Trajectories Representation Initial Clustering Cluster Representation using 4-D histogram Event Detection

  12. Framework Input Trajectories Representation Initial Clustering Cluster Representation using 4-D histogram Event Detection

  13. Framework Input Trajectories Representation Initial Clustering Cluster Representation using 4-D histogram Event Detection

  14. Summary • trajectories collected from trackers • Offline clustering based on Mixture of Gaussian is used for path modeling • 4-D histogram is used to represent spatial and temporal characteristics of each cluster/path for further event detection such as drift, shift, entry, bifurcation, confluence, incoherent local speed, incoherent local orientation pattern • Two dataset(pedestrian and traffic scenario) are tested and 20 human observers were used for accuracy validation: the number of evaluation that agreed with results from proposed method

  15. 3 paper SummariesP2: Clustering Vehicle Trajectories with Hidden Markov Models Application to Automated Traffic Safety Analysis Nicolas Saunier and TarekSayed

  16. Introduction • Reduction of public resources on detecting traffic collision. • Conflicting causes collisions • Conflicting definition • Two or more vehicles closed enough in time and space • Trajectory representation • A sequence of {x, y, vx, vy}

  17. Model • HMM (Hidden Markov Model)

  18. Model • HMM (Hidden Markov Model) • Sequence of observation = {walk, shop, clean} • Compute the probability of observing a sequence, given a model. • Find the state sequence that maximizes the probability of the given sequence, when the model is known. (Viterbi) • Induce the HMM that maximizes the probability of the given sequence. (Baum-Welch)

  19. Model • K-Means clustering

  20. Model • HMM-based K-means clustering • A set of vehicle trajectories (sequences) • A set of initial HMM (k HMMs) • Step1: Calculating all the probabilities • Step2: Associating the trajectory with HMM that maximizes probability of the trajectory • Step3: Updating HMMs based on the temporary clustering result • Step4: Repeating step 1, 2 and 3 until convergence has been reached

  21. Model • Training and testing the model • Several instances of conflicting trajectory pairs train the model to identify mutual conflicting trajectory clusters • New trajectories are associated with certain trajectory cluster based on the specific HMM probability maximization • Conflicting trajectories are identified by their clustering result.

  22. 3 paper SummariesP3: On-line trajectory clustering for anomalous events detection C. Piciarelli *, G.L. Foresti Department of Mathematics and Computer Science, University of Udine, Via delleScienze 206, 33100 Udine, Italy Available online 21 April 2006

  23. Introduction • Problem: Classical two-step clustering algorithm can not update cluster dynamically • Solution: On-line trajectory clustering approach with a tree-like structure • Goal:Suit for video surveillances sysytems from image analysis to behavior analysis to detect anomalous events

  24. Problem Definition Traditional trajectory clustering not suited for detect anomalous events • off-line: not useful in activity analysis • video system: complex structure,from moving ojects(low level) to behaviour analysis (high)

  25. Proposed Algorithm Representing trajectories as a tree of cluster • Trajectory(Ti): represented by a list of vectors Tij(representing a spatial position at time j) • Clusters(Ci): organized in a tree-like structure that, augmented with probability information, represented as a list of vectors • Define a distance or similarit to check if a Ti matches a given Ci( dynamically), when a Ti matches a Ci, cluster needs to be updated.

  26. Tree-like Structure Tree creation steps: 1)building,create tree of clusters from acquried data dynamically,without waitting the end of trajectory. 2)maintenance as below:

  27. Summary For behaviour analysis, we define that an anomaly is an event happening rarely. Also we assume that dangerous events are generally anomalous. An anomalous trjectory can be defined as a trajectory matches a path in the tree with low probability. With probabilitic information, we can implement anomaly detection.

  28. Comparison

  29. Conclusion • Availability of labelled data for training/validation is not easy and unsupervised clustering is favored • online clustering is very important since normal behaviour keeps evolving • Approaches robust to noisy trajectories from tracking is preferred

  30. Thanks!!! • Questions?

More Related