571 likes | 1.18k Views
Student: Dane Brown 2713985 Supervisor : James Connan and Mehrdad Ghaziasgar. SUSPICIOUS ACTIVITY DETECTION. OVERVIEW. INTRODUCTION DESIGN DECISIONS IMPLEMENTATION PROJECT PLAN DEMO. INTRODUCTION. Extremely high crime rate in South Africa Car break-in rate was 16000 in 2009
E N D
Student: Dane Brown 2713985 Supervisor : James Connanand MehrdadGhaziasgar SUSPICIOUS ACTIVITY DETECTION
OVERVIEW • INTRODUCTION • DESIGN DECISIONS • IMPLEMENTATION • PROJECT PLAN • DEMO
INTRODUCTION • Extremely high crime rate in South Africa • Car break-in rate was 16000 in 2009 • 18 times the rate of USA • Carjacking is the most common crime in South Africa • Costing tax payers billions of rands!
INTRODUCTION cont. • CCTV cameras • Human monitored • Current solution ineffective • Continued high break-in rate
INTRODUCTION cont. • Pioneered revolutionary system • Uses computer vision techniques • Automatically detects suspicious activity from a video feed • Detection happens in real-time
INTRODUCTION cont. • Pioneered revolutionary system
DESIGN DECISIONS • Classification methods • Machine learning such as Haar-like features with Adaboost • Generally training 2000+ sample frames • Why not a classification method? • Trade-off between speed, complexity and accuracy • There are simpler and more robust ways to differentiate suspicious and normal behaviour.
IMPLEMENTATION • Original frame in RGB colour
IMPLEMENTATION cont. • Gray Scale and Frame differencing
IMPLEMENTATION cont. • Motion History Image (MHI)
IMPLEMENTATION cont. • Blob and movement detection (using MHI)
IMPLEMENTATION cont. • Blob and movement detection
IMPLEMENTATION cont. • Blob and movement detection
IMPLEMENTATION cont. • System determines normal activity • Park car
IMPLEMENTATION cont. • System determines normal activity • Park car
IMPLEMENTATION cont. • System determines normal activity • Get out
IMPLEMENTATION cont. • System determines normal activity • Walk away
IMPLEMENTATION cont. • System determines normal activity • Walk away
IMPLEMENTATION cont. • System determines normal activity • Get back in
IMPLEMENTATION cont. • System determines normal activity • Drive away
IMPLEMENTATION cont. • System determines normal activity • Drive away
IMPLEMENTATION cont. • System determines suspicious activity • Loitering next to a vehicle is suspicious
IMPLEMENTATION cont. • System determines suspicious activity • Loitering next to a vehicle is suspicious
IMPLEMENTATION cont. • System determines suspicious activity • Loitering next to a vehicle is suspicious
IMPLEMENTATION cont. • System determines suspicious activity • Loitering next to a vehicle is suspicious
IMPLEMENTATION cont. • System determines suspicious activity • Loitering next to a vehicle is suspicious
IMPLEMENTATION cont. • System determines suspicious activity • Loitering next to a vehicle is suspicious
IMPLEMENTATION cont. • System determines other suspicious activity • Parking, but not leaving the vehicle
IMPLEMENTATION cont. • System determines other suspicious activity • Accelerating too fast
IMPLEMENTATION cont. • Suspicious activity detected!
DEMO • 1. Normal activity - typical drive away • 2. Suspicious - two men loitering • 3. Suspicious - Stationary • 4. Suspicious - Acceleration
REFERENCES • Davis, J. W. (2005). Motion History Image. Retrieved 2010, from The OhiaState University. • Green, B. (2002). Histogram, Thresholding and Image Centroid Tutorial. Retrieved 2010, from Drexel University site. • Trip Atlas. (2010). Retrieved from Carjacking: http://tripatlas.com/Carjacking#South%20Africa • Hijacking. (2010). Retrieved from Arrive Alive: http://www.arrivealive.co.za/pages.aspx?i=2364