Open Access   Article Go Back

Alert Based System for Real-time Suspicious Activity Detection

Hemant Vyas1 , Shraddha Masih2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 556-561, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.556561

Online published on Jul 31, 2018

Copyright © Hemant Vyas, Shraddha Masih . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Hemant Vyas, Shraddha Masih, “Alert Based System for Real-time Suspicious Activity Detection,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.556-561, 2018.

MLA Style Citation: Hemant Vyas, Shraddha Masih "Alert Based System for Real-time Suspicious Activity Detection." International Journal of Computer Sciences and Engineering 6.7 (2018): 556-561.

APA Style Citation: Hemant Vyas, Shraddha Masih, (2018). Alert Based System for Real-time Suspicious Activity Detection. International Journal of Computer Sciences and Engineering, 6(7), 556-561.

BibTex Style Citation:
@article{Vyas_2018,
author = {Hemant Vyas, Shraddha Masih},
title = {Alert Based System for Real-time Suspicious Activity Detection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {556-561},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2473},
doi = {https://doi.org/10.26438/ijcse/v6i7.556561}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.556561}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2473
TI - Alert Based System for Real-time Suspicious Activity Detection
T2 - International Journal of Computer Sciences and Engineering
AU - Hemant Vyas, Shraddha Masih
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 556-561
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
514 229 downloads 184 downloads
  
  
           

Abstract

Alert based systems for real time suspicious activity detection is an active research area. In this work we have worked on abandoned object detection that is a type of suspicious activity. Real time video surveillance systems that are used in places such as airports, railway stations or different public places, can bring security to an upper level. Security is a major issue in this era. So, it has become crucial to set up proficient risk recognition frameworks that can identify and perceive possibly risky circumstances and alert the authorities to make a suitable move. The video surveillance systems that are used for security reasons require more intellectual and more robust technical directives. In this Proposed research work is to detect abandoned objects in real time. This work depicts a framework that perceives the event of somebody leaving baggage unattended in public areas either intentionally or mistakenly. Tracking of intentionally left object is a major problem as it imposes serious security risks. Also, proper tracking of mistakenly left object is another issue to resolve. Therefore, proposed system invokes an alert mail to the authorized person whenever it encounters a left object. This system can be used in railway stations, air ports where we want to detect real time abandoned objects. The video surveillance systems that are used for security reasons require more intellectual and more robust technical directives.

Key-Words / Index Term

Video surveillance; Object detection; Background subtraction; Background buffer; Moving object detection

References

[1] Mathur, Garima, and Mahesh Bundele. "Research on intelligent video surveillance techniques for suspicious activity detection critical review." Recent Advances and Innovations in Engineering (ICRAIE), 2016 International Conference on. IEEE, 2016.

[2] Panchal, Payal, et al. "A review on object detection and tracking methods." International Journal for Research in Emerging Science and Technology 2.1 (2015): 7-12.

[3] Dedeoglu, Yigithan. "Moving object detection, tracking and classification for smart video surveillance." Master`s Thesis, Bilkent University, Ankara, pp2 (2004).

[4] Gupta, Aditya, et al. "Real-Time Abandoned Object Detection Using Video Surveillance." Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi, 2016.

[5] Parihar, Vikramsingh R., and Anagha P. Dhote. "A Novel Approach to Real Time Face Detection and Recognition." International Journal of Computer Sciences and Engineering (IJCSE) 5.9 (2017): 62-67.

[6] Tavanai, Aryana, et al. "Carried object detection and tracking using geometric shape models and spatio-temporal consistency." International Conference on Computer Vision Systems. Springer, Berlin, Heidelberg, 2013.

[7] Ratnesh Kumar Shukla1, Ajay Agarwal.” An Introduction of Face Recognition and Face Detection for Blurred and Noisy Images” International Journal of Scientific Research in Computer Sciences and Engineering (IJSRCSE), Vol.6, Issue.3, pp.22-26 , June (2018)

[8] Lee, Chan-Su, and Ahmed Elgammal. "Carrying object detection using pose preserving dynamic shape models." International Conference on Articulated Motion and Deformable Objects. Springer, Berlin, Heidelberg, 2006.

[9] Senst, Tobias, Rubén Heras Evangelio, and Thomas Sikora. "Detecting people carrying objects based on an optical flow motion model." Applications of Computer Vision (WACV), 2011 IEEE Workshop on. IEEE,2011.

[10] Senst, Tobias, et al. "Detecting people carrying objects utilizing lagrangian dynamics." Advanced Video and Signal-Based Surveillance (AVSS), 2012 IEEE Ninth International Conference on. IEEE, 2012.

[11] Saindane, Amrut C., and Pravin S. Patil. "An Efficient Human Recognition Using Background Subtraction and Bounding Box Technique for Surveillance Systems." International Journal of Computer Sciences and Engineering (2016): 72.

[12] Punam Mahesh Ingale.,”The importance of digital image processing and its applications” International Journal of Scientific Research in Computer Sciences and Engineering (IJSRCSE), Vol.06 , Issue.01 , pp.31-32, Jan-2018.