Crowd behavior representation using motion influence matrix for anomaly detection

Dong Gyu Lee, Heung Il Suk, Seong Whan Lee

Research output: Contribution to conferencePaperpeer-review

11 Scopus citations

Abstract

In this paper, we propose a new method to detect abnormal behavior in crowd video. The motion influence matrix is proposed to represent crowd behaviors. It is generated based on concept of human perception with block-level motion vectors which describe actual crowd movement. Furthermore, a generalized framework is developed to detect abnormal crowd behavior using motion influence matrix. The proposed method has an advantage of that does not require any human detection or segmentation method which make it robust to human detection error by using optical flows which is extracted from two continuous frames. In this model, a normal behavior is presented by a low motion influence value. On the other hand, a high motion influence value indicates occurrence of abnormal behavior. Spatio-temporal cuboids are extracted from the motion influence matrix to measure the unusualness of the frame. Two different kinds of abnormal behaviors are dealt in this research: global abnormal behavior and local abnormal behavior. For t quantitative measurement of effectiveness of the proposed method, we evaluate our algorithm on two datasets: UMN and UCSD for global and local abnormal behavior, respectively. Experimental results show that the proposed method outperforms the competing methods.

Original languageEnglish
Pages110-114
Number of pages5
DOIs
StatePublished - 2013
Event2013 2nd IAPR Asian Conference on Pattern Recognition, ACPR 2013 - Naha, Okinawa, Japan
Duration: 5 Nov 20138 Nov 2013

Conference

Conference2013 2nd IAPR Asian Conference on Pattern Recognition, ACPR 2013
Country/TerritoryJapan
CityNaha, Okinawa
Period5/11/138/11/13

Keywords

  • Anomaly detection
  • Crowd analysis
  • Video surveillance

Fingerprint

Dive into the research topics of 'Crowd behavior representation using motion influence matrix for anomaly detection'. Together they form a unique fingerprint.

Cite this