SlideShare a Scribd company logo
5
Most read
9
Most read
10
Most read
AN INDUSTRY ORIENTED
MAJOR PROJECT
ON
“SUSPICIOUS ACTIVITY DETECTION”
Computer Science & Engineering
Mahaveer Institute of Science & Technology
2019-2020
Our Team
Programmer
Working on creating and developing
modules of the software.
Module Designing
Dr. R. NAKEERAN
HOD. CSE Dept
Under the Guidance of
K.SUDHAKAR
Asst. Professor/Assoc. Professor
GAJULA ANJALI PRABHU SANKEERTH
[16E31A05B9]
MUHAMMAD MUSHAHID ALI
[16E31A05D2]
Documentation
Made available of all the documents,
policies and terms.
Specify Documents/Policy
Project Coordinator
SRINIVAS REDDY
Asst. Professor/Assoc. Professor
Agenda
Topics
 Abstract
 Introduction
 Existing System
 Proposed System
 Hardware Requirements
 Software Requirements
 System Modules
 Implementation Output Screens
 Conclusion
 References
ABSTRACT
4
With the increase in the number of anti-social activities that
have been taking place, security has been given utmost
importance lately. Many organizations have installed CCTVs
for constant monitoring of people and their interactions.
01
For a developed country with a population of 64 million,
every person is captured by a camera ~ 30 times a day.
02
A lot of video is generated and stored for certain time
duration( India: 30 days). A 704x576 resolution image
recorded at 25fps will generate roughly 20GB per day.
Since constant monitoring of data by humans to judge if
the events are abnormal is a near impossible task as it
requires a workforce and their constant attention. This
creates a need to automate the same. Also, there is a
need to show in which frame and which parts of it contain
the unusual activity which aid the faster judgment of that
unusual activity being abnormal. The method involves
generating motion influence map for frames to represent
the interactions that are captured in a frame.
03
5
Introduction
 In this project we need to detect person behaviour as suspicious
or not, now a day’s everywhere CCTV cameras are installed
which capture videos and store at centralized server and
manually scanning those videos to detect suspicious activity
from human required lots of human efforts and time. To
overcome from such issue author is asking to automate such
process using Machine Learning Algorithms. To automate that
process first we need to build training model using huge number
of images (all possible images which describe features of
suspicious activities) and ‘Convolution Neural Network’ using
TENSOR FLOW Python module. Then we can upload any video
and then application will extract frames from uploaded video and
then that frame will be applied on train model to predict its class
such as ‘suspicious or normal.
Existing Proposed
The existing
system is based
on manual
checking, this
requires
manpower and
time and we
would not get any
exact result.
To automate that
process first we need to
build training model
using huge number of
images (all possible
images which describe
features of suspicious
activities) and
‘Convolution Neural
Network’ using TENSOR
FLOW Python module.
HARDWARE
REQUIREMENTS
PROCESSOR
Intel Pentium
or Intel i3
RAM
1024MB to
4096MB
(1-4GB)
Monitor
15 inch
color
Hard Disk
500 GB
KeyBoard
Standard
102 Keys
SOFTWARE
REQUIREMENTS
OPERATING SYSTEM
Windows10
Technology
Python 3.6
IDE
PyCharm
9
Optical flow of blocks (optFlowofblocks.py)
The module optical flow of blocks is
provided with a frame and the optical flow of
a frame. It divides the frame into blocks of
size m * n and sums all the optical flows in
each block and returns it along with details
like m, n, size and center of blocks.
10
Motion Influence Generator
(motionInfluenceGenerator.py)
This module is provided with
training or testing video and it
calculates the motioninfluence map
for each frame in that video and
also returns the size of the blocks in
the motioninfluence map.
11
Megablock Generator (createMegaBlocks.py)
This module has 2 functionalities :
a) Generating megablocks and returning them (testing)Megablocks are
generated by grouping motion influence blocks into a bigger sized blocksas
motions of closely situated blocks are similar. A set of megablocks of size
(number of frames* number of megablocks in each row * number of
megablocks each column) is returned.
b) Generating megablocks and returning codewords (training)After repeating
the above process but before returning the set of megablocks, each set
ofmegablocks present in the same frame position is applied kmeans
clustering on and the meanscalled codewords are only returned to the
calling module.
12
Training module (training.py)
Training module calls motion
influence generator and megablock
generator to obtaincodewords on a
training video input. It then stores
codewords in a .npy(NumPY file).
13
Testing module (testing.py)
Testing module calls motion influence generator
and megablock generator to obtain megablocks
on a testing video input. It then constructs a
minimum distance matrix after loading the stored
codewords, checks if a megablock is unusual by
comparing it against a threshold value and
displays unusual megablocks and frames.
Simple PowerPoint Presentation
Simple PowerPoint Presentation
Simple PowerPoint Presentation
Simple PowerPoint Presentation
You can simply impress your audience and
add a unique zing and appeal to your
Presentations. Easy to change colors, photos
and Text. You can simply impress your
audience and add a unique zing and appeal to
your Presentations.
OUTSCREENSLIDES….
THE
OUTSCREENS
D E S I G N O U T L E T S
15
CONCLUSION
Finally,
Thus the Suspicious Human Activities can
be detected using this system. Further, this
system can be extended to detect and
understand the activities of people in
various scenarios. This system is currently
developed for detecting the activities of
people in a stationary background. This
system can be further extended to detect
human activities in places with mobile
background.
REFERENCE
[1] Dong-Gyu Lee, Heung-Il Suk, Sung-Kee Park and Seong-Whan Lee “Motion Influence Map for
Unusual Human Activity Detection and Localization in Crowded Scenes” IEEE transactions on circuits
and systems for video technology, vol. 25, no. 10, October 2015
[2] Data set – http://mha.cs.umn.edu/Movies/Crowd-Activity-All.avi
[3] Data set - http://www.svcl.ucsd.edu/projects/anomaly/
[4] T. Xiang and S. Gong, “Video behavior profiling for anomaly detection,” IEEE Trans. Pattern Anal.
Mach. Intell., vol. 30, no. 5, pp. 893–908, May 2008.
[5] F. Jiang, J. Yuan, S. A. Tsaftaris, and A. K. Katsaggelos, “Anomalous video event detection using
spatiotemporal context,” Comput. Vis. Image Understand., vol. 115, no. 3, pp. 323–333, 2011.
6] B. D. Lucas and T. Kanade, “An iterative image registration technique with an application to stereo
vision,” in Proc. 7th Int. Joint Conf. Artif. Intell., San Francisco, CA, USA, Aug. 1981, pp. 674–679.
[7] OpenCV Python documentation at http://docs.opencv.org/3.0-
beta/doc/py_tutorials/py_tutorials.html
[8] OpenCV references at http://opencv-python-tutroals.readthedocs.io/en/latest/ 16
ANY QUERIES?
Thank You!

More Related Content

PPTX
SUSPICIOUS activity detection using surveillance camara.pptx
PPTX
Real time databases
PPTX
Segments in Graphics
PPTX
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
PPTX
Role of data mining in cyber security
PDF
Final Year Project-Gesture Based Interaction and Image Processing
PDF
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
PPTX
Introduction to Simplified instruction computer or SIC/XE
SUSPICIOUS activity detection using surveillance camara.pptx
Real time databases
Segments in Graphics
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
Role of data mining in cyber security
Final Year Project-Gesture Based Interaction and Image Processing
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Introduction to Simplified instruction computer or SIC/XE

What's hot (20)

DOCX
Suspicious Activity Detection python Project Abstract
PDF
Human activity recognition
PDF
APAN 54: Introducing the IETF
PPTX
Presentation-Detecting Spammers on Social Networks
PPTX
Stress detection using Image processing
PPTX
Graphical password authentication
PDF
Crop prediction using machine learning
PPTX
Image Processing and Computer Vision
PPTX
HUMAN EMOTION RECOGNIITION SYSTEM
PPT
Moving object detection
PPTX
Bluetooth network-security-seminar-report
PDF
Chapter 5 IoT Design methodologies
PPTX
Project on disease prediction
PDF
Screenless displays seminar report
PPS
Human Area Networking Technology
PPT
Pill Camera ppt
PPTX
FOG COMPUTING
PPTX
Machine learning seminar presentation
PPTX
Seminar ppt fog comp
PPTX
project ppt.pptx
Suspicious Activity Detection python Project Abstract
Human activity recognition
APAN 54: Introducing the IETF
Presentation-Detecting Spammers on Social Networks
Stress detection using Image processing
Graphical password authentication
Crop prediction using machine learning
Image Processing and Computer Vision
HUMAN EMOTION RECOGNIITION SYSTEM
Moving object detection
Bluetooth network-security-seminar-report
Chapter 5 IoT Design methodologies
Project on disease prediction
Screenless displays seminar report
Human Area Networking Technology
Pill Camera ppt
FOG COMPUTING
Machine learning seminar presentation
Seminar ppt fog comp
project ppt.pptx
Ad

Similar to Suspicious Activity Detection (20)

PPTX
Presentation1.2.pptx
PDF
PDF
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
PDF
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
PDF
IRJET- Prediction of Anomalous Activities in a Video
PPTX
Merge PPT G3 and G4.pptx
PDF
JUNIKHYAT-ANOMALY RECOGNITION FOR SUSPICIOUS BEHAVIOURS.pdf
PDF
Crime Detection using Machine Learning
PDF
Human Motion Detection in Video Surveillance using Computer Vision Technique
PDF
Traffic Management system using Deep Learning
PPTX
Real Time Object Dectection using machine learning
PPTX
new ppt.pptx
PDF
Event Detection Using Background Subtraction For Surveillance Systems
PPTX
slide-171212080528.pptx
PPTX
MINI PROJECT FINAL 2nd review.ppt DETAILS
PDF
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
PPTX
Automated Video Analysis and Reporting for Construction Sites
PDF
IRJET- Surveillance of Object Motion Detection and Caution System using B...
PDF
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
PDF
IRJET- Survey on Detection of Crime
Presentation1.2.pptx
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...
IRJET- Prediction of Anomalous Activities in a Video
Merge PPT G3 and G4.pptx
JUNIKHYAT-ANOMALY RECOGNITION FOR SUSPICIOUS BEHAVIOURS.pdf
Crime Detection using Machine Learning
Human Motion Detection in Video Surveillance using Computer Vision Technique
Traffic Management system using Deep Learning
Real Time Object Dectection using machine learning
new ppt.pptx
Event Detection Using Background Subtraction For Surveillance Systems
slide-171212080528.pptx
MINI PROJECT FINAL 2nd review.ppt DETAILS
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Automated Video Analysis and Reporting for Construction Sites
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Survey on Detection of Crime
Ad

Recently uploaded (20)

PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Architecture types and enterprise applications.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Getting Started with Data Integration: FME Form 101
PDF
Hybrid model detection and classification of lung cancer
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
August Patch Tuesday
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
DP Operators-handbook-extract for the Mautical Institute
Architecture types and enterprise applications.pdf
cloud_computing_Infrastucture_as_cloud_p
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Module 1.ppt Iot fundamentals and Architecture
Getting Started with Data Integration: FME Form 101
Hybrid model detection and classification of lung cancer
Enhancing emotion recognition model for a student engagement use case through...
Zenith AI: Advanced Artificial Intelligence
Getting started with AI Agents and Multi-Agent Systems
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
August Patch Tuesday
TLE Review Electricity (Electricity).pptx
O2C Customer Invoices to Receipt V15A.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Developing a website for English-speaking practice to English as a foreign la...
1 - Historical Antecedents, Social Consideration.pdf
A novel scalable deep ensemble learning framework for big data classification...
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Suspicious Activity Detection

  • 1. AN INDUSTRY ORIENTED MAJOR PROJECT ON “SUSPICIOUS ACTIVITY DETECTION” Computer Science & Engineering Mahaveer Institute of Science & Technology 2019-2020
  • 2. Our Team Programmer Working on creating and developing modules of the software. Module Designing Dr. R. NAKEERAN HOD. CSE Dept Under the Guidance of K.SUDHAKAR Asst. Professor/Assoc. Professor GAJULA ANJALI PRABHU SANKEERTH [16E31A05B9] MUHAMMAD MUSHAHID ALI [16E31A05D2] Documentation Made available of all the documents, policies and terms. Specify Documents/Policy Project Coordinator SRINIVAS REDDY Asst. Professor/Assoc. Professor
  • 3. Agenda Topics  Abstract  Introduction  Existing System  Proposed System  Hardware Requirements  Software Requirements  System Modules  Implementation Output Screens  Conclusion  References
  • 4. ABSTRACT 4 With the increase in the number of anti-social activities that have been taking place, security has been given utmost importance lately. Many organizations have installed CCTVs for constant monitoring of people and their interactions. 01 For a developed country with a population of 64 million, every person is captured by a camera ~ 30 times a day. 02 A lot of video is generated and stored for certain time duration( India: 30 days). A 704x576 resolution image recorded at 25fps will generate roughly 20GB per day. Since constant monitoring of data by humans to judge if the events are abnormal is a near impossible task as it requires a workforce and their constant attention. This creates a need to automate the same. Also, there is a need to show in which frame and which parts of it contain the unusual activity which aid the faster judgment of that unusual activity being abnormal. The method involves generating motion influence map for frames to represent the interactions that are captured in a frame. 03
  • 5. 5 Introduction  In this project we need to detect person behaviour as suspicious or not, now a day’s everywhere CCTV cameras are installed which capture videos and store at centralized server and manually scanning those videos to detect suspicious activity from human required lots of human efforts and time. To overcome from such issue author is asking to automate such process using Machine Learning Algorithms. To automate that process first we need to build training model using huge number of images (all possible images which describe features of suspicious activities) and ‘Convolution Neural Network’ using TENSOR FLOW Python module. Then we can upload any video and then application will extract frames from uploaded video and then that frame will be applied on train model to predict its class such as ‘suspicious or normal.
  • 6. Existing Proposed The existing system is based on manual checking, this requires manpower and time and we would not get any exact result. To automate that process first we need to build training model using huge number of images (all possible images which describe features of suspicious activities) and ‘Convolution Neural Network’ using TENSOR FLOW Python module.
  • 7. HARDWARE REQUIREMENTS PROCESSOR Intel Pentium or Intel i3 RAM 1024MB to 4096MB (1-4GB) Monitor 15 inch color Hard Disk 500 GB KeyBoard Standard 102 Keys
  • 9. 9 Optical flow of blocks (optFlowofblocks.py) The module optical flow of blocks is provided with a frame and the optical flow of a frame. It divides the frame into blocks of size m * n and sums all the optical flows in each block and returns it along with details like m, n, size and center of blocks.
  • 10. 10 Motion Influence Generator (motionInfluenceGenerator.py) This module is provided with training or testing video and it calculates the motioninfluence map for each frame in that video and also returns the size of the blocks in the motioninfluence map.
  • 11. 11 Megablock Generator (createMegaBlocks.py) This module has 2 functionalities : a) Generating megablocks and returning them (testing)Megablocks are generated by grouping motion influence blocks into a bigger sized blocksas motions of closely situated blocks are similar. A set of megablocks of size (number of frames* number of megablocks in each row * number of megablocks each column) is returned. b) Generating megablocks and returning codewords (training)After repeating the above process but before returning the set of megablocks, each set ofmegablocks present in the same frame position is applied kmeans clustering on and the meanscalled codewords are only returned to the calling module.
  • 12. 12 Training module (training.py) Training module calls motion influence generator and megablock generator to obtaincodewords on a training video input. It then stores codewords in a .npy(NumPY file).
  • 13. 13 Testing module (testing.py) Testing module calls motion influence generator and megablock generator to obtain megablocks on a testing video input. It then constructs a minimum distance matrix after loading the stored codewords, checks if a megablock is unusual by comparing it against a threshold value and displays unusual megablocks and frames.
  • 14. Simple PowerPoint Presentation Simple PowerPoint Presentation Simple PowerPoint Presentation Simple PowerPoint Presentation You can simply impress your audience and add a unique zing and appeal to your Presentations. Easy to change colors, photos and Text. You can simply impress your audience and add a unique zing and appeal to your Presentations. OUTSCREENSLIDES…. THE OUTSCREENS D E S I G N O U T L E T S
  • 15. 15 CONCLUSION Finally, Thus the Suspicious Human Activities can be detected using this system. Further, this system can be extended to detect and understand the activities of people in various scenarios. This system is currently developed for detecting the activities of people in a stationary background. This system can be further extended to detect human activities in places with mobile background.
  • 16. REFERENCE [1] Dong-Gyu Lee, Heung-Il Suk, Sung-Kee Park and Seong-Whan Lee “Motion Influence Map for Unusual Human Activity Detection and Localization in Crowded Scenes” IEEE transactions on circuits and systems for video technology, vol. 25, no. 10, October 2015 [2] Data set – http://mha.cs.umn.edu/Movies/Crowd-Activity-All.avi [3] Data set - http://www.svcl.ucsd.edu/projects/anomaly/ [4] T. Xiang and S. Gong, “Video behavior profiling for anomaly detection,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 5, pp. 893–908, May 2008. [5] F. Jiang, J. Yuan, S. A. Tsaftaris, and A. K. Katsaggelos, “Anomalous video event detection using spatiotemporal context,” Comput. Vis. Image Understand., vol. 115, no. 3, pp. 323–333, 2011. 6] B. D. Lucas and T. Kanade, “An iterative image registration technique with an application to stereo vision,” in Proc. 7th Int. Joint Conf. Artif. Intell., San Francisco, CA, USA, Aug. 1981, pp. 674–679. [7] OpenCV Python documentation at http://docs.opencv.org/3.0- beta/doc/py_tutorials/py_tutorials.html [8] OpenCV references at http://opencv-python-tutroals.readthedocs.io/en/latest/ 16