IJIGSP Vol. 13, No. 1, 8 Feb. 2021
Cover page and Table of Contents: PDF (size: 747KB)
Full Text (PDF, 747KB), PP.13-27
Views: 0 Downloads: 0
Suspicious activity detection, frequent iris movement, eye detection, iris detection, iris movement, TRM iris dataset
This paper suggested a new framework for detecting abnormal behavior, specifically based on frequent iris movements. It contributed to a decision whereas an individual is dubious or unsuspected from a video. One of the key components of questionable observer detection is to detect some specific suspicious activity. According to the writer, various areas of the body movement and human behaviors may be an indicator of suspicious behavior. In this research, we considered the movement of human eyes to identify suspicious activity. This working field is also a significant aspect of machine vision and artificial intelligence, and a big part of the understanding of human behavior. The system framework comprises three parts to monitor suspicious video activities. First, we used the Multi-task Cascaded Convolutional Networks (MTCNN) classifier to detect eyes. Second, we observe irises from eye representations with the use of Circular Hough Transformation (CHT). Finally, we calculated the average distance of iris movement from eye images using a new morphological method called TRM using some properties of the iris movement. We have observed a particular phenomenon of frequent iris movement. Hence, we are making a case of someone being an abnormal person and referring it to a suspicious observer. To vouch for our work, we created our data set with 100 videos where 30 individuals volunteered to validate this research. Each video comprises 200 frames with a duration of 6-10 seconds. We’ve reached an accuracy of 94% on detecting a frequent iris movement. Rather the goal is to minimize people’s burdens so they can focus on a small range of cases for investigation in more depth. This research’s sole purpose is to indicate a person’s anomalous behavior on the basis of frequent iris movement. Our research outstrips much of the current literature on abnormal iris movement and dubious investigator identification.
Md. Minhaz Ur Rahman, Mahmudul Hasan Robin, Abu Mohammad Taief, " A New Framework for Video-based Frequent Iris Movement Analysis towards Anomaly Observer Detection", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.13, No.1, pp. 13-27, 2021. DOI:10.5815/ijigsp.2021.01.02
[1]A. Wiliem, V. Madasu, W. Boles, and P. Yarlagadda, “A suspicious behaviour detection using a context space model for smart surveillance systems,” Computer Vision and Image Understanding, vol. 116, no. 2, pp. 194–209, 2012.
[2]Doewes, Afrizal, Sri Edi Swasono, and Bambang Harjito. "Feature selection on Human Activity Recognition dataset using Minimum Redundancy Maximum Relevance." In Consumer Electronics-Taiwan (ICCE-TW), 2017 IEEE International Conference on, pp. 171-172. IEEE, 2017.
[3]Dhulekar, P. A., S. T. Gandhe, Anjali Shewale, Sayali Sonawane, and Varsha Yelmame. "Motion estimation for human activity surveillance." In Emerging Trends & Innovation in ICT (ICEI), 2017 International Conference on, pp. 82-85. IEEE, 2017.
[4]Hsu, Yu-Liang, Shyan-Lung Lin, Po-Huan Chou, Hung-Che Lai, Hsing-Cheng Chang, and Shih-Chin Yang. "Application of nonparametric weighted feature extraction for an inertial-signal-based human activity recognition system." In Applied System Innovation (ICASI), 2017 International Conference on, pp. 1718-1720. IEEE, 2017.
[5]Xu, Wanru, Zhenjiang Miao, Xiao-Ping Zhang, and Yi Tian. "Learning a hierarchical spatio-temporal model for human activity recognition." In Acoustics, Speech and Signal Processing (ICASSP), 2017 IEEE International Conference on, pp. 1607-1611. IEEE, 2017.
[6]Karagiannaki, Katerina, Athanasia Panousopoulou, and Panagiotis Tsakalides. "An online feature selection architecture for Human Activity Recognition." In Acoustics, Speech and Signal Processing (ICASSP), 2017 IEEE International Conference on, pp. 2522-2526. IEEE, 2017.
[7]Gowda, Shreyank N. "Human activity recognition using combinatorial Deep Belief Networks." In Computer Vision and Pattern Recognition Workshops (CVPRW), 2017 IEEE Conference on, pp. 1589-1594. IEEE, 2017.
[8]Boufama, Boubakeur, Pejman Habashi, and Imran Shafiq Ahmad. "Trajectory-based human activity recognition from videos." In Advanced Technologies for Signal and Image Processing (ATSIP), 2017 International Conference on, pp. 1-5. IEEE, 2017.
[9]Uddin, Md Zia, Weria Khaksar, and Jim Torresen. "Human activity recognition using robust spatiotemporal features and convolutional neural network." In Multisensor Fusion and Integration for Intelligent Systems (MFI), 2017 IEEE International Conference on, pp. 144-149. IEEE, 2017.
[10]Zhao, Kun, Wei Xi, Zhiping Jiang, Zhi Wang, Hongliang Luo, Jizhong Zhao, and Xiaobin Zhang. "Leveraging Topic Model for CSI Based Human Activity Recognition." In Mobile Ad-Hoc and Sensor Networks (MSN), 2016 12th International Conference on, pp. 23-30. IEEE, 2016.
[11]Matsui, Shinya, Nakamasa Inoue, Yuko Akagi, Goshu Nagino, and Koichi Shinoda. "User adaptation of convolutional neural networks for human activity recognition." In Signal Processing Conference (EUSIPCO), 2017 25th European, pp. 753-757. IEEE, 2017.
[12]Chen, Zhenghua, Le Zhang, Zhiguang Cao, and Jing Guo. "Distilling the Knowledge from Handcrafted Features for Human Activity Recognition." IEEE Transactions on Industrial Informatics (2018).
[13]Sunkad, Zubin A. "Feature Selection and Hyperparameter Optimization of SVM for Human Activity Recognition." In Soft Computing & Machine Intelligence (ISCMI), 2016 3rd International Conference on, pp. 104-109. IEEE, 2016.
[14]Cheng, Long, Yani Guan, Kecheng Zhu, Yiyang Li, and Ruokun Xu. "Accelerated Sparse Representation for Human Activity Recognition." In Information Reuse and Integration (IRI), 2017 IEEE International Conference on, pp. 245-252. IEEE, 2017.
[15]Li, Kang, Xiaoguang Zhao, Jiang Bian, and Min Tan. "Sequential learning for multimodal 3D human activity recognition with Long-Short Term Memory." In Mechatronics and Automation (ICMA), 2017 IEEE International Conference on, pp. 1556-1561. IEEE, 2017.
[16]Lee, Song-Mi, Heeryon Cho, and Sang Min Yoon. "Statistical noise reduction for robust human activity recognition." In Multisensor Fusion and Integration for Intelligent Systems (MFI), 2017 IEEE International Conference on, pp. 284-288. IEEE, 2017.
[17]Chen, Wen-Hui, Carlos Andrés Betancourt Baca, and Chih-Hao Tou. "LSTM-RNNs combined with scene information for human activity recognition." In e-Health Networking, Applications and Services (Healthcom), 2017 IEEE 19th International Conference on, pp. 1-6. 2017.
[18]Savvaki, Sofia, Grigorios Tsagkatakis, Athanasia Panousopoulou, and Panagiotis Tsakalides. "Matrix and Tensor Completion on a Human Activity Recognition Framework." IEEE journal of biomedical and health informatics 21, no. 6 (2017): 1554-1561.
[19]Jarraya, Amina, Khedija Arour, Amel Bouzeghoub, and Amel Borgi. "Feature selection based on Choquet integral for human activity recognition." In Fuzzy Systems (FUZZ-IEEE), 2017 IEEE International Conference on, pp. 1-6. IEEE, 2017.
[20]D. M. Anisuzzaman and A. F. M. S. Saif, “Efficient Framework Using Morphological Modeling for Frequent Iris Movement Investigation towards Questionable Observer Detection,” International Journal of Image, Graphics and Signal Processing, vol. 10, no. 11, pp. 28–37, Aug. 2018.
[21]Elhamod, Mohannad, and Martin D. Levine. "Automated real-time detection of potentially suspicious behavior in public transport areas." IEEE Transactions on Intelligent Transportation Systems 14, no. 2 (2013): 688-699.
[22]Barr, Jeremiah R., Kevin W. Bowyer, and Patrick J. Flynn. "Detecting questionable observers using face track clustering." In Applications of Computer Vision (WACV), 2011 IEEE Workshop on, pp. 182-189. IEEE, 2011.
[23]D. M. and A. F., “A Study of Activity Recognition and Questionable Observer Detection,” International Journal of Computer Applications, vol. 182, no. 15, pp. 35–42, 2018.
[24]Hassner, Tal, Yossi Itcher, and Orit Kliper-Gross. "Violent flows: Real-time detection of violent crowd behavior." In Computer Vision and Pattern Recognition Workshops (CVPRW), 2012 IEEE Computer Society Conference on, pp. 1-6. IEEE, 2012.
[25]K. Pawar and V. Attar, “Deep learning approaches for video-based anomalous activity detection,” World Wide Web, vol. 22, no. 2, pp. 571–601, Mar. 2018.
[26]V. J. Kok, M. K. Lim, and C. S. Chan, “Crowd behavior analysis: A review where physics meets biology,” Neurocomputing, vol. 177, pp. 342–362, 2016.
[27]B. Yogameena and C. Nagananthini, “Computer vision based crowd disaster avoidance system: A survey,” International Journal of Disaster Risk Reduction, vol. 22, pp. 95–129, 2017.
[28]M. S. Zitouni, H. Bhaskar, J. Dias, and M. Al-Mualla, “Advances and trends in visual crowd analysis: A systematic survey and evaluation of crowd modelling techniques,” Neurocomputing, vol. 186, pp. 139–159, 2016.
[29]Shakya, Subarna, Suman Sharma, and Abinash Basnet. "Human behavior prediction using facial expression analysis." In Computing, Communication and Automation (ICCCA), 2016 International Conference on, pp. 399-404. IEEE, 2016.
[30]N. Cherabit, F. Z. Chelali, and A. Djeradi, “Circular Hough Transform for Iris localization,” Science and Technology, vol. 2, no. 5, pp. 114–121, Jan. 2012.
[31]K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, “Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks,” IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499–1503, 2016.
[32]T. Xiang and S. Gong, “Incremental and adaptive abnormal behaviour detection,” Computer Vision and Image Understanding, vol. 111, no. 1, pp. 59–73, 2008.
[33]B. Yao and L. Fei-Fei, “Modeling mutual context of object and human pose in human-object interaction activities,” 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2010.
[34]T. Lan, Y. Wang, W. Yang, S. N. Robinovitch, and G. Mori, “Discriminative Latent Models for Recognizing Contextual Group Activities,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 8, pp. 1549–1562, 2012.
[35]May Phyo Aung, Soe Yu Maw, “IRIS SEGMENTATION SYSTEM USING THE HOUGH TRANSFORM,” 2012.
[36]Mehran, Ramin, Alexis Oyama, and Mubarak Shah. "Abnormal crowd behavior detection using social force model." In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pp. 935-942. IEEE, 2009.
[37]Yasin, Hashim, and Shoab Ahmad Khan. "Moment invariants based on human mistrustful and suspicious motion detection, recognition and classification." In Computer Modeling and Simulation, 2008. UKSIM 2008. Tenth International Conference on, pp. 734-739. IEEE, 2008.
[38]Elhamod, Mohannad, and Martin D. Levine. "Automated real-time detection of potentially suspicious behavior in public transport areas." IEEE Transactions on Intelligent Transportation Systems 14, no. 2 (2013): 688-699.