TY - GEN
T1 - On the essence of unsupervised detection of anomalous motion in surveillance videos
AU - Abuolaim, Abdullah A.
AU - Leow, Wee Kheng
AU - Varadarajan, Jagannadan
AU - Ahuja, Narendra
PY - 2017
Y1 - 2017
N2 - An important application in surveillance is to apply computerized methods to automatically detect anomalous activities and then notify the security officers. Many methods have been proposed for anomaly detection with varying degree of accuracy. They can be characterized according to the approach adopted, which is supervised or unsupervised, and the features used. Unfortunately, existing literature has not elucidated the essential ingredients that make the methods work as they do, despite the fact that tests have been conducted to compare the performance of various methods. This paper attempts to fill this knowledge gap by studying the videos tested by existing methods and identifying key components required by an effective unsupervised anomaly detection algorithm. Our comprehensive test results show that an unsupervised algorithm that captures the key components can be relatively simple and yet perform equally well or better compared to existing methods.
AB - An important application in surveillance is to apply computerized methods to automatically detect anomalous activities and then notify the security officers. Many methods have been proposed for anomaly detection with varying degree of accuracy. They can be characterized according to the approach adopted, which is supervised or unsupervised, and the features used. Unfortunately, existing literature has not elucidated the essential ingredients that make the methods work as they do, despite the fact that tests have been conducted to compare the performance of various methods. This paper attempts to fill this knowledge gap by studying the videos tested by existing methods and identifying key components required by an effective unsupervised anomaly detection algorithm. Our comprehensive test results show that an unsupervised algorithm that captures the key components can be relatively simple and yet perform equally well or better compared to existing methods.
UR - http://www.scopus.com/inward/record.url?scp=85028510966&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85028510966&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-64689-3_13
DO - 10.1007/978-3-319-64689-3_13
M3 - Conference contribution
AN - SCOPUS:85028510966
SN - 9783319646886
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 160
EP - 171
BT - Computer Analysis of Images and Patterns - 17th International Conference, CAIP 2017, Proceedings
A2 - Heyden, Anders
A2 - Felsberg, Michael
A2 - Kruger, Norbert
PB - Springer
T2 - 17th International Conference on Computer Analysis of Images and Patterns, CAIP 2017
Y2 - 22 August 2017 through 24 August 2017
ER -