Professional Documents
Culture Documents
Deepanshu (2021UCD2138)
Educational Videos: to facilitate review and revision, for learners with limited time or
attention spans, targeted learning can be achieved for more important topics
Medical: allow specialists to search for similar cases of a procedure and go through the
details of an old case straight away.
Surveillance: to monitor surveillance videos, we can generate a summary of surveillance
videos which includes a specific activity, a specific person or a specific object
Entertainment: generating a trailer of a movie instead of manually creating one
Sports: generating highlights of sports video recordings
News: to quickly look out for the important patterns shown in the news
Drones: key events, anomalies, or points of interest can be highlighted
Let’s look at an example
Summarized video (Target)
What makes good video summaries
Techniques using Commonly done using Deep Learning techniques like CNN
https://www.youtube.com/watch?v=dHp5I0m9_zA
https://paperswithcode.com/task/video-
summarization
https://link.springer.com/article/10.1007/s10462-023-
10444-0
FULLY CONVOLUTIONAL SEQUENCE NETWORK (FCSN)
Fully convolutional sequence network (FCSN)
Why FCSN?
0
0
0
1
Feature map
Encoder Decoder
1D convolution and pooling 1D deconvolution and unpooling
Loss functions used:
Challenges with
FCSN
, 0101010010110
, 0100101010110
Raw vidoe
Summarised video
Two player
game approach Keyframe selector network
010101101010101
To learn from unpaired data we use two
player approach fake/predicted summary Real summary (from training data
Real or Fake
Thank You
SUSPICIOUS ACTIVITY
DETECTION
Video Analytics
❖ Video camera
To capture activities.
❖ Server
To run code and give continuous
monitoring results.
GENERAL SYSTEM ARCHITECTURE AND DESIGN:
• Preprocessing:
• Resize
• Gray scale conversion - It is an image conversion technique in digital
photography. It eliminates every form of color information and only leaves
different shades of gray; the brightest being white and the darkest of it being
black. It makes processing fast and efficient.
• Grayscale compresses an image to its barest minimum pixel.
• Feature extraction:
• LBP - Local Binary Pattern (LBP) is an effective texture descriptor for images
which thresholds the neighboring pixels based on the value of the current
pixel. LBP descriptors efficiently capture the local spatial patterns and the gray
scale contrast in an image.
Linear Binary Pattern (LBP)
Visualization of calculation of Local Binary Pattern (LBP):
➢ Neighboring pixels are compared to the center pixel: pixel values smaller than
the center pixel values are assigned to 1, pixel values bigger to 0.
➢ This allows a calculation of a decimal value which will be stored in matrix with
the same width and height as the original image and in the same place as the
input center pixel.
➢ This is done for every pixel of the image. The LBP matrix can be represented as a
histogram which will be treated as the feature vector of the original image.
• Dataset Splitting – Train and Test
• Classification
• CNN
• ECNN
• Performance
• Accuracy
• Error rate
• Recognition
• Suspicious Activity Detection
Challanges:
• Complex Environments: Video surveillance often operates in complex and dynamic environments
with varying lighting conditions, occlusions, shadows, and cluttered backgrounds. These factors
can make it difficult to accurately detect and classify suspicious activities.
• False Alarms: Automated systems may generate false alarms due to factors such as
environmental changes, transient events, or benign behaviors that are misinterpreted as
suspicious. False alarms can overwhelm security personnel and reduce the effectiveness of the
system.
• Scalability: Scaling suspicious activity detection systems to large-scale deployments, such as smart
cities or extensive transportation networks, presents technical challenges in terms of processing
power, storage, and bandwidth requirements.
• Real-Time Processing: Many applications require real-time processing of video feeds to detect
and respond to suspicious activities promptly. Achieving low-latency processing while maintaining
high accuracy is challenging, especially in resource-constrained environments.
Applications
• Security and Surveillance: Video cameras are extensively used in security and surveillance
systems to monitor and detect suspicious activities in public places, airports, train stations, banks,
and other high-security areas. This includes detecting unauthorized access, loitering, vandalism,
theft, or any other behavior that deviates from normal patterns.
• Retail Loss Prevention: In retail environments, video cameras are used to detect suspicious
behaviors such as shoplifting, fraudulent returns, or other forms of retail theft. Advanced
analytics can help identify unusual patterns of behavior, such as individuals spending excessive
time in specific areas or attempting to conceal merchandise.
• Smart Cities and Public Safety: Video surveillance is a key component of smart city initiatives
aimed at enhancing public safety. Cameras deployed in urban areas can detect suspicious
activities such as traffic violations, accidents, unauthorized gatherings, or other forms of
antisocial behavior. This information can be used by law enforcement agencies to respond quickly
and effectively to incidents.
• Border Security and Immigration Control: Video surveillance is critical for monitoring
border areas and identifying potential security threats such as illegal border crossings,
smuggling activities, or suspicious behavior near border checkpoints. Automated systems
can analyze video feeds in real-time to detect anomalies and alert border patrol agents.
• Banking and Financial Institutions: Video surveillance is essential for securing banking
facilities and ATMs against threats such as robbery, fraud, or unauthorized access.
Suspicious activity detection systems can analyze video feeds to identify unusual
behavior inside bank branches or around ATM locations, triggering alerts for immediate
response.