18th International Conference on Pattern Recognition (ICPR'06) 2006
DOI: 10.1109/icpr.2006.273
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection for Video Surveillance Applications

Abstract: We

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(32 citation statements)
references
References 7 publications
0
25
0
Order By: Relevance
“…It must be remembered here that the thresholds ν 1 and ν 2 must be manually set in KOAD, while KEAD incorporates autonomous setting for all important algorithm parameters [5]. The strikingly low performance of the benchmark NCD-based algorithm may be attributed to the fact that this algorithm requires a significantly longer training period, and needs to maintain a significantly larger database of images to compare new arrivals against [12].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…It must be remembered here that the thresholds ν 1 and ν 2 must be manually set in KOAD, while KEAD incorporates autonomous setting for all important algorithm parameters [5]. The strikingly low performance of the benchmark NCD-based algorithm may be attributed to the fact that this algorithm requires a significantly longer training period, and needs to maintain a significantly larger database of images to compare new arrivals against [12].…”
Section: Resultsmentioning
confidence: 99%
“…A high-resolution visual sensor captures a lot of details which may qualify as noise given our objective of detecting physical intruders. An elegant way of eliminating such noise is by using the Canny edge detector [10] to obtain an edge image where the step edges are enhanced. Figure 2 shows the Canny edge images corresponding to the example raw images from Fig.…”
Section: Datamentioning
confidence: 99%
See 1 more Smart Citation
“…They compared their results to those obtained using a range of other machine learning-based algorithms such as Neural Network, Decision Trees, Naïve Bayes and k-Nearest Neighbor methods. Au et al presented an algorithm where novel images are stored, and future images are compared against it using a similarity metric based on mutual information [9]. They achieve sparsity by only storing the novel images.…”
Section: A Related Work and Our Contributionmentioning
confidence: 99%
“…This can focus on identifying anomalous sequences with respect to a database of normal sequences, identifying an anomalous subsequence within a long sequence, or identifying a pattern in a sequence whose frequency of occurrence is anomalous [7]. Applications of anomaly detection are widespread and vary from intrusion detection in computer networks [31], credit card fraud detection [30], medical applications such as EEG analysis [29], to forensic applications such as the detection of abnormal behavior in surveillance videos [2]. Major challenges consist of sieving out the usually infrequently occurring anomalies from the total (often massive) data, and handling the problem of adaptation: certain (but not all) events that primarily occur as anomalies become accepted as 'normal' events, and should not be detected over and over again.…”
Section: Anomaly-detection Methodsmentioning
confidence: 99%