Efficient and Sustainable Video Surveillance Using CNN-LSTM Model for Suspicious Activity Detection
DOI:
https://doi.org/10.21015/vtse.v13i1.2023Abstract
This study presents a novel approach for enhancing the automation and effectiveness of real-time threat detection in video surveillance systems. Traditional surveillance methods require continuous human monitoring, are resource-intensive, and often fail to consistently identify suspicious activities with precision. Addressing these challenges, we propose the Mono-Scale CNN-LSTM Fusion Network, an advanced deep-learning model designed for automated, sustainable, and high-accuracy CCTV systems. The model utilizes Convolutional Neural Networks (CNN) in combination with Long Short-Term Memory (LSTM) networks to improve recognition capabilities by capturing temporal and spatial features. For feature extraction, the Oriented FAST and Rotated BRIEF (ORB) techniques are employed to enhance detection efficiency. The model was tested using the UCF crime image dataset and achieved an accuracy rate of approximately 99%, surpassing traditional models like CNN, VGG-16, VGG-19, ResNet-50, and DenseNet. This study highlights the contributions of our approach, which offers a significant reduction in the need for human oversight and sets new standards in the field of automatic threat detection. Furthermore, it emphasizes the model’s capability to support contemporary security systems with high precision, reliability, and scalability, making it a valuable tool for the next generation of intelligent surveillance systems.
References
U. M. Kamthe and C. G. Patil, “Suspicious activity recognition in video surveillance system,” 2018. DOI: https://doi.org/10.1109/ICCUBEA.2018.8697408
B. M. A. M. Buttar et al., “Toward trustworthy human suspicious activity detection from surveillance videos using deep learning,” 2023. DOI: https://doi.org/10.21203/rs.3.rs-2225853/v1
A. A. S. Pouyan, M. Charmi, and H. Hassanpoor, “Propounding first artificial intelligence approach for predicting robbery behavior potential in an indoor security camera,” IEEE Access, vol. 11, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3284472
R. K. Tripathi, A. S. Jalal, and S. C. Agrawal, “Suspicious human activity recognition: a review.”
C. V. Amrutha, C. Jyotsna, and J. Amudha, “Deep learning approach for suspicious activity detection from surveillance video,” 2020, pp. 335–339. DOI: https://doi.org/10.1109/ICIMIA48430.2020.9074920
N. T. J and K. Thinakaran, “Detection of crime scene objects using deep learning techniques,” 2023, pp. 357–361. DOI: https://doi.org/10.1109/IDCIoT56793.2023.10053440
A. S. Ben-Musa, S. K. Singh, and P. Agrawal, “Suspicious human activity recognition for video surveillance system,” 2014, pp. 214–218.
P. A. Dhulekar, S. T. Gandhe, N. Sawale, V. Shinde, and S. Khute, “Surveillance system for detection of suspicious human activities at war field,” 2018, pp. 357–360. DOI: https://doi.org/10.1109/ICACCT.2018.8529632
G. Kaur and S. Singh, “Advances in information communication technology and computing,” 2022, pp. 1–6.
O. M. Rajpurkar, S. S. Kamble, J. P. Nandagiri, and A. V. Nimkar, “Alert generation on the detection of suspicious activity using transfer learning,” 2020. DOI: https://doi.org/10.1109/ICCCNT49239.2020.9225263
A. Pawade, S. R. Anjaria, and R., “Suspicious activity detection for security cameras,” 2021, pp. 211–217. DOI: https://doi.org/10.1007/978-981-33-4862-2_22
A. Shamnath and M. Belwal, “Human suspicious activity detection using ensemble machine learning techniques,” 2022, pp. 1–5. DOI: https://doi.org/10.1109/CONIT55038.2022.9848183
W. Ullah, H. Ullah, A. T. Khan, Z. A. Khan, and S. W. Baik, “An efficient anomaly recognition framework using an attention residual LSTM in surveillance videos,” 2021. DOI: https://doi.org/10.3390/s21082811
A. Dua, B. Kalra, A. Bhatia, D. A. Madan, M. Gigras, and Y., “Crime alert through smart surveillance using deep learning techniques,” 2022, pp. 1–8. DOI: https://doi.org/10.1145/3590837.3590848
I. Muneer, M. Saddique, Z. Habib, and H. G. Mohamed, “Shoplifting detection using hybrid neural network CNN-built and development of benchmark dataset,” Applied Sciences, 2023. DOI: https://doi.org/10.3390/app13148341
A. Babiyola, S. Aruna, and B. S. Sumithra, “A hybrid learning framework for recognition of abnormal events intended from surveillance videos,” pp. 1–14.
R. Maqsood, U. I. Bajwa, and G. Saleem et al., “Anomaly recognition from surveillance videos using 3D convolution neural network,” 2021. DOI: https://doi.org/10.1007/s11042-021-10570-3
M. L. S. Kokila, V. B. Christopher, and R. I. Sajan et al., “Efficient abnormality detection using patch-based 3D convolution with recurrent model,” 2023. DOI: https://doi.org/10.1007/s00138-023-01397-z
M. Nakib, R. T. Khan, S. Hasan, and J. Uddin, “Crime scene prediction by detecting threatening objects using convolutional neural network,” 2018, pp. 1–4. DOI: https://doi.org/10.1109/IC4ME2.2018.8465583
K. B. Sahay, B. Balachander, B. Jagadeesh, G. A. Kumar, R. Kumar, and L. R. Parvathy, “A real-time crime scene intelligent video surveillance system in violence detection framework using deep learning techniques,” 2022. DOI: https://doi.org/10.1016/j.compeleceng.2022.108319
M. Boukabous and M. Azizi, “Multimodal sentiment analysis using audio and text for crime detection,” 2022, pp. 1–5. DOI: https://doi.org/10.1109/IRASET52964.2022.9738175
R. Shenoy, D. Yadav, H. Lakhotiya, and J. Sisodia, “An intelligent framework for crime prediction using behavioral tracking and motion analysis,” 2022, pp. 1–6. DOI: https://doi.org/10.1109/ESCI53509.2022.9758281
M. A. Permana, M. I. Thohir, T. Santoro, and M. A. Ayu, “Crime rate detection based on text mining on social media using logistic regression algorithm,” 2021, pp. 1–6. DOI: https://doi.org/10.1109/ICCED53389.2021.9664846
A. Algefes, N. Aldossari, F. Masmoudi, and E. Kariri, “A text-mining approach for crime tweets in Saudi Arabia: From analysis to prediction,” 2022, pp. 109–114. DOI: https://doi.org/10.1109/CDMA54072.2022.00023
C. Catlett, E. Cesario, D. Talia, and A. Vinci, “Spatio-temporal crime predictions in smart cities: A data-driven approach and experiments,” vol. 53, 2019, pp. 62–74. DOI: https://doi.org/10.1016/j.pmcj.2019.01.003
L. G. A. Alves, H. V. Ribeiro, and F. A. Rodrigues, “Crime prediction through urban metrics and statistical learning,” vol. 505, 2018, pp. 435–443. DOI: https://doi.org/10.1016/j.physa.2018.03.084
V. M. L. Elluri and N. Roy, “Developing machine learning-based predictive models for smart policing,” 2019, pp. 198–204. DOI: https://doi.org/10.1109/SMARTCOMP.2019.00053
K. K. E. Rublee, V. Rabaud, and G. Bradski, “ORB: An efficient alternative to SIFT or SURF,” 2011. DOI: https://doi.org/10.1109/ICCV.2011.6126544
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY