Skip to main content

A Computer Vision Model for Detecting Suspicious Behaviour from Multiple Cameras in Crime Hotspots Using Convolutional Neural Networks

  • Conference paper
  • First Online:
Highlights in Practical Applications of Agents, Multi-Agent Systems, and Complex Systems Simulation. The PAAMS Collection (PAAMS 2022)

Abstract

Conventional security surveillance systems detect suspicious behaviours by the active participation of human operators constantly watching monitors showing video streams of activities captured from different cameras. The datasets are manually retrieved and analyzed after the occurrence of the incidents. This often leads to misinterpretation and late detection in a real-life environment. Recent studies have investigated the current surveillance systems for the challenges of the detection of suspicious incidents. The research question here is: How can suspicious breaking into run be detected being a common red flag leading to most crimes? This research develops a computer vision framework based on feature engineering, convolutional neural network (CNN), and median filtering to address the lacuna faced by the surveillance systems. Experiments were conducted on real-life image frames captured from multiple camera datasets. The proposed model outperforms the conventional approaches in terms of the detection of suspicious behavioural patterns with an average F1-score of 0.9661, a false positive rate of 0.0734, and an accuracy of 94.81%. The deployment of this proposed model in a crowded environment can help to augment the work of security personnel in raising awareness regarding possible crime at hot spots.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Karmakar, K., Kundu, S., Paul, S.: Design and implementation of information security using neural network architecture. Int. J. Appl. Eng. 13(11), 9916–9923 (2018). ISSN: 0973–4562

    Google Scholar 

  2. Malathi, A., Baboo, S.S.: An enhanced algorithm to predict a future crime using data mining. Int. J. Comput. Appl. 21(1), 1–6 (2011). ISBN:0975-8887

    Google Scholar 

  3. Shilpa, H., Prathap, L., Sunitha, M.R.: A survey on moving object detection and tracking techniques. Int. J. Eng. Comput. Sci. 5(5), 16376–16382 (2016)

    Google Scholar 

  4. Shojaee, S., Mustapha, A., Sidi, F., Jabar, M.A.: A study on classification learning algorithms to predict crime status. Int. J. Digital Content Technol. Appl. 7(9), 361–369 (2013). https://doi.org/10.4156/jdcta

  5. Numbeo: Crime index by Country [Online] Available: https://numbeo.com/crime/rankings_by_country.jsp?title=2020

  6. Rajenderan, S.V., Thang, K.F.: Real-time detection of suspicious human movement. In: Proceedings of the International Conference on Electrical, Electronics, Computer Engineering and their Applications, pp. 56–69 (2014)

    Google Scholar 

  7. Zhang, X.: Image denoising using local Weiner filter and its method noise. Optik Journal 127(17), 6821–6828 (2016)

    Article  Google Scholar 

  8. Dheepa, V., Dhanapal, R.: Behaviour-based credit card fraud detection using support vector machines. ICTACT J. Soft Comput. 2(4), 391–397 (2012). ISSN: 2229-6956(Online)

    Google Scholar 

  9. Ha, R., Liu, P., Jia, K.: An improved adaptive median filter algorithm and its application. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing, vol. 64, pp. 179–186, ISBN: 978-3-319-50212-0 (2017)

    Google Scholar 

  10. Chauhan, R., Ghanshala, K.K., Joshi, R.C.: Convolutional Neural Network (CNN) for image detection and recognition. In: 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), vol. 2, pp. 1–7, ISBN:978-1-5386-6374-5 (2018)

    Google Scholar 

  11. Titus, J., Geroge, S.: A comparison study on different interpolation methods based on satellite images. Int. J. Eng. Res. Technol. 2(6) (2013). ISSN (Online): 2278-0181

    Google Scholar 

  12. Zhao, J., Zhou, C., Huang, L., Yang, X., Xu, B., Liang, D.: Fusion of unmanned aerial vehicle panchromatic and hyperspectral images combining joint skewness-kurtosis figures and a non-subsampled contourlet. Sensors 18(3467), 1–23 (2018)

    Google Scholar 

  13. Yu, T., Yan, J., Lu, w.: Combining background subtraction and convolutional neural network for anomaly detection in pumping-unit surveillance. Algorithm 12(115), 1–13 (2019). https://doi.org/10.3390/a12060115

  14. Nayau, N., Sahu, S.S., Kumar, S.: Detecting anomalous crowd behavior using correlation analysis of optical flow. SIViP 13, 1233–1241 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omobayo A. Esan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Esan, O., Osunmakinde, I. (2022). A Computer Vision Model for Detecting Suspicious Behaviour from Multiple Cameras in Crime Hotspots Using Convolutional Neural Networks. In: González-Briones, A., et al. Highlights in Practical Applications of Agents, Multi-Agent Systems, and Complex Systems Simulation. The PAAMS Collection. PAAMS 2022. Communications in Computer and Information Science, vol 1678. Springer, Cham. https://doi.org/10.1007/978-3-031-18697-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-18697-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-18696-7

  • Online ISBN: 978-3-031-18697-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics