Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Video behavior profiling for anomaly detection
Xiang T., Gong S. IEEE Transactions on Pattern Analysis and Machine Intelligence30 (5):893-908,2008.Type:Article
Date Reviewed: Apr 2 2009

In this era of heightened security concerns, computer-aided and fully automatic surveillance applications represent a key challenge to computer vision researchers. To that end, Xiang and Gong present an approach for unsupervised learning of normal behavior patterns in a given setting, pairing it with a method for anomaly detection. The approach performs unsupervised clustering to define its “behavior patterns,” segments of representative video on which behavior models are learned. The behavior models are the authors’ multi-object hidden Markov models. These models have the advantage of far fewer free parameters than standard hidden Markov models; they are then clustered to define the normal behavior classes. Online classification is a two-step process: first, the event is tested for anomalies (based on a threshold). Second, it is classified with likelihood ratio tests into one of the discovered normal classes.

Although the authors’ goal is commendable, the paper is lacking in some respects. First, the approach is complex and involves numerous interdependent processing steps, such as segmentation and clustering, thus making analysis difficult--for example, readers are unable to determine which processing module may be responsible for certain errors. Second, the method uses an off-the-shelf video segmentation engine to build the underlying behavior patterns. The robustness of this segmentation is crucial to the success of the method, but no analysis is performed on its robustness. Third, many of the algorithmic steps rest on unjustified assumptions, such as Gaussians. Fourth, the anomaly detection is ultimately performed with an ad hoc threshold that “should be set according to the detection and false alarm rates required by each particular surveillance application.” Readers expect at least some underlying theoretical rigor for such an important part of the paper.

Reviewer:  Jason J. Corso Review #: CR136652 (0911-1084)
Bookmark and Share
 
Video Analysis (I.2.10 ... )
 
 
Feature Evaluation And Selection (I.5.2 ... )
 
 
Clustering (I.5.3 )
 
 
Design Methodology (I.5.2 )
 
 
Model Validation And Analysis (I.6.4 )
 
 
Scene Analysis (I.4.8 )
 
Would you recommend this review?
yes
no
Other reviews under "Video Analysis": Date
Background subtraction based on logarithmic intensities
Wu Q., Jeng B. Pattern Recognition Letters 23(13): 1529-1536, 2002. Type: Article
Aug 6 2003
Video segmentation based on 2D image analysis: a coding theoretic approach
Guimarães S., Couprie M., Araújo A., Leite N. Pattern Recognition Letters 24(7): 947-957, 2003. Type: Article
Jun 20 2003
Multimodal video characterization and summarization (Kluwer International Series in Video Computing)
Smith M., Kanade T., Kluwer Academic Publishers, Norwell, MA, 2004. Type: Book (9781402074264)
Apr 22 2005
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy