Real-World Anomaly Detection in Surveillance Videos

Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly thr...

Full description

Saved in:
Bibliographic Details
Published in2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition pp. 6479 - 6488
Main Authors Sultani, Waqas, Chen, Chen, Shah, Mubarak
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly through the deep multiple instance ranking framework by leveraging weakly labeled training videos, i.e. the training labels (anomalous or normal) are at video-level instead of clip-level. In our approach, we consider normal and anomalous videos as bags and video segments as instances in multiple instance learning (MIL), and automatically learn a deep anomaly ranking model that predicts high anomaly scores for anomalous video segments. Furthermore, we introduce sparsity and temporal smoothness constraints in the ranking loss function to better localize anomaly during training. We also introduce a new large-scale first of its kind dataset of 128 hours of videos. It consists of 1900 long and untrimmed real-world surveillance videos, with 13 realistic anomalies such as fighting, road accident, burglary, robbery, etc. as well as normal activities. This dataset can be used for two tasks. First, general anomaly detection considering all anomalies in one group and all normal activities in another group. Second, for recognizing each of 13 anomalous activities. Our experimental results show that our MIL method for anomaly detection achieves significant improvement on anomaly detection performance as compared to the state-of-the-art approaches. We provide the results of several recent deep learning baselines on anomalous activity recognition. The low recognition performance of these baselines reveals that our dataset is very challenging and opens more opportunities for future work. The dataset is available at: http://crcv.ucf.edu/projects/real-world/
AbstractList Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly through the deep multiple instance ranking framework by leveraging weakly labeled training videos, i.e. the training labels (anomalous or normal) are at video-level instead of clip-level. In our approach, we consider normal and anomalous videos as bags and video segments as instances in multiple instance learning (MIL), and automatically learn a deep anomaly ranking model that predicts high anomaly scores for anomalous video segments. Furthermore, we introduce sparsity and temporal smoothness constraints in the ranking loss function to better localize anomaly during training. We also introduce a new large-scale first of its kind dataset of 128 hours of videos. It consists of 1900 long and untrimmed real-world surveillance videos, with 13 realistic anomalies such as fighting, road accident, burglary, robbery, etc. as well as normal activities. This dataset can be used for two tasks. First, general anomaly detection considering all anomalies in one group and all normal activities in another group. Second, for recognizing each of 13 anomalous activities. Our experimental results show that our MIL method for anomaly detection achieves significant improvement on anomaly detection performance as compared to the state-of-the-art approaches. We provide the results of several recent deep learning baselines on anomalous activity recognition. The low recognition performance of these baselines reveals that our dataset is very challenging and opens more opportunities for future work. The dataset is available at: http://crcv.ucf.edu/projects/real-world/
Author Chen, Chen
Sultani, Waqas
Shah, Mubarak
Author_xml – sequence: 1
  givenname: Waqas
  surname: Sultani
  fullname: Sultani, Waqas
– sequence: 2
  givenname: Chen
  surname: Chen
  fullname: Chen, Chen
– sequence: 3
  givenname: Mubarak
  surname: Shah
  fullname: Shah, Mubarak
BookMark eNotzE1LwzAYAOAoCs7Zswcv_QOtb76T46hOhYEydR5H0ryBSJZKW4X9ew96em7PJTkrQ0FCrim0lIK97XYv25YBNS2A0uaEVFYbKrlRSjCwp2RBQfFGWWovSDVNnwDAlOFGyAXhW3S5-RjGHOpVGQ4uH-s7nLGf01DqVOrX7_EHU86u9FjvUsBhuiLn0eUJq3-X5H19_9Y9Npvnh6dutWkSE3Ruei8FBOitcMFYpyKL3AXNIQbVO4WA3lMGRjAdo9KS06DQeS69YFxTz5fk5u9NiLj_GtPBjce9kdporfgvnIpG9Q
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/CVPR.2018.00678
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
EISBN 9781538664209
1538664208
EISSN 1063-6919
EndPage 6488
ExternalDocumentID 8578776
Genre orig-research
GroupedDBID 6IE
6IH
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i241t-cb540d0c94ad89a6f2f3ad730fd6ca6e0ebb1208427ff67531d6eab35b42371b3
IEDL.DBID RIE
IngestDate Wed Aug 27 02:52:16 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i241t-cb540d0c94ad89a6f2f3ad730fd6ca6e0ebb1208427ff67531d6eab35b42371b3
PageCount 10
ParticipantIDs ieee_primary_8578776
PublicationCentury 2000
PublicationDate 2018-06
PublicationDateYYYYMMDD 2018-06-01
PublicationDate_xml – month: 06
  year: 2018
  text: 2018-06
PublicationDecade 2010
PublicationTitle 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition
PublicationTitleAbbrev CVPR
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002683845
ssj0003211698
Score 2.6183476
Snippet Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous...
SourceID ieee
SourceType Publisher
StartPage 6479
SubjectTerms Anomaly detection
Cameras
Computer vision
Hidden Markov models
Surveillance
Training
Videos
Title Real-World Anomaly Detection in Surveillance Videos
URI https://ieeexplore.ieee.org/document/8578776
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH8BTp5QwfidHTxa2NbtrTujhJhgCArhRvqZEHUY2Ez0r7fdJhrjwUvT9tD0-71f-3vvAVzFqb0PjfRJoBiSCKUhPLFJZJhUXGoRozMUHt_jaBbdLeJFA653tjBa65J8pnsuW_7lq7Us3FNZn7ntlWATmha4VbZau_eUEBll9Q-ZK1OLbDBltTefwE_7g_lk6rhcjjyJLqzaj3AqpTQZtmH81Y-KRPLUK3LRkx-_XDT-t6P70P222_MmO4l0AA2dHUK7VjS9-hhvO0CnVj0kJY_Gs_j_hT-_ezc6L1lZmbfKvIdi86ZdPCLX4nyl9Hrbhdnw9nEwInX0BLKyUjknUlhlTPkyjbhiKUcTGsqVPdBGoeSofS1EEPosChNjLGyggULNBY2FY8oEgh5BK1tn-hg8ZBqjJEY7JIyYCgVFEXORCmNLFpKcQMfNwfK1cpCxrId_-nf1Gey5Vaj4VufQyjeFvrCSPReX5ZJ-Ajz4oig
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4gHvSECsa3e_Do4j5nu0eDElQgBIFwI30mRF0M7Jror7fdXdEYD16atoem72-m_WYG4CKM9X2ouGO7gqAdIFc2jXQSKMIF5ZKFaAyFe33sjIP7aTitwOXaFkZKmZPPZNNk8798seCZeSq7ImZ7RbgBmxr3Q7ew1lq_qHhIfFL-kZmyr3UbjEnpz8d14qvWZDA0bC5Dn0QTWO1HQJUcT9o16H31pKCRPDWzlDX5xy8njf_t6g40vi33rMEak3ahIpM9qJWiplUe5FUd_KEWEO2cSWNdJ4sX-vxu3cg052Ul1jyxHrPlmzQRiUyLk7mQi1UDxu3bUatjl_ET7LnG5dTmTItjwuFxQAWJKSpP-VToI60EcorSkYy5nkMCL1JKKw6-K1BS5ofMcGVc5u9DNVkk8gAsJBKDKEQ9JAyI8JiPLKQsZkqXtFJyCHUzB7PXwkXGrBz-0d_V57DVGfW6s-5d_-EYts2KFOyrE6imy0yeapxP2Vm-vJ_nc6Vx
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+IEEE%2FCVF+Conference+on+Computer+Vision+and+Pattern+Recognition&rft.atitle=Real-World+Anomaly+Detection+in+Surveillance+Videos&rft.au=Sultani%2C+Waqas&rft.au=Chen%2C+Chen&rft.au=Shah%2C+Mubarak&rft.date=2018-06-01&rft.pub=IEEE&rft.eissn=1063-6919&rft.spage=6479&rft.epage=6488&rft_id=info:doi/10.1109%2FCVPR.2018.00678&rft.externalDocID=8578776