Real-World Anomaly Detection in Surveillance Videos
Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly thr...
Saved in:
Published in | 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition pp. 6479 - 6488 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.06.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly through the deep multiple instance ranking framework by leveraging weakly labeled training videos, i.e. the training labels (anomalous or normal) are at video-level instead of clip-level. In our approach, we consider normal and anomalous videos as bags and video segments as instances in multiple instance learning (MIL), and automatically learn a deep anomaly ranking model that predicts high anomaly scores for anomalous video segments. Furthermore, we introduce sparsity and temporal smoothness constraints in the ranking loss function to better localize anomaly during training. We also introduce a new large-scale first of its kind dataset of 128 hours of videos. It consists of 1900 long and untrimmed real-world surveillance videos, with 13 realistic anomalies such as fighting, road accident, burglary, robbery, etc. as well as normal activities. This dataset can be used for two tasks. First, general anomaly detection considering all anomalies in one group and all normal activities in another group. Second, for recognizing each of 13 anomalous activities. Our experimental results show that our MIL method for anomaly detection achieves significant improvement on anomaly detection performance as compared to the state-of-the-art approaches. We provide the results of several recent deep learning baselines on anomalous activity recognition. The low recognition performance of these baselines reveals that our dataset is very challenging and opens more opportunities for future work. The dataset is available at: http://crcv.ucf.edu/projects/real-world/ |
---|---|
AbstractList | Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly through the deep multiple instance ranking framework by leveraging weakly labeled training videos, i.e. the training labels (anomalous or normal) are at video-level instead of clip-level. In our approach, we consider normal and anomalous videos as bags and video segments as instances in multiple instance learning (MIL), and automatically learn a deep anomaly ranking model that predicts high anomaly scores for anomalous video segments. Furthermore, we introduce sparsity and temporal smoothness constraints in the ranking loss function to better localize anomaly during training. We also introduce a new large-scale first of its kind dataset of 128 hours of videos. It consists of 1900 long and untrimmed real-world surveillance videos, with 13 realistic anomalies such as fighting, road accident, burglary, robbery, etc. as well as normal activities. This dataset can be used for two tasks. First, general anomaly detection considering all anomalies in one group and all normal activities in another group. Second, for recognizing each of 13 anomalous activities. Our experimental results show that our MIL method for anomaly detection achieves significant improvement on anomaly detection performance as compared to the state-of-the-art approaches. We provide the results of several recent deep learning baselines on anomalous activity recognition. The low recognition performance of these baselines reveals that our dataset is very challenging and opens more opportunities for future work. The dataset is available at: http://crcv.ucf.edu/projects/real-world/ |
Author | Chen, Chen Sultani, Waqas Shah, Mubarak |
Author_xml | – sequence: 1 givenname: Waqas surname: Sultani fullname: Sultani, Waqas – sequence: 2 givenname: Chen surname: Chen fullname: Chen, Chen – sequence: 3 givenname: Mubarak surname: Shah fullname: Shah, Mubarak |
BookMark | eNotzE1LwzAYAOAoCs7Zswcv_QOtb76T46hOhYEydR5H0ryBSJZKW4X9ew96em7PJTkrQ0FCrim0lIK97XYv25YBNS2A0uaEVFYbKrlRSjCwp2RBQfFGWWovSDVNnwDAlOFGyAXhW3S5-RjGHOpVGQ4uH-s7nLGf01DqVOrX7_EHU86u9FjvUsBhuiLn0eUJq3-X5H19_9Y9Npvnh6dutWkSE3Ruei8FBOitcMFYpyKL3AXNIQbVO4WA3lMGRjAdo9KS06DQeS69YFxTz5fk5u9NiLj_GtPBjce9kdporfgvnIpG9Q |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/CVPR.2018.00678 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences |
EISBN | 9781538664209 1538664208 |
EISSN | 1063-6919 |
EndPage | 6488 |
ExternalDocumentID | 8578776 |
Genre | orig-research |
GroupedDBID | 6IE 6IH 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP OCL RIE RIL RIO |
ID | FETCH-LOGICAL-i241t-cb540d0c94ad89a6f2f3ad730fd6ca6e0ebb1208427ff67531d6eab35b42371b3 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:52:16 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i241t-cb540d0c94ad89a6f2f3ad730fd6ca6e0ebb1208427ff67531d6eab35b42371b3 |
PageCount | 10 |
ParticipantIDs | ieee_primary_8578776 |
PublicationCentury | 2000 |
PublicationDate | 2018-06 |
PublicationDateYYYYMMDD | 2018-06-01 |
PublicationDate_xml | – month: 06 year: 2018 text: 2018-06 |
PublicationDecade | 2010 |
PublicationTitle | 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition |
PublicationTitleAbbrev | CVPR |
PublicationYear | 2018 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0002683845 ssj0003211698 |
Score | 2.6183476 |
Snippet | Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 6479 |
SubjectTerms | Anomaly detection Cameras Computer vision Hidden Markov models Surveillance Training Videos |
Title | Real-World Anomaly Detection in Surveillance Videos |
URI | https://ieeexplore.ieee.org/document/8578776 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH8BTp5QwfidHTxa2NbtrTujhJhgCArhRvqZEHUY2Ez0r7fdJhrjwUvT9tD0-71f-3vvAVzFqb0PjfRJoBiSCKUhPLFJZJhUXGoRozMUHt_jaBbdLeJFA653tjBa65J8pnsuW_7lq7Us3FNZn7ntlWATmha4VbZau_eUEBll9Q-ZK1OLbDBltTefwE_7g_lk6rhcjjyJLqzaj3AqpTQZtmH81Y-KRPLUK3LRkx-_XDT-t6P70P222_MmO4l0AA2dHUK7VjS9-hhvO0CnVj0kJY_Gs_j_hT-_ezc6L1lZmbfKvIdi86ZdPCLX4nyl9Hrbhdnw9nEwInX0BLKyUjknUlhlTPkyjbhiKUcTGsqVPdBGoeSofS1EEPosChNjLGyggULNBY2FY8oEgh5BK1tn-hg8ZBqjJEY7JIyYCgVFEXORCmNLFpKcQMfNwfK1cpCxrId_-nf1Gey5Vaj4VufQyjeFvrCSPReX5ZJ-Ajz4oig |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4gHvSECsa3e_Do4j5nu0eDElQgBIFwI30mRF0M7Jror7fdXdEYD16atoem72-m_WYG4CKM9X2ouGO7gqAdIFc2jXQSKMIF5ZKFaAyFe33sjIP7aTitwOXaFkZKmZPPZNNk8798seCZeSq7ImZ7RbgBmxr3Q7ew1lq_qHhIfFL-kZmyr3UbjEnpz8d14qvWZDA0bC5Dn0QTWO1HQJUcT9o16H31pKCRPDWzlDX5xy8njf_t6g40vi33rMEak3ahIpM9qJWiplUe5FUd_KEWEO2cSWNdJ4sX-vxu3cg052Ul1jyxHrPlmzQRiUyLk7mQi1UDxu3bUatjl_ET7LnG5dTmTItjwuFxQAWJKSpP-VToI60EcorSkYy5nkMCL1JKKw6-K1BS5ofMcGVc5u9DNVkk8gAsJBKDKEQ9JAyI8JiPLKQsZkqXtFJyCHUzB7PXwkXGrBz-0d_V57DVGfW6s-5d_-EYts2KFOyrE6imy0yeapxP2Vm-vJ_nc6Vx |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+IEEE%2FCVF+Conference+on+Computer+Vision+and+Pattern+Recognition&rft.atitle=Real-World+Anomaly+Detection+in+Surveillance+Videos&rft.au=Sultani%2C+Waqas&rft.au=Chen%2C+Chen&rft.au=Shah%2C+Mubarak&rft.date=2018-06-01&rft.pub=IEEE&rft.eissn=1063-6919&rft.spage=6479&rft.epage=6488&rft_id=info:doi/10.1109%2FCVPR.2018.00678&rft.externalDocID=8578776 |