Motion Pattern Based Anomalous Pedestrian Activity Detection

Full Text (PDF, 825KB), PP.15-25

Views: 0 Downloads: 0


Kamal Omprakash Hajari 1,* Ujwalla Haridas Gawande 1 Yogesh Golhar 2

1. Yeshwantrao Chavan College of Engineering, Rashtrasant Tukadoji Maharaj Nagpur University, Department of Information Technology, Maharashtra, India – 441110

2. St. Vincent Palloti College of Engineering and Technology, Rashtrasant Tukadoji Maharaj Nagpur University, Department of Computer Engineering, Maharashtra, India - 441110

* Corresponding author.


Received: 17 Apr. 2022 / Revised: 8 Jun. 2022 / Accepted: 26 Aug. 2022 / Published: 8 Dec. 2022

Index Terms

Artificial Intelligence, Computer vision, Pedestrian dataset, Tracking, Detection, Motion Pattern, Anomalous activity.


In this paper, an efficient technique for anomalous pedestrian activity detection in the academic institution is proposed. At the pixel and block levels, the proposed method elicits motion components that accurately represent pedestrian action, velocity, and direction, as well as along a frame. We also adopted these motion features to detect anomalous actions. The detection of anomalous behavior in academic environments is not available at the moment. Similarly, the existing method produces a high number of false positives. An anomaly detection dataset and a newly designed proposed student behavior database were used to validate the proposed framework. A significant improvement in anomalous activity recognition has been demonstrated in experimental results. Based on motion features, the proposed method reduces false positives by 3% and increases true positives by 5%. A discussion of future research directions concludes the paper.

Cite This Paper

Kamal Omprakash Hajari, Ujwalla Haridas Gawande, Yogesh Golhar, "Motion Pattern Based Anomalous Pedestrian Activity Detection", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.14, No.6, pp. 15-25, 2022. DOI:10.5815/ijigsp.2022.06.02


[1]Wanli Ouyang, Xingyu Zeng, Xiaogang Wang, Single-Pedestrian Detection Aided by Two-Pedestrian Detection, TPAMI, vol. 37, no. 9, pp. 1875-1889, September 2015.

[2]Weihang Kong, He Li, Guanglong Xing, Fengda Zhao, “An Automatic Scale-Adaptive Approach With Attention Mechanism-Based Crowd Spatial Information for Crowd Counting,” in IEEE Access, vol. 7, pp. 66215-66225, 2019. 

[3]Khosro Rezaee, Mohammad R. Khosravi, Maryam Saberi Anari, “Deep-Transfer-Learning-Based Abnormal Behavior Recognition Using Internet of Drones for Crowded Scenes,” in IEEE Internet of Things Magazine, vol. 5, no. 2, pp. 41-44, June 2022.

[4]Lei Cao and Lin Wang, “Analysis and intervention in pedestrian evacuation via a modified social force model,” The 27th Chinese Control and Decision Conference (2015 CCDC), 2015, pp. 5924-5929, doi: 10.1109/CCDC.2015.7161870.

[5]Fanchao Xu, Yunbo Rao, Qifei Wang, “An unsupervised abnormal crowd behavior detection algorithm,” 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), 2017, pp. 219-223, doi: 10.1109/SPAC.2017.8304279.

[6]Fabian Flohr, Madalin Dumitru-Guzu, Julian F. P. Kooij, Dariu M. Gavrila, “A Probabilistic Framework for Joint Pedestrian Head and Body Orientation Estimation,” in IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 4, pp. 1872-1882, Aug. 2015, doi: 10.1109/TITS.2014.2379441.

[7]Amir Rasouli, Iuliia Kotseruba, John K. Tsotsos, "Understanding Pedestrian Behavior in Complex Traffic Scenes," in IEEE Transactions on Intelligent Vehicles, vol. 3, no. 1, pp. 61-70, March 2018, doi: 10.1109/TIV.2017.2788193.

[8]Liang-qun Li, Chun-lan Li, Jun-bin Liu, Wei-xin Xie, "A novel occlusion handling method based on particle filtering for visual tracking," 2016 IEEE 13th International Conference on Signal Processing (ICSP), 2016, pp. 934-937, doi: 10.1109/ICSP.2016.7877967.

[9]Bing Wang, Kap Luk Chan, Gang Wang, Haijian Zhang, “Pedestrian detection in highly crowded scenes using “online” dictionary learning for occlusion handling,” 2014 IEEE International Conference on Image Processing (ICIP), 2014, pp. 2418-2422, doi: 10.1109/ICIP.2014.7025489. 

[10]Ho-chul Shin, "Abnormal Detection based on User Feedback for Abstracted Pedestrian Video," 2019 International Conference on Information and Communication Technology Convergence (ICTC), 2019, pp. 1036-1038, doi: 10.1109/ICTC46691.2019.8939600.

[11]Md Maruf Hossain Shuvo, Nafis Ahmed, Koundinya Nouduri, Kannappan Palaniappan, "A Hybrid Approach for Human Activity Recognition with Support Vector Machine and 1D Convolutional Neural Network," 2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), 2020, pp. 1-5, doi: 10.1109/AIPR50011.2020.9425332.

[12]Arundhati Chattoadhyay, Aruna Tripathy, “Anomalous Crowd Behavior Detection Using Raspberri PI,” 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), 2020, pp. 462-466, doi: 10.1109/ICCCA49541.2020.9250824.

[13]Kazunari Takasaki, Ryoichi Kida, Nozomu Togawa, “An Anomalous Behavior Detection Method Based on Power Analysis Utilizing Steady State Power Waveform Predicted by LSTM,” 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS), 2021, pp. 1-7, doi: 10.1109/IOLTS52814.2021.9486706.

[14]Feng Zheng, Quanyun Liu, “Anomalous Telecom Customer Behavior Detection and Clustering Analysis Based on ISP’s Operating Data,” in IEEE Access, vol. 8, pp. 42734-42748, 2020, doi: 10.1109/ACCESS.2020.2976898.

[15]Shuoyan LIU, Hao XUE, Chunjie XU, Kai FANG, "Abnormal behavior detection based on the motion-changed rules," 2020 15th IEEE International Conference on Signal Processing (ICSP), 2020, pp. 146-149, doi: 10.1109/ICSP48669.2020.9321012.

[16]Wei Fang, Lin Wang, Peiming Ren, "Tinier-YOLO: A Real-Time Object Detection Method for Constrained Environments," in IEEE Access, vol. 8, pp. 1935-1944, 2020, doi: 10.1109/ACCESS.2019.2961959.

[17]Zhihong Sun, Jun Chen, Liang Chao, Weijian Ruan, Mithun Mukherjee, “A Survey of Multiple Pedestrian Tracking Based on Tracking-by-Detection Framework,” in IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 5, pp. 1819-1833, May 2021, doi: 10.1109/TCSVT.2020.3009717.

[18]Yang Li, Jinshen Wang, Xiang Liu, Ning Xian, Changsheng Xie, "DIM Moving Target Detection using Spatio-Temporal Anomaly Detection for Hyperspectral Image Sequences," IGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018, pp. 7086-7089, doi: 10.1109/IGARSS.2018.8517601.

[19]Yunpeng Jiang, Ningning Le, Yufeng Zhang, Yinger Zheng, Yang Jiao, "Research on the Flight Anomaly Detection During Take-off Phase Based on FOQA Data," 2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS), 2019, pp. 756-760, doi: 10.1109/SAFEPROCESS45799.2019.9213422.

[20]Chaoqin Huang, Qinwei Xu, Yanfeng Wang, Yu Wang, Ya Zhang, "Self-Supervised Masking for Unsupervised Anomaly Detection and Localization," in IEEE Transactions on Multimedia, doi: 10.1109/TMM.2022.3175611.

[21]Gal Mishne, Israel Cohen, "Multiscale Anomaly Detection Using Diffusion Maps," in IEEE Journal of Selected Topics in Signal Processing, vol. 7, no. 1, pp. 111-123, Feb. 2013, doi: 10.1109/JSTSP.2012.2232279.

[22]Kursat Rasim Mestav, Xinyi Wang, Lang Tong, "A Deep Learning Approach to Anomaly Sequence Detection for High-Resolution Monitoring of Power Systems," in IEEE Transactions on Power Systems, doi: 10.1109/TPWRS.2022.3168529.

[23]Huawen Liu, Xiaodan Xu, Enhui Li, Shichao Zhang, Xuelong Li, "Anomaly Detection With Representative Neighbors," in IEEE Transactions on Neural Networks and Learning Systems, doi: 10.1109/TNNLS.2021.3109898.

[24]Chunde Yang, Tongyao Xu, Minghong Lv, Yi Yu, Xiaoming Jiang, "Pedestrian Angle Recognition Based on JDE Multi-object Tracking Algorithm," 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), 2022, pp. 647-651, doi: 10.1109/ICSP54964.2022.9778590.

[25]Chuangxin He, Xu Zhang, Zhonghua Miao, Teng Sun, "Intelligent vehicle pedestrian tracking based on YOLOv3 and DASiamRPN," 2021 40th  Chinese Control Conference (CCC), 2021, pp. 4181-4186, doi: 10.23919/CCC52363.2021.9549997.

[26]Zhihong Sun, Jun Chen, Liang Chao, Weijian Ruan, Mithun Mukherjee, "A Survey of Multiple Pedestrian Tracking Based on Tracking-by-Detection Framework," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 5, pp. 1819-1833, May 2021, doi: 10.1109/TCSVT.2020.3009717.

[27]Kai Chen, Xiao Song, Xiang Zhai, Baochang Zhang, Baocun Hou, Yi Wang, “An Integrated Deep Learning Framework for Occluded Pedestrian Tracking," in IEEE Access, vol. 7, pp. 26060-26072, 2019, doi: 10.1109/ACCESS.2019.2900296.

[28]Shan Gao, Zhenjun Han, Ce Li, Qixiang Ye, Jianbin Jiao, “Real-Time Multipedestrian Tracking in Traffic Scenes via an RGB-D-Based Layered Graph Model,” in IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 5, pp. 2814-2825, Oct. 2015, doi: 10.1109/TITS.2015.2423709.

[29]Ying Liu, Weiwei Zhang, Guohua Cui, Yong Zhang, “Multipedestrian Online Tracking Based on Social Force-Predicted Deformable Key-Points Mapping via Compressive Sensing,” in IEEE Systems Journal, vol. 15, no. 2, pp. 1905-1916, June 2021, doi: 10.1109/JSYST.2020.3003024.

[30]Qinglin Tian, Zoran Salcic, Kevin I-Kai Wang, Yun Pan, “A Multi-Mode Dead Reckoning System for Pedestrian Tracking Using Smartphones,” in IEEE Sensors Journal, vol. 16, no. 7, pp. 2079-2093, April1, 2016, doi: 10.1109/JSEN.2015.2510364.

[31]Zhengqiang Jiang, Du Q. Huynh, “Multiple Pedestrian Tracking From Monocular Videos in an Interacting Multiple Model Framework,” in IEEE Transactions on Image Processing, vol. 27, no. 3, pp. 1361-1375, March 2018, doi: 10.1109/TIP.2017.2779856.

[32]M. Zaharin, N. Ibrahim, T. Tuan Dir,. “Comparison of human detection using background subtraction and frame difference”. Bulletin of Electrical Engineering and Informatics, vol. 9, no. 1, pp. 345-353, 2020 , doi: 10.11591/eei.v9i1.1458.

[33]M. Gheisari, Z. Safari, M. Almasi, A. Najafabadi, A. Sridharan, R. G K, Y. Liu, A. Abbasi,. “A novel enhanced algorithm for efficient human tracking”. International Journal of Informatics and Communication Technology (IJ-ICT), vol. 11, no. 1, pp. 1-7, 2022 , doi: 10.11591/ijict.v11i1.pp1-7.

[34]S. V. Aruna Kumar, Ehsan Yaghoubi, Abhijit Das, B. S. Harish, Hugo Proença, “The P-DESTRE: A Fully Annotated Dataset for Pedestrian Detection, Tracking, and Short/Long-Term Re-Identification From Aerial Devices,” in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1696-1708, 2021, doi: 10.1109/TIFS.2020.3040881.

[35]L. Knoedler, C. Salmi, H. Zhu, B. Brito and J. Alonso-Mora, “Improving Pedestrian Prediction Models With Self-Supervised Continual Learning,” in IEEE Robotics and Automation Letters, vol. 7, no. 2, pp. 4781-4788, April 2022, doi: 10.1109/LRA.2022.3148475.

[36]G. Shen, L. Zhu, J. Lou, S. Shen, Z. Liu, L. Tang, “Infrared Multi-Pedestrian Tracking in Vertical View via Siamese Convolution Network,” in IEEE Access, vol. 7, pp. 42718-42725, 2019, doi: 10.1109/ACCESS.2019.2892469.

[37]W. Ge, R. Collins, R. Ruback, “Vision-Based Analysis of Small Groups in Pedestrian Crowds,” in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 5, pp. 1003-1016, May 2012, doi: 10.1109/TPAMI.2011.176.

[38]M. Rai, R. Yadav, A. Husain, T. Maity, D. Yadav,"Extraction of Facial Features for Detection of Human Emotions under Noisy Condition", International Journal of Engineering and Manufacturing(IJEM), Vol.8, No.5, pp.49-62, 2018.DOI: 10.5815/ijem.2018.05.05.

[39]F. Chamasemani, L. Affendey, “Systematic Review and Classification on Video Surveillance Systems”, I.J. Information Technology and Computer Science, Vol. 2013, No.7, pp.87-102, June 2013. DOI: 10.5815/ijitcs.2013.07.11.

[40]A. Dey, F. Mohammad, S. Ahmed, R. Sharif, A. Saif, “Anomaly Detection in Crowded Scene by Pedestrians Behaviour Extraction using Long Short Term Method: A Comprehensive Study”, International Journal of Education and Management Engineering(IJEME), Vol.9, No.1, pp.51-63, 2019.DOI: 10.5815/ijeme.2019.01.05.

[41]Y. Imamverdiyev, L. Sukhostat, “An Anomaly Detection Based on Optimization”, International Journal of Intelligent Systems and Applications(IJISA), Vol.9, No.12, pp.87-96 2017. DOI: 10.5815/ijisa.2017.12.08.

[42]H. Salami, R. Ibrahim, M. Yahaya, “Detecting Anomalies in Students' Results Using Decision Trees”, International Journal of Modern Education and Computer Science(IJMECS), Vol.8, No.7, pp.31-40, 2016.DOI: 10.5815/ijmecs.2016.07.04.