Journal of Machine and Computing


Detection and Recognition of Suspicious Multitask Human Action Identification from Preloaded Videos using CCTV Stationary Cameras



Journal of Machine and Computing

Received On : 16 May 2024

Revised On : 06 December 2024

Accepted On : 20 March 2025

Published On : 05 April 2025

Volume 05, Issue 02

Pages : 1204-1215


Abstract


Even more emphasis has been made on the use of video surveillance for sighting suspicious activities in the common places. As with other retrospective investigations, forensic investigations and riot inspections have normally required the use of automated offline video processing systems. However, development in the area that attempts at real time event detection has not been very impressive. Thus, the present work aims at developing a framework for processing raw video data gathered by a stationary colour camera within a given area to allow for real-time analysis of the observed activities. The suggested strategy begins with the acquisition of Object-level data by following and identifying objects and people in the scene via blob matching in real-time. Temporal features of those blobs are used to semantically characterize behaviours and events in terms of object and interobject motion attributes. A number of behaviours that are pertinent to public safety, such as lounging, gatherings, fainting, fighting, stealing, abandoned objects, occlusion, Abuse, Arrest and other activities available on UCF crime dataset. Were selected for the purpose of this demonstration of this method. The conclusions suggested in the work are based on experiments performed with currently easily accessible libraries.


Keywords


Suspicious Activity Recognition, Loitering, Human Activity, Behavior Recognition, Fainting, Fighting, Meeting, Blob Matching, CCTV Video Processing and Occlusion.


  1. N. Ihaddadene and C. Djeraba, “Real-time crowd motion analysis,” 2008 19th International Conference on Pattern Recognition, pp. 1–4, Dec. 2008, doi: 10.1109/icpr.2008.4761041.
  2. Divya J, M. E, G. H, Pune, Prof. Dr. R.S.Bichkar (2015),” Automatic Video Based Surveillance System for Abnormal Behaviour Detection”. IJSR, Vol: 4 Issue: 7, pp 1743- 1747.
  3. R.Naveen Kumar and S.Chandrakala (2016),”Detecting Aggressive Human Behavior In Public Environments “Department of computer science and engineer, Rajalakshmi Engineering College Chennai, Tamil nadu. ISSN: 0976-1353 Volume 22 Issue 2.
  4. C.Srinivas Rao, P.Darwin (2012), “Frame Difference and Kalman Filter Techniques for Detection of Moving Vehicles in Video Surveillance”, Vol. 2, Issue 6, pp.1168-1170, (IJERA).
  5. M. Benouis, M. Senouci, R. Tlemsani, and L. Mostefai, “Gait recognition based on model-based methods and deep belief networks,” International Journal of Biometrics, vol. 8, no. 3/4, p. 237, 2016, doi: 10.1504/ijbm.2016.082598.
  6. Pattern Recognition and Machine Learning, 2006, doi: 10.1007/978-0-387-45528-0_6.
  7. R.T. Collins and et al (2000), “A system for video surveillance and monitoring”. Technical Report CMU-RI-TR-00-12, Robotics Institute, Carnegie Mellon University, Pittsburgh, PA.
  8. S. R. Chalamala and P. Kumar, “A Probabilistic Approach for Human Action Recognition Using Motion Trajectories,” 2016 7th International Conference on Intelligent Systems, Modelling and Simulation (ISMS), pp. 185–190, Jan. 2016, doi: 10.1109/isms.2016.39.
  9. N. T. Siebel and S. J. Maybank, “The ADVISOR visual surveillance system,” in Proc. ECCV Workshop ACV, 2004, pp. 103–111.
  10. Zhang Zhang, Tieniu Tan, and Kaiqi Huang, “An Extended Grammar System for Learning and Recognizing Complex Visual Events,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, no. 2, pp. 240–255, Feb. 2011, doi: 10.1109/tpami.2010.60.
  11. D. Demirdjian and C. Varri, “Recognizing events with temporal random forests,” Proceedings of the 2009 international conference on Multimodal interfaces, pp. 293–296, Nov. 2009, doi: 10.1145/1647314.1647377.
  12. D. Weinland, R. Ronfard, and E. Boyer, “A survey of vision-based methods for action representation, segmentation and recognition,” Computer Vision and Image Understanding, vol. 115, no. 2, pp. 224–241, Feb. 2011, doi: 10.1016/j.cviu.2010.10.002.
  13. M. Blank, L. Gorelick, E. Shechtman, M. Irani, and R. Basri, “Actions as space-time shapes,” Tenth IEEE International Conference on Computer Vision (ICCV’05) Volume 1, pp. 1395-1402 Vol. 2, 2005, doi: 10.1109/iccv.2005.28.
  14. N. D. Bird, O. Masoud, N. P. Papanikolopoulos, and A. Isaacs, “Detection of Loitering Individuals in Public Transportation Areas,” IEEE Transactions on Intelligent Transportation Systems, vol. 6, no. 2, pp. 167–177, Jun. 2005, doi: 10.1109/tits.2005.848370.
  15. S. Blunsden, E. Andrade, and R. Fisher, “Non-Parametric Classification of Human Interaction,” Pattern Recognition and Image Analysis, pp. 347–354, doi: 10.1007/978-3-540-72849-8_44.
  16. F. Porikli, “Detection of temporarily static regions by processing video at different frame rates,” 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, Sep. 2007, doi: 10.1109/avss.2007.4425316.
  17. Singh, S. Sawan, M. Hanmandlu, V. K. Madasu, and B. C. Lovell, “An Abandoned Object Detection System Based on Dual Background Segmentation,” 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, pp. 352–357, Sep. 2009, doi: 10.1109/avss.2009.74.
  18. Hakeem and M. Shah, “Learning, detection and representation of multi-agent events in videos,” Artificial Intelligence, vol. 171, no. 8–9, pp. 586–605, Jun. 2007, doi: 10.1016/j.artint.2007.04.002.
  19. C. J. Fillmore, The Case for Case, 1967. [Online]. Available: http://linguistics.berkeley.edu/~syntax-circle/syntax-group/spr08/fillmore.pdf.
  20. J. F. Allen, “Maintaining knowledge about temporal intervals,” Communications of the ACM, vol. 26, no. 11, pp. 832–843, Nov. 1983, doi: 10.1145/182.358434.
  21. M. Ashwin Shenoy and N. Thillaiarasu, “Enhancing temple surveillance through human activity recognition: A novel dataset and YOLOv4-ConvLSTM approach,” Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11217–11232, Dec. 2023, doi: 10.3233/jifs-233919.
  22. Qiu, Z., Yao, T., & Mei, T. (2022). Learning spatiotemporal features with 3D convolutional networks. IEEE Transactions on Multimedia.
  23. Tang, J., Lin, K., & Su, Y. (2023). Attention mechanisms in LSTM networks for action recognition. Neural Networks.
  24. Arnab, M. Dehghani, G. Heigold, C. Sun, M. Lucic, and C. Schmid, “ViViT: A Video Vision Transformer,” 2021 IEEE/CVF International Conference on Computer Vision (ICCV), pp. 6816–6826, Oct. 2021, doi: 10.1109/iccv48922.2021.00676.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Pavankumar Naik and Srinivasa Rao Kunte R; Methodology: Pavankumar Naik; Software: Srinivasa Rao Kunte R; Data Curation: Pavankumar Naik; Writing- Original Draft Preparation: Pavankumar Naik and Srinivasa Rao Kunte R; Visualization: Pavankumar Naik; Investigation: Srinivasa Rao Kunte R; Supervision: Pavankumar Naik; Validation: Srinivasa Rao Kunte R; Writing- Reviewing and Editing: Pavankumar Naik and Srinivasa Rao Kunte R; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


Author(s) thanks to Dr. Srinivasa Rao Kunte R for this research completion and support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Pavankumar Naik and Srinivasa Rao Kunte R, “Detection and Recognition of Suspicious Multitask Human Action Identification from Preloaded Videos using CCTV Stationary Cameras”, Journal of Machine and Computing, pp. 1204-1215, April 2025, doi: 10.53759/7669/jmc202505095.


Copyright


© 2025 Pavankumar Naik and Srinivasa Rao Kunte R. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.