1 Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham April 2006.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Pseudo-Relevance Feedback For Multimedia Retrieval By Rong Yan, Alexander G. and Rong Jin Mwangi S. Kariuki
Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
DONG XU, MEMBER, IEEE, AND SHIH-FU CHANG, FELLOW, IEEE Video Event Recognition Using Kernel Methods with Multilevel Temporal Alignment.
A New Block Based Motion Estimation with True Region Motion Field Jozef Huska & Peter Kulla EUROCON 2007 The International Conference on “Computer as a.
Chapter 11 Beyond Bag of Words. Question Answering n Providing answers instead of ranked lists of documents n Older QA systems generated answers n Current.
Image Search Presented by: Samantha Mahindrakar Diti Gandhi.
ADVISE: Advanced Digital Video Information Segmentation Engine
A Study of Approaches for Object Recognition
CS335 Principles of Multimedia Systems Content Based Media Retrieval Hao Jiang Computer Science Department Boston College Dec. 4, 2007.
Processing Digital Images. Filtering Analysis –Recognition Transmission.
Multimedia Search and Retrieval Presented by: Reza Aghaee For Multimedia Course(CMPT820) Simon Fraser University March.2005 Shih-Fu Chang, Qian Huang,
Vigilant Real-time storage and intelligent retrieval of visual surveillance data Dr Graeme A. Jones.
Visual Information Retrieval Chapter 1 Introduction Alberto Del Bimbo Dipartimento di Sistemi e Informatica Universita di Firenze Firenze, Italy.
Presented by Zeehasham Rasheed
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
1 Multimedia Systems Security: Video Data Analysis for Security Applications and Securing Video Data Dr. Bhavani Thuraisingham September 2007.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
DVMM Lab, Columbia UniversityVideo Event Recognition Video Event Recognition: Multilevel Pyramid Matching Dong Xu and Shih-Fu Chang Digital Video and Multimedia.
Information Retrieval in Practice
Multimedia Databases (MMDB)
Research Directions in Identity Management Dr. Bhavani Thuraisingham The University of Texas at Dallas Collaborators and co-authors of the presentation:
1 Mean shift and feature selection ECE 738 course project Zhaozheng Yin Spring 2005 Note: Figures and ideas are copyrighted by original authors.
Chapter 1 Introduction to Data Mining
Information Systems & Semantic Web University of Koblenz ▪ Landau, Germany Semantic Web - Multimedia Annotation – Steffen Staab
Marcin Marszałek, Ivan Laptev, Cordelia Schmid Computer Vision and Pattern Recognition, CVPR Actions in Context.
Perceptual and Sensory Augmented Computing Visual Object Recognition Tutorial Visual Object Recognition Bastian Leibe & Computer Vision Laboratory ETH.
CSCE 5013 Computer Vision Fall 2011 Prof. John Gauch
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Automatic Image Annotation by Using Concept-Sensitive Salient Objects for Image Content Representation Jianping Fan, Yuli Gao, Hangzai Luo, Guangyou Xu.
A Face processing system Based on Committee Machine: The Approach and Experimental Results Presented by: Harvest Jang 29 Jan 2003.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Efficient Visual Object Tracking with Online Nearest Neighbor Classifier Many slides adapt from Steve Gu.
CVPR2013 Poster Detecting and Naming Actors in Movies using Generative Appearance Models.
Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006.
Social Networks and Surveillance: Evaluating Suspicion by Association Ryan P. Layfield Dr. Bhavani Thuraisingham Dr. Latifur Khan Dr. Murat Kantarcioglu.
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
1 Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham April 2006.
Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Data Mining for Security Applications Prof. Bhavani Thuraisingham The University of Texas at Dallas May 2006.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Content-Based Image Retrieval Using Color Space Transformation and Wavelet Transform Presented by Tienwei Tsai Department of Information Management Chihlee.
Machine learning & object recognition Cordelia Schmid Jakob Verbeek.
Content Based Coding of Face Images
Visual Information Processing. Human Perception V.S. Machine Perception  Human perception: pictorial information improvement for human interpretation.
Data Mining for Security Applications Prof. Bhavani Thuraisingham The University of Texas at Dallas June 2006.
REAL-TIME DETECTOR FOR UNUSUAL BEHAVIOR
Data Mining for Surveillance Applications Suspicious Event Detection
Data and Applications Security
Visual Information Retrieval
Guillaume-Alexandre Bilodeau
Introduction Multimedia initial focus
Presenter: Ibrahim A. Zedan
Data and Applications Security Developments and Directions
Gender Classification Using Scaled Conjugate Gradient Back Propagation
Data and Applications Security
Real-Time Human Pose Recognition in Parts from Single Depth Image
Data Mining for Surveillance Applications Suspicious Event Detection
Brief Review of Recognition + Context
Research Directions in Identity Management
Data Mining for Surveillance Applications Suspicious Event Detection
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Data and Applications Security
Presentation transcript:

1 Data Mining for Surveillance Applications Suspicious Event Detection Dr. Bhavani Thuraisingham April 2006

2 Outline Acknowledgements Acknowledgements Data Mining for Security Applications Data Mining for Security Applications Surveillance and Suspicious Event Detection Surveillance and Suspicious Event Detection Directions for Surveillance Directions for Surveillance Other applications Other applications

3 Acknowledgements Prof. Latifur Khan Prof. Latifur Khan Gal Lavee Gal Lavee Ryan Layfield Ryan Layfield Sai Chaitanya Sai Chaitanya

4 Data Mining for Security Applications Data Mining has many applications in Cyber Security and National Security Data Mining has many applications in Cyber Security and National Security Intrusion detection, worm detection, firewall policy management Intrusion detection, worm detection, firewall policy management Counter-terrorism applications and Surveillance Counter-terrorism applications and Surveillance Fraud detection, Insider threat analysis Fraud detection, Insider threat analysis Need to enforce security but at the same time ensure privacy Need to enforce security but at the same time ensure privacy

5 Data Mining for Surveillance Problems Addressed Huge amounts of surveillance and video data available in the security domain Huge amounts of surveillance and video data available in the security domain Analysis is being done off-line usually using “Human Eyes” Analysis is being done off-line usually using “Human Eyes” Need for tools to aid human analyst ( pointing out areas in video where unusual activity occurs) Need for tools to aid human analyst ( pointing out areas in video where unusual activity occurs)

6 Example Using our proposed system: Using our proposed system: Greatly Increase video analysis efficiency Greatly Increase video analysis efficiency User Defined Event of interest Video Data Annotated Video w/ events of interest highlighted

7 The Semantic Gap The disconnect between the low-level features a machine sees when a video is input into it and the high- level semantic concepts (or events) a human being sees when looking at a video clip The disconnect between the low-level features a machine sees when a video is input into it and the high- level semantic concepts (or events) a human being sees when looking at a video clip Low-Level features: color, texture, shape Low-Level features: color, texture, shape High-level semantic concepts: presentation, newscast, boxing match High-level semantic concepts: presentation, newscast, boxing match

8 Our Approach Event Representation Event Representation Estimate distribution of pixel intensity change Estimate distribution of pixel intensity change Event Comparison Event Comparison Contrast the event representation of different video sequences to determine if they contain similar semantic event content. Contrast the event representation of different video sequences to determine if they contain similar semantic event content. Event Detection Event Detection Using manually labeled training video sequences to classify unlabeled video sequences Using manually labeled training video sequences to classify unlabeled video sequences

9 Event Representation Measures the quantity and type of changes occurring within a scene Measures the quantity and type of changes occurring within a scene A video event is represented as a set of x, y and t intensity gradient histograms over several temporal scales. A video event is represented as a set of x, y and t intensity gradient histograms over several temporal scales. Histograms are normalized and smoothed Histograms are normalized and smoothed

10 Event Comparison Determine if the two video sequences contain similar high-level semantic concepts (events). Determine if the two video sequences contain similar high-level semantic concepts (events). Produces a number that indicates how close the two compared events are to one another. Produces a number that indicates how close the two compared events are to one another. The lower this number is the closer the two events are. The lower this number is the closer the two events are.

11 Event Detection A robust event detection system should be able to A robust event detection system should be able to Recognize an event with reduced sensitivity to actor (e.g. clothing or skin tone) or background lighting variation. Recognize an event with reduced sensitivity to actor (e.g. clothing or skin tone) or background lighting variation. Segment an unlabeled video containing multiple events into event specific segments Segment an unlabeled video containing multiple events into event specific segments

12 Labeled Video Events These events are manually labeled and used to classify unknown events These events are manually labeled and used to classify unknown events Walking1 Running1Waving2

13 Labeled Video Events walking1walking2walking3running1running2running3running4 waving 2 walking walking walking running running running running waving

14 Experiment #1 Problem: Recognize and classify events irrespective of direction (right-to-left, left-to-right) and with reduced sensitivity to spatial variations (Clothing) Problem: Recognize and classify events irrespective of direction (right-to-left, left-to-right) and with reduced sensitivity to spatial variations (Clothing) “Disguised Events”- Events similar to testing data except subject is dressed differently “Disguised Events”- Events similar to testing data except subject is dressed differently Compare Classification to “Truth” (Manual Labeling) Compare Classification to “Truth” (Manual Labeling)

15 Experiment #1 Classification: Walking Disguised Walking 1walking1walking2walking3running1running2running3running4waving

16 Experiment #1 Classification: Running Disguised Running 1walking1walking2walking3running1running2running3running4waving

17 Classifying Disguised Events Classification: Running Disguised Running 3walking1walking2walking3running1running2running3running4waving

18 Classifying Disguised Events Classification: Waving Disguised Waving 1walking1walking2walking3running1running2running3running4waving

19 Classifying Disguised Events Disguisewalking1Disguisewalking2Disguiserunning1Disguiserunning2Disguiserunning3Disguisewaving1Disguisewaving2 Disguisewalking Disguisewalking Disguiserunning DisguiseRunning DisguiseRunning Disguisewaving Disguisewaving

20 Experiment #1 This method yielded 100% Precision (i.e. all disguised events were classified correctly). This method yielded 100% Precision (i.e. all disguised events were classified correctly). Not necessarily representative of the general event detection problem. Not necessarily representative of the general event detection problem. Future evaluation with more event types, more varied data and a larger set of training and testing data is needed Future evaluation with more event types, more varied data and a larger set of training and testing data is needed

21 Experiment #2 Problem: Given an unlabeled video sequence describe the high-level events within the video Problem: Given an unlabeled video sequence describe the high-level events within the video Capture events using a sliding window of a fixed width (25 frames in example) Capture events using a sliding window of a fixed width (25 frames in example)

22 Experiment #2 Running Similarity Graph Running Similarity Graph

23 Experiment #2 Walking Similarity Graph Walking Similarity Graph

24 Recognizing Events in Unknown Video Segment Waving Similarity Graph Waving Similarity Graph

25 Experiment #2 Minimum Similarity Graph Walking Running Waving Running

26 XML Video Annotation Using the event detection scheme we generate a video description document detailing the event composition of a specific video sequence Using the event detection scheme we generate a video description document detailing the event composition of a specific video sequence This XML document annotation may be replaced by a more robust computer-understandable format (e.g. the VEML video event ontology language). This XML document annotation may be replaced by a more robust computer-understandable format (e.g. the VEML video event ontology language). <videoclip> H:\Research\MainEvent\ H:\Research\MainEvent\ Movies\test_runningandwaving.AVI Movies\test_runningandwaving.AVI unknown unknown walking walking </videoclip>

27 Video Analysis Tool Takes annotation document as input and organizes the corresponding video segment accordingly. Takes annotation document as input and organizes the corresponding video segment accordingly. Functions as an aid to a surveillance analyst searching for “Suspicious” events within a stream of video data. Functions as an aid to a surveillance analyst searching for “Suspicious” events within a stream of video data. Activity of interest may be defined dynamically by the analyst during the running of the utility and flagged for analysis. Activity of interest may be defined dynamically by the analyst during the running of the utility and flagged for analysis.

28 Directions Enhancements to the work Enhancements to the work Working toward bridging the semantic gap and enabling more efficient video analysis Working toward bridging the semantic gap and enabling more efficient video analysis More rigorous experimental testing of concepts More rigorous experimental testing of concepts Refine event classification through use of multiple machine learning algorithm (e.g. neural networks, decision trees, etc…). Experimentally determine optimal algorithm. Refine event classification through use of multiple machine learning algorithm (e.g. neural networks, decision trees, etc…). Experimentally determine optimal algorithm. Develop a model allowing definition of simultaneous events within the same video sequence Develop a model allowing definition of simultaneous events within the same video sequence Security and Privacy Security and Privacy Define an access control model that will allow access to surveillance video data to be restricted based on semantic content of video objects Define an access control model that will allow access to surveillance video data to be restricted based on semantic content of video objects Biometrics applications Biometrics applications Privacy preserving surveillance Privacy preserving surveillance

29 Access Control and Biometrics Access Control Access Control RBAC and UCON-based models for surveillance data RBAC and UCON-based models for surveillance data Initial work to appear in ACM SACMAT Conference 2006 Initial work to appear in ACM SACMAT Conference 2006 Biometrics Biometrics Restrict access based on semantic content of video rather then low-level features Restrict access based on semantic content of video rather then low-level features Behavioral type access instead of “fingerprint” Behavioral type access instead of “fingerprint” Used in combination with other biometric methods Used in combination with other biometric methods

Privacy Preserving Surveillance - Introduction A recent survey at Times Square found 500 visible surveillance cameras in the area and a total of 2500 in New York City. What this essentially means is that, we have scores of surveillance video to be inspected manually by security personnel We need to carry out surveillance but at the same time ensure the privacy of individuals who are good citizens

31 System Use Raw video surveillance data Face Detection and Face Derecognizing system Suspicious Event Detection System Manual Inspection of video data Comprehensive security report listing suspicious events and people detected Suspicious people found Suspicious events found Report of security personnel Faces of trusted people derecognized to preserve privacy

System Architecture Input Video Breakdown input video into sequence of images Perform Segmentation Compare face to trusted and untrusted database Finding location of the face in the image Derecognize the face in the image Raise an alarm that a potential intruder was detected Trusted face found Potential intruder found

33 Other Applications of Data Mining in Security Intrusion detection Intrusion detection Firewall policy management Firewall policy management Worm detection Worm detection Insider Threat Analysis – both network/host and physical Insider Threat Analysis – both network/host and physical Fraud Detection Fraud Detection Protecting children from inappropriate content on the Internet Protecting children from inappropriate content on the Internet Digital Identity Management Digital Identity Management Detecting identity theft Detecting identity theft Biometrics identification and verification Biometrics identification and verification Digital Forensics Digital Forensics Source Code Analysis Source Code Analysis National Security / Counter-terrorism National Security / Counter-terrorism

34 Our Vision: Assured Information Sharing Publish Data/Policy Component Data/Policy for Agency A Data/Policy for Coalition Publish Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Publish Data/Policy 1.Friendly partners 2.Semi-honest partners 3.Untrustworthy partners