[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3007120.3007129acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Automatic Fight Detection in Surveillance Videos

Published: 28 November 2016 Publication History

Abstract

Affective computing is an up-surging research area relying on multimodal multimedia information processing techniques to study human interaction. Social signal processing under affective computing aims at recognizing and extracting useful human social interaction patterns. Fight is a common social interaction in real life. A fight detection system finds wide applications, such as in a prison, a bar and so on. Research works on fight detection are often based on visual features and demand substantive computation and good video quality. In this paper, we propose an approach to detect fights in a natural and low cost manner through motion analysis. Most existing works evaluated their algorithms on public datasets manifesting simulated fights, where the fight events are acted by actors. To evaluate on real fight scenarios, we collect fight videos from YouTube to form our own dataset. Based on the two types of datasets, we process the motion information to achieve fight detection. Experimental results indicate that our approach accurately detect fights in real scenarios. More importantly, we uncover some fundamental differences between real and simulated fights and could discriminate them well.

References

[1]
S. Blunsden and R.B. Fisher. The BEHAVE video dataset: ground truthed video for multi-person behavior classification. Annals of BMVA, 4(1-12):4, 2010.
[2]
C.J.C. Burges. A Tutorial on Support Vector Machines for Pattern Recognition. Data Mining and Knowledge Discovery. 2(2):121--167, 1998.
[3]
M. Chen and A. Hauptmann. MoSIFT: Recognizing Human Actions in Surveillance Videos. Informedia@TRECVID, pp. 1--16, 2009.
[4]
W.-H. Cheng, W.-T. Chu, and J.-L. Wu. Semantic Context Detection Based on Hierarchical Audio Models. Int. Work. Multimed. Inf. Retr., no. 1, p. 109, 2003.
[5]
A.I. Chittilappilly, L. Chen, and S. Amer-Yahia. A Survey of General-Purpose Crowdsourcing Techniques. IEEE TKDE. 28(9):2246--2266, 2016.
[6]
G. Csurka, C.R. Dance, L. Fan, J. Willamowski, and C. Bray. Visual categorization with bags of keypoints. Proc. ECCV Stat. Learn. Comput. Vis, pp. 59--74, 2004.
[7]
O. Deniz, I. Serrano, G. Bueno, and R. Sukthankar. Fast violence detection in video. Proc. Int. Conf. Computer Vision Theory and Applications, pp. 478--485, 2014.
[8]
G. Farneb. Two-Frame Motion Estimation Based on Polynomial Expansion. Proc. Scandinavian Conference on Image Analysis, pp. 363--370, 2003.
[9]
R.B. Fisher. The PETS04 Surveillance Ground-Truth Data Sets. Proc. IEEE Int. Work. on Performance Evaluation of Tracking and Surveillance, pp. 1--5, 2004.
[10]
Y. Gao, H. Liu, X. Sun, C. Wang, and Y. Liu. Violence detection using Oriented VIolent Flows. Image and Vision Computing, pp. 37--41, 2016.
[11]
M. Galley and K. McKeown. Identifying agreement and disagreement in conversational speech: Use of Bayesian networks to model pragmatic dependencies. Proc. ACL 2004, pp. 669--676, 2004.
[12]
T. Giannakopoulos, K. Dimitrios, A. Andreas, and T. Sergios. Violence Content Classification Using Audio Features. Proc. Hell. Artif. Intell. Conf., 2006.
[13]
T. Hassner, Y. Itcher, and O. Kliper-Gross. Violent flows: Real-time detection of violent crowd behavior. CVPR Workshops, pp. 1--6, 2012.
[14]
S.H.S. Hongeng, F. Bremond, and R. Nevatia. Representation and optimal recognition of human activities. Proc. CVPR, 2000.
[15]
M.X. Huang, J. Li, G. Ngai, and H.V. Leong. StressClick: Sensing Stress from Gaze-Click Patterns. Proc. ACM Multimedia, pp. 1395--1404, 2016.
[16]
D.B. Jayagopi, H. Hung, C. Yeo, and D. Gatica-Perez. Modeling dominance in group conversations using nonverbal activity cues. IEEE Trans. Audio, Speech Lang. Process., 17(3):501--513, 2009.
[17]
S. Kim, F. Valente, M. Filippone, and A. Vinciarelli. Predicting continuous conflict perception with Bayesian Gaussian processes. IEEE Trans. Affective Computing, 5(2):187--200, 2014.
[18]
T.C.K. Kwok, M.X. Huang, W.C. Tam, and G. Ngai. Emotar: Communicating Feelings through Video Sharing. Proc. ACM Intelligent User Interfaces, pp. 374--378, 2015.
[19]
I. Laptev. On space-time interest points. Int. J. Comput. Vis., 64(2-3):107--123, 2005.
[20]
R. Li, P. Porfilio, and T. Zickler. Finding group interactions in social clutter. Proc. CVPR, pp. 2722--2729, 2013.
[21]
T. List, J. Bins, J. Vazquez, R.B. Fisher. Performance Evaluating the Evaluato. Proc. Joint IEEE Int. Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance, pp. 129--136, 2005.
[22]
R. Navarathna, P. Lucey, P. Carr, E. Carter, S. Sridharan, and I. Matthews. Predicting movie ratings from audience behaviors. Proc. IEEE Winter Conf. Appl. Comput. Vision, pp. 1058--1065, 2014.
[23]
L.S. Nguyen, A. Marcos-Ramiro, M. MarrÃşn Romera, and D. Gatica-Perez. Multimodal analysis of body communication cues in employment interviews. Proc. ACM Multimodal Interaction, pp. 437--444, 2013.
[24]
E.B. Nievas, O.D. Suarez, G.B. García, and R. Sukthankar. Violence detection in video using computer vision techniques. Proc. Comput. Anal. Images Patterns, 2011.
[25]
R.W. Picard. Affective computing: From laughter to IEEE. IEEE Trans. Affective Computing. 1(1):11--17, 2011.
[26]
F. Ramseyer. Synchronized movement in social interaction. Proc. Inputs-Outputs Conf. An Interdiscip. Conf. Engagem. HCI Perform., pp. 1--5, 2013.
[27]
L. Talavera. An evaluation of filter and wrapper methods for feature selection in categorical clustering. Proc. Intelligent Data Analysis, pp. 440--451, 2005.
[28]
A. Vinciarelli, A. Dielmann, S. Favre, and H. Salamin. Canal9: A database of political debates for analysis of social interactions. Proc. Affective Computing and Intelligent Interaction, pp. 1--4, 2009.
[29]
A. Vinciarelli, M. Pantic, D. Heylen, C. Pelachaud, I. Poggi, F. D'Errico, and M. SchrÃűder. Bridging the gap between social animal and unsocial machine: A survey of social signal processing. IEEE Trans. on Affective Computing, 3(1):69--87, 2012.
[30]
A.S. Won, J.N. Bailenson, and J.H. Janssen. Automatic detection of nonverbal behavior predicts learning in dyadic interactions. IEEE Trans. on Affective Computing, 5(2):112--125, 2014.
[31]
Z. Yang and L.J.M. Rothkrantz. Automatic aggression detection inside trains. Proc. IEEE SMC, 2010.
[32]
L. Zelnik-Manor and M. Irani. Event-based analysis of video. Proc. CVPR, vol. 2, pp. 123--130, 2001.

Cited By

View all
  • (2024)Federated Learning Empowered Violence Recognition in CCTV Footage: A YOLO and ResNet-50 Fusion Approach2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)10.1109/IDCIoT59759.2024.10467832(01-06)Online publication date: 4-Jan-2024
  • (2023)Enhanced Video Surveillance Systems for “Signal for Help” Detection on Edge Devices2023 IEEE International Symposium on Technology and Society (ISTAS)10.1109/ISTAS57930.2023.10305989(1-4)Online publication date: 13-Sep-2023
  • (2023)Violence Prediction System Using Bi-LSTM2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN)10.1109/ICPCSN58827.2023.00010(11-15)Online publication date: Jun-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
MoMM '16: Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media
November 2016
363 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • @WAS: International Organization of Information Integration and Web-based Applications and Services

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 November 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Motion analysis
  2. fight detection
  3. optical flow
  4. real and simulated fight scenario
  5. surveillance video

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Hong Kong Research Grant Council

Conference

MoMM '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)11
Reflects downloads up to 09 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Federated Learning Empowered Violence Recognition in CCTV Footage: A YOLO and ResNet-50 Fusion Approach2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)10.1109/IDCIoT59759.2024.10467832(01-06)Online publication date: 4-Jan-2024
  • (2023)Enhanced Video Surveillance Systems for “Signal for Help” Detection on Edge Devices2023 IEEE International Symposium on Technology and Society (ISTAS)10.1109/ISTAS57930.2023.10305989(1-4)Online publication date: 13-Sep-2023
  • (2023)Violence Prediction System Using Bi-LSTM2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN)10.1109/ICPCSN58827.2023.00010(11-15)Online publication date: Jun-2023
  • (2023)A Novel Framework for Potato Leaf Disease Detection Using Deep Learning Model2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)10.1109/ICCCNT56998.2023.10306654(1-6)Online publication date: 6-Jul-2023
  • (2023)Artificial Intelligent Model for Riot and Violence Detection that Largely Affect Societal Health and Local Healthcare SystemIndustry 4.0 and Healthcare10.1007/978-981-99-1949-9_6(113-131)Online publication date: 2-Dec-2023
  • (2022)Disease Prediction using machine learning algorithms2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)10.1109/ICACITE53722.2022.9823744(995-999)Online publication date: 28-Apr-2022
  • (2022)Violence Detection in Real Life Videos using Convolutional Neural Network2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)10.1109/ICACITE53722.2022.9823655(872-876)Online publication date: 28-Apr-2022
  • (2022)An overview of violence detection techniques: current challenges and future directionsArtificial Intelligence Review10.1007/s10462-022-10285-356:5(4641-4666)Online publication date: 8-Oct-2022
  • (2021)Automatic Detection of Violence in Video Scenes2021 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN52387.2021.9533669(1-8)Online publication date: 2021
  • (2021)Recognizing human violent action using drone surveillance within real-time proximityJournal of Real-Time Image Processing10.1007/s11554-021-01171-2Online publication date: 12-Sep-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media