Icses 24 T3 1047
Icses 24 T3 1047
Icses 24 T3 1047
4th S. Giriprasad
Department of Electronics and Communication Engineering
SRM Institute of Science and Technology, Kattankulathur
Chennai, India
[email protected]
Temporal Sequence Analysis Using LSTM (Long Anomaly Detection and Postprocessing:
Short-Term Memory):
With setting up the autoencoder by using the
While the CNN handles the spatial features in reconstruction error as a threshold, the system
individual frames, the LSTM network is used to calculates that a particular event belongs to an
capture the temporal dynamics (i.e., the progression anomaly. Like normally, this value of threshold is
of events over time). LSTMs are ideal for obtained by determining the 95th percentile from the
understanding sequences because they can reconstruction errors watched during training on
remember long-term dependencies between frames. normal behaviors. Whenever it exceeds the
The LSTM processes sequences of frames (typically threshold limit concerning reconstruction error of a
in batches of 32 frames). It learns the flow of events frame, it considers it to be an anomaly. After the
and detects if an anomaly disrupts the expected system has picked a potential anomaly, the filters are
sequence. For example, if a person suddenly runs in applied in the process of postprocessing to rule out
an area where people normally walk slowly, the false positives. Such minor variations as changes of
LSTM will flag this as an anomaly based on the lighting or camera shake lead to false positives;
deviation from the usual pattern. LSTM detects therefore, the system filters focus on major
anomalies not just by looking at single frames, but anomalies. When detected anomalies are needed for
by understanding how the frames transition over clear illustration in video shots, the system uses the
time. Sudden, unexpected changes in motion or bounding boxes around areas of interest, for
behavior (such as a car speeding into a parking lot) instance, where a person is detected crossing a
are detected by looking at the flow of frames. restricted area. This would allow security personnel
to determine any abnormality in real-time or when
reviewing the footage afterwards
VI. RESULTS
We test the system on the UCSD dataset that
contains different normal and abnormal video events.
From our results, we see that it is highly effective to
use autoencoder-based methods for anomaly
detection. The system achieved a precision of 90% and
a recall of 88%. These metrics confirm that the system
detected most anomalies while keeping false positives
low. Fig. 6: Accuracy
Precision measures the number of actually detected
anomalies, out of all detected anomalies, whereas
recall is a measure of the number of true anomalies
found by the respective system. So, F1-score as the
harmonic mean of precision and recall was used here
for evaluation purposes.
Fig. 7: Precision
Fig. 8: Recall
Fig. 9: Specificity
[5] D. Kwon, K. Natarajan, S. C. Suh, H. Kim and J. Kim, "An
Empirical Study on Network Anomaly Detection Using
Convolutional Neural Networks," 2018 IEEE 38th
International Conference on Distributed Computing Systems
(ICDCS), Vienna, Austria, 2018, pp. 1595-1598, doi:
10.1109/ICDCS.2018.00178.
[6] M. Ganesh, A. Kumar and V. Pattabiraman, "Autoencoder
Based Network Anomaly Detection," 2020 IEEE
International Conference on Technology, Engineering,
Management for Societal impact using Marketing,
Entrepreneurship and Talent (TEMSMET), Bengaluru, India,
2020, pp. 1-6, doi: 10.1109/TEMSMET51618.2020.9557464.
[7] H. Dhole, M. Sutaone and V. Vyas, "Anomaly Detection
Fig. 10: F1 Score using Convolutional Spatiotemporal Autoencoder," 2019
10th International Conference on Computing,
Communication and Networking Technologies (ICCCNT),
Kanpur, India, 2019, pp. 1-5, doi:
VII. CONCLUSION 10.1109/ICCCNT45670.2019.8944523.
This paper presents and implements an autoencoder- [8] T. -Y. WU, Z. Lee, Y. Huang, C. -M. Chen and Y. -C. Chen,
based system for Video Anomaly Detection. Our "Security Analysis of Wu et al.'s Authentication Protocol for
system is well-positioned in the detection of Distributed Cloud Computing," 2019 IEEE International
Conference on Consumer Electronics - Taiwan (ICCE-TW),
anomalies with high accuracy and adaptability to Yilan, Taiwan, 2019, pp. 1-2, doi: 10.1109/ICCE-
different surveillance settings. In addition, our system TW46550.2019.8991710.
is fast enough to make real-time anomaly detection. [9] R. Vinayakumar, K. P. Soman and P. Poornachandran, "Long
This system is able to learn the normal behavior and short-term memory based operation log anomaly
identifies anomalies with fewer false positives detection," 2017 International Conference on Advances in
Computing, Communications and Informatics (ICACCI),
compared to traditional techniques, like KNN and
Udupi, India, 2017, pp. 236-242, doi:
Decision Trees, by flagging frames that have high 10.1109/ICACCI.2017.8125846.
reconstruction errors. Results show that our model
[10] T. Ergen and S. S. Kozat, "Neural networks based online
outperformed the existing techniques in all learning," 2017 25th Signal Processing and Communications
performance metrics like Accuracy, Precision, Recall, Applications Conference (SIU), Antalya, Turkey, 2017, pp. 1-
and F1 Score. This implies that its range of 4, doi: 10.1109/SIU.2017.7960218.
applications can be extended over the environments of [11] H. Yuqing, L. Shanshan and Z. Jian, "Multi-channel key
office buildings, parking lots, industrial areas, etc. frame extraction for video surveillance system," 2022 2nd
International Conference on Networking, Communications
This further means that it can be a wonderful robust and Information Technology (NetCIT), Manchester, United
tool for modern security systems. The future work Kingdom, 2022, pp. 83-85, doi:
will be utilized in raising the sensitivity of the model 10.1109/NetCIT57419.2022.00028.
and further deep complex architectures in order to [12] X. Qi, Z. Hu and G. Ji, "Retraining Generative Adversarial
detect ever-so-subtle anomalies on video data. Autoencoder for Video Anomaly Detection," in 2023
Eleventh International Conference on Advanced Cloud and
REFERENCES Big Data (CBD), Danzhou, China, 2023, pp. 63-68, doi:
10.1109/CBD63341.2023.00020.
[1] A. M.R., M. Makker and A. Ashok, "Anomaly Detection in [13] S. K. Dani, C. Thakur, N. Nagvanshi and G. Singh, "Anomaly
Surveillance Videos," 2019 26th International Conference on Detection using PCA in Time Series Data," 2024 IEEE
High Performance Computing, Data and Analytics Workshop International Conference on Interdisciplinary Approaches in
(HiPCW), Hyderabad, India, 2019, pp. 93-98, doi: Technology and Management for Social Innovation
10.1109/HiPCW.2019.00031. (IATMSI), Gwalior, India, 2024, pp. 1-6, doi:
[2] A. B. Nassif, M. A. Talib, Q. Nasir and F. M. Dakalbab, 10.1109/IATMSI60426.2024.10502929.
"Machine Learning for Anomaly Detection: A Systematic [14] Mishra, S., Jabin, S. Anomaly detection in surveillance
Review," in IEEE Access, vol. 9, pp. 78658-78700, 2021, doi: videos using deep autoencoder. Int. j. inf. tecnol. 16, 1111–
10.1109/ACCESS.2021.3083060. 1122 (2024). https://doi.org/10.1007/s41870-023-01659-z.
[3] Zhang, L., Li, S., Luo, X. et al. Video anomaly detection with [15] Gnouma, M., Ejbali, R., Zaied, M. (2023). Abnormal Event
both normal and anomaly memory modules. Vis Detection Method Based on Spatiotemporal CNN Hashing
Comput (2024). https://doi.org/10.1007/s00371-024-03584-z Model. In: Abraham, A., Pllana, S., Casalino, G., Ma, K.,
[4] Rezaiezadeh Roukerd, F., Rajabi, M.M. Anomaly detection in Bajaj, A. (eds) Intelligent Systems Design and Applications.
groundwater monitoring data using LSTM-Autoencoder ISDA 2022. Lecture Notes in Networks and Systems, vol 717.
neural networks. Environ Monit Assess 196, 692 (2024). Springer, Cham. https://doi.org/10.1007/978-3-031-35510-
https://doi.org/10.1007/s10661-024-12848-z. 3_16.