期刊文献+

基于轨迹聚类的公共安全异常检测 被引量:3

Anomaly detection of public safety based on trajectory clustering
下载PDF
导出
摘要 公共安全异常检测的需求越来越迫切,监控中基于轨迹聚类的检测方法越来越流行,但是现有方法在处理高维不等长轨迹数据时效果并不理想。提出一个新的轨迹聚类方法,该方法通过组合动态时间弯曲和密度峰算法实现。动态时间弯曲用于度量轨迹间的距离,密度峰算法根据距离进行聚类。前者可直接度量不等长轨迹聚类,后者是近年提出的非球体分布数据聚类算法,以局部密度和最近邻聚类组合实现。实验在PETS2006监控视频数据集上进行,测试结果表明该方法有效地发现了异常的轨迹行为模式。 The demand of public security anomaly detection is becoming more urgent. The approaches based on trajectories clustering become more popular in surveillance, but the existing methods are not good at high-dimensional and unequal-length trajectories. So this paper presents a new approach to cluster trajectories by combining the dynamic time warping and density-peak algorithm. It measures the distance between trajectories by dynamic time warping, and then clusters trajectories by density-peak cluster algorithm. Dynamic time warping can be directly used to measure the distance of trajectories through non-uniform sampling. Density-peak algorithm is a recently proposed cluster algorithm for non-spherical distribution data by combining the local density and the nearest distance. Experiments are conducted on PETS 2006 surveillance video datasets, and results prove that the proposed approach has an effective ability to discover anomaly patterns.
出处 《计算机工程与应用》 CSCD 北大核心 2016年第14期7-11,共5页 Computer Engineering and Applications
基金 江苏省自然科学基金(No.BK20140065) 江苏省工程技术研究中心(No.BM2014391) 国家自然科学基金(No.61174198) 国家自然科学基金联合基金(No.U1435218)
关键词 轨迹聚类 异常检测 密度峰算法 公共安全 trajectory clustering anomaly detection density peak algorithm public safety
  • 相关文献

参考文献13

  • 1MacQueen J.Multivariate observations[C]//Proceedings ofthe 5th Berkeley Symposium on Mathematical Statisticsand Probability,1967,1:281-297.
  • 2Kaufman L,Rousseeuw P J.Finding groups in data:anintroduction to cluster analysis[M].New York:Wiley-Interscience,2009.
  • 3Ester M,Kriegel H P,Sander J,et al.A density-basedalgorithm for discovering clusters in large spatial databaseswith noise[C]//Proceedings of the 2nd InternationalConference on Knowledge Discovery and Data Mining,1996:226-231.
  • 4Fukunaga K,Hostetler L.The estimation of the gradientof a density function in pattern recognition[J].IEEE Transon Inf Theory,1975,21:32-40.
  • 5Cheng Y.Mean Shift,model seeking,and clustering[J].IEEE Trans on Pattern Anal Mach Intell,1995,17(8):790-799.
  • 6Rodriguez A,Laio A.Clustering by fast search and findof density peaks[J].Science,2014,344(6191):1492-1496.
  • 7Hu W,Xiao X,Fu Z,et al.A system for learning statisticalmotion patterns[J].IEEE Transactions on Pattern Analysisand Machine Intelligence,2006,28(9):1450-1464.
  • 8Hu W,Tan T,Wang L,et al.A survey of visual surveillanceof object motion and behaviors[J].IEEE Transactionson Systems,Man and Cybernetics,2004,34(3):334-352.
  • 9Jiao L,Wu Y,Wu G,et al.Anatomy of a multicameravideo surveillance system[J].ACM Multimedia Systems,2004,210(2):144-163.
  • 10Zhong H,Shi J,Visontai M.Detecting unusual activitiesin video[C]//IEEE Computer Society Conference on ComputerVision and Pattern Recognition,2004,2:819-826.

二级参考文献43

  • 1Barria J A, Thajehayapong S. Detection and classification of traffic anomalies uMng microscopic traffic variables [J]. IEEE Trans on Intelligent Transportation Systems, 2011, 12 (3) : 695-704.
  • 2Saruwatari K, Sakaue F, Sato J. Detection of abnormal driving using multiple view geometry in space-time [C] //Proe of the 4th IEEE Intelligent Vehicles Syrup. Piscataway, NJ.. IEEE, 2012:1102-1107.
  • 3Sang Haifeng, Wang Hui, Wu Danyang. Vehicle abnormal behavior detection system based on video [C] //Proc of the 5th IEEE Int Symp on Computational Intelligence and Design. Piscaraway, NJ: IEEE, 2012:132-135.
  • 4Srivastava S, Ka K N, Delp E J. Co-ordinate mapping and analysis of vehicle trajectory for anomaly detection [C] //Proc of the 12th IEEE Int Conf on Multimedia and Expo. Piscataway, NJ: IEEE, 2011:1-6.
  • 5Hao Jiuyue, Hao Sheng, Li Chao, et al. Vehicle behavior understanding based on movement string [C] //Proc of tile 12th IEEE Int Conf on Intelligent Transportation Systems. Piseataway, Nj: IEEE, 2009: 1-6.
  • 6Bouttefroy P, Beghdadi A, Bouzerdoum A, et al. Markov random fields for abnormal behavior detection on highways [C] //Proc of the 2nd European Workshop on Visual Information Processing. Piseataway, NJ: IEEE, 2010: 149- 154.
  • 7Ryan D, Denman S, Fookes C, et al. Textures of otical flow for real time anomaly delemion in crowds [C] //Proc of the 8th IEEE Int Conf on Advanced Video and Signal Blsed Surveillance. Piscataway, NJ: IEEE, 2011: 230-235.
  • 8Srivastava S, Delp E. Stmdoff vicleo analysis for the detection of security anomalies in vehicles [C] //Proc of the 39th IEEE Applied Imagery Pttern Recognition Workshop. Piscataway, NJ: IEEE, 2010:1-8.
  • 9Siyuan L, Yunhuai I., Ni I., et al. Detecting crowdedness spot in city transportation [J].IEEE Trans oi1 Vehicular Technology, 2013, 62(4): 1527-1539.
  • 10Bacon J, Bejan A, Beresford A, et al. Using real-lime road traffic data to evaluate congestion [J]./LNCS 6875: Proc of Dependable and Historic Computing. Berlin: Springer, 2011, 93-117.

共引文献29

同被引文献23

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部