Using Inactivity to Detect Unusual behavior Presenter : Siang Wang Advisor : Dr. Yen - Ting Chen Date : 2014.11.26 Motion and video Computing, 2008. WMVC.

Slides:



Advertisements
Similar presentations
1 Gesture recognition Using HMMs and size functions.
Advertisements

Pattern Finding and Pattern Discovery in Time Series
Lecture 16 Hidden Markov Models. HMM Until now we only considered IID data. Some data are of sequential nature, i.e. have correlations have time. Example:
Image Modeling & Segmentation
Ziming Zhang, Yucheng Zhao and Yiwen Wan.  Introduction&Motivation  Problem Statement  Paper Summeries  Discussion and Conclusions.
Change Detection C. Stauffer and W.E.L. Grimson, “Learning patterns of activity using real time tracking,” IEEE Trans. On PAMI, 22(8): , Aug 2000.
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
Expectation Maximization
Supervised Learning Recap
Patch to the Future: Unsupervised Visual Prediction
3D Human Body Pose Estimation from Monocular Video Moin Nabi Computer Vision Group Institute for Research in Fundamental Sciences (IPM)
Jeroen Hermans, Frederik Maes, Dirk Vandermeulen, Paul Suetens
Foreground Modeling The Shape of Things that Came Nathan Jacobs Advisor: Robert Pless Computer Science Washington University in St. Louis.
Cognitive Computer Vision
Anomaly Detection in the WIPER System using A Markov Modulated Poisson Distribution Ping Yan Tim Schoenharl Alec Pawling Greg Madey.
Hidden Markov Model based 2D Shape Classification Ninad Thakoor 1 and Jean Gao 2 1 Electrical Engineering, University of Texas at Arlington, TX-76013,
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
Lecture 17: Supervised Learning Recap Machine Learning April 6, 2010.
… Hidden Markov Models Markov assumption: Transition model:
Midterm Review. The Midterm Everything we have talked about so far Stuff from HW I won’t ask you to do as complicated calculations as the HW Don’t need.
HMM-BASED PATTERN DETECTION. Outline  Markov Process  Hidden Markov Models Elements Basic Problems Evaluation Optimization Training Implementation 2-D.
First introduced in 1977 Lots of mathematical derivation Problem : given a set of data (data is incomplete or having missing values). Goal : assume the.
A Data-Driven Approach to Quantifying Natural Human Motion SIGGRAPH ’ 05 Liu Ren, Alton Patrick, Alexei A. Efros, Jassica K. Hodgins, and James M. Rehg.
Lecture 5: Learning models using EM
Expectation Maximization Method Effective Image Retrieval Based on Hidden Concept Discovery in Image Database By Sanket Korgaonkar Masters Computer Science.
CSE 221: Probabilistic Analysis of Computer Systems Topics covered: Statistical inference (Sec. )
Part 4 c Baum-Welch Algorithm CSE717, SPRING 2008 CUBS, Univ at Buffalo.
1 Integration of Background Modeling and Object Tracking Yu-Ting Chen, Chu-Song Chen, Yi-Ping Hung IEEE ICME, 2006.
Student: Hsu-Yung Cheng Advisor: Jenq-Neng Hwang, Professor
Effective Gaussian mixture learning for video background subtraction Dar-Shyang Lee, Member, IEEE.
AN ANALYSIS OF SINGLE- LAYER NETWORKS IN UNSUPERVISED FEATURE LEARNING [1] Yani Chen 10/14/
Expectation-Maximization (EM) Chapter 3 (Duda et al.) – Section 3.9
Learning HMM parameters Sushmita Roy BMI/CS 576 Oct 21 st, 2014.
Gaussian Mixture Models and Expectation Maximization.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Tracking Pedestrians Using Local Spatio- Temporal Motion Patterns in Extremely Crowded Scenes Louis Kratz and Ko Nishino IEEE TRANSACTIONS ON PATTERN ANALYSIS.
Anomaly detection with Bayesian networks Website: John Sandiford.
3D Motion Capture Assisted Video human motion recognition based on the Layered HMM Myunghoon Suk & Ashok Ramadass Advisor : Dr. B. Prabhakaran Multimedia.
Segmental Hidden Markov Models with Random Effects for Waveform Modeling Author: Seyoung Kim & Padhraic Smyth Presentor: Lu Ren.
International Conference on Intelligent and Advanced Systems 2007 Chee-Ming Ting Sh-Hussain Salleh Tian-Swee Tan A. K. Ariff. Jain-De,Lee.
Lecture 19: More EM Machine Learning April 15, 2010.
University of Toronto Aug. 11, 2004 Learning the “Epitome” of a Video Sequence Information Processing Workshop 2004 Vincent Cheung Probabilistic and Statistical.
Online Arabic Handwriting Recognition Fadi Biadsy Jihad El-Sana Nizar Habash Abdul-Rahman Daud Done byPresented by KFUPM Information & Computer Science.
Structure Discovery of Pop Music Using HHMM E6820 Project Jessie Hsu 03/09/05.
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
Bo QIN, Zongshun MA, Zhenghua FANG, Shengke WANG Computer-Aided Design and Computer Graphics, th IEEE International Conference on, p Presenter.
Lecture 17 Gaussian Mixture Models and Expectation Maximization
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Reestimation Equations Continuous Distributions.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Reestimation Equations Continuous Distributions.
Expectation-Maximization (EM) Case Studies
Variational Bayesian Methods for Audio Indexing
Inferring High-Level Behavior from Low-Level Sensors Donald J. Patterson, Lin Liao, Dieter Fox, and Henry Kautz.
Unsupervised Mining of Statistical Temporal Structures in Video Liu ze yuan May 15,2011.
 Present by 陳群元.  Introduction  Previous work  Predicting motion patterns  Spatio-temporal transition distribution  Discerning pedestrians  Experimental.
A Dynamic Conditional Random Field Model for Object Segmentation in Image Sequences Duke University Machine Learning Group Presented by Qiuhua Liu March.
Probabilistic Context Free Grammars Grant Schindler 8803-MDM April 27, 2006.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Elements of a Discrete Model Evaluation.
Chapter 8. Learning of Gestures by Imitation in a Humanoid Robot in Imitation and Social Learning in Robots, Calinon and Billard. Course: Robots Learning.
Discriminative Training and Machine Learning Approaches Machine Learning Lab, Dept. of CSIE, NCKU Chih-Pin Liao.
CS Statistical Machine learning Lecture 25 Yuan (Alan) Qi Purdue CS Nov
Tracking Groups of People for Video Surveillance Xinzhen(Elaine) Wang Advisor: Dr.Longin Latecki.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Reestimation Equations Continuous Distributions.
CSC321: Introduction to Neural Networks and Machine Learning Lecture 17: Boltzmann Machines as Probabilistic Models Geoffrey Hinton.
Visual Recognition Tutorial1 Markov models Hidden Markov models Forward/Backward algorithm Viterbi algorithm Baum-Welch estimation algorithm Hidden.
GraphiCon 2008 | 1 Trajectory classification based on Hidden Markov Models Jozef Mlích and Petr Chmelař Brno University of Technology, Faculty of Information.
Video-based human motion recognition using 3D mocap data
Wavelet-Based Denoising Using Hidden Markov Models
Qiang Huo(*) and Chorkin Chan(**)
A Gentle Tutorial of the EM Algorithm and its Application to Parameter Estimation for Gaussian Mixture and Hidden Markov Models Jeff A. Bilmes International.
A Gentle Tutorial of the EM Algorithm and its Application to Parameter Estimation for Gaussian Mixture and Hidden Markov Models Jeff A. Bilmes International.
Presentation transcript:

Using Inactivity to Detect Unusual behavior Presenter : Siang Wang Advisor : Dr. Yen - Ting Chen Date : Motion and video Computing, WMVC IEEE Workshop on, Issue Date: 8-9 Jan. 2008, Page(s): Dickinson, P.; Hunter, A.

Outline  Introduction  Methods  Evaluation  Conclusions 2

Introduction  Automated visual surveillance systems are often intended to detect interesting, unusual or abnormal activity in a monitored scene. 3

Introduction  Interest has develop around the potential of automated surveillance to support home- based care of peoples.  Elderly  Vulnerable people 4

Introduction  The costs associated with providing traditional methods of assistive care to ageing populations is rising, and set to rise much further in the future.  The applications of surveillance in residential care homes have been considered. 5

Introduction  The detection of unusual patterns of behavior  Anomalies indicate a requirement for intervention by a care provider.  Developing a “transparent” model which is readily interpretable 6

Introduction  Behavior recognition are largely based on learning time-series models of specific activities.  The observation is about the behavior of a person in their home, and particularly that of an elderly person, is fairly sedentary. 7

Introduction  A probabilistic spatial map of inactivity  mixture of Gaussians (MoG) in 2 dimensional space  Conjunction with Hidden Markov Model (HMM) framework 8

Introduction 9  Markov Model

Introduction 10  Hidden Markov Model

Methods 11

Methods 12 S. McKenna and H. Nait-Charif. Summarising contextual activity and detecting unusual inactivity in a supportive home environment. Pattern Analysis and Applications, 7(4):386 – 401, 2004.

Methods 13

Methods  The probability of observing some trajectory end point x i is then given by : 14

Methods  Expectation Maximization (EM) algorithm  E-step : the expectation step calculates the posterior probability 15

Methods  Expectation Maximization (EM) algorithm  M-step : The model parameters are then re- estimated from the statistics of the training data 16

Methods  Expectation Maximization (EM) algorithm  M-step : The model parameters are then re- estimated from the statistics of the training data 17

Methods 18

Methods 19

Methods 20

Methods 21 More sensitive Less sensitive

Methods  The Hidden Markov Model Framework First : 22 Parameter normal sequences of inactivity events the inactivity map

Methods  The Hidden Markov Model Framework Second : 23 Parameter inferred threshold model detect unusual sequences by comparing the model likelihoods over

Methods 24

Methods 25

Methods 26

Methods 27

Evaluation  Filmed two sets of test sequences for each scene  Comprised small variations on the scripted activities  Displayed the types of unusual or abnormal behaviors 28

Evaluation 29

Conclusion  2D MoG model  Learned using EM  Build a pair of HMMs  normal sequences of inactivity  arbitrary behavior 30

Conclusion The advantage of the proposed system  is not dependent on identifying specific activities  is tolerant to small variations in normal behavior  is unsupervised and having only a few configurable parameters 31

Thanks for your attention 32