Anomaly Detection System for Video Data Using Machine Learning

Similar documents
Outlier detection using autoencoders

Indian Currency Recognition Based on ORB

Anomaly Detection on Data Streams with High Dimensional Data Environment

Stacked Denoising Autoencoders for Face Pose Normalization

I. INTRODUCTION II. RELATED WORK.

International Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

A REVIEW ON IMAGE RETRIEVAL USING HYPERGRAPH

Hyperspectral Image Anomaly Targets Detection with Online Deep Learning

Channel Performance Improvement through FF and RBF Neural Network based Equalization

PERFORMANCE MEASUREMENTS OF FEATURE TRACKING AND HISTOGRAM BASED TRAFFIC CONGESTION ALGORITHMS

A Fuzzy Brute Force Matching Method for Binary Image Features

Real-time Object Detection CS 229 Course Project

Machine Learning. Deep Learning. Eric Xing (and Pengtao Xie) , Fall Lecture 8, October 6, Eric CMU,

OUTLIER DATA MINING WITH IMPERFECT DATA LABELS

Detection of Anomalies using Online Oversampling PCA

Ensemble of Bayesian Filters for Loop Closure Detection

Invariant Feature Extraction using 3D Silhouette Modeling

Computer Technology Department, Sanjivani K. B. P. Polytechnic, Kopargaon

A Hybrid Feature Extractor using Fast Hessian Detector and SIFT

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

Credit Card Fraud Detection Using Historical Transaction Data

Appearance-Based Place Recognition Using Whole-Image BRISK for Collaborative MultiRobot Localization

TRANSPARENT OBJECT DETECTION USING REGIONS WITH CONVOLUTIONAL NEURAL NETWORK

Invariant Moments based War Scene Classification using ANN and SVM: A Comparative Study

Filtered Clustering Based on Local Outlier Factor in Data Mining

Multi-view Surface Inspection Using a Rotating Table

Keywords: Clustering, Anomaly Detection, Multivariate Outlier Detection, Mixture Model, EM, Visualization, Explanation, Mineset.

Depth Estimation Using Collection of Models

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks

NDoT: Nearest Neighbor Distance Based Outlier Detection Technique

A Keypoint Descriptor Inspired by Retinal Computation

Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network

A NEURAL NETWORK BASED TRAFFIC-FLOW PREDICTION MODEL. Bosnia Herzegovina. Denizli 20070, Turkey. Buyukcekmece, Istanbul, Turkey

Mechanisms for Database Intrusion Detection and Response. Michael Sintim - Koree SE 521 March 6, 2013.

Recognition of Handwritten Digits using Machine Learning Techniques

Tomoyuki Haga. Hideki Matsuhima

Image Classification Using Wavelet Coefficients in Low-pass Bands

Deep Learning. Deep Learning provided breakthrough results in speech recognition and image classification. Why?

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

A Simple Interface for Mobile Robot Equipped with Single Camera using Motion Stereo Vision

CS 6501: Deep Learning for Computer Graphics. Training Neural Networks II. Connelly Barnes

Robust & Accurate Face Recognition using Histograms

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers

Evaluation of the Performance of O(log 2 M) Self-Organizing Map Algorithm without Neighborhood Learning

Call for Papers for Communication QoS, Reliability and Modeling Symposium

A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications

INTELLIGENT HIGHWAY TRAFFIC TOLL TAX SYSTEM AND SURVEILLANCE USING BLUETOOTH ANDOPTICAL CHARACTER RECOGNITION

Measurement of Pedestrian Groups Using Subtraction Stereo

Detecting People in Images: An Edge Density Approach

Deep Learning Based Real-time Object Recognition System with Image Web Crawler

LARGE SCALE SATELLITE IMAGE PROCESSING USING HADOOP FRAMEWORK

IMPLEMENTATION OF RBF TYPE NETWORKS BY SIGMOIDAL FEEDFORWARD NEURAL NETWORKS

Instant Camera Translation and Voicing for Signs

PCA Based Anomaly Detection

Deep Tensor: Eliciting New Insights from Graph Data that Express Relationships between People and Things

Improving Visual SLAM Algorithms for use in Realtime Robotic Applications

Heterogeneous Density Based Spatial Clustering of Application with Noise

The Analysis of Traffic of IP Packets using CGH. Self Organizing Map

Obtaining Rough Set Approximation using MapReduce Technique in Data Mining

Human Detection and Tracking for Video Surveillance: A Cognitive Science Approach

Dynamic Routing Between Capsules

Recognize Complex Events from Static Images by Fusing Deep Channels Supplementary Materials

Object Detection Lecture Introduction to deep learning (CNN) Idar Dyrdal

An Efficient Learning Scheme for Extreme Learning Machine and Its Application

Facial Keypoint Detection

Efficient Mining Algorithms for Large-scale Graphs

An Efficient Approach for Color Pattern Matching Using Image Mining

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Image Compression: An Artificial Neural Network Approach

Portable, Robust and Effective Text and Product Label Reading, Currency and Obstacle Detection For Blind Persons

Outlier Detection with Two-Stage Area-Descent Method for Linear Regression

CMU Lecture 18: Deep learning and Vision: Convolutional neural networks. Teacher: Gianni A. Di Caro

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

Computing the relations among three views based on artificial neural network

Human Motion Detection and Tracking for Video Surveillance

Idle Object Detection in Video for Banking ATM Applications

DETECTION OF ANOMALIES FROM DATASET USING DISTRIBUTED METHODS

A Neural Network Model Of Insurance Customer Ratings

A Background Modeling Approach Based on Visual Background Extractor Taotao Liu1, a, Lin Qi2, b and Guichi Liu2, c

A hardware design of optimized ORB algorithm with reduced hardware cost

Improving Recognition through Object Sub-categorization

Neural Networks. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani

CPSC 340: Machine Learning and Data Mining. Outlier Detection Fall 2016

A Mobile Phone- Embedded Real-Time Remote Video Surveillance System With Network Camera Using Arm

PAPER Node-Disjoint Paths Algorithm in a Transposition Graph

An Experimental Analysis of Outliers Detection on Static Exaustive Datasets.

Aggregating Descriptors with Local Gaussian Metrics

DEEP LEARNING REVIEW. Yann LeCun, Yoshua Bengio & Geoffrey Hinton Nature Presented by Divya Chitimalla

QMUL-ACTIVA: Person Runs detection for the TRECVID Surveillance Event Detection task

Clustering and Unsupervised Anomaly Detection with l 2 Normalized Deep Auto-Encoder Representations

Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing

SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE

Wavelet Based Image Retrieval Method

Summarization of Egocentric Moving Videos for Generating Walking Route Guidance

A Quantitative Approach for Textural Image Segmentation with Median Filter

A Hierarchial Model for Visual Perception

A Contactless Palmprint Recognition Algorithm for Mobile Phones

GUJARAT TECHNOLOGICAL UNIVERSITY Information Technology (16) BE 1st To 8th Semester Exam Scheme & Subject Code

Packet Header Anomaly Detection Using Bayesian Belief Network

Transcription:

Anomaly Detection System for Video Data Using Machine Learning Tadashi Ogino Abstract We are developing an anomaly detection system for video data that uses machine learning. The proposed system has two subsystems: feature extraction and anomaly detection. We developed two feature extraction systems. One uses traditional manual steps and the other uses machine learning, i.e., a neural network. For the anomaly detection system, we employ machine learning technology that we have developed for a cyber-attack detection system. Results confirm that both prototypes can detect anomalous events in experimental video data. system can detect new attacks after the learning period. Index Terms Anomaly detection, machine learning, video, Jubatus. I. INTRODUCTION There are many surveillance cameras installed in many locations such as stores, banks, roads, and airports. Most video data from such cameras are only recorded for emergencies and are watched only after such an event occurs. In some cases, security guards watch the videos, but this is not effective from cost and performance perspectives. We are developing a video system that can automatically detect irregular events from video images in real time. In addition, we have been developing a cyber-attack detection system that uses machine learning technology [1]. We have applied this technology in our cyber-attack detection system to video images. Our system is composed of two subsystems: a feature extraction subsystem and an anomaly detection subsystem. We developed two extraction subsystems. One prototype uses a traditional approach. We developed this system to be suitable for the specialized application and manually tuned the system. The other prototype uses machine learning technology, i.e., a neural network. The system parameters are automatically tuned. For the anomaly detection subsystem, we developed the system using Jubatus and used the local outlier factor (LOF) algorithm. This approach also uses machine learning technology. Fig. 1. Overview of system processing flow of cyber attack detection system. In the cyber-attack detection system, the traffic or operation log data are well formatted, and it is easy to extract feature vectors using existing tools (e.g., tcpdump). However, this is not the case with video data. We require a special tool that is suitable for this purpose. Here, we describe two prototype feature extraction tools. III. SYSTEM OVERVIEW Our anomaly detection system for video data is illustrated in Fig. 2. II. PREVIOUS WORK We have been developing a cyber-attack detection system that uses machine learning technology [1]. An overview of this system is shown in Fig. 1. The system collects system logs, i.e., traffic and operation logs. All collected logs are statistically analyzed and learned as normal data. In this period, we estimated that the system is not under attack. The Manuscript received July 29, 2015; revised December 17, 2015. Tadashi Ogino is with School of Information Science, Meisei University, Hino, Japan (e-mail: tadashi.ogino@nifty.com). Fig. 2. Anomaly detection system for video. Our system comprises two subsystems. The video image is sent to the first subsystem, i.e., feature extraction. We developed two feature extraction subsystems. One prototype is a hand-made system. All the inner steps are manually designed. The other prototype is a feature extraction system that uses machine learning technology. All features are determined in the machine training phase. Both cases are doi: 10.18178/ijke.2016.2.2.062 104

detailed in the following sections. After some features are extracted from the video, the anomaly detection subsystem determines if the features are normal or abnormal. This part runs on Jubatus, a machine learning framework. This part will be explained later. IV. SYSTEM DETAILS A. Feature Extracting Subsystem We developed two feature extraction subsystems. One is a hand-made feature extraction subsystem. The other is an automatic feature extraction subsystem that uses machine learning technology. 1) Hand-made feature extraction: Prototype I First, we manually developed a feature extraction system [2] using a traditional method that combines several image analyzing steps. The prototype is written in C++ using the opencv2 library. This prototype has the following steps. a) Background removal The background is removed from each video frame in order to detect moving objects. In our prototype, the background is recorded separately (Fig. 3). (Fig. 4). Then, similar key points from two consecutive frames are matched. These two steps are executed using Oriented FAST and Rotated BRIEF [3]. From the matched similar points (x0, y0) and (x1, y1), we create a flow vector (x0, y0, vx = x1 x0, vy = y1 y0). This flow vector shows the speed of each key point (Fig. 5). c) Labeling At the same time as step b), we set the label for each object. d) Create one flow vector for one label For every flow vector with the same label, we calculate the average speed (vx ave, vy ave ) and the center of the object (x center, y center ). A 4D vector (vx ave, vy ave, x center, y center ) is generated to represent every vector in a single object (Fig. 6). Fig. 5. Key point matching. Fig. 3. Background removal. Fig. 6. Labeling and one flow vector. Fig. 4. Key point detection. b) Feature point extraction and matching First, key points are found in the remaining moving objects e) Regularization Each flow vector (vx ave, vy ave, x center, y center ) is normalized such that each value is between 0 and 1. At this point, each frame has several representative vectors for each object in the frame. We use these vectors as feature vectors for the frame and send them to the next step (i.e., the 105

anomaly detection subsystem). 2) Automatic feature extracting: Prototype II We use neural networks to extract features in the second feature extraction prototype. Neural networks have been extensively studied [4]. Recent prominent research in the area of speech recognition and image recognition [5], [6] has received significant attention from researchers and companies. Here, we provide a brief overview of neural networks [7]. A simple neural net is shown in Fig. 7. There is a single neuron and some input x. The output is as follows: In the auto encoder, the neural network is composed of two layers: encoder and decoder. The input and output data are the same. Training is performed as in a normal neural network, such as with back propagation. After training, the encoder layer is used to represent the input data. Typically, the auto encoder is used to pre-train multilayer neural networks to find a better starting point to fine tune a huge neural network (Fig. 9). h w,b x = f W T x = f 3 i=1 W i x i + b. (1) Here, f(x) is an activation function. This is usually a nonlinear function, which can be expressed as follows: Fig. 9. Auto encoder. Fig. 7. Simplest neural net. f z = Fig. 8. Neural net. 1 1+exp z. (2) A neural network is composed of many neurons (Fig. 8). The network structure is designed according to the target problem. Many architectures have been proposed by researchers. After the network structure is determined, a good parameter set, i.e., (W, b) should be found to best describe the target problem. For a dataset (x i, y i ), x i is input and y i is output. Then, the error J of this neural network can be calculated as follows: As this is unsupervised learning, we use a denoising auto encoder to train the system. The network configuration is shown in Fig. 10. Our prototype is written in Chainer [8]. In the prototype, the input image is converted to 8-bit grayscale and resized to 64 64 pixels. The neural network has one layer that consists of 64 64 nodes, 32 32 outputs, and is fully connected. We use the sigmoid function for the activation function. B. Anomaly Detection Subsystem After feature vectors are sent to the anomaly detection subsystem, all vectors are analyzed using Jubatus [9]. 1) Jubatus The amount of video data is increasing dramatically. To analyze such data in real time, it would be beneficial to apply big data analysis technology. A well-known big data analysis tools is Hadoop. Hadoop is an open source software tool. It is used in many fields such as recommendation, web search, and text mining. Hadoop is typically used in batch processing. However, it is somewhat difficult to use Hadoop for real-time analysis. We use Jubatus as our real-time analysis platform. Jubatus is a distributed machine learning platform developed by NTT and PFI. Jubatus was developed for real-time deep analysis in a distributed environment. Jubatus includes many major machine learning algorithms. We use the LOF algorithm for anomaly detection. J W, b; x, y = 1 2 h W,b x y 2. (3) Typically, J is referred to as a cost function. A back propagation algorithm is used to find a good set of (W, b) to minimize the cost function. However, in our case, we only have input dataset (x i ) and cannot use back propagation. Therefore, we use the auto encoder technique to train the network. 2) LOF Fig. 10. Feature extracting subsystem. There are several definitions of outliers. Hawkins 106

described outliers as an observation that derives so much from other observations as to arouse suspicion that it was generated by a different mechanism [10]. In both prototypes, the falling scene (approximately frame 600) was detected with a high LOF value, i.e., abnormal. In the hand made prototype I, frames with no objects had no flow vectors. Hence, there was no LOF score. Fig. 11. 2-d dataset. In most cases, this definition is sufficient to detect outliers. However, as seen in Fig. 11 [11], although o 1 can be detected as an outliner, o 2 cannot be detected as outlier. The LOF algorithm is designed to find such cases. The details of the LOF algorithm are explained in the literature [11]. 3) Anomaly detection In this subsystem, we must first train the Jubatus server with normal data (training phase). Then, we can determine if the data are normal or an anomaly (Fig. 12). With the LOF algorithm, normal data return an LOF value that is close to 1. Abnormal data return an LOF value that is much greater than 1. Fig. 14. Result of proto type I (hand-made feature extractor). Fig. 15. Result of proto type II (automatic feature extractor). Fig. 12. Anomaly detection using Jubatus. Although both prototypes could detect anomalous events, we believe that prototype II is suitable for a wider application because it tunes the feature extraction process using neural network technology. Neural network technology is advancing rapidly, and such technology can be applied to our anomaly detection system. VI. FUTURE WORK The following issues will be the focus of future work. A. Evaluation Method In this study, we evaluated whether our prototypes could detect irregular events using the result graphs (Fig. 14 and Fig. 15). In the next step, we require a numerical evaluation index, such as error or detection rates. To make the evaluation more feasible, we also required standard video data. Fig. 13. Experimental video data. V. EXPERIMENT We evaluated our system using a simple video. The training (normal) video is a scene in which several humans are walking. The test (abnormal) video is a similar video; however, it contains a scene in which one person is falling down (Fig. 13). Both videos are one minute long. The LOF scores obtained in the experiment are shown in Figs. 14 and 15. B. Time Series Information We used only frame data in the second prototype. As our target is video data, we must include time series information for feature vectors to detect irregular objects, e.g., objects that are moving too quickly, too slowly, or in irregular directions. C. Extended Evaluation In this study, our evaluation was performed using one minute of video data. Although we believe our approach can be applied to a consecutive real-time video sequence, some implementation problems may exist. Hence, we must develop an actual real-time system to confirm our idea. 107

VII. CONCLUSION We presented two prototype anomaly detection systems for video data using machine learning. Both prototypes could detect anomalous events in the experimental video data. In future, we plan to apply more recent neural network technology such as deep learning to our system. REFERENCES [1] T. Ogino, Evaluation of machine learning method for intrusion detection system on Jubatus, International Journal of Machine Learning and Computing, vol. 5, no. 2, pp. 137-141, April 2015. [2] R. Kuroki, K. Omine, and T. Ogino, Realtime anomaly detection using machine learning, in Proc. 2015 77th National Convention of IPSJ, 2015. [3] E. Rublee, V. Rabaud, K. Konolige, and G. R. Bradski, ORB: An efficient alternative to SIFT or SURF, in Proc. IEEE International Conference on Computer Vision 2011, pp. 2564-2571, Nov. 2011. [4] W. S. McCulloch and W. H. Pitts, A logical calculus of the ideas immanent in nervous activity, Bulletin of Mathematical Biophysics, vol. 5, no. 4, pp. 115-133, 1943. [5] D. Yu and F. Seide, Conversational speech transcription using context-dependent deep neural networks, in Proc. 2011 INTERSPEEC, 2011, pp. 437-440. [6] J. Deng, A. Berg, S. Satheesh, H. Su, A. Khosla, and F.-F. Li, Large scale visual recognition challenge 2012, ILSVRC 2012 Workshop, 2012. [7] UFLDF Tutorial. [Online]. Available: http://deeplearning.stanford.edu/wiki/index.php/ufldl_tutorial [8] Chainer. [Online]. Available: http://chainer.org/ [9] Jubatus. [Online]. Available: http://jubat.us/ [10] D. M. Hawkins, Identification of Outliers, Netherlands: Springer, 1980. [11] M. M. Breunig, H. P. Kriegel, R. T. Ng, and J. Sander, LOF: Identifying density-based local outliers, in Proc.2000 ACM SIGMOD International Conference on Management of Data, June 2000, pp. 93-104. Tadashi Ogino received his BS, MS, and PhD. in electrical engineering from the University of Tokyo in 1983, 1985, and 1988, respectively. His research interests include distributed systems, cloud computing, M2M systems, and big data analysis. He joined the Mitsubishi Electric Corp. in 1988 and developed mid-range business servers. After working at the Okinawa National College of Technology, he joined Meisei University as a professor. Dr. Ogino is a member of ACM, IEEE, IPSJ, and IEICE. 108