期刊文献+

基于DMC-HMM模型的视频异常行为检测 被引量:2

Video Abnormal Behavior Detection Based on DMC-HMM Model
在线阅读 下载PDF
导出
摘要 针对视频检测算法中选取合适的图像语义特征提取算法的困难和检测计算效率不高的问题,该文提出了一种基于狄利克雷多项式共轭隐马尔科夫模型的视频异常行为检测算法,首先提出了狄利克雷多项式共轭模型用于抽取视频的底层特征的语义特征,接着将该模型与隐马尔可夫模型相结合进行视频异常行为的检测。通过校园人群流动和交通灯车辆流动实验证明,该方法具有较高的计算效率和检测性能。 For the difficulty that selecting the appropriate image semantic feature in extraction algorithm and the problem of low detection efficiency,the approach of abnormal behavior detection in video based on Dirichlet multinomial conjugate hidden Markov model( DMC-HMM) is proposed. The Dirichlet Multinomial Conjugate( DMC) model is first proposed to extract semantic features of the underlying characteristics of video, then combining the DMC model and the hidden Markov model( HMM) model to detect the abnormal behavior in the video. The experiment results of complex crowd flow scenarios show that this algorithm is not only able to dig out the patterns of the crowd flow behavior,but also can detect abnormal behavior in the scene,which also has a higher computational efficiency and detection performance.
作者 岳猛 郭春生
出处 《杭州电子科技大学学报(自然科学版)》 2014年第3期21-24,共4页 Journal of Hangzhou Dianzi University:Natural Sciences
关键词 异常行为检测 光流语义特征抽取 狄利克雷多项式共轭模型 狄利克雷多项式共轭隐马尔科夫模型 abnormal behavior detection optical flow semantic feature extraction Dirichlet multinomial conjugate model Dirichlet multinomial conjugate hidden Markov model
  • 相关文献

参考文献5

  • 1Pruteanu-Malinici I, Carin L. Infinite hidden Markov models and ISA features for unusual-event detection in video [ C ]. San Antonio: IEEE International Conference on Image Processing,2007:V-137-V-140.
  • 2谭小彬,王卫平,奚宏生,殷保群.基于隐马尔可夫模型的异常检测[J].小型微型计算机系统,2004,25(8):1546-1549. 被引量:10
  • 3Shi J, Tomasi C. Good features to track [ C ]. Seattle WA: IEEE Computer Society Conference on Digital Object Identifier, 1994 : 593 - 600.
  • 4Blei D M, Ng A Y, Jordan M I . Latent Dirichlet allocation[ J]. the Journal of Machine Learning Research,2003,3:993 - 1 022.
  • 5邹友辉.基于统计图模型的视频异常事件检测[D].杭州:杭州电子科技大学,2013.

二级参考文献10

  • 1Anderson J P. Computer security threat monitoring[R]. Technical Report, TR80904, Washington: Anderson Co. , 1980.
  • 2Denning D E. An intrusion detection model[J]. IEEE Transactions on Software Engineering. 1987,13(2): 222-232.
  • 3Ye N. A markov chain model of temporal behavior for anomal detection [C]. In:Proceedings of the 2000 IEEE Systems, Man,and Cybernetics Information Assurance and Security Workshop,2000.
  • 4Jha S,Tan K,Maxion R. Markov chains, classifiers, and intrusion detection A[C]. In: Proceedings of Computer Security Foundations Workshop, 14th IEEE. 2001, 206-219.
  • 5Warrender C,Forrest S,Pearlmutter B. Detecting intrusion using system calls: alternative data models[C]. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy. IEEE Computer Society, 1999,133-145.
  • 6Qiao Y, Xin X W, Bin Y, Ge S. Anomaly intrusion detection method based on HMM[J]. Electronics Letters, June 2002,38 (13): 663-664.
  • 7Rabiner L R. A tutorial on hidden markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1989,77 (2): 257-286.
  • 8Lunt T F,Tamaru A,Gilham F,Jagannathan R,Neumann P G, Jalali C. IDES: A progress report[C]. In: Proceedings of Annual Computer Security Applications Conference, Tuscon, Arizon a, IEEE Computer Society Press, 1990, 273-285.
  • 9Forrest S,Hofmeyr S A,somayaji A,Longstaff T A. A sense of self for unix processes [C]. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. Orkland California, 1996, 120-128.
  • 10Eskin E,Wenke L ,Stolfo S J. Modeling system calls for intrusion detection with dynamic window sizes[C]. In: Proceedings of DARPA Information Survivability Conference & Exposition Ⅱ. 2001,165-175.

共引文献9

同被引文献6

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部