Suspicious-Human - Activity - Recognition Final
Suspicious-Human - Activity - Recognition Final
Dept. of CSE,AITM 2
INTRODUCTION
• Problem: Monitoring Crowded Area to prevent unusual activities is
challenging due to human limitations.
• Solution: The project uses computer vision to automate the
detection of suspicious activities in video feeds, enhancing
surveillance efficiency.
• Applications: Ideal for public spaces like malls, schools, and
parking lots…etc.
Dept. of CSE,AITM 3
OBJECTIVES
To develop a monitoring system capable of identifying and flagging
suspicious activities.
To use computer vision to analyze video feeds efficiently and
accurately.
To design a scalable system that can be integrated with existing
surveillance infrastructure.
To reduce human dependency in monitoring tasks and enhance the
speed of threat detection.
Dept. of CSE,AITM 4
KEY FEATURES
• Monitoring: Detects activities and motionless objects live.
• Deep Learning Algorithms: LSTM (Long-Short Term Memory).
• Dataset: Merged datasets include Fighting Dataset, Real Life Violence
Situations.
Dept. of CSE,AITM 5
WORKFLOW
1. Preprocessing:
• Frames extracted from videos.
• Data augmentation and normalization.
• Videos classified into normal and suspicious categories.
2. Detection:
• Activity Recognition: LSTM(Long Short Term Memory)
processes sequential video frames.
• Frame Extraction : ViT(Vision Transformer) used to extract the
features from the video frames.
Dept. of CSE,AITM 6
SYSTEM ARCHITECTURE DIAGRAM
Trained
Model
Dept. of CSE,AITM 8
Thank you