The Role of Deep Learning Models in the Detection of Anti-Social Behaviours towards Women in Public Transport from Surveillance Videos: A Scoping Review
Abstract
:1. Introduction
2. Materials and Methods
2.1. Identification of the Research Questions
- What are the benefits of deep learning models in the detection of anti-social behaviours in public spaces?
- What deep learning models have been used to detect anti-social behaviours in public spaces?
- What audio and/or video datasets are relevant to the detection of anti-social behaviours towards women commuters?
- What are the challenges in the use of deep learning models for the detection of anti-social behaviour(s) in public transport?
2.2. Identification of Studies Relevant to the Research Questions
2.3. Development of a Search Strategy
2.4. Creation of Inclusion and Exclusion Criteria
2.5. Selection of Studies for Inclusion
2.6. Charting of Information within the Included Studies
2.7. Summarising and Reporting the Review Results
3. Synthesis of the Literature
3.1. What Are the Benefits of Deep Learning Models in the Detection of Anti-Social Behaviours in Public Spaces?
3.2. What Deep Learning Models Have Been Used to Detect Anti-Social Behaviours in Public Transport?
3.2.1. CNN-Based Deep Learning Models Sampled
3.2.2. GMM-Based Deep Learning Models Sampled
3.3. What Audio and/or Video Datasets Are Relevant to the Detection of Anti-Social Behaviours towards Women Commuters?
- BEHAVE
- ShanghaiTech Campus
- UCF-Crime
- XD-Violence
- SAFE Corpus
Dataset | Description | Relevant Anti-Social Behaviour |
---|---|---|
BEHAVE [50] | 90,000 frames of humans identified by bounding boxes, 4 video clips in either WMV videos or 76,800 individual frames, recorded at 25 fps with resolution 640 × 480 pixels | Chase, fight, following, and running together |
ShanghaiTech Campus [32] | 130 abnormal events, 13 scenes integrating complex light conditions and camera angles, over 270,000 training frames, 330 training videos and 107 validation videos, resolution 480 × 856 pixels for each video frame | Fighting, throwing objects, chasing, brawling, and pushing |
UCF-Crime [52] | 128 h of videos, 1900 untrimmed videos of real-world surveillance footage extracted from the internet, with an average length of 4 min each, including 13 types of anomalous events. Before computing features, each video could be re-sized to 240 × 320 pixels and the frame rate fixed to 30 fps | Abuse, arrest, assault, burglary, shooting, stealing, fighting, burglary, robbery, and vandalism |
XD-Violence [54] | 4754 untrimmed videos with audio collected from both films and YouTube, split into 2405 violent videos and 2349 non-violent videos. Six common types of violence are covered, with a total of 217 h | Abuse, fighting, riot, and shooting |
SAFE Corpus [41] | 400 audio-visual sequences in English, including fear-type emotions, 5275 segments corresponding to a total of 6 h of speech organized in sequences from 8 s to 5 min long, containing about 400 different speakers | Physical/psychological threats and aggression against human beings |
3.4. What Are the Challenges in the Use of Deep Learning Models for the Detection of Anti-Social Behaviour(s) in Public Transport?
- Ambiguity
- Background
- Data Imbalance
- Dependency and Diversity
- Data Quality
- Privacy and Availability
- Uncertainty
- Trade-offs
4. Discussion
5. Conclusions
5.1. Existing Landscape and Gap Analysis
5.2. Potential of Deep Learning Models and Identified Challenges
5.3. Proposals for Stakeholders
5.4. Limitations of the Present Study
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Title | Year | Research Type | Surveillance Type | Technology Adopted | Relevant Behaviour Detected | Datasets Referred to/Adopted |
---|---|---|---|---|---|---|
A Review on State-of-the-Art Violence Detection Techniques [66] | 2019 | Review | Video | N/A | N/A | SBH Kinecr Interaction, Hockey, Movies, KARD, Media Eval, UCF 10 |
A Revisit of Sparse Coding Based Anomaly Detection in Stacked RNN Framework [32] | 2017 | Applied Research | Video | Stacked Recurrent Neural Network | Chasing and brawling | UCF-Crime, ShanghaiTech Campus, CUHK Avenue, UCSD, Subway |
A survey of video violence detection [16] | 2021 | Survey | Video | N/A | N/A | Hockey, Violent Flow, Movies, BEHAVE, and RWF-2000 |
Abnormal Behavior Detection: A Comparative Study of Machine Learning Algorithms Using Feature Extraction and a Fully Labeled dataset [35] | 2019 | Applied Research | Video | Generic 3D CNN, Multilayer Perceptron | Abuse, arrest, assault, burglary, fighting, robbery, stealing and vandalism | UCF-Crime |
An Adaptive Framework for Acoustic Monitoring of Potential Hazards [40] | 2009 | Applied Research | Audio | Gaussian Mixture Model (GMM) | Screams | BBC Sound Effects Library, Sound Ideas Series 6000, Sound Ideas: the art of Foley, Best Service Studio Box Sound Effects, TIMIT, and sound effects from various internet sources |
An intelligent system to detect human suspicious activity using deep neural networks [36] | 2019 | Applied Research | Video | CNNs, multi-class support vector machine | Fight, boxing, robbery, and pickpocket | BEHAVE, Crowd Violence, KTH, FIRE |
Anomaly Detection in Road Traffic Using Visual Surveillance: A Survey [61] | 2021 | Survey | Video | N/A | N/A | UCF-Crime, Avenue, PETS2009, ShanghaiTech Campus, UCSD, UMN, BEHAVE |
Anomaly Locality in Video Surveillance [37] | 2019 | Applied Research | Video | A tube extraction module, a 3D CNN model, and a regression network | Assault, burglary, and robbery | UCF-Crime |
AnoPCN: Video Anomaly Detection via Deep Predictive Coding Network [67] | 2019 | Applied Research | Video | Deep Predictive Coding Network, termed AnoPCN | Fighting, chasing, and pushing | ShanghaiTech Campus, CUHK Avenue, and UCSD |
Artificial Intelligence of Things-assisted two-stream neural network for anomaly detection in surveillance Big Video Data [38] | 2022 | Applied Research | Video | CNN model, bi-directional long short-term memory layer | Assault and abuse | UCF-Crime and RWF-2000 |
BMAN: Bidirectional Multi-Scale Aggregation Networks for Abnormal Event Detection [18] | 2020 | Applied Research | Video | Bidirectional multi-scale aggregation networks | Running with panic and fighting | UCSD, UMN, CUHK Avenue, ShanghaiTech |
CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks [31] | 2021 | Applied Research | Video | CNN and multi-layer Bi-directional Long Short-term Memory models | Fighting and abuse | UCF-Crime |
Deep Anomaly Detection for In-Vehicle Monitoring-An Application-Oriented Review [17] | 2022 | Review | Video | N/A | N/A | UMN, UCSD, CUHK Avenue, ShanghaiTech Campus, IITBCorridor, UCF-Crime, XD-Violence, UBnormal, SVIRO-Uncertainty |
Deep learning approaches for video-based anomalous activity detection [59] | 2019 | Review | Video | N/A | N/A | UCSD, UMN, Live Video, Avenue, Anomalous Behavior, PETS’ 09, VIOLENT-FLOWS, Weizmann, ShanghaiTech Campus, CAVIAR, BEHAVE, MIT Traffic, Subway Entrance and Exitm, i-Lids bag and vehicle detection challenge |
Exploring Background-bias for Anomaly Detection in Surveillance Videos [39] | 2019 | Applied Research | Video | 3D-CNN, Meta Learning | Stealing | UCF-Crime |
Fear-type emotion recognition for future audio-based surveillance systems [41] | 2008 | Applied Research | Audio | GMM | Kidnapping, physical aggression, fear-stress, terror, anxiety, worry, anguish, panic, distress, anger, sadness, disgust, suffering, deception, contempt, shame, despair, and cruelty | SAFE Corpus |
Future Frame Prediction for Anomaly Detection - A New Baseline [68] | 2018 | Applied Research | Video | U-Net, Flownet | Loitering and fighting | CUHK Avenue, USCD, and ShanghaiTech Campus |
Graph Embedded Pose Clustering for Anomaly Detection [69] | 2020 | Applied Research | Video | Pose graphs and a Dirichlet process mixture | Fighting and throwing objects | ShanghaiTech Campus |
Memorizing Normality to Detect Anomaly: Memory-Augmented Deep Autoencoder for Unsupervised Anomaly Detection [70] | 2019 | Applied Research | Video | Memory-augmented autoencoder | Fighting and chasing | UCSD, CUHK Avenue, and ShanghaiTech Campus |
Motion-Aware Feature for Improved Video Anomaly Detection [65] | 2019 | Applied Research | Video | Multiple Instance Learning (MIL) | Abuse, assault, burglary, fighting, robbery, stealing, shoplifting, and vandalism | UCF-Crime |
Multi-Channel Generative Framework and Supervised Learning for Anomaly Detection in Surveillance Videos [62] | 2021 | Applied Research | Video | Multi-channel framework based on four Conditional GANs | Throwing objects and loitering | CUHK Avenue, USCD, and ShanghaiTech Campus |
Probabilistic novelty detection for acoustic surveillance under real-world conditions [42] | 2011 | Applied Research | Audio | Clustering the GMMs of each sound sample for detecting outliers | Argument and fighting | Own dataset |
Real-Time Abnormal Event Detection for Enhanced Security in Autonomous Shuttles Mobility Infrastructures [30] | 2020 | Applied Research | Video | Stacked Bidirectional LSTM Classifier, Spatiotemporal Autoencoder, and a Hybrid LSTM Classifier | Bag-snatching, pickpocketing, vandalism, and aggression | Data captured from Geneva Public Transport shuttles, NTU-RGB-D, and the UCSD |
Real-world Anomaly Detection in Surveillance Videos [52] | 2018 | Applied Research | Video | MIL | Fighting, burglary, and robbery | UCF-Crime |
Recent Advances in Video Analytics for Rail Network Surveillance for Security, Trespass and Suicide Prevention-A Survey [8] | 2019 | Survey | Video | N/A | N/A | CAVIAR |
Scream and gunshot detection and localization for audio-surveillance systems [43] | 2007 | Applied Research | Audio | Two parallel GMM classifiers | Screams | Movie soundtracks, internet repositories, and own recorded |
Sudden Event Recognition: A Survey [71] | 2013 | Survey | Video | N/A | N/A | Multi-camera Human Action Video, BEHAVE, CAVIAR |
Suspicious Human Activity Recognition using 2D Pose Estimation and CNN [33] | 2022 | Applied Research | Video | CNN | Fighting and trespassing | UCI-HAR, WISDOM, RGB-D |
Suspicious human activity recognition: a review [64] | 2018 | Review | Video | N/A | N/A | PETS 2006, PETS 2007, i-LIDS-abandoned baggage detection, VISOR, CVSG, CAVIAR, Bank, Fight CAVIAR, UCF-Crime |
Two-Stream CNN Architecture for Anomalous Event Detection in Real World Scenarios [15] | 2020 | Applied Research | Video | Two-stream 2D-CNN | Abuse, arrest, burglary, fighting, robbery, stealing, and vandalism | UCF-Crime |
Urban Anomaly Analytics: Description, Detection, and Prediction [28] | 2022 | Review | Video | N/A | N/A | Subway entrance, subway exit, UCSD, VIRAT, CUHK Avenue |
Using Artificial Intelligence for Anomaly Detection Using Security Cameras [29] | 2021 | Applied Research | Video | CNN | Robbery | Data from the public transportation system of Grande Vitória, ES, Brazil |
Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning [53] | 2021 | Applied Research | Video | Robust Temporal Feature Magnitude learning | Assault, burglary, robbery, shoplifting, stealing, vandalism, and fighting | ShanghaiTech Campus, UCF-Crime, XD-Violence, and UCSD |
References
- Stradling, S.; Carreno, M.; Rye, T.; Noble, A. Passenger perceptions and the ideal urban bus journey experience. Trans. Policy 2007, 14, 283–292. [Google Scholar] [CrossRef]
- Quinones, L.M. Sexual harassment in public transport in Bogotá. Trans. Res. Part A Policy Pract. 2020, 139, 54–69. [Google Scholar] [CrossRef]
- Lewis, S. Sexual Harassment on the London Underground: Mobilities, Temporalities and Knowledges of Gendered Violence in Public Transport; Loughborough University: Loughborough, UK, 2018. [Google Scholar]
- Violence against Women an EU Wide Survey Main Results. European Union Agency for Fundamental Rights. 2014. Available online: https://fra.europa.eu/sites/default/files/fra_uploads/fra-2014-vaw-survey-main-results-apr14_en.pdf (accessed on 3 May 2023).
- Women’s Safety and Security: A Public Transport Priority, 2018. International Transport Forum, OECD Publishing. Available online: https://www.itf-oecd.org/sites/default/files/docs/womens-safety-security_0.pdf (accessed on 3 May 2023).
- Coppola, P.; Silvestri, F. Gender Inequality in Safety and Security Perceptions in Railway Stations. Sustainability 2021, 13, 4007. [Google Scholar] [CrossRef]
- McAtamney, A.; Morgan, A. Key Issues in Antisocial Behaviour. Research in Practice. Australian Institute of Criminology. Available online: https://www.aic.gov.au/publications/rip/rip5 (accessed on 29 January 2023).
- Zhang, T.; Aftab, W.; Mihaylova, L.; Langran-Wheeler, C.; Rigby, S.; Fletcher, D.; Maddock, S.; Bosworth, G. Recent Advances in Video Analytics for Rail Network Surveillance for Security, Trespass and Suicide Prevention—A Survey. Sensors 2022, 22, 4324. [Google Scholar] [CrossRef] [PubMed]
- Anti-Social Behaviour, Crime Stoppers Western Australia. Available online: https://www.crimestopperswa.com.au/keeping-safe/anti-social-behaviour/ (accessed on 19 January 2023).
- Dezsö, C.L.; Ross, D.G. Does female representation in top management improve firm performance? A panel data investigation. Strateg. Manag. J. 2012, 33, 1072–1089. [Google Scholar] [CrossRef]
- Woolley, A.W.; Chabris, C.F.; Pentland, A.; Hashmi, N.; Malone, T.W. Evidence for a collective intelligence factor in the performance of human groups. Science 2010, 330, 686–688. [Google Scholar] [CrossRef] [PubMed]
- Hunt, V.; Layton, D.; Prince, S. Diversity Matters. 2015. Available online: https://www.mckinsey.com/business-functions/organization/our-insights/why-diversity-matters (accessed on 29 January 2023).
- Mohan, A.; Choksi, M.; Zaveri, M.A. Anomaly and Activity Recognition Using Machine Learning Approach for Video Based Surveillance. In Proceedings of the 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July 2019; pp. 1–6. [Google Scholar]
- Peng, H.-K.; Marculescu, R. Multi-Scale Compositionality: Identifying the Compositional Structures of Social Dynamics Using Deep Learning. PLoS ONE 2015, 10, e0118309. [Google Scholar] [CrossRef]
- Majhi, S.; Dash, R.; Sa, P.K. Two-Stream CNN Architecture for Anomalous Event Detection in Real World Scenarios. In Computer Vision and Image Processing-CVIP 2019; Nain, N., Vipparthi, S., Raman, B., Eds.; Communications in Computer and Information Science; Springer: Singapore, 2019; Volume 1148. [Google Scholar]
- Yao, H.; Hu, X. A survey of video violence detection. Cyber-Phys. Syst. 2021, 9, 1–24. [Google Scholar] [CrossRef]
- Caetano, F.; Carvalho, P.; Cardoso, J. Deep Anomaly Detection for In-Vehicle Monitoring—An Application-Oriented Review. Appl. Sci. 2022, 12, 10011. [Google Scholar] [CrossRef]
- Lee, S.; Kim, H.G.; Ro, Y.M. BMAN: Bidirectional Multi-Scale Aggregation Networks for Abnormal Event Detection. IEEE Trans. Image Process. 2020, 29, 2395–2408. [Google Scholar] [CrossRef]
- Tricco, A.C.; Lillie, E.; Zarin, W.; O’Brien, K.K.; Colquhoun, H.; Levac, D.; Moher, D.; Peters, M.D.J.; Horsley, T.; Weeks, L.; et al. PRISMA Extension for Scoping Reviews (PRISMA-ScR): Checklist and explanation. Ann. Intern. Med. 2018, 169, 467–473. [Google Scholar] [CrossRef] [PubMed]
- Peters, M.D.; Godfrey, C.M.; Khalil, H.; McInerney, P.; Parker, D.; Soares, C.B. Guidance for conducting systematic scoping reviews. Int. J. Evid. Based Healthc. 2015, 13, 141–146. [Google Scholar] [CrossRef] [PubMed]
- Arksey, H.; O’Malley, L. Scoping studies: Towards a methodological framework. Int. J. Soc. Res. Methodol. 2005, 8, 19–32. [Google Scholar] [CrossRef]
- Levac, D.; Colquhoun, H.; O’Brien, K.K. Scoping studies: Advancing the methodology. Implement. Sci. 2010, 5, 1–9. [Google Scholar] [CrossRef] [PubMed]
- Colquhoun, H.L.; Levac, D.; O’Brien, K.K.; Straus, S.; Tricco, A.C.; Perrier, L.; Kastner, M.; Moher, D. Scoping reviews: Time for clarity in definition, methods, and reporting. J. Clin. Epidemiol. 2014, 67, 1291–1294. [Google Scholar] [CrossRef] [PubMed]
- Daudt, H.M.; van Mossel, C.; Scott, S.J. Enhancing the scoping study methodology: A large, inter-professional team’s experience with Arksey and O’Malley’s framework. BMC Med. Res. Methodol. 2013, 13, 1–48. [Google Scholar] [CrossRef] [PubMed]
- Basheer, A.M.I.; Halah, A.; Fatimah, A.; Dana, A.; Manar, A.; Munira, A.; Shoog, A.; Atta, R.; Mustafa, Y.; Gohar, Z. A Deep-Learning Approach to Driver Drowsiness Detection. Safety 2023, 9, 65. [Google Scholar]
- Shebiah, R.N.; Arivazhagan, S. Ownership of abandoned object detection by integrating carried object recognition and context sensing. Vis. Comput. 2023, 2023, 1–26. [Google Scholar]
- Babineau, J. Product review: Covidence (systematic review software). J. Can. Health Libr. Assoc. 2014, 35, 68–71. [Google Scholar] [CrossRef]
- Zhang, M.; Li, T.; Yu, Y.; Li, Y.; Hui, P.; Zheng, Y. Urban Anomaly Analytics: Description, Detection, and Prediction. IEEE Trans. Big Data 2022, 8, 809–826. [Google Scholar] [CrossRef]
- Affonso, G.A.; De Menezes, A.L.L.; Nunes, R.B.; Almonfrey, D. Using Artificial Intelligence for Anomaly Detection Using Security Cameras. In Proceedings of the 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Black River, Mauritius, 7–8 October 2021; pp. 1–5. [Google Scholar]
- Tsiktsiris, D.; Dimitriou, N.; Lalas, A.; Dasygenis, M.; Votis, K.; Tzovaras, D. Real-Time Abnormal Event Detection for Enhanced Security in Autonomous Shuttles Mobility Infrastructures. Sensors 2020, 20, 4943. [Google Scholar] [CrossRef]
- Ullah, W.; Ullah, A.; Haq, I.U.; Muhammad, K.; Sajjad, M.; Baik, S.W. CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks. Multimed. Tools Appl. 2021, 80, 16979–16995. [Google Scholar] [CrossRef]
- Luo, W.; Liu, W.; Gao, S. A Revisit of Sparse Coding Based Anomaly Detection in Stacked RNN Framework. In Proceedings of the 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 22–29 October 2017; pp. 341–349. [Google Scholar]
- Dileep, A.S.; Nabilah, S.S.; Sreeju, S.; Farhana, K.; Surumy, S. Suspicious Human Activity Recognition using 2D Pose Estimation and Convolutional Neural Network. In Proceedings of the 2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), Chennai, India, 24–26 March 2022; pp. 19–23. [Google Scholar]
- Nayak, R.; Pati, U.C.; Das, S.K. A comprehensive review on deep learning-based methods for video anomaly detection. Image Vis. Comput. 2021, 106, 104078. [Google Scholar] [CrossRef]
- Hervas, M.; Fernandez-Medina, C.; Shiguihara-Juárez, P.; González-Valenzuela, R. Abnormal Behavior Detection: A Comparative Study of Machine Learning Algorithms Using Feature Extraction and a Fully Labeled dataset. In Proceedings of the 2019 International Conference on Information Systems and Computer Science (INCISCOS), Quito, Ecuador, 19–22 November 2019; pp. 62–67. [Google Scholar]
- Ramachandran, S.; Palivela, L.H.; Vijayakumar, V.; Subramaniyaswamy, V.; Abawajy, J.; Yang, L. An intelligent system to detect human suspicious activity using deep neural networks. J. Intell. Fuzzy Syst. 2019, 36, 4507–4518. [Google Scholar] [CrossRef]
- Landi, F.; Snoek, C.G.M.; Cucchiara, R. Anomaly Locality in Video Surveillance. arXiv 2019, arXiv:1901.10364. [Google Scholar]
- Ullah, W.; Hussain, T.; Muhammad, K.; Heidari, A.A.; Ser, J.D.; Baik, S.W.; De Albuquerque, V.H. Artificial Intelligence of Things-assisted two-stream neural network for anomaly detection in surveillance Big Video Data. Future Gener. Comput. Syst. 2022, 129, 286–297. [Google Scholar] [CrossRef]
- Liu, K.; Ma, H. Exploring Background-bias for Anomaly Detection in Surveillance Videos. In Proceedings of the 27th ACM International Conference on Multimedia, New York, NY, USA, 15 October 2019; pp. 1490–1499. [Google Scholar]
- Ntalampiras, S.; Potamitis, I.; Fakotakis, N. An Adaptive Framework for Acoustic Monitoring of Potential Hazards. EURASIP J. Audio Speech Music Process. 2009, 2019, 594103. [Google Scholar] [CrossRef]
- Clavel, C.; Vasilescu, I.; Devillers, L.; Richard, G.; Ehrette, T. Fear-type emotion recognition for future audio-based surveillance systems. Speech Commun. 2008, 50, 487–503. [Google Scholar] [CrossRef]
- Ntalampiras, S.; Potamitis, I.; Fakotakis, N. Probabilistic Novelty Detection for Acoustic Surveillance Under Real-World Conditions. IEEE Trans. Multimed. 2011, 13, 713–719. [Google Scholar] [CrossRef]
- Valenzise, G.; Gerosa, L.; Tagliasacchi, M.; Antonacci, F.; Sarti, A. Scream and gunshot detection and localization for audio-surveillance systems. In Proceedings of the 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, London, UK, 20 September 2007; pp. 21–26. [Google Scholar]
- Yao, G.; Lei, T.; Zhong, J. A review of convolutional-neural-network-based action recognition. Pattern Recognit. Lett. 2019, 118, 14–22. [Google Scholar] [CrossRef]
- al Zamil, M.G.H.; Samarah, S.; Rawashdeh, M.; Karime, A.; Hossain, M.S. Multimedia-oriented action recognition in smart city-based iot using multilayer perceptron. Multimed. Tools Appl. 2019, 78, 30315–30329. [Google Scholar] [CrossRef]
- Xiao, S.; Wang, S.; Huang, Z.; Wang, Y.; Jiang, H. Two-stream transformer network for sensor-based human activity recognition. Neurocomputing 2022, 512, 253–268. [Google Scholar] [CrossRef]
- Zhao, R.; Ali, H.; der Smagt, P.V. Two-stream rnn/cnn for action recognition in 3d videos. In Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Vancouver, BC, Canada, 24–28 September 2017; pp. 4260–4267. [Google Scholar]
- Muhammad, K.; Ullah, A.; Imran, A.S.; Sajjad, M.; Kiran, M.S.; Sannino, G.; de Albuquerque, V.H.C. Human action recognition using attention based lstm network with dilated cnn features. Future Gener. Comput. Syst. 2021, 125, 820–830. [Google Scholar] [CrossRef]
- Yenduri, S.; Perveen, N.; Chalavadi, V. Fine-grained action recognition using dynamic kernels. Pattern Recognit. 2022, 122, 108282. [Google Scholar] [CrossRef]
- Blunsden, S.; Fisher, R.B. The BEHAVE Video Dataset: Ground Truthed Video for Multi-Person Behavior Classification. Available online: https://homepages.inf.ed.ac.uk/rbf/PAPERS/unfbehavedata.pdf (accessed on 20 November 2023).
- Joo, H.K.; Vo, K.; Yamazaki, K.; Le, N. CLIP-TSA: CLIP-Assisted Temporal Self-Attention for Weakly-Supervised Video Anomaly Detection. arXiv 2022, arXiv:2212.05136. [Google Scholar]
- Sultani, W.; Chen, C.; Shah, M. Real-World Anomaly Detection in Surveillance Videos. In Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–22 June 2018; pp. 6479–6488. [Google Scholar]
- Tian, Y.; Pang, G.; Chen, Y.; Singh, R.; Verjans, J.W.; Carneiro, G. Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning. In Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision (ICCV), Online, 11–17 October 2021; pp. 4955–4966. [Google Scholar]
- Wu, P.; Liu, J.; Shi, Y.; Sun, Y.; Fangtao, S.; Wu, Z.; Yang, Z. Not only Look, But Also Listen: Learning Multimodal Violence Detection Under Weak Supervision. In Proceedings of the European Conference on Computer Vision—ECCV 2020, Online, 23–28 August 2020; pp. 322–339. [Google Scholar]
- Iantovics, L.B.; Enăchescu, C. Method for Data Quality Assessment of Synthetic Industrial Data. Sensor 2022, 22, 1608. [Google Scholar] [CrossRef] [PubMed]
- Courty, N.; Allain, P.; Creusot, C.; Corpetti, T. Using the Agoraset dataset: Assessing for the quality of crowd video analysis methods. Pattern Recognit. Lett. 2014, 44, 161–170. [Google Scholar] [CrossRef]
- Kawamura, A.; Yoshimitsu, Y.; Kajitani, K.; Naito, T.; Fujimura, K.; Kamijo, S. Smart camera network system for use in railway stations. In Proceedings of the 2011 IEEE International Conference on Systems, Man, and Cybernetics, Maui, HI, USA, 9–12 October 2011; pp. 85–90. [Google Scholar]
- Ren, J.; Xia, F.; Liu, Y.; Lee, I. Deep Video Anomaly Detection: Opportunities and Challenges. In Proceedings of the 2021 International Conference on Data Mining Workshops (ICDMW), Auckland, New Zealand, 7–10 December 2021; pp. 959–966. [Google Scholar]
- Pawar, K.; Attar, V. Deep learning approaches for video-based anomalous activity detection. World Wide Web 2019, 22, 571–601. [Google Scholar] [CrossRef]
- Wang, T.; Meina Qiao, M.; Deng, Y.; Zhou, Y.; Wang, H.; Lyu, Q.; Snoussi, H. Abnormal event detection based on analysis of movement information of video sequence. Optik 2018, 152, 50–60. [Google Scholar] [CrossRef]
- Santhosh, K.K.; Dogra, D.P.; Roy, P.P. Anomaly Detection in Road Traffic Using Visual Surveillance: A Survey. ACM Comput. Surv. 2021, 53, 119–126. [Google Scholar] [CrossRef]
- Vu, T.-H.; Boonaert, J.; Ambellouis, S.; Taleb-Ahmed, A. Multi-Channel Generative Framework and Supervised Learning for Anomaly Detection in Surveillance Videos. Sensors 2021, 21, 3179. [Google Scholar] [CrossRef]
- Ferryman, J. Video Surveillance Standardisation Activities, Process and Roadmap: ERNCIP Thematic Group Video Surveillance for Security of Critical Infrastructure. Technical Report JRC103650; Joint Research Centre (JRC). 2016. Available online: https://data.europa.eu/doi/10.2788/92267 (accessed on 22 January 2023).
- Tripathi, R.K.; Jalal, A.S.; Agrawal, S.C. Suspicious human activity recognition: A review. Artif. Intell. Rev. 2018, 50, 283–339. [Google Scholar] [CrossRef]
- Zhu, Y.; Newsam, S. Motion-Aware Feature for Improved Video Anomaly Detection. arXiv 2019, arXiv:1907.10211. [Google Scholar]
- Ramzan, M.; Abid, A.; Khan, H.U.; Awan, S.M.; Ismail, A.; Ahmed, M.; Ilyas, M.; Mahmood, A. A Review on State-of-the-Art Violence Detection Techniques. IEEE Access 2019, 7, 107560–107575. [Google Scholar] [CrossRef]
- Ye, M.; Peng, X.; Gan, W.; Wu, W.; Qiao, Y. AnoPCN: Video Anomaly Detection via Deep Predictive Coding Network. In Proceedings of the 27th ACM International Conference on Multimedia, New York, NY, USA, 27 October 2019; pp. 1805–1813. [Google Scholar]
- Liu, W.; Luo, W.; Lian, D.; Gao, S. Future Frame Prediction for Anomaly Detection—A New Baseline. In Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–22 June 2018; pp. 6536–6545. [Google Scholar]
- Markovitz, A.; Sharir, G.; Friedman, I.; Zelnik-Manor, L.; Avidan, S. Graph Embedded Pose Clustering for Anomaly Detection. arXiv 2022, arXiv:1912.11850. [Google Scholar]
- Gong, D.; Liu, L.; Le, V.; Saha, B.; Mansour, M.R.; Venkatesh, S.; Van den Hengel, A. Memorizing Normality to Detect Anomaly: Memory-Augmented Deep Autoencoder for Unsupervised Anomaly Detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), Seoul, Republic of Korea, 11–17 October 2019; pp. 1705–1714. [Google Scholar]
- Suriani, N.S.; Hussain, A.; Zulkifley, M.A. Sudden Event Recognition: A Survey. Sensors 2013, 13, 9966–9998. [Google Scholar] [CrossRef]
Criteria | Inclusion Criteria | Exclusion Criteria | Justification |
---|---|---|---|
Language | English | Non-English language | English is the official language of the study’s team |
Time | All studies prior to 2022 | N/A | Any deep-learning detection technology, regardless of when it was first proposed, is relevant |
Study design | All study designs were included in the review | N/A | This review is concerned with the breadth of existing knowledge |
Study topic | Publication falls within the scope of anomaly detection | Publication does not fall within the pertinent scope | This review is only interested in the detection of anti-social behaviours from perpetrators |
Anti-social behaviour detected | Publication addresses an anti-social behaviour that could affect women’s safety perception | Publication does make clear what anti-social behaviour is studied or anti-social behaviour considered is not relevant | Only deep learning models that can detect relevant anti-social behaviours are of interest |
Characteristics | Information to Be Extracted |
---|---|
Authors, year, and aim(s) | Who were the authors of the study? When was it conducted? What was the aim of the study? |
Research method | What research method did the publication follow? |
Detected anti-social behaviour | What type of anti-social behaviour(s) does this publication consider? Is it an anti-social behaviour that would influence women’s perceived safety in public transport settings? |
Type of technology | What type of deep learning detection model was adopted/introduced in the publication? What is the technical infrastructure necessary? |
Limitations and opportunities | What are the constraints related to deep learning detection technologies? What are the benefits of these technologies? What and how do environmental and operational factors limit/improve the efficacy of these technologies? |
Training and validation dataset | Does the publication use an audio/video dataset to train the algorithm or to assess the performance of the technology? If so, what dataset? And is it available? |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Papini, M.; Iqbal, U.; Barthelemy, J.; Ritz, C. The Role of Deep Learning Models in the Detection of Anti-Social Behaviours towards Women in Public Transport from Surveillance Videos: A Scoping Review. Safety 2023, 9, 91. https://doi.org/10.3390/safety9040091
Papini M, Iqbal U, Barthelemy J, Ritz C. The Role of Deep Learning Models in the Detection of Anti-Social Behaviours towards Women in Public Transport from Surveillance Videos: A Scoping Review. Safety. 2023; 9(4):91. https://doi.org/10.3390/safety9040091
Chicago/Turabian StylePapini, Marcella, Umair Iqbal, Johan Barthelemy, and Christian Ritz. 2023. "The Role of Deep Learning Models in the Detection of Anti-Social Behaviours towards Women in Public Transport from Surveillance Videos: A Scoping Review" Safety 9, no. 4: 91. https://doi.org/10.3390/safety9040091
APA StylePapini, M., Iqbal, U., Barthelemy, J., & Ritz, C. (2023). The Role of Deep Learning Models in the Detection of Anti-Social Behaviours towards Women in Public Transport from Surveillance Videos: A Scoping Review. Safety, 9(4), 91. https://doi.org/10.3390/safety9040091