Next Article in Journal
Surface Air Movement: An Important Contributor to Ventilation of Isolated Subsurface Structures?
Previous Article in Journal
Effect of Scour on the Natural Frequency Responses of Bridge Piers: Development of a Scour Depth Sensor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Show Me a Safer Way: Detecting Anomalous Driving Behavior Using Online Traffic Footage

Department of Infrastructure Engineering, University of Melbourne, Parkville, VIC 3010, Australia
*
Author to whom correspondence should be addressed.
Infrastructures 2019, 4(2), 22; https://doi.org/10.3390/infrastructures4020022
Submission received: 6 April 2019 / Revised: 1 May 2019 / Accepted: 5 May 2019 / Published: 8 May 2019

Abstract

:
Real-time traffic monitoring is essential in many novel applications, from traffic management to smart navigation systems. The large number of traffic cameras being integrated into urban infrastructures has enabled efficient traffic monitoring as an intervention in reducing traffic accidents and related casualties. In this paper, we focus on the problem of the automatic detection of anomalous driving behaviors, e.g., speeding or stopping on a bike lane, by using the traffic-camera feed that is available online. This can play an important role in personalized route-planning applications where, for instance, a user wants find the safest paths to get to a destination. We present an integrated system that accurately detects, tracks, and classifies vehicles using online traffic-camera feed.

1. Introduction

Traffic management aims at reducing traffic incidents and improving traffic flow. Malicious or unintentional anomalous driving behaviors, as categorised and shown in Figure 1, can directly or indirectly result in traffic incidents and affect transport efficiency [1]. Consequently, knowing where, when, and how often these behaviors happen is highly valuable both to road users, e.g., to adjust their path through safer routes, and road authorities, e.g., to improve signage. Traditional hardware-based detection techniques, such as inductive loop detectors, laser detectors, and optical detectors, are expensive to install and maintain [2]. Moreover, these techniques have limited functionalities when it comes to analyzing the behavior of drivers and other road users. For instance, an inductive loop detector cannot distinguish a cyclist from a car.
Traffic cameras have been widely used to monitor traffic conditions, contributing to urban surveillance [3] and intelligent transportation systems [4]. Compared with traditional sensors, widely installed traffic cameras are more cost-effective and have a wider field of view, thus allowing to monitor multiple lanes [5] and to distinguish between road users. With advances in computing methodologies, in particular in the field of computer vision, as well as the development of more affordable and high-performance cameras, vision-based vehicle detection and tracking is now becoming more feasible, hence offering great potential [6] for automated traffic-information collection and analysis [7].
While research in this area has mainly focused on vehicle detection [8], vehicle tracking [9] and understanding road users’ behavior [10] separately and on an ad hoc basis, there is a lack of research on integrated systems that combine detection, tracking, and driving-behavior classification using traffic footage collected from online traffic cameras. To address this issue, we propose a web-based integrated system for the detection and analysis of anomalous driving behaviors, which can potentially be used to provide tailored safe-route recommendations for drivers and other road users. Our system can also provide information to traffic-management authorities in order to help them make better decisions.
Our system uses traffic footage collected from online sources such as Live Traffic Cameras in Australia (https://straya.io/), and state-of-the-art visual-recognition method Mask R-CNN, which is fast, simple, and provides accurate results [11], to first detect the vehicles on the road. The system then tracks the detected vehicles by using a combination of the Hungarian algorithm and Kalman filter [9]. The trajectories of the tracked vehicles are analyzed to determine anomalous driving behaviors, including speeding, crossing a solid line, and entering traffic-restricted areas. The spatiotemporal spread of anomalous driving behaviors is then communicated to road users in the form of hotspot maps to enable them to tailor their routes.

2. Related Work

2.1. Vehicle Detection

Vehicle detection aims at identifying vehicles and their locations in images. Two main domains of vehicle detection are motion-based approaches [12], detecting vehicles based on their difference with static backgrounds, and appearance-based approaches [8], using prior knowledge to segment the foreground and background using manually designed features such as color [13], texture [14], and Histogram of Gradient (HOG) [15]. By contrast, features extracted by Convolutional Neural Networks (CNNs) and other methods based on CNNs are automatically learned [16]. A Faster Region-based CNN (Faster R-CNN) extracts features on a number of proposal regions, and then performs classification and bounding-box regression to detect various objects including vehicles [17]. Combined with a Region Proposal Network (RPN), which proposes candidate bounding boxes, Faster R-CNN can efficiently perform both hypothesis generation and verification [18]. As shown in Figure 2, compared with Faster R-CNN, the Mask R-CNN preserves pixel-level locations to improve mask accuracy, and then adds a branch for predicting segmentation masks on each Region of Interest (ROI), in parallel with a branch for classification and bounding-box regression. The Mask R-CNN achieves state-of-the-art performance in instance segmentation and object detection, with a fast training and testing speed [11].

2.2. Vehicle Tracking

Vehicle tracking aims to re-identify vehicles, derive vehicle trajectories, and predict vehicle positions and motions based on the patterns of previous positions and motions [9]. The methods of video-based tracking can be systematically classified as a contour-based method establishing the outline of moving objects and updating outlines according to the motion of an object [19]; feature-based methods concentrating on tracking significant features of the vehicle and the distribution of these features [10]; and framework-based methods in which objects in a framework are assumed to move in accordance with certain distribution patterns like position and velocity [20].
The Hungarian algorithm [21] is an optimization algorithm used to solve the assignment problem that deals with the allocation of resources to activities, seeking for minimum cost or maximum profit. The authors in Reference [20] used a Kalman filter to predict the centroid of the observed vehicle on successive frames, calculate measurement errors and prediction errors, and dynamically update predictions. Our system shows that an ensemble method that integrates these two approaches provides higher accuracy.

2.3. Behavior Classification

Behavior classification aims at characterizing the behavior of drivers as normal or abnormal, and identifying anomalous events such as sudden stopping and solid-line crossing. The authors in Reference [10] classified sudden stopping behavior by setting thresholds for vehicle starting velocity, ending velocity, and accelerated speed, and if the corresponding three values of the observed vehicle in the real world are smaller than the set thresholds, the behavior of the observed vehicle can be judged as sudden stopping. For the classification of solid-line crossing, Reference [10] specifies solid lines as boundary-referenced lines, extracts their pixel coordinates, and then computes the variance of the differences between the coordinates of vehicle trajectories and the solid referenced line. If the vehicle keeps moving within a lane, the variance stays at a correspondingly low level, whereas if the vehicle crosses the solid line to change the lane, there is a sudden dramatic increase in the variance value.
However, these studies only focused on one or a few specific vehicle behaviors, which limits their application in complex traffic situations. In summary, there is a lack of an integrated system that combines detection, tracking, and classification to identify anomalous driving behaviors based on traffic footage.

3. Methods

To create an integrated system that can be used to detect anomalous driving behaviors based on traffic footage, we performed vehicle detection, tracking, and anomalous-driving-behavior classification using the steps as explained below.

3.1. Vehicle Detection

To detect the vehicles in the frames, we used the Mask R-CNN technique. As shown in Figure 2, Mask R-CNN uses an RPN to generate candidate-object bounding boxes and RoIAlign to extract features and preserve pixel-level locations to improve the accuracy of the mask. The network includes a branch for predicting segmentation masks on each ROI, in parallel with a branch for classification and bounding-box regression. This method is both fast and simple, and provides accurate results in instance segmentation and bounding-box object detection [11]. Video footage is converted to a sequence of images, and fed as input to the Mask R-CNN. With pretrained weights for MS COCO [22] which can detect a wide range of objects (for instance, cars, buses, and pedestrians), the resulting class ID, frame number, confidence level, and the coordinates of the bounding boxes for each detected vehicle are collected and recorded. Vehicle centroids can be calculated as centroids of corresponding bounding boxes. Figure 3 shows an example of vehicle detection in an image frame using Mask R-CNN.

3.2. Vehicle Tracking

Once a vehicle is detected, vehicle tracking aims to determine centroids belonging to the same vehicle in continuous frames and accordingly derive the trajectories of the vehicles. The Hungarian algorithm assigns the centers of vehicles to the trajectories of those vehicles with the least total cost, which is the sum of distance between centers and trajectories, with the condition that one center is exclusively assigned to one trajectory.
To eliminate the influence of vehicle-detection errors on the Hungarian algorithm, a Kalman filter is used that can predict the vehicle centroid location in case it is missed by the detection method. The complete tracking process is shown in Figure 4 and comprises the following steps.
  • Newly appearing vehicles are identified, and tracks are created with detected centroids. When the distances between detected centroids and the last centroids in all tracks exceed a predefined threshold, this detected centroid is considered as a newly appearing vehicle.
  • The Hungarian algorithm is used to assign the rest of detected centroids to existing tracks by minimizing the sum of cost between assigned detected centroids and predicted centroids in tracks.
  • A Kalman filter is used to predict and correct the detected centroids by estimating the centroid of next frame based on the given centroid of the current frame.
  • Remove and extract existing trajectories when there is no corresponding vehicle being assigned to these tracks for five frames (one second), which indicates that the vehicle has moved out of the camera range.

3.3. Behavior Classification

Behavior classification aims to determine and classify anomalous driving behaviors, and is mainly based on trajectory information obtained in the vehicle-tracking component. Here, we classify three common anomalous driving behaviors as follows:
  • Speeding: Identified by a comparison between the speed limit and the detected average velocity of the observed vehicle while traveling in a specified region. As shown in Figure 5, two green boundary lines are set for recording where and when a vehicle enters and leaves the region. The positions and frame numbers of a vehicle are recorded once the vehicle passes the upper green line or the lower green line, and time is correspondingly recorded. To correct the perspective effect of a traffic camera, a projective transformation [23] is used to map every point in the footage to its real-world coordinates on the ground plane. For speed estimation, Equation (1) is used:
    v = s t = x j x i 2 y j y i 2 t j t i
    where v is the speed, s is the distance that the vehicle traveled between the upper green line and the lower green line area, ( x i , y i ) and ( x j , y j ) are the centroid coordinates of vehicles on the ground plane, and t i and t j are the traveling time between entering the ith frame and leaving the jth frame.
    To detect anomalous speed above or below the speed limit, we define an uncertainty margin for the estimated speed. The uncertainty of the estimated speed is calculated based on the theory of variance propagation, using the uncertainty of traveled distance s and travel time t. Assuming that distance and time are mutually independent, we have:
    σ v 2 = ( 1 t σ s ) 2 + ( s t 2 σ t ) 2
    where σ s and σ t are the standard deviation of traveled distance and travel time, respectively, which are obtained from the position of the detected vehicle in multiple consecutive frames. Specifically, the standard deviation of distance is computed by measuring the distance traveled between two consecutive frames across n frames. For the standard deviation of travel time, a constant value corresponding to 1 2 a time interval between consecutive frames is assumed.
  • Solid-line crossing: Recognized by establishing whether the trajectory of a detected vehicle intersects with a buffer created around the solid line (two white lanes in Figure 5). If the centroid of the detected vehicle is within the created buffer, it is determined as crossing the solid line.
  • Entering traffic-restricted areas: This behavior is identified by the overlapping area between the traffic-restricted area shown as the hatched red polygon in Figure 5, and a circular buffer with a predefined radius created around the vehicle centroid. If the overlapping area is larger than a specific percentage of the circular buffer area, i.e., approximately at least half of the car is within the traffic-restricted area, the vehicle is determined to have entered the traffic-restricted area.

4. Experiments

4.1. Experiment Setup

We used the following thresholds for behavior classification:
  • For speeding, we considered an uncertainty margin v ± σ v that corresponds to a confidence interval of 68%.
  • For entering traffic-restricted areas, if the overlap area was larger than 50% of the circular buffer area, the vehicle was determined to have entered the traffic-restricted area.
To evaluate the performance of our integrated system for detecting solid-line crossing and entering traffic-restricted areas, recall, precision, and false positives per second were utilized as a measure of detection accuracy. These three coefficients are defined as:
R e c a l l = N TP N TP + N FN
P r e c i s i o n = N TP N TP + N FP
where N TP is the number of True-Positives (TP), which is the number of anomalous behaviors that are correctly detected; N FN is the number of False-Negatives (FN), which is the number anomalous behaviors that could not be detected by the system; and N FP is the number of False-Positives (FP), which is the number of anomalous behaviors that do not actually happen but are wrongly detected.
In our system, we used two sets of traffic footage:
-
Dataset 1: Our first dataset consists of snapshots of an online traffic camera on the intersection Racecourse Rd. and Boundary Rd. (RB) in Melbourne, published by Vicroads. Since the snapshot used in this study is refreshed every 120 s, our system could only detect certain anomalous behaviors, for example, entering traffic-restricted areas. Hence, this dataset was used only for the detection of vehicles driving on the bicycle lane.
-
Dataset 2: Considering the low sampling rate of Dataset 1, we used recorded traffic footage as Dataset 2 that was sampled more frequently from two highways: Panónska cesta (PA1 & PA2, https://www.youtube.com/watch?v=JmFjluIQGJw), M7 Clem Jones Tunnel (M7), and the intersection of Huangshan Rd and Tianzhi Rd in Heifei, China (CN, http://www.openits.cn/openData2/602.jhtml). This dataset contained three videos with lengths of 2, 4, and 4 min, respectively, and a total of 3112 frames. Given the higher resolution, we defined anomalous driving behavior as solid-line crossing, entering traffic-restricted areas, and speeding. For the first two categories, we manually annotated the images to establish ground truth for the evaluation of the detected anomalous driving behaviors.

4.2. Results

Several experiments were carried out to evaluate the performance of the proposed system in identifying anomalous driving behaviors. The following sections describe the datasets used in the experiments and the evaluation results for the three anomalous driving behaviors.

4.2.1. Solid-Line Crossing and Entering Traffic-Restricted Areas

Table 1 shows the detection accuracy for solid-line crossing and entering restricted zones in Dataset 2. The relatively low recall for “entering-traffic-restricted-areas detection” may be due to the low resolution of online traffic cameras. An instance of anomalous driving behavior is shown in Figure 6, where the anomalous behavior (red rectangle; “CL”, line-crossing behavior) is illustrated.

4.2.2. Speeding behavior

Figure 7 shows the distribution of the estimated speed for the tracked vehicles, which approximately follows a normal distribution. Therefore, a confidence level can be taken into account dependent on random error estimation through the calculated speed-value uncertainties, which is based on the method of variance propagation that considers the effect of variables’ uncertainties on the uncertainty of a function based on them. Note that variance propagation can only evaluate random errors associated with the speed estimation. Moreover, because the ground truth of actual speeds is hard to manually obtain, the speed limit of the road was used as the threshold to classify speeding behavior. In our integrated system, anomalous speed, both too high and too low, was identified by comparing the speed limit of the road with the estimated speed within a high confidence interval, e.g., 68% corresponding to 1 σ v .

5. Discussion

5.1. Combination of Hungarian Algorithm and Kalman Filter

When a vehicle is undetected in successive frames, the Hungarian algorithm assigns the center of other detected vehicles into the trajectory of an undetected vehicle, which causes the wrong trajectory shown in the white line in Figure 8. Incorrect assignment using only the Hungarian algorithm has a large influence on behavior detection and causes many false positives in results, as shown in Table 2. The table concerns two types of footage from the Panónska cesta highway, where the on-site speed limit is 60 km/h. In this situation, a Kalman filter corrects the misassigned center by using a constant-velocity-motion model to predict the supposed center of the undetected vehicle and use it to replace the misassigned center, thus making the trajectory closer to the real situation, as shown by the colored lines in Figure 8.

5.2. Integration and Visualization

The main feature of the system is its ability to integrate online data collection, vehicle detection, vehicle tracking, and behavior classification so that users (urban authorities or road users) can easily obtain the pattern as long as the system has access to a set of traffic footage. The results from the anomalous-driving-behavior detection component are then paired with locations of the footage. Information of anomalous driving behavior at a certain location and time periods can then be analyzed to generate the respective patterns. For example, for our first dataset (VicRoads), the bicycle lane was set as the traffic-restricted area, and when any other objects, such as vehicles and pedestrians, entered this area, it was recorded as anomalous behavior. A bicycle lane with a smaller number of such behaviors can be recommended as a ‘cyclist-friendly’ route to individuals. Figure 9 shows an example of a hotspot map that can be created based on the observed behaviors.

5.3. High Adaptability

This system can be applied to any multiobject-tracking scenarios with only centroids provided, and with a Mask R-CNN model covering wide range of classes of objects. Compared to single-object tracking systems, this system can deal with complex situations with various objects mixing, and remove interference from unnecessary objects. Moreover, the system can be adapted to other functions, for instance, the automatic identification of solid lines and traffic-restricted areas, thus saving the trouble of manually re-setting the geometrical parameters every time for different types of footage.
The detection component in our research runs at approximately 6 s per frame on a PC with an Intel (R) Core (TM) i7-3632QM processor @ 2.20 GHz and 8.0 GB of RAM. For the tracking component, average computation time is approximately 4 s per frame. These computation times can be significantly reduced by running the algorithms on a GPU, thereby enabling the system to perform in near real time and provide data for online applications.

5.4. Limitations

Despite our system providing high accuracy and high adaptability, it has several limitations that are summarized as follows:
  • In scenarios with high traffic volume where the movement of vehicles is not continuous, the Kalman filter may not be able to correctly track the vehicles due to its simple motion model.
  • The location and angle of the camera might cause significant distortion and occlusion in the images and hence affect detection and tracking performance. Theoretically, a bird’s-eye view is the most appropriate angle for the camera as it minimizes occlusion. Figure 10 shows an example of a low camera angle where the proposed system cannot perform well due to occlusion.
  • In our system, driving behaviors are classified based on simple rules and thresholds, and accuracy may be affected by the threshold setting, which is experimental and subjective. The integration of clustering and classification methods can be used to automatically classify different driving behaviors, thus achieving higher accuracy and efficiency. Such integration has already been proposed to solve the problem of personalized driver-workload inference in Reference [24] and personalized driving behavior prediction in Reference [25].
  • System accuracy heavily relies on the accuracy of Mask R-CNN detection. In our current implementation, we used the pretrained model of MS COCO [22]. Fine tuning of this pretrained network using local traffic footage can improve vehicle-detection accuracy. Further improvement can be achieved by incremental learning of the detection model as the system operates and more data become available. Data collected over a long period of time can also be used to detect changes to road rules. For example, a change of speed limit can be inferred from the statistical distribution of the measured speeds for a large number of vehicles over a long period of time.

6. Conclusions

In this paper, an integrated system was developed to detect anomalous driving behaviors and visualize the spatial patterns of the distribution of these behaviors using hotspot maps. Overall, the recall and precision rate of the experiment results for solid-lane crossing and entering traffic-restricted areas were around 80%. Regarding speed detection, variance propagation was used to improve system fault tolerance due to the lack of a systematic method to obtain the ground truth of vehicle speeds. Hotspot maps, which were developed as an overview of the number of detected anomalous behaviors during a certain period, can be used as a tool to detect the spatial patterns of such behaviors. In the future, the accuracy of anomalous behavior detections would be improved though methods including the specific training of the Mask-RCNN model, optimization of the default setting matrix of the Kalman filter, and using other cues of each vehicle as preconditions of the Hungarian algorithm (for instance, an assigned vehicle centroid should have same color or same type of vehicle centroids in tracks). Automatic detection of solid lines and traffic-restricted areas can also be achieved, thus saving the trouble of manually re-setting the geometrical parameters every time for different types of footage. Moreover, user interfaces such as hotspot maps would be refined to make it more user-friendly and applicable in a variety of cases.

Author Contributions

Conceptualization, E.N., K.K., X.Z., F.W. and W.C.; investigation, X.Z., F.W. and W.C.; software, F.W., W.C. and X.Z.; writing—original-draft preparation, X.Z., F.W. and W.C.; writing—review and editing, E.N. and K.K.; supervision, E.N. and K.K.

Funding

This research was funded by the Australian Research Council grant DP170100109.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lakhina, A.; Crovella, M.; Diot, C. Diagnosing network-wide traffic anomalies. ACM SIGCOMM Comput. Commun. Rev. 2004, 34, 219–230. [Google Scholar] [CrossRef]
  2. Celik, T.; Kusetogullari, H. Solar-powered automated road surveillance system for speed violation detection. IEEE Trans. Ind. Electron. 2010, 57, 3216–3227. [Google Scholar] [CrossRef]
  3. Wang, Y.K.; Fan, C.T.; Chen, J.F. Traffic camera anomaly detection. In Proceedings of the 2014 22nd International Conference on Pattern Recognition (ICPR), Stockholm, Sweden, 24–28 August 2014; pp. 4642–4647. [Google Scholar]
  4. Figueiredo, L.; Jesus, I.; Machado, J.T.; Ferreira, J.R.; De Carvalho, J.M. Towards the development of intelligent transportation systems. In Proceedings of the 2001 IEEE Intelligent Transportation Systems, Proceedings (Cat. No.01TH8585), Oakland, CA, USA, 25–29 August 2001; pp. 1206–1211. [Google Scholar]
  5. Sun, Z.; Bebis, G.; Miller, R. On-road vehicle detection: A review. IEEE Trans. Pattern Anal. Mach. Intell. 2006, 28, 694–711. [Google Scholar] [PubMed]
  6. Yang, Z.; Pun-Cheng, L.S. Vehicle Detection in Intelligent Transportation Systems and its Applications under Varying Environments: A Review. Image Vis. Comput. 2017, 69, 143–154. [Google Scholar] [CrossRef]
  7. Dickmanns, E.D. The development of machine vision for road vehicles in the last decade. In Proceedings of the 2002 Intelligent Vehicle Symposium, Versailles, France, 17–21 June 2002; Volume 1, pp. 268–281. [Google Scholar]
  8. Sun, Z.; Bebis, G.; Miller, R. Monocular precrash vehicle detection: features and classifiers. IEEE Trans. Image Process. 2006, 15, 2019–2034. [Google Scholar] [PubMed]
  9. Sivaraman, S.; Trivedi, M.M. Looking at vehicles on the road: A survey of vision-based vehicle detection, tracking, and behavior analysis. IEEE Trans. Intell. Transp. Syst. 2013, 14, 1773–1795. [Google Scholar] [CrossRef]
  10. Song, H.S.; Lu, S.N.; Ma, X.; Yang, Y.; Liu, X.Q.; Zhang, P. Vehicle behavior analysis using target motion trajectories. IEEE Trans. Veh. Technol. 2014, 63, 3580–3591. [Google Scholar] [CrossRef]
  11. He, K.; Gkioxari, G.; Dollár, P.; Girshick, R. Mask r-cnn. In Proceedings of the 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 22–29 October 2017; pp. 2980–2988. [Google Scholar]
  12. Zhang, W.; Fang, X.; Yang, X.; Wu, Q.J. Spatiotemporal Gaussian mixture model to detect moving objects in dynamic scenes. J. Electron. Imaging 2007, 16, 023013. [Google Scholar] [CrossRef]
  13. Yang, Y.; Gao, X.; Yang, G. Study the method of vehicle license locating based on color segmentation. Procedia Eng. 2011, 15, 1324–1329. [Google Scholar] [CrossRef]
  14. Wang, G.; Xiao, D.; Gu, J. Review on vehicle detection based on video for traffic surveillance. In Proceedings of the IEEE International Conference on Automation and Logistics, Qingdao, China, 1–3 September 2008; pp. 2961–2966. [Google Scholar]
  15. Arróspide, J.; Salgado, L.; Camplani, M. Image-based on-road vehicle detection using cost-effective histograms of oriented gradients. J. Vis. Commun. Image Represent. 2013, 24, 1182–1190. [Google Scholar] [CrossRef]
  16. Ciresan, D.C.; Meier, U.; Masci, J.; Maria Gambardella, L.; Schmidhuber, J. Flexible, high performance convolutional neural networks for image classification. In Proceedings of the IJCAI Proceedings-International Joint Conference on Artificial Intelligence, Barcelona, Spain, 16–22 July 2011; Volume 22, pp. 1237–1242. [Google Scholar]
  17. Fan, Q.; Brown, L.; Smith, J. A closer look at Faster R-CNN for vehicle detection. In Proceedings of the 2016 Intelligent Vehicles Symposium (IV), Gothenburg, Sweden, 19–22 June 2016; pp. 124–129. [Google Scholar]
  18. Ren, S.; He, K.; Girshick, R.; Sun, J. Faster r-cnn: Towards real-time object detection with region proposal networks. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 7–12 December 2015; pp. 91–99. [Google Scholar]
  19. Yokoyama, M.; Poggio, T. A contour-based moving object detection and tracking. In Proceedings of the 2nd Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance, Beijing, China, 15–16 October 2005; pp. 271–276. [Google Scholar]
  20. Mithun, N.C.; Howlader, T.; Rahman, S.M. Video-based tracking of vehicles using multiple time-spatial images. Expert Syst. Appl. 2016, 62, 17–31. [Google Scholar] [CrossRef]
  21. Kuhn, H.W. The Hungarian method for the assignment problem. Naval Res. Logist. Q. 1955, 2, 83–97. [Google Scholar] [CrossRef]
  22. Lin, T.Y.; Maire, M.; Belongie, S.; Hays, J.; Perona, P.; Ramanan, D.; Dollár, P.; Zitnick, C.L. Microsoft coco: Common objects in context. In European Conference on Computer Vision; Springer: Cham, Switzerland, 2014; pp. 740–755. [Google Scholar]
  23. Coifman, B.; Beymer, D.; McLauchlan, P.; Malik, J. A real-time computer vision system for vehicle tracking and traffic surveillance. Transp. Res. Part C Emerg. Technol. 1998, 6, 271–288. [Google Scholar] [CrossRef]
  24. Yi, D.; Su, J.; Liu, C.; Chen, W.H. Personalized driver workload inference by learning from vehicle related measurements. IEEE Trans. Syst. Man Cybern. Syst. 2017, 49, 159–168. [Google Scholar] [CrossRef]
  25. Yi, D.; Su, J.; Liu, C.; Chen, W.H. Trajectory clustering aided personalized driver intention prediction for intelligent vehicles. IEEE Trans. Ind. Inform. 2018. [Google Scholar] [CrossRef]
Figure 1. Classification of typical anomalous driving behaviors.
Figure 1. Classification of typical anomalous driving behaviors.
Infrastructures 04 00022 g001
Figure 2. Mask Region-Convolutional Neural Network (R-CNN) framework.
Figure 2. Mask Region-Convolutional Neural Network (R-CNN) framework.
Infrastructures 04 00022 g002
Figure 3. Vehicle detection using Mask R-CNN.
Figure 3. Vehicle detection using Mask R-CNN.
Infrastructures 04 00022 g003
Figure 4. Tracking process.
Figure 4. Tracking process.
Infrastructures 04 00022 g004
Figure 5. Manually specified regions used for behavior classification.
Figure 5. Manually specified regions used for behavior classification.
Infrastructures 04 00022 g005
Figure 6. Example of detection result (solid-line-crossing behavior).
Figure 6. Example of detection result (solid-line-crossing behavior).
Infrastructures 04 00022 g006
Figure 7. Distribution of speed estimations for M7 in Dataset 2.
Figure 7. Distribution of speed estimations for M7 in Dataset 2.
Infrastructures 04 00022 g007
Figure 8. Tracking errors caused by the Hungarian algorithm (white lines) can be corrected by a Kalman filter (colored lines).
Figure 8. Tracking errors caused by the Hungarian algorithm (white lines) can be corrected by a Kalman filter (colored lines).
Infrastructures 04 00022 g008
Figure 9. Example of hotspot map showing the number of daily anomalous entering on weekdays and weekends.
Figure 9. Example of hotspot map showing the number of daily anomalous entering on weekdays and weekends.
Infrastructures 04 00022 g009
Figure 10. Footage with low recording angle.
Figure 10. Footage with low recording angle.
Infrastructures 04 00022 g010
Table 1. Detection accuracy of anomalous behaviors.
Table 1. Detection accuracy of anomalous behaviors.
Behavior ClassRecallPrecision
Solid-line crossing detection0.8890.865
Entering-restricted-areas detection0.7300.964
Table 2. Detecting speeding behavior with and without Kalman filter.
Table 2. Detecting speeding behavior with and without Kalman filter.
IndicatorsDatasetWith Kalman FilterWithout Kalman Filter
Mean Speed
(km/h)
Dataset 2-PA156.66161.98
Dataset 2-PA262.4657.16
Speed limit within 68%
confidence interval (km/h)
Dataset 2-PA168.3985.07
Dataset 2-PA264.2463.23
Number of
speeding behaviors
Dataset 2-PA138
Dataset 2-PA21025

Share and Cite

MDPI and ACS Style

Zheng, X.; Wu, F.; Chen, W.; Naghizade, E.; Khoshelham, K. Show Me a Safer Way: Detecting Anomalous Driving Behavior Using Online Traffic Footage. Infrastructures 2019, 4, 22. https://doi.org/10.3390/infrastructures4020022

AMA Style

Zheng X, Wu F, Chen W, Naghizade E, Khoshelham K. Show Me a Safer Way: Detecting Anomalous Driving Behavior Using Online Traffic Footage. Infrastructures. 2019; 4(2):22. https://doi.org/10.3390/infrastructures4020022

Chicago/Turabian Style

Zheng, Xiao, Fumi Wu, Weizhang Chen, Elham Naghizade, and Kourosh Khoshelham. 2019. "Show Me a Safer Way: Detecting Anomalous Driving Behavior Using Online Traffic Footage" Infrastructures 4, no. 2: 22. https://doi.org/10.3390/infrastructures4020022

APA Style

Zheng, X., Wu, F., Chen, W., Naghizade, E., & Khoshelham, K. (2019). Show Me a Safer Way: Detecting Anomalous Driving Behavior Using Online Traffic Footage. Infrastructures, 4(2), 22. https://doi.org/10.3390/infrastructures4020022

Article Metrics

Back to TopTop