Skip to main content
Top

2021 | OriginalPaper | Chapter

A Review of Anomaly Detection Techniques Using Computer Vision

Authors : Vandana Mohindru, Shafali Singla

Published in: Recent Innovations in Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Obtaining videos for surveillance purpose or to use them for future predictions is a challenging task as a video has a large number of image frames displayed in a sequence, and modeling every frame is not possible, so various methods are used for building an intelligent vision system, which is used for obtaining videos and also in video anomaly detection. This paper provides an overview of research directions for different types of anomalies and also tells about different techniques in machine learning for managing the problem of anomaly detection in videos and images using computer vision. Computer vision is used to make computers capable of extracting information from digital images or videos. It trains computers to interpret and understand the visual world. When machines detect errors, abnormal or unnatural behavior of datasets, it is called anomaly detection. In this paper, anomaly detection techniques and anomaly detection in datasets using computer vision are classified accordingly.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Russell, S., Dewey, D., Tegmark, M.: Research priorities for robust and beneficial artificial intelligence. Ai Magaz. 36(4), 105–114 (2015)CrossRef Russell, S., Dewey, D., Tegmark, M.: Research priorities for robust and beneficial artificial intelligence. Ai Magaz. 36(4), 105–114 (2015)CrossRef
2.
go back to reference Kwon, D., Kim, H., Kim, J., Suh, S.C., Kim, I., Kim, K.J.: A survey of deep learning-based network anomaly detection. Cluster Comput. 1–13 (2017) Kwon, D., Kim, H., Kim, J., Suh, S.C., Kim, I., Kim, K.J.: A survey of deep learning-based network anomaly detection. Cluster Comput. 1–13 (2017)
3.
go back to reference Haq, N.F., Onik, A.R., Hridoy, M.A.K., Rafni, M., Muhammad Shah, F., Farid, D.M.: Application of machine learning approaches in intrusion detection system: a survey. Int. J. Adv. Res. Artif. Int. (IJARAI) 4(3) (2015) Haq, N.F., Onik, A.R., Hridoy, M.A.K., Rafni, M., Muhammad Shah, F., Farid, D.M.: Application of machine learning approaches in intrusion detection system: a survey. Int. J. Adv. Res. Artif. Int. (IJARAI) 4(3) (2015)
4.
go back to reference Lopez-Rojas, E.A., Axelsson, S.: A review of computer simulation for fraud detection research in financial datasets. In: 2016 Future Technologies Conference (FTC), pp. 932–935. IEEE (2016) Lopez-Rojas, E.A., Axelsson, S.: A review of computer simulation for fraud detection research in financial datasets. In: 2016 Future Technologies Conference (FTC), pp. 932–935. IEEE (2016)
5.
go back to reference Capozzoli, A., Lauro, F., Khan, I.: Fault detection analysis using data mining techniques for a cluster of smart office buildings. Expert Syst. Appl. 42(9), 4324–4338 (2015)CrossRef Capozzoli, A., Lauro, F., Khan, I.: Fault detection analysis using data mining techniques for a cluster of smart office buildings. Expert Syst. Appl. 42(9), 4324–4338 (2015)CrossRef
6.
go back to reference Haghi, M., Thurow, K., Stoll, R.: Wearable devices in medical internet of things: scientific research and commercially available devices. Healthcare Inf. Res. 23(1), 4–15 (2017)CrossRef Haghi, M., Thurow, K., Stoll, R.: Wearable devices in medical internet of things: scientific research and commercially available devices. Healthcare Inf. Res. 23(1), 4–15 (2017)CrossRef
7.
go back to reference Seidl, R., Spies, T.A., Peterson, D.L., Stephens, S.L., Hicke, J.A.: Searching for resilience: addressing the impacts of changing disturbance regimes on forest ecosystem services. J. Appl. Ecol. 53(1), 120–129 (2016)CrossRef Seidl, R., Spies, T.A., Peterson, D.L., Stephens, S.L., Hicke, J.A.: Searching for resilience: addressing the impacts of changing disturbance regimes on forest ecosystem services. J. Appl. Ecol. 53(1), 120–129 (2016)CrossRef
8.
go back to reference Nguyen, T.H., Grishman, R.: Event detection and domain adaptation with convolutional neural networks. In: Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers), pp. 365–371 (2015) Nguyen, T.H., Grishman, R.: Event detection and domain adaptation with convolutional neural networks. In: Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers), pp. 365–371 (2015)
9.
go back to reference Ibrahim, S.W.: A comprehensive review on intelligent surveillance systems. Commun. Sci. Technol. 1(1) (2016) Ibrahim, S.W.: A comprehensive review on intelligent surveillance systems. Commun. Sci. Technol. 1(1) (2016)
10.
go back to reference Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Network Comput. Appl. 60, 19–31 (2016)CrossRef Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Network Comput. Appl. 60, 19–31 (2016)CrossRef
11.
go back to reference Song, H., Jiang, Z., Men, A., Yang, B.: A hybrid semi-supervised anomaly detection model for high-dimensional data. Comput. Int. Neurosci. 2017 (2017) Song, H., Jiang, Z., Men, A., Yang, B.: A hybrid semi-supervised anomaly detection model for high-dimensional data. Comput. Int. Neurosci. 2017 (2017)
12.
go back to reference Khan, J.A., Jain, N.: Improving intrusion detection system based on KNN and KNN-DS with detection of U2R, R2L attack for network probe attack detection. Int. J. Sci. Res. Sci. Eng. Technol. 2(5), 209–212 (2016) Khan, J.A., Jain, N.: Improving intrusion detection system based on KNN and KNN-DS with detection of U2R, R2L attack for network probe attack detection. Int. J. Sci. Res. Sci. Eng. Technol. 2(5), 209–212 (2016)
13.
go back to reference Kevric, J., Jukic, S., Subasi, A.: An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput. Appl. 28(1), 1051–1058 (2017)CrossRef Kevric, J., Jukic, S., Subasi, A.: An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput. Appl. 28(1), 1051–1058 (2017)CrossRef
14.
go back to reference Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121–134 (2016)CrossRef Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121–134 (2016)CrossRef
15.
go back to reference Liu, J., Chen, S., Zhou, Z., Wu, T.: An anomaly detection algorithm of cloud platform based on self-organizing maps. Math. Prob. Eng. 2016 (2016) Liu, J., Chen, S., Zhou, Z., Wu, T.: An anomaly detection algorithm of cloud platform based on self-organizing maps. Math. Prob. Eng. 2016 (2016)
16.
go back to reference Karami, A., Guerrero-Zapata, M.: A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks. Neurocomputing 149, 1253–1269 (2015)CrossRef Karami, A., Guerrero-Zapata, M.: A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks. Neurocomputing 149, 1253–1269 (2015)CrossRef
17.
go back to reference Nayak, J., Naik, B., Behera, H.S.: Fuzzy C-means (FCM) clustering algorithm: a decade review from 2000 to 2014. In: Computational Intelligence in Data Mining-Volume 2, pp. 133–149. Springer, New Delhi (2015) Nayak, J., Naik, B., Behera, H.S.: Fuzzy C-means (FCM) clustering algorithm: a decade review from 2000 to 2014. In: Computational Intelligence in Data Mining-Volume 2, pp. 133–149. Springer, New Delhi (2015)
18.
go back to reference Naik, N., Kominers, S.D., Raskar, R., Glaeser, E.L., Hidalgo, C.A.: Computer vision uncovers predictors of physical urban change. Proc. Natl. Acad. Sci. 114(29), 7571–7576 (2017)CrossRef Naik, N., Kominers, S.D., Raskar, R., Glaeser, E.L., Hidalgo, C.A.: Computer vision uncovers predictors of physical urban change. Proc. Natl. Acad. Sci. 114(29), 7571–7576 (2017)CrossRef
19.
go back to reference Liu, Y., Yu, H., Gong, C., Chen, Y.: A real time expert system for anomaly detection of aerators based on computer vision and surveillance cameras. J. Vis. Commun. Image Represent. 68, 102767 (2020)CrossRef Liu, Y., Yu, H., Gong, C., Chen, Y.: A real time expert system for anomaly detection of aerators based on computer vision and surveillance cameras. J. Vis. Commun. Image Represent. 68, 102767 (2020)CrossRef
20.
go back to reference Singh, P.K., Kar, A.K., Singh, Y., Kolekar, M.H., Tanwar, S.: Proceedings of ICRIC 2019, Recent Innovations in Computing, 2020. Lecture Notes in Electrical Engineering, Springer: Cham, Switzerland, vol. 597, pp. 3–920 Singh, P.K., Kar, A.K., Singh, Y., Kolekar, M.H., Tanwar, S.: Proceedings of ICRIC 2019, Recent Innovations in Computing, 2020. Lecture Notes in Electrical Engineering, Springer: Cham, Switzerland, vol. 597, pp. 3–920
21.
go back to reference Bao, Y., Tang, Z., Li, H., Zhang, Y.: Computer vision and deep learning–based data anomaly detection method for structural health monitoring. Struct. Health Monitoring 18(2), 401–421 (2019)CrossRef Bao, Y., Tang, Z., Li, H., Zhang, Y.: Computer vision and deep learning–based data anomaly detection method for structural health monitoring. Struct. Health Monitoring 18(2), 401–421 (2019)CrossRef
22.
go back to reference Singh, P.K., Bhargava, B.K., Paprzycki, M., Kaushal, N.C., Hong, W.C.: Handbook of wireless sensor networks: issues and challenges in current scenario’s, advances in intelligent systems and computing, Springer: Cham, Switzerland, vol. 1132, pp. 155–437 (2020) Singh, P.K., Bhargava, B.K., Paprzycki, M., Kaushal, N.C., Hong, W.C.: Handbook of wireless sensor networks: issues and challenges in current scenario’s, advances in intelligent systems and computing, Springer: Cham, Switzerland, vol. 1132, pp. 155–437 (2020)
23.
go back to reference Kumaran, S.K., Dogra, D.P. Roy, P.P.: Anomaly detection in road traffic using visual surveillance: a survey. 2019 arXiv preprint arXiv:1901.08292 Kumaran, S.K., Dogra, D.P. Roy, P.P.: Anomaly detection in road traffic using visual surveillance: a survey. 2019 arXiv preprint arXiv:​1901.​08292
Metadata
Title
A Review of Anomaly Detection Techniques Using Computer Vision
Authors
Vandana Mohindru
Shafali Singla
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-8297-4_53

Premium Partner