Anomaly detection using edge computing in video surveillance system: review - PubMed Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2022;11(2):85-110.
doi: 10.1007/s13735-022-00227-8. Epub 2022 Mar 29.

Anomaly detection using edge computing in video surveillance system: review

Affiliations
Review

Anomaly detection using edge computing in video surveillance system: review

Devashree R Patrikar et al. Int J Multimed Inf Retr. 2022.

Abstract

The current concept of smart cities influences urban planners and researchers to provide modern, secured and sustainable infrastructure and gives a decent quality of life to its residents. To fulfill this need, video surveillance cameras have been deployed to enhance the safety and well-being of the citizens. Despite technical developments in modern science, abnormal event detection in surveillance video systems is challenging and requires exhaustive human efforts. In this paper, we focus on evolution of anomaly detection followed by survey of various methodologies developed to detect anomalies in intelligent video surveillance. Further, we revisit the surveys on anomaly detection in the last decade. We then present a systematic categorization of methodologies for anomaly detection. As the notion of anomaly depends on context, we identify different objects-of-interest and publicly available datasets in anomaly detection. Since anomaly detection is a time-critical application of computer vision, we explore the anomaly detection using edge devices and approaches explicitly designed for them. The confluence of edge computing and anomaly detection for real-time and intelligent surveillance applications is also explored. Further, we discuss the challenges and opportunities involved in anomaly detection using the edge devices.

Keywords: Anomaly detection; Edge computing; Machine learning; Video surveillance.

PubMed Disclaimer

Conflict of interest statement

Conflicts of interestBoth the authors have checked the manuscript and have agreed to the submission in International Journal of Multimedia Information Retrieval. There is no conflict of interest between the authors.

Figures

Fig. 1
Fig. 1
Anomaly detection in video surveillance scenes. a A truck moving on the footpath (UCSD Dataset); b Pedestrian walking on the lawn (UCSD Dataset); c A person throwing an object (Avenue); d a person carrying a suspicious bag (Avenue); e Incorrect parking of vehicle (MDVD); f people fighting (MDVD); g a person catching a bag (ShanghaiTech); h vehicles moving on the footpath (ShanghaiTech)
Fig. 2
Fig. 2
General block diagram of anomaly detection
Fig. 3
Fig. 3
Timeline for evolution of anomaly detection techniques
Fig. 4
Fig. 4
Correlation of surveillance, surveillance targets, and associated anomalies
Fig. 5
Fig. 5
Anomaly classification
Fig. 6
Fig. 6
Architectural overview of edge computing

Similar articles

Cited by

References

    1. Ahmed SA, Dogra DP, Kar S, Roy PP. Trajectory-based surveillance analysis: a survey. IEEE Trans Circuits Syst Video Technol. 2018;29(7):1985–1997. doi: 10.1109/TCSVT.2018.2857489. - DOI
    1. Ajay B, Rao M (2021) Binary neural network based real time emotion detection on an edge computing device to detect passenger anomaly, In: 2021 34th International conference on VLSI design and 2021 20th international conference on embedded systems (VLSID) pp 175–180, IEEE
    1. Angelini F, Yan J, Naqvi SM (2019) Privacy-preserving online human behaviour anomaly detection based on body movements and objects positions. In: ICASSP 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP) pp 8444–8448, IEEE
    1. Asad M, Yang J, He J, Shamsolmoali P, He X. Multi-frame feature-fusion-based model for violence detection. Visual Comput. 2021;37(6):1415–1431. doi: 10.1007/s00371-020-01878-6. - DOI
    1. Bansod SD, Nandedkar AV. Crowd anomaly detection and localization using histogram of magnitude and momentum. Vis Comput. 2020;36(3):609–620. doi: 10.1007/s00371-019-01647-0. - DOI

LinkOut - more resources