Adaptive Pixel Deviation Absorption Technique for Efficient Video Surveillance using Deep Convolutional Neural Networks
Received: 13 December 2024 | Revised: 9 January 2025 | Accepted: 12 January 2025 | Online: 30 January 2025
Corresponding author: M. Baskar
Abstract
Monitoring human activity in industries is a great challenge and numerous methods use various features, such as sketch, position, color, and shape features. However, these methods do not achieve the expected accuracy in classifying the activity of people in the environment. This study presents an Adaptive Pixel Deviation Approximation with Deep Convolutional Neural Networks (APDA-DCNN) model to increase classification accuracy. The method starts with local feature-approximation-based normalization of video frames. Then, global value segmentation is used to group the features of the frame. From the image segmented, the human features along with texture and region pixel deviation features are extracted. The APDA-DCNN model trains the CNN model to convolve the texture features into one-dimensional features by convolving in two layers. The output layer neurons estimate Texture Similarity (TS), Sketch Level Similarity (SLS,) and Pixel Deviation Similarity (PDS) against various classes. Using the values of TS and PDS, the model estimates the Activity Weight (AW) against various classes to select the most dominant. The APDA-DCNN model increases the accuracy of activity classification to achieve higher video surveillance performance.
Keywords:
video surveillance, activity classification, APDA-DCNN, TS, PDS, AWDownloads
References
W. Heng, T. Jiang, and W. Gao, "How to Assess the Quality of Compressed Surveillance Videos Using Face Recognition," IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 8, pp. 2229–2243, Aug. 2019.
K. Yang, D. Liu, Z. Chen, F. Wu, and W. Li, "Spatiotemporal Generative Adversarial Network-Based Dynamic Texture Synthesis for Surveillance Video Coding," IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 1, pp. 359–373, Jan. 2022.
A. Shifa et al., "MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos," IEEE Access, vol. 8, pp. 177131–177155, 2020.
L. Zhao, S. Wang, S. Wang, Y. Ye, S. Ma, and W. Gao, "Enhanced Surveillance Video Compression With Dual Reference Frames Generation," IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 3, pp. 1592–1606, Mar. 2022.
D. Aklamati, B. Abdus-Shakur, and T. Kacem, "Security Analysis of AWS-based Video Surveillance Systems," in 2021 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, Turkey, Oct. 2021, pp. 1–6.
L. Wu, K. Huang, H. Shen, and L. Gao, "Foreground-Background Parallel Compression With Residual Encoding for Surveillance Video," IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 7, pp. 2711–2724, Jul. 2021.
T. Sultana and K. A. Wahid, "Choice of Application Layer Protocols for Next Generation Video Surveillance Using Internet of Video Things," IEEE Access, vol. 7, pp. 41607–41624, 2019.
M. R. Khosravi and S. Samadi, "Mobile multimedia computing in cyber-physical surveillance services through UAV-borne Video-SAR: A taxonomy of intelligent data processing for IoMT-enabled radar sensor networks," Tsinghua Science and Technology, vol. 27, no. 2, pp. 288–302, Apr. 2022.
Y. Yang, H. Kim, H. Choi, S. Chae, and I. J. Kim, "Scene Adaptive Online Surveillance Video Synopsis via Dynamic Tube Rearrangement Using Octree," IEEE Transactions on Image Processing, vol. 30, pp. 8318–8331, 2021.
S. A. Ahmed, D. P. Dogra, S. Kar, and P. P. Roy, "Trajectory-Based Surveillance Analysis: A Survey," IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 7, pp. 1985–1997, Jul. 2019.
N. Kanwal et al., "Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing," IEEE Access, vol. 8, pp. 153413–153424, 2020.
H. Sun, W. Shi, X. Liang, and Y. Yu, "VU: Edge Computing-Enabled Video Usefulness Detection and its Application in Large-Scale Video Surveillance Systems," IEEE Internet of Things Journal, vol. 7, no. 2, pp. 800–817, Feb. 2020.
Y. Fang, G. Ding, Y. Yuan, W. Lin, and H. Liu, "Robustness Analysis of Pedestrian Detectors for Surveillance," IEEE Access, vol. 6, pp. 28890–28902, 2018.
H. Kim and H.-J. Lee, "A low-power surveillance video coding system with early background subtraction and adaptive frame memory compression," IEEE Transactions on Consumer Electronics, vol. 63, no. 4, pp. 359–367, Nov. 2017.
L. Cheng, J. Wang, and Y. Li, "ViTrack: Efficient Tracking on the Edge for Commodity Video Surveillance Systems," IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 3, pp. 723–735, Mar. 2022.
J. Huang, A. Huang, and L. Wang, "Intelligent Video Surveillance of Tourist Attractions Based on Virtual Reality Technology," IEEE Access, vol. 8, pp. 159220–159233, 2020.
S. Ghatak, S. Rup, B. Majhi, and M. N. S. Swamy, "HSAJAYA: An Improved Optimization Scheme for Consumer Surveillance Video Synopsis Generation," IEEE Transactions on Consumer Electronics, vol. 66, no. 2, pp. 144–152, May 2020.
W. Liu, S. Liao, and W. Hu, "Perceiving Motion From Dynamic Memory for Vehicle Detection in Surveillance Videos," IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 12, pp. 3558–3567, Dec. 2019.
X. Tian, P. Zheng, and J. Huang, "Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 5381–5396, 2021.
H. Proenca, "The UU-Net: Reversible Face De-Identification for Visual Surveillance Video Footage," IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 2, pp. 496–509, Feb. 2022.
B. H. Chen, L. F. Shi, and X. Ke, "A Robust Moving Object Detection in Multi-Scenario Big Data for Video Surveillance," IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 4, pp. 982–995, Apr. 2019.
G. R. Panigrahi, P. K. Sethy, S. K. Behera, M. Gupta, F. A. Alenizi, and A. Nanthaamornphong, "Enhancing Security in Real-Time Video Surveillance: A Deep Learning-Based Remedial Approach for Adversarial Attack Mitigation," IEEE Access, vol. 12, pp. 88913–88926, 2024.
V. D. Huszár, V. K. Adhikarla, I. Négyesi, and C. Krasznay, "Toward Fast and Accurate Violence Detection for Automated Video Surveillance Applications," IEEE Access, vol. 11, pp. 18772–18793, 2023.
S. Priyadharshini and A. Mahapatra, "MOHASA: A Dynamic Video Synopsis Approach for Consumer-Based Spherical Surveillance Video," IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 290–298, Feb. 2024.
S. Ul Amin, M. Sibtain Abbas, B. Kim, Y. Jung, and S. Seo, "Enhanced Anomaly Detection in Pandemic Surveillance Videos: An Attention Approach With EfficientNet-B0 and CBAM Integration," IEEE Access, vol. 12, pp. 162697–162712, 2024.
W. Yuan, "Enhancing Video Surveillance and Behavior Recognition With Deep Learning While Ensuring Privacy Protection," IEEE Access, vol. 12, pp. 157466–157476, 2024.
A. D. Pazho et al., "Ancilia: Scalable Intelligent Video Surveillance for the Artificial Intelligence of Things," IEEE Internet of Things Journal, vol. 10, no. 17, pp. 14940–14951, Sep. 2023.
"DCSASS Dataset." Kaggle, [Online]. Available: https://www.kaggle.com/datasets/mateohervas/dcsass-dataset.
Downloads
How to Cite
License
Copyright (c) 2025 K. Lokesh, M. Baskar

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.