Skip to main content

Suspicious Human Activity Detection in Classroom Examination

  • Conference paper
  • First Online:
Book cover Computational Intelligence, Cyber Security and Computational Models

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 412))

Abstract

The proposed work aims in developing a system that analyze and detect the suspicious activity that are often occurring in a classroom environment. Video Analytics provides an optimal solution for this as it helps in pointing out an event and retrieves the relevant information from the video recorded. The system framework consists of three parts to monitor the student activity during examination. Firstly, the face region of the students is detected and monitored using Haar feature Extraction. Secondly, the hand contact detection is analyzed when two students exchange papers or any other foreign objects between them by grid formation. Thirdly, the hand signaling of the student using convex hull is recognized and the alert is given to the invigilator. The system is built using C/C++ and OpenCV library that shows the better performance in the real-time video frames.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gowsikhaa, D., Manjunath, A.S.: Suspicious human activity detection from surveillance videos. Int. J. Internet Distrib. Comput. Syst. 2(2), (2012)

    Google Scholar 

  2. Toygar, O., Acan, A.: Face recognition using pca, lda and ica approaches on colored images. J. Electr. Electron. Eng. 3(1) (2003)

    Google Scholar 

  3. Viola, P., Jones, M.J.: Robust real-time face detection. Int. J. Comput. Vision 57(2), 137–154 (2004)

    Article  Google Scholar 

  4. Chellappa, R., Vaswani, : Principal components space analysis for image and video classification. IEEE Trans. Image Processing 15(7), 1816–1830 (2006)

    Article  Google Scholar 

  5. Jafri, R., Arabnia, H.R.: A survey of face recognition techniques. J. Inf. Process. Syst. 5(2) (2009)

    Google Scholar 

  6. AL-Mohair, H.K., Mohamad-Saleh, J., Suandi, S.A.: A human skin color detection: a review on neural network perspective. Int. J. Innovative Comput. Inf. Control 8(12) (2012)

    Google Scholar 

  7. Nayana, P.B., Kubakaddi, S.: Implementation of hand gesture recognition technique for HCI using open CV. Int. J. Recent Dev. Eng. Technol. 2(5) (2014), ISSN 2347–6435

    Google Scholar 

  8. Fan, X.A., Lee, T.H., Xiang, C.: Face recognition using recursive fisher linear discriminent. IEEE Trans. Image processing 15(8), 2097–2105 (2006)

    Article  Google Scholar 

  9. Ojala, T., Pietikainen, M., Harwood, D.: A comparative study of texture measures with classification based on Feature distributions. Pattern Recogn. 29, 51–59 (1996)

    Article  Google Scholar 

  10. Rodriguez, Y.: Face detection and verification using local binary patterns. Ph.D. Thesis, École Polytechnique Fédérale de Lausanne, (2006)

    Google Scholar 

  11. Schneiderman, H., Kanade, T.: A statistical method for 3D object detection applied to faces and cars. In: IEEE Conference on Computer Vision and Pattern Recognition 2000 Proceedings, vol. 1. Digital Object Identifier 10.1109/CVPR.2000.855895

  12. Yan, Z., Yang, F., Wang, J., Shi, Y., Li, C., Sun, M., Face orientation detection in video stream based on harr-like feature and LQV classifier for civil video surveillance. International Communications Satellite Systems Conferences (2013)

    Google Scholar 

  13. Borges, P.V.K., Conci, N., Cavallaro, A., Video-based human behavior understanding: a survey. IEEE Trans. Circ. Syst. Video Technol. 23(11) (2013)

    Google Scholar 

  14. Hadid, A., Heikkil¨a, J.Y., Silven, O., Pietikinen, M.: Face and eye detection for person authentication in mobile phones. In: Machine Vision Group IEEE Transactions, 244–1354-0/07

    Google Scholar 

  15. Chen,T.-Y., Chen, C.-H., Wang, D.-J., Kuo, Y.-L.: A people counting system based on face-detection using skin color detection technique. In: Fourth International Conference on Genetic and Evolutionary Computing (2010)

    Google Scholar 

  16. Ko, T.: A survey on behaviour analysis in video surveillance applications. In: Applied Imagery Pattern Recognition Workshop ‘08. 37th IEEE, pp. 1–8, (2008)

    Google Scholar 

  17. Goo, G., Lee, K., Ka, H., Kim, B.S., Kim, W.Y., Yoon, J.Y., Kim, J.J.: Analysis of crowded scenes in surveillance videos. Can. J. Image Process. Comput. Vision 1(1): 52–75, (2010)

    Google Scholar 

  18. Maurin, B., Masoud, O., apanikolopoulos, N.: Camera surveillance of crowded traffic scenes. IEEE Comput. Soc. Press 22(4), 16–44 (2010)

    Google Scholar 

  19. Yang, M.-H., Kriegman, D.J., Ahuja, N.: Detecting faces in images: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 24, 34–58 (2002)

    Article  Google Scholar 

  20. Tang, X., Ou, Z., Su, T., Zhao, P.: Cascade adaboost classifiers with stage features optimization for cellular phone embedded face detection system. In: ICNC 2005, LNCS 3612, pp. 688–697, (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Senthilkumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Senthilkumar, T., Narmatha, G. (2016). Suspicious Human Activity Detection in Classroom Examination. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0251-9_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0250-2

  • Online ISBN: 978-981-10-0251-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics