Empowering Security Surveillance with Machine Vision: A Survey of Anomaly Detection Technologies
DOI: 10.23977/jaip.2025.080320 | Downloads: 4 | Views: 92
Author(s)
Peng Yin 1
Affiliation(s)
1 School of Electronic and Information Engineering, University of Science and Technology Liaoning, Anshan, China
Corresponding Author
Peng YinABSTRACT
Addressing the pain points of low efficiency, high missed detection rate, and high false alarm rate in manual monitoring for security surveillance, this paper systematically surveys the application of machine vision in anomaly detection. It first sorts out the full-process technical architecture from object detection and tracking to behavior judgment, focusing on analyzing the detection logic of three typical abnormal behaviors: climbing, loitering, and boundary crossing. Secondly, it details the characteristics and application scenarios of two core datasets, UCF-Crime and XD-Violence. Furthermore, it analyzes the impact of complex environments such as insufficient illumination and person occlusion on detection accuracy and corresponding countermeasures. Finally, it discusses the collaborative optimization path between privacy protection and security efficiency, and looks forward to future development directions such as multimodal fusion and common sense reasoning, providing references for the research, development, and implementation of intelligent security systems.
KEYWORDS
Machine Vision; Security Surveillance; Anomaly Detection; Object Tracking; UCF-Crime Dataset; Privacy ProtectionCITE THIS PAPER
Peng Yin, Empowering Security Surveillance with Machine Vision: A Survey of Anomaly Detection Technologies. Journal of Artificial Intelligence Practice (2025) Vol. 8: 160-165. DOI: http://dx.doi.org/10.23977/jaip.2025.080320.
REFERENCES
[1] Mohindru, Vandana, and Shafali Singla. "A review of anomaly detection techniques using computer vision." The International Conference on Recent Innovations in Computing. Singapore: Springer Singapore, 2020.
[2] Madan, Neelu, et al. "Self-supervised masked convolutional transformer block for anomaly detection." IEEE Transactions on Pattern Analysis and Machine Intelligence 46.1 (2023): 525-542.
[3] Hasan, Mahmudul, et al. "Learning temporal regularity in video sequences." Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.
[4] Pillai, Gargi V., Ashish Verma, and Debashis Sen. "Transformer based self-context aware prediction for few-shot anomaly detection in videos." 2022 IEEE International Conference on Image Processing (ICIP). IEEE, 2022.
[5] Yu, Jiawei, et al. "Fastflow: Unsupervised anomaly detection and localization via 2d normalizing flows." arxiv preprint arxiv:2111.07677 (2021).
[6] Latapie, Hugo. "Common sense is all you need." arxiv preprint arxiv:2501.06642 (2025).
| Downloads: | 16401 |
|---|---|
| Visits: | 565677 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks

Download as PDF