An Invariant Backward Feature Analysis of Model-Based Malicious Activity Monitoring for Efficient Video Surveillance Using Deep Learning

Authors

  • K. Lokesh Department of Computer Science and Engineering, School of Computing, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Tamil Nadu, India
  • M. Baskar Department of Computer Science and Engineering, School of Computing, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Tamil Nadu, India
Volume: 15 | Issue: 5 | Pages: 28386-28393 | October 2025 | https://doi.org/10.48084/etasr.11370

Abstract

The issue of malicious activity monitoring in video surveillance has been extensively studied, and several methods have been developed to address it. These approaches typically rely on attributes such as shapes, objects, textures, and sketches; however, their accuracy remains limited. To overcome these shortcomings, this paper presents an effective Convolutional Neural Network (CNN)-based malicious activity monitoring approach. The proposed technique detects harmful behavior by leveraging the invariant properties of drawings and their spatial positions across multiple preceding frames. To enhance input quality, Layer-Based Feature Normalization (LBFN) is applied to recorded video frames, removing noise and improving clarity. Feature segmentation is then performed using the Value-Oriented Segmentation (VOS) algorithm. The model maintains features extracted from the previous k frames and incorporates them to extract features from the current frame. Convolution and max-pooling layers are employed to convolve and normalize the extracted features. At the output layer, Sequential Position Support (SPS) and Sequential Sketch Support (SSS) are calculated using a variety of activity-related characteristics retained by the model and are iteratively evaluated across frame and feature sequences that the model has produced. Based on this process, the technique computes Malicious Activity Support (MAS) scores for different activity classes and assigns higher values to the most probable class. The proposed Invariant Backward Feature Analysis Model Convolutional Neural Network (IBFAM-CNN) achieves an accuracy of 97% in malicious activity monitoring and video surveillance.

Keywords:

video surveillance, industrial security, malicious activity monitoring, sequential feature, invariant feature, Sequential Position Support (SPS), Sequential Sketch Support (SSS), Malicious Activity Support (MAS), Invariant Backward Feature Analysis Model Convolutional Neural Network (IBFAM-CNN)

Downloads

Download data is not yet available.

References

W. Heng, T. Jiang, and W. Gao, “How to Assess the Quality of Compressed Surveillance Videos Using Face Recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 8, pp. 2229–2243, Aug. 2019.

K. Yang, D. Liu, Z. Chen, F. Wu, and W. Li, “Spatiotemporal Generative Adversarial Network-Based Dynamic Texture Synthesis for Surveillance Video Coding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 1, pp. 359–373, Jan. 2022.

A. Shifa et al., “MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos,” IEEE Access, vol. 8, pp. 177131–177155, 2020.

L. Zhao, S. Wang, S. Wang, Y. Ye, S. Ma, and W. Gao, “Enhanced Surveillance Video Compression With Dual Reference Frames Generation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 3, pp. 1592–1606, Mar. 2022.

D. Aklamati, B. Abdus-Shakur, and T. Kacem, “Security Analysis of AWS-based Video Surveillance Systems,” in 2021 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, Turkey, Oct. 2021, pp. 1–6.

L. Wu, K. Huang, H. Shen, and L. Gao, “Foreground-Background Parallel Compression With Residual Encoding for Surveillance Video,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 7, pp. 2711–2724, Jul. 2021.

T. Sultana and K. A. Wahid, “Choice of Application Layer Protocols for Next Generation Video Surveillance Using Internet of Video Things,” IEEE Access, vol. 7, pp. 41607–41624, 2019.

M. R. Khosravi and S. Samadi, “Mobile multimedia computing in cyber-physical surveillance services through UAV-borne Video-SAR: A taxonomy of intelligent data processing for IoMT-enabled radar sensor networks,” Tsinghua Science and Technology, vol. 27, no. 2, pp. 288–302, Apr. 2022.

Y. Yang, H. Kim, H. Choi, S. Chae, and I.-J. Kim, “Scene Adaptive Online Surveillance Video Synopsis via Dynamic Tube Rearrangement Using Octree,” IEEE Transactions on Image Processing, vol. 30, pp. 8318–8331, 2021.

S. A. Ahmed, D. P. Dogra, S. Kar, and P. P. Roy, “Trajectory-Based Surveillance Analysis: A Survey,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 7, pp. 1985–1997, Jul. 2019.

N. Kanwal et al., “Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing,” IEEE Access, vol. 8, pp. 153413–153424, 2020.

H. Sun, W. Shi, X. Liang, and Y. Yu, “VU: Edge Computing-Enabled Video Usefulness Detection and its Application in Large-Scale Video Surveillance Systems,” IEEE Internet of Things Journal, vol. 7, no. 2, pp. 800–817, Feb. 2020.

Y. Fang, G. Ding, Y. Yuan, W. Lin, and H. Liu, “Robustness Analysis of Pedestrian Detectors for Surveillance,” IEEE Access, vol. 6, pp. 28890–28902, 2018.

H. Kim and H.-J. Lee, “A low-power surveillance video coding system with early background subtraction and adaptive frame memory compression,” IEEE Transactions on Consumer Electronics, vol. 63, no. 4, pp. 359–367, Nov. 2017.

L. Cheng, J. Wang, and Y. Li, “ViTrack: Efficient Tracking on the Edge for Commodity Video Surveillance Systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 3, pp. 723–735, Mar. 2022.

J. Huang, A. Huang, and L. Wang, “Intelligent Video Surveillance of Tourist Attractions Based on Virtual Reality Technology,” IEEE Access, vol. 8, pp. 159220–159233, 2020.

S. Ghatak, S. Rup, B. Majhi, and M. N. S. Swamy, “HSAJAYA: An Improved Optimization Scheme for Consumer Surveillance Video Synopsis Generation,” IEEE Transactions on Consumer Electronics, vol. 66, no. 2, pp. 144–152, May 2020.

W. Liu, S. Liao, and W. Hu, “Perceiving Motion From Dynamic Memory for Vehicle Detection in Surveillance Videos,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 12, pp. 3558–3567, Dec. 2019.

X. Tian, P. Zheng, and J. Huang, “Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 5381–5396, 2021.

H. Proenca, “The UU-Net: Reversible Face De-Identification for Visual Surveillance Video Footage,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 2, pp. 496–509, Feb. 2022.

B.-H. Chen, L.-F. Shi, and X. Ke, “A Robust Moving Object Detection in Multi-Scenario Big Data for Video Surveillance,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 4, pp. 982–995, Apr. 2019.

K. Muhammad, T. Hussain, M. Tanveer, G. Sannino, and V. H. C. De Albuquerque, “Cost-Effective Video Summarization Using Deep CNN With Hierarchical Weighted Fusion for IoT Surveillance Networks,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4455–4463, May 2020.

L. Zhao, Z. He, W. Cao, and D. Zhao, “Real-Time Moving Object Segmentation and Classification From HEVC Compressed Surveillance Video,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, no. 6, pp. 1346–1357, Jun. 2018.

H. Hu et al., “Video Surveillance on Mobile Edge Networks—A Reinforcement-Learning-Based Approach,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 4746–4760, Jun. 2020.

E. Taghavi et al., “Geo-registration and Geo-location Using Two Airborne Video Sensors,” IEEE Transactions on Aerospace and Electronic Systems, vol. 56, no. 4, pp. 2910–2921, Aug. 2020.

H. Huang, A. V. Savkin, and W. Ni, “Online UAV Trajectory Planning for Covert Video Surveillance of Mobile Targets,” IEEE Transactions on Automation Science and Engineering, vol. 19, no. 2, pp. 735–746, Apr. 2022.

R. Radhika and A. Muthukumaravel, “Video Surveillance and Deep Learning Enhancing Security through Suspicious Activity Detection,” in 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), Hassan, India, Aug. 2024, pp. 1–6.

M. Pangavhane et al., “Real-Time Deep Learning-Driven Surveillance with Spatiotemporal Feature Extraction for Detection of Anomalous Human Behavior Across Dynamic Environments,” International Journal of Safety and Security Engineering, vol. 15, no. 1, pp. 105–111, Jan. 2025.

K. Lokesh and M. Baskar, “Sketch and Size Orient Malicious Activity Monitoring for Efficient Video Surveillance Using CNN,” International Journal of Advanced Computer Science and Applications, vol. 15, no. 8, 2024.

L. Shana and C. Seldev Christopher, “A deep learning behavior analysis model for efficient video surveillance using multi pose features,” Ain Shams Engineering Journal, vol. 16, no. 2, Feb. 2025, Art. no. 103245.

P. Nuthakki et al., “Deep Learning based Multilingual Speech Synthesis using Multi Feature Fusion Methods,” ACM Transactions on Asian and Low-Resource Language Information Processing, Sep. 2023, Art. no. 3618110.

W. Sultani, C. Chen, and M. Shah, “Real-World Anomaly Detection in Surveillance Videos,” in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, Jun. 2018, pp. 6479–6488.

Downloads

How to Cite

[1]
K. Lokesh and M. Baskar, “An Invariant Backward Feature Analysis of Model-Based Malicious Activity Monitoring for Efficient Video Surveillance Using Deep Learning”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 5, pp. 28386–28393, Oct. 2025.

Metrics

Abstract Views: 7
PDF Downloads: 2

Metrics Information