An Invariant Backward Feature Analysis of Model-Based Malicious Activity Monitoring for Efficient Video Surveillance Using Deep Learning
Corresponding author: M. Baskar
Abstract
The issue of malicious activity monitoring in video surveillance has been extensively studied, and several methods have been developed to address it. These approaches typically rely on attributes such as shapes, objects, textures, and sketches; however, their accuracy remains limited. To overcome these shortcomings, this paper presents an effective Convolutional Neural Network (CNN)-based malicious activity monitoring approach. The proposed technique detects harmful behavior by leveraging the invariant properties of drawings and their spatial positions across multiple preceding frames. To enhance input quality, Layer-Based Feature Normalization (LBFN) is applied to recorded video frames, removing noise and improving clarity. Feature segmentation is then performed using the Value-Oriented Segmentation (VOS) algorithm. The model maintains features extracted from the previous k frames and incorporates them to extract features from the current frame. Convolution and max-pooling layers are employed to convolve and normalize the extracted features. At the output layer, Sequential Position Support (SPS) and Sequential Sketch Support (SSS) are calculated using a variety of activity-related characteristics retained by the model and are iteratively evaluated across frame and feature sequences that the model has produced. Based on this process, the technique computes Malicious Activity Support (MAS) scores for different activity classes and assigns higher values to the most probable class. The proposed Invariant Backward Feature Analysis Model Convolutional Neural Network (IBFAM-CNN) achieves an accuracy of 97% in malicious activity monitoring and video surveillance.
Keywords:
video surveillance, industrial security, malicious activity monitoring, sequential feature, invariant feature, Sequential Position Support (SPS), Sequential Sketch Support (SSS), Malicious Activity Support (MAS), Invariant Backward Feature Analysis Model Convolutional Neural Network (IBFAM-CNN)Downloads
References
W. Heng, T. Jiang, and W. Gao, “How to Assess the Quality of Compressed Surveillance Videos Using Face Recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 8, pp. 2229–2243, Aug. 2019.
K. Yang, D. Liu, Z. Chen, F. Wu, and W. Li, “Spatiotemporal Generative Adversarial Network-Based Dynamic Texture Synthesis for Surveillance Video Coding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 1, pp. 359–373, Jan. 2022.
A. Shifa et al., “MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos,” IEEE Access, vol. 8, pp. 177131–177155, 2020.
L. Zhao, S. Wang, S. Wang, Y. Ye, S. Ma, and W. Gao, “Enhanced Surveillance Video Compression With Dual Reference Frames Generation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 3, pp. 1592–1606, Mar. 2022.
D. Aklamati, B. Abdus-Shakur, and T. Kacem, “Security Analysis of AWS-based Video Surveillance Systems,” in 2021 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, Turkey, Oct. 2021, pp. 1–6.
L. Wu, K. Huang, H. Shen, and L. Gao, “Foreground-Background Parallel Compression With Residual Encoding for Surveillance Video,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 7, pp. 2711–2724, Jul. 2021.
T. Sultana and K. A. Wahid, “Choice of Application Layer Protocols for Next Generation Video Surveillance Using Internet of Video Things,” IEEE Access, vol. 7, pp. 41607–41624, 2019.
M. R. Khosravi and S. Samadi, “Mobile multimedia computing in cyber-physical surveillance services through UAV-borne Video-SAR: A taxonomy of intelligent data processing for IoMT-enabled radar sensor networks,” Tsinghua Science and Technology, vol. 27, no. 2, pp. 288–302, Apr. 2022.
Y. Yang, H. Kim, H. Choi, S. Chae, and I.-J. Kim, “Scene Adaptive Online Surveillance Video Synopsis via Dynamic Tube Rearrangement Using Octree,” IEEE Transactions on Image Processing, vol. 30, pp. 8318–8331, 2021.
S. A. Ahmed, D. P. Dogra, S. Kar, and P. P. Roy, “Trajectory-Based Surveillance Analysis: A Survey,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 7, pp. 1985–1997, Jul. 2019.
N. Kanwal et al., “Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing,” IEEE Access, vol. 8, pp. 153413–153424, 2020.
H. Sun, W. Shi, X. Liang, and Y. Yu, “VU: Edge Computing-Enabled Video Usefulness Detection and its Application in Large-Scale Video Surveillance Systems,” IEEE Internet of Things Journal, vol. 7, no. 2, pp. 800–817, Feb. 2020.
Y. Fang, G. Ding, Y. Yuan, W. Lin, and H. Liu, “Robustness Analysis of Pedestrian Detectors for Surveillance,” IEEE Access, vol. 6, pp. 28890–28902, 2018.
H. Kim and H.-J. Lee, “A low-power surveillance video coding system with early background subtraction and adaptive frame memory compression,” IEEE Transactions on Consumer Electronics, vol. 63, no. 4, pp. 359–367, Nov. 2017.
L. Cheng, J. Wang, and Y. Li, “ViTrack: Efficient Tracking on the Edge for Commodity Video Surveillance Systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 3, pp. 723–735, Mar. 2022.
J. Huang, A. Huang, and L. Wang, “Intelligent Video Surveillance of Tourist Attractions Based on Virtual Reality Technology,” IEEE Access, vol. 8, pp. 159220–159233, 2020.
S. Ghatak, S. Rup, B. Majhi, and M. N. S. Swamy, “HSAJAYA: An Improved Optimization Scheme for Consumer Surveillance Video Synopsis Generation,” IEEE Transactions on Consumer Electronics, vol. 66, no. 2, pp. 144–152, May 2020.
W. Liu, S. Liao, and W. Hu, “Perceiving Motion From Dynamic Memory for Vehicle Detection in Surveillance Videos,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 12, pp. 3558–3567, Dec. 2019.
X. Tian, P. Zheng, and J. Huang, “Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 5381–5396, 2021.
H. Proenca, “The UU-Net: Reversible Face De-Identification for Visual Surveillance Video Footage,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 2, pp. 496–509, Feb. 2022.
B.-H. Chen, L.-F. Shi, and X. Ke, “A Robust Moving Object Detection in Multi-Scenario Big Data for Video Surveillance,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 4, pp. 982–995, Apr. 2019.
K. Muhammad, T. Hussain, M. Tanveer, G. Sannino, and V. H. C. De Albuquerque, “Cost-Effective Video Summarization Using Deep CNN With Hierarchical Weighted Fusion for IoT Surveillance Networks,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4455–4463, May 2020.
L. Zhao, Z. He, W. Cao, and D. Zhao, “Real-Time Moving Object Segmentation and Classification From HEVC Compressed Surveillance Video,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, no. 6, pp. 1346–1357, Jun. 2018.
H. Hu et al., “Video Surveillance on Mobile Edge Networks—A Reinforcement-Learning-Based Approach,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 4746–4760, Jun. 2020.
E. Taghavi et al., “Geo-registration and Geo-location Using Two Airborne Video Sensors,” IEEE Transactions on Aerospace and Electronic Systems, vol. 56, no. 4, pp. 2910–2921, Aug. 2020.
H. Huang, A. V. Savkin, and W. Ni, “Online UAV Trajectory Planning for Covert Video Surveillance of Mobile Targets,” IEEE Transactions on Automation Science and Engineering, vol. 19, no. 2, pp. 735–746, Apr. 2022.
R. Radhika and A. Muthukumaravel, “Video Surveillance and Deep Learning Enhancing Security through Suspicious Activity Detection,” in 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), Hassan, India, Aug. 2024, pp. 1–6.
M. Pangavhane et al., “Real-Time Deep Learning-Driven Surveillance with Spatiotemporal Feature Extraction for Detection of Anomalous Human Behavior Across Dynamic Environments,” International Journal of Safety and Security Engineering, vol. 15, no. 1, pp. 105–111, Jan. 2025.
K. Lokesh and M. Baskar, “Sketch and Size Orient Malicious Activity Monitoring for Efficient Video Surveillance Using CNN,” International Journal of Advanced Computer Science and Applications, vol. 15, no. 8, 2024.
L. Shana and C. Seldev Christopher, “A deep learning behavior analysis model for efficient video surveillance using multi pose features,” Ain Shams Engineering Journal, vol. 16, no. 2, Feb. 2025, Art. no. 103245.
P. Nuthakki et al., “Deep Learning based Multilingual Speech Synthesis using Multi Feature Fusion Methods,” ACM Transactions on Asian and Low-Resource Language Information Processing, Sep. 2023, Art. no. 3618110.
W. Sultani, C. Chen, and M. Shah, “Real-World Anomaly Detection in Surveillance Videos,” in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, Jun. 2018, pp. 6479–6488.
Downloads
How to Cite
License
Copyright (c) 2025 K. Lokesh, M. Baskar

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.