Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessBest last-minute Amazon Spring Sale tablet deals 2026ZDNet Big DataI've worked on cruise ships for years. Here are 6 things passengers should pack and 5 they shouldn't.Business InsiderBuilding a RAG Pipeline From Scratch With LangChain + Pinecone + Claude: A Real ImplementationDEV CommunityThe Korg Handytraxx Play finally got me learning to scratchThe Verge AIWe Built an AI That Rewrites Its Own Brain. Here's What Happened.DEV CommunityI got rid of our Google Home. My family life improved in unexpected ways.Business InsiderCome ho costruito un generatore di testi AI moderno con React e VercelDEV CommunityHow CoinFello's MinChi Park Built the Trust Layer 500 Million Crypto Users Have Been Waiting ForHackernoon AI21 books you should read before they're turned into movies and TV shows this yearBusiness InsiderFrom Madonna photo ops to bankruptcy: the publisher that owes Bob Dylan blames 'predatory' lendersBusiness InsiderHow AI Is Reshaping Private Equity StrategyBloomberg TechnologyI'm 18 and Built an Open-Source Camera That Cryptographically Proves Photos Are RealDEV CommunityBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessBest last-minute Amazon Spring Sale tablet deals 2026ZDNet Big DataI've worked on cruise ships for years. Here are 6 things passengers should pack and 5 they shouldn't.Business InsiderBuilding a RAG Pipeline From Scratch With LangChain + Pinecone + Claude: A Real ImplementationDEV CommunityThe Korg Handytraxx Play finally got me learning to scratchThe Verge AIWe Built an AI That Rewrites Its Own Brain. Here's What Happened.DEV CommunityI got rid of our Google Home. My family life improved in unexpected ways.Business InsiderCome ho costruito un generatore di testi AI moderno con React e VercelDEV CommunityHow CoinFello's MinChi Park Built the Trust Layer 500 Million Crypto Users Have Been Waiting ForHackernoon AI21 books you should read before they're turned into movies and TV shows this yearBusiness InsiderFrom Madonna photo ops to bankruptcy: the publisher that owes Bob Dylan blames 'predatory' lendersBusiness InsiderHow AI Is Reshaping Private Equity StrategyBloomberg TechnologyI'm 18 and Built an Open-Source Camera That Cryptographically Proves Photos Are RealDEV Community

DIFEM: Key-points Interaction based Feature Extraction Module for Violence Recognition in Videos

arXivMarch 31, 20262 min read0 views
Source Quiz

arXiv:2412.05386v2 Announce Type: replace Abstract: Violence detection in surveillance videos is a critical task for ensuring public safety. As a result, there is increasing need for efficient and lightweight systems for automatic detection of violent behaviours. In this work, we propose an effective method which leverages human skeleton key-points to capture inherent properties of violence, such as rapid movement of specific joints and their close proximity. At the heart of our method is our novel Dynamic Interaction Feature Extraction Module (DIFEM) which captures features such as velocity, — Himanshu Mittal, Suvramalya Basak, Anjali Gautam

View PDF HTML (experimental)

Abstract:Violence detection in surveillance videos is a critical task for ensuring public safety. As a result, there is increasing need for efficient and lightweight systems for automatic detection of violent behaviours. In this work, we propose an effective method which leverages human skeleton key-points to capture inherent properties of violence, such as rapid movement of specific joints and their close proximity. At the heart of our method is our novel Dynamic Interaction Feature Extraction Module (DIFEM) which captures features such as velocity, and joint intersections, effectively capturing the dynamics of violent behavior. With the features extracted by our DIFEM, we use various classification algorithms such as Random Forest, Decision tree, AdaBoost and k-Nearest Neighbor. Our approach has substantially lesser amount of parameter expense than the existing state-of-the-art (SOTA) methods employing deep learning techniques. We perform extensive experiments on three standard violence recognition datasets, showing promising performance in all three datasets. Our proposed method surpasses several SOTA violence recognition methods.

Comments: Accepted in Signal Image and Video Processing

Subjects:

Computer Vision and Pattern Recognition (cs.CV)

Cite as: arXiv:2412.05386 [cs.CV]

(or arXiv:2412.05386v2 [cs.CV] for this version)

https://doi.org/10.48550/arXiv.2412.05386

arXiv-issued DOI via DataCite

Submission history

From: Suvramalya Basak [view email] [v1] Fri, 6 Dec 2024 19:25:47 UTC (16,299 KB) [v2] Sat, 28 Mar 2026 10:50:43 UTC (15,443 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
DIFEM: Key-…researchpaperarxivcomputer-vi…image-recog…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 236 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers