{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:05:15Z","timestamp":1742994315684,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811556784"},{"type":"electronic","value":"9789811556791"}],"license":[{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5679-1_3","type":"book-chapter","created":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T08:05:18Z","timestamp":1598688318000},"page":"21-29","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ATM Theft Investigation Using Convolutional Neural Network"],"prefix":"10.1007","author":[{"given":"Y. C.","family":"Satish","sequence":"first","affiliation":[]},{"given":"Bhawana","family":"Rudra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,30]]},"reference":[{"key":"3_CR1","unstructured":"ATM near Gorakhnath temple looted. https:\/\/timesofindia.indiatimes.com\/city\/varanasi\/atm-near-gorakhnath-temple-looted\/articleshow\/70944316.cms (2019). Accessed 8 Sept 2019"},{"key":"3_CR2","unstructured":"ATM physical attacks in Europe on the increase. https:\/\/www.association-secure-transactions.eu\/atm-physical-attacks-in-europe-on-the-increase\/ (2019). Accessed 8 Sept 2019"},{"key":"3_CR3","unstructured":"Security cameras were not enough to stop thieves in Live Oak robbery. https:\/\/foxsanantonio.com\/news\/local\/security-cameras-not-enough-to-stop-thieves-in-live-oak-robbery (2019). Accessed 8 Sept 2019"},{"key":"3_CR4","unstructured":"Indian banks lost Rs. 109.75 crore to theft and online fraud in FY18. https:\/\/www.moneycontrol.com\/news\/trends\/current-affairs-trends\/indian-banks-lost-rs-109-75-crore-to-theft-and-online-fraud-in-fy18-2881431.html (2019). Accessed 8 Sept 2019"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Singh, D., Vishnu, C., Mohan, C.K.: Visual big data analytics for traffic monitoring in smart city. In: Proceedings of the IEEE Conference on Machine Learning and Application (ICMLA), Anaheim, California, 18\u201320 December 2016","DOI":"10.1109\/ICMLA.2016.0159"},{"issue":"3","key":"3_CR6","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1049\/iet-its.2011.0138","volume":"6","author":"J Chiverton","year":"2012","unstructured":"Chiverton, J.: Helmet presence classification with motorcycle detection and tracking. IET Intell. Transp. Syst. (ITS) 6(3), 259\u2013269 (2012)","journal-title":"IET Intell. Transp. Syst. (ITS)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Silva, R., Aires, K., Santos, T., Abdala, K., Veras, R., Soares, A.: Automatic detection of motorcyclists without helmet. In: Proceedings of the Latin American Computing Conference (CLEI), Puerto Azul, Venezuela, 4\u20136 October 2013, pp. 1\u20137 (2013)","DOI":"10.1109\/CLEI.2013.6670613"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Silva, R.V., Aires, T., Rodrigo, V.: Helmet detection on motorcyclists using image descriptors and classifiers. In: Proceedings of the Graphics, Patterns and Images (SIBGRAPI), Rio de Janeiro, Brazil, 27\u201330 August 2014, pp. 141\u2013148 (2014)","DOI":"10.1109\/SIBGRAPI.2014.28"},{"key":"3_CR9","unstructured":"Rattapoom, W., Nannaphat, B., Vasan, T., Chainarong, T., Pattanawadee, P.: Machine vision techniques for motorcycle safety helmet detection. In: Proceedings of the International Conference on Image and Vision Computing New Zealand (IVCNZ), Wellington, New Zealand, 27\u201329 November 2013, pp. 35\u201340 (2013)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Dahiya, K., Singh, D., Mohan, C.K.: Automatic detection of bike riders without helmet using surveillance videos in real-time. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN), Vancouver, Canada, 24\u201329 July 2016, pp. 3046\u20133051 (2016)","DOI":"10.1109\/IJCNN.2016.7727586"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Chiu, C.-C., Ku, M.-Y., Chen, H.-T.: Motorcycle detection and tracking system with occlusion segmentation. In: Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services, Santorini, Greece, 6\u20138 June 2007, pp. 32\u201332 (2007)","DOI":"10.1109\/WIAMIS.2007.60"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Sulman, N., Sanocki, T., Goldgof, D., Kasturi, R.: How effective is human video surveillance performance? In: 19th International Conference on Pattern Recognization (ICPR 2008), pp. 1\u20133. IEEE, Piscataway (2008)","DOI":"10.1109\/ICPR.2008.4761655"},{"key":"3_CR13","unstructured":"Stauffer, C., Grimson, W.: Adaptive background mixture models for real-time tracking. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR 1999), pp. 246\u2013252. IEEE, Piscataway (1999)"},{"key":"3_CR14","unstructured":"Tian, Y.L., Feris, R.S., Liu, H., Hampapur, A., Sun, M.-T.: Robust Detection of abandoned and removed objects in complex surveillance videos. Syst. Man Cybern. Part C Appl. Rev. IEEE Trans. 41(5), 65\u2013576 (2011)"},{"issue":"3","key":"3_CR15","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/LSP.2011.2182648","volume":"19","author":"W Kim","year":"2012","unstructured":"Kim, W., Kim, C.: Background subtraction for dynamic texture scenes using fuzzy color histograms. Signal Process. Lett. IEEE 19(3), 127\u201313 (2012)","journal-title":"Signal Process. Lett. IEEE"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Lanza, A.: Background subtraction by non-parametric probabilistic clustering. In: 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, pp. 243\u2013248. IEEE, Piscataway (2011)","DOI":"10.1109\/AVSS.2011.6027330"},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TITS.2009.2030963","volume":"11","author":"J Candamo","year":"2010","unstructured":"Candamo, J., Shreve, M., Goldgof, D.B., Sapper, D.B., Kasturi, R.: Understanding transit scenes: a survey on human behavior-recognition algorithms. IEEE Trans. Intell. Transp. Syst. 11(1), 206\u2013224 (2010)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"5","key":"3_CR18","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TSMCC.2010.2092425","volume":"41","author":"F-C Cheng","year":"2011","unstructured":"Cheng, F.-C., Huang, S.-C., Ruan, S.-J.: Scene analysis for object detection in advanced surveillance systems using the Laplacian distribution model. Syst. Man Cybern. Part C Trans. 41(5), 589\u2013598 (2011)","journal-title":"Syst. Man Cybern. Part C Trans."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Ko, T., Soatto, S., Estrin, D.: Warping background s attraction. In: 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2010), pp. 1331\u20131338. IEEE, Piscataway (2010)","DOI":"10.1109\/CVPR.2010.5539813"},{"issue":"1","key":"3_CR20","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/TII.2011.2173202","volume":"8","author":"S Chen","year":"2012","unstructured":"Chen, S., Zhang, J., Li, Y., Zhang, J.: A hierarchical model incorporating segmented regions and pixel descriptors for video background subtraction. IEEE Trans. Ind. Inform. 8(1), 118\u2013127 (2012)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Srinivasan, K., Porkumaran, K., Sainarayanan, G.: Improved background subtraction techniques for security in video applications. In: 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, Hong Kong, pp. 114\u2013117 (2009)","DOI":"10.1109\/ICASID.2009.5276945"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Bayona, A., San Miguel, J.C., Martinez, J.M.: Stationary foreground detection using background subtraction and temporal difference in video surveillance. In: 2010 IEEE International Conference on Image Processing, Hong Kong, pp. 4657\u20134660 (2010)","DOI":"10.1109\/ICIP.2010.5650699"},{"key":"3_CR23","unstructured":"Razif, M.A.M., Mokji, M., Zabidi, M.M.A.: Low complexity maritime surveillance video using background subtraction on H.264. In: International Symposium on Technology Management and Emerging Technologies (ISTMET), Langkawi Island, pp. 364\u2013368 (2015)"},{"key":"3_CR24","unstructured":"Candamo, J., Shreve, M., Goldgof, D.B., Sapper, D.B., Kasturi, R: Understanding transit scenes: a survey on human behavior- recognitional algorithms. IEEE Trans. Intell. Transp. Syst. 11(1), 206\u2013224 (2010)"},{"key":"3_CR25","unstructured":"Wu, X., Ou, Y., Qian, H., Xu, Y.: A detection system for human abnormal behavior. In: 2005 IEEE\/RSJ International Conference on Intelligent Robots and Systems, Edmonton, Alta., pp. 1204\u20131208 (2005)"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Hao, Z., Liu, M., Wang, Z., Zhan, W.: Human behavior analysis based on attention mechanism and LSTM neural network. In: 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China, pp. 346\u2013349 (2019)","DOI":"10.1109\/ICEIEC.2019.8784479"},{"key":"3_CR27","unstructured":"Dataturks Bikers Wearing Helmet Or Not. https:\/\/dataturks.com\/projects\/priyaagarwal2730\/Bikers%20Wearing%20Helmet%20Or%20Not (2019). Accessed 8 Sept 2019"},{"key":"3_CR28","unstructured":"Imglab. https:\/\/github.com\/NaturalIntelligence\/imglab (2019). Accessed 8 Sept 2019"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data Engineering and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5679-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:31:59Z","timestamp":1668126719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5679-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,30]]},"ISBN":["9789811556784","9789811556791"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5679-1_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,30]]},"assertion":[{"value":"30 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}