{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T19:30:39Z","timestamp":1776367839581,"version":"3.51.2"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T00:00:00Z","timestamp":1449792000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s11042-015-3133-0","type":"journal-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T08:45:31Z","timestamp":1449823531000},"page":"1419-1438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":75,"title":["MoWLD: a robust motion image descriptor for violence detection"],"prefix":"10.1007","volume":"76","author":[{"given":"Tao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wenjing","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Baoqing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[]},{"given":"Zhonglong","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"issue":"3","key":"3133_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1922649.1922653","volume":"43","author":"JK Aggarwal","year":"2011","unstructured":"Aggarwal JK, Ryoo MS (2011) Human activity analysis: a review. ACM Comput Surv 43(3):1\u201343","journal-title":"ACM Comput Surv"},{"key":"3133_CR2","doi-asserted-by":"crossref","unstructured":"Andrade E, Fisher R (2006) Modelling crowd scenes for event detection. In: Proceedings of the 18th international conference on pattern recognition (ICPR\u201906). IEEE, vol 01, pp 175\u2013178","DOI":"10.1109\/ICPR.2006.806"},{"issue":"5","key":"3133_CR3","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.image.2013.01.005","volume":"28","author":"S Baysal","year":"2013","unstructured":"Baysal S, Duygulu P (2013) A line based pose representation for human action recognition. Signal Process Image Commun 28(5):458\u2013471","journal-title":"Signal Process Image Commun"},{"key":"3133_CR4","doi-asserted-by":"crossref","unstructured":"Bermejo E, Deniz O, Bueno G, Sukthankar R (2011) Violence detection in video using computer vision techniques. In: Proceedings of the 14th international conference on computer analysis of images and patterns. Springer, Berlin Heidelberg New York, pp 332\u2013339","DOI":"10.1007\/978-3-642-23678-5_39"},{"issue":"3","key":"3133_CR5","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/34.910878","volume":"23","author":"A Bobick","year":"2001","unstructured":"Bobick A, Davis J (2001) The recognition of human movement using temporal templates. IEEE Trans Pattern Anal Mach Intell 23(3):257\u2013267","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"3133_CR6","doi-asserted-by":"crossref","first-page":"2916","DOI":"10.1214\/10-AOS799","volume":"38","author":"ZI Botev","year":"2010","unstructured":"Botev ZI, Grotowski JF, Kroese DP (2010) Kernel density estimation via diffusion. Ann Stat 38(5):2916\u20132957","journal-title":"Ann Stat"},{"key":"3133_CR7","unstructured":"Boureau YL, Ponce J, Yann L (2010) A theoretical analysis of feature pooling in visual recognition. In: Proceedings of the 27th International Conference on Machine Learning (ICML-10). no. 6, vol 31, pp 111\u2013118"},{"issue":"9","key":"3133_CR8","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TPAMI.2009.155","volume":"32","author":"J Chen","year":"2010","unstructured":"Chen J, Shan S, He C, Zhao G, Chen X, Gao W (2010) Wld: a robust local image descriptor. IEEE Trans Pattern Anal Mach Intell 32(9):1705\u20131720","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3133_CR9","unstructured":"Chen M, Hauptmann A (2009) Mosift: recognizing human actions in surveillance videos. In: Tech. rep, Carnegie Mellon University, pp. 1\u201310. Carnegie Mellon University"},{"key":"3133_CR10","doi-asserted-by":"crossref","unstructured":"Cheng W, Chu W, Wu J (2003) Semantic context detection based on hierarchical audio models. In: Proceedings of the ACM SIGMM workshop on multimedia information retrieval, pp 109\u2013115","DOI":"10.1145\/973264.973282"},{"key":"3133_CR11","unstructured":"Clarin C, Dionisio J, Echavez M, Naval P (2005) Detection of movie violence using motion intensity analysis on skin and blood. Tech. rep., University of the Philippines"},{"key":"3133_CR12","doi-asserted-by":"crossref","unstructured":"Cristani M, Bicego M, Murino V (2007) Audio-visual event recognition in surveillance video sequences. In: IEEE transactions on multimedia. IEEE, pp 257\u2013267","DOI":"10.1109\/TMM.2006.886263"},{"key":"3133_CR13","doi-asserted-by":"crossref","unstructured":"Dai P, Di H, Dong L, Tao L, Xu G (2008) Group interaction analysis in dynamic context. In: IEEE transactions on systems, man, and cybernetics. IEEE, pp 275\u2013282","DOI":"10.1109\/TSMCB.2007.909939"},{"key":"3133_CR14","doi-asserted-by":"crossref","unstructured":"Damen D, Hogg D (2009) Recognizing linked events: searching the space of feasible explanations. In: 2009 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 927\u2013934","DOI":"10.1109\/CVPR.2009.5206636"},{"key":"3133_CR15","unstructured":"Dan X, Elisa R, Yan Y, Jingkuan S, Nicu S (2015) Learning deep representations of appearance and motion for anomalous event detection. In: The british machine vision conference (BMVC). BMVA Press, pp 1\u201312"},{"key":"3133_CR16","doi-asserted-by":"crossref","unstructured":"Datta A, Shah M, da Vitoria Lobo N (2002) Person-on-person violence detection in video data. In: Proceedings of IEEE international conference on image processing (ICIP2002), pp 433\u2013438","DOI":"10.1109\/ICPR.2002.1044748"},{"key":"3133_CR17","doi-asserted-by":"crossref","unstructured":"de Souza FDM, Chavez GC, do Valle EA, de A, Araujo A (2010) Violence detection in video using spatio-temporal features. In: Proceedings of the 23rd SIBGRAPI conference on graphics, patterns and images, SIBGRAPI 2010. IEEE, pp 224\u2013230","DOI":"10.1109\/SIBGRAPI.2010.38"},{"key":"3133_CR18","unstructured":"Gao L, Song J, Nie F, Yan Y, Sebe N, Shen HT (2015) Optimal graph leaning with partial tags and multiple features for image and video annotation. In: IEEE conference on computer vision and pattern recognition, pp 4371\u20134379"},{"issue":"2","key":"3133_CR19","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.bspc.2011.03.002","volume":"7","author":"X Geng","year":"2012","unstructured":"Geng X, Yu C, Hu G (2012) Unsupervised feature selection by kernel density estimation in wavelet-based spike sorting. Biomed Signal Process Control 7(2):112\u2013117","journal-title":"Biomed Signal Process Control"},{"issue":"2","key":"3133_CR20","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1037\/0012-1649.39.2.201","volume":"39","author":"L Huesmann","year":"2003","unstructured":"Huesmann L, Moise-Titus J, Podolski C, Eron L (2003) Longitudinal relations between childrens exposure to tv violence and their aggressive and violent behavior in young adulthood. Dev Psychol 39(2):201\u2013221","journal-title":"Dev Psychol"},{"key":"3133_CR21","doi-asserted-by":"crossref","unstructured":"Li S, Gong D, Yuan Y (2013) Face recognition using weber local descriptors. In: Neurocomputing, vol 122. Elsevier, Amsterdam, pp 272\u2013283","DOI":"10.1016\/j.neucom.2013.05.038"},{"key":"3133_CR22","unstructured":"Liang Y, Hany F, Tapio S, Esko A (2014) Physical violence detection for preventing school bullying. Advances in Artificial Intelligence, pp 1\u20139"},{"key":"3133_CR23","doi-asserted-by":"crossref","unstructured":"Lin J, Wang W (2009) Weakly-supervised violence detection in movies with audio and video based co-training. In: The 10th IEEE pacific-rim conference on multimedia, Dec. ACM, pp 990\u2013935","DOI":"10.1007\/978-3-642-10467-1_84"},{"issue":"2","key":"3133_CR24","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D Lowe","year":"2004","unstructured":"Lowe D (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91\u2013110","journal-title":"Int J Comput Vis"},{"key":"3133_CR25","doi-asserted-by":"crossref","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) Anomaly detection in crowded scenes. In: 2010 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 1975\u20131981","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"3133_CR26","doi-asserted-by":"crossref","unstructured":"Mairal G, Bach F, Ponce J, Sapiro G (2009) Online dictionary learning for sparse coding. In: Proceedings of the 26th annual international conference on machine learning (ICML-09). JMLR.org, pp 689\u2013696","DOI":"10.1145\/1553374.1553463"},{"issue":"3","key":"3133_CR27","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.cviu.2011.09.009","volume":"116","author":"B Marco","year":"2012","unstructured":"Marco B, Alberto DB, Lorenzo S (2012) Multi-scale and real-time non-parametric approach for anomaly detection and localization. Comput Vis Image Underst 116(3):320\u2013329","journal-title":"Comput Vis Image Underst"},{"key":"3133_CR28","unstructured":"Mehrsan JR, Martin L (2013) Online dominant and anomalous behavior detection in videos. In: 2013 IEEE conference on computer vision and pattern recognition (CVPR), pp 2609\u20132616"},{"key":"3133_CR29","doi-asserted-by":"crossref","unstructured":"Nam J, Alghoniemy M, Tewfik A (1998) Audio-visual content-based violent scene characterization. In: Proceedings of IEEE international conference on image processing (ICIP1998), pp 353\u2013357","DOI":"10.1109\/ICIP.1998.723496"},{"key":"3133_CR30","doi-asserted-by":"crossref","unstructured":"Nguyen N, Phung D, Venkatesh S, Bui H (2005) Learning and detecting activities from movement trajectories using the hierarchical hidden markov model. In: 2005 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 955\u2013960","DOI":"10.1109\/CVPR.2005.203"},{"issue":"51","key":"3133_CR31","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-540-72348-6_7","volume":"44","author":"A Oikonomopoulos","year":"2007","unstructured":"Oikonomopoulos A, Patras I, Pantic M, Paragios N (2007) Trajectory-based representation of human actions. Artificial Intelligence for Human Computing 44(51):133\u2013154","journal-title":"Artificial Intelligence for Human Computing"},{"issue":"6","key":"3133_CR32","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1109\/TSMCC.2011.2178594","volume":"42","author":"OP Popoola","year":"2012","unstructured":"Popoola OP, Wang K (2012) Video-based abnormal human behavior recognition - a review. IEEE Trans Syst Man Cybern Part C Appl Rev 42(6):865\u2013878","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"issue":"1","key":"3133_CR33","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.image.2011.05.002","volume":"27","author":"B Saghafi","year":"2012","unstructured":"Saghafi B, Rajan D (2012) Human action recognition using pose-based discriminant embedding. Signal Process Image Commun 27(1):96\u2013111","journal-title":"Signal Process Image Commun"},{"issue":"10","key":"3133_CR34","doi-asserted-by":"crossref","first-page":"983","DOI":"10.1007\/s00371-012-0752-6","volume":"29","author":"V Sarvesh","year":"2013","unstructured":"Sarvesh V, Anupam A (2013) A survey on activity recognition and behavior understanding in surveillance video. Vis Comput 29(10):983\u20131009","journal-title":"Vis Comput"},{"key":"3133_CR35","unstructured":"Shi Y, Huang Y, Minnen D, Bobick A, Essa I (2004) Propagation networks for recognition of partially ordered sequential action. In: 2004 IEEE conference on computer vision and pattern recognition (CVPR), pp 862\u2013869"},{"key":"3133_CR36","unstructured":"Tal H, Yossi I, Orit KG (2012) Violent flows: real-time detection of violent crowd behavior. In: 3rd IEEE international workshop on socially intelligent surveillance and monitoring (SISM) at the IEEE conference on computer vision and pattern recognition (CVPR), pp 1\u20136"},{"key":"3133_CR37","doi-asserted-by":"crossref","unstructured":"Tran D, Sorokin A (2008) Human activity recognition with metric learning. In: European conference on computer vision (ECCV), 2008. Springer, Berlin Heidelberg New York, pp 548\u2013561","DOI":"10.1007\/978-3-540-88682-2_42"},{"key":"3133_CR38","doi-asserted-by":"crossref","unstructured":"Vishwakarma S, Sapre A, Agrawal A (2011) Action recognition using cuboids of interest points. In: IEEE international conference on signal processing, communications and computing (ICSPCC). IEEE, pp 1\u20136","DOI":"10.1109\/ICSPCC.2011.6061680"},{"key":"3133_CR39","doi-asserted-by":"crossref","unstructured":"Wang B, Li W, Yang W, Liao Q (2011) Illumination normalization based on weber\u2019s law with application to face recognition. In: Signal processing letters, IEEE. IEEE, vol 18, pp 462\u2013465","DOI":"10.1109\/LSP.2011.2158998"},{"key":"3133_CR40","doi-asserted-by":"crossref","unstructured":"Yang J, Yu K, Gong Y, Huang T (2009) Linear spatial pyramid matching using sparse coding for image classification. In: 2009 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 1794\u20131801","DOI":"10.1109\/CVPR.2009.5206757"},{"key":"3133_CR41","doi-asserted-by":"crossref","unstructured":"Yang J, Yu K, Huang T (2010) Supervised translation-invariant sparse coding. In: 2010 IEEE conference on computer vision and pattern recognition (CVPR), pp 3517\u20133524","DOI":"10.1109\/CVPR.2010.5539958"},{"key":"3133_CR42","doi-asserted-by":"crossref","unstructured":"Yang Y, Song J, Huang Z, Ma Z, Sebe N, Hauptmann AG (2013) Multi-feature fusion via hierarchical regression for multimedia analysis. IEEE Trans Multimedia. pp 572\u2013581","DOI":"10.1109\/TMM.2012.2234731"},{"issue":"3","key":"3133_CR43","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1109\/TMM.2006.870735","volume":"8","author":"D Zhang","year":"2006","unstructured":"Zhang D, Gatica-Perez D, Bengio S, McCowan I (2006) Modeling individual and group actions in meetings with layered hmms. IEEE Trans Multimedia 8(3):509\u2013520","journal-title":"IEEE Trans Multimedia"},{"key":"3133_CR44","unstructured":"Zhang T, Yang Z, Jia W, Yang B, Yang J, He X (2015) A new method for violence detection in surveillance scenes. Multimedia Tools and Applications, pp 1\u201323"},{"issue":"4","key":"3133_CR45","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1016\/j.image.2014.01.012","volume":"29","author":"W Zhou","year":"2014","unstructured":"Zhou W, Wang C, Xiao B, Zhang Z (2014) Action recognition via structured codebook construction. Signal Process Image Commun 29(4):546\u2013555","journal-title":"Signal Process Image Commun"},{"key":"3133_CR46","doi-asserted-by":"crossref","unstructured":"Zhu Y, Zhao X, Fu Y, Liu Y (2011) Sparse coding on local spatial-temporal volumes for human action recognition. In: 10th Asian conference on computer vision, ACCV2010, pp 660\u2013671","DOI":"10.1007\/978-3-642-19309-5_51"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3133-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-3133-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3133-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3133-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:32:39Z","timestamp":1559359959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-3133-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,11]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["3133"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-3133-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,11]]}}}