{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T20:58:30Z","timestamp":1774990710852,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,3,12]],"date-time":"2022-03-12T00:00:00Z","timestamp":1647043200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,12]],"date-time":"2022-03-12T00:00:00Z","timestamp":1647043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11042-022-12532-9","type":"journal-article","created":{"date-parts":[[2022,3,12]],"date-time":"2022-03-12T10:02:53Z","timestamp":1647079373000},"page":"20945-20961","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Violence detection in videos using interest frame extraction and 3D convolutional neural network"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3758-0451","authenticated-orcid":false,"given":"Javad","family":"Mahmoodi","sequence":"first","affiliation":[]},{"given":"Hossein","family":"Nezamabadi-pour","sequence":"additional","affiliation":[]},{"given":"Dariush","family":"Abbasi-Moghadam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,12]]},"reference":[{"key":"12532_CR1","doi-asserted-by":"crossref","unstructured":"Bellamine I and Tairi H (2016) \"Motion detection using color space-time interest points,\" in lecture notes in electrical engineering","DOI":"10.1007\/978-3-319-30301-7_11"},{"key":"12532_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.patrec.2017.04.015","volume":"92","author":"A Ben Mabrouk","year":"2017","unstructured":"Ben Mabrouk A, Zagrouba E (2017) Spatio-temporal feature using optical flow based distribution for violence detection. Pattern Recogn Lett 92:62\u201367","journal-title":"Pattern Recogn Lett"},{"key":"12532_CR3","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.eswa.2017.09.029","volume":"91","author":"A Ben Mabrouk","year":"2018","unstructured":"Ben Mabrouk A, Zagrouba E (2018) Abnormal behavior recognition for intelligent video surveillance systems: a review. Expert Syst Appl 91:480\u2013491","journal-title":"Expert Syst Appl"},{"key":"12532_CR4","doi-asserted-by":"crossref","unstructured":"Bermejo Nievas E, Deniz Suarez O, Bueno Garc\u00eda G and Sukthankar R (2011) \"violence detection in video using computer vision techniques,\" in computer analysis of images and patterns, Violence detection in video using computer vision techniques.","DOI":"10.1007\/978-3-642-23678-5_39"},{"issue":"12","key":"12532_CR5","doi-asserted-by":"publisher","first-page":"2799","DOI":"10.1109\/TPAMI.2017.2769085","volume":"40","author":"H Bilen","year":"2018","unstructured":"Bilen H, Fernando B, Gavves E, Vedaldi A (Dec. 2018) Action recognition with dynamic image networks. IEEE Trans Pattern Anal Mach Intell 40(12):2799\u20132813","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"12532_CR6","unstructured":"Chen MY and Hauptmann A (2009) MoSIFT: Recognizing Human Actions in Surveillance Videos"},{"key":"12532_CR7","unstructured":"Dai Q, Zhao R, Wu Z, Wang X, Gu Z, Wu W, Jiang Y (2015) \"Fudan-Huawei at MediaEval 2015: detecting violent scenes and affective impact in movies with deep learning,\" in MediaEval"},{"key":"12532_CR8","volume-title":"\"human detection using oriented histograms of flow and appearance,\" in computer vision \u2013 ECCV 2006","author":"N Dalal","year":"2006","unstructured":"Dalal N, Triggs B and Schmid C (2006) \"human detection using oriented histograms of flow and appearance,\" in computer vision \u2013 ECCV 2006, ."},{"key":"12532_CR9","doi-asserted-by":"crossref","unstructured":"De Souza FD, Cha GC, Do Valle EA, De A, Araujo A \"Violence detection in video using spatio-temporal features,\" 2010 23rd SIBGRAPI conference on graphics. Patt Images 2010","DOI":"10.1109\/SIBGRAPI.2010.38"},{"issue":"3","key":"12532_CR10","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.icte.2020.04.014","volume":"6","author":"K Deepak","year":"2020","unstructured":"Deepak K, Vignesh LKP, Chandrakala S (2020) Autocorrelation of gradients based violence detection in surveillance videos. ICT Express 6(3):155\u2013159","journal-title":"ICT Express"},{"issue":"17","key":"12532_CR11","doi-asserted-by":"publisher","first-page":"7379","DOI":"10.1007\/s11042-014-1984-4","volume":"74","author":"C Demarty","year":"2014","unstructured":"Demarty C, Penet C, Soleymani M, Gravier G (2014) VSD, a public dataset for the detection of violent scenes in movies: design, annotation, analysis and evaluation. Multimed Tools Appl 74(17):7379\u20137404","journal-title":"Multimed Tools Appl"},{"key":"12532_CR12","doi-asserted-by":"crossref","unstructured":"Ding C, Fan S , Zhu M, Feng W and Jia B (2014) \"Violence detection in video by using 3D convolutional neural networks,\" in Advances in Visual Computing. ISVC 2014. Lect Notes Comput Sci,.","DOI":"10.1007\/978-3-319-14364-4_53"},{"key":"12532_CR13","doi-asserted-by":"crossref","unstructured":"Dong Z, Qin J and Wang Y, \"Multi-stream deep networks for person to person violence detection in videos,\" in Pattern Recognition. CCPR 2016. Communications in Computer and Information Science, Singapore, 2016.","DOI":"10.1007\/978-981-10-3002-4_43"},{"key":"12532_CR14","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s10044-019-00821-3","volume":"23","author":"IP Febin","year":"2020","unstructured":"Febin IP, Jayasree K, Joy PT (2020) Violence detection in videos for an intelligent surveillance system using MoBSIFT and movement fltering algorithm. Pattern Anal Applic 23:611\u2013623","journal-title":"Pattern Anal Applic"},{"key":"12532_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.imavis.2016.01.006","volume":"48-49","author":"Y Gao","year":"2016","unstructured":"Gao Y, Liu H, Sun X, Wang C, Liu Y (2016) Violence detection using oriented violent flows. Image Vis Comput 48-49:37\u201341","journal-title":"Image Vis Comput"},{"key":"12532_CR16","doi-asserted-by":"crossref","unstructured":"Giannakopoulos T, Kosmopoulos D, Aristidou A and Theodoridis S (2006) \"violence content classification using audio features,\" in advances in artificial intelligence,","DOI":"10.1007\/11752912_55"},{"key":"12532_CR17","doi-asserted-by":"crossref","unstructured":"Giannakopoulos T, Pikrakis A, Theodoridis S (2007) \"A multi-class audio classification method with respect to violent content in movies using Bayesian networks,\" in 2007 IEEE 9th workshop on multimedia signal processing","DOI":"10.1109\/MMSP.2007.4412825"},{"key":"12532_CR18","doi-asserted-by":"crossref","unstructured":"Gu C, Wu X, Wang S (2020) Violent video detection based on semantic correspondence. IEEE Access:85958\u201385967","DOI":"10.1109\/ACCESS.2020.2992617"},{"key":"12532_CR19","volume-title":"\"a combined corner and edge detector,\" in Procedings of the Alvey vision conference","author":"C Harris","year":"1988","unstructured":"Harris C, Stephens M (1988) \"a combined corner and edge detector,\" in Procedings of the Alvey vision conference"},{"key":"12532_CR20","doi-asserted-by":"crossref","unstructured":"T. Hassner, Y. Itcher and O. Kliper-Gross (2012) \"Violent flows: Real-time detection of violent crowd behavior,\" in 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, .","DOI":"10.1109\/CVPRW.2012.6239348"},{"key":"12532_CR21","doi-asserted-by":"crossref","unstructured":"Jain A, Vishwakarma DK (2020) \"Deep NeuralNet for violence detection using motion features from dynamic images,\" in 2020 third international conference on smart systems and inventive technology (ICSSIT). Tirunelveli, India","DOI":"10.1109\/ICSSIT48917.2020.9214153"},{"issue":"13","key":"12532_CR22","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1049\/el.2017.0970","volume":"53","author":"A Ke\u00e7eli","year":"2017","unstructured":"Ke\u00e7eli A, Kaya A (2017) Violent activity detection with transfer learning method. Electron Lett 53(13):1047\u20131048","journal-title":"Electron Lett"},{"key":"12532_CR23","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.cviu.2015.06.009","volume":"144","author":"J Kooij","year":"2016","unstructured":"Kooij J, Liem M, Krijnders J, Andringa T, Gavrila D (2016) Multi-modal human aggression detection. Comput Vis Image Underst 144:106\u2013120","journal-title":"Comput Vis Image Underst"},{"issue":"6","key":"12532_CR24","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2017) ImageNet classification with deep convolutional neural networks. Commun ACM 60(6):84\u201390","journal-title":"Commun ACM"},{"key":"12532_CR25","doi-asserted-by":"crossref","unstructured":"Laptev and Lindeberg (2003) \"Space-time interest points,\" Proceedings Ninth IEEE International Conference on Computer Vision,","DOI":"10.1109\/ICCV.2003.1238378"},{"key":"12532_CR26","doi-asserted-by":"crossref","unstructured":"Liang Q, Li Y, Chen B, Yang K (2021) Violence behavior recognition of two-Cascade temporal shift module with attention mechanism. J Electronic Imaging 30(4)","DOI":"10.1117\/1.JEI.30.4.043009"},{"issue":"2","key":"12532_CR27","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant Keypoints. Int J Comput Vis 60(2):91\u2013110","journal-title":"Int J Comput Vis"},{"key":"12532_CR28","doi-asserted-by":"crossref","unstructured":"Mahmoodi J, Salajeghe A (2019) A classification method based on optical flow for violence detection. 127:121\u2013127","DOI":"10.1016\/j.eswa.2019.02.032"},{"key":"12532_CR29","doi-asserted-by":"crossref","unstructured":"Meng Z, Yuan J and Li Z (2017) \"Trajectory-pooled deep convolutional networks for violence detection in videos,\" in lecture notes in computer science,","DOI":"10.1007\/978-3-319-68345-4_39"},{"key":"12532_CR30","doi-asserted-by":"crossref","unstructured":"Perperis T, Giannakopoulos T, Makris A, Kosmopoulos DI, Tsekeridou S, Perantonis SJ, Theodoridis S (2011) Multimodal and ontology-based fusion approaches of audio and visual processing for violence detection in movies. Expert Syst Appl","DOI":"10.1016\/j.eswa.2011.04.219"},{"key":"12532_CR31","doi-asserted-by":"publisher","first-page":"107560","DOI":"10.1109\/ACCESS.2019.2932114","volume":"7","author":"M Ramzan","year":"2019","unstructured":"Ramzan M, Abid A, Khan HU, Awan SM, Ismail A, Ahmed M, Mahmood A (2019) A review on state-of-the-art violence detection techniques. IEEE Access 7:107560\u2013107575","journal-title":"IEEE Access"},{"issue":"13","key":"12532_CR32","doi-asserted-by":"publisher","first-page":"1601","DOI":"10.3390\/electronics10131601","volume":"10","author":"FJ Rend\u00f3n-Segador","year":"2021","unstructured":"Rend\u00f3n-Segador FJ, \u00c1lvarez-Garc\u00eda JA, Enr\u00edquez F, Deniz O (2021) ViolenceNet: Dense multi-head self-attention with bidirectional Convolutional LSTM for detecting violence. Electronics 10(13):1601","journal-title":"Electronics"},{"key":"12532_CR33","volume-title":"\"violence detection and localization in surveillance video,\" in 2020 33rd SIBGRAPI conference on graphics","author":"DG Roman","year":"2020","unstructured":"Roman DG, Chavez GC (2020) \"violence detection and localization in surveillance video,\" in 2020 33rd SIBGRAPI conference on graphics. Patterns and Images (SIBGRAPI), Porto de Galinhas, Brazil"},{"issue":"10","key":"12532_CR34","doi-asserted-by":"publisher","first-page":"4787","DOI":"10.1109\/TIP.2018.2845742","volume":"27","author":"I Serrano","year":"2018","unstructured":"Serrano I, Deniz O, Espinosa-Aranda JL, Bueno G (2018) Fight recognition in video using Hough forests and 2D convolutional neural network. IEEE Trans Image Process 27(10):4787\u20134797","journal-title":"IEEE Trans Image Process"},{"key":"12532_CR35","unstructured":"Shi X, Chen Z, Wang H, Yeung DY (2015) \"convolutional LSTM network: a machine learning approach for precipitation Nowcasting,\" in neural information processing systems (NIPS). Montreal, Canada"},{"key":"12532_CR36","doi-asserted-by":"publisher","first-page":"39172","DOI":"10.1109\/ACCESS.2019.2906275","volume":"7","author":"W Song","year":"2019","unstructured":"Song W, Zhang D, Zhao X, Yu J, Zheng R, Wang A (2019) A novel violent video detection scheme based on modified 3D convolutional neural networks. IEEE Access 7:39172\u201339179","journal-title":"IEEE Access"},{"key":"12532_CR37","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15:1929\u20131958","journal-title":"J Mach Learn Res"},{"issue":"1","key":"12532_CR38","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/S0031-3203(98)00091-0","volume":"32","author":"C Studholme","year":"1999","unstructured":"Studholme C, Hill D, Hawkes D (1999) An overlap invariant entropy measure of 3D medical image alignment. Pattern Recogn 32(1):71\u201386","journal-title":"Pattern Recogn"},{"key":"12532_CR39","doi-asserted-by":"crossref","unstructured":"Sudhakaran S, Lanz O (2017) \"Learning to detect violent videos using convolutional long short-term memory,\" in 2017 14th IEEE international conference on advanced video and signal based surveillance (AVSS)","DOI":"10.1109\/AVSS.2017.8078468"},{"key":"12532_CR40","doi-asserted-by":"crossref","unstructured":"Tran D, Bourdev L, Fergus R, Torresani L, Paluri M (2015) \"Learning spatiotemporal features with 3D convolutional networks,\" in 2015 IEEE international conference on computer vision (ICCV)","DOI":"10.1109\/ICCV.2015.510"},{"issue":"4","key":"12532_CR41","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik A, Sheikh H, Simoncelli E (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"12532_CR42","first-page":"3","volume":"2018","author":"S Woo","year":"2018","unstructured":"Woo S, Park J, Lee J, Kweon IS (2018) CBAM: convolutional block attention module. Computer Vision \u2013 ECCV 2018:3\u201319","journal-title":"Computer Vision \u2013 ECCV"},{"key":"12532_CR43","doi-asserted-by":"crossref","unstructured":"Xia Q, Zhang P, Wang J, Tian M and Fei C(2018) \"real time violence detection based on deep spatio-temporal features,\" in biometric recognition,","DOI":"10.1007\/978-3-319-97909-0_17"},{"key":"12532_CR44","doi-asserted-by":"crossref","unstructured":"Xu L, Gong C, Yang J, Wu Q, Yao L (2014) \"violent video detection based on MoSIFT feature and sparse coding,\" in 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP)","DOI":"10.1109\/ICASSP.2014.6854259"},{"issue":"12","key":"12532_CR45","doi-asserted-by":"publisher","first-page":"7327","DOI":"10.1007\/s11042-015-2648-8","volume":"75","author":"T Zhang","year":"2015","unstructured":"Zhang T, Yang Z, Jia W, Yang B, Yang J, He X (2015) A new method for violence detection in surveillance scenes. Multimed Tools Appl 75(12):7327\u20137349","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12532-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12532-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12532-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T06:15:00Z","timestamp":1653545700000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12532-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,12]]},"references-count":45,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["12532"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12532-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,12]]},"assertion":[{"value":"17 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}