{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:56:14Z","timestamp":1772837774982,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["016.Vidi.185.178"],"award-info":[{"award-number":["016.Vidi.185.178"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In an era of rapid technological advancements, computer systems play a crucial role in early Violence Detection (VD) and localization, which is critical for timely human intervention. However, existing VD methods often fall short, lacking applicability to surveillance data, and failing to address the localization and social dimension of violent events. To address these shortcomings, we propose a novel approach to integrate subgroups into VD. Our method recognizes and tracks multiple subgroups across frames, providing an additional layer of information in VD. This enables the system to not only detect violence at video-level, but also to identify the groups involved. This adaptable add-on module can enhance the applicability of existing models and algorithms. Through extensive experiments on the SCFD and RWF-2000 surveillance datasets, we find that our approach improves social awareness in real-time VD by localizing the people involved in an act of violence. The system offers a small performance boost on the SCFD dataset and maintains performance on RWF-2000, reaching 91.3% and 87.2% accuracy respectively, demonstrating its practical utility while performing close to state-of-the-art methods. Furthermore, our efficient method generalizes well to unseen datasets, marking a promising advance in early VD.<\/jats:p>","DOI":"10.1007\/s11042-024-19144-5","type":"journal-article","created":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T12:52:08Z","timestamp":1714567928000},"page":"3793-3807","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Real-time violence detection and localization through subgroup analysis"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0749-4520","authenticated-orcid":false,"given":"Emmeke","family":"Veltmeijer","sequence":"first","affiliation":[]},{"given":"Morris","family":"Franken","sequence":"additional","affiliation":[]},{"given":"Charlotte","family":"Gerritsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,1]]},"reference":[{"issue":"3","key":"19144_CR1","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.jarmac.2017.05.001","volume":"6","author":"HM Hodgetts","year":"2017","unstructured":"Hodgetts HM, Vachon F, Chamberland C, Tremblay S (2017) See no evil: Cognitive challenges of security surveillance and monitoring. J Appl Res Mem Cognit 6(3):230\u2013243","journal-title":"J Appl Res Mem Cognit"},{"key":"19144_CR2","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1057\/palgrave.sj.8350092","volume":"23","author":"H Keval","year":"2010","unstructured":"Keval H, Sasse MA (2010) \u201cnot the usual suspects\": A study of factors reducing the effectiveness of cctv. Secur J 23:134\u2013154","journal-title":"Secur J"},{"key":"19144_CR3","doi-asserted-by":"crossref","unstructured":"Bermejo\u00a0Nievas E, Deniz\u00a0Suarez O, Bueno\u00a0Garc\u00eda G, Sukthankar R (2011) Violence detection in video using computer vision techniques. In: Computer analysis of images and patterns: 14th International conference, CAIP 2011, Seville, Spain, August 29-31, 2011, Proceedings, Part II 14. Springer, pp 332\u2013339","DOI":"10.1007\/978-3-642-23678-5_39"},{"key":"19144_CR4","doi-asserted-by":"publisher","first-page":"86339","DOI":"10.1109\/ACCESS.2022.3198985","volume":"10","author":"KB Kwan-Loo","year":"2022","unstructured":"Kwan-Loo KB, Ort\u00edz-Bayliss JC, Conant-Pablos SE, Terashima-Mar\u00edn H, Rad P (2022) Detection of violent behavior using neural networks and pose estimation. IEEE Access 10:86339\u201386352","journal-title":"IEEE Access"},{"key":"19144_CR5","doi-asserted-by":"crossref","unstructured":"Akt\u0131 \u015e, Tataro\u011flu GA, Ekenel HK (2019) Vision-based fight detection from surveillance cameras. In: 2019 Ninth international conference on image processing theory, tools and applications (IPTA). IEEE, pp 1\u20136","DOI":"10.1109\/IPTA.2019.8936070"},{"key":"19144_CR6","doi-asserted-by":"crossref","unstructured":"Cheng M, Cai K, Li M (2021) Rwf-2000: an open large scale video database for violence detection. In: 2020 25th International conference on pattern recognition (ICPR). IEEE, pp 4183\u20134190","DOI":"10.1109\/ICPR48806.2021.9412502"},{"key":"19144_CR7","doi-asserted-by":"crossref","unstructured":"Rota P, Conci N, Sebe N, Rehg JM (2015) Real-life violent social interaction detection. In: 2015 IEEE international conference on image processing (ICIP). IEEE, pp 3456\u20133460","DOI":"10.1109\/ICIP.2015.7351446"},{"key":"19144_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00138-021-01264-9","volume":"33","author":"D Freire-Obreg\u00f3n","year":"2022","unstructured":"Freire-Obreg\u00f3n D, Barra P, Castrill\u00f3n-Santana M, Marsico MD (2022) Inflated 3d convnet context analysis for violence detection. Mach Vision Appl 33:1\u201313","journal-title":"Mach Vision Appl"},{"key":"19144_CR9","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.future.2021.10.033","volume":"129","author":"W Ullah","year":"2022","unstructured":"Ullah W, Ullah A, Hussain T, Muhammad K, Heidari AA, Del Ser J, Baik SW, De Albuquerque VHC (2022) Artificial intelligence of things-assisted two-stream neural network for anomaly detection in surveillance big video data. Futur Gener Comput Syst 129:286\u2013297","journal-title":"Futur Gener Comput Syst"},{"key":"19144_CR10","doi-asserted-by":"crossref","unstructured":"Islam Z, Rukonuzzaman M, Ahmed R, Kabir MH, Farazi M (2021) Efficient two-stream network for violence detection using separable convolutional lstm. In: 2021 International joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN52387.2021.9534280"},{"issue":"6","key":"19144_CR11","first-page":"2216","volume":"22","author":"R Vijeikis","year":"2022","unstructured":"Vijeikis R, Raudonis V, Dervinis G (2022) Efficient violence detection in surveillance. Sensors 22(6):2216","journal-title":"Efficient violence detection in surveillance. Sensors"},{"key":"19144_CR12","doi-asserted-by":"publisher","first-page":"76270","DOI":"10.1109\/ACCESS.2021.3083273","volume":"9","author":"M-S Kang","year":"2021","unstructured":"Kang M-S, Park R-H, Park H-M (2021) Efficient spatio-temporal modeling methods for real-time violence recognition. IEEE Access 9:76270\u201376285","journal-title":"IEEE Access"},{"key":"19144_CR13","doi-asserted-by":"crossref","unstructured":"Tan W, Liu J (2022) Detection of fights in videos: A comparison study of anomaly detection and action recognition. In: European conference on computer vision. Springer, pp 676\u2013688","DOI":"10.1007\/978-3-031-25072-9_45"},{"key":"19144_CR14","doi-asserted-by":"crossref","unstructured":"Su J, Her P, Clemens E, Yaz E, Schneider S, Medeiros H (2022) Violence detection using 3d convolutional neural networks. In: 2022 18th IEEE international conference on advanced video and signal based surveillance (AVSS). IEEE, pp 1\u20138","DOI":"10.1109\/AVSS56176.2022.9959393"},{"key":"19144_CR15","doi-asserted-by":"crossref","unstructured":"Roman DGC, Ch\u00e1vez GC (2020) Violence detection and localization in surveillance video. In: 2020 33rd SIBGRAPI conference on graphics, patterns and images (SIBGRAPI). IEEE, pp 248\u2013255","DOI":"10.1109\/SIBGRAPI51738.2020.00041"},{"key":"19144_CR16","doi-asserted-by":"publisher","first-page":"118791","DOI":"10.1016\/j.eswa.2022.118791","volume":"212","author":"H Mohammadi","year":"2023","unstructured":"Mohammadi H, Nazerfard E (2023) Video violence recognition and localization using a semi-supervised hard attention model. Expert Syst Appl 212:118791","journal-title":"Expert Syst Appl"},{"issue":"01","key":"19144_CR17","doi-asserted-by":"publisher","first-page":"2255002","DOI":"10.1142\/S0218001422550023","volume":"36","author":"M Asad","year":"2022","unstructured":"Asad M, Jiang H, Yang J, Tu E, Malik AA (2022) Multi-level two-stream fusion-based spatio-temporal attention model for violence detection and localization. Int J Pattern Recognit Artif Intell 36(01):2255002","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"19144_CR18","doi-asserted-by":"crossref","unstructured":"Selvaraju RR, Cogswell M, Das A, Vedantam R, Parikh D, Batra D (2017) Grad-cam: Visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE international conference on computer vision. pp 618\u2013626","DOI":"10.1109\/ICCV.2017.74"},{"key":"19144_CR19","doi-asserted-by":"crossref","unstructured":"Chang M-C, Krahnstoever N, Lim S, Yu T (2010) Group level activity recognition in crowded environments across multiple cameras. In: 2010 7th IEEE international conference on advanced video and signal based surveillance. IEEE, pp 56\u201363","DOI":"10.1109\/AVSS.2010.65"},{"key":"19144_CR20","unstructured":"Mayson SG (2019) Bias in, bias out. The Yale Law Journal, 2218\u20132300"},{"key":"19144_CR21","doi-asserted-by":"crossref","unstructured":"Veltmeijer E, Gerritsen C, Hindriks K (2022) Automatic recognition of emotional subgroups in images. In: Proceedings of the thirty-first international joint conference on artificial intelligence, IJCAI-22. International Joint Conferences on Artificial Intelligence Organization, pp 1363\u20131370","DOI":"10.24963\/ijcai.2022\/190"},{"issue":"10","key":"19144_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3561971","volume":"55","author":"FUM Ullah","year":"2023","unstructured":"Ullah FUM, Obaidat MS, Ullah A, Muhammad K, Hijji M, Baik SW (2023) A comprehensive review on vision-based violence detection in surveillance videos. ACM Comput Surv 55(10):1\u201344","journal-title":"ACM Comput Surv"},{"issue":"1","key":"19144_CR23","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen J (1960) A coefficient of agreement for nominal scales. Educ Psychol Meas 20(1):37\u201346","journal-title":"Educ Psychol Meas"},{"key":"19144_CR24","doi-asserted-by":"crossref","unstructured":"Landis JR, Koch GG (1977) The measurement of observer agreement for categorical data. Biom 159\u2013174","DOI":"10.2307\/2529310"},{"issue":"3","key":"19144_CR25","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh ML (2012) Interrater reliability: the kappa statistic. Biochem Med 22(3):276\u2013282","journal-title":"Biochem Med"},{"key":"19144_CR26","unstructured":"Bradski G (2000) The OpenCV Library. Dr. Dobb\u2019s Journal of Software Tools"},{"key":"19144_CR27","doi-asserted-by":"crossref","unstructured":"Fang H-S, Li J, Tang H, Xu C, Zhu H, Xiu Y, Li Y-L, Lu C (2022) Alphapose: Whole-body regional multi-person pose estimation and tracking in real-time. IEEE Trans Pattern Anal Mach Intell","DOI":"10.1109\/TPAMI.2022.3222784"},{"issue":"2","key":"19144_CR28","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1007\/s13369-022-06684-x","volume":"48","author":"AR Inturi","year":"2023","unstructured":"Inturi AR, Manikandan V, Garrapally V (2023) A novel vision-based fall detection scheme using keypoints of human skeleton with long short-term memory network. Arab J Sci Eng 48(2):1143\u20131155","journal-title":"Arab J Sci Eng"},{"key":"19144_CR29","doi-asserted-by":"publisher","first-page":"100034","DOI":"10.1016\/j.jsampl.2023.100034","volume":"2","author":"M Zw\u00f6lfer","year":"2023","unstructured":"Zw\u00f6lfer M, Heinrich D, Schindelwig K, Wandt B, Rhodin H, Sp\u00f6rri J, Nachbauer W (2023) Deep learning-based 2d keypoint detection in alpine ski racing-a performance analysis of state-of-the-art algorithms applied to regular skiing and injury situations. JSAMS Plus 2:100034","journal-title":"JSAMS Plus"},{"key":"19144_CR30","doi-asserted-by":"crossref","unstructured":"Jonker R, Volgenant T (1988) A shortest augmenting path algorithm for dense and sparse linear assignment problems. In: DGOR\/NSOR: Papers of the 16th Annual Meeting of DGOR in Cooperation with NSOR\/Vortr\u00e4ge der 16. Jahrestagung der DGOR Zusammen Mit der NSOR. Springer, pp 622\u2013622","DOI":"10.1007\/978-3-642-73778-7_164"},{"key":"19144_CR31","doi-asserted-by":"crossref","unstructured":"Virtanen P, Gommers R, Oliphant TE, Haberland M, Reddy T, Cournapeau D, Burovski E, Peterson P, Weckesser W, Bright J et\u00a0al (2020) Scipy 1.0: fundamental algorithms for scientific computing in python. Nat. Methods 17(3):261\u2013272","DOI":"10.1038\/s41592-020-0772-5"},{"key":"19144_CR32","doi-asserted-by":"crossref","unstructured":"Feichtenhofer C (2020) X3D: Expanding architectures for efficient video recognition. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp 203\u2013213","DOI":"10.1109\/CVPR42600.2020.00028"},{"key":"19144_CR33","unstructured":"Su J (2022) X3D (Accessed: 2023-07-18). GitHub"},{"key":"19144_CR34","unstructured":"Kay W, Carreira J, Simonyan K, Zhang B, Hillier C, Vijayanarasimhan S, Viola F, Green T, Back T, Natsev P et al (2017) The kinetics human action video dataset. arXiv:1705.06950"},{"key":"19144_CR35","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst 30"},{"key":"19144_CR36","unstructured":"Koot R, Hennerbichler M, Lu H (2021) Evaluating transformers for lightweight action recognition. arXiv:2111.09641"},{"issue":"12","key":"19144_CR37","doi-asserted-by":"publisher","first-page":"10400","DOI":"10.1002\/int.22537","volume":"37","author":"FUM Ullah","year":"2022","unstructured":"Ullah FUM, Obaidat MS, Muhammad K, Ullah A, Baik SW, Cuzzolin F, Rodrigues JJ, Albuquerque VHC (2022) An intelligent system for complex violence pattern analysis and detection. Int J Intell Syst 37(12):10400\u201310422","journal-title":"Int J Intell Syst"},{"issue":"8","key":"19144_CR38","doi-asserted-by":"publisher","first-page":"5359","DOI":"10.1109\/TII.2021.3116377","volume":"18","author":"FUM Ullah","year":"2021","unstructured":"Ullah FUM, Muhammad K, Haq IU, Khan N, Heidari AA, Baik SW, Albuquerque VHC (2021) Ai-assisted edge vision for violence detection in iot-based industrial surveillance networks. IEEE Trans Ind Inf 18(8):5359\u20135370","journal-title":"IEEE Trans Ind Inf"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19144-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19144-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19144-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T02:48:02Z","timestamp":1739414882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19144-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,1]]},"references-count":38,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["19144"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19144-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,1]]},"assertion":[{"value":"22 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}