{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:04:29Z","timestamp":1775667869442,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"42","license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20468-5","type":"journal-article","created":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:42:08Z","timestamp":1732772528000},"page":"90177-90189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Appearance and motion-based unusual crowd events detection using multiple moving objects"],"prefix":"10.1007","volume":"83","author":[{"given":"K.","family":"Babu","sequence":"first","affiliation":[]},{"given":"L. Godlin","family":"Atlas","sequence":"additional","affiliation":[]},{"given":"S.","family":"Sreeji","sequence":"additional","affiliation":[]},{"given":"K. P.","family":"Arjun","sequence":"additional","affiliation":[]},{"given":"A.","family":"Rasmi","sequence":"additional","affiliation":[]},{"given":"P. Gururama","family":"Senthilvel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"key":"20468_CR1","first-page":"866","volume":"3","author":"PP Chaturvedi","year":"2013","unstructured":"Chaturvedi PP, Rajput AS, Jain A (2013) Video object tracking based on automatic background segmentation and updating using RBF neural network. Int J Adv Comput Res 3:866","journal-title":"Int J Adv Comput Res"},{"key":"20468_CR2","doi-asserted-by":"publisher","unstructured":"Vennila TJ, Balamurugan V (2020) A stochastic framework for keyframe extraction. 2020 Int Conf Emerg Trends Inform Technol Eng (ic-ETITE), pp. 1\u20135.  https:\/\/doi.org\/10.1109\/ic-ETITE47903.2020.294","DOI":"10.1109\/ic-ETITE47903.2020.294"},{"issue":"5","key":"20468_CR3","first-page":"1501","volume":"7","author":"T Zin","year":"2013","unstructured":"Zin T, Tin P, Toriu T, Hama H (2013) A two dimensional correlated random walk model for visual tracking. ICIC Express Letters: An Intl J Res Surv 7(5):1501\u20131506","journal-title":"ICIC Express Letters: An Intl J Res Surv"},{"issue":"2","key":"20468_CR4","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TCE.2011.5955191","volume":"57","author":"T Zin","year":"2011","unstructured":"Zin T, Tin P, Hama H, Toriu T (2011) Unattended object intelligent analyzer for consumer video surveillance. IEEE Trans Consumer Electron 57(2):549\u2013557","journal-title":"IEEE Trans Consumer Electron"},{"issue":"6","key":"20468_CR5","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TSMCC.2011.2178594","volume":"42","author":"P Oluwatoyin","year":"2012","unstructured":"Oluwatoyin P, Popoola, Wang K (2012) Video-based abnormal human behavior recognition\u2014a review. IEEE Trans Syst Man Cybern Part C Appl Rev 42(6):865\u2013878","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"issue":"1","key":"20468_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.2174\/2213275911666180719111118","volume":"11","author":"MK Asha Paul","year":"2018","unstructured":"Asha Paul MK, Kavitha J, Jansi Rani PA (2018) Key-frame extraction techniques: A review. Recent Patents Comput Sci 11(1):3\u201316","journal-title":"Recent Patents Comput Sci"},{"issue":"3","key":"20468_CR7","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/TSMCC.2008.919173","volume":"38","author":"D Brezeale","year":"2008","unstructured":"Brezeale D, Cook DJ (2008) Automatic video classification: a survey of the literature. IEEE Trans Syst, Man and Cyber-Part C: App Rev 38(3):416\u2013430","journal-title":"IEEE Trans Syst, Man and Cyber-Part C: App Rev"},{"issue":"5","key":"20468_CR8","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TSMCC.2009.2023380","volume":"39","author":"G Lavee","year":"2009","unstructured":"Lavee G, Rifling E, Rudzsky M (2009) Understanding video events: a survey of methods for automatic interpretation of semanticoccurrences in video. Syst Man Cybern Part C Appl Rev 39(5):489\u2013504","journal-title":"Syst Man Cybern Part C Appl Rev"},{"issue":"1","key":"20468_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/S0262-8856(02)00127-0","volume":"21","author":"H Buxton","year":"2003","unstructured":"Buxton H (2003) Learning and understanding dynamic scene activity: a review. Image Vis Comput 21(1):125\u2013136","journal-title":"Image Vis Comput"},{"issue":"3","key":"20468_CR10","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TSMCC.2004.829274","volume":"34","author":"W Hu","year":"2004","unstructured":"Hu W, Tan T, Wang L, Maybank S (2004) A survey on visual surveillance of object motion and behaviors. IEEE Trans Syst Man Cybern Part C Appl Rev 34(3):334\u2013352","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"issue":"5\u20136","key":"20468_CR11","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s00138-008-0152-0","volume":"19","author":"N Haering","year":"2008","unstructured":"Haering N, Venetianer PL, Lipton A (2008) The evolution of video surveillance: an overview. Mach Vis Appl 19(5\u20136):279\u2013290","journal-title":"Mach Vis Appl"},{"issue":"5","key":"20468_CR12","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/TSMCC.2010.2042446","volume":"40","author":"TD Raty","year":"2010","unstructured":"Raty TD (2010) Survey on contemporary remote surveillance systems for public safety. IEEE Trans Syst Man Cybern Part C Appl Rev 40(5):493\u2013515","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"key":"20468_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41:1\u201358","journal-title":"ACM Comput Surv"},{"key":"20468_CR14","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha A, Park J (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw 51:3448\u20133470","journal-title":"Comput Netw"},{"key":"20468_CR15","first-page":"774","volume":"24","author":"VN Vapnik","year":"1963","unstructured":"Vapnik VN, Lerner A (1963) Pattern recognition using generalized portrait method. Autom Remote Control 24:774\u2013780","journal-title":"Autom Remote Control"},{"key":"20468_CR16","doi-asserted-by":"publisher","unstructured":"Cui X, Liu Q, Gao M, Metaxas DN (2013) Abnormal detection using interaction energy potentials. In: Proceedings of the 25th IEEE Int Conf Computer Vision and Pattern Recogn. Providence. https:\/\/doi.org\/10.1109\/CVPR.2011.5995558","DOI":"10.1109\/CVPR.2011.5995558"},{"key":"20468_CR17","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.future.2018.03.020","volume":"85","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset M, El-Shahat D, Mirjalili S (2018) A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem. Future Gener Comput Syst 85:129\u2013145","journal-title":"Future Gener Comput Syst"},{"issue":"5\u20136","key":"20468_CR18","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1007\/s00779-018-1132-7","volume":"22","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset M, Manogaran G, Abdel-Fatah L, Mirjalili S (2018) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. Pers Ubiquitous Comput 22(5\u20136):1117\u20131132","journal-title":"Pers Ubiquitous Comput"},{"issue":"3","key":"20468_CR19","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10617-018-9203-6","volume":"22","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset M, Manogaran G, Gamal A, Smarandache F (2018) A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria. Des Autom Embed Syst 22(3):257\u2013278","journal-title":"Des Autom Embed Syst"},{"key":"20468_CR20","doi-asserted-by":"publisher","first-page":"1595","DOI":"10.1007\/s00521-018-3404-6","volume":"31","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset M, Gunasekaran M, Mohamed M, Smarandache F (2018) A novel method for solving the fully neutrosophic linear programming problems. Neural Comput Appl 31:1595","journal-title":"Neural Comput Appl"},{"key":"20468_CR21","doi-asserted-by":"publisher","first-page":"5419","DOI":"10.1007\/s11042-018-6266-0","volume":"79","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset M, Manogaran G, Fakhry AE, El-Henawy I (2018) 2-Levels of clustering strategy to detect and locate copy-move forgery in digital images. Multimed Tools Appl 79:5419","journal-title":"Multimed Tools Appl"},{"key":"20468_CR22","first-page":"e4515","volume":"31","author":"M Manogaran","year":"2018","unstructured":"Manogaran M, Mohamed G, Rushdy ME (2018) Internet of things in smart education environment: supportive framework in the decision-making process. Concurr Comput Pract Exp 31:e4515","journal-title":"Concurr Comput Pract Exp"},{"key":"20468_CR23","doi-asserted-by":"publisher","unstructured":"Mehran R, Oyama A, Shah M (2009) Abnormal crowd behavior detection using social force model. In: Proceedings of the 22nd IEEE International Conference on Computer Vision and Pattern Recognition. Miami. https:\/\/doi.org\/10.1109\/CVPR.2009.5206641","DOI":"10.1109\/CVPR.2009.5206641"},{"key":"20468_CR24","first-page":"185","volume":"17","author":"BKP Horn","year":"1981","unstructured":"Horn BKP, Schunck BG (1981) Determining optical flow. ArtifIntell 17:185\u2013203","journal-title":"ArtifIntell"},{"issue":"4","key":"20468_CR25","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/TPAMI.2014.2353628","volume":"37","author":"Hu Weiming","year":"2015","unstructured":"Weiming Hu, Li W, Zhang X, Maybank S (2015) Single and multiple object tracking using a multi-feature joint sparse representation. IEEE Trans Pattern Recognit Mach Intell 37(4):816\u2013833","journal-title":"IEEE Trans Pattern Recognit Mach Intell"},{"key":"20468_CR26","unstructured":"Lucas BD, Kanade T (1981) An iterative image registration technique with an application to stereo vision. Proc 7th Intl Joint Conf Artif Intell. Vancouver"},{"key":"20468_CR27","doi-asserted-by":"publisher","unstructured":"Shi J, Tomasi C (1994) Good features to track. Proc 7th IEEE Intl Conf Computer Vision and Pattern Recogn. Seattle.  https:\/\/doi.org\/10.1109\/CVPR.1994.323794","DOI":"10.1109\/CVPR.1994.323794"},{"key":"20468_CR28","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1006\/rtim.1996.0060","volume":"4","author":"K Daniilidis","year":"1998","unstructured":"Daniilidis K, Krauss C, Hansen M, Sommer G (1998) Real-time tracking of moving objects with an active camera. Real-Time Imaging 4:3\u201320","journal-title":"Real-Time Imaging"},{"key":"20468_CR29","unstructured":"Huang C, Chen Y, Fu L (2009) Real-time object detection and tracking on a moving camera platform. Proc IEEE ICCAS-SICE. Fukuoka"},{"key":"20468_CR30","doi-asserted-by":"publisher","first-page":"7156","DOI":"10.3390\/s150407156","volume":"15","author":"T Wang","year":"2015","unstructured":"Wang T, Snoussi H (2015) Detection of abnormal events via optical flow feature analysis. Sensors 15:7156\u20137171","journal-title":"Sensors"},{"key":"20468_CR31","volume-title":"Learning with Kernels: Support Vector Machines, Regularization, and Optimization and Beyond","author":"B Schlkopf","year":"2002","unstructured":"Schlkopf B, Smola AJ (2002) Learning with Kernels: Support Vector Machines, Regularization, and Optimization and Beyond. MIT Press, Cambridge"},{"key":"20468_CR32","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1016\/j.patcog.2006.07.009","volume":"40","author":"H Hoffmann","year":"2007","unstructured":"Hoffmann H (2007) Kernel PCA for novelty detection. Pattern Recognit 40:863\u2013874","journal-title":"Pattern Recognit"},{"key":"20468_CR33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389","volume-title":"An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods","author":"N Cristianini","year":"2000","unstructured":"Cristianini N, Shawe-Taylo J (2000) An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge University Press, Cambridge"},{"key":"20468_CR34","doi-asserted-by":"publisher","unstructured":"Elhoseny M (2020) Multi-object detection and tracking (MODT) machine learning model for real-time video surveillance systems. Circuits systems and signal processing. Springer, pp 611\u2013630. https:\/\/doi.org\/10.1007\/s00034-019-01234-7","DOI":"10.1007\/s00034-019-01234-7"},{"key":"20468_CR35","doi-asserted-by":"publisher","unstructured":"Shehzed A, Jalal A, Kim K (2019) Multi-person tracking in smart surveillance system for crowd counting and normal\/abnormal events detection. Proc 2019 Intl Conf App Eng Math. Taxila, pp 163\u2013168 https:\/\/doi.org\/10.1109\/ICAEM.2019.8853756","DOI":"10.1109\/ICAEM.2019.8853756"},{"key":"20468_CR36","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TCE.2011.6018870","volume":"57","author":"JS Kim","year":"2011","unstructured":"Kim JS, Yeom DH, Joo YH (2011) Fast and robust algorithm of tracking multiple moving objects for intelligent video surveillance systems. IEEE Trans Consumer Electron 57:1165\u20131170","journal-title":"IEEE Trans Consumer Electron"},{"key":"20468_CR37","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1007\/s11554-018-0840-6","volume":"17","author":"A Balasundaram","year":"2020","unstructured":"Balasundaram A, Chellappan C (2020) An intelligent video analytics model for abnormal event detection in online surveillance video. J Real-Time Image Proc 17:915\u2013930","journal-title":"J Real-Time Image Proc"},{"issue":"8","key":"20468_CR38","doi-asserted-by":"publisher","first-page":"8753","DOI":"10.1109\/JSEN.2023.3242007","volume":"23","author":"TJ Vennila","year":"2023","unstructured":"Vennila TJ, Balamurugan V (2023) A rough set framework for multihuman tracking in surveillance video. IEEE Sensors J 23(8):8753\u20138760. https:\/\/doi.org\/10.1109\/JSEN.2023.3242007","journal-title":"IEEE Sensors J"},{"issue":"19","key":"20468_CR39","doi-asserted-by":"publisher","first-page":"24843","DOI":"10.1007\/s11042-018-5701-6","volume":"77","author":"M Gnouma","year":"2018","unstructured":"Gnouma M, Ejbali R, Zaied M (2018) Abnormal events\u2019 detection in crowded scenes. Multimed Tools App 77(19):24843\u201324864","journal-title":"Multimed Tools App"},{"key":"20468_CR40","first-page":"1","volume":"1","author":"BH Lohithashva","year":"2019","unstructured":"Lohithashva BH, Aradhya M, Basavaraju HT, Harish BS (2019) Unusual crowd event detection: an approach using probabilistic neural network. Proc Fifth Intl Conf India 1:1\u20139","journal-title":"Proc Fifth Intl Conf India"},{"key":"20468_CR41","doi-asserted-by":"publisher","first-page":"80408","DOI":"10.1109\/ACCESS.2020.2990355","volume":"8","author":"C Direkoglu","year":"2020","unstructured":"Direkoglu C (2020) Abnormal crowd behavior detection using motion information images and convolutional neural networks. IEEE Access 8:80408\u201380416","journal-title":"IEEE Access"},{"key":"20468_CR42","first-page":"1","volume":"15","author":"R Lalit","year":"2022","unstructured":"Lalit R, Purwar RK (2022) Crowd abnormality detection using optical flow and GLCM-based texture features. JITR 15:1\u201315","journal-title":"JITR"},{"key":"20468_CR43","doi-asserted-by":"publisher","unstructured":"Rajasekaran G, Raja Sekar J (2023) Abnormal crowd behavior detection using optimized pyramidal lucas-kanade technique. Intell Automation Soft Comput, pp 2439\u20132412. https:\/\/doi.org\/10.32604\/iasc.2023.029119","DOI":"10.32604\/iasc.2023.029119"},{"key":"20468_CR44","first-page":"130","volume-title":"Symmetry-driven accumulation of local features for human characterization and re-identification","author":"L Bazzani","year":"2013","unstructured":"Bazzani L, Murino MCV (2013) Symmetry-driven accumulation of local features for human characterization and re-identification. Elsevier, Computer Vision and Image Processing, pp 130\u2013144"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20468-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20468-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20468-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T20:08:02Z","timestamp":1735416482000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20468-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"references-count":44,"journal-issue":{"issue":"42","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["20468"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20468-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"9 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}