vision-based hand motion recognition for insider sabotage ... · vision-based hand motion...

58
Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI Department of Nuclear Engineering and Management School of Engineering The University of Tokyo International Conference on Physical Protection of Nuclear Material and Nuclear Facilities 1317 November 2017, Vienna, Austria IAEA-CN-254-111

Upload: others

Post on 21-May-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning

Shi CHEN, Kazuyuki DEMACHI

Department of Nuclear Engineering and Management

School of Engineering

The University of Tokyo

International Conference on Physical Protection of Nuclear Material and Nuclear Facilities

13–17 November 2017, Vienna, Austria

IAEA-CN-254-111

Page 2: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

2017/11/16

Contents

1. Introduction

2. Hand Motion Capture

3. Behavior Recognition

4. Robustness Verification

5. Conclusion & Future Work

2

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 3: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

1.1. Significance of Nuclear Security

Increasing attention towards the site of nuclear facilities;

The important functions of nuclear facilities are opened to public through

media and internet.

Increasing threats of terrorism after Fukushima Daiichi Accident

(http://www.mofa.go.jp/mofaj/dns/n_s_ne/page22_000968.html)

32017/11/16

“What can happen by natural

disaster also can be made to

happen by human design.”

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 4: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Deterrence Detection Delay Response

1.2. Importance of Insider Sabotage Detection

4

Outsider Insider

Time Limitation

If detection was failed, delay and response would not be activated

Two-man rule

Trustworthiness confirmation

Physical Protection System

(PPS)

2017/11/16

Sabotage Type

PPS

Deterrence is invalid for insider;

Difficult to distinguish malicious

insider from ordinary worker and

monitor everyone in nuclear facility;

Difficult to distinguish sabotage

behaviors from maintenance

behaviors.

Difficulties in Insiders’ Sabotage Prevention

Detection technology should be enhanced!.

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 5: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

1.3. Proposal of Hand Motion Analysis

5

5

1.A. Body Behavior

(Detection of Specific Motion)

1.B. Hand Behavior

(Detection of Specific Motion)

1.C. Tool Tracking

(Malicious or not)

1.D. Hidden Objects

(Disappearance of objects)

2017/11/16

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Connecting / Disconnecting a Cable

Turning on / off a Switch

Turning a Screw using a Screwdriver

Inserting a USB Device

Putting / Taking a Suspicious Object

⋮ “Could these sabotage motions be distinguished

by only body motion analysis?”

SBO?

Reactor Out of Control?

Loss of Safety Function?

Personal Injury?

Page 6: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

1.3. Proposal of Hand Motion Analysis

6

6

Hand motion analysis is necessary.

3D fingertip position is more essential in order to determine

the hand motion.

2017/11/16

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Criminal Detection

Sign language Communication

Human-computer Interaction for

AR, VR, IoT……

Wide Range of Applications

Page 7: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

7

Ordinary Maintenance

Behavior Sabotage

Hidden in Ordinary Maintenance Behavior

2017/11/16

1.4. Proposal of Time-Series Data Analysis

Normal behaviors of ordinary maintenance

are complicated and diverse

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Challenge of Distinguish Sabotage Behaviors

from Maintenance Behaviors

Page 8: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

1.4. Proposal of Time-Series Data Analysis

8

8

Coventional Research

By feature extraction using Deep Learning,

data compression can be proceed and calculated amount can be reduced.

More scenes;

More detail information;

Time variation information

can be detected;

Reduced calculated amount.

Time Series Data Analysis

Distinguish of malicious behaviors

and ordinary maintenance behaviors

is possible.

2017/11/16

Static Image Analysis

Maintenance behaviors Sabotage behaviors

Similarity?Time

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Frame 1

Frame 2

Frame 3

Frame 4

Frame N

⋮ ⋮

Frame 1

Frame 2

Frame 3

Frame 4

Frame N

Page 9: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Hand Motion Analysis

Objective1:Hand Motion Capture

Objective2:Behavior Recognition

Objective3:Robustness Verification

X1

X2X4

X5

X3

To distinguish sabotage behaviors from ordinary maintenance behaviors

1.5. Research Objectives

Detection of Insiders’ Sabotage for Nuclear Security.

9

Hand Motion Time Series Data

2017/11/16

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

New Vision-based Algorithm

Time-Series Data Analysis Deep Learning

Page 10: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Contents

102017/11/16

1. Introduction

2. Hand Motion Capture

3. Behavior Recognition

4. Robustness Verification

5. Conclusion & Future Work

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 11: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

1. Hand Region Classification

2. Fingers Segmentation

3. Fingers Identification

4. Real-time Hand Motion Capture

Body Segmentation

Hand Segmentation

Hand Pixels Classification

Segmenting fingers from palm.

Identifying each finger name.

Thumb

Index FingerMiddle Finger

Ring Finger

Little Finger

2.1. New Algorithm of Hand Motion Capture

11

Developing hand motion capturing

system by Microsoft Visual Studio

(coding by C#)

Using Kinect v2

Data Acquisition

2017/11/16

To capture hand motion, development

of new algorithm is necessary

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 12: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Positions of each fingertips was successfully obtained;

The real-time calculating frame rate is about 29.8fps.

Unit: (m)

Unit: (frame)

2.2. Real-time Hand Motion Capture Result of Real-time Hand Motion Capture Time Variation of Fingertips

122017/11/16

(Shi Chen, Kazuyuki Demachi, Tomoyuki Fujita, Yutaro Nakashima, Yusuke Kawasaki, “Insider Malicious Behaviors Detection and Prediction Technology

for Nuclear Security”, E-journal of Advanced Maintenance (EJAM), Vol.9, No.1, 2017.)

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 13: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Contents

132017/11/16

1. Introduction

2. Hand Motion Capture

3. Behavior Recognition

4. Robustness Verification

5. Conclusion & Future Work

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 14: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

14

Cutting

Patting

Grasping

Pushing

Assumed Malicious Motions

Turning

2017/11/16

3.1. Time-Series Data Conversion

Captured Hand Motion Data Hand motion captured from 5 person;

Different relative distance and angle to camera.

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Motions other than these are

considered as ordinary motions

Page 15: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

3.2. Motion Classification by Deep Learning

Feature Extraction Stacked Auto-Encoder Pattern Classification

152017/11/16

Input Features I OutputInput

(Features I)Features II Output

Input

(Features II)Softmax

classifier

x3

ො𝐱𝟖

𝐡𝟐(𝟏)

x4

x5

x6

x7

x8

x2

+1

𝐡𝟑(𝟏)

𝐡𝟒(𝟏)

𝐡𝟓(𝟏)

𝐡𝟔(𝟏)

+𝟏

ො𝐱𝟕

ො𝐱6

ො𝐱5

ො𝐱𝟒

ො𝐱𝟑

ො𝐱𝟐

𝐡𝟐(𝟏)

𝐡𝟑(𝟏)

𝐡𝟒(𝟏)

𝐡𝟓(𝟏)

𝐡𝟔(𝟏)

+𝟏

𝐡𝟐(𝟐)

𝐡𝟑(𝟐)

𝐡𝟒(𝟐)

𝐡𝟓(𝟐)

+𝟏

መ𝐡𝟐(𝟏)

መ𝐡𝟑(𝟏)

መ𝐡𝟒(𝟏)

መ𝐡𝟓(𝟏)

መ𝐡𝟔(𝟏)

x1

𝐡𝟏(𝟏)

ො𝐱𝟏

𝐡𝟏(𝟏) መ𝐡𝟏

(𝟏)

𝐡𝟏(𝟐)

𝐡𝟐(𝟐)

𝐡𝟑(𝟐)

𝐡𝟒(𝟐)

𝐡𝟓(𝟐)

+𝟏

𝐡𝟏(𝟐)

p3

p4

p5

p2

p1 p(y = 1 | x)

p(y = 2 | x)

p(y = 3 | x)

p(y = 4 | x)

p(y = 5 | x)

Probability of Different

Malicious Motions

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Cutting

Patting

Grasping

Pushing

Assumed Malicious Motions

Turning

Page 16: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

3.3. Behavior Recognition ResultTesting Result

16

Training Time: 1217s/43340frame

Detection Time: 0.0023s/frame Real-time detection is possible.

2017/11/16

Probability

of Motion

Frames

1

0.8

0.6

0.4

0.2

━ Pushing

━ Grasping

━ Cutting

━ Patting

━ TurningPushing Ordinary Grasping Ordinary Cutting Ordinary Patting Ordinary Turning

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

71,85%

83,57%

100,00%

93,31%

100,00%

100,00%

Ordinary

Turning

Patting

Cutting

Grasping

Pushing

Accuracy

Overall Accuracy: 82.555%

Page 17: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

2017/11/16

Contents

1. Introduction

2. Hand Motion Capture

3. Behavior Recognition

4. Robustness Verification

5. Conclusion & Future Work

17

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 18: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

4. Robustness Verification

182017/11/16

Types of data loss problems

“Can we still achieve satisfied detection results

when some frames of image data are loss?”

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

1) Discontinuous frames loss problem

2) Continuous frames loss problem

Frame 1 Frame 2 Frame 3 Frame 4 Frame 5 Frame 6 Frame 7 Frame 8 Frame 9

Frame 1 Frame 2 Frame 3 Frame 4 Frame 5 Frame 6 Frame 7 Frame 8 Frame 9

Page 19: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

4.1. Discontinuous Frames Loss Problem

192017/11/16

Verification Method

Randomly selecting 1 frame from each 5 continuous frames;

Randomly selecting 1 frame from each 3 continuous frames;

Randomly selecting 1 frame from each 2 continuous frames.

Randomly Selection of Lost Data

20% data lost1000 samples was

randomly generated33% data lost

0.1

0.2

0.8

1.2

1.6

1.7

0.3

0.1

0.8

0.9

1.6

2.1

0.4

0.1

0.9

0.8

1.7

2.2

0.5

0.3

1.1

0.6

1.8

2.5

0.5

0.5

1.2

0.3

1.9

2.5

…… ……

N continuous frames

Randomly Selected

as data lost frame

0.4

0.1

0.9

0.8

1.7

2.2

50% data lost

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 20: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

4.1. Discontinuous Frames Loss Problem

202017/11/16

Verification Results

Pushing Grasping Cutting Patting Turning Normal

Original (%) 100 100 93.305 100 83.575 71.849

20% of Data Loss (%) 100 100 91.246 100 83.488 70.922

33% of Data Loss (%) 100 100 90.751 100 83.074 70.282

50% of Data Loss (%) 100 100 87.740 100 81.339 68.822

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 21: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

212017/11/16

Accuracy:

2.368%

50% data loss

Overa

ll A

ccu

racy

Degrees of Data Loss

Feature of each motion can be

learned by time series data analysis

Robustness

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Verification Results

4.1. Discontinuous Frames Loss Problem

Page 22: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

4.2. Continuous Frames Loss Problem

222017/11/16

Randomly selecting 10 continuous

frames from each 100 continuous

frames;

Randomly selecting 20 continuous

frames from each 100 continuous

frames;

Randomly selecting 30 continuous

frames from each 100 continuous

frames;

Randomly selecting 40 continuous

frames from each 100 continuous

frames;

Randomly selecting 50 continuous

frames from each 100 continuous

frames.

Randomly Selection of Lost Data

1000 samples was

randomly generated

0.1

0.2

0.8

1.2

1.6

1.7

0.3

0.1

0.8

0.9

1.6

2.1

0.4

0.1

0.9

0.8

1.7

2.2

0.5

0.3

1.1

0.6

1.8

2.5

0.5

0.5

1.2

0.3

1.9

2.5

…… ……

N continuous frames

Randomly Selected as

data lost frames

0.4

0.1

0.9

0.8

1.7

2.2

0.6

0.7

1.2

0.2

1.9

2.6

0.6

0.8

1.3

0.2

2.0

2.7

0.7

0.8

1.4

0.1

2.0

2.8

0.4

0.1

0.9

0.8

1.7

2.2

0.4

0.1

0.9

0.8

1.7

2.2

0.4

0.1

0.9

0.8

1.7

2.2

0.4

0.1

0.9

0.8

1.7

2.2

K continuous

data lost frames

10% data lost

20% data lost

30% data lost

40% data lost

50% data lost

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Verification Method

Page 23: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

232017/11/16

Pushing Grasping Cutting Patting Turning Normal

Original (%) 100 100 93.305 100 83.575 71.849

10% of Data Loss (%) 99.998 99.480 89.302 99.998 80.887 68.624

20% of Data Loss (%) 99.600 93.655 89.302 96.709 74.754 68.624

30% of Data Loss (%) 95.663 84.075 81.857 89.312 68.257 60.027

40% of Data Loss (%) 87.432 76.408 78.909 82.773 63.479 57.001

50% of Data Loss (%) 82.226 72.223 76.368 79.088 59.977 53.949

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

4.2. Continuous Frames Loss ProblemVerification Results

Page 24: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

242017/11/16

Accuracy:

19.444%

50% data loss

Overa

ll A

ccu

racy

Degrees of Data Loss

Feature of each motion can be

learned by time series data analysis

Robustness

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

4.2. Continuous Frames Loss ProblemVerification Results

Page 25: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

2017/11/16

Contents

1. Introduction

2. Hand Motion Capture

3. Behavior Recognition

4. Robustness Verification

5. Conclusion & Future Work

25

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 26: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

5.1 Conclusion

For detection of insiders’ sabotage behaviors, a new hand motion detection

algorithm was proposed;

Real-time hand motion capturing system was developed and time series data

of each fingertip was successfully obtained with 29.8fps;

26

Behavior recognition method was developed by using Time-Series Data

Analysis.

Assumed malicious motions can be classified into different patterns and

detected with high accuracy in short time, thus real-time detection is possible.

Objective1:

Hand Motion Capture

Objective2:

Behavior Recognition

2017/11/16

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 27: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

5.1 Conclusion

Even though dealing with 50% data loss, the accuracy decreases only 2.368%

and 19.444% for discontinuous and continuous frames loss problem. Thus, our

behavior recognition method can be considered as a robust method.

27

Objective3:

Robustness Verification

2017/11/16

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 28: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

5.2 Future Work

The hand motion detection algorithm will be improved to achieve practicality

(e.g. recognition finger motion when capturing tool).

Detailed motion classification and a malicious motion database will be

generated;

Prediction of malicious motions for earlier response.

282017/11/16

1. Introduction 2. Hand Motion Capture 3. Behavior Recognition5. Conclusion

& Future Work4. Robustness Verification

IAEA-CN-254-111

Page 29: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Thank you for your kind attention!

292017/11/16 IAEA-CN-254-111

Page 30: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Q & A Pages

302017/11/16 IAEA-CN-254-111

Page 31: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Detection of suspicious behavior

Sign language translation

Identification of Finger-Hand-Arm behavior

Accurate Tracking of Finger Tip Position

Virtual display

IoT by hand sign (not by voice)

• Marker tracking for raw DB• Model based feature extraction• Model based estimation• Correlation among time-series of

each finger tip

• Database of fingertip time series data in multi-variable space

• Clustering and classification of motion • Construction of Database• Identification by this DB

Probabilistic Estimation of hidden fingers

• Some finger may not visible• Need to estimate true position of

finger tip• Probabilistic estimation due to

history, restriction, experience

Estimation of hidden fingers

Information Entropy ?

©出町和之

Page 32: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Kinect v2 is the new version of game

controller technology introduced by

Microsoft.

Improved Body TrackingTracks as many as 6 complete skeletons

and 25 joints per person

Depth Sensing

512 x 424

30 Hz

FOV: 70 x 60

One mode: 0.5–4.5 meters

1080p Color Camera 30 Hz (15 Hz in low light)

New Active Infrared (IR) Capabilities 512 x 424

30 Hz

Key Features

322017/11/16

Kinect v2

IAEA-CN-254-111

Page 33: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Skeleton Frame Depth Frame Body Index Frame

Color Frame Infrared Frame

512 x 424

30Hz

512 x 424

30Hz

1080P

30Hz 512 x 424

30Hz

25 Joints

332017/11/16

Kinect v2

IAEA-CN-254-111

Page 34: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Body Index Frame

512 x 424;

30FPS.

Skeleton Frame

Joint Point

Hand SegmentationBody Segmentation

342017/11/16

W

H

The values of W & H depends on the

distance from human body to camera.

New Development for Hand Region Classification

IAEA-CN-254-111

Page 35: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

d d

Wrist Position Wrist Position

Bend Hand Pixels Stretched Hand Pixels

I. Get left & right hand wrist position (using Kinect

Skeleton Frame);

II. Distinguish left & right hand;

III. Get each bend fingers part of left & right hands by a

threshold.

① ② ③ ④

Bend Finger Calculation

Threshold (0.05m)

Depth

35

Left Right

① Left bend part

② Left stretched part

③ Right bend part

④ Right stretched part

2017/11/16

New Development for Hand Region Classification

IAEA-CN-254-111

Page 36: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Pixels in hand region was

successfully classified into

different parts: Red pixels: stretched hand region

Yellow pixels: bend hand region

Black pixels: background

Result of Hand Region Classification

362017/11/16

New Development for Hand Region Classification

IAEA-CN-254-111

Page 37: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

NoisesCan be Filtered by analyzing body

index data and depth data of

Kinect.

Segmenting stretched fingers from palm.

372017/11/16

New Development for Fingers Segmentation

IAEA-CN-254-111

Page 38: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Fingers was successfully

segmented from palm.

Result of Fingers Segmentation

382017/11/16

New Development for Fingers Segmentation

IAEA-CN-254-111

Page 39: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

K = 51. K initial "means" (in this case K=5) are

randomly generated within the data domain;

2. K clusters are created by associating every

observation with the nearest mean;

3. The centroid of each of the K clusters

becomes the new mean;

4. Steps 2 and 3 are repeated until

convergence has been reached.

(Ray S, Turi RH, “Determination of number of clusters in K-means clustering and application in colour image segmentation”, Proceedings of the 4th international

conference on advances in pattern recognition and digital techniques (ICAPRDT‘99), Calcutta, India, pp 137–143.)

392017/11/16

K-means Clustering Algorithm

IAEA-CN-254-111

Page 40: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Wrist Point

Centroid of Cluster

For each cluster of finger pixels, the fingertip is

the pixel which has closest distance to camera.

Fingertip

Calculation

Result of K-means Clustering

Different initial means

can result in different

final clusters.

Disadvantage

402017/11/16

Fingers Identification

IAEA-CN-254-111

Page 41: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

412017/11/16

Fingers Identification

If P1×P2 > 0, then P1 is in the clockwise

direction of P2, otherwise P1 is in the

counter clockwise direction of P2.

Cross Product Calculation

To get relative positions all five

vectors of finger.

Bubble Sort Algorithm

IAEA-CN-254-111

Page 42: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Neural Networks

422017/11/16

The bias has the effect of increasing or lowering the net

input of the activation function, depending on whether it

is positive or negative, respectively.

IAEA-CN-254-111

Page 43: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Deep Neural Networks

432017/11/16 IAEA-CN-254-111

Page 44: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Stacked Auto-Encoder

44

A stacked autoencoder enjoys all the

benefits of any deep network of greater

expressive power. Further, it often captures a

useful "hierarchical grouping" or "part-whole

decomposition" of the input.

(Stanford University UFLDL Tutorial:

http://ufldl.stanford.edu/wiki/index.php/Stacked_Autoencoders

)

2017/11/16 IAEA-CN-254-111

Page 45: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Stacked Auto-Encoder

452017/11/16 IAEA-CN-254-111

Page 46: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

462017/11/16

Time,t

Time Series Data of Finger Position Xi(t)

fast

slow

FFT of Xi(t)

Frequency, fffastfslow

Frequency of largest amplitude

Normalized for Training

fnorm

Time,t

Normalized Time Series Data of Finger Position Xi(t)

Xi(t*fnorm/ffast)

Xi(t*fnorm/fslaw)

How to identify a same hand behavior with different speed

IAEA-CN-254-111

Page 47: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

472017/11/16

RGB Image

2D Hand Motion

( X, Y )

3D Hand Motion

( X, Y,

Z )

RGB-based Depth

Data Calculation

RGB-based 3D Hand Motion Detection Detection Model Enhancement

Hand

Body

Sound ……

Practical Problem Solution

Tool Tracking Obstacle

Prediction

AI-based Strategy-support

System using Deep Neural

Network

BDBT Coping

Training System

Detailed Motion

Classification

IAEA-CN-254-111

Future Work

Page 48: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

482017/11/16

Result (2D positions) Using Convolutional Neural Network (CNN) to learn

features of images and estimate position of each body

joint;

Cascade of Pose Regressors.

(Toshev, Alexander, and Christian Szegedy. "Deeppose: Human pose estimation via deep neural networks." Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2014.)

Human Pose Estimation via Deep Neural Networks

2D Hand Motion Estimation

IAEA-CN-254-111

2D Hand Motion Detection

Page 49: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

492017/11/16

RGB Image

Capturing RGB images

using stereo camera.

Stereo Camera

Creating depth image

from RGB image using

stereo vision algorithm.

Implementing depth image for

fingertip detection based on current

algorithm and physical model of hand.

③Disparity map

Depth map

Rectified stereo pair

2D Hand Motion

( X, Y )

3D Hand Motion

( X, Y,

Z )

IAEA-CN-254-111

3D Hand Motion Detection

Page 50: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

502017/11/16

① Hand

② Body

Physical Model

By enhanced the

detection physical

model with body, more

complex malicious

motion can be detected.

3D Position

(X, Y, Z)

IAEA-CN-254-111

Detection Model Enhancement

Page 51: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

512017/11/16

Sound InformationSound Recognition using Recurrent Neural Network (RNN)

Malicious?

Ordinary?

① Hand

② Body

Physical Model

IAEA-CN-254-111

Detection Model Enhancement

Page 52: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

52

The edge of fingers and tool can be

detected by using Canny edge detector

2017/11/16

Proposal for recognition of finger motion when capturing tool

IAEA-CN-254-111

Practical Problem Solution

Page 53: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

532017/11/16

The edge of fingers and tool

can be detected by using

Canny edge detector

Tool detection and tracking

(boundary of tool can be

detected)

Proposal for recognition of finger motion when capturing tool

3D Hand Motion

( X, Y,

Z )

IAEA-CN-254-111

Practical Problem Solution

Page 54: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

542017/11/16

障害物

同一の特徴量

障害物

Parts of hand or body hidden in obstacle

IAEA-CN-254-111

Practical Problem Solution

Page 55: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

552017/11/16

Cutting

Patting

Grasping

Pushing

Turning

Features of Detected Sign

Malicious Motion Classification Database Hand motion captured from 5 person;

Different relative distance and angle to camera.

Probability of Predicted Motion

By using deep neural

network, features of

detected sign can be

learned and future

malicious motion can

be predicted.

Prediction for Earlier Response

IAEA-CN-254-111

Practical Problem Solution

Page 56: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

562017/11/16

Terrorist

Army

Security

Safety

Security

Army

Safety Player Army Player

Security Player Terrorist Player

Controller Teacher

Hypothetical Plant

Table Top Training System

Controller

Teacher

Strategies Database

Finding vulnerabilityBDBT (Beyond Design Based Threat)

IAEA-CN-254-111

Development of the BDBT Coping Training System

Page 57: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

572017/11/16

Initial Event 1

Initial Event 2

Initial Event 3

Initial Event 4

Initial Event 5

Initial Event 6

Initial Event 7

Initial Event 8

Initial Event 9

Initial Event 10

Deep Neural Network Trained by using Nuclear Security Strategies Database

Strategies Database

Strategy Scenario 1-1

Strategy Scenario 1-2

Strategy Scenario 2-1

Strategy Scenario 2-3

Strategy Scenario 3-1

Strategy Scenario 1-3

Strategy Scenario 2-2

Strategy Scenario 3-3

Strategy Scenario 4-1

Strategy Scenario 4-2

Success Scenario

Failure Scenario

New Event

AI-based Strategy-support System using Deep Neural Network

Alternative Strategy Scenario 1

Alternative Strategy Scenario 2

Alternative Strategy Scenario 3

Alternative Strategy Scenario 4

IAEA-CN-254-111

Development of the BDBT Coping Training System

Page 58: Vision-based Hand Motion Recognition for Insider Sabotage ... · Vision-based Hand Motion Recognition for Insider Sabotage Detection using Deep Learning Shi CHEN, Kazuyuki DEMACHI

Thank you for your kind attention!

582017/11/16 IAEA-CN-254-111