Open Access
5 August 2022 Not all temporal shift modules are profitable
Youshan Zhang, Yong Li, Shaozhe Guo, Qiming Liang
Author Affiliations +
Abstract

With the increasing coverage of video surveillance systems in modern society, demand for using artificial intelligence algorithm to replace humans in violent behavior recognition has also become stronger. By moving some channels in the temporal dimension, temporary shift module (TSM) can achieve the performance of three-dimensional convolution neural network (CNN) with the complexity of two-dimensional CNN, and extract the temporal and spatial information at the same time. Our intuition is that too many temporary shift modules may fuse too much action information in each frame, which weakens the capability of CNN on spatiotemporal information extraction. To verify the aforementioned conjecture, we adjusted the network structure based on TSM, proposed partial TSM, selected the optimal model through experiments, and verified the performance of the algorithm on multiple datasets and our expanded datasets. The proposed optimal model not only reduced the memory usage of hardware but also achieved higher accuracy on multiple datasets with 77.3% running time. Meanwhile, we achieved state-of-the-art performance of 91% on RWF-2000 dataset.

CC BY: © The Authors. Published by SPIE under a Creative Commons Attribution 4.0 International License. Distribution or reproduction of this work in whole or in part requires full attribution of the original publication, including its DOI.
Youshan Zhang, Yong Li, Shaozhe Guo, and Qiming Liang "Not all temporal shift modules are profitable," Journal of Electronic Imaging 31(4), 043030 (5 August 2022). https://doi.org/10.1117/1.JEI.31.4.043030
Received: 23 February 2022; Accepted: 21 July 2022; Published: 5 August 2022
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
KEYWORDS
Convolution

Video

Video surveillance

Convolutional neural networks

Data modeling

Performance modeling

Detection and tracking algorithms

Back to Top