36
0

Anomaly Detection Using Computer Vision: A Comparative Analysis of Class Distinction and Performance Metrics

Abstract

This paper showcases an experimental study on anomaly detection using computer vision. The study focuses on class distinction and performance evaluation, combining OpenCV with deep learning techniques while employing a TensorFlow-based convolutional neural network for real-time face recognition and classification. The system effectively distinguishes among three classes: authorized personnel (admin), intruders, and non-human entities. A MobileNetV2-based deep learning model is utilized to optimize real-time performance, ensuring high computational efficiency without compromising accuracy. Extensive dataset preprocessing, including image augmentation and normalization, enhances the models generalization capabilities. Our analysis demonstrates classification accuracies of 90.20% for admin, 98.60% for intruders, and 75.80% for non-human detection, while maintaining an average processing rate of 30 frames per second. The study leverages transfer learning, batch normalization, and Adam optimization to achieve stable and robust learning, and a comparative analysis of class differentiation strategies highlights the impact of feature extraction techniques and training methodologies. The results indicate that advanced feature selection and data augmentation significantly enhance detection performance, particularly in distinguishing human from non-human scenes. As an experimental study, this research provides critical insights into optimizing deep learning-based surveillance systems for high-security environments and improving the accuracy and efficiency of real-time anomaly detection.

View on arXiv
@article{tusher2025_2503.19100,
  title={ Anomaly Detection Using Computer Vision: A Comparative Analysis of Class Distinction and Performance Metrics },
  author={ Md. Barkat Ullah Tusher and Shartaz Khan Akash and Amirul Islam Showmik },
  journal={arXiv preprint arXiv:2503.19100},
  year={ 2025 }
}
Comments on this paper