Detecting behavioral deviations by measuring eye movements

ABSTRACT

Detecting behavioral deviations in members of a cohort group is provided. Ocular metadata is analyzed to identify patterns in changes in a size of a pupil of an eye of a member of the cohort group captured by a set of cameras. The ocular metadata describes the changes in the size of the pupil. The patterns in the changes in the size of the pupil include a rate of changes in the size of the pupil, a degree of change in the size of the pupil, and a number of changes in the size of the pupil. The patterns in the changes in the size of the pupil indicate any external stimuli associated with the changes in the size of the pupil. In responsive to the changes in the size of the pupil indicating behavioral deviations in the member, the member is identified as a person of interest.

This application is a continuation of U.S. Ser. No. 12/049,818, entitled, “DETECTING BEHAVIORAL DEVIATIONS BY MEASURING EYE MOVEMENTS,” filed, Mar. 17, 2008, status allowed.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to an improved data processing system and more specifically to a computer implemented method and apparatus for audio and video analysis. Still more particularly, the present invention is directed towards a computer implemented method, apparatus, and computer usable program product for detecting behavioral deviations in individuals by measuring eye movements.

2. Background Description

Currently, more people are traveling over great distances by airplanes, trains, and buses for both business and pleasure. The increase in the number of passengers and customers in transportation facilities and other locations has lead to an increasing need for security. In an attempt to better monitor these environments, many businesses, transportation facilities, and other public forums have installed cameras and other audio and/or video monitoring devices to record customers, passengers, and other individuals in these environments. A detective or security personnel may watch one or more monitors displaying closed circuit images recorded by these cameras to identify potential problem situations. However, these solutions require a human user to review the audio and video recordings to obtain useful information and identify potential problems.

BRIEF SUMMARY OF THE INVENTION

According to one embodiment of the present invention, a computer implemented method for detecting behavioral deviations in members of a cohort group is provided. Ocular metadata is analyzed to identify patterns in changes in a size of a pupil of an eye of a member of the cohort group captured by a set of cameras. The ocular metadata describes the changes in the size of the pupil of the eye due to dilation and constriction of the pupil. The patterns in the changes in the size of the pupil include a rate of changes in the size of the pupil, a degree of change in the size of the pupil, and a number of changes in the size of the pupil. The patterns in the changes in the size of the pupil indicate any external stimuli associated with the changes in the size of the pupil. In responsive to the changes in the size of the pupil of the eye indicating behavioral deviations in the member of the cohort group, the member of the cohort group is identified as a person of interest that is subject to an increased level of monitoring. According to other embodiments of the present invention, a computer program product, apparatus, and data processing system for detecting behavioral deviations in members of a cohort group are provided.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is a network of data processing systems in which illustrative embodiments may be implemented;

FIG. 2 is a block diagram of a data processing system in accordance with an illustrative embodiment of the present invention;

FIG. 3 is a block diagram of a human eye in accordance with an illustrative embodiment;

FIG. 4 is a block diagram of a video analysis system for generating ocular metadata associated with a member of a cohort group in accordance with an illustrative embodiment;

FIG. 5 is a block diagram of an analysis server for identifying a person of interest based on ocular metadata in accordance with an illustrative embodiment;

FIG. 6 is a block diagram of a unifying data model for processing ocular event data in accordance with an illustrative embodiment;

FIG. 7 is a flowchart illustrating a process for identifying a person of interest based on ocular metadata in accordance with an illustrative embodiment;

FIG. 8 is a flowchart illustrating a process for generating event data associated with eye movements in accordance with an illustrative embodiment;

FIG. 9 is a flowchart illustrating a process for identifying members of a cohort group in accordance with an illustrative embodiment;

FIG. 10 is a flowchart illustrating a process for identifying patterns of ocular movements indicating behavioral deviations in accordance with an illustrative embodiment; and

FIG. 11 is a flowchart illustrating a process for identifying a person of interest based on changes in eye movements of a member of a cohort group in accordance with an illustrative embodiment.

DETAILED DESCRIPTION OF THE INVENTION

As will be appreciated by one skilled in the art, the present invention may be embodied as a system, method or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module,” or “system.” Furthermore, the present invention may take the form of a computer program product embodied in any tangible medium of expression having computer usable program code embodied in the medium.

Any combination of one or more computer-usable or computer-readable medium(s) may be utilized. The computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CDROM), an optical storage device, a transmission media such as those supporting the Internet or an intranet, or a magnetic storage device. Note that the computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory. In the context of this document, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer-usable medium may include a propagated data signal with the computer-usable program code embodied therewith, either in baseband or as part of a carrier wave. The computer-usable program code may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc.

Computer program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer, and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).

The present invention is described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions.

These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer program instructions may also be stored in a computer-readable medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.

The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

With reference now to the figures and in particular with reference to FIGS. 1-2, exemplary diagrams of data processing environments are provided in which illustrative embodiments may be implemented. It should be appreciated that FIGS. 1-2 are only exemplary and are not intended to assert or imply any limitation with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environments may be made.

FIG. 1 depicts a pictorial representation of a network of data processing systems in which illustrative embodiments may be implemented. Network data processing system 100 is a network of computers in which the illustrative embodiments may be implemented. Network data processing system 100 contains network 102, which is the medium used to provide communication links between various devices and computers connected together within network data processing system 100. Network 102 may include connections, such as wire, wireless communication links, or fiber optic cables.

In the depicted example, server 104 and server 106 connect to network 102 along with storage unit 108. In addition, clients 110, 112, and 114 connect to network 102. Clients 110, 112, and 114 may be, for example, personal computers or network computers. In the depicted example, server 104 provides data, such as boot files, operating system images, and applications to clients 110, 112, and 114. Clients 110, 112, and 114 are clients to server 104 in this example. Network data processing system 100 may include additional servers, clients, and other devices not shown.

Transportation facility 116 is a facility associated with transporting passengers from one point to another. Transportation facility 116 may include indoor facilities, as well as outdoor spaces, such as parking lots, sidewalks, airstrips, roadways, driveways, and/or any other indoor or outdoor facilities. For example, transportation facility 116 may be, without limitation, an airport, a bus depot, a train station, a dock, or any other type of transportation facility.

Set of cameras 118 may be implemented as any type of known or available device for capturing images and/or audio, such as, without limitation, digital video cameras, microphones, and/or infrared cameras. Set of cameras 118 may be located inside a building or structure associated with transportation facility, within a transportation vehicle, in an open air space associated with transportation facility, such as a sidewalk, roadway, or parking lot, or set of cameras 118 may include one or more cameras located inside a building or structure, one or more cameras located outside a building in an open air space, and/or one or more cameras inside a transportation vehicle, such as a train, bus, plane, or car.

In this example, set of cameras 118 is associated with a transportation facility. However, cameras in any environment may be used to gather audio and/or video data for utilization in identifying behavioral deviations in people based on patterns of eye movements associated with one or more people in accordance with the illustrative embodiments. A behavioral deviation is any type of unusual, unexpected, or atypical behavior. A behavioral deviation may include, without limitation, furtive glances, fixed and unblinking stares, concentrated focus, lack of focus, changes in pupil dilation, or any other unusual eye movements. A furtive glance refers to rapidly moving eyes, shifty glances, and/or any other frequent changes in the focus and/or visual line of gaze. The visual line of gaze is the line radiating forward in space from the eye and indicating where the person is looking and/or what the person is looking at.

In the depicted example, network data processing system 100 is the Internet with network 102 representing a worldwide collection of networks and gateways that use the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols to communicate with one another. At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, governmental, educational and other computer systems that route data and messages. Of course, network data processing system 100 also may be implemented as a number of different types of networks, such as for example, an intranet, a local area network (LAN), or a wide area network (WAN). FIG. 1 is intended as an example, and not as an architectural limitation for the different illustrative embodiments.

Turning now to FIG. 2, a diagram of a data processing system is depicted in accordance with an illustrative embodiment of the present invention. Data processing system 200 is an example of a data processing system for analyzing audio and/or video data to identify behavioral deviations, such as, without limitation, furtive glances, by one or more people. In this illustrative example, data processing system 200 includes communications fabric 202, which provides communications between processor unit 204, memory 206, persistent storage 208, communications unit 210, input/output (I/O) unit 212, and display 214.

Processor unit 204 serves to execute instructions for software that may be loaded into memory 206. Processor unit 204 may be a set of one or more processors or may be a multi-processor core, depending on the particular implementation. Further, processor unit 204 may be implemented using one or more heterogeneous processor systems in which a main processor is present with secondary processors on a single chip. As another illustrative example, processor unit 204 may be a symmetric multi-processor system containing multiple processors of the same type.

Memory 206, in these examples, may be, for example, a random access memory, or any other suitable volatile or non-volatile computer readable storage device. Persistent storage 208 may take various forms depending on the particular implementation. For example, persistent storage 208 may contain one or more components or devices. In another example, persistent storage 208 may be a hard drive, a flash memory, a rewritable optical disk, a rewritable magnetic tape, or some combination of the above. The media used by persistent storage 208 also may be removable. For example, a removable hard drive may be used for persistent storage 208.

Communications unit 210, in these examples, provides for communications with other data processing systems or devices. In these examples, communications unit 210 is a network interface card. Communications unit 210 may provide communications through the use of either or both physical and wireless communications links.

Input/output unit 212 allows for input and output of data with other devices that may be connected to data processing system 200. For example, input/output unit 212 may provide a connection for user input through a keyboard and mouse. Further, input/output unit 212 may send output to a printer. Display 214 provides a mechanism to display information to a user.

Instructions for the operating system and applications or programs are located on persistent storage 208. These instructions may be loaded into memory 206 for execution by processor unit 204. The processes of the different embodiments may be performed by processor unit 204 using computer implemented instructions, which may be located in a memory, such as memory 206. These instructions are referred to as program code, computer-usable program code, or computer-readable program code that may be read and executed by a processor in processor unit 204. The program code in the different embodiments may be embodied on different physical or tangible computer-readable storage devices, such as memory 206 or persistent storage 208.

Program code 216 is located in a functional form on computer-readable media 218 that is selectively removable and may be loaded onto or transferred to data processing system 200 for execution by processor unit 204. Program code 216 and computer-readable media 218 form computer program product 220 in these examples. In one example, computer-readable media 218 may be in a tangible form, such as, for example, an optical or magnetic disk that is inserted or placed into a drive or other device that is part of persistent storage 208 for transfer onto a computer readable storage device, such as a hard drive that is part of persistent storage 208. In a tangible form, computer-readable media 218 also may take the form of a persistent storage, such as a hard drive, a thumb drive, or a flash memory that is connected to data processing system 200. The tangible form of computer-readable media 218 is also referred to as computer-recordable storage media. In some instances, computer-readable media 218 may not be removable.

Alternatively, program code 216 may be transferred to data processing system 200 from computer-readable media 218 through a communications link to communications unit 210 and/or through a connection to input/output unit 212. The communications link and/or the connection may be physical or wireless in the illustrative examples. The computer-readable media also may take the form of non-tangible media, such as communications links or wireless transmissions containing the program code.

The different components illustrated for data processing system 200 are not meant to provide architectural limitations to the manner in which different embodiments may be implemented. The different illustrative embodiments may be implemented in a data processing system including components in addition to, or in place of, those illustrated for data processing system 200. Other components shown in FIG. 2 can be varied from the illustrative examples shown.

As one example, a computer readable storage device in data processing system 200 is any hardware apparatus that may store data. Memory 206, persistent storage 208 and computer readable media 218 are examples of computer readable storage devices in a tangible form.

In another example, a bus system may be used to implement communications fabric 202 and may be comprised of one or more buses, such as a system bus or an input/output bus. Of course, the bus system may be implemented using any suitable type of architecture that provides for a transfer of data between different components or devices attached to the bus system. Additionally, a communications unit may include one or more devices used to transmit and receive data, such as a modem or a network adapter. Further, a memory may be, for example, memory 206 or a cache such as found in an interface and memory controller hub that may be present in communications fabric 202.

FIG. 3 is a block diagram of a human eye in accordance with an illustrative embodiment. Eye 300 comprises pupil 302. Pupil 302 is an opening in iris 304 that regulates the amount of light entering eye 300. Iris 304 consists of muscles that relax to dilate or enlarge the pupil and allow a greater amount of light to enter eye 300. The muscles in iris 304 constrict to reduce the size of pupil 302 and decrease the amount of light entering eye 300. Typically, iris 304 constricts when light levels increase so that less light will enter eye 300. Iris 304 relaxes or dilates pupil 302 when light levels are lowered, in weaker light levels, or in darkness to increase the amount of visible light entering eye 300.

However, pupil 302 may dilate or constrict for reasons other than light level. For example, alcohol and certain drugs may cause constriction of eye 300, such as, without limitation, opiates, such as heroin. Other drugs may cause dilation of eye 300, such as, without limitation, cocaine and methamphetamine. Pupil 302 may also dilate as a symptom of drug or alcohol withdrawal, due to a neurological disorder, nervous system damage, or concussion.

Pupil dilation and constriction may also occur due to mental activity, level of attention, level of interest, and/or cognitive load. Pupil dilation and constriction may also occur due to the feeling of emotions, such as happiness, sadness, anger, fear, anxiety, stress, or other emotions. For example, during feelings of happiness or anger, pupil dilation is typically followed by pupil constriction. Pupils typically remain dilated when a person experiences feelings of fear or sadness.

The illustrative embodiments recognize that changes in eye movements, such as changes in the visual line of gaze, pupil dilation, and/or pupil constriction, are indicators of a person's emotional state, cognitive state, state of mind, and/or physical condition. Therefore, one illustrative embodiment of the present invention provides a computer implemented method, apparatus, and computer usable program product detecting behavioral deviations in members of a cohort group by identifying patterns of eye movements in a person. In this embodiment, a member of a cohort group is identified. Each member of the cohort group shares a common characteristic. Visual data comprising images of the person's eye movements over a given time interval are captured by a set of cameras. The images are analyzed to generate ocular metadata.

The ocular metadata associated with the member of the cohort group is generated in real-time as the images of the eye movements are retrieved from the set of cameras recording the images. The ocular metadata describes movements of an eye of the member of the cohort group. The ocular metadata is analyzed to identify patterns of ocular movements. The patterns of ocular movements are analyzed and/or compared to one or more behavior models to determine if the patterns of ocular movements indicate typical behavior or behavior deviations.

In response to the patterns of ocular movements indicating behavioral deviations in the member of the cohort group, the member of the cohort group is identified as a person of interest. A person of interest may be subjected to an increased level of monitoring and/or other security measures to determine if the person of interest poses a threat to the person's self and/or to others. For example, the person of interest may be subjected to an increased level of monitoring, continuing capturing video images of the eye movements and behavior of the person of interest, fingerprinting the person of interest, checking an identification of the person of interest, checking a boarding pass of the person of interest, searching baggage associated with the person of interest, questioning the person of interest by security personnel, sending notification of the presence of the person of interest to authorities, monitoring the activities of the person of interest by security personnel, scanning the person of interest with a metal detector or metal detector wand, subjecting the person of interest to a background check, checking the person of interest with a drug sniffing dog, subjecting the person of interest to a pat down search, subjecting the person of interest to an x-ray scan, subjecting the person of interest to a strip search, subjecting the person of interest to a cavity search, or other increased monitoring.

Turning now to FIG. 4, a block diagram of a video analysis system for generating ocular metadata associated with a member of a cohort group in accordance with an illustrative embodiment. Video analysis system 400 is software for analyzing the contents of information received from set of cameras 402 and generating metadata describing the contents of the information received. The information may include a stream of audio data 404 and/or stream of video images 406.

Set of cameras 402 is a set of one or more cameras. A camera is any type of known or available device for capturing images and/or audio, such as, without limitation, an optical image capture device, an infrared imaging device, a spectral or multispectral device, a sonic device, or any other type of image producing device. For example, a camera may be implemented as, without limitation, a digital video camera for taking moving video images, a digital camera capable of taking still pictures and/or a continuous video stream, a stereo camera, a web camera, and/or any other imaging device capable of capturing a view of whatever appears within the camera's range for remote monitoring, viewing, or recording of a distant or obscured person, object, or area.

Various lenses, filters, and other optical devices such as zoom lenses, wide angle lenses, mirrors, prisms and the like may also be used with set of cameras 402 to assist in capturing the desired view. The cameras in set of cameras 402 may be fixed in a particular orientation and configuration, or, along with any optical devices, be programmable in orientation, light sensitivity level, focus or other parameters. For example, in one embodiment, one or more cameras in set of cameras 402 are capable of rotating, tilting, changing orientation, and panning. In another embodiment, one or more cameras in set of cameras 402 is a robot camera or a mobile camera that is capable of moving and changing location, as well as tilting, panning, and changing orientation. Programming data may be provided via a computing device, such as server 104 in FIG. 1.

In this embodiment, each camera in set of cameras 402 is located in a fixed location. However, the cameras are capable of moving and/or rotating along one or more directions, such as up, down, left, right, and/or rotate about an axis of rotation to change a field of view of the camera without changing location of the camera. The cameras may also be capable of rotating about an axis to keep a person, animal, vehicle or other object in motion within the field of view of the camera. In other words, the camera may be capable of moving about an axis of rotation in order to keep a moving object within a viewing range of the camera lens.

Set of cameras 402 capture images associated with a person within the field of view of the cameras in set of cameras 402. Set of cameras 402 transmits the video data, including images of the member of the cohort group and/or audio data, to video analysis system 400 for processing into metadata.

Video analysis system 400 is software architecture for generating metadata describing images and/or audio captured by set of cameras 402. Video analysis system 400 may be implemented using any known or available software for audio analytics, video image analytics, facial recognition, license plate recognition, and/or infrared analysis. In this example, video analysis system 400 may be implemented as, without limitation, IBM® smart surveillance system (S3) software.

Video analysis system 400 is software for dynamically processing audio data 404 and/or video images 406 into ocular metadata 408 in real time as audio data 404 and/or video images 406 are received from set of cameras 402. Ocular metadata 408 is metadata describing eye movement events captured in audio data 404 and/or video images 406, such as rate of blinking, changes in an amount of pupil dilation and pupil constriction (changes in pupil diameter), furtive glances, rapidity of eye movements, fixed stares, changes in direction of gaze, rate of pupil dilation and pupil constriction, and/or any other movements of an eye.

Video analysis system 400 may optionally include software for processing audio data 404 and/or video images 406 into event metadata describing other non-ocular characteristics and events associated with a person. For example, the video data may also include images of identifying features of the object, such as, without limitation, a person's face, license plate on a person's car, an identification badge, tattoos, scars, an iris pattern of the person's eye, and/or a retinal pattern of the person's eye. The audio data may also be used to identify a person based on their voice. Video analysis system 400 can then analyze the images and/or audio to identify the person.

For example, video images 406 may include images of identifying features of a person or object, such as, without limitation, a face of a human user, a license plate or partial plate, an identification badge, a vehicle identification number (VIN), or any other identifying markings or features of the object. Video analysis system 400 may process video images 406 to identify the person and/or object using license plate recognition analytics, facial recognition analytics, behavior analysis analytics, or other analytics to identify a particular object and/or distinguish one object from another object. Likewise, audio data 404 may include sounds of a person's voice, sounds of a vehicle engine, and/or other sounds associated with a particular person, animal, and/or object. Video analysis system 400 may process the audio data 404 to identify a voice print identifying a person, a distinctive engine sound to identify a make, model, and/or year of a vehicle, or other distinctive sounds.

Video analysis system 400 utilizes computer audio and/or visual pattern recognition technologies, as well as audio and/or video analytics to analyze data captured by one or more situated cameras and microphones. The analysis of the video data generates events of interest in the environment. For example, an event of interest at a departure drop off area in an airport may include the position and location of cars, the position and location of passengers, and the position and location of other moving objects. In this embodiment, an event of interest includes, without limitation, eye movements and sounds associated with eye movements.

In this example, video analytics engine 400 architecture is adapted to satisfy two principles. 1) Openness: The system permits integration of both analysis and retrieval software made by third parties. In one embodiment, the system is designed using approved standards and commercial off-the-shelf (COTS) components. 2) Extensibility: The system should have internal structures and interfaces that will permit for the functionality of the system to be extended over a period of time.

The architecture enables the use of multiple independently developed event analysis technologies in a common framework. The events from all these technologies are cross indexed into a common repository or a multi-modal event database 432 allowing for correlation across multiple audio/video capture devices and event types.

Video analysis system 400 includes the following analytics 430. Analytics 430 comprises illustrative analytical technologies integrated into a single system. The events generated by analytics 430 are used to generate ocular metadata 408 describing the movements and/or changes in a person's eyes based on video data from set of cameras 402. The analytical technologies are technologies associated with audio analytics 410, behavior analysis 412, face recognition 414, voice analysis 418, ocular movement analytics, and/or retinal/iris analytics 422.

Audio analytics 410 comprises software analytics for identifying the source, type, strength, and pattern of sounds, such as a human voice, engine sounds, animal sounds, a baby cry, footsteps, ringing phones, or any other sounds. Audio analytics 410 analyzes audio data 406 to identify a person based on the voice pattern of the person's voice. Audio analytics 410 may also be used to identify when a person's eye blinks are based on analyzing the audio data for sounds associated with blinking.

Behavior analysis 412 is an analytics engine for identifying patterns of behavior. Behavior analysis 412 detects and tracks moving objects and classifies the objects into a number of predefined categories by analyzing metadata describing images captured by the cameras. As used herein, an object may be a human, an object, a container, a cart, a bicycle, a motorcycle, a car, or an animal, such as, without limitation, a dog. Behavior analysis 412 may be used to analyze images captured by cameras deployed at various locations, such as, without limitation, overlooking a roadway, a parking lot, a perimeter, or inside a facility. Behavior analysis 412 may also analyze the data generated by set of cameras 402 to identify other behaviors, such as walking speed, pacing, loitering, nervous gestures, such as, but not limited to, tapping of a foot or wringing of hands.

Video data 406 may include images of a person's face, an image of a part or portion of a car, an image of a license plate on a car, and/or one or more images showing a person's behavior. Face recognition 414 is software for analyzing images of a person's face and identifying features of the person's face for identification purposes.

Voice analysis 418 is a software analysis engine for analyzing audio data 404. Voice analysis 418 identifies human voices in audio data 404 and/or phonetics of human speech. Voice analysis 418 results may be used to compare a human voice print to known voice prints. If a match is found, the person associated with the human voice print may be identified.

Ocular movement analytics 420 is a software analysis engine for identifying movements of an eye, such as without limitation, changes in the direction of a gaze, blinking of the eye, rolling the eye, squinting the eye, narrowing the eye, widening of the eye, or other movements of the eye.

Retinal/iris analytics 422 is a software analysis engine for identifying changes in a retina, iris, and/or pupil of an eye, such as, without limitation, pupil dilation, pupil constriction, and/or retinal patterns. Retinal/iris analytics 422 may also include software for performing biometric authentication of the identity of the member of the cohort group. Retinal/iris analytics 422 may perform iris recognition. Iris recognition uses pattern recognition techniques on images of an iris of an individual's eyes. Iris recognition uses camera technology and may include infrared illumination to identify the intricate structures of the iris that are unique. The unique structures in the iris are used to positively identify the individual. Retinal/iris analytics 422 may also perform biometric authentication of a person's identity using retinal scan techniques. Retinal scan techniques identify the unique patterns of capillaries on a person's retina to identify the individual. A retinal scan maps the unique patterns of capillaries on the retina. The capillaries on the retina are easily identified because the blood vessels typically absorb light readily.

The analytics technologies in video analysis system 400 may also optionally comprise, without limitation, license plate recognition analytics, badge reader technology, and/or radar analytic technology (not shown). License plate recognition technology (not shown) may be utilized to analyze images captured by cameras deployed at the entrance to a facility, in a parking lot, on the side of a roadway or freeway, or at an intersection. License plate recognition technology catalogs a license plate of each vehicle moving within a range of two or more video cameras associated with video analysis system 400.

Facial recognition technology (not shown) is software for identifying a human based on an analysis of one or more images of the human's face. Facial recognition technology may be utilized to analyze images of objects captured by cameras deployed at entryways, or any other location, to capture and recognize faces.

Badge reader technology (not shown) may be employed to read badges. The information associated with an object obtained from the badges is used in addition to video data associated with the object to identify an object and/or a direction, velocity, and/or acceleration of the object. Events from access control technologies can also be integrated into video analysis system 400.

The data gathered from audio analytics 410, behavior analysis 412, face recognition 414, voice analysis 418, ocular movement analytics, retinal/iris analytics 422, license plate recognition technology, facial recognition technology, badge reader technology, radar analytics technology, and/or any other analytics for analyzing video/audio data received from a camera or other video/audio capture device is received by video analysis system 400 for processing into events.

The events from all the above analysis technologies are cross indexed into a single repository, such as multi-modal database 432. In such a repository, a simple time range query across the modalities will extract license plate information, vehicle appearance information, badge information, object location information, object position information, vehicle make, model, year, and/or color, and face appearance information. This permits an analysis server, such as analysis server 500 in FIG. 5, to easily correlate these attributes. The architecture of video analysis system 400 also includes one or more smart analytics engines, which house event analysis technologies, such as audio analytics 410, behavior analysis 412, face recognition 414, ocular movement analytics, and/or retinal/iris analytics 422, license plate recognition technology, facial recognition technology, badge reader technology, and/or radar analytics technology.

Video analysis system 400 further includes analytics 430, which provides infrastructure for indexing, retrieving, and managing event metadata. In one embodiment, analytics 430 may include Middleware for Large Scale Analysis. Each of the analytics technologies associated with analytics 430 can generate real-time alerts and generic event metadata. The metadata generated by the analytics technologies may be represented using, without limitation, extensible markup language (XML). In such a case, the XML documents include a set of fields which are common to all engines and others which are specific to the particular type of analysis being performed by one or more of the analytics technologies, such as, without limitation, audio analytics 410, behavior analysis 412, face recognition 414, voice analysis 418, ocular movement analytics 420, retinal/iris analytics 422, license plate recognition technology, facial recognition technology, badge reader technology, and/or radar analytics technology.

The metadata may be generated by analytics 430 via the use of, for example, web services data ingest application program interfaces (APIs) provided by analytics 430. The XML metadata is received by analytics 430 and indexed into predefined tables in multi-modal event database 432. This may be accomplished using, for example, and without limitation, the DB2™ XML extender, if an IBM® DB2™ database is employed. This permits for fast searching using primary keys. Analytics 430 provides a number of query and retrieval services based on the types of metadata available in the database.

Event interpreter 434 is software for interpreting and identifying patterns in events generated by the analytics technologies. Event interpreter 434 may include, for example, and without limitation, pattern discovery 436, event browsing 438, event search 440, and/or event interpretation 442. Each event has a reference to the original media resource, such as, without limitation, a link to the video file, a link to the infrared images, and/or a link to an audio file. This allows the user to view the images and/or listen to the sound file associated with a retrieved event.

Video analysis system 400 provides an open and extensible architecture for dynamic video analysis in real time without human intervention. Analytics engines, such as, without limitation, audio analytics 410, behavior analysis 412, face recognition 414, infrared analysis 416, voice analysis 418, ocular movement analytics 420, license plate recognition technology, facial recognition technology, badge reader technology, and/or radar analytics technology preferably provide a plug and play framework for the video, infrared, and/or audio analytics. The event metadata generated by the analytics technologies is sent to multi-modal event database 432 in any type of programming language files, such as, without limitation, extensible markup language (XML) files. Web services API's in analytics 430 permit for easy integration and extensibility of the metadata. Various applications, such as, without limitation, event browsing, real time alerts, etc. may use structure query language (SQL) or similar query language through web services interfaces to access the event metadata from multi-modal event database 432.

Analytics 430 may be implemented as a C++ based framework for performing real-time event analysis. Analytics 430 is capable of supporting a variety of video/image analysis technologies and other types of sensor analysis technologies. Analytics 430 provides at least the following support functionalities for the core analysis components. The support functionalities are provided to programmers or users through a plurality of interfaces employed by analytics 430. These interfaces are illustratively described below.

In one example, standard plug-in interfaces may be provided. Any event analysis component which complies with the interfaces defined by analytics 430 can be plugged into analytics 430. The definitions include standard ways of passing data into the analysis components and standard ways of getting the results from the analysis components. Extensible metadata interfaces are provided. Analytics 430 provides metadata extensibility.

For example, consider a behavior analysis application which uses video capture and image analysis technology. Assume that the default metadata generated by this component is object trajectory and size. If the designer now wishes to add color of the object into the metadata, analytics 430 enables this by providing a way to extend the creation of the appropriate structures for transmission to the backend analytics 430. The structures may be, without limitation, extensible markup language (XML) structures, or structures in any other programming language.

Analytics 430 provides standard ways of accessing event metadata in memory and standardized ways of generating and transmitting alerts to the backend Analytics 430. In many applications, users will need the use of multiple basic real-time alerts in a spatio-temporal sequence to compose an event that is relevant in the user's application context. Analytics 430 provides a simple mechanism for composing compound alerts via compound alert interfaces. In many applications, the real-time event metadata and alerts are used to actuate alarms, visualize positions of objects on an integrated display, and control cameras to get better surveillance data. Analytics 430 provides developers with an easy way to plug-in actuation modules which can be driven from both the basic event metadata and by user-defined alerts using real-time actuation interfaces.

Using database communication interfaces, analytics 430 also hides the complexity of transmitting information from the analytics technologies to multi-modal event database 432 by providing simple calls to initiate the transfer of information. The IBM analytics 430 may include a J2EE™ frame work built around IBM's DB2™ and IBM WebSphere™ application server platforms. Analytics 430 supports the indexing and retrieval of spatio-temporal event metadata. Analytics 430 also provides analysis engines with the following support functionalities via standard web services interfaces, such as, without limitation, XML documents.

Analytics 430 provide metadata ingestion services. These are web services calls which allow an engine to ingest events into analytics 430 system. There are two categories of ingestion services: 1) Index Ingestion Services: This permits for the ingestion of metadata that is searchable through SQL like queries. The metadata ingested through this service is indexed into tables which permit content based searches, such as provided by analytics 430. 2) Event Ingestion Services: This permits for the ingestion of events detected in the analytics technologies, such as those provided by analytics 430. For example, a loitering alert that is detected can be transmitted to the backend along with several parameters of the alert. These events can also be retrieved by the user but only by the limited set of attributes provided by the event parameters.

Analytics 430 provide schema management services. Schema management services are web services which permit a developer to manage their own metadata schema. A developer can create a new schema or extend the base middleware for large scale analysis schema to accommodate the metadata produced by their analytical engine. In addition, system management services are provided by analytics 430.

The schema management services of analytics 430 provide the ability to add a new type of analytics to enhance situation awareness through cross correlation. For example, a model for a monitored transportation facility environment is dynamic and can change over time. There may be an increase in the number of travelers and/or different sounds present during holiday seasons than during non-holiday seasons. Thus, it is important to permit video analysis system 400 to add new types of analytics and cross correlate the existing analytics with the new analytics. To add/register a new type sensor and/or analytics to increase situation awareness, a developer can develop new analytics and plug them into analytics 430 and employ middleware for large scale analysis' schema management service to register new intelligent tags generated by the new smart analytics engine analytics. After the registration process, the data generated by the new analytics can become immediately available for cross correlating with existing index data.

System management services provide a number of facilities needed to manage video analysis system 400 including: 1) Camera Management Services: These services include the functions of adding or deleting a camera from the system, adding or deleting a map from the system, associating a camera with a specific location on a map, adding or deleting views associated with a camera, assigning a camera to a specific middleware system server and a variety of other functionality needed to manage the system. 2) Engine Management Services: These services include functions for starting and stopping an engine associated with a camera, configuring an engine associated with a camera, setting alerts on an engine and other associated functionality. 3) User Management Services: These services include adding and deleting users to a system, associating selected cameras to a viewer, associating selected search and event viewing capacities to a user, and associating video viewing privilege to a user. 4) Content Based Search Services: These services permit a user to search through an event archive using a plurality of types of queries.

For the content based search services (4), the types of queries may include: A) Search by time retrieves all events from event metadata that occurred during a specified time interval. B) Search by object presence retrieves the last 100 events from a live system. C) Search by object size retrieves events where the maximum object size matches the specified range. D) Search by object type retrieves all objects of a specified type. E) Search by object speed retrieves all objects moving within a specified velocity range. F) Search by object color retrieves all objects within a specified color range. G) Search by object location retrieves all objects within a specified bounding box in a camera view. H) Search by activity duration retrieves all events from ocular metadata 408 with durations within the specified range. I) Composite search combines one or more of the above capabilities. Other system management services may also be employed.

FIG. 5 is a block diagram of an analysis server for identifying a person of interest based on ocular metadata in accordance with an illustrative embodiment. Analysis server 500 may be a server, such as server 104 in FIG. 1 or data processing system 300 in FIG. 3. Analysis server 500 includes set of data models 504 for analyzing dynamic customer data elements and static customer data elements. Ocular metadata 502 is metadata describing eye movements and pupil dilation associated with one or more persons. The one or more persons may be members of one or more cohort groups. A cohort is a group of one or more persons having at least one characteristic in common. For example, a cohort may include, without limitation, a group of pedestrians, a group of children, a family, a single woman, a married couple, a fifth grade class, a group of people with diabetes, a group of passengers with carry-on luggage, or any other group sharing a common characteristic.

Set of data models 504 is one or more data models created a priori or pre-generated for use in analyzing ocular metadata 502 to identify behavioral deviations associated with one or more persons. Set of data models 504 may include, without limitation, unifying data models, behavior models, causal models, psychological models, sociological models, and/or simulation models.

Identification data 506 is data describing one or more persons. In this example, identification data 506 includes point of contact data, profiled past data, current actions data, transactional history data, certain click-stream data, granular demographics, psychographic data, user provided registration data, account data and/or any other static customer data. Point of contact data is data regarding a method or device used by a user to interact with a data processing system associated with a transportation facility. The user interacts with the data processing system using a computing device or display terminal having a user interface for inputting data and/or receiving output. The device or terminal may be implemented as a display device provided by the transportation facility and/or a device belonging to the user.

If the display device is a display device associated with the transportation facility, details and information regarding the display device will be known to analysis server 500. However, if the display device is a display device belonging to the user, analysis server 500 may identify the type of display device using techniques such as interrogation commands, cookies, or any other known or equivalent technique.

An indication of a location for the point of contact may also be determined. For example, global positioning system (GPS) coordinates of the user may be determined if the user's computing device has such a capability whether by including a real time global positioning system receiver or by periodically storing global positioning system coordinates entered by some other method. Other location indications may also be determined such as post office address, street or crossroad coordinates, latitude-longitude coordinates or any other location indicating system.

Analysis server 500 may also determine the connectivity associated with the user's point of contact. For example, the user may be connected to a data processing system associated with the transportation facility in any of a number of ways such as a modem, digital modem, network, wireless network, Ethernet, intranet, or high speed lines including fiber optic lines. Each way of connection imposes constraints of speed, latency, and/or mobility which can then also be determined.

The profiled past comprises data that may be used, in whole or in part, for identifying the person, determining whether to monitor the person, and/or determining whether the person is a person of interest. Global profile data may be retrieved from a file, database, data warehouse, or any other data storage device. Multiple storage devices and software may also be used to store identification data 506. Some or all of the data may be retrieved from the point of contact device, as well. The profiled past may comprise an imposed profile, global profile, individual profile, and demographic profile. The profiles may be combined or layered to define the customer for specific promotions and marketing offers.

In the illustrative embodiments, a global profile includes data on the customer's interests, preferences, travel destinations, travel dates, and affiliations. Various firms provide data for purchase which is grouped or keyed to presenting a lifestyle or life stage view of customers by block or group or some other baseline parameter. The purchased data presents a view of one or more users based on aggregation of data points such as, but not limited to, geographic block, age of head of household, income level, a number of children, education level, ethnicity, previous traveling accommodations, and purchasing patterns.

Current actions, also called a current and historical record, are also included in identification data 506. Current actions is data defining user behavior, such as listings of the travel related purchases made by the user, payments and refunds associated with the customer, and/or click-stream data from a point of contact device of the customer. Click-stream data is data regarding a user's navigation of an online web page of the merchant or supplier. Click-stream data may include page hits, sequence of hits, duration of page views, response to advertisements, transactions made, and conversion rates. Conversion rate is the number of times the customer takes action divided by the number of times an opportunity is presented.

In this example, profiled past data for a given customer is stored in analysis server 500. However, in accordance with the illustrative embodiments, profiled past data may also be stored in any local or remote data storage device, including, but not limited to, a device such as storage area network 108 in FIG. 1 or read only memory (ROM) 324 and/or compact disk read only memory (CD-ROM) 330 in FIG. 3.

Granular demographics are a source of static data elements that do not tend to change in real time, such as a person's name, date of birth, and address. Granular demographics provide detailed demographics information for one or more people. Granular demographics may include, without limitation, ethnicity, block group, lifestyle, life stage, income, and education data.

Cohort analysis 508 is a software component for generating one or more cohort groups based on attributes for people, animals, and/or objects. Cohort data 510 is data describing one or more cohort groups. A cohort group is a group of people, animals, and/or objects that share a common characteristic. For example, a cohort may include a group of plants. A different cohort may include people wearing baseball caps. A sub-cohort may include people wearing blue baseball caps. Cohort data 510 is data associated with one or more cohort groups. Cohort data 510 identifies members of a cohort group, the attributes shared by the members of the cohort group, and/or any other data associated with cohorts.

Ocular pattern recognition 512 is a software component for analyzing ocular metadata 502 and identifying patterns in the ocular metadata associated with one or more persons. If ocular pattern recognition 512 identifies a pattern of eye movements, ocular pattern recognition 512 determines whether the pattern of eye movements indicates normal behavior or behavioral deviations. Eye movements includes movements by the eye, as well as changes in the pupil dilation and/or pupil constriction of the eye. For example, if the patterns of eye movements indicate behavioral deviations, such as, without limitation, a fixed stare, furtive glances, narrowing of the eyes, widening of the eyes, a flat affect or unchanging expression of the eyes, prolonged eye contact with one or more others, lack of eye contact or avoidance of eye contact with one or more others, rapid blinking, and/or a lack of blinking. Likewise, because travel is often stressful and exciting, if the patterns of eye movements indicate a lack of emotion, unfocused gaze, or a lack of expected changes in eye movement and/or pupil dilation given current external stimuli, these ocular patterns may also indicate a behavioral deviation.

Person of interest identifier engine 514 is software for identifying persons of interest. A person of interest is a person that is displaying unusual patterns of ocular movements and/or other behavioral deviations. Person of interest identifier engine 514 stores an identifier associated with each person of interest in persons of interest 520 in data storage 522. Data storage 522 may be implemented as any type of device for storing data, such as, without limitation, a hard drive, a flash memory, a main memory, read only memory (ROM), a random access memory (RAM), or any other type of data storage device. Data storage may be implemented in a single data storage device or a plurality of data storage devices. Persons of interest 520 may be a file or any other data structure for storing identifiers identifying one or more persons of interest.

Risk assessment engine 524 is software for analyzing ocular metadata 502 and/or other data associated with one or more persons to identify a risk associated with a person. Risk assessment engine 524 generates a risk level for each person of interest. Risk assessment engine 524 recommends one or more actions based on the level of risk associated with each person of interest. The actions may include searching, scanning, detaining, watching, following, or increasing monitoring of the person of interest. Likewise, risk assessment engine 524 may determine whether a person that is not identified as a person of interest should be monitored in the future. For example, if a person's breathing patterns do not indicate behavioral deviations, risk assessment engine 524 may consider other information and/or behavior associated with the person to determine whether the person should continue to be monitored or whether the person should be ignored and/or decrease the level of monitoring of the person.

FIG. 6 is a block diagram of a unifying data model for processing ocular event data in accordance with an illustrative embodiment. The ocular event data is generated by a video analysis system, such as video analysis server 500 in FIG. 5. The ocular event data may be processed by one or more data models in a set of data models, such as set of data models 504 in FIG. 5, to identify patterns in the ocular events. An ocular event is any event associated with an eye movement or change in pupil dilation, such as, without limitation, changing a direction of a gaze, dilation of the pupil, contraction of the pupil, squinting or narrowing of the eye, widening of the eye, and/or blinking the eye.

Unifying data model 600 is an example of a data model for processing ocular event data. In this example, unifying data model 600 has three types of data models, namely, 1) system data models 602 which captures the specification of a given monitoring system, including details like geographic location of the system, number of cameras, physical layout of the monitored space, and other details regarding the monitored environment; 2) user data models 604 models users, privileges and user functionality; and 3) event data models 606 which captures the events that occur in a specific sensor or zone in the monitored space. Each of these data models is described below.

System data models 602 have a number of components. These may include sensor/camera data models 608. The most fundamental component of sensor/camera data models 608 is a view. A view is defined as some particular placement and configuration, such as a location, orientation, and/or parameters, of a sensor. In the case of a camera, a view would include the values of the pan, tilt and zoom parameters, any lens and camera settings and position of the camera. A fixed camera can have multiple views. The view “Id” may be used as a primary key to distinguish between events being generated by different sensors. A single sensor can have multiple views. Sensors in the same geographical vicinity are grouped into clusters, which are further grouped under a root cluster. There is one root cluster per server.

Engine data models 610 utilize a wide range of event detection technologies, such as, without limitation, facial recognition, behavior analysis, and/or license plate recognition. User data models 604 captures the privileges of a given user. These may include selective access to camera views; selective access to camera/engine configuration and system management functionality; and selective access to search and query functions.

Event data models 606 represents the events that occur within a space that may be monitored by one or more cameras or other sensors. Time line data model 612 may also be employed as discussed above. Time line data models 612 uses time as a primary synchronization mechanism for events that occur in the real world, which is monitored through sensors. The event data model's basic schema allows multiple layers of annotations for a given time span.

Turning now to FIG. 7, a flowchart illustrating a process for identifying a person of interest based on ocular metadata in accordance with an illustrative embodiment. Step 702 may be implemented by software for identifying cohorts, such as cohort analysis 508 in FIG. 5. Steps 704-706 may be implemented by software for identifying patterns in ocular metadata, such as ocular pattern recognition 512 in FIG. 5. Steps 708-712 are implemented by software for identifying persons of interest, such as person of interest identifier engine 514 in FIG. 5.

The process begins by identifying a member of a cohort group (step 702). Images of eye movements of the member of the cohort group are retrieved from a set of cameras (step 703). Ocular metadata associated with the member of the cohort group is generated using the images in real time as the images are received (step 704). The ocular metadata may be retrieved from a data storage device or retrieved from software generating the respiratory metadata in real time. The ocular metadata may be generated from the video images and/or audio data as the video images and/or audio data is generated by a set of one or more digital video cameras.

The ocular metadata is analyzed using analytics and/or a set of data models to identify patterns of ocular movements (step 706). A determination is made as to whether the patterns of ocular movements indicate behavioral deviations (step 708). If the patterns of ocular movements indicate behavioral deviations, the process identifies the member of the cohort group as a person of interest (step 710) with the process terminating thereafter. As a person of interest, one or more additional actions may be taken with respect to the person of interest. For example, the person of interest may be subjected to an increased level of monitoring, questioning by security personnel, a scanning by a metal detector or metal detector wand, a search, a background check, a fingerprint check, checking by a drug sniffing dog, a pat down search, an x-ray, or other increased monitoring.

Returning to step 708, if the patterns of ocular movements do not indicate behavioral deviations, a determination is made as to whether monitoring of the member of the cohort should continue (step 712). If monitoring should continue, the process returns to step 702. If monitoring should not continue, the process terminates thereafter.

FIG. 8 is a flowchart illustrating a process for generating event data associated with eye movements in accordance with an illustrative embodiment. The process in FIG. 8 may be implemented by software for generating ocular metadata from a stream of video images, such as video analysis system 400 in FIG. 4.

The process begins by receiving data from a set of cameras (step 802). The set of cameras includes one or more cameras. The camera may be implemented as any type of camera, such as, without limitation, set of cameras 402 in FIG. 4. The data includes, without limitation, streaming video images, streaming audio data, and/or infrared images.

The process analyzes the data using multiple analytical technologies to detect events to form ocular metadata (step 804). The multiple technologies may include, for example, a behavior analysis engine, a license plate recognition engine, a face recognition engine, a badge reader engine, a radar analytic engine, ocular movement analytics, retinal/iris analytics, audio analytics, and/or voice analysis. The ocular metadata is data describing ocular movement events associated with a member of a cohort group.

The ocular metadata is cross correlated in a unifying data model to identify patterns of ocular movements (step 806). Cross correlating provides integrated situation awareness across the multiple analytical technologies. The cross correlating may include correlating ocular change/ocular movement events to a time line to associate events to define an integrated event. The patterns of ocular movements are indexed and stored in a repository, such as a database (step 808) with the process terminating thereafter.

In the example in FIG. 8, the database can be queried to determine whether an integrated event matches the query. This includes employing cross correlated information from a plurality of information technologies and/or sources. New analytical technologies also may be registered. The new analytical technologies can employ models and cross correlate events using existing analytical technologies to provide a dynamically configurable video analysis system.

In this example, video data, audio data, and/or infrared data is received from a set of cameras. However, in other embodiments, the data may come from other sensor devices, such as, without limitation, a badge reader, a motion detector, a pressure sensor, or radar.

FIG. 9 is a flowchart illustrating a process for identifying members of a cohort group in accordance with an illustrative embodiment. The process in FIG. 9 is implemented by software for generating cohort groups, such as cohort analysis 508 in FIG. 5.

The process begins by parsing event data to identify dynamic behavior information (step 902). Dynamic behavior information is information describing behavior and/or events associated with people and/or objects that is generated substantially in real time as the behavior and/or events occur. The dynamic behavior information is associated with profile data to form dynamic data profiles (step 904) associated with the people and/or objects. The dynamic profiles are analyzed to identify cohort groups (step 906) with the process terminating thereafter. The cohort groups comprise the people and/or the objects.

Referring now to FIG. 10, a flowchart illustrating a process for identifying patterns of ocular movements indicating behavioral deviations is shown in accordance with an illustrative embodiment. The process in FIG. 10 is implemented by software for identifying patterns in ocular movements and changes in pupil dilation, such as ocular pattern recognition 512 in FIG. 5.

The process begins by analyzing ocular movement events associated with a member of a cohort group (step 1002). Patterns of pupil dilation are identified (step 1004). A direction of gaze and length of gaze is identified (step 1006). A determination is made as to whether a direction of gaze changes (step 1008). If a direction of gaze changes, the process identifies the new direction of the gaze and the length of gaze at step 1006. A rate of redirecting gaze is then identified (step 1010) based on the length of the gaze in each direction.

A determination is made as to whether furtive glances are identified (step 1012). If furtive glances are identified, the member of the cohort group is identified as a person of interest (step 1014). A determination is then made as to whether the patterns of ocular movements indicate a fixed stare (step 1016). If a fixed stare occurs, the member of the cohort group is identified as a person of interest (step 1017). Returning to step 1016, if a fixed stare is not identified, a rate of blinking is identified (step 1018). A determination is made as to whether the rate of blinking indicates an unblinking stare (step 1020). If an unblinking stare is indicated, the process identifies the member of the cohort group as a person of interest (step 1022) with the process terminating thereafter.

FIG. 11 is a flowchart illustrating a process for identifying a person of interest based on changes in eye movements of a member of a cohort group in accordance with an illustrative embodiment. The process in FIG. 10 is implemented by software for identifying patterns in ocular movements and changes in pupil dilation, such as ocular pattern recognition 512 in FIG. 5.

The process begins by analyzing patterns of ocular movements (step 1102). A determination is made as to whether the member of the cohort group is watching a particular person, place, or object (step 1104). If yes at step 1104, a determination is made as to whether the person, place, or object that is watched indicates a behavioral deviation (step 1106). The member of the cohort group is identified as a person of interest (step 1108) with the process terminating thereafter.

Returning to step 1104, if the patterns do not indicate the person is watching a single person, place, or object, a determination is made as to whether the person is watching a type of person, place, or object (step 1110). For example, the person may be watching security guards, exits, other passengers, or similar types of objects, persons, or places. If a particular type of person, place, or object is not being watched, the process terminates thereafter. If a particular type of person, place, or object is being watched, the process makes a determination as to whether the type of person, place, or object being watched indicates a behavioral deviation (step 1112). For example, a mother watching children probably does not indicate a behavioral deviation. In another example, a man watching security checkpoints may indicate behavioral deviations. If the type of person, place or object does not indicate behavioral deviations, the process terminates thereafter. If the type of person, place, or object does indicate behavior deviations, the process identifies the member of the cohort group as a person of interest (step 1108) with the process terminating thereafter.

According to one embodiment of the present invention, a computer implemented method, apparatus, and computer program product is provided for detecting behavioral deviations in members of a cohort group. A member of a cohort group is identified. Each member of the cohort group shares a common characteristic. Ocular metadata associated with the member of the cohort group is generated in real-time. The ocular metadata describes movements of an eye of the member of the cohort group. The ocular metadata is analyzed to identify patterns of ocular movements. In response to the patterns of ocular movements indicating behavioral deviations in the member of the cohort group, the member of the cohort group is identified as a person of interest. A person of interest may be subjected to an increased level of monitoring and/or other security measures to determine if the person of interest poses a threat to the person's self and/or to others.

The video analysis system enables the automatic detection of behavior deviations and automatic identification of persons of interest in real time without requiring the intervention of a human user to manually review audio and/or video data. Moreover, the video analysis system is capable of detecting changes in eye movements, pupil dilation, furtive glances, and other specific, complex, eye movement patterns that may be difficult or impossible for a human user to detect in real time as the eye movements are occurring.

The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

The invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.

Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any tangible apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.

The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.

A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.

Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers.

Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modems, and Ethernet cards are just a few of the currently available types of network adapters.

The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated. 

What is claimed is:
 1. A computer implemented method for detecting behavioral deviations in members of a cohort group, the computer implemented method comprising: analyzing ocular metadata to identify patterns in changes in a size of a pupil of an eye of a member of the cohort group captured by a set of cameras, wherein the ocular metadata describes the changes in the size of the pupil of the eye due to dilation and constriction of the pupil, and wherein the patterns in the changes in the size of the pupil include a rate of changes in the size of the pupil, a degree of change in the size of the pupil, and a number of changes in the size of the pupil, and wherein the patterns in the changes in the size of the pupil indicate any external stimuli associated with the changes in the size of the pupil; and responsive to the changes in the size of the pupil of the eye indicating behavioral deviations in the member of the cohort group, identifying the member of the cohort group as a person of interest that is subject to an increased level of monitoring.
 2. The computer implemented method of claim 1 further comprising: generating the ocular metadata associated with the member of the cohort group using images of eye movements captured by the set of cameras, wherein the ocular metadata also describes movements of the eye of the member of the cohort group, and wherein the ocular metadata is generated automatically in real time as the images of the eye movements are captured; and analyzing the ocular metadata using a set of data models to identify patterns of ocular movements indicating the behavioral deviations.
 3. The computer implemented method of claim 2 further comprising: analyzing the ocular metadata to identify a given direction of gaze and a duration the gaze remains fixed in the given direction; and responsive to the eye movements indicating a direction of gaze in the given direction for a duration of time that is greater than a threshold duration, indicating an occurrence of a fixed stare in the patterns of ocular movements.
 4. The computer implemented method of claim 2 further comprising: analyzing the ocular metadata to identify visual lines of gaze, wherein a visual line of gaze indicates where the eye is looking; responsive to the visual lines of gaze indicating the member of the cohort group is watching a single object or a type of object to form a target object or target type of object, indicating the member of the cohort group is watching the target object or the target type of object in the patterns of ocular movements; and analyzing the patterns of ocular movements to determine whether the target object or target type of object indicates a behavioral deviation.
 5. The computer implemented method of claim 4 further comprising: analyzing the ocular metadata to identify a number of times the visual line of gaze is redirected from a first direction to a second direction over a time interval to form a rate of redirection of the gaze; and responsive to the rate of redirection of the gaze exceeding a threshold rate, identifying the ocular movements as a furtive glance; and responsive to identifying a set of furtive glances occurring over a threshold interval of time, identifying the set of furtive glances as a pattern of ocular movements in the patterns of ocular movements.
 6. The computer implemented method of claim 2 further comprising: analyzing the ocular metadata to identify a rate of blinking over an interval of time; and responsive to the rate of blinking falling below a threshold rate of blinking, identifying a pattern of ocular movement comprising an unblinking stare, wherein the unblinking stare is a pattern of ocular movements in the patterns of ocular movements.
 7. The computer implemented method of claim 2 wherein the patterns of ocular movements indicating behavioral deviations comprises at least one of a set of furtive glances, an unblinking stare, a fixed stare, an atypical rate of blinking, an atypical target object or type of object watched by the person, a flat or unemotional affect, atypical patterns in pupil dilation, atypical narrowing of the eyes, and atypical widening of the eyes.
 8. The computer implemented method of claim 1 wherein the cohort group is a group of people in a transportation facility.
 9. The computer implemented method of claim 8 wherein the transportation facility is an airport.
 10. The computer implemented method of claim 1 wherein increasing a level of monitoring associated with the person of interest includes at least one of continuing capturing video images of eye movements and behavior of the person of interest, questioning the person of interest by security personnel, checking an identification of the person of interest, searching baggage associated with the person of interest, searching the person of interest, monitoring activities of the person of interest by security personnel, scanning the person of interest with a metal detector or metal detector wand, x-ray the person of interest, and checking the person of interest with a drug sniffing dog.
 11. A computer program product for detecting behavioral deviations in members of a cohort group, the computer program product comprising: a computer readable storage device; program code stored on the computer readable storage device for analyzing ocular metadata to identify patterns in changes in a size of a pupil of an eye of a member of the cohort group captured by a set of cameras, wherein the ocular metadata describes the changes in the size of the pupil of the eye due to dilation and constriction of the pupil, and wherein the patterns in the changes in the size of the pupil include a rate of changes in the size of the pupil, a degree of change in the size of the pupil, and a number of changes in the size of the pupil, and wherein the patterns in the changes in the size of the pupil indicate any external stimuli associated with the changes in the size of the pupil; and program code stored on the computer readable storage device for identifying the member of the cohort group as a person of interest that is subject to an increased level of monitoring in response to the changes in the size of the pupil of the eye indicating behavioral deviations in the member of the cohort group.
 12. The computer program product of claim 11 further comprising: program code stored on the computer readable storage device for generating the ocular metadata associated with the member of the cohort group using images of eye movements captured by the set of cameras, wherein the ocular metadata also describes movements of the eye of the member of the cohort group, and wherein the ocular metadata is generated automatically in real time as the images of the eye movements are captured; and program code stored on the computer readable storage device for analyzing the ocular metadata using a set of data models to identify patterns of ocular movements indicating the behavioral deviations.
 13. The computer program product of claim 12 further comprising: program code stored on the computer readable storage device for analyzing the ocular movements to identify a given direction of gaze and a duration the gaze remains fixed in the given direction; and program code stored on the computer readable storage device for indicating an occurrence of a fixed stare in the patterns of ocular movements in response to the eye movements indicating a direction of gaze in the given direction for a duration of time that is greater than a threshold duration.
 14. The computer program product of claim 12 further comprising: program code stored on the computer readable storage device for analyzing the ocular metadata to identify visual lines of gaze, wherein a visual line of gaze indicates where the eye is looking; program code stored on the computer readable storage device for indicating the member of the cohort group is watching a target object or a target type of object in the patterns of ocular movements in response to the visual lines of gaze indicating the member of the cohort group is watching a single object or a type of object to form the target object or the target type of object; and program code stored on the computer readable storage device for analyzing the patterns of ocular movements to determine whether the target object or target type of object indicates a behavioral deviation.
 15. The computer program product of claim 14 further comprising: program code stored on the computer readable storage device for analyzing the ocular metadata to identify a number of times the visual line of gaze is redirected from a first direction to a second direction over a time interval to form a rate of redirection of the gaze; and program code stored on the computer readable storage device for identifying the ocular movements as a furtive glance in response to the rate of redirection of the gaze exceeding a threshold rate; and program code stored on the computer readable storage device for identifying a set of furtive glances as a pattern of ocular movements in the patterns of ocular movements in response to identifying the set of furtive glances occurring over a threshold interval of time.
 16. The computer program product of claim 12 further comprising: program code stored on the computer readable storage device for analyzing the ocular metadata to identify a rate of blinking over an interval of time; and program code stored on the computer readable storage device for identifying a pattern of ocular movement comprising an unblinking stare in response to the rate of blinking falling below a threshold rate of blinking, wherein the unblinking stare is a pattern of ocular movements in the patterns of ocular movements.
 17. An apparatus comprising: a bus system; a communications system coupled to the bus system; a storage device connected to the bus system, wherein the storage device stores computer usable program code; and a processor unit coupled to the bus system, wherein the processor unit executes the computer usable program code to analyze ocular metadata to identify patterns in changes in a size of a pupil of an eye of a member of a cohort group captured by a set of cameras, wherein the ocular metadata describes the changes in the size of the pupil of the eye due to dilation and constriction of the pupil, and wherein the patterns in the changes in the size of the pupil include a rate of changes in the size of the pupil, a degree of change in the size of the pupil, and a number of changes in the size of the pupil, and wherein the patterns in the changes in the size of the pupil indicate any external stimuli associated with the changes in the size of the pupil; and identify the member of the cohort group as a person of interest that is subject to an increased level of monitoring in response to the changes in the size of the pupil of the eye indicating behavioral deviations in the member of the cohort group.
 18. The apparatus of claim 17 wherein the processor unit further executes the computer usable program code to generate the ocular metadata associated with the member of the cohort group using images of eye movements captured by the set of cameras, wherein the ocular metadata also describes movements of the eye of the member of the cohort group, and wherein the ocular metadata is generated automatically in real time as the images of the eye movements are captured; and analyze the ocular metadata using a set of data models to identify patterns of ocular movements indicating the behavioral deviations.
 19. The apparatus of claim 18 wherein the processor unit further executes the computer usable program code to analyze the patterns of ocular movements to analyze the eye movements to identify a given direction of gaze and a duration the gaze remains fixed in the given direction; and indicate an occurrence of a fixed stare in the patterns of ocular movements in response to the ocular movements indicating a direction of the gaze in the given direction for a duration of time is greater than a threshold duration.
 20. The apparatus of claim 18 wherein the processor unit further executes the computer usable program code to analyze the ocular metadata to identify visual lines of gaze, wherein a visual line of gaze indicates where the eye is looking; indicate the member of the cohort group is watching a target object or a target type of object in the patterns of ocular movements in response to the visual lines of gaze indicating the member of the cohort group is watching a single object or a type of object to form the target object or the target type of object; and analyze the patterns of ocular movements to determine whether the target object or target type of object indicates a behavioral deviation.
 21. The apparatus of claim 18 wherein the processor unit further executes the computer usable program code to analyze the ocular metadata to identify a rate of blinking over an interval of time; and identify a pattern of ocular movement comprising an unblinking stare in response to the rate of blinking falling below a threshold rate of blinking, wherein the unblinking stare is a pattern of ocular movements in the patterns of ocular movements.
 22. A data processing system for detecting behavioral deviations in members of a cohort group, the data processing system comprising: a video analysis system that includes a retinal/iris analytics engine, wherein the retinal/iris analytics engine analyzes ocular metadata to identify patterns in changes in a size of a pupil of an eye of a member of the cohort group captured by a set of cameras, wherein the ocular metadata describes the changes in the size of the pupil of the eye due to dilation and constriction of the pupil, and wherein the patterns in the changes in the size of the pupil include a rate of changes in the size of the pupil, a degree of change in the size of the pupil, and a number of changes in the size of the pupil, and wherein the patterns in the changes in the size of the pupil indicate any external stimuli associated with the changes in the size of the pupil an analysis server, wherein the analysis server analyzes the ocular metadata using analytics and a set of data models to identify the patterns in the changes in the size of the pupil, and wherein the analysis server identifies the member of the cohort group as a person of interest that is subject to an increased level of monitoring in response to the changes in the size of the pupil of the eye indicating behavioral deviations in the member of the cohort group.
 23. The data processing system of claim 22, wherein the set of cameras generates images of eye movements associated with the member of the cohort group, and wherein the set of cameras are located in a transportation facility.
 24. The data processing system of claim 22 wherein the video analysis system further comprises: an ocular movement analytics engine, wherein the ocular movement analytics engine analyzes the ocular metadata to identify a number of times a visual line of gaze is redirected from a first direction to a second direction over a time interval to form a rate of redirection of the gaze; identify ocular movements as a furtive glance in response to the rate of redirection of the gaze exceeding a threshold rate; and identify a set of furtive glances as a pattern of ocular movements in patterns of ocular movements in response to identifying the set of furtive glances occurring over a threshold interval of time.
 25. The data processing system of claim 22, wherein the video analysis system generates the ocular metadata associated with the member of the cohort group using images of eye movements associated with the member of the cohort group, wherein the images of the eye movements are captured by the set of cameras, and wherein the ocular metadata also describes movements of the eye of the member of the cohort group, and wherein the ocular metadata is generated automatically in real time as the images of the eye movements are captured. 