Return to Article Details Suspicious Activity Detection using Image Processing Download Download PDF