Effective Detection of Weapons in Video Surveillance

Authors

  • Farminder Singh RIMT University, Mandi Gobindgarh, Punjab, India Author

Keywords:

Classification, Deep Learning, Faster R-CNN, Object Detection, Object Recognition, Surveillance, Weapons, X-Ray, YOLO V3

Abstract

Surveillance cameras also known as  Closed Circuit Tele-Vision (CCTV) play a major part in  the enforcement of the law and the administration of  justice. The present level of industrial production  technology cannot differentiate between a good and a  bad, or even a bit worse, situation. As a consequence,  additional crime scene investigation or law order  maintenance work is needed, which takes a lengthy time.  The suggested work is being utilized for a number of  purposes, including surveillance, weapon monitoring and  classification, live tracking, and more. Video input is  permitted as a type of raw input in this project for  monitoring and detecting abnormal events utilizing real time detection techniques such as You Look Only Once  Version 3 (YOLO V3). The proposed project's operations  make use of a processing module for object recognition  using convolutional neural networks such as YOLO V3,  which predicts classes and bounding boxes for the entire  image in a single run of the algorithm. The circular area  will be watched by CCTV, which will automatically  execute all operations and be controlled. Before  implementing in such a setting and delivering optimal  results, numerous samples and datasets will be examined  to find accuracy in detection and classification. The  planned effort aims to significantly reduce crime rates  while simultaneously providing improved protection in  specific areas and decreasing the time it takes to capture a  criminal. 

Downloads

Download data is not yet available.

References

. Hatim M, Siddiqui F, Kumar R. Addressing challenges and demands of intelligent seasonal rainfall forecasting using artificial intelligence approach. In: Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. 2020.

. Naaz R, Saxena AK, Ather D. A framework for implementing blockchain with enhanced e2e encryption on ethereum 2.0. Int J Adv Sci Technol. 2019;

.Gola KK, Gupta B. An energy-efficient quality of service (QOS) parameter-based void avoidance routing technique for underwater sensor networks. Jordanian J Comput Inf Technol. 2019;

. Gola KK, Dhingra M, Rathore R. Modified version of playfair technique to enhance the security of plaintext and key using rectangular and substitution matrix. Int J Eng Adv Technol. 2019;

. Varshney PK, Slamani MA, Alford MG, Ferris D. On the modeling of the sensor fusion process for concealed weapons detection. In: 1998 IEEE Information Technology Conference: Information Environment for the Future, IT 1998. 1998.

. Akcay S, Breckon TP. An evaluation of region based object detection strategies within X-ray baggage security imagery. In: Proceedings - International Conference on Image Processing, ICIP. 2018.

. Mian SM, Kumar R. Review on Intend Adaptive Algorithms for Time Critical Applications in Underwater Wireless Sensor Auditory and Multipath Network. In: 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019. 2019.

. Agrawal T, Agrawal AK, Singh SK. An efficient key accumulation cryptosystem for cloud. Int J Eng Adv Technol. 2019;

. Agrawal T, Agrawal AK, Singh SK. Cloud sanctuary through effectual access control and cryptographic model. J Adv Res Dyn Control Syst. 2019;

. Gupta P, Tyagi N. An approach towards big data - A review. In: International Conference on Computing, Communication and Automation, ICCCA 2015. 2015.

. Bala L, K. Vatsa A. Quality based Bottom-up-Detection and Prevention Techniques for DDOS in MANET. Int J Comput Appl. 2012;

. Sood R, Kalia M. Cloudbank: A secure anonymous banking cloud. In: Communications in Computer and Information Science. 2010.

. Jain N, Awasthi Y, Jain RK. Ubiquitous sensor based intelligent system for net houses. In: Proceedings - IEEE 2021 International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2021. 2021.

. Akcay S, Kundegorski ME, Willcocks CG, Breckon TP. Using deep convolutional neural network architectures for object classification and detection within x-ray baggage

security imagery. IEEE Trans Inf Forensics Secur. 2018; [15]. Manglik E, Sharma P, Rawat P, Tyagi N. Ontology based context synonymy web searching. In: Proceedings of the 2013 International Conference on Information Systems and Computer Networks, ISCON 2013. 2013.

. Slamani M-A, Ramac LC, Uner MK, Varshney PK, Weiner DD, Alford MG, et al. Enhancement and fusion of data for concealed weapon detection. In: Signal Processing, Sensor Fusion, and Target Recognition VI. 1997.

. Sharma S, Sharma S. Design of high gain Wang shape microstrip patch antenna for wireless system. In: 2012 3rd International Conference on Computing, Communication and Networking Technologies, ICCCNT 2012. 2012.

. Chandan, Rai BS. Bandwidth enhancement of wang shape microstrip patch antenna for wireless system. In: Proceedings - 2014 4th International Conference on Communication Systems and Network Technologies, CSNT 2014. 2014.

. Jha A, Kumar M. Two wheels differential type odometry for mobile robots. In: Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization. IEEE; 2014. p. 1–5.

. Sheen DM, McMakin DL, Hall TE. Cylindrical millimeter-wave imaging technique and applications. In: Passive Millimeter-Wave Imaging Technology IX. 2006.

. Verma GK, Dhillon A. A Handheld Gun Detection using Faster R-CNN Deep Learning. In: ACM International Conference Proceeding Series. 2017.

. Biswal M, Dash PK. Detection and characterization of multiple power quality disturbances with a fast S-transform and decision tree based classifier. Digit Signal Process A Rev J. 2013;

. Rath M, Pattanayak BK. A methodical survey on real time applications in MANETS: Focussing on key issues. In: 2014 International Conference on High Performance Computing and Applications, ICHPCA 2014. 2015.

. Jadhav MJJ. Moving Object Detection and Tracking for Video Survelliance. Int J Eng Res Gen Sci. 2014;

Downloads

Published

2021-11-30

How to Cite

Effective Detection of Weapons in Video Surveillance. (2021). International Journal of Innovative Research in Computer Science & Technology, 9(6), 309–313. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/11220