International Journal of Advanced Engineering Application

ISSN: 3048-6807

Suspicious activity detection for prevention of violence using YOLO and CNN algorithms

Author(s):Atharva Pathak1, Shreyas Patil2,Arnav Sinha 3, Parag Pandharpote4 , Lata Sankpal5

Affiliation: 1,2,3,4,5Dept of Computer Engineering PVGs COET and GKPWIOM, Pune. India.

Page No: 7-13

Volume issue & Publishing Year: Volume 1 Issue 1, May-2024

Journal: International Journal of Advanced Engineering Application (IJAEA)

ISSN NO: 3048-6807

DOI:

Download PDF

Abstract:
In response to the surge in violent incidents, this paper introduces an advanced surveillance system addressing the need for proactive threat detection. Leveraging You Only Look Once (YOLO) and Convolutional Neural Network (CNN) algorithms, our system achieves real-time identification of weapons, recognizes riots, detects suspicious bags, identifies their owners, and uncovers camera tampering. The outcome of this research contributes to the development of an intelligent surveillance framework that not only detects potential threats but also generates prompt alert notifications, enabling swift response measures to prevent or mitigate violent situations.

Keywords: Object detection, knife/gun detection, suspicious luggage detection and its owner identification, riots detection, camera tampering detection, alert, email notification, Yolo object detection, Convolutional Neural Network.

Reference:

  • [1] A. Datta, M. Shah, and N. Da Vitoria Lobo, “Person-on-person violence detection in video data,” Proc. 2002 Int. Conf. Pattern Recognition, Quebec City, QC, Canada, 2002, pp. 433–438, vol. 1, doi: 10.1109/ICPR.2002.1044748.
  • [2] T. Santad, P. Silapasupphakornwong, W. Choensawat, and K. Sookhanaphibarn, “Application of YOLO deep learning model for real-time abandoned baggage detection,” 2018 IEEE 7th Global Conf. Consumer Electronics (GCCE), Nara, Japan, 2018, pp. 157–158, doi: 10.1109/GCCE.2018.8574819.
  • [3] A. Warsi, M. Abdullah, M. N. Husen, M. Yahya, S. Khan, and N. Jawaid, “Gun detection system using YOLOv3,” 2019 IEEE Int. Conf. Smart Instrumentation, Measurement and Application (ICSIMA), Kuala Lumpur, Malaysia, 2019, pp. 1–4, doi: 10.1109/ICSIMA47653.2019.9057329.
  • [4] E. Ribnick, S. Atev, O. Masoud, N. Papanikolopoulos, and R. Voyles, “Real-time detection of camera tampering,” 2006 IEEE Int. Conf. Video and Signal Based Surveillance, Sydney, NSW, Australia, 2006, pp. 10–10, doi: 10.1109/AVSS.2006.94.
  • [5] Y. H. Sharath Kumar and C. Naveena, “A deep learning based system to estimate crowd and detect violence in videos,” in Artificial Intelligence for Societal Issues, A. Biswas, V. B. Semwal, and D. Singh, Eds. Cham, Switzerland: Springer, 2023, pp. 1–14. (Intelligent Systems Reference Library, vol. 231).
  • [6] D. Won, Z. C. Steinert-Threlkeld, and J. Joo, “Protest activity detection and perceived violence estimation from social media images,” in Proc. 25th ACM Int. Conf. Multimedia, 2017, pp. 1–9.
  • [7] M. A. Hanif, A. A. Butt, and M. M. Khan, “Detecting riots using action localization,” 2016 IEEE Int. Conf. Image Processing (ICIP), Phoenix, AZ, USA, 2016, pp. 3031–3035, doi: 10.1109/ICIP.2016.7532916.