Conference-05 2024 IEEE an Enhanced Weapon Detection System Using Deep Learning
Conference-05 2024 IEEE an Enhanced Weapon Detection System Using Deep Learning
net/publication/380937723
CITATIONS READS
0 619
4 authors, including:
All content following this page was uploaded by Sivakumar Murugaiyan on 29 May 2024.
Kiranmai Bellam
Department of CEE,
Prairie View A&M University,
Texas, TX77446, U.S.A
[email protected]
Abstract: Considering a growing number of criminal acts, security guards arriving at the scene, examining recorded
there is an urgent need to introduce computerized command images, and collecting essential evidence [4].
systems in security forces. This study presents a novel deep Consequently, the need for proactive systems at crime
learning model specifically developed for identifying seven scenes has been emphasized [3,5,6]. This research
different categories of weapons. The suggested model utilizes
the VGGNet architecture and is implemented utilizing the
advocates the creation of a system that makes use of
Keras architecture, which is built on top of the TensorFlow software to quickly notify security staff when it detects
framework. The model is trained to recognize several types of dangerous things, enabling immediate action to avert
weapons, including assault rifles, bazookas, grenades, potential crimes [4,7]. Hence, it has to be essential to
hunting rifles, knives, handguns, and revolvers. The training develop a system that has the ability to learn and identify
procedure involves creating layers, executing processes, potentially dangerous things [8].
saving training data, determining success rates, and testing The profound importance of deep learning in
the model. A customized dataset, consisting of seven different enhancing the execution of tasks inside protection control
weapon categories, has been meticulously chosen and systems is generally recognized [3]. Deep learning is a
organized to support the training of the proposed model
network. We do a comparative study using the newly created
specific area within machine learning that utilizes multiple
dataset, specifically comparing it with established models layers of non-linear processing units to gather and modify
such as VGG-16, ResNet-50, and ResNet-101. The suggested features [9,10]. Deep learning focuses on extracting
model exhibits exceptional classification accuracy, obtaining representations from primary data through integrating the
a remarkable 98.40%, outperforming the VGG-16 model understanding of a number of feature levels of data [11].
(89.75% accuracy), ResNet-50 model (93.70% accuracy), and An image representation entails quantifying the density
ResNet-101 model (83.33% accuracy). This research provides metrics for each pixel and identifying features such as
a vital viewpoint on the effectiveness of the suggested deep groups of edges and distinctive forms [12]. The
learning model in dealing with the complex problem of Convolutional Neural Network, also known as the is the
weapon classification, presenting encouraging outcomes that
could greatly improve the capabilities of security forces in
core architecture of deep learning. It consists of several
countering criminal activities. layers, including the pooling, convolution, and activation
operation, dropout, entirely interconnected, and layer for
classification [13].
Keywords: Deep learning, armed weapon detection, machine
learning, object detection, convolutional neural networks
In contemporary society, illicit activities
predominantly center around portable firearms [16].
Research consistently highlights the significant role that
I. INTRODUCTION handheld guns play in various illicit activities such as theft,
Surveillance cameras have become prevalent in the illegal hunting, and terrorism [17]. One proposed approach
modern era of improved science and technology as an to reduce criminal activities is the establishment of
essential instrument for preventing crime [1]. Security surveillance systems or control cameras. This allows
professionals must diligently oversee the installation of security units to take proactive steps at an early stage
many camera systems in various locations [2,3]. [18,19,20]. Nevertheless, the task of identifying weapons
Traditionally, post-incident analysis involves poses distinctive difficulties, such as self-occlusion, object
979-8-3503-6526-9/24/$31.00 ©2024 IEEE
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on May 29,2024 at 06:21:30 UTC from IEEE Xplore. Restrictions apply.
2024 2nd International Conference on Networking and Communications (ICNWC)
resemblances, and complexities in the backdrop [15,16]. versatile approach showcased enhanced accuracy in
Self-occlusion refers to the circumstance where a portion recognizing objects and events in video footage.
of the weapon is blocked or hidden, while object A study on hybrid weapon detection employed fuzzy
similarities exist when non-weapon objects, like hands or logic to create a system that can identify dangerous items,
clothing, bear resemblance to weapons. Background such as firearms and blades, by incorporating extra
addresses refer to the difficulties related to the variables. This not only strengthened the accuracy of the
surroundings in which a weapon is placed [16]. results, but also substantially decreased the occurrence of
This article introduces a novel deep learning model false alarms[25]. Two new techniques were introduced in
specifically developed for the purpose of accurately a study that exploited deep Convolutional Neural
detecting and classifying seven specific types of weapons, Networks (CNNs) to classify weapons [26]. The study
namely assault rifles, bazookas, grenades, hunting rifles, examined the impact of adjusting the neuron count in the
knives, pistols, and revolvers. The classification layer that is completely linked by utilizing the weights
performance of the proposed model is thoroughly assessed obtained from a trained beforehand VGG-16 model. This
using well-established benchmarks, such as the Visual investigation provided useful knowledge regarding
Geometry Group (VGG-16) model [21], Residual Network classification systems. A research that specifically targeted
(ResNet50), and ResNet101 models [22]. Comparative the identification of guns in surveillance videos [5]
investigation reveals that the suggested model exhibits stationed its analysis on regions where human presence
higher accuracy and reduced loss rates compared to the was detected. The implementation of a weapon detection
VGG-16, ResNet50, and ResNet101 models. The system that utilizes distinct components of weapons
subsequent sections of this work are organized in the demonstrates a focused approach to improving detection
following manner: Section 2 conducts a comprehensive efficiency [27].
analysis of the relevant literature. Section 3 elucidates the An independent inquiry[28] examined the
materials and methods employed in the study. Section 4 implementation of various tiers of defense for Internet of
showcases the results of the evaluation of the classification Things (IoT) platforms. The suggested system consistently
performance. Section 5 provides an in-depth discussion. assessed multidimensional events and determined
Lastly, Section 6 concludes the study by summarizing protection levels, fulfilling the requirement for a
significant findings and indicating potential avenues for comprehensive approach to security management in
future research. dynamic situations. The study conducted real-time object
detection, focusing on movable weapons such as pistols
II. LITERATURESURVEY and rifles [20]. The research successfully recognized and
The emergence of automatic handgun detection systems categorized ammunition in photographs by using
for surveillance and security applications have drawn TensorFlow-based versions of Overfeat, a convolutional
considerable attention in recent years, leading to the neural network (CNN) based visual extractor and data
exploration of novel techniques and methodology. This generator. A research investigation on the automated
literature assessment consolidates and evaluates numerous identification of firearms and swords presented algorithms
research efforts, each making a distinct contribution to the to alert human operators when these items were recognized
developing field of weapon detection systems. A major in closed-circuit telecommunications systems[29]. The
study, as stated in [18], focused on generating crucial project aimed to prioritize practicality by minimizing false
training data for an automatic handgun detection system alarms and creating a system that can promptly issue
using deep Convolutional Neural Network (CNN) notifications in hazardous situations.
classification. The study thoroughly explored the Clustering algorithms and color-based
effectiveness of several categorization models, with a segmentation were used in the field of visual weapon
particular focus on the importance of reducing false registration to exclude unimportant objects from
positives. After analyzing two approaches to classification, photographs. The Harris detector and rapid retina keypoint
one using the sliding window technique and the other using descriptor were critical in detecting pertinent objects,
the geographic proposal approach, it was found that the dealing with challenges such as partial occlusion, scaling,
region-based CNN model, which operates quickly, rotation, and the existence of several weapons[30]. A study
produced the most promising results [18]. was conducted to identify individuals who are at risk,
The study [23] focused on determining the imbalance namely those who possess handheld weapons. This study
map and evaluating candidate regions from input frames established a model that examines the interaction between
using image fusion. This study intended to improve object humans and objects. This methodology was designed to
detection in surveillance transcriptions by utilizing a cost- detect hazardous incidents by identifying hidden
effective symmetrical dual-camera system, with the goal of dangerous things in possible areas of the human body [31].
reducing false positives. By including brightness-guided To summarize, previous research has mostly focused
preliminary processing, which includes lowering and on categorizing hidden weapons such as firearms, knives,
juxtaposing, throughout both the development and testing and handheld weapons. However, this literature review
phases, a model was created that can accurately detect cold highlights a significant deficiency in the current body of
steel weapons[24].The successful implementation of this knowledge. As far as we know, there has been no study that
979-8-3503-6526-9/24/$31.00 ©2024 IEEE
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on May 29,2024 at 06:21:30 UTC from IEEE Xplore. Restrictions apply.
2024 2nd International Conference on Networking and Communications (ICNWC)
efficiency and speed of the network. Applying a dropout was evaluated using a distinct testing dataset to measure its
layer of 25% after each pooling layer helps prevent the ability to generalize. The model's success in weapon
technique of memorization. The techniques of convolution, identification and categorization was quantified using
pooling, and flattening are applied iteratively in succeeding performance indicators such as precision, recall,
layers with varying parameters and filter channel values. efficiency, and F1 score.
The process of organizing neurons into an array involves
flattening and completely linking layers, resulting in a final 3.5 Comparison with Existing Models
layer that is entirely linked and composed of 2048 neurons. To assess the superiority of the given model, a comparative
The classification layer utilizes the softmax activation analysis was conducted against established architectures,
function to produce outputs ranging from 0 to 1, which specifically the VGG-16 model and Residual Network
belong to seven distinctive weapon categories. The greatest (Res-Net) models like ResNet-50 and ResNet-101. The
output value reveals the predicted weapon type. examination considered parameters like reliability,
inaccurate result and efficiency of computation..
3.6 Ethical Considerations
Throughout the process of developing the model, ethical
considerations were given the highest priority. The
utilization of internet-acquired photographs complied with
copyright restrictions, and diligent measures were taken to
ensure the database's inclusiveness and absence of
prejudice. The study focused on promoting the prudent
utilization of technology for surveillance and safety
objectives, taking into account the possible ramifications
on society.
.
4.2 Model Evaluation and Comparison To assess its feasibility, the suggested model underwent
In order to thoroughly assess the models, a meticulous testing utilizing images depicting different categories of
comparison was carried out, taking into account reliability, weaponry being employed against human subjects. The
specificity, sensitivity, and loss factors (Table 4.3).The test data were collected from the web, and the region
proposed model consistently outperformed alternative proposal approach was utilized to validate accuracy.
models, achieving an impressive success rate of 98.40%.
The model outperformed the VGG-16, ResNet-50, and
ResNet-101 models, which achieved success rates of
89.75%, 93.70%, and 83.33% respectively.
979-8-3503-6526-9/24/$31.00 ©2024 IEEE
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on May 29,2024 at 06:21:30 UTC from IEEE Xplore. Restrictions apply.
2024 2nd International Conference on Networking and Communications (ICNWC)
International Conference on Smart Systems and semantic neural networks.In 2019 European
Inventive Technology (ICSSIT) (pp. 542-546). IEEE. Intelligence and Security Informatics Conference
[15] Verma, G. K., & Dhillon, A. (2017, November). A (EISIC) (pp. 70-77). IEEE.
portable firearm detection system utilizing the faster [27] Abdallah, H. B., Abdellatif, T., &Chekir, F. (2018).
region-based convolutional neural network (Faster R- AMSEP is an automated system that manages security
CNN) deep learning algorithm.. In Proceedings of the at multiple levels for multimedia event processing.
7th international conference on computer and Procedia computer science, 134, 452-457.
communication technology (pp. 84-88). [28] Grega, M., Matiolański, A., Guzik, P., &Leszczuk, M.
[16] Warsi, A., Abdullah, M., Husen, M. N., & Yahya, M. (2016). Automated identification of images including
(2020, January). Review of algorithms for automatic firearms and knives. Sensors, 16(1), 47. in a CCTV
detection of handguns and knives. In 2020 14th [29] Tiwari, R. K., & Verma, G. K. (2015). A framework
International Conference on Ubiquitous Information utilizing computer vision and the Harris interest point
Management and Communication (IMCOM) (pp. 1- detector for the purpose of visually detecting guns.
9). IEEE. Procedia Computer Science, 54, 703-712.
[17] Olmos, R., Tabik, S., & Herrera, F. (2018). Utilizing [30] Xu, Z., Tian, Y., Hu, X., & Pu, F. (2015, September).
deep learning to recognize automatic handguns in Human event understanding through the use of a
videos and trigger an alarm. Neurocomputing, 275, human-object interaction paradigm, which might be
66-72. potentially hazardous. In 2015 IEEE International
[18] Asnani, S., Ahmed, A., &Manjotho, A. A. (2014). A Conference on Signal Processing, Communications
bank security system is developed utilizing a method and Computing (ICSPCC) (pp. 1 5). IEEE.
called Weapon Detection using Histogram of Oriented [31] Angelova, A., Krizhevsky, A., &Vanhoucke, V.
Gradients (HOG) Features.. Asian Journal of (2015, May). Utilizing a deep network with a wide
Engineering, Sciences & Technology, 4(1). field of vision for the purpose of detecting pedestrians.
[19] Lai, J., & Maples, S. (2017). Creating a classifier that In 2015 IEEE international conference on robotics and
can detect guns in real-time. Course: CS231n, automation (ICRA) (pp. 704-711). IEEE.
Stanford University.
[20] Simonyan, K., & Zisserman, A. (2015). Deep
convolutional networks for large-scale image
recognition with significant depth. In: Proceedings of
International Conference on Learning
Representations.
[21] He, K., Zhang, X., Ren, S., & Sun, J. (2016). Image
recognition using deep residual
learning.In Proceedings of the IEEE conference on
computer vision and pattern recognition (pp. 770-
778).
[22] Olmos, R., Tabik, S., Lamas, A., Perez-Hernandez, F.,
& Herrera, F. (2019). An strategy for decreasing false
positives in handgun identification with deep learning
by fusing binocular images. Information Fusion, 49,
271-280.
[23] Castillo, A., Tabik, S., Pérez, F., Olmos, R., &
Herrera, F. (2019). Preprocessing based on brightness
enables the automatic detection of cold steel weapons
in surveillance films using deep learning.
Neurocomputing, 330, 151-161.
[24] Ineneji, C., &Kusaf, M. (2019). A hybrid weapon
identification technique is proposed, which combines
material testing with a fuzzy logic system.Computers
& Electrical Engineering, 78, 437 448.
[25] [25] Dwivedi, N., Singh, D. K., & Kushwaha, D. S.
(2019, December). Deep convolutional neural
networks for weapon categorization. In 2019 IEEE
Conference on Information and Communication
Technology (pp. 1-5). IEEE.
[26] Egiazarov, A., Mavroeidis, V., Zennaro, F. M.,
&Vishi, K. (2019, November). Detection and
segmentation of firearms using a combination of
979-8-3503-6526-9/24/$31.00 ©2024 IEEE
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on May 29,2024 at 06:21:30 UTC from IEEE Xplore. Restrictions apply.