Violence Detection System using AWS Cloud

Authors

  • Shashank Srivastav Buddha Institute of Technology, Gorakhpur
  • Vinod Jain GLAUniversity Mathura
  • Akshay Varkale IES College of Technology , Bhopal
  • Sushil Chhabra Echelon Institute of Technology, Faridabad
  • Gurvinder Singh Asia Pacific Institute of Information Technology SD India Panipat

Keywords:

Violence detection system, weapons, blood detection, face comparison, AWS, cloud

Abstract

With the rapid growth of surveillance cameras to monitor human activities, it has become really important to develop such systems that can detect violent activities and harmful people that are already banned from entering the premises by any organization before they cause any trouble. In this work, an effective architecture is proposed which is based on deep learning and real-time processing to alert the authorities about any violent activity in real-time without giving any false alarm. The architecture used in this work uses several parameters to conclude. Firstly, captured faces are compared with the faces of those individuals who were previously involved in violent activities in or around the institution. And for new cases, the system performs Facial gesture detection, violent object detection, violent action detection, weapon detection, and blood detection to draw any conclusion to avoid any false alarm. Then, faces involved are compared with the faces of all the members of the institution to discover if the person involved in violence belongs to the institution itself. An automatic email is sent to the discipline authority describing the person and the location of violence. For better understanding, all the steps of the research approach are presented with the help of architectural diagrams.

Downloads

Download data is not yet available.

References

S. Chaudhary, M. A. Khan, and C. Bhatnagar, ‘‘Multiple anomalous activity detection in videos,’’ Procedia Comput. Sci., vol. 125, pp. 336–345, Jan. 2018.

Chen LH, Hsu HW, Wang LY, Su CW. Violence detection in movies. In: Computer Graphics, Imaging, and Visualization (CGIV), 2011 Eighth International Conference on. IEEE; 2011. p. 119–124.

Chen LH, Hsu HW, Wang LY, Su CW. Violence detection in movies. In: Computer Graphics, Imaging, and Visualization (CGIV), 2011 Eighth International Conference on. IEEE; 2011. p. 119–124

Clarin C, Dionisio J, Echavez M, Naval P, DOVE: Detection of movie violence using motion intensity Analysis on skin and blood, Technical report, University of the Philippines, 2005

Datta, A.; Shah, M.; Lobo, N.D.V. Person-on-person violence detection in video data. In Proceedings of the 16th International Conference on Pattern Recognition, Quebec, QC, Canada, 11–15 August 2002; pp. 433–438.

Mahadevan, V.; Li, W.; Bhalodia, V.; Vasconcelos, N. Anomaly detection in crowded scenes. In Proceedings of the 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), San Francisco, CA, USA, 13–18 June 2010; pp. 1975–1981.

Zixuan Wang, "Who is Here: Location-Aware Face Recognition", PhoneSense’12, November 6, 2012, Toronto, ON, Canada. ACM 978-1-4503-1778-8.

Juan, I.E.; Juan, M.; Barco, R. A low-complexity vision-based system for real-time traffic monitoring. IEEE Trans. Intell. Transp. Syst. 2017, 18, 1279–1288.

Nayak, L. Audio-Visual Content-Based Violent Scene Characterisation. Ph.D. Thesis, National Institute of Technology, Rourkela Odisha, India, 2015.

A. B. Mabrouk and E. Zagrouba, ‘‘Abnormal behavior recognition for intelligent video surveillance systems: A review,’’ Expert Syst. Appl., vol. 91, pp. 480–491, Jan. 2018

T. Zhang, Z. Yang, W. Jia, B. Yang, J. Yang, and X. He, ‘‘A new method for violence detection in surveillance scenes,’’ Multimedia Tools Appl., vol. 75, no. 12, pp. 7327–7349, 2016.

M. Alvar, A. Torsello, A. Sanchez-Miralles, and J. M. Armengol, ‘‘Abnormal behavior detection using dominant sets,’’ Mach. Vis. Appl., vol. 25, no. 5, pp. 1351–1368, Jul. 2014.

A. A. Mishra and G. Srinivasa, ‘‘Automated detection of fighting styles using localized action features,’’ in Proc. 2nd Int. Conf. Inventive Syst. Control (ICISC), Jan. 2018, pp. 1385–1389.

T. Agrawal, A. Kumar, and S. K. Saraswat, ‘‘Comparative analysis of convolutional codes based on ML decoding,’’ in Proc. 2nd Int. Conf. Commun.Control Intel. Syst. (CCIS), Nov. 2016, pp. 41–45.

C. Ding, S. Fan, M. Zhu, W. Feng, and B. Jia, ‘‘Violence detection in a video by using 3D convolutional neural networks,’’ in Proc. Int. Symp. Visual Comput., 2014, pp. 551–558.

R. Arandjelovic, P. Gronat, A. Torii, T. Pajdla, and J. Sivic, ‘‘NetVLAD: CNN Architecture for weakly supervised place recognition,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit.(CVPR), Jun. 2016, pp. 5297–5307.

G. Mu, H. Cao, and Q. Jin, ‘‘Violent scene detection using convolutional neural networks and deep audio features,’’ in Proc. Chin. Conf. Pattern Recognit., 2016, pp. 451–463.

S. Sudhakaran and O. Lanz, ‘‘Learning to detect violent videos using convolutional long short-term memory,’’ in Proc. 14th IEEE Int. Conf. Adv. Video Signal-Based Surveill. (AVSS), Aug./Sep. 2017, pp. 1–6.

Z. Meng, J. Yuan, and Z. Li, ‘‘Trajectory-pooled deep convolutional networks for violence detection in videos,’’ in Proc. Int. Conf. Comput. Vis. Syst., 2017, pp. 437–447.

I. Serrano, O. Deniz, J. L. Espinosa-Aranda, and G. Bueno, ‘‘Fight recognition in video using Hough forests and 2D convolutional neural network,’’ IEEE Trans. Image Process., vol. 27, no. 10, pp. 4787–4797, Oct. 2018.

F. U. M. Ullah, A. Ullah, K. Muhammad, I. U. Haq, and S. W. Baik, ‘‘Violence detection using spatiotemporal features with 3D convolutional neural network,’’ Sensors, vol. 19, no. 11, p. 2472, May 2019.

W. Lejmi, A. B. Khalifa, and M. A. Mahjoub, ‘‘Fusion strategies for recognition of violence actions,’’ in Proc. IEEE/ACS 14th Int. Conf. Comput. Syst. Appl. (AICCSA), Oct./Nov. 2017, pp. 178–183. D. Maniry, E. Acar, F. Hopfgartner, and S. Albayrak, ‘‘A visualization tool for violent scenes detection,’’ in Proc. Int. Conf. Multimedia Retr., Apr. 2014, p. 522.

Kumar, V. and Kumar, R., 2015. An adaptive approach for detection of blackhole attack in mobile ad hoc network. Procedia Computer Science, 48, pp.472-479.

Kumar, V. and Kumar, R., 2015, April. Detection of phishing attack using visual cryptography in ad hoc network. In 2015 International Conference on Communications and Signal Processing (ICCSP) (pp. 1021-1025). IEEE.

Kumar, V. and Kumar, R., 2015. An optimal authentication protocol using certificateless ID-based signature in MANET. In Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings 3 (pp. 110-121). Springer International Publishing.

Kumar, Vimal, and Rakesh Kumar. "A cooperative black hole node detection and mitigation approach for MANETs." In Innovative Security Solutions for Information Technology and Communications: 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers 8, pp. 171-183. Springer International Publishing, 2015.

Kumar, V., Shankar, M., Tripathi, A.M., Yadav, V., Rai, A.K., Khan, U. and Rahul, M., 2022. Prevention of Blackhole Attack in MANET using Certificateless Signature Scheme. Journal of Scientific & Industrial Research, 81(10), pp.1061-1072.

Pentyala, S., Liu, M., & Dreyer, M. (2019). Multi-task networks with universe, group, and task feature learning. arXiv preprint arXiv:1907.01791.

Srivastava, Swapnita, and P. K. Singh. "Proof of Optimality based on Greedy Algorithm for Offline Cache Replacement Algorithm." International Journal of Next-Generation Computing 13.3 (2022).

Smiti, Puja, Swapnita Srivastava, and Nitin Rakesh. "Video and audio streaming issues in multimedia application." 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2018.

Srivastava, Swapnita, and P. K. Singh. "HCIP: Hybrid Short Long History Table-based Cache Instruction Prefetcher." International Journal of Next-Generation Computing 13.3 (2022).

Srivastava, Swapnita, and Shilpi Sharma. "Analysis of cyber related issues by implementing data mining Algorithm." 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2019.

P Mall and P. Singh, “Credence-Net: a semi-supervised deep learning approach for medical images,” Int. J. Nanotechnol., vol. 20, 2022.

Narayan, Vipul, et al. "Deep Learning Approaches for Human Gait Recognition: A Review." 2023 International Conference on Artificial Intelligence and Smart Communication (AISC). IEEE, 2023.

Narayan, Vipul, et al. "FuzzyNet: Medical Image Classification based on GLCM Texture Feature." 2023 International Conference on Artificial Intelligence and Smart Communication (AISC). IEEE, 2023.

"Keyboard invariant biometric authentication." 2018 4th International Conference on Computational Intelligence & Communication Technology (CICT). IEEE, 2018.

Mall, Pawan Kumar, et al. "Early Warning Signs Of Parkinson’s Disease Prediction Using Machine Learning Technique." Journal of Pharmaceutical Negative Results (2023): 2607-2615.

Pentyala, S., Liu, M., & Dreyer, M. (2019). Multi-task networks with universe, group, and task feature learning. arXiv preprint arXiv:1907.01791.

Choudhary, Shubham, et al. "Fuzzy approach-based stable energy-efficient AODV routing protocol in mobile ad hoc networks." Software Defined Networking for Ad Hoc Networks. Cham: Springer International Publishing, 2022. 125-139.

Workflow in local system

Downloads

Published

16.04.2023

How to Cite

Srivastav, S. ., Jain, V. ., Varkale, A. ., Chhabra, S. ., & Singh, G. . (2023). Violence Detection System using AWS Cloud. International Journal of Intelligent Systems and Applications in Engineering, 11(5s), 361–367. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2800