Deep Learning Algorithm for Detecting and Analyzing Criminal Activity

Authors

  • Raddam Sami Mehsen

DOI:

https://doi.org/10.47839/ijc.22.2.3095

Keywords:

deep learning, data forensic, digital security, digital crime, criminal activity

Abstract

When applied to an entire field, automation and autonomous systems are among the rare creative superpowers capable of catapulting progress at an exponential rate. The arrival of machine intelligence will give such automated machines the intelligence to perform their tasks with power of outcome, drastically reducing the need for human intervention in redundant processes. Large-scale technological progress can be traced back to responsibilities that are simplified and, as a result, more easily distinguished by means of automation. In accordance with these guidelines, we propose creating a product that eliminates or significantly reduces the need for human intervention in primary issue statements that can be automated and processed. The public safety infrastructure of today relies on surveillance cameras, but these devices are merely video recorders; they have no intelligence of their own. Automated video streams are now required for automatic event detection thanks to the massive amount of data produced by surveillance cameras. The project's main objective is to increase public safety through the mechanization of crime measurement and review using actual Closed-Circuit Television footage (CCTV). This is achieved by assigning the task of recognizing criminal behavior to a system that can do so automatically, allowing for more precise tracking. In this study, we present a model with a precision of 0.95 for assault and 0.97 for abuse.

References

O. Abdel-Hamid, M. Abdel-Rahman, H. Jiang, & G. Penn, “Applying convolutional neural networks concepts to hybrid NN-HMM model for speech recognition,” Proceedings of the International Conference on Acoustics, Speech, and Signal Processing ICASSP’2012, 2012, pp. 4277-4280, doi: 10.1109/ICASSP.2012.6288864.

D. Shah, R. Dixit, A. Shah, P. Shah, M. Shah, “A comprehensive analysis regarding several breakthroughs based on computer intelligence targeting various syndromes,” Augment Hum Res, vol. 5, issue 1, pp. 14, 2020. https://doi.org/10.1007/s41133-020-00033-z

W. Sultani, C. Chen, M. Shah, “Real-world anomaly detection in surveillance videos,” Cornell University Library, arXiv:1801.04264, 2018.

M. Cheng, K. Cai and M. Li, “RWF-2000: An open large scale video database for violence detection,” Proceedings of the 2020 25th IEEE International Conference on Pattern Recognition (ICPR), Milan, Italy, 2021, pp. 4183-4190, doi: 10.1109/ICPR48806.2021.9412502.

K. Ahir, K. Govani, R. Gajera, M. Shah, “Application on virtual reality for enhanced education learning, military training and sports,” Augment Hum Res, vol. 5, issue 1, article no. 7, 2020. https://doi.org/10.1007/s41133-019-0025-2

A. Bates, Stingray: A New Frontier in Police Surveillance, Cato Institute Policy Analysis, no. 809, 2017.

C. Berghoff, M. Neu and Arndt von Twickel. (2021) “The Interplay of AI and Biometrics: Challenges and Opportunities.” Computer 54 (2021): 80-85.

A. L. Blum, R. L. Rivest, “Training a 3-node neural network is NP-complete,” Neural Netw., vol. 5, issue 1, pp. 117–127, 1992. https://doi.org/10.1016/S0893-6080(05)80010-3

C. Berghoff, M. Neu and A. von Twickel, “The interplay of AI and biometrics: Challenges and opportunities,” Computer, vol. 54, no. 9, pp. 80-85, 2021, doi: 10.1109/MC.2021.3084656.

P. Chen, H. Y. Yuan, X. M. Shu, “Forecasting crime using the ARIMA model,” Proceedings of the 5th IEEE International Conference on Fuzzy Systems and Knowledge Discovery, Ji'nan, 18-20 October 2008, pp. 627-630. https://doi.org/10.1109/FSKD.2008.222.

A. Dey, “Machine learning algorithms: a review,” Int J Comput Sci Inf Technol, vol. 7, issue 3, pp. 1174–1179, 2016.

T. Fatih, C. Bekir, “Police use of technology to fight against crime,” Eur Sci J, vol. 11, issue 10, pp. 286–296, 2015.

M. Gandhi, J. Kamdar, M. Shah, “Preprocessing of non-symmetrical images for edge detection,” Augment Hum Res, vol. 5, issue 1, 10, 2020. https://doi.org/10.1007/s41133-019-0030-5

W. Gorr, R. Harries, “Introduction to crime forecasting,” Int J Forecast, vol. 19, issue 4, pp. 551–555, 2003. https://doi.org/10.1016/S0169-2070(03)00089-X

A. Gupta, V. Dengre, H. A. Kheruwala, M. Shah, “Comprehensive review of text-mining applications in finance,” Financ Innov, vol. 6, issue 1, pp. 1–25, 2020. https://doi.org/10.1186/s40854-020-00205-1

K. Jani, M. Chaudhuri, H. Patel, M. Shah, “Machine learning in films: an approach towards automation in film censoring,” J Data Inf Manag, vol. 2, issue 1, pp. 55–64, 2020. https://doi.org/10.1007/s42488-019-00016-9.

K. Jha, A. Doshi, P. Patel, M. Shah, “A comprehensive review on automation in agriculture using artificial intelligence,” Artif Intell Agric, no. 2, pp. 1–12, 2019. https://doi.org/10.1016/j.aiia.2019.05.004.

E. E. Joh, “The undue influence of surveillance technology companies on policing,” N Y Univ Law Rev, vol. 92, pp. 101–130, 2017. https://doi.org/10.2139/ssrn.2924620.

S. Judd, “On the complexity of loading shallow neural networks,” J Complex, vol. 4, issue 3, pp. 177–192, 1988. https://doi.org/10.1016/0885-064X(88)90019-2.

V. Kakkad, M. Patel, M. Shah, “Biometric authentication and image encryption for image security in cloud framework,” Multiscale Multidiscip Model Exp Des, vol. 2, issue 4, pp. 233–248, 2019. https://doi.org/10.1007/s41939-019-00049-y.

C. M. Katz, D. E. Choate, J. R. Ready, L. Nuňo, “Evaluating the impact of officer worn body cameras in the Phoenix Police Department,” Center for Violence Prevention & Community Safety, Arizona State University, Phoenix, 2014, pp 1–43.

K. Kundalia, Y. Patel, M. Shah, “Multi-label movie genre detection from a movie poster using knowledge transfer learning,” Augment Hum Res, vol. 5, issue 1, 11, 2020. https://doi.org/10.1007/s41133-019-0029-y.

T. L. Le, M. Q. Nguyen, T. T. M. Nguyen, “Human posture recognition using human skeleton provided by Kinect,” Proceedings of the 2013 IEEE International Conference on Computing, Management and Telecommunications, Ho Chi Minh City, 2013, pp. 340-345. https://doi.org/10.1109/ComManTel.2013.6482417.

S. Marsland, Machine Learning: an Algorithmic Perspective, CRC Press, Boca Raton, 2015, pp. 1–452. https://doi.org/10.1201/b17476-1.

L. McClendon, N. Meghanathan, “Using machine learning algorithms to analyze crime data,” Mach Lear Appl Int J, vol. 2, issue 1, pp. 1–12, 2015. https://doi.org/10.5121/mlaij.2015.2101.

G. S. McNeal, “Drones and aerial surveillance: Considerations for legislators,” Brookings Institution: The Robots Are Coming: The Project on Civilian Robotics, November 2014, Pepperdine University Legal Studies Research Paper, no. 2015/3, https://www.brookings.edu/wp-content/uploads/2016/07/Drones_Aerial_Surveillance_McNeal_FINAL.pdf.

F. Musumeci, C. Rottondi, A. Nag, I. Macaluso, D. Zibar, M. Ruffini et al, “An overview on application of machine learning techniques in optical networks,” IEEE Commun Surv Tutorials, vol. 21, issue 2, pp. 1381–1408, 2019. https://doi.org/10.1109/COMST.2018.2880039.

B. Naik, A. Mehta, M. Shah, “Denouements of machine learning and multimodal diagnostic classification of Alzheimer's disease,” Vis Comput Ind Biomed Art, vol. 3, issue 1, 26, 2020. https://doi.org/10.1186/s42492-020-00062-w.

S. Panchiwala, M. Shah, “A comprehensive study on critical security issues and challenges of the IoT world,” J Data Inf Manag, vol. 2, issue 7, pp. 257–278, 2020. https://doi.org/10.1007/s42488-020-00030-2.

R. Pandya, S. Nadiadwala, R. Shah, M. Shah, “Buildout of methodology for meticulous diagnosis of K-complex in EEG for aiding the detection of Alzheimer's by artificial intelligence,” Augment Hum Res, vol. 5, issue 1, 3, 2020. https://doi.org/10.1007/s41133-019-0021-6.

P. Parekh, S. Patel, N. Patel, M. Shah, “Systematic review and meta-analysis of augmented reality in medicine, retail, and games,” Vis Comput Ind Biomed Art, vol. 3, issue 1, 21, 2020. https://doi.org/10.1186/s42492-020-00057-7.

V. Parekh, D. Shah, M. Shah, “Fatigue detection using artificial intelligence framework,” Augment Hum Res, vol. 5, issue 1, 5, 2020. https://doi.org/10.1007/s41133-019-0023-4.

D. Patel, D. Shah, M. Shah, “The intertwine of brain and body: a quantitative analysis on how big data influences the system of sports,” Ann Data Sci, vol. 7, issue 1, pp. 1–16, 2020. https://doi.org/10.1007/s40745-019-00239-y.

D. Patel, Y. Shah, N. Thakkar, K. Shah, M. Shah, “Implementation of artificial intelligence techniques for cancer detection,” Augment Hum Res, vol. 5, issue 1, 6, 2020. https://doi.org/10.1007/s41133-019-0024-3.

H. Patel, D. Prajapati, D. Mahida, M. Shah, “Transforming petroleum downstream sector through big data: A holistic review,” J Pet Explor Prod Technol, vol. 10, issue 6, pp. 2601–2611, 2020. https://doi.org/10.1007/s13202-020-00889-2.

M. Pathan, N. Patel, Hю Yagnik, M. Shah, “Artificial cognition for applications in smart agriculture: A comprehensive review,” Artif Intell Agric, vol. 4, pp. 81–95, 2020. https://doi.org/10.1016/j.aiia.2020.06.001.

A. Rani, S. Rajasree, “Crime trend analysis and prediction using mahanolobis distance and dynamic time warping technique,” Int J Comput Sci Inf Technol, vol. 5, issue 3, pp. 4131–4135, 2014.

A. Rummens, W. Hardyns, L. Pauwels, “The use of predictive analysis in spatiotemporal crime forecasting: Building and testing a model in an urban context,” Appl Geogr, vol. 86, pp. 255–261, 2017. https://doi.org/10.1016/j.apgeog.2017.06.011.

K. Shah, H. Patel, D. Sanghvi, M. Shah, “A comparative analysis of logistic regression, random forest and KNN models for the text classification,” Augment Hum Res, vol. 5, issue 1, 12, 2020. https://doi.org/10.1007/s41133-020-00032-0.

N. Shah, S. Engineer, N. Bhagat, H. Chauhan, M. Shah, “Research trends on the usage of machine learning and artificial intelligence in advertising,” Augment Hum Res, vol. 5, issue 1, 19, 2020. https://doi.org/10.1007/s41133-020-00038-8.

N. Shah, N. Bhagat, M. Shah, “Crime forecasting: a machine learning and computer vision approach to crime prediction and prevention,” Vis. Comput. Ind. Biomed. Art, vol. 4, article no. 9, 2021. https://doi.org/10.1186/s42492-021-00075-z.

A. Simon, M. S. Deo, S. Venkatesan, D. R. Babu, “An overview of machine learning and its applications,” Int J Electr Sci Eng, vol. 1, issue 1, pp. 22–24, 2016.

J. Stanley, “Police body-mounted cameras: with right policies in place, a win for all,” 2015. [Online]. Available at: https://www.aclu.org/police-body-mounted-cameras-right-policies-place-win-all.

A. Sukhadia, K. Upadhyay, M. Gundeti, S. Shah, M. Shah, “Optimization of smart traffic governance system using artificial intelligence,” Augment Hum Res, vol. 5, issue 1, 13, 2020. https://doi.org/10.1007/s41133-020-00035-x.

R. Szeliski, Computer Vision: Algorithms and Applications, Springer-Verlag, Berlin, 2010, pp. 979.

T. Talaviya, D. Shah, N. Patel, H. Yagnik, M. Shah, “Implementation of artificial intelligence in agriculture for optimisation of irrigation and application of pesticides and herbicides,” Artif Intell Agric, no. 4, pp. 58–73, 2020. https://doi.org/10.1016/j.aiia.2020.04.002.

A. Vedaldi, B. Fulkerson, “Vlfeat: an open and portable library of computer vision algorithms,” Proceedings of the 18th ACM International Conference on Multimedia, Firenze, 2010, pp. 1469–1472. https://doi.org/10.1145/1873951.1874249.

A. Vredeveldt, L. Kesteloo, P. J. Van Koppen, “Writing alone or together: police officers' collaborative reports of an incident,” Crim Justice Behav, vol. 45, issue 7, pp. 1071–1092, 2018. https://doi.org/10.1177/0093854818771721.

Downloads

Published

2023-07-02

How to Cite

Mehsen, R. S. (2023). Deep Learning Algorithm for Detecting and Analyzing Criminal Activity. International Journal of Computing, 22(2), 248-253. https://doi.org/10.47839/ijc.22.2.3095

Issue

Section

Articles