Deep Learning Algorithm for Detecting and Analyzing Criminal Activity
Keywords:deep learning, data forensic, digital security, digital crime, criminal activity
When applied to an entire field, automation and autonomous systems are among the rare creative superpowers capable of catapulting progress at an exponential rate. The arrival of machine intelligence will give such automated machines the intelligence to perform their tasks with power of outcome, drastically reducing the need for human intervention in redundant processes. Large-scale technological progress can be traced back to responsibilities that are simplified and, as a result, more easily distinguished by means of automation. In accordance with these guidelines, we propose creating a product that eliminates or significantly reduces the need for human intervention in primary issue statements that can be automated and processed. The public safety infrastructure of today relies on surveillance cameras, but these devices are merely video recorders; they have no intelligence of their own. Automated video streams are now required for automatic event detection thanks to the massive amount of data produced by surveillance cameras. The project's main objective is to increase public safety through the mechanization of crime measurement and review using actual Closed-Circuit Television footage (CCTV). This is achieved by assigning the task of recognizing criminal behavior to a system that can do so automatically, allowing for more precise tracking. In this study, we present a model with a precision of 0.95 for assault and 0.97 for abuse.
O. Abdel-Hamid, M. Abdel-Rahman, H. Jiang, & G. Penn, “Applying convolutional neural networks concepts to hybrid NN-HMM model for speech recognition,” Proceedings of the International Conference on Acoustics, Speech, and Signal Processing ICASSP’2012, 2012, pp. 4277-4280, doi: 10.1109/ICASSP.2012.6288864.
D. Shah, R. Dixit, A. Shah, P. Shah, M. Shah, “A comprehensive analysis regarding several breakthroughs based on computer intelligence targeting various syndromes,” Augment Hum Res, vol. 5, issue 1, pp. 14, 2020. https://doi.org/10.1007/s41133-020-00033-z
W. Sultani, C. Chen, M. Shah, “Real-world anomaly detection in surveillance videos,” Cornell University Library, arXiv:1801.04264, 2018.
M. Cheng, K. Cai and M. Li, “RWF-2000: An open large scale video database for violence detection,” Proceedings of the 2020 25th IEEE International Conference on Pattern Recognition (ICPR), Milan, Italy, 2021, pp. 4183-4190, doi: 10.1109/ICPR48806.2021.9412502.
K. Ahir, K. Govani, R. Gajera, M. Shah, “Application on virtual reality for enhanced education learning, military training and sports,” Augment Hum Res, vol. 5, issue 1, article no. 7, 2020. https://doi.org/10.1007/s41133-019-0025-2
A. Bates, Stingray: A New Frontier in Police Surveillance, Cato Institute Policy Analysis, no. 809, 2017.
C. Berghoff, M. Neu and Arndt von Twickel. (2021) “The Interplay of AI and Biometrics: Challenges and Opportunities.” Computer 54 (2021): 80-85.
A. L. Blum, R. L. Rivest, “Training a 3-node neural network is NP-complete,” Neural Netw., vol. 5, issue 1, pp. 117–127, 1992. https://doi.org/10.1016/S0893-6080(05)80010-3
C. Berghoff, M. Neu and A. von Twickel, “The interplay of AI and biometrics: Challenges and opportunities,” Computer, vol. 54, no. 9, pp. 80-85, 2021, doi: 10.1109/MC.2021.3084656.
P. Chen, H. Y. Yuan, X. M. Shu, “Forecasting crime using the ARIMA model,” Proceedings of the 5th IEEE International Conference on Fuzzy Systems and Knowledge Discovery, Ji'nan, 18-20 October 2008, pp. 627-630. https://doi.org/10.1109/FSKD.2008.222.
A. Dey, “Machine learning algorithms: a review,” Int J Comput Sci Inf Technol, vol. 7, issue 3, pp. 1174–1179, 2016.
T. Fatih, C. Bekir, “Police use of technology to fight against crime,” Eur Sci J, vol. 11, issue 10, pp. 286–296, 2015.
M. Gandhi, J. Kamdar, M. Shah, “Preprocessing of non-symmetrical images for edge detection,” Augment Hum Res, vol. 5, issue 1, 10, 2020. https://doi.org/10.1007/s41133-019-0030-5
W. Gorr, R. Harries, “Introduction to crime forecasting,” Int J Forecast, vol. 19, issue 4, pp. 551–555, 2003. https://doi.org/10.1016/S0169-2070(03)00089-X
A. Gupta, V. Dengre, H. A. Kheruwala, M. Shah, “Comprehensive review of text-mining applications in finance,” Financ Innov, vol. 6, issue 1, pp. 1–25, 2020. https://doi.org/10.1186/s40854-020-00205-1
K. Jani, M. Chaudhuri, H. Patel, M. Shah, “Machine learning in films: an approach towards automation in film censoring,” J Data Inf Manag, vol. 2, issue 1, pp. 55–64, 2020. https://doi.org/10.1007/s42488-019-00016-9.
K. Jha, A. Doshi, P. Patel, M. Shah, “A comprehensive review on automation in agriculture using artificial intelligence,” Artif Intell Agric, no. 2, pp. 1–12, 2019. https://doi.org/10.1016/j.aiia.2019.05.004.
E. E. Joh, “The undue influence of surveillance technology companies on policing,” N Y Univ Law Rev, vol. 92, pp. 101–130, 2017. https://doi.org/10.2139/ssrn.2924620.
S. Judd, “On the complexity of loading shallow neural networks,” J Complex, vol. 4, issue 3, pp. 177–192, 1988. https://doi.org/10.1016/0885-064X(88)90019-2.
V. Kakkad, M. Patel, M. Shah, “Biometric authentication and image encryption for image security in cloud framework,” Multiscale Multidiscip Model Exp Des, vol. 2, issue 4, pp. 233–248, 2019. https://doi.org/10.1007/s41939-019-00049-y.
C. M. Katz, D. E. Choate, J. R. Ready, L. Nuňo, “Evaluating the impact of officer worn body cameras in the Phoenix Police Department,” Center for Violence Prevention & Community Safety, Arizona State University, Phoenix, 2014, pp 1–43.
K. Kundalia, Y. Patel, M. Shah, “Multi-label movie genre detection from a movie poster using knowledge transfer learning,” Augment Hum Res, vol. 5, issue 1, 11, 2020. https://doi.org/10.1007/s41133-019-0029-y.
T. L. Le, M. Q. Nguyen, T. T. M. Nguyen, “Human posture recognition using human skeleton provided by Kinect,” Proceedings of the 2013 IEEE International Conference on Computing, Management and Telecommunications, Ho Chi Minh City, 2013, pp. 340-345. https://doi.org/10.1109/ComManTel.2013.6482417.
S. Marsland, Machine Learning: an Algorithmic Perspective, CRC Press, Boca Raton, 2015, pp. 1–452. https://doi.org/10.1201/b17476-1.
L. McClendon, N. Meghanathan, “Using machine learning algorithms to analyze crime data,” Mach Lear Appl Int J, vol. 2, issue 1, pp. 1–12, 2015. https://doi.org/10.5121/mlaij.2015.2101.
G. S. McNeal, “Drones and aerial surveillance: Considerations for legislators,” Brookings Institution: The Robots Are Coming: The Project on Civilian Robotics, November 2014, Pepperdine University Legal Studies Research Paper, no. 2015/3, https://www.brookings.edu/wp-content/uploads/2016/07/Drones_Aerial_Surveillance_McNeal_FINAL.pdf.
F. Musumeci, C. Rottondi, A. Nag, I. Macaluso, D. Zibar, M. Ruffini et al, “An overview on application of machine learning techniques in optical networks,” IEEE Commun Surv Tutorials, vol. 21, issue 2, pp. 1381–1408, 2019. https://doi.org/10.1109/COMST.2018.2880039.
B. Naik, A. Mehta, M. Shah, “Denouements of machine learning and multimodal diagnostic classification of Alzheimer's disease,” Vis Comput Ind Biomed Art, vol. 3, issue 1, 26, 2020. https://doi.org/10.1186/s42492-020-00062-w.
S. Panchiwala, M. Shah, “A comprehensive study on critical security issues and challenges of the IoT world,” J Data Inf Manag, vol. 2, issue 7, pp. 257–278, 2020. https://doi.org/10.1007/s42488-020-00030-2.
R. Pandya, S. Nadiadwala, R. Shah, M. Shah, “Buildout of methodology for meticulous diagnosis of K-complex in EEG for aiding the detection of Alzheimer's by artificial intelligence,” Augment Hum Res, vol. 5, issue 1, 3, 2020. https://doi.org/10.1007/s41133-019-0021-6.
P. Parekh, S. Patel, N. Patel, M. Shah, “Systematic review and meta-analysis of augmented reality in medicine, retail, and games,” Vis Comput Ind Biomed Art, vol. 3, issue 1, 21, 2020. https://doi.org/10.1186/s42492-020-00057-7.
V. Parekh, D. Shah, M. Shah, “Fatigue detection using artificial intelligence framework,” Augment Hum Res, vol. 5, issue 1, 5, 2020. https://doi.org/10.1007/s41133-019-0023-4.
D. Patel, D. Shah, M. Shah, “The intertwine of brain and body: a quantitative analysis on how big data influences the system of sports,” Ann Data Sci, vol. 7, issue 1, pp. 1–16, 2020. https://doi.org/10.1007/s40745-019-00239-y.
D. Patel, Y. Shah, N. Thakkar, K. Shah, M. Shah, “Implementation of artificial intelligence techniques for cancer detection,” Augment Hum Res, vol. 5, issue 1, 6, 2020. https://doi.org/10.1007/s41133-019-0024-3.
H. Patel, D. Prajapati, D. Mahida, M. Shah, “Transforming petroleum downstream sector through big data: A holistic review,” J Pet Explor Prod Technol, vol. 10, issue 6, pp. 2601–2611, 2020. https://doi.org/10.1007/s13202-020-00889-2.
M. Pathan, N. Patel, Hю Yagnik, M. Shah, “Artificial cognition for applications in smart agriculture: A comprehensive review,” Artif Intell Agric, vol. 4, pp. 81–95, 2020. https://doi.org/10.1016/j.aiia.2020.06.001.
A. Rani, S. Rajasree, “Crime trend analysis and prediction using mahanolobis distance and dynamic time warping technique,” Int J Comput Sci Inf Technol, vol. 5, issue 3, pp. 4131–4135, 2014.
A. Rummens, W. Hardyns, L. Pauwels, “The use of predictive analysis in spatiotemporal crime forecasting: Building and testing a model in an urban context,” Appl Geogr, vol. 86, pp. 255–261, 2017. https://doi.org/10.1016/j.apgeog.2017.06.011.
K. Shah, H. Patel, D. Sanghvi, M. Shah, “A comparative analysis of logistic regression, random forest and KNN models for the text classification,” Augment Hum Res, vol. 5, issue 1, 12, 2020. https://doi.org/10.1007/s41133-020-00032-0.
N. Shah, S. Engineer, N. Bhagat, H. Chauhan, M. Shah, “Research trends on the usage of machine learning and artificial intelligence in advertising,” Augment Hum Res, vol. 5, issue 1, 19, 2020. https://doi.org/10.1007/s41133-020-00038-8.
N. Shah, N. Bhagat, M. Shah, “Crime forecasting: a machine learning and computer vision approach to crime prediction and prevention,” Vis. Comput. Ind. Biomed. Art, vol. 4, article no. 9, 2021. https://doi.org/10.1186/s42492-021-00075-z.
A. Simon, M. S. Deo, S. Venkatesan, D. R. Babu, “An overview of machine learning and its applications,” Int J Electr Sci Eng, vol. 1, issue 1, pp. 22–24, 2016.
J. Stanley, “Police body-mounted cameras: with right policies in place, a win for all,” 2015. [Online]. Available at: https://www.aclu.org/police-body-mounted-cameras-right-policies-place-win-all.
A. Sukhadia, K. Upadhyay, M. Gundeti, S. Shah, M. Shah, “Optimization of smart traffic governance system using artificial intelligence,” Augment Hum Res, vol. 5, issue 1, 13, 2020. https://doi.org/10.1007/s41133-020-00035-x.
R. Szeliski, Computer Vision: Algorithms and Applications, Springer-Verlag, Berlin, 2010, pp. 979.
T. Talaviya, D. Shah, N. Patel, H. Yagnik, M. Shah, “Implementation of artificial intelligence in agriculture for optimisation of irrigation and application of pesticides and herbicides,” Artif Intell Agric, no. 4, pp. 58–73, 2020. https://doi.org/10.1016/j.aiia.2020.04.002.
A. Vedaldi, B. Fulkerson, “Vlfeat: an open and portable library of computer vision algorithms,” Proceedings of the 18th ACM International Conference on Multimedia, Firenze, 2010, pp. 1469–1472. https://doi.org/10.1145/1873951.1874249.
A. Vredeveldt, L. Kesteloo, P. J. Van Koppen, “Writing alone or together: police officers' collaborative reports of an incident,” Crim Justice Behav, vol. 45, issue 7, pp. 1071–1092, 2018. https://doi.org/10.1177/0093854818771721.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.