A Comprehensive Approach for Gun, Mask and Suspicious Activity Detection
- Electronics and Telecommunication Engineering Department, P.R.Pote College of Engineering and Management, Amravati- 444602, India
- School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara-144411, India
- Department of Information Technology, Prof. Ram Meghe Institute of Technology and Research, Amravati-444602, India
- Department of CSE, Symbiosis Institute of Technology, Nagpur Campus, Symbiosis International (Deemed University), Pune-440008, India
- Department of Electronics and Communication Engineering, Symbiosis Institute of Technology (SIT), Symbiosis International (Deemed University), Pune-412115, India
Received: 2024-06-14
Revised: 2024-11-19
Accepted: 2025-02-17
Published in Issue 2026-03-31
Copyright (c) 2026 Sunpreet Kaur Nanda, Deepika Ghai, Prashant Ingole, Sandeep Kumar, Suman Lata Tripathi (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
PDF views: 32
Abstract
Video forensics includes understanding how to examine and identify crime in the footage. The process is constantly evolving with new technology and innovations. The world of video forensics experts is growing. The realm of video forensics is simply a growing community of specialists linked with the digital video forensics sector. The State-of-the-art examinations and crimes consistently cross global and language fringes these days. With rapidly advancing technology, video has emerged as the foremost and indispensable tool in the fight against those who break the law, capturing them in the act. The computerized video forensics industry is rapidly expanding. Rapid technological advancements have made video a powerful and essential tool for law enforcement. Technology changes quickly, and innovators work with computerized images to catch criminals. Video forensics examination helps to know how accurate the input video is. In this paper, the proposed method used a soft computing technique, i.e. YOLOv3, to detect suspicious persons, the guns, or the masks by extracting frames and features from a video. In the dataset, it compares the extracted edge with images and generates output with bounding boxes for suspicious persons, the guns, or the masks. The realm of video forensics and its outcomes are also examined by this paper. When tested on different datasets, the proposed method outperforms existing techniques. For both the models, such as YOLO and customized Convolutional Neural Network (CNN), execution measurements were taken and are shown to supersede the customized CNN with its identification of guns and masks. The accuracy for YOLO design is 100% for both guns and mask detection, respectively, whereas accuracy for the customized CNN with guns and mask detection is 61.54% and 61.55%, respectively. Experimental results show that the proposed methodology outperforms the other existing methods.
Keywords
- Video forensics,
- You Only Look Once,
- Customized Convolutional Neural Network,
- Soft computing techniques,
- Gun detection,
- Mask detection,
- Suspicious persons
References
- Bengio Y. “Learning deep architectures for AI.” Found. Trends Mach. Learn. 2009; 2:1–127. doi: 10.1561/2200000006
- Hinton GE, S.Osindero, and Teh YW. “A fast learning algorithm for deep belief nets.” Neural Comput. 2006; 18:1527–54. doi: 10.1162/neco.
- 2006.18.7.1527
- Deng L. “Expanding the scope of signal process-ing.” IEEE Signal Processing Mag. 2008; 25:2–4. doi: 10.1109/MSP.2008.920380
- Tang Y and Eliasmith C. “Deep networks for ro-bust visual recognition.” 27th International Con-ference on Machine Learning 2010 :1055–62. doi: 10.5555/3104322.3104456
- Hinton GE. “A practical guide to training re-stricted Boltzmann machines.” Univ. Toronto, Tech. Rep. 2012; 7700. doi: 10.1007/978-3-642-35289-8 32
- Kushwaha AK and Wadhe A. “Design and Im-plementation of Forensic Framework for Video Forensics. ” Int. J. Curr. Eng. Technol. 2015; 5:1015–8
- Milani S, Fontani M, Bestagini P, Barni M, Piva A, Tagliasacchi M, and Tubaro S. “An overview on video forensics.” APSIPA Transactions on Signal and Information Processing 2012; 1:1–18. doi: 10.1017/ATSIP.2012.2
- Militante SV and Dionisio NV. “Real-Time Face-mask Recognition with Alarm System using Deep Learning.” 11th IEEE Control and System Graduate Research Colloquium (ICSGRC) 2020; 87:106–10. doi: 10.1109/ICSGRC49013.2020. 9232610
- Damer N, Grebe JH, C.Chen, Boutros F, Kirch-buchner F, and Kuijper A. “The effect of wearing a mask on face recognition performance: an exploratory study.” Int. Conf. Biometrics Spe-cial Interest Group (BIOSIG) 2020 :1–6. doi: 10.48550/arXiv.2007.13521
- Abudarham N, Shkiller L, and Yovel G. “Critical features for face recognition. ” Cognition 2019; 182:73–83. doi: 10.1016/j.cognition.2018.09.002
- Zhi H and Liu S. “Face recognition based on genetic algorithm.” J. Vis. Commun. Image Rep-resent. 2019; 58:495–502. doi: 10.1016/j.jvcir.
- 2018.12.012
- Nanda SK, Ghai D, Ingole P, and S.Pande. “Soft Computing Techniques based Digital Video Forensics for Anomaly Detection.” J. Comput.
- -Assist. Methods Eng. Sci. 2022; 30:111–30. doi: 10.24423/cames.447
- Zhou Z, Tang D, Wang X, Han W, Xiangyu L, and Zhang K. “Invisible mask: Practical attacks on face recognition with infrared.” Cryptography and Security 2018. doi: 10.48550/arXiv.1803. 04683
- Masi I, Wu Y, Hassner T, and Natarajan P. “Deep face recognition: A survey.” 31st SIBGRAPI Conf. on Graphics, Patterns, and Images (SIBGRAPI) 2018 :471–8. doi: 10.1109/SIBGRAPI.2018.00067
- Mahmood Z, Muhammad N, Bibi N, and Ali T. “A review on state-of-the-art face recognition approaches.” Fractals 2017; 25:1750025. doi: 10.1142/S0218348X17500256.
- Zhao W, Chellappa R, Phillips PJ, and Rosenfeld “Face recognition: A literature survey.” ACM Comput. Surv. 2003; 35:399–458. doi: 10.1145/ 954339.954342
- Sun Y, Liang D, Wang X, and Tang X. “Deepid3: Face recognition with deep neural networks.” 2013; Computer Vision and Pattern Recognition. doi: 10.48550/arXiv.1502.00873
- Kortli Y, Jridi M, Falou AA, and Atri M. “Face recognition systems: A Survey.” Sensors 2020; 20:342. doi: 10.3390/s20020342
- Wan Q, Panetta K, and Agaian S. “A video forensic technique for detecting frame integrity using the human visual system-inspired measure.” IEEE Int. Symp. on Technologies for Homeland Security (HST) 2017 :1–6. doi: 10 . 1109 / THS . 2017.7943466
- H.Kaur and Choudhary KR. “Digital forensics: implementation and analysis for Google An-droid framework.” Information Fusion for Cyber-
- Security Analytics 2017 :307–31. doi: 10.1007/ 978-3-319-44257-0 13
- Kaushal M, Khehra BS, and Sharma A. “Soft Computing based Object Detection and Track-ing Approaches: State-of-the-Art Survey. ” Appl. Soft Comput. 2018; 70:423–64. doi: 10.1016/j. asoc.2018.05.023
- Muhammad K, Ahmad J, Mehmood I, Rho S, and Baik SW. “Convolutional Neural Networks based Fire Detection in Surveillance Videos.” IEEE Access 2018; 6:18174–83. doi: 10.1109/ ACCESS.2018.2812835
- Bajestani MF, Abadi SSHR, Fard SMD, and Kho-dadadeh R. “AAD: Adaptive Anomaly Detection through Traffic Surveillance Videos.” 10th IAPR Workshop on Pattern Recognition in Remote Sens-ing (PRRS) 2018 :1–7. doi: 10.48550/arXiv.1808. 10044
- Conti M, Dehghantanha A, Franke K, and Watson S. “Internet of Things security and forensics: Chal-lenges and opportunities. ” Sci. Direct. 2018; 78:544–6. doi: 10.1016/j.future.2017.07.060
- Chen Q and Sang L. “Facemask recognition for fraud prevention using the Gaussian mixture model.” J. Vis. Commun. Image Represent. 2018; 55:795–801. doi: 10.1016/j.jvcir.2018.08.016
- Khatun MA, Yousuf MA, Ahmed S, Uddin MZ, Alyami SA, Al-Ashhab S, Akhdar HF, Khan A, Azad A, and Moni MA. “Deep CNN-LSTM with self-attention model for human activity recog-nition using wearable sensor.” IEEE Journal of Translational Engineering in Health and Medicine 2022; 10:1–16. doi: 10 . 1109 / JTEHM . 2022.3177710
- Sarcar ST and Yousuf MA. “Detecting violent arm movements using CNN-LSTM.” 5th IEEE International Conference on Electrical Information and Communication Technology (EICT) 2021 :1– doi: 10.1109/EICT54103.2021.9733510.
- Rezaee K, Rezakhani SM, Khosravi MR, and Moghimi MK. “A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance.” Personal and Ubiquitous Computing 2024; 28:135–51. doi: 10.1007/s00779-021-01586-5
- Lohiya R and Shah P. “Video-Based Face Detec-tion and Tracking for Forensic Applications.” Int. J. Comput. Sci. & Commun. 2016; 7:210–8. doi: 10.090592/IJCSC.2016.033
- Ayyappa Y, Neelakanteswara P, Bekkanti A, and CMAK Z. Basha YT nd. “Automatic Face Mask Recognition System with FCM AND BPNN. ” 5th Int. Conf. on Computing Methodologies and Communication (ICCMC) 2021 :1134–7. doi: 10.1109/ICCMC51019.2021.9418243
- Zhang X, Han Y, Xu W, and Wang Q. “HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learn-ing architecture.” Information Sciences 2021; 557:302–16. doi: 10.1016/j.ins.2019.05.023
- Ileberi E, Y.Sun, and Wang Z. “A machine learn-ing based credit card fraud detection using the GA algorithm for feature selection. ” Journal of Big Data 2022; 9. doi: ,vol.9, no.24, 2022.doi: 10.1186/s40537-022-00573-8
- Mim TR, Amatullah M, Afreen S, Yousuf MA, Uddin S, Alyami SA, Hasan KF, and Moni MA. “GRU-INC: An inception-attention based ap-proach using GRU for human activity recogni-tion.” Expert Systems with Applications 2023; 216:119419. doi: 10.1016/j.eswa.2022.119419
- Geng L, Zhang S, Tong J, and Xiao Z. “Lung segmentation method with dilated convolution based on VGG-16 network.” Comput. Ass. Surg. 2019; 24:27–33. doi: 10.1080/24699322.2019.1649071
- Srivastava S, Kumar P, Chaudhry V, and Singh A. “Detection of Ovarian Cyst in Ultrasound Im-ages Using Fine-Tuned VGG-16 Deep Learning Network.” SN Comput. Sci. 2020; 1:1–8. doi: 10.1007/s42979-020-0109-6
- Rezaee M, Zhang Y, Mishra R, Tong F, and Tong H. “Using the VGG-16 network for individual tree species detection with an object-based approach.” 10th IAPR Workshop on Pattern Recog-nition in Remote Sensing (PRRS) 2018 :1–7. doi: 10.1109/PRRS.2018.8486395
- Islam S, Khan SIA, Abedin MM, Habibullah KM, and Das AK. “Bird species classification from an image using the VGG-16 network. ” 7th Int. Conf. on Computer and Communications Management 2019 :38–42. doi: 10.1145/3348445.3348480
- Kamilaris A and Prenafeta-Boldu FX. “Deep learn-ing in agriculture: A survey.” Comput. Electron. Agric. 2018; 147:70–90. doi: 10.1016/j.compag. 2018.02.016
- Esteva A, Robicquet A, Ramsundar B, Kuleshov V, DePristo M, Chou K, Cui C, Corrado G, Thrun S, and Dean J. “A guide to deep learning in healthcare.” Nature Med. 2019; 25:24–9. doi: 10.1038/s41591-018-0316-z
- Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L, Desmaison A, Ko¨pf A, Yang E, DeVito Z, Raison M, Tejani A, Chilamkurthy S, Steiner B, Fang L, Bai J, and Chintala S. “Pytorch: An imperative style, high-performance deep learning library.” Machine Learning 2020. doi: 10.48550/arXiv. 1912.01703
- Zhang Z, Cui P, and Zhu W. “Deep learning on graphs: A survey.” IEEE Trans. Knowledge Data Eng. 2022; 34:249–70. doi: 10.1109/TKDE.2020. 2981333
- Balasubramanian Y, Sivasankaran K, and Krishraj SP. “Forensic video solution using facial feature-based synoptic Video Footage Record.” IET Com-put. Vis. 2017. doi: 10.1049/iet-cvi.2015.0238
- Lillis D, Becker B, O´ Sullivan T, and Scanlon M. “Current Challenges and Future Research Areas for Digital Forensic Investigation.” Cryptography and Security 2016. doi: 10.48550/arXiv.1604.03850
- Galvan F and Battiato S. “Image/Video Foren-sics: Theoretical Background, Methods and Best Practices- Part Two: From Analog to Digital World.” SICUREZZA eGIUSTIZIA S-I/MMXIX 2020 :45–50
- Primeau E and Primeau MA. “Video Forensic Services.” 2020. Available from: https://www. videoforensicexpert.com/contact-us/
- Krizhevsky A, Sutskever I, and Hinton GE. “ImageNet Classification with Deep Convolu-tional Neural Networks. ” Commun. ACM 2017; 60:84–90. doi: 10.1145/3065386
- “Image Category Classification using Deep Learning.” MathWorks 2020. Available from: https : / / www . mathworks . com / help / vision / examples/image- category- classification- using-deep-learning.html
- Sa´nchez J and Perronnin F. “High-dimensional signature compression for large-scale image clas-sification.” IEEE Conf. on Computer Vision and Pattern Recognition (CVPR) 2011 :1665–72. doi: 10.1109/CVPR.2011.5995504 “Types of Convolutional Neural Networks: LeNet, AlexNet, VGG-16 Net, ResNet and Incep-tion Net.” CompleteGate 2020. Available from: https://www.completegate.com/2017022864/blog/deep-machine-learning-images-lenet-alexnet-cnn/allpages
- M.Sabokrou, Fayyaz M, Fathy M, Moayed Z, and Klette R. “Effect of nanocatalysts on the trans-esterification reaction of first, second and third generation biodiesel sources - A mini-review.” Comput. Vis. Image Underst. 2018; 172:88–97. doi: 10.1016/j.cviu.2018.02.006
- Jin CB, Li S, and Kim H. “Real-Time Action De-tection in Video Surveillance using Sub-Action Descriptor with Multi-CNN. ” Comput. Vis. Pat-tern Recognit. 2017 :1–29. doi: 10.48550/arXiv. 1710.03383
- Vu H, Nguyen T, Travers A, Venkatesh S, and Phung D. “Energy-Based Localized Anomaly Detection in Video Surveillance.” In Proc. of Advances in Knowledge and Data Mining, Jeju, South Korea 2017 :1641–653. doi: 10.48550/ arXiv.2105.03270
- Sinha RK, Pandey R, and Pattnaik R. “Deep Learn-ing for Computer Vision Tasks: A Review. ” Conf. on Intelligent Computing and Control 2017 :1–5. doi: 10.48550/arXiv.1804.03928
- Nasir M, Muhammad K, Lloret J, Sangaiah AK, and Sajjad M. “Fog Computing Enabled Cost-Effective Distributed Summarization of Surveil-lance Videos for Smart Cities.” J. Parallel Distrib. Comput. 2019; 126:161–70. doi: 10.1016/j.jpdc. 2018.11.004
- Muhammad K, Hamza R, Ahmad J, Lloret J, Wang H, and Baik SW. “Secure Surveillance Frame-work for IoT Systems using Probabilistic Image Encryption.” IEEE Trans. on Industrial Informat-ics 2018; 14:3679–89. doi: 10.1109/TII.2018.2791944
- Munir M, Siddiqui SA, Dengel A, and Ahmed S. “DeepAnT: A Deep Learning Approach for Un-supervised Anomaly Detection in Time Series.” IEEE Access 2019; 7:1991–2005. doi: 10.1109/ ACCESS.2018.2886457
- Singh RD and Aggarwal N. “Video Content Au-thentication Techniques: A Comprehensive Sur-vey.” Multimedia Systems 2018; 24:211–40. doi: 10.1007/s00530-017-0538-9
- Sultani W, Chen C, and Shah M. “Real-World Anomaly Detection in Surveillance Videos. ” IEEE/CVF Conference on Computer Vision and Pattern Recognition 2018; 10:6479–88. doi: 10. 1109/CVPR.2018.00678
- Li S, Choo KKR, Sun Q, Buchanan WJ, and Cao J. “IoT forensics: Amazon echoes as a use case.” IEEE Internet of Things Journal 2019; 6:6487–97. Available from: 10.1109/JIOT.2019.2906946
- Jerian M, Paolino S, Cervelli F, Carrato S, Mattei A, and Garofano L. “A forensic image process-ing environment for the investigation of surveil-lance video.” Forensic Science International 2011; 167:2007. doi: 10.1016/j.forsciint.2006.06.048
- N. Ul H, Fraz MM, Hashmi TS, and Shahzad M. “Orientation aware weapons detection in visual data: a benchmark dataset.” Computing 2022; 104:2581–604. doi: 10.1007/s00607-022-01095-0
- Nanda SK, Ghai D, and Pande S. “VGG-16-Based Framework for Identification of Facemask Us-ing Video Forensics.” Proceedings of Data An-alytics and Management. Lecture Notes on Data Engineering and Communications Technologies 2022; 91. doi: 10.1007/978-981-16-6285-0 54
- Nanda SK and Ghai D. “Future of video forensics in IoT.” Electronic Devices and Circuit Design Challenges and Applications in the Internet of Things 2022 :113–33
- Nanda SK, Ghai D, and Ingole P. “Analysis of video forensics system for gun, mask, and anomaly detection using soft computing tech-niques.” Journal of Cyber Security and Mobil-ity 2022 :549–74. doi: 10 . 13052 / jcsm2245-1439.1143
- Ghai D, Saxena S, Dhingra G, and Tripathi SL. “A comprehensive review on performance-based comparative analysis, categorization, classifica-tion and mapping of text extraction system tech-niques for images.” Multimed Tools Appl 2025; 84:2327–2484. doi: 10.1007/s11042-024-20257-0
10.57647/mjee.2026.2001.06
