10.57647/mjee.2026.2001.06

A Comprehensive Approach for Gun, Mask and Suspicious Activity Detection

  1. Electronics and Telecommunication Engineering Department, P.R.Pote College of Engineering and Management, Amravati- 444602, India
  2. School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara-144411, India
  3. Department of Information Technology, Prof. Ram Meghe Institute of Technology and Research, Amravati-444602, India
  4. Department of CSE, Symbiosis Institute of Technology, Nagpur Campus, Symbiosis International (Deemed University), Pune-440008, India
  5. Department of Electronics and Communication Engineering, Symbiosis Institute of Technology (SIT), Symbiosis International (Deemed University), Pune-412115, India

Received: 2024-06-14

Revised: 2024-11-19

Accepted: 2025-02-17

Published in Issue 2026-03-31

How to Cite

Nanda, S. K., Ghai, D., Ingole, P., Kumar, S., & Tripathi, S. L. (2026). A Comprehensive Approach for Gun, Mask and Suspicious Activity Detection. Majlesi Journal of Electrical Engineering, 20(1 (March 2026). https://doi.org/10.57647/mjee.2026.2001.06

PDF views: 32

Abstract

Video forensics includes understanding how to examine and identify crime in the footage. The process is constantly evolving with new technology and innovations. The world of video forensics experts is growing. The realm of video forensics is simply a growing community of specialists linked with the digital video forensics sector. The State-of-the-art examinations and crimes consistently cross global and language fringes these days. With rapidly advancing technology, video has emerged as the foremost and indispensable tool in the fight against those who break the law, capturing them in the act. The computerized video forensics industry is rapidly expanding. Rapid technological advancements have made video a powerful and essential tool for law enforcement. Technology changes quickly, and innovators work with computerized images to catch criminals. Video forensics examination helps to know how accurate the input video is. In this paper, the proposed method used a soft computing technique, i.e. YOLOv3, to detect suspicious persons, the guns, or the masks by extracting frames and features from a video. In the dataset, it compares the extracted edge with images and generates output with bounding boxes for suspicious persons, the guns, or the masks. The realm of video forensics and its outcomes are also examined by this paper. When tested on different datasets, the proposed method outperforms existing techniques. For both the models, such as YOLO and customized Convolutional Neural Network (CNN), execution measurements were taken and are shown to supersede the customized CNN with its identification of guns and masks. The accuracy for YOLO design is 100% for both guns and mask detection, respectively, whereas accuracy for the customized CNN with guns and mask detection is 61.54% and 61.55%, respectively. Experimental results show that the proposed methodology outperforms the other existing methods.

Keywords

  • Video forensics,
  • You Only Look Once,
  • Customized Convolutional Neural Network,
  • Soft computing techniques,
  • Gun detection,
  • Mask detection,
  • Suspicious persons

References

  1. Bengio Y. “Learning deep architectures for AI.” Found. Trends Mach. Learn. 2009; 2:1–127. doi: 10.1561/2200000006
  2. Hinton GE, S.Osindero, and Teh YW. “A fast learning algorithm for deep belief nets.” Neural Comput. 2006; 18:1527–54. doi: 10.1162/neco.
  3. 2006.18.7.1527
  4. Deng L. “Expanding the scope of signal process-ing.” IEEE Signal Processing Mag. 2008; 25:2–4. doi: 10.1109/MSP.2008.920380
  5. Tang Y and Eliasmith C. “Deep networks for ro-bust visual recognition.” 27th International Con-ference on Machine Learning 2010 :1055–62. doi: 10.5555/3104322.3104456
  6. Hinton GE. “A practical guide to training re-stricted Boltzmann machines.” Univ. Toronto, Tech. Rep. 2012; 7700. doi: 10.1007/978-3-642-35289-8 32
  7. Kushwaha AK and Wadhe A. “Design and Im-plementation of Forensic Framework for Video Forensics. ” Int. J. Curr. Eng. Technol. 2015; 5:1015–8
  8. Milani S, Fontani M, Bestagini P, Barni M, Piva A, Tagliasacchi M, and Tubaro S. “An overview on video forensics.” APSIPA Transactions on Signal and Information Processing 2012; 1:1–18. doi: 10.1017/ATSIP.2012.2
  9. Militante SV and Dionisio NV. “Real-Time Face-mask Recognition with Alarm System using Deep Learning.” 11th IEEE Control and System Graduate Research Colloquium (ICSGRC) 2020; 87:106–10. doi: 10.1109/ICSGRC49013.2020. 9232610
  10. Damer N, Grebe JH, C.Chen, Boutros F, Kirch-buchner F, and Kuijper A. “The effect of wearing a mask on face recognition performance: an exploratory study.” Int. Conf. Biometrics Spe-cial Interest Group (BIOSIG) 2020 :1–6. doi: 10.48550/arXiv.2007.13521
  11. Abudarham N, Shkiller L, and Yovel G. “Critical features for face recognition. ” Cognition 2019; 182:73–83. doi: 10.1016/j.cognition.2018.09.002
  12. Zhi H and Liu S. “Face recognition based on genetic algorithm.” J. Vis. Commun. Image Rep-resent. 2019; 58:495–502. doi: 10.1016/j.jvcir.
  13. 2018.12.012
  14. Nanda SK, Ghai D, Ingole P, and S.Pande. “Soft Computing Techniques based Digital Video Forensics for Anomaly Detection.” J. Comput.
  15. -Assist. Methods Eng. Sci. 2022; 30:111–30. doi: 10.24423/cames.447
  16. Zhou Z, Tang D, Wang X, Han W, Xiangyu L, and Zhang K. “Invisible mask: Practical attacks on face recognition with infrared.” Cryptography and Security 2018. doi: 10.48550/arXiv.1803. 04683
  17. Masi I, Wu Y, Hassner T, and Natarajan P. “Deep face recognition: A survey.” 31st SIBGRAPI Conf. on Graphics, Patterns, and Images (SIBGRAPI) 2018 :471–8. doi: 10.1109/SIBGRAPI.2018.00067
  18. Mahmood Z, Muhammad N, Bibi N, and Ali T. “A review on state-of-the-art face recognition approaches.” Fractals 2017; 25:1750025. doi: 10.1142/S0218348X17500256.
  19. Zhao W, Chellappa R, Phillips PJ, and Rosenfeld “Face recognition: A literature survey.” ACM Comput. Surv. 2003; 35:399–458. doi: 10.1145/ 954339.954342
  20. Sun Y, Liang D, Wang X, and Tang X. “Deepid3: Face recognition with deep neural networks.” 2013; Computer Vision and Pattern Recognition. doi: 10.48550/arXiv.1502.00873
  21. Kortli Y, Jridi M, Falou AA, and Atri M. “Face recognition systems: A Survey.” Sensors 2020; 20:342. doi: 10.3390/s20020342
  22. Wan Q, Panetta K, and Agaian S. “A video forensic technique for detecting frame integrity using the human visual system-inspired measure.” IEEE Int. Symp. on Technologies for Homeland Security (HST) 2017 :1–6. doi: 10 . 1109 / THS . 2017.7943466
  23. H.Kaur and Choudhary KR. “Digital forensics: implementation and analysis for Google An-droid framework.” Information Fusion for Cyber-
  24. Security Analytics 2017 :307–31. doi: 10.1007/ 978-3-319-44257-0 13
  25. Kaushal M, Khehra BS, and Sharma A. “Soft Computing based Object Detection and Track-ing Approaches: State-of-the-Art Survey. ” Appl. Soft Comput. 2018; 70:423–64. doi: 10.1016/j. asoc.2018.05.023
  26. Muhammad K, Ahmad J, Mehmood I, Rho S, and Baik SW. “Convolutional Neural Networks based Fire Detection in Surveillance Videos.” IEEE Access 2018; 6:18174–83. doi: 10.1109/ ACCESS.2018.2812835
  27. Bajestani MF, Abadi SSHR, Fard SMD, and Kho-dadadeh R. “AAD: Adaptive Anomaly Detection through Traffic Surveillance Videos.” 10th IAPR Workshop on Pattern Recognition in Remote Sens-ing (PRRS) 2018 :1–7. doi: 10.48550/arXiv.1808. 10044
  28. Conti M, Dehghantanha A, Franke K, and Watson S. “Internet of Things security and forensics: Chal-lenges and opportunities. ” Sci. Direct. 2018; 78:544–6. doi: 10.1016/j.future.2017.07.060
  29. Chen Q and Sang L. “Facemask recognition for fraud prevention using the Gaussian mixture model.” J. Vis. Commun. Image Represent. 2018; 55:795–801. doi: 10.1016/j.jvcir.2018.08.016
  30. Khatun MA, Yousuf MA, Ahmed S, Uddin MZ, Alyami SA, Al-Ashhab S, Akhdar HF, Khan A, Azad A, and Moni MA. “Deep CNN-LSTM with self-attention model for human activity recog-nition using wearable sensor.” IEEE Journal of Translational Engineering in Health and Medicine 2022; 10:1–16. doi: 10 . 1109 / JTEHM . 2022.3177710
  31. Sarcar ST and Yousuf MA. “Detecting violent arm movements using CNN-LSTM.” 5th IEEE International Conference on Electrical Information and Communication Technology (EICT) 2021 :1– doi: 10.1109/EICT54103.2021.9733510.
  32. Rezaee K, Rezakhani SM, Khosravi MR, and Moghimi MK. “A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance.” Personal and Ubiquitous Computing 2024; 28:135–51. doi: 10.1007/s00779-021-01586-5
  33. Lohiya R and Shah P. “Video-Based Face Detec-tion and Tracking for Forensic Applications.” Int. J. Comput. Sci. & Commun. 2016; 7:210–8. doi: 10.090592/IJCSC.2016.033
  34. Ayyappa Y, Neelakanteswara P, Bekkanti A, and CMAK Z. Basha YT nd. “Automatic Face Mask Recognition System with FCM AND BPNN. ” 5th Int. Conf. on Computing Methodologies and Communication (ICCMC) 2021 :1134–7. doi: 10.1109/ICCMC51019.2021.9418243
  35. Zhang X, Han Y, Xu W, and Wang Q. “HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learn-ing architecture.” Information Sciences 2021; 557:302–16. doi: 10.1016/j.ins.2019.05.023
  36. Ileberi E, Y.Sun, and Wang Z. “A machine learn-ing based credit card fraud detection using the GA algorithm for feature selection. ” Journal of Big Data 2022; 9. doi: ,vol.9, no.24, 2022.doi: 10.1186/s40537-022-00573-8
  37. Mim TR, Amatullah M, Afreen S, Yousuf MA, Uddin S, Alyami SA, Hasan KF, and Moni MA. “GRU-INC: An inception-attention based ap-proach using GRU for human activity recogni-tion.” Expert Systems with Applications 2023; 216:119419. doi: 10.1016/j.eswa.2022.119419
  38. Geng L, Zhang S, Tong J, and Xiao Z. “Lung segmentation method with dilated convolution based on VGG-16 network.” Comput. Ass. Surg. 2019; 24:27–33. doi: 10.1080/24699322.2019.1649071
  39. Srivastava S, Kumar P, Chaudhry V, and Singh A. “Detection of Ovarian Cyst in Ultrasound Im-ages Using Fine-Tuned VGG-16 Deep Learning Network.” SN Comput. Sci. 2020; 1:1–8. doi: 10.1007/s42979-020-0109-6
  40. Rezaee M, Zhang Y, Mishra R, Tong F, and Tong H. “Using the VGG-16 network for individual tree species detection with an object-based approach.” 10th IAPR Workshop on Pattern Recog-nition in Remote Sensing (PRRS) 2018 :1–7. doi: 10.1109/PRRS.2018.8486395
  41. Islam S, Khan SIA, Abedin MM, Habibullah KM, and Das AK. “Bird species classification from an image using the VGG-16 network. ” 7th Int. Conf. on Computer and Communications Management 2019 :38–42. doi: 10.1145/3348445.3348480
  42. Kamilaris A and Prenafeta-Boldu FX. “Deep learn-ing in agriculture: A survey.” Comput. Electron. Agric. 2018; 147:70–90. doi: 10.1016/j.compag. 2018.02.016
  43. Esteva A, Robicquet A, Ramsundar B, Kuleshov V, DePristo M, Chou K, Cui C, Corrado G, Thrun S, and Dean J. “A guide to deep learning in healthcare.” Nature Med. 2019; 25:24–9. doi: 10.1038/s41591-018-0316-z
  44. Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L, Desmaison A, Ko¨pf A, Yang E, DeVito Z, Raison M, Tejani A, Chilamkurthy S, Steiner B, Fang L, Bai J, and Chintala S. “Pytorch: An imperative style, high-performance deep learning library.” Machine Learning 2020. doi: 10.48550/arXiv. 1912.01703
  45. Zhang Z, Cui P, and Zhu W. “Deep learning on graphs: A survey.” IEEE Trans. Knowledge Data Eng. 2022; 34:249–70. doi: 10.1109/TKDE.2020. 2981333
  46. Balasubramanian Y, Sivasankaran K, and Krishraj SP. “Forensic video solution using facial feature-based synoptic Video Footage Record.” IET Com-put. Vis. 2017. doi: 10.1049/iet-cvi.2015.0238
  47. Lillis D, Becker B, O´ Sullivan T, and Scanlon M. “Current Challenges and Future Research Areas for Digital Forensic Investigation.” Cryptography and Security 2016. doi: 10.48550/arXiv.1604.03850
  48. Galvan F and Battiato S. “Image/Video Foren-sics: Theoretical Background, Methods and Best Practices- Part Two: From Analog to Digital World.” SICUREZZA eGIUSTIZIA S-I/MMXIX 2020 :45–50
  49. Primeau E and Primeau MA. “Video Forensic Services.” 2020. Available from: https://www. videoforensicexpert.com/contact-us/
  50. Krizhevsky A, Sutskever I, and Hinton GE. “ImageNet Classification with Deep Convolu-tional Neural Networks. ” Commun. ACM 2017; 60:84–90. doi: 10.1145/3065386
  51. “Image Category Classification using Deep Learning.” MathWorks 2020. Available from: https : / / www . mathworks . com / help / vision / examples/image- category- classification- using-deep-learning.html
  52. Sa´nchez J and Perronnin F. “High-dimensional signature compression for large-scale image clas-sification.” IEEE Conf. on Computer Vision and Pattern Recognition (CVPR) 2011 :1665–72. doi: 10.1109/CVPR.2011.5995504 “Types of Convolutional Neural Networks: LeNet, AlexNet, VGG-16 Net, ResNet and Incep-tion Net.” CompleteGate 2020. Available from: https://www.completegate.com/2017022864/blog/deep-machine-learning-images-lenet-alexnet-cnn/allpages
  53. M.Sabokrou, Fayyaz M, Fathy M, Moayed Z, and Klette R. “Effect of nanocatalysts on the trans-esterification reaction of first, second and third generation biodiesel sources - A mini-review.” Comput. Vis. Image Underst. 2018; 172:88–97. doi: 10.1016/j.cviu.2018.02.006
  54. Jin CB, Li S, and Kim H. “Real-Time Action De-tection in Video Surveillance using Sub-Action Descriptor with Multi-CNN. ” Comput. Vis. Pat-tern Recognit. 2017 :1–29. doi: 10.48550/arXiv. 1710.03383
  55. Vu H, Nguyen T, Travers A, Venkatesh S, and Phung D. “Energy-Based Localized Anomaly Detection in Video Surveillance.” In Proc. of Advances in Knowledge and Data Mining, Jeju, South Korea 2017 :1641–653. doi: 10.48550/ arXiv.2105.03270
  56. Sinha RK, Pandey R, and Pattnaik R. “Deep Learn-ing for Computer Vision Tasks: A Review. ” Conf. on Intelligent Computing and Control 2017 :1–5. doi: 10.48550/arXiv.1804.03928
  57. Nasir M, Muhammad K, Lloret J, Sangaiah AK, and Sajjad M. “Fog Computing Enabled Cost-Effective Distributed Summarization of Surveil-lance Videos for Smart Cities.” J. Parallel Distrib. Comput. 2019; 126:161–70. doi: 10.1016/j.jpdc. 2018.11.004
  58. Muhammad K, Hamza R, Ahmad J, Lloret J, Wang H, and Baik SW. “Secure Surveillance Frame-work for IoT Systems using Probabilistic Image Encryption.” IEEE Trans. on Industrial Informat-ics 2018; 14:3679–89. doi: 10.1109/TII.2018.2791944
  59. Munir M, Siddiqui SA, Dengel A, and Ahmed S. “DeepAnT: A Deep Learning Approach for Un-supervised Anomaly Detection in Time Series.” IEEE Access 2019; 7:1991–2005. doi: 10.1109/ ACCESS.2018.2886457
  60. Singh RD and Aggarwal N. “Video Content Au-thentication Techniques: A Comprehensive Sur-vey.” Multimedia Systems 2018; 24:211–40. doi: 10.1007/s00530-017-0538-9
  61. Sultani W, Chen C, and Shah M. “Real-World Anomaly Detection in Surveillance Videos. ” IEEE/CVF Conference on Computer Vision and Pattern Recognition 2018; 10:6479–88. doi: 10. 1109/CVPR.2018.00678
  62. Li S, Choo KKR, Sun Q, Buchanan WJ, and Cao J. “IoT forensics: Amazon echoes as a use case.” IEEE Internet of Things Journal 2019; 6:6487–97. Available from: 10.1109/JIOT.2019.2906946
  63. Jerian M, Paolino S, Cervelli F, Carrato S, Mattei A, and Garofano L. “A forensic image process-ing environment for the investigation of surveil-lance video.” Forensic Science International 2011; 167:2007. doi: 10.1016/j.forsciint.2006.06.048
  64. N. Ul H, Fraz MM, Hashmi TS, and Shahzad M. “Orientation aware weapons detection in visual data: a benchmark dataset.” Computing 2022; 104:2581–604. doi: 10.1007/s00607-022-01095-0
  65. Nanda SK, Ghai D, and Pande S. “VGG-16-Based Framework for Identification of Facemask Us-ing Video Forensics.” Proceedings of Data An-alytics and Management. Lecture Notes on Data Engineering and Communications Technologies 2022; 91. doi: 10.1007/978-981-16-6285-0 54
  66. Nanda SK and Ghai D. “Future of video forensics in IoT.” Electronic Devices and Circuit Design Challenges and Applications in the Internet of Things 2022 :113–33
  67. Nanda SK, Ghai D, and Ingole P. “Analysis of video forensics system for gun, mask, and anomaly detection using soft computing tech-niques.” Journal of Cyber Security and Mobil-ity 2022 :549–74. doi: 10 . 13052 / jcsm2245-1439.1143
  68. Ghai D, Saxena S, Dhingra G, and Tripathi SL. “A comprehensive review on performance-based comparative analysis, categorization, classifica-tion and mapping of text extraction system tech-niques for images.” Multimed Tools Appl 2025; 84:2327–2484. doi: 10.1007/s11042-024-20257-0