Enhancing Digital Forensics with Deep Learning: Applications of CNNs and YOLOv5 in Weapon Detection and Image Forgery Analysis
DOI:
https://doi.org/10.54536/ajise.v4i2.4685Keywords:
Abnormal Activities, Crime Localization, Weapon Recognition, YOLOv5Abstract
Security is an essential problem in all domains. The crime rates are increased at crowded events or suspected isolated regions. Computer vision has significant uses in detecting and monitoring abnormalities to address diverse issues. Video surveillance systems are increasingly necessary for safeguarding the safety, security, and personal belongings. The ability of these systems to identify and understand scenes and unusual occurrences is crucial for effective intelligence monitoring. The primary objective of this study was to analyze surveillance films to identify weapons and detect any unusual behaviors or actions. This study applied the advanced cutting-edge framework YOLOv5 to examine and identify abnormalities like weapon recognition and criminal behavior in the public surveillance video dataset. The proposed approach implementation accomplishes an (mAP) mean average precision of 96.1%, outperforming state-of-the- art methods in terms of accuracy and efficiency for recognizing weapons and localization of criminal behavior in challenging surveillance datasets.
Downloads
References
Acharjya, P. P., Koley, S., & Barman, S. (2022). A review on forensic science and criminal investigation through a deep learning framework. Aiding Forensic Investigation Through Deep Learning and Machine Learning Frameworks, 1-72.
Alajrami, E., Ashqar, B. A., Abu-Nasser, B. S., Khalil, A. J., Musleh, M. M., Barhoom, A. M., & Abu-Naser, S. S. (2020). Handwritten signature verification using deep learning.
Bartlett, M. S., Littlewort, G., Fasel, I., & Movellan, J. R. (2003). Real Time Face Detection and Facial Expression Recognition: Development and Applications to Human Computer Interaction. 2003 Conference on computer vision and pattern recognition workshop,
Bhatti, M. T., Khan, M. G., Aslam, M., & Fiaz, M. J. (2021). Weapon detection in real-time cctv videos using deep learning. IEEE Access, 9, 34366-34382.
Byrne, J., & Marx, G. (2011). Technological innovations in crime prevention and policing. A review of the research on implementation and impact. Journal of Police Studies, 20(3), 17-40.
Casino, F., Dasaklis, T. K., Spathoulas, G. P., Anagnostopoulos, M., Ghosal, A., Borocz, I., Solanas, A., Conti, M., & Patsakis, C. (2022). Research trends, challenges, and emerging topics in digital forensics: A review of reviews. IEEE Access, 10, 25464-25493.
Chrysos, G. G., Antonakos, E., Snape, P., Asthana, A., & Zafeiriou, S. (2018). A comprehensive performance evaluation of deformable face tracking “in-the-wild”. International journal of computer vision, 126, 198-232.
Debnath, R., & Bhowmik, M. K. (2021). A comprehensive survey on computer vision based concepts, methodologies, analysis and applications for automatic gun/knife detection. Journal of Visual Communication and Image Representation, 78, 103165.
Dunsin, D., Ghanem, M. C., Ouazzane, K., & Vassilev, V. (2024). A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic Science International: Digital Investigation, 48, 301675.
Fakiha, B. (2023). Enhancing Cyber Forensics with AI and Machine Learning: A Study on Automated Threat Analysis and Classification. International Journal of Safety & Security Engineering, 13(4).
Ghai, A., Kumar, P., & Gupta, S. (2024). A deep-learning-based image forgery detection framework for controlling the spread of misinformation. Information Technology & People, 37(2), 966-997.
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2022). Cybercrime and digital forensics: An introduction. Routledge.
Jiang, F., & Jiang, J. (2024). Research on the Application of Object Detection Methods Based on Multimodal Information Fusion in Digital Forensics. In 2024 4th International Conference on Consumer Electronics and Computer Engineering (ICCECE)
Kaur, R., & Singh, S. (2023). A comprehensive review of object detection with deep learning. Digital Signal Processing, 132, 103812.
Khanam, R., & Hussain, M. (2024). What is YOLOv5: A deep look into the internal features of the popular object detector. arXiv preprint arXiv:2407.20892.
Luo, D., Wen, G., Li, D., Hu, Y., & Huan, E. (2018). Deep-learning-based face detection using iterative bounding-box regression. Multimedia Tools and Applications, 77, 24663-24680.
Nastasi, C. (2021). Multimedia Forensics: From Image manipulation to the Deep Fake. New Threats in the Social Media Era.
Navalgund, U. V., & Priyadharshini, K. (2018). Crime intention detection system using deep learning. 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET),
Pearson, S., & Watson, R. (2010). Digital triage forensics: processing the digital crime scene. Syngress.
Quyyum, M. E. E., & Abdullah, M. H. L. (2022). Weapon Detection in Surveillance Videos Using Deep Neural Networks. Multimedia University Engineering Conference (MECON 2022)
Ranjan, R., Bansal, A., Zheng, J., Xu, H., Gleason, J., Lu, B., Nanduri, A., Chen, J.-C., Castillo, C. D., & Chellappa, R. (2019). A fast and accurate system for face detection, identification, and verification. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1(2), 82-96.
Ullah, F. U. M., Obaidat, M. S., Ullah, A., Muhammad, K., Hijji, M., & Baik, S. W. (2023). A comprehensive review on vision-based violence detection in surveillance videos. ACM Computing Surveys, 55(10), 1-44.
Viola, P., & Jones, M. J. (2004). Robust real-time face detection. International journal of computer vision, 57, 137-154.
Wang, J., Ma, Y., Zhang, L., Gao, R. X., & Wu, D. (2018). Deep learning for smart manufacturing: Methods and applications. Journal of manufacturing systems, 48, 144-156.
Watchareeruetai, U., Sommana, B., Jain, S., Noinongyao, P., Ganguly, A., Samacoits, A., Earp, S. W., & Sritrakool, N. (2022). Lotr: face landmark localization using localization transformer. IEEE Access, 10, 16530-16543.
Yoon, S., Feng, J., & Jain, A. K. (2012). Altered fingerprints: Analysis and detection. IEEE transactions on pattern analysis and machine intelligence, 34(3), 451-464.
Yuan, T., Zhang, X., Liu, K., Liu, B., Jin, J., & Jiao, Z. (2023). UCF-Crime Annotation: A Benchmark for Surveillance Video-and-Language Understanding. arXiv preprint arXiv:2309.13925.
Zhang, Z., Zhou, X., Zhang, X., Wang, L., & Wang, P. (2018). A model based on convolutional neural network for online transaction fraud detection. Security and Communication Networks, 2018(1), 5680264.
Zinjurde, A. M., & Kamble, V. B. (2020). Credit card fraud detection and prevention by face recognition. 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Anmol Deepak Kumar, Tamizharasan Periyasami

This work is licensed under a Creative Commons Attribution 4.0 International License.