Smart Surveillance: Multi Weapon Armed Person Detection With Automated Threat Alerts

Authors

  • DEVALLA BHASKAR GANESH Computer Science, University of Macau, Avenida da Universidade, Taipa, Macau, China Author

DOI:

https://doi.org/10.63949/
Search on Google Scholar

Keywords:

  • Deep learning,
  • armed weapon detection,
  • machine learning,
  • object detection,
  • Convolutional neural networks

Abstract

The rise in criminal activities has created an urgent demand for intelligent surveillance and command systems in law enforcement. This work introduces a deep learning–based model tailored for classifying  distinct weapon categories. The model is developed on the YoloV8-CNN+LSTM framework and implemented using Keras with TensorFlow as the backend. It is trained to recognize gun, rifles, knives. A carefully curated dataset containing 5,214 images was prepared for training and evaluation. The proposed network underwent comparative testing against established models, including VGG-16, ResNet-50, and ResNet-101. Results show that the model achieved an improved accuracy of 92\%, outperforming VGG-16 (89.75\%), ResNet-50 (90.70\%), and ResNet-101 (83.33\%). These findings helps to improve proposed approach in enhancing weapon detection accuracy, thereby strengthening the capabilities of security forces in preventing crimes.

Downloads

Download data is not yet available.

References

[1] S. Ahmed, M. T. Bhatti, M. G. Khan, B. Lövström, and M. Shahid, “Development and optimization of deep learning models for weapon detection in surveillance videos,” Applied Sciences, vol. 12, no. 12, p. 5772, 2022.

[2] T. Santos, H. Oliveira, and A. Cunha, “Systematic review on weapon detection in surveillance footage through deep learning,” Computer science review, vol. 51, p. 100612, 2024.

[3] A. H. Ashraf, M. Imran, A. M. Qahtani, A. Alsufyani, O. Almutiry, A. Mahmood, M. Attique, and M. Habib, “Weapons detection for security and video surveillance using cnn and yolo-v5s,” CMC-Comput. Mater. Contin, vol. 70, no. 4, pp. 2761–2775, 2022.

[4] N. Hnoohom, P. Chotivatunyu, N. Maitrichit, V. Sornlertlamvanich, S. Mekruksavanich, and A. Jit- pattanakul, “Weapon detection using faster r-cnn inception-v2 for a cctv surveillance system,” in 2021 25th international computer science and engineering conference (ICSEC), pp. 400–405, IEEE, 2021.

[5] W. Min, L. Xikun, and Z. Yi-di, “Gun life prediction model based on bayesian optimization cnn-lstm,” Integrated Ferroelectrics, vol. 228, no. 1, pp. 107–116, 2022.

[6] R. Pravesh and B. C. Sahana, “A dual-stage deep learning framework for simultaneous fire and firearm detection in smart surveillance systems,” Results in Engineering, p. 106330, 2025.

[7] A. J. Amado-Garfias, S. E. Conant-Pablos, J. C. Ortiz-Bayliss, and H. Terashima-Marin, “Improving armed people detection on video surveillance through heuristics and machine learning models,” IEEE Access, vol. 12, pp. 111818–111831, 2024.

[8] G. Gupta, S. Chattopadhyay, V. Kukreja, M. Aeri, and S. Mehta, “The arsenal algorithm: Ai-driven weapon recognition with cnn-svm model,” in 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), pp. 1–6, IEEE, 2024.

[9] T. Murugan, N. A. N. M. Badusha, A. R. O. A. Semaihi, M. M. R. Alkindi, E. M. R. Alnaqbi, and G. H. T. Alketbi, “Ai-based weapon detection for security surveillance: Recent research advances (2016–2025),” Electronics, vol. 14, no. 23, p. 4609, 2025.

[10] M. T. Bhatti, M. G. Khan, M. Aslam, and M. J. Fiaz, “Weapon detection in real-time cctv videos using deep learning,” Ieee Access, vol. 9, pp. 34366–34382, 2021.

[11] R. Anandhi, “Edge computing-based crime scene object detection from surveillance video using deep learning algorithms,” in 2023 5th International Conference on Inventive Research in Comput- ing Applications (ICIRCA), pp. 1159–1163, IEEE, 2023.

Downloads

Published

2025-12-10

Issue

Section

Articles

How to Cite

Smart Surveillance: Multi Weapon Armed Person Detection With Automated Threat Alerts. (2025). Frontiers in Engineering and Informatics, 1(4), 221-228. https://doi.org/10.63949/