Knife and Threat Detectors

04/04/2020
by   David A. Noever, et al.
0

Despite rapid advances in image-based machine learning, the threat identification of a knife wielding attacker has not garnered substantial academic attention. This relative research gap appears less understandable given the high knife assault rate (>100,000 annually) and the increasing availability of public video surveillance to analyze and forensically document. We present three complementary methods for scoring automated threat identification using multiple knife image datasets, each with the goal of narrowing down possible assault intentions while minimizing misidentifying false positives and risky false negatives. To alert an observer to the knife-wielding threat, we test and deploy classification built around MobileNet in a sparse and pruned neural network with a small memory requirement (< 2.2 megabytes) and 95 (MaskRCNN) to segment the hand from the knife in a single image and assign probable certainty to their relative location. This segmentation accomplishes both localization with bounding boxes but also relative positions to infer overhand threats. A final model built on the PoseNet architecture assigns anatomical waypoints or skeletal features to narrow the threat characteristics and reduce misunderstood intentions. We further identify and supplement existing data gaps that might blind a deployed knife threat detector such as collecting innocuous hand and fist images as important negative training sets. When automated on commodity hardware and software solutions one original research contribution is this systematic survey of timely and readily available image-based alerts to task and prioritize crime prevention countermeasures prior to a tragic outcome.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/19/2021

1st Place Solution for the UVO Challenge on Image-based Open-World Segmentation 2021

We describe our two-stage instance segmentation framework we use to comp...
research
02/03/2022

Design and Development of Automated Threat Hunting in Industrial Control Systems

Traditional industrial systems, e.g., power plants, water treatment plan...
research
11/15/2019

Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing

Industrial Internet of Things (IIoT) application provide a whole new set...
research
08/02/2016

Automated X-ray Image Analysis for Cargo Security: Critical Review and Future Promise

We review the relatively immature field of automated image analysis for ...
research
09/19/2023

The Impact of Exposed Passwords on Honeyword Efficacy

Honeywords are decoy passwords that can be added to a credential databas...
research
11/25/2018

Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis

The objectives of cyber attacks are becoming sophisticated and the attac...
research
11/13/2019

Image-Based Feature Representation for Insider Threat Classification

Insiders are the trusted entities in the organization, but poses threat ...

Please sign up or login with your details

Forgot password? Click here to reset