Real-Time Security Risk Assessment From CCTV Using Hand Gesture Recognition

被引:5
作者
Koca, Murat [1 ]
机构
[1] Van Yuzuncu Yil Univ, Fac Engn, Dept Comp Engn, TR-65080 Tusba, Turkiye
来源
IEEE ACCESS | 2024年 / 12卷
关键词
CCTV footage; deep learning; cyber security; hand gesture recognition; media-pipe; metadata extraction; security risk assessment;
D O I
10.1109/ACCESS.2024.3412930
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Closed-Circuit Television (CCTV) surveillance systems, long associated with physical security, are becoming more crucial when combined with cybersecurity measures. Combining traditional surveillance with cyber defenses is a flexible method for protecting against both physical and digital dangers. This study introduces the use of convolutional neural networks (CNNs) and hand gesture detection using CCTV data to perform real-time security risk assessments. The suggested method's emphasis on automated extraction of key information, such as identity and behavior, illustrates its special use in silent or acoustically challenging settings. This study uses deep learning techniques to develop a novel approach for detecting hand gestures in CCTV images by automatically extracting relevant features using a media-pipe architecture. For instance, it facilitates risk assessment through the use of hand gestures in noisy environments or muted audio streams. Given this method's uniqueness and efficiency, the suggested solution will be able to alert appropriate authorities in the event of a security breach. There seems to be considerable opportunity for the development of applications in several domains of security, law enforcement, and public safety, including but not limited to shopping malls, educational institutions, transportation, the armed forces, theft, abduction, etc.
引用
收藏
页码:84548 / 84555
页数:8
相关论文
共 25 条
[1]  
[Anonymous], 2021, Int. J. Performability Eng., V17, P314, DOI [10.23940/ijpe.21.03.p7.314321.19Z, DOI 10.23940/IJPE.21.03.P7.314321.19Z]
[2]   Weapon Detection in Real-Time CCTV Videos Using Deep Learning [J].
Bhatti, Muhammad Tahir ;
Khan, Muhammad Gufran ;
Aslam, Masood ;
Fiaz, Muhammad Junaid .
IEEE ACCESS, 2021, 9 :34366-34382
[3]  
Carmel D, 2017, EUR SIGNAL PR CONF, P1839, DOI 10.23919/EUSIPCO.2017.8081527
[4]   A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities [J].
Falco, Gregory ;
Viswanathan, Arun ;
Caldera, Carlos ;
Shrobe, Howard .
IEEE ACCESS, 2018, 6 :48360-48373
[5]   Hand gesture recognition based on a Harris Hawks optimized Convolution Neural Network [J].
Gadekallu, Thippa Reddy ;
Srivastava, Gautam ;
Liyanage, Madhusanka ;
Iyapparaja, M. ;
Chowdhary, Chiranji Lal ;
Koppu, Srinivas ;
Maddikunta, Praveen Kumar Reddy .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
[6]  
Gavrovska A., 2020, Cyber Security of Industrial Control Systems in the Future Internet Environment, P156, DOI DOI 10.4018/978-1-7998-2910-2.CH008
[7]  
Ghazali NNAN, 2012, INT CONF INTELL SYST, P853, DOI 10.1109/ISDA.2012.6416649
[8]  
Gill A., London Home Off. Pic. Giant. Stat. Dir, V292
[9]  
Gurav RM, 2015, 2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INSTRUMENTATION AND CONTROL (ICIC), P974, DOI 10.1109/IIC.2015.7150886
[10]  
Harris M., 2021, P 2 INT SEM SCI APPL, P101