Skip to main content

Gun Identification Using Tensorflow

  • Conference paper
  • First Online:
Book cover Machine Learning and Intelligent Communications (MLICOM 2018)

Abstract

Automatic video surveillance can assist security personnel in the identification of threats. Generally, security personnel are monitoring multiple monitors and a system that would send an alert or warning could give the personnel extra time to scrutinize if a person is carrying a firearm. In this paper, we utilize Google’s Tensorflow API to create a digital framework that will identify handguns in real time video. By utilizing the MobileNetV1 Neural Network algorithm, our system is trained to identify handguns in various orientations, shapes, and sizes, then the intelligent gun identification system will automatically interpret if the subject is carrying a gun or other objects. Our experiments show the efficiency of implemented intelligent gun identification system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Grega, M., Matiolański, A., Guzik, P., Leszczuk, M.: Automated detection of firearms and knives in a CCTV image. Sensors 16, 1–16 (2016). https://doi.org/10.3390/s16010047. ISSN 1424-8220

    Article  Google Scholar 

  2. Tiwari, R.K., Verma, G.K.: A computer vision based framework for visual gun detection using harris interest point detector. Procedia Comput. Sci. 54, 703–712 (2015). https://doi.org/10.1016/j.procs.2015.06.083

    Article  Google Scholar 

  3. Olmos, R., Tabik, S., Herrera, F.: Automatic Handgun Detection Alarm in Videos Using Deep Learning. arXiv:170205147 cs (2017)

    Google Scholar 

  4. Yeom, S., et al.: Real-time outdoor concealed-object detection with passive millimeter wave imaging. Opt. Express 19, 2530–2536 (2011). https://doi.org/10.1364/OE.19.002530

    Article  Google Scholar 

  5. Vajhala, R., Maddineni, R., Yeruva, P.R.: Weapon Detection in Surveillance Camera Images (2016)

    Google Scholar 

  6. Kang, K., Ouyang, W., Li, H., Wang, X.: Object Detection from Video Tubelets with Convolutional Neural Networks. Presented at the June (2016)

    Google Scholar 

  7. Ray, L., Miao, T.: Towards Real-Time Detection, Tracking and Classification of Natural Video. Presented at the June (2016)

    Google Scholar 

  8. Abadi, M.: TensorFlow: learning functions at scale. In: Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, p. 1. ACM, New York (2016)

    Google Scholar 

  9. Angermueller, C., Pärnamaa, T., Parts, L., Stegle, O.: Deep learning for computational biology. Mol. Syst. Biol. 12, 878 (2016)

    Article  Google Scholar 

  10. Pulli, K., Baksheev, A., Kornyakov, K., Eruhimov, V.: Real-time computer vision with OpenCV. Commun. ACM. 55, 61–69 (2012). https://doi.org/10.1145/2184319.2184337

    Article  Google Scholar 

  11. Kaehler, A., Bradski, G.R.: Learning OpenCV 3: Computer Vision in C++ with the OpenCV Library. O’Reilly Media, Sebastopol (2016)

    Google Scholar 

  12. Howard, A.G., et al.: MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. arXiv:170404861 cs (2017)

    Google Scholar 

  13. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60, 84–90 (2017). https://doi.org/10.1145/3065386

    Article  Google Scholar 

  14. Kadiyala, A., Kumar, A.: Applications of Python to evaluate environmental data science problems. Environ. Prog. Sustain. Energy 36, 1580 (2017)

    Article  Google Scholar 

  15. Saha, M.D., Darji, M.K., Patel, N., Thakore, D.: Implementation of image enhancement algorithms and recursive ray tracing using CUDA. Procedia Comput. Sci. 79, 516–524 (2016). https://doi.org/10.1016/j.procs.2016.03.066

    Article  Google Scholar 

  16. Shi, J., Tomasi, C.: Good Features to Track. Cornell University, Ithaca (1993)

    Google Scholar 

  17. Xiao, J., Hays, J., Ehinger, K.A., Oliva, A., Torralba, A.: Sun database: large-scale scene recognition from abbey to zoo. In: 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). pp. 3485–3492. IEEE (2010)

    Google Scholar 

  18. Internet Movie Firearm Database. http://www.imfdb.org/

  19. Pixabay. https://pixabay.com

  20. Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2009, pp. 248–255. IEEE (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingzhong Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singleton, M., Taylor, B., Taylor, J., Liu, Q. (2018). Gun Identification Using Tensorflow. In: Meng, L., Zhang, Y. (eds) Machine Learning and Intelligent Communications. MLICOM 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 251. Springer, Cham. https://doi.org/10.1007/978-3-030-00557-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00557-3_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00556-6

  • Online ISBN: 978-3-030-00557-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics