Abstract
Violence is an extreme activity that presents a clear danger to human lives, human properties and governing authorities . Violence emancipates from strong protests to extreme disturbing activities by the mob. Violence unfolds itself from low level violence to extreme violence. This journey has two major steps. Stone Pelting and Arson activities are the two most ferocious activities by mobs from which classify the violence as building from low level violence to extreme violence. Arson is a spontaneous activity which is executed by protestors for showing extreme emotional dissent to the governing authorities. Lead by mob, arson is a dangerous activity and constitute most ferocious form of violence. Stone pelting is again an extreme case of mob fury against governing authorities. Pelting refers to throwing number of things at someone or something very quickly. Stone pelting is thus the most feared form of crowd violence that needs to be tackled on priority. Arson and stone pelting activities generate a fear in crowd and endangers life of humans and public and private property. The paper presents an application oriented deep learning framework using transfer learning approach for identification of arson and stone pelting in the images and videos. Cities which are classified as sensitive can opt for arson and stone pelting identification scheme for the protection of people and properties. We present a 2D ConvNets based transfer learning model for classifying extreme violence of arson and stone pelting. For a proof of concept, a small dataset is curated containing arson images, stone pelting and normal images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
https://www.merriam-webster.com/dictionary/protest, https://www.merriam-webster.com/dictionary/protest. Accessed 6 July 2020
https://en.wikipedia.org/wiki/Stone_pelting_in_Kashmir (2020). https://en.wikipedia.org/wiki/Stone_pelting_in_Kashmir. Accessed 29 Sep 2020
Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3730–3738 (2015)
Steinert-Threlkeld, Z.C., Mocanu, D., Vespignani, A., Fowler, J.: Online social networks and offline protest. EPJ Data Sci. 4(1), 1–9 (2015). https://doi.org/10.1140/epjds/s13688-015-0056-y
Leetaru, K., Wang, S., Cao, G., Padmanabhan, A., Shook, E.: Mapping the global Twitter heartbeat: the geography of Twitter. First Monday 18(5) (2013)
Redi, M., O'Hare, N., Schifanella, R., Trevisiol, M., Jaimes, A.: 6 seconds of sound and vision: creativity in micro-videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4272–4279 (2014)
https://indianexpress.com/article/world/israeli-troops-killed-two-stone-pelters-in-west-bank-palestinian-officials-4746966/. Accessed 29 Sep 2020
Howard, A.G., et al.: Mobilenets: efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)
Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vision 115(3), 211–252 (2015)
Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)
https://en.wikipedia.org/wiki/Stone_pelting_in_Kashmir#:~:text=On%2025%20October%202018%2C%20an,22%20year%20old%20from%20Uttarakhand. Accessed 29 Sep 2020
Krizhevsky, A., Sutskever, I., Geoffrey, E.H.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (NIPS 2012), vol. 25 (2012)
Simonyan, K., Zisserman, A.: Two-stream convolutional networks for action recognition in videos. In: Advances Neural Information Processing Systems (2014)
Girshick, R., Donahue, J., Darrell, T., Malik, J.: Rich feature hierarchies for accurate object detection and semantic segmentation. In: CVPR (2014)
LeCun, Y., Kavukcuoglu, K., Farabet, C.: Convolutional networks and applications in vision. In: Proceedings of 2010 IEEE International Symposium on Circuits and Systems (2010)
Perez, M., Kot, A.C., Rocha, A.: Detection of real-world fights in surveillance videos. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)
Torrey, L., Shavlik, J.: Transfer learning. In: Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods, and Techniques, pp. 242–264. IGI global (2010)
Gupta, D., Jain, S., Shaikh, F., Singh, G.: Transfer learning & the art of using pre-trained Models in deep learning. Anal. Vidhya (2017)
Tufekci, Z.: Big questions for social media big data: representativeness, validity and other methodological pitfalls. In: Eighth International AAAI Conference on Weblogs and Social Media (2014)
Little, A.T.: Communication technology and protest. J. Polit. 78(1), 152–166 (2016)
Yang, G.: Achieving emotions in collective action: emotional processes and movement mobilization in the 1989 Chinese student movement. Sociol. Q. 41, 593–614 (2000)
Isola, P., Xiao, J., Torralba, A., Oliva, A.: What makes an image memorable? In: CVPR 2011, pp. 145–152. IEEE (2011)
Petkos, G., Papadopoulos, S., Schinas, E., Kompatsiaris, Y.: Graph-based multimodal clustering for social event detection in large collections of images. In: Gurrin, C., Hopfgartner, F., Hurst, W., Johansen, H., Lee, H., O’Connor, N. (eds.) MMM 2014. LNCS, vol. 8325, pp. 146–158. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04114-8_13
González-Bailón, S., Borge-Holthoefer, J., Moreno, Y.: Broadcasters and hidden influentials in online protest diffusion. Am. Behav. Sci. 57(7), 943–965 (2013)
Fisher, D.R.: Studying Large-Scale Protest: Understanding Mobilization and Participation at the People’s Climate, March (2014). http://www.sindark.com/phd/thesis/sources/PCM_PreliminaryResults.pdf
Parikh, D., Grauman, K.: Relative attributes. In: 2011 International Conference on Computer Vision, pp. 503–510. IEEE (2011)
Petkos, G., Papadopoulos, S., Kompatsiaris, Y.: Social event detection using multimodal clustering and integrating supervisory signals. In: Proceedings of the 2nd ACM International Conference on Multimedia Retrieval, pp. 1–8 (2012)
Hanson, A., PNVR, K., Krishnagopal, S., Davis, L.: Bidirectional convolutional LSTM for the detection of violence in videos. In: Leal-Taixé, L., Roth, S. (eds.) ECCV 2018. LNCS, vol. 11130, pp. 280–295. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11012-3_24
Sumon, S.A., Shahria, M.T., Goni, M.R., Hasan, N., Almarufuzzaman, A., Rahman, R.M.: Violent crowd flow detection using DEEP learning. In: Asian Conference on Intelligent Information and Database Systems (2019)
Mu, G., Cao, H., Jin, Q.: Violent scene detection using convolutional neural networks and deep audio feature. In: Chinese Conference on Pattern Recognition (2016)
Won, D., Steinert-Threlkeld, Z.C., Joo, J.: Protest activity detection and perceived violence estimation from social media images. In: Proceedings of the 25th ACM International Conference on Multimedia, pp. 786–794 (2017)
Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818–2826 (2016)
Harvey, M.: Creating insanely fast image classifiers with MobileNet in TensorFlow. Hacker Noon (2017)
https://github.com/ostrolucky/Bulk-Bing-Image-downloader. Accessed 06 July 2020
https://neurohive.io/en/popular-networks/vgg16/, https://neurohive.io/en/popular-networks/vgg16/. Accessed 05 Sep 2020
https://alexisbcook.github.io/2017/using-transfer-learning-to-classify-images-with-keras/. Accessed 05 Sep 2020
Chollet, F.: o. "Keras," GitHub (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Tripathi, G., Singh, K., Vishwakarma, D.K. (2021). Detecting Arson and Stone Pelting in Extreme Violence: A Deep Learning Based Identification Approach. In: Singh, M., Kang, DK., Lee, JH., Tiwary, U.S., Singh, D., Chung, WY. (eds) Intelligent Human Computer Interaction. IHCI 2020. Lecture Notes in Computer Science(), vol 12615. Springer, Cham. https://doi.org/10.1007/978-3-030-68449-5_44
Download citation
DOI: https://doi.org/10.1007/978-3-030-68449-5_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-68448-8
Online ISBN: 978-3-030-68449-5
eBook Packages: Computer ScienceComputer Science (R0)