Skip to main content

Detecting Arson and Stone Pelting in Extreme Violence: A Deep Learning Based Identification Approach

  • Conference paper
  • First Online:
Intelligent Human Computer Interaction (IHCI 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12615))

Included in the following conference series:

Abstract

Violence is an extreme activity that presents a clear danger to human lives, human properties and governing authorities . Violence emancipates from strong protests to extreme disturbing activities by the mob. Violence unfolds itself from low level violence to extreme violence. This journey has two major steps. Stone Pelting and Arson activities are the two most ferocious activities by mobs from which classify the violence as building from low level violence to extreme violence. Arson is a spontaneous activity which is executed by protestors for showing extreme emotional dissent to the governing authorities. Lead by mob, arson is a dangerous activity and constitute most ferocious form of violence. Stone pelting is again an extreme case of mob fury against governing authorities. Pelting refers to throwing number of things at someone or something very quickly. Stone pelting is thus the most feared form of crowd violence that needs to be tackled on priority. Arson and stone pelting activities generate a fear in crowd and endangers life of humans and public and private property. The paper presents an application oriented deep learning framework using transfer learning approach for identification of arson and stone pelting in the images and videos. Cities which are classified as sensitive can opt for arson and stone pelting identification scheme for the protection of people and properties. We present a 2D ConvNets based transfer learning model for classifying extreme violence of arson and stone pelting. For a proof of concept, a small dataset is curated containing arson images, stone pelting and normal images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. https://www.merriam-webster.com/dictionary/protest, https://www.merriam-webster.com/dictionary/protest. Accessed 6 July 2020

  2. https://en.wikipedia.org/wiki/Stone_pelting_in_Kashmir (2020). https://en.wikipedia.org/wiki/Stone_pelting_in_Kashmir. Accessed 29 Sep 2020

  3. Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3730–3738 (2015)

    Google Scholar 

  4. Steinert-Threlkeld, Z.C., Mocanu, D., Vespignani, A., Fowler, J.: Online social networks and offline protest. EPJ Data Sci. 4(1), 1–9 (2015). https://doi.org/10.1140/epjds/s13688-015-0056-y

    Article  Google Scholar 

  5. Leetaru, K., Wang, S., Cao, G., Padmanabhan, A., Shook, E.: Mapping the global Twitter heartbeat: the geography of Twitter. First Monday 18(5) (2013)

    Google Scholar 

  6. Redi, M., O'Hare, N., Schifanella, R., Trevisiol, M., Jaimes, A.: 6 seconds of sound and vision: creativity in micro-videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4272–4279 (2014)

    Google Scholar 

  7. https://indianexpress.com/article/world/israeli-troops-killed-two-stone-pelters-in-west-bank-palestinian-officials-4746966/. Accessed 29 Sep 2020

  8. Howard, A.G., et al.: Mobilenets: efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)

  9. Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vision 115(3), 211–252 (2015)

    Article  MathSciNet  Google Scholar 

  10. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)

  11. https://en.wikipedia.org/wiki/Stone_pelting_in_Kashmir#:~:text=On%2025%20October%202018%2C%20an,22%20year%20old%20from%20Uttarakhand. Accessed 29 Sep 2020

  12. Krizhevsky, A., Sutskever, I., Geoffrey, E.H.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (NIPS 2012), vol. 25 (2012)

    Google Scholar 

  13. Simonyan, K., Zisserman, A.: Two-stream convolutional networks for action recognition in videos. In: Advances Neural Information Processing Systems (2014)

    Google Scholar 

  14. Girshick, R., Donahue, J., Darrell, T., Malik, J.: Rich feature hierarchies for accurate object detection and semantic segmentation. In: CVPR (2014)

    Google Scholar 

  15. LeCun, Y., Kavukcuoglu, K., Farabet, C.: Convolutional networks and applications in vision. In: Proceedings of 2010 IEEE International Symposium on Circuits and Systems (2010)

    Google Scholar 

  16. Perez, M., Kot, A.C., Rocha, A.: Detection of real-world fights in surveillance videos. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

    Google Scholar 

  17. Torrey, L., Shavlik, J.: Transfer learning. In: Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods, and Techniques, pp. 242–264. IGI global (2010)

    Google Scholar 

  18. Gupta, D., Jain, S., Shaikh, F., Singh, G.: Transfer learning & the art of using pre-trained Models in deep learning. Anal. Vidhya (2017)

    Google Scholar 

  19. Tufekci, Z.: Big questions for social media big data: representativeness, validity and other methodological pitfalls. In: Eighth International AAAI Conference on Weblogs and Social Media (2014)

    Google Scholar 

  20. Little, A.T.: Communication technology and protest. J. Polit. 78(1), 152–166 (2016)

    Article  Google Scholar 

  21. Yang, G.: Achieving emotions in collective action: emotional processes and movement mobilization in the 1989 Chinese student movement. Sociol. Q. 41, 593–614 (2000)

    Article  Google Scholar 

  22. Isola, P., Xiao, J., Torralba, A., Oliva, A.: What makes an image memorable? In: CVPR 2011, pp. 145–152. IEEE (2011)

    Google Scholar 

  23. Petkos, G., Papadopoulos, S., Schinas, E., Kompatsiaris, Y.: Graph-based multimodal clustering for social event detection in large collections of images. In: Gurrin, C., Hopfgartner, F., Hurst, W., Johansen, H., Lee, H., O’Connor, N. (eds.) MMM 2014. LNCS, vol. 8325, pp. 146–158. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04114-8_13

    Chapter  Google Scholar 

  24. González-Bailón, S., Borge-Holthoefer, J., Moreno, Y.: Broadcasters and hidden influentials in online protest diffusion. Am. Behav. Sci. 57(7), 943–965 (2013)

    Google Scholar 

  25. Fisher, D.R.: Studying Large-Scale Protest: Understanding Mobilization and Participation at the People’s Climate, March (2014). http://www.sindark.com/phd/thesis/sources/PCM_PreliminaryResults.pdf

  26. Parikh, D., Grauman, K.: Relative attributes. In: 2011 International Conference on Computer Vision, pp. 503–510. IEEE (2011)

    Google Scholar 

  27. Petkos, G., Papadopoulos, S., Kompatsiaris, Y.: Social event detection using multimodal clustering and integrating supervisory signals. In: Proceedings of the 2nd ACM International Conference on Multimedia Retrieval, pp. 1–8 (2012)

    Google Scholar 

  28. Hanson, A., PNVR, K., Krishnagopal, S., Davis, L.: Bidirectional convolutional LSTM for the detection of violence in videos. In: Leal-Taixé, L., Roth, S. (eds.) ECCV 2018. LNCS, vol. 11130, pp. 280–295. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11012-3_24

    Chapter  Google Scholar 

  29. Sumon, S.A., Shahria, M.T., Goni, M.R., Hasan, N., Almarufuzzaman, A., Rahman, R.M.: Violent crowd flow detection using DEEP learning. In: Asian Conference on Intelligent Information and Database Systems (2019)

    Google Scholar 

  30. Mu, G., Cao, H., Jin, Q.: Violent scene detection using convolutional neural networks and deep audio feature. In: Chinese Conference on Pattern Recognition (2016)

    Google Scholar 

  31. Won, D., Steinert-Threlkeld, Z.C., Joo, J.: Protest activity detection and perceived violence estimation from social media images. In: Proceedings of the 25th ACM International Conference on Multimedia, pp. 786–794 (2017)

    Google Scholar 

  32. Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818–2826 (2016)

    Google Scholar 

  33. Harvey, M.: Creating insanely fast image classifiers with MobileNet in TensorFlow. Hacker Noon (2017)

    Google Scholar 

  34. https://github.com/ostrolucky/Bulk-Bing-Image-downloader. Accessed 06 July 2020

  35. https://neurohive.io/en/popular-networks/vgg16/, https://neurohive.io/en/popular-networks/vgg16/. Accessed 05 Sep 2020

  36. https://alexisbcook.github.io/2017/using-transfer-learning-to-classify-images-with-keras/. Accessed 05 Sep 2020

  37. Chollet, F.: o. "Keras," GitHub (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Tripathi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tripathi, G., Singh, K., Vishwakarma, D.K. (2021). Detecting Arson and Stone Pelting in Extreme Violence: A Deep Learning Based Identification Approach. In: Singh, M., Kang, DK., Lee, JH., Tiwary, U.S., Singh, D., Chung, WY. (eds) Intelligent Human Computer Interaction. IHCI 2020. Lecture Notes in Computer Science(), vol 12615. Springer, Cham. https://doi.org/10.1007/978-3-030-68449-5_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68449-5_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68448-8

  • Online ISBN: 978-3-030-68449-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy