Browse > Article
http://dx.doi.org/10.3837/tiis.2022.06.003

A Novel Transfer Learning-Based Algorithm for Detecting Violence Images  

Meng, Yuyan (Department of Police Information Engineering and Cyber Security, People's Public Security University of China)
Yuan, Deyu (Department of Police Information Engineering and Cyber Security, People's Public Security University of China)
Su, Shaofan (Department of Police Information Engineering and Cyber Security, People's Public Security University of China)
Ming, Yang (Department of Police Information Engineering and Cyber Security, People's Public Security University of China)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.16, no.6, 2022 , pp. 1818-1832 More about this Journal
Abstract
Violence in the Internet era poses a new challenge to the current counter-riot work, and according to research and analysis, most of the violent incidents occurring are related to the dissemination of violence images. The use of the popular deep learning neural network to automatically analyze the massive amount of images on the Internet has become one of the important tools in the current counter-violence work. This paper focuses on the use of transfer learning techniques and the introduction of an attention mechanism to the residual network (ResNet) model for the classification and identification of violence images. Firstly, the feature elements of the violence images are identified and a targeted dataset is constructed; secondly, due to the small number of positive samples of violence images, pre-training and attention mechanisms are introduced to suggest improvements to the traditional residual network; finally, the improved model is trained and tested on the constructed dedicated dataset. The research results show that the improved network model can quickly and accurately identify violence images with an average accuracy rate of 92.20%, thus effectively reducing the cost of manual identification and providing decision support for combating rebel organization activities.
Keywords
Deep learning; Image classification; Pre-training; Violence images;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 B. Ionescu, M. Ghenescu, F. Rastoceanu, R. Roman and M. Buric, "Artificial Intelligence Fights Crime and Terrorism at a New Level," IEEE MultiMedia, vol. 27, no. 2, pp. 55-61, 1 April-June 2020.   DOI
2 Szegedy C, Liu W, Jia Y, et al, "Going Deeper with Convolutions," in Proc. of 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015.
3 Z. G. Qu, H. R. Sun and M. Zheng, "An efficient quantum image steganography protocol based on improved EMD algorithm," Quantum Information Processing, vol. 20, no. 53, pp. 1-29, 2021.   DOI
4 M. Chen, "Automatic identification of violent images based on transfer learning," Journal of Beijing University of Aeronautics and Astronautics, 46(09), 1677-1681, 2020.
5 S. Sun, J. Zhou, J. Wen, Y. Wei and X. Wang, "A dqn-based cache strategy for mobile edge networks," Computers, Materials & Continua, vol. 71, no.2, pp. 3277-3291, 2022.   DOI
6 He, K., Zhang, X., Ren, S., & Sun, J, "Deep Residual Learning for Image Recognition," in Proc. of 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016.
7 T. Xia and Y. Gu, "Building Terrorist Knowledge Graph from Global Terrorism Database and Wikipedia," in Proc. of 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 194-196, 2019.
8 Krizhevsky, A., Sutskever, I., & Hinton, G. E., "ImageNet classification with deep convolutional neural networks," Communications of the ACM, 60(6), 84-90, 2017.   DOI
9 Simonyan, Karen, and Andrew Zisserman, "Very deep convolutional networks for large-scale image recognition," arXiv preprint arXiv:1409.1556, 2014.
10 Z. G. Qu, Y. M. Huang and M. Zheng, "A novel coherence-based quantum steganalysis protocol," Quantum Information Processing, vol.19, no. 362, pp. 1-19, 2020.   DOI
11 L.Yan, "Automatic labeling method for violent images based on integrated classification," Journal of Terahertz Science and Electronic Information Technology, 18(02), 306-312, 2020.
12 Hu Xinxu, Zhou Xin, He Xiaohai, Xiong Shuhua, Wang Zhengyong, "The Moby Audio Discrimination Method based on Transfer learning," Computer System Applications, 28 (11), 147-152, 2019.
13 Meng Caixia., "Terror Detection Simulation based on Fusion Two-Channel Video," Computer Simulation, 32(02), 428-431, 2015.
14 A. Kaur and L. Kaur, "Concealed weapon detection from images using SIFT and SURF," in Proc. of 2016 Online International Conference on Green Engineering and Technologies (IC-GET), pp. 1-8, 2016.
15 C. Dhiman and D. K. Vishwakarma, "A review of state-of-the-art techniques for abnormal human activity recognition," Eng. Appl. Artif. Intell., vol. 77, no. August 2018, pp. 21-45, 2019.   DOI
16 R. U. Khan, W. S. Wong, I. Ullah, F. Algarni, M. Inam et al., "Evaluating the efficiency of cbamResNet using malaysian sign language," Computers, Materials & Continua, vol. 71, no.2, pp. 2755-2772, 2022.   DOI
17 Liu, Y., et al., "Abnormal Behavior Recognition Based on Key Points of Human Skeleton," IFACPapersOnLine, 53(5), 441-445, 2020.
18 Karthikeswaran D, Sengottaiyan N, Anbukaruppusamy S, "Video surveillance system against antiterrorism by Using Adaptive Linear Activity Classification (ALAC) Technique," Journal of Medical Systems, 43(8), 256, 2019.   DOI
19 S. Sudhakaran and O. Lanz, "Learning to detect violent videos using convolutional long shortterm memory," in Proc. of 2017 14th IEEE Int. Conf. Adv. Video Signal Based Surveillance AVSS, 2017.
20 S. Chaudhary M. A. Khan and C. Bhatnagar, "Multiple anomalous activity detection in videos," Procedia Comput. Sci., vol. 125, pp. 336-345, Jan. 2018.   DOI
21 J. Hu, Z. Zhang, Y. Zhao, "Identification of bamboo chip defects based on transfer learning," Journal of Northwestern Forest College, vol. 36(5), pp. 190-196, 2021.
22 N. J. Hussein and F. Hu, "An alternative method to discover concealed weapon detection using critical fusion image of color image and infrared image," in Proc. of 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI), pp. 378-383, 2016.
23 M. Al-Nawashi O. M. Al-Hazaimeh and M. Saraee, "A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments," Neural Comput. Appl., vol. 28, no. 1, pp. 565-572, Dec. 2017.
24 Huang Chao, Yi Ping, "Research and implementation of content detection systems for videophobias," Communication technology, 51(01), 75-81, 2018.
25 Z. Guo F. Wu H. Chen J. Yuan and C. Cai, "Pedestrian violence detection based on optical flow energy characteristics," in Proc. of 2017 4th Int. Conf. Syst. Informatics ICSAI 2017, pp. 1261-1265, 2017.
26 M. Ahmed, M. Ramzan, H. U. Khan, S. Iqbal, M. A. Khan et al., "Real-time violent action recognition using key frames extraction and deep learning," Computers, Materials & Continua, vol. 69, no. 2, pp. 2217-2230, 2021.   DOI
27 P. Yun J. Jiao and M. L. B, "Trajectory-Pooled Deep Convolutional Networks for Violence Detection in Videos," in Proc. of ICVS 2017 Computer Vision Systems, pp 437-447, 2017.
28 F. U. M. Ullah A. Ullah K. Muhammad I. U. Haq and S. W. Baik, "Violence detection using spatiotemporal features with 3D convolutional neural network," Sensors, vol. 19, no. 11, pp. 1-15, 2019.   DOI
29 A. B. Mabrouk and E. Zagrouba, "Abnormal behavior recognition for intelligent video surveillance systems: A review," Expert Syst. Appl., vol. 91, pp. 480-491, Jan. 2018.   DOI
30 E. Y. Fu M. X. Huang H. Va Leong and G. Ngai, "Cross-species learning: A low-cost approach to learning human fight from animal fight," in Proc. of 26th ACM Int. Conf. Multimedia, pp. 320-327, Oct. 2018.
31 Y. Zhang, L. Zhu, Yu, "Overview of attention mechanisms in convolutional neural networks," Computer Engineering and Applications, pp. 64-72, 2021.
32 P. Siva and N. Nandhagopal, "Classification similarity network model for image fusion using ResNet50 and googlenet," Intelligent Automation & Soft Computing, vol. 31, no. 3, pp. 1331-1344, 2022.   DOI
33 L. Sun, Y.L. Wang, Z.G. Qu, N.N. Xiong, "BeatClass: A Sustainable ECG Classification System in IoT-based eHealth," IEEE Internet of Things Journal, vol. 9, no. 10, pp. 7178-7195, 2022.   DOI
34 Yifei Wei, F. Richard Yu, Mei Song, Zhu Han, "User Scheduling and Resource Allocation in HetNets with Hybrid Energy Supply: An Actor-Critic Reinforcement Learning Approach," IEEE Transactions on Wireless communications, vol. 17, no. 1, pp. 680-692, Jan. 2018.   DOI