Author Guidelines
Publications
Editorial
About
Current Issue – Vol.5, Issue.3 (July-September 2025)
LBW Dismissal Umpire Decision Prediction CAPTCHA using Backwards Induction & Rational Game Theory (Umpire’s Call CAPTCHA)
Abstract
A CAPTCHA (Completely Automated Public Turing test to Tell Computers and Humans Apart) should be as convenient as easy for human and almost impossible for bots. User should not be irritated by solving AI problems; it must be very easy going with fun. Proposed system is able to serve hard AI problem that can be easily solved by human but almost impossible for bots. This system is based on umpire’s call where user is to take decision as a cricket umpire whether batsman is out or not. It has been reviewed that cricket LBW trajectory can only be more precise with hawk eye cameras that mount over the roof of cricket stadium. Even hawk eye trajectory cannot be applied in image processing if a normal camera’s coordinates have been captured. It can be done at real time when co-ordinates have been attained from hawk eye and projected at that time. Cricket ball trajectory requires ball speed, angle, position and path; that can only possible with high speed camera. A normal camera is not able to identify the speed of the ball and some co-ordinates also.
Key-Words / Index Term: CAPTCHA, Web Security, DRS, Cricket, LBW, Hawk eye, Camera, Game Theory.
References
- “Wikipedia: Leg Before Wicket”, 18 Nov. 2020. Accessed on: Sep. 23, 2024. [Online]. Available: https://en.wikipedia.org/wiki/Leg_before_wicket
- “The Guardian: Support the Guardian”, 26 Aug. 2019. Accessed on: Sep. 23, 2024. [Online]. Available: https://www.theguardian.com/sport/2019/aug/26/ben-stokes-england-ashes-australia-drs-asterisk
- “Independent: LBW was conceived in a different era of cricket's history - it's time to modernise this outdated law”, 04 Dec. 2017. Accessed on: Sep. 23, 2024. [Online]. Available: https://www.independent.co.uk/sport/cricket/ashes/ashes-england-australia-lbw-written-different-era-sport-time-a8091631.html
- “Advice Faculty: What is Leg Before Wicket (LBW) OUT in Cricket | Learn & Remember | Fully Explained-VERY EASY”, 05 Aug. 2019. Accessed on: Sep. 23, 2024. [Online]. Available: https://www.youtube.com/watch?v=9Ojvx2ia82A
- “Vics rue no-ball non-call as NSW strike”, May 2018. Accessed on: Sep. 23, 2024. [Online]. Available: https://www.cricket.com.au/news/sheffield-shield-final-trent-copeland-no-ball-nsw-blues-victoria-third-umpire-cricket-australia/2019-03-28
- “CAPTCHA: Telling Humans and Computers Apart Automatically”, Accessed on: Dec. 06, 2020. [Online]. Available: http://www.captcha.net/
- “Imperva: CAPTCHA”, Accessed on: Sep. 23, 2024. [Online]. Available: https://www.imperva.com/learn/application-security/what-is-captcha/
- “Manage Engine: Did you know: How to configure Audio CAPTCHA?”, Accessed on: Sep. 23, 2024. [Online]. Available: https://www.manageengine.com/products/self-service-password/kb/adselfservice-plus-audio-captcha-configuration.html
- “Engadget: PlayThru hopes to kill text captchas with game-based authentication”, 03 May 2012. Accessed on: Sep. 25, 2024. [Online]. Available: https://www.engadget.com/2012-05-03-playthru-hopes-to-kill-text-captchas.html
- “Jquery script: Minimal Math Captcha Plugin For jQuery - Captcha Basic”, 25 May 2017. Accessed on: Sep. 25, 2024. [Online]. Available: https://www.jqueryscript.net/form/Basic-Math-Captcha-Plugin.html
- T. Zhang, H. Zheng and L. Zhang, "Verification CAPTCHA Based on Deep Learning," 2018 37th Chinese Control Conference (CCC), Wuhan, 2018, pp. 9056-9060, doi: 10.23919/ChiCC.2018.8482847.
- H. Wang, F. Zheng, Z. Chen, Y. Lu, J. Gao and R. Wei, "A Captcha Design Based on Visual Reasoning," 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, 2018, pp. 1967-1971, doi: 10.1109/ICASSP.2018.8461764.
- J. A. and M. T. M., "Hardware-Independent Authentication Scheme Using Intelligent Captcha Technique," 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 2019, pp. 1-7, doi: 10.1109/ICECCT.2019.8869353.
- Y. Hu, L. Chen and J. Cheng, "A CAPTCHA recognition technology based on deep learning," 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA), Wuhan, 2018, pp. 617-620, doi: 10.1109/ICIEA.2018.8397789.
- S. Ezhilarasi and P. U. Maheswari, "Image Recognition and Annotation based Decision Making of CAPTCHAs for Human Interpretation," 2020 International Conference on Innovative Trends in Information Technology (ICITIIT), Kottayam, India, 2020, pp. 1-6, doi: 10.1109/ICITIIT49094.2020.9071558.
- S. Usuzaki et al., "Interactive Video CAPTCHA for Better Resistance to Automated Attack," 2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU), Auckland, New Zealand, 2018, pp. 1-2, doi: 10.23919/ICMU.2018.8653624.
- M. Shah and K. Harras, "Hitting Three Birds with One System: A Voice-Based CAPTCHA for the Modern User," 2018 IEEE International Conference on Web Services (ICWS), San Francisco, CA, 2018, pp. 257-264, doi: 10.1109/ICWS.2018.00040.
- Z. Cheng, H. Gao, Z. Liu, H. Wu, Y. Zi and G. Pei, "Image-based CAPTCHAs based on neural style transfer," IET Information Security, vol. 13, no. 6, pp. 519-529, Nov. 2019, doi: 10.1049/iet-ifs.2018.5036.
- Aldwairi, Monther; Mohammed, Suaad; Padmanabhan, Megana Lakshmi (2020). "Efficient and secure flash-based gaming CAPTCHA," Journal of Parallel and Distributed Computing, 142, 27–35.
- Jamie Plenderleith, "Physics Based CAPTCHA," United States Patent US 2017/0262623 A1, United States Patent and Trademark Office, 14 Sept. 2017.
- “Cricket Digest: Do we need umpire's call in LBW DRS? Sachin Tendulkar's opinion | Cricket”, 16 July 2020. Accessed on: Sep. 25, 2024. [Online]. Available: https://www.youtube.com/watch?v=A3Q-2WaSdLk
- “Wikipedia: Hawk Eye”, 21 Oct. 2020. Accessed on: Sep. 25, 2024. [Online]. Available: https://en.wikipedia.org/wiki/Hawk-Eye
- “Wikipedia: Game Theory”, 02 Dec. 2020. Accessed on: Sep. 25, 2024. [Online]. Available: https://en.wikipedia.org/wiki/Game_theory
- “Tynan Sylvester: Decision-based Gameplay Design”, Accessed on: Sep. 25, 2024. [Online]. Available: https://www.gamasutra.com/view/feature/2264/decisionbased_gameplay_design.php?print=1
- “Mdasid: Gardenscapes False Advertising”, 30 April 2020. Accessed on: Sep. 25, 2024. [Online]. Available: https://www.gamasutra.com/view/feature/2264/decisionbased_gameplay_design.php?print=1
- “Wikipedia: Backward Induction”, 05 Dec. 2020. Accessed on: Sep. 25, 2024. [Online]. Available: https://en.wikipedia.org/wiki/Backward_induction
- P. Kirkbride, M. A. Akber Dewan and F. Lin, "Game-Like Captchas for Intrusion Detection," 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing (DASC), Calgary, Canada, 2020, pp. 312-315, doi: 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00061.
- V. Deshmukh, S. Deshmukh, S. Deosatwar, R. Sarda and L. Kulkarni, "Versatile CAPTCHA Generation Using Machine Learning and Image Processing," 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 2020, pp. 385-389, doi: 10.1109/ICCCA49541.2020.9250830.
- E. Ababtain and D. Engels, "Security of Gestures Based CAPTCHAs," 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 2019, pp. 120-126, doi: 10.1109/CSCI49370.2019.00027.
- M. Wang, Y. Yang, M. Zhu and J. Liu, "CAPTCHA Identification Based on Convolution Neural Network," 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Xi'an, 2018, pp. 364-368, doi: 10.1109/IMCEC.2018.8469705.
- Y. S. Aljarbou, "Improving of Current CAPTCHA Systems," 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 2019, pp. 1-6, doi: 10.1109/CAIS.2019.8769466.
- Z. Fan, "Anti-cracking Technology for Captcha Recognition," 2018 14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), Huangshan, China, 2018, pp. 1032-1035, doi: 10.1109/FSKD.2018.8686977.
- Z. Li and Q. Liao, "CAPTCHA: Machine or Human Solvers? A Game-Theoretical Analysis," 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), Shanghai, 2018, pp. 18-23, doi: 10.1109/CSCloud/EdgeCom.2018.00013.
- T. Kansuwan and T. Chomsiri, "Authentication Model using the Bundled CAPTCHA OTP Instead of Traditional Password," 2019 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT-NCON), Nan, Thailand, 2019, pp. 5-8, doi: 10.1109/ECTI-NCON.2019.8692255.
- H. Yu, S. Xiao, Z. Yu, Y. Li and Y. Zhang, "ImCAPTCHA: Imperceptible CAPTCHA Based on Cursor Trajectories," IEEE Consumer Electronics Magazine, vol. 9, no. 1, pp. 74-82, Jan. 2020, doi: 10.1109/MCE.2019.2936631.
- M. Tang, H. Gao, Y. Zhang, Y. Liu, P. Zhang and P. Wang, "Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha," IEEE Transactions on Information Forensics and Security, vol. 13, no. 10, pp. 2522-2537, Oct. 2018, doi: 10.1109/TIFS.2018.2821096.
Citation
Arun Pratap Singh, "LBW Dismissal Umpire Decision Prediction CAPTCHA using Backwards Induction & Rational Game Theory (Umpire’s Call CAPTCHA)" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.3, pp.1-08, 2025.
Cricket Ball Trajectory Projection for DRS using Deep Learning
Abstract
Cricket has evolved into a technology-driven sport where decision accuracy plays a pivotal role in maintaining fairness and transparency. One of the most critical aspects of Decision Review System (DRS) is predicting the cricket ball’s trajectory after impact with the pad, which assists in adjudicating Leg Before Wicket (LBW) decisions. Traditional ball-tracking systems such as Hawk-Eye rely on multi-camera setups and physics-based models, which, while accurate, are expensive and prone to occasional errors due to occlusions, shadows, and complex bounce conditions. With advancements in deep learning and computer vision, it is now possible to develop a data-driven approach that learns ball dynamics directly from large datasets of match footage. In this work, we propose a deep learning–based cricket ball trajectory projection model that combines convolutional neural networks (CNNs) for spatial tracking, recurrent neural networks (RNNs/LSTMs) for temporal sequence modeling, and physics-informed loss functions for realistic trajectory prediction. The proposed method aims to provide a robust, cost-effective, and highly accurate alternative to traditional ball-tracking technologies for cricket DRS applications.
Key-Words / Index Term: Cricket, Decision Review System (DRS), Ball Trajectory, Deep Learning, Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), Computer Vision, Sports Analytics.
References
- J. P. Hailman, Coding and Redundancy: Man-Made and Animal-Evolved Signals. Cambridge, MA, USA: Harvard Univ. Press, 2008.
- J. Kou, “Estimating the number of clusters via the GUD statistic,” J. Comput. Graph. Statist., vol. 23, no. 2, pp. 403–417, Jun. 2014, doi: 10.1080/10618600.2013.778778.
- B. Fung, “Amazon offers concessions to resolve EU antitrust probes,” CNN.com. [Online]. Available: https://edition.cnn.com/2022/07/14/tech/amazon-concessions-eu-antitrust/index.html. [Accessed: Jul. 18, 2022].
- D. Caratelli, M. C. Viganó, G. Toso, and P. Angeletti, “Analytical placement technique for sparse arrays,” presented at the 32nd ESA Antenna Workshop, Noordwijk, The Netherlands, Oct. 5–8, 2010.
- J. G. Kreifeldt, “An analysis of surface-detected EMG as an amplitude-modulated noise,” presented at the 1989 Int. Conf. Med. Biol. Eng., Chicago, IL, USA, Nov. 9–12, 1989.
- G. W. Juette and L. E. Zeffanella, “Radio noise currents on short sections on bundle conductors,” presented at the IEEE Summer Power Meeting, Dallas, TX, USA, Jun. 22–27, 1990, Paper 90 SM 690-0 PWRS.
- J. Arrillaga and B. Giessner, “Limitation of short-circuit levels by means of HVDC links,” presented at the IEEE Summer Power Meeting, Los Angeles, CA, USA, Jul. 12–17, 1990, Paper 70 CP 637.
- A. Amador-Perez and R. A. Rodriguez-Solis, “Analysis of a CPW-fed annular slot ring antenna using DOE,” in Proc. IEEE Antennas Propag. Soc. Int. Symp., Jul. 2006, pp. 4301–4304.
- G. R. Faulhaber, “Design of service systems with priority reservation,” in Conf. Rec. 1995 IEEE Int. Conf. Commun., pp. 3–8.
- S. P. Bingulac, “On the compatibility of adaptive controllers,” in Proc. 4th Annu. Allerton Conf. Circuit Syst. Theory, New York, NY, USA, 1994, pp. 8–16.
- W. D. Doyle, “Magnetization reversal in films with biaxial anisotropy,” in 1987 Proc. INTERMAG Conf., pp. 2.2-1–2.2-6.
- C. T. Meadow and D. W. Waugh, “Computer assisted interrogation,” in 1991 Fall Joint Comput. Conf., Proc. AFIPS Conf., vol. 29, Washington, DC, USA: Spartan, 1991, pp. 381–394.
- P. C. Parks, “Lyapunov redesign of model reference adaptive control systems,” in 1993 Joint Automatic Control Conf., Preprints, pp. 485–491.
- T. S. Hsia, “System identification,” in IEDM Tech. Dig., 1993, vol. 2, no. 8, pp. 6–13.
- J. Yanamadala et al., “Segmentation of the visible human project (VHP) female cryosection images within MATLAB environment,” in Proc. 23rd Int. Meshing Roundtable, London, U.K., Oct. 2014. [Online]. Available: https://feup.libguides.com/ieee/comunicacoes
- Argosy University Online, “Information literacy and communication,” 2012. [Online]. Available: http://www.myeclassonline.com
- F. Vatta, A. Soranzo, and F. Babich, “More accurate analysis of sum-product decoding of LDPC codes using a Gaussian approximation,” IEEE Commun. Lett., early access, Dec. 11, 2018, doi: 10.1109/LCOMM.2018.2886261.
- E. P. Wigner, “On a modification of the Rayleigh–Schrodinger perturbation theory,” (in German), Math. THz Sci. Technol., to be published, doi: 10.1109/TTHZ.2016.2544142.
- J. Smith, T. Jones, and B. Simpson, Eds., “IEEE Biometrics Compendium Issue 30 December 2017,” in IEEE Biometrics Compendium, Dec. 2017. [Online]. Available: http://ieeexplore.ieee.org/virtual-journals/biocomp/issue/30/
- T. Robertson, Ed., “RFIC Virtual Journal–Issue 6,” in IEEE RFIC Virtual Journal, Oct. 2014. [Online]. Available: http://ieeexplore.ieee.org/virtual-journals/rfic/issue/6/
- “RFID Virtual Journal–Issue 10,” in IEEE RFID Virtual Journal, Nov. 2015. [Online]. Available: http://ieeexplore.ieee.org/virtual-journals/rfid/issue/10/
- E. E. Reber, R. L. Michell, and C. J. Carter, “Oxygen absorption in the Earth’s atmosphere,” Aerospace Corp., Los Angeles, CA, USA, Tech. Rep. TR-0200 (4230-46)-3, Nov. 1988.
- J. H. Davis and J. R. Cogdell, “Calibration program for the 16-foot antenna,” Elect. Eng. Res. Lab., Univ. Texas, Austin, Tech. Memo. NGL-006-69-3, Nov. 15, 1987.
- R. E. Haskell and C. T. Case, “Transient signal propagation in lossless isotropic plasmas,” USAF Cambridge Res. Labs., Cambridge, MA, USA, Rep. ARCRL-66-234 (II), 1994, vol. 2.
- M. A. Brusberg and E. N. Clark, “Installation, operation, and data evaluation of an oblique-incidence ionosphere sounder system,” in “Radio Propagation Characteristics of the Washington-Honolulu Path,” Stanford Res. Inst., Stanford, CA, USA, Contract NOBSR-87615, Final Rep., Feb. 1995, vol. 1.
- P. Diament, S. L. Richert, and W. L. Lupatkin, “V-line surface-wave radiation and scanning,” Dept. Elect. Eng., Columbia Univ., New York, NY, USA, Sci. Rep. 85, Aug. 1991.
Citation
Arun Pratap Singh, Sanjay Kumar Sharma, "Cricket Ball Trajectory Projection for DRS using Deep Learning" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.3, pp.09-15, 2025.
Intelligent Watermarking for Image Copyright Protection using Machine Learning Techniques
Abstract
The rapid growth of digital media distribution has raised critical concerns about copyright protection. Unauthorized use, duplication, and manipulation of images threaten intellectual property rights, making watermarking a crucial security mechanism. Traditional watermarking methods often face challenges such as vulnerability to attacks, loss of image quality, and limited robustness. This paper proposes a machine learning–based intelligent watermarking framework to embed secret watermarks within digital images for copyright protection. The proposed approach leverages deep learning for feature extraction, adaptive embedding, and robust detection of watermarks under various distortions. Experimental results demonstrate that machine learning–driven watermarking enhances imperceptibility, robustness, and security compared to conventional approaches, providing a reliable mechanism for copyright enforcement in digital media.
Key-Words / Index Term: Watermarking, Copyright Protection, Machine Learning, Deep Learning, Digital Security, Image Processing.
References
- M. Kutter and F. A. P. Petitcolas, “Fair evaluation methods for image watermarking systems,” Journal of Electronic Imaging, vol. 9, no. 4, pp. 445–456, 1999.
- N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, no. 3, pp. 385–403, 1998.
- I. J. Cox, M. L. Miller, and J. A. Bloom, “Digital watermarking,” Journal of Electronic Imaging, vol. 9, no. 4, pp. 451–459, 2000.
- C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. M. Liao, “Cocktail watermarking for digital image protection,” IEEE Transactions on Multimedia, vol. 2, no. 4, pp. 209–224, 2000.
- R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, 2002.
- M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 783–791, 2001.
- X. Kang, J. Huang, Y. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 776–786, 2003.
- A. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, pp. 385–403, 1998.
- Y. Wang and P. Moulin, “Optimized feature extraction for image watermark verification,” IEEE Transactions on Image Processing, vol. 13, no. 2, pp. 158–170, 2004.
- J. Hernández, F. Pérez-González, J. Rodríguez, and G. García, “Performance analysis of a 2-D-MASK watermarking scheme for still images,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 510–524, 1998.
- S. Mun, S. Lee, M. Park, and N. I. Cho, “A robust blind watermarking using convolutional neural networks,” arXiv preprint arXiv:1704.03248, 2017.
- J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, “HiDDeN: Hiding data with deep networks,” Advances in Neural Information Processing Systems (NeurIPS), vol. 31, 2018.
- M. Tancik, B. Mildenhall, and R. Ng, “StegaStamp: Invisible hyperlinks in physical photographs,” in Proc. IEEE/CVF Conf. Computer Vision and Pattern Recognition (CVPR), 2020, pp. 2117–2126.
- J. Hayes and G. Danezis, “Generating steganographic images via adversarial training,” Advances in Neural Information Processing Systems (NeurIPS), vol. 30, 2017.
- D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1167–1180, 1999.
- Y. Zhang, Z. Zheng, and J. Ma, “Blockchain-based secure data sharing system for multimedia healthcare data,” Information Sciences, vol. 495, pp. 219–232, 2019.
- K. H. Rhee, J. Kwak, S. Choi, and D. Won, “Challenges and research directions on secure watermarking for medical images,” Proc. IEEE EMBC, pp. 1103–1106, 2010.
- Z. Zhao, Z. Liu, and F. Wang, “Digital watermarking for copyright protection using blockchain technology,” IEEE Access, vol. 8, pp. 6754–6761, 2020.
- A. Singh and R. S. Chadha, “A survey of digital watermarking techniques, applications and attacks,” International Journal of Engineering and Innovative Technology, vol. 2, no. 9, pp. 165–175, 2013.
- M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press, 2004.
- F. Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques. CRC Press, 2017.
- H. Zhou, J. Ni, and Y. Q. Shi, “Security analysis of robust image watermarking based on perceptual hashing,” IEEE Transactions on Image Processing, vol. 26, no. 5, pp. 2510–2523, 2017.
- J. Fridrich, “Robust bit extraction from images,” Proc. IEEE International Conference on Multimedia Computing and Systems, vol. 2, pp. 536–540, 1999.
- A. Piva, “An overview on image forensics,” ISRN Signal Processing, vol. 2013, pp. 1–22, 2013.
- J. R. Hernández, M. Amado, and F. Pérez-González, “DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure,” IEEE Transactions on Image Processing, vol. 9, no. 1, pp. 55–68, 2000.
- G. Griffin, A. Holub, and P. Perona, “Caltech-256 object category dataset,” Caltech Technical Report, 2007.
- Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: From error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004.
Citation
Sachin Soni, A.P. Singh, "Intelligent Watermarking for Image Copyright Protection using Machine Learning Techniques" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.3, pp.16-22, 2025.
Deep Learning-Based Suicide Bomber and Weapon Detection in Thermal Imaging for Enhanced Security Surveillance
Abstract
The increasing threat of terrorism and armed attacks in public spaces necessitates advanced automated surveillance systems. Traditional visual spectrum cameras often fail under low-light or night-time conditions, making thermal imaging a promising alternative for detecting concealed weapons and potential suicide bombers. This research proposes a deep learning-based framework for real-time detection of suicide bombers and weapons using thermal imagery. The approach leverages convolutional neural networks (CNNs) and transfer learning to extract discriminative features from thermal images, enabling accurate identification under diverse environmental conditions. Experimental results demonstrate high detection accuracy, robustness to occlusion and variable poses, and real-time applicability. This study highlights the potential of thermal imaging combined with deep learning to enhance public security and preemptively mitigate threats.
Key-Words / Index Term: Suicide Bomber Detection, Weapon Detection, Thermal Imaging, Deep Learning, Convolutional Neural Networks (CNN), Object Detection, Surveillance Systems, Real-Time Threat Detection, Security Monitoring, Transfer Learning.
References
- M. Kutter and F. A. P. Petitcolas, “Fair evaluation methods for image watermarking systems,” Journal of Electronic Imaging, vol. 9, no. 4, pp. 445–456, 1999.
- N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, no. 3, pp. 385–403, 1998.
- I. J. Cox, M. L. Miller, and J. A. Bloom, “Digital watermarking,” Journal of Electronic Imaging, vol. 9, no. 4, pp. 451–459, 2000.
- C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. M. Liao, “Cocktail watermarking for digital image protection,” IEEE Transactions on Multimedia, vol. 2, no. 4, pp. 209–224, 2000.
- R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, 2002.
- M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 783–791, 2001.
- X. Kang, J. Huang, Y. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 776–786, 2003.
- A. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, pp. 385–403, 1998.
- Y. Wang and P. Moulin, “Optimized feature extraction for image watermark verification,” IEEE Transactions on Image Processing, vol. 13, no. 2, pp. 158–170, 2004.
- J. Hernández, F. Pérez-González, J. Rodríguez, and G. García, “Performance analysis of a 2-D-MASK watermarking scheme for still images,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 510–524, 1998.
- S. Mun, S. Lee, M. Park, and N. I. Cho, “A robust blind watermarking using convolutional neural networks,” arXiv preprint arXiv:1704.03248, 2017.
- J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, “HiDDeN: Hiding data with deep networks,” Advances in Neural Information Processing Systems (NeurIPS), vol. 31, 2018.
- M. Tancik, B. Mildenhall, and R. Ng, “StegaStamp: Invisible hyperlinks in physical photographs,” in Proc. IEEE/CVF Conf. Computer Vision and Pattern Recognition (CVPR), 2020, pp. 2117–2126.
- J. Hayes and G. Danezis, “Generating steganographic images via adversarial training,” Advances in Neural Information Processing Systems (NeurIPS), vol. 30, 2017.
- D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1167–1180, 1999.
- Y. Zhang, Z. Zheng, and J. Ma, “Blockchain-based secure data sharing system for multimedia healthcare data,” Information Sciences, vol. 495, pp. 219–232, 2019.
- K. H. Rhee, J. Kwak, S. Choi, and D. Won, “Challenges and research directions on secure watermarking for medical images,” Proc. IEEE EMBC, pp. 1103–1106, 2010.
- Z. Zhao, Z. Liu, and F. Wang, “Digital watermarking for copyright protection using blockchain technology,” IEEE Access, vol. 8, pp. 6754–6761, 2020.
- A. Singh and R. S. Chadha, “A survey of digital watermarking techniques, applications and attacks,” International Journal of Engineering and Innovative Technology, vol. 2, no. 9, pp. 165–175, 2013.
- M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press, 2004.
- F. Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques. CRC Press, 2017.
- H. Zhou, J. Ni, and Y. Q. Shi, “Security analysis of robust image watermarking based on perceptual hashing,” IEEE Transactions on Image Processing, vol. 26, no. 5, pp. 2510–2523, 2017.
- J. Fridrich, “Robust bit extraction from images,” Proc. IEEE International Conference on Multimedia Computing and Systems, vol. 2, pp. 536–540, 1999.
- A. Piva, “An overview on image forensics,” ISRN Signal Processing, vol. 2013, pp. 1–22, 2013.
- J. R. Hernández, M. Amado, and F. Pérez-González, “DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure,” IEEE Transactions on Image Processing, vol. 9, no. 1, pp. 55–68, 2000.
- G. Griffin, A. Holub, and P. Perona, “Caltech-256 object category dataset,” Caltech Technical Report, 2007.
- Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: From error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004.
- Muñoz, J. D., “Concealed Weapon Detection Using Thermal Cameras,” Journal of Security Technology, 2025.
- Alrammahi, A. A. H., “Suspicious People Detection and Tracking in Thermal Imagery,” International Journal of Computer Vision, 2025.
- Shah, I. A., Jhanjhi, N. Z., & Ujjan, R. M. A., “Weapon Detection Using Computer Vision and Edge Computing,” Engineering Proceedings, 2024.
- Shanthi, P., “Weapon Detection with FMR-CNN and YOLOv8 for Enhanced Surveillance,” Scientific Reports, 2025.
- Niranjana, J., “AI-Powered Weapon Detection with Deep Learning,” Advances in Computer Science, 2025.
- Redmon, J. et al., “You Only Look Once: Unified, Real-Time Object Detection,” CVPR, 2016.
- Ren, S., He, K., Girshick, R., & Sun, J., “Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks,” IEEE TPAMI, 2017.
- Simonyan, K., & Zisserman, A., “Very Deep Convolutional Networks for Large-Scale Image Recognition,” arXiv preprint, 2014.
- Howard, A. et al., “MobileNetV3: Efficient CNN for Mobile and Edge Devices,” CVPR, 2019.
- He, K., Zhang, X., Ren, S., & Sun, J., “Deep Residual Learning for Image Recognition,” CVPR, 2016.
- Everingham, M., Van Gool, L., Williams, C. K. I., Winn, J., & Zisserman, A., “The Pascal Visual Object Classes (VOC) Challenge,” IJCV, 2010.
- Lin, T.-Y. et al., “Microsoft COCO: Common Objects in Context,” ECCV, 2014.
- Wang, Y., & Yang, X., “Real-Time Threat Detection Using CNNs in Security Systems,” Journal of Applied AI, 2024.
- Zhou, H., Ni, J., & Shi, Y. Q., “Challenges in Concealed Object Detection Using Thermal Imaging,” IEEE Transactions on Image Processing, 2017.
- Tancik, M., Mildenhall, B., & Ng, R., “StegaStamp: Invisible Hyperlinks in Physical Photographs,” CVPR, 2020.
- J. Hayes and G. Danezis, “Generating steganographic images via adversarial training,” NeurIPS, 2017.
- Cox, I. J., Miller, M. L., & Bloom, J. A., “Digital Watermarking,” Journal of Electronic Imaging, 2000.
- Muñoz, J. D., “Thermal Image-Based Threat Detection for Public Safety,” Security Technology Review, 2024.
- Alrammahi, A. A. H., “Deep Learning Approaches for Occlusion-Robust Weapon Detection in Thermal Imagery,” IEEE Access, 2025.
- Shanthi, P., “Multi-Scale CNN Detection of Concealed Weapons in Thermal Images,” Scientific Reports, 2025.
- Wang, Y., & Yang, X., “Real-Time Edge Deployment of CNNs for Security Monitoring,” Journal of Applied AI, 2024.
- Redmon, J. et al., “YOLOv3: An Incremental Improvement,” arXiv preprint, 2018.
- Liu, W. et al., “SSD: Single Shot MultiBox Detector,” ECCV, 2016.
- Niranjana, J., “Transfer Learning-Based Thermal Weapon Detection Using CNNs,” Advances in Computer Science, 2025.
Citation
Utkarsh Dubey, "Deep Learning-Based Suicide Bomber and Weapon Detection in Thermal Imaging for Enhanced Security Surveillance" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.3, pp.23-28, 2025.
