Current Issue – Vol.5, Issue.3 (Jul-Sep 2025)

Current Issue – Vol.5, Issue.3 (July-September 2025)


LBW Dismissal Umpire Decision Prediction CAPTCHA using Backwards Induction & Rational Game Theory (Umpire’s Call CAPTCHA)

Arun Pratap Singh

Research Paper | Journal Paper

Vol.5, Issue.3, pp.1-08, Sep-2025

Abstract

A CAPTCHA (Completely Automated Public Turing test to Tell Computers and Humans Apart) should be as convenient as easy for human and almost impossible for bots. User should not be irritated by solving AI problems; it must be very easy going with fun. Proposed system is able to serve hard AI problem that can be easily solved by human but almost impossible for bots. This system is based on umpire’s call where user is to take decision as a cricket umpire whether batsman is out or not. It has been reviewed that cricket LBW trajectory can only be more precise with hawk eye cameras that mount over the roof of cricket stadium. Even hawk eye trajectory cannot be applied in image processing if a normal camera’s coordinates have been captured. It can be done at real time when co-ordinates have been attained from hawk eye and projected at that time. Cricket ball trajectory requires ball speed, angle, position and path; that can only possible with high speed camera. A normal camera is not able to identify the speed of the ball and some co-ordinates also.

Key-Words / Index Term: CAPTCHA, Web Security, DRS, Cricket, LBW, Hawk eye, Camera, Game Theory.

References

Citation

Arun Pratap Singh, "LBW Dismissal Umpire Decision Prediction CAPTCHA using Backwards Induction & Rational Game Theory (Umpire’s Call CAPTCHA)" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.3, pp.1-08, 2025.

Cricket Ball Trajectory Projection for DRS using Deep Learning

Arun Pratap Singh, Sanjay Kumar Sharma

Research Paper | Journal Paper

Vol.5, Issue.3, pp.09-15, Sep-2025

Abstract

Cricket has evolved into a technology-driven sport where decision accuracy plays a pivotal role in maintaining fairness and transparency. One of the most critical aspects of Decision Review System (DRS) is predicting the cricket ball’s trajectory after impact with the pad, which assists in adjudicating Leg Before Wicket (LBW) decisions. Traditional ball-tracking systems such as Hawk-Eye rely on multi-camera setups and physics-based models, which, while accurate, are expensive and prone to occasional errors due to occlusions, shadows, and complex bounce conditions. With advancements in deep learning and computer vision, it is now possible to develop a data-driven approach that learns ball dynamics directly from large datasets of match footage. In this work, we propose a deep learning–based cricket ball trajectory projection model that combines convolutional neural networks (CNNs) for spatial tracking, recurrent neural networks (RNNs/LSTMs) for temporal sequence modeling, and physics-informed loss functions for realistic trajectory prediction. The proposed method aims to provide a robust, cost-effective, and highly accurate alternative to traditional ball-tracking technologies for cricket DRS applications.

Key-Words / Index Term: Cricket, Decision Review System (DRS), Ball Trajectory, Deep Learning, Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), Computer Vision, Sports Analytics.

References

      1. J. P. Hailman, Coding and Redundancy: Man-Made and Animal-Evolved Signals. Cambridge, MA, USA: Harvard Univ. Press, 2008.
      2. J. Kou, “Estimating the number of clusters via the GUD statistic,” J. Comput. Graph. Statist., vol. 23, no. 2, pp. 403–417, Jun. 2014, doi: 10.1080/10618600.2013.778778.
      3. B. Fung, “Amazon offers concessions to resolve EU antitrust probes,” CNN.com. [Online]. Available: https://edition.cnn.com/2022/07/14/tech/amazon-concessions-eu-antitrust/index.html. [Accessed: Jul. 18, 2022].
      4. D. Caratelli, M. C. Viganó, G. Toso, and P. Angeletti, “Analytical placement technique for sparse arrays,” presented at the 32nd ESA Antenna Workshop, Noordwijk, The Netherlands, Oct. 5–8, 2010.
      5. J. G. Kreifeldt, “An analysis of surface-detected EMG as an amplitude-modulated noise,” presented at the 1989 Int. Conf. Med. Biol. Eng., Chicago, IL, USA, Nov. 9–12, 1989.
      6. G. W. Juette and L. E. Zeffanella, “Radio noise currents on short sections on bundle conductors,” presented at the IEEE Summer Power Meeting, Dallas, TX, USA, Jun. 22–27, 1990, Paper 90 SM 690-0 PWRS.
      7. J. Arrillaga and B. Giessner, “Limitation of short-circuit levels by means of HVDC links,” presented at the IEEE Summer Power Meeting, Los Angeles, CA, USA, Jul. 12–17, 1990, Paper 70 CP 637.
      8. A. Amador-Perez and R. A. Rodriguez-Solis, “Analysis of a CPW-fed annular slot ring antenna using DOE,” in Proc. IEEE Antennas Propag. Soc. Int. Symp., Jul. 2006, pp. 4301–4304.
      9. G. R. Faulhaber, “Design of service systems with priority reservation,” in Conf. Rec. 1995 IEEE Int. Conf. Commun., pp. 3–8.
      10. S. P. Bingulac, “On the compatibility of adaptive controllers,” in Proc. 4th Annu. Allerton Conf. Circuit Syst. Theory, New York, NY, USA, 1994, pp. 8–16.
      11. W. D. Doyle, “Magnetization reversal in films with biaxial anisotropy,” in 1987 Proc. INTERMAG Conf., pp. 2.2-1–2.2-6.
      12. C. T. Meadow and D. W. Waugh, “Computer assisted interrogation,” in 1991 Fall Joint Comput. Conf., Proc. AFIPS Conf., vol. 29, Washington, DC, USA: Spartan, 1991, pp. 381–394.
      13. P. C. Parks, “Lyapunov redesign of model reference adaptive control systems,” in 1993 Joint Automatic Control Conf., Preprints, pp. 485–491.
      14. T. S. Hsia, “System identification,” in IEDM Tech. Dig., 1993, vol. 2, no. 8, pp. 6–13.
      15. J. Yanamadala et al., “Segmentation of the visible human project (VHP) female cryosection images within MATLAB environment,” in Proc. 23rd Int. Meshing Roundtable, London, U.K., Oct. 2014. [Online]. Available: https://feup.libguides.com/ieee/comunicacoes
      16. Argosy University Online, “Information literacy and communication,” 2012. [Online]. Available: http://www.myeclassonline.com
      17. F. Vatta, A. Soranzo, and F. Babich, “More accurate analysis of sum-product decoding of LDPC codes using a Gaussian approximation,” IEEE Commun. Lett., early access, Dec. 11, 2018, doi: 10.1109/LCOMM.2018.2886261.
      18. E. P. Wigner, “On a modification of the Rayleigh–Schrodinger perturbation theory,” (in German), Math. THz Sci. Technol., to be published, doi: 10.1109/TTHZ.2016.2544142.
      19. J. Smith, T. Jones, and B. Simpson, Eds., “IEEE Biometrics Compendium Issue 30 December 2017,” in IEEE Biometrics Compendium, Dec. 2017. [Online]. Available: http://ieeexplore.ieee.org/virtual-journals/biocomp/issue/30/
      20. T. Robertson, Ed., “RFIC Virtual Journal–Issue 6,” in IEEE RFIC Virtual Journal, Oct. 2014. [Online]. Available: http://ieeexplore.ieee.org/virtual-journals/rfic/issue/6/
      21. “RFID Virtual Journal–Issue 10,” in IEEE RFID Virtual Journal, Nov. 2015. [Online]. Available: http://ieeexplore.ieee.org/virtual-journals/rfid/issue/10/
      22. E. E. Reber, R. L. Michell, and C. J. Carter, “Oxygen absorption in the Earth’s atmosphere,” Aerospace Corp., Los Angeles, CA, USA, Tech. Rep. TR-0200 (4230-46)-3, Nov. 1988.
      23. J. H. Davis and J. R. Cogdell, “Calibration program for the 16-foot antenna,” Elect. Eng. Res. Lab., Univ. Texas, Austin, Tech. Memo. NGL-006-69-3, Nov. 15, 1987.
      24. R. E. Haskell and C. T. Case, “Transient signal propagation in lossless isotropic plasmas,” USAF Cambridge Res. Labs., Cambridge, MA, USA, Rep. ARCRL-66-234 (II), 1994, vol. 2.
      25. M. A. Brusberg and E. N. Clark, “Installation, operation, and data evaluation of an oblique-incidence ionosphere sounder system,” in “Radio Propagation Characteristics of the Washington-Honolulu Path,” Stanford Res. Inst., Stanford, CA, USA, Contract NOBSR-87615, Final Rep., Feb. 1995, vol. 1.
      26. P. Diament, S. L. Richert, and W. L. Lupatkin, “V-line surface-wave radiation and scanning,” Dept. Elect. Eng., Columbia Univ., New York, NY, USA, Sci. Rep. 85, Aug. 1991.

Citation

Arun Pratap Singh, Sanjay Kumar Sharma, "Cricket Ball Trajectory Projection for DRS using Deep Learning" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.3, pp.09-15, 2025.

Intelligent Watermarking for Image Copyright Protection using Machine Learning Techniques

Sachin Soni, A.P. Singh

Research Paper | Journal Paper

Vol.5, Issue.3, pp.16-22, Sep-2025

Abstract

The rapid growth of digital media distribution has raised critical concerns about copyright protection. Unauthorized use, duplication, and manipulation of images threaten intellectual property rights, making watermarking a crucial security mechanism. Traditional watermarking methods often face challenges such as vulnerability to attacks, loss of image quality, and limited robustness. This paper proposes a machine learning–based intelligent watermarking framework to embed secret watermarks within digital images for copyright protection. The proposed approach leverages deep learning for feature extraction, adaptive embedding, and robust detection of watermarks under various distortions. Experimental results demonstrate that machine learning–driven watermarking enhances imperceptibility, robustness, and security compared to conventional approaches, providing a reliable mechanism for copyright enforcement in digital media.

Key-Words / Index Term: Watermarking, Copyright Protection, Machine Learning, Deep Learning, Digital Security, Image Processing.

References

    1. M. Kutter and F. A. P. Petitcolas, “Fair evaluation methods for image watermarking systems,” Journal of Electronic Imaging, vol. 9, no. 4, pp. 445–456, 1999.
    2. N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, no. 3, pp. 385–403, 1998.
    3. I. J. Cox, M. L. Miller, and J. A. Bloom, “Digital watermarking,” Journal of Electronic Imaging, vol. 9, no. 4, pp. 451–459, 2000.
    4. C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. M. Liao, “Cocktail watermarking for digital image protection,” IEEE Transactions on Multimedia, vol. 2, no. 4, pp. 209–224, 2000.
    5. R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, 2002.
    6. M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 783–791, 2001.
    7. X. Kang, J. Huang, Y. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 776–786, 2003.
    8. A. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, pp. 385–403, 1998.
    9. Y. Wang and P. Moulin, “Optimized feature extraction for image watermark verification,” IEEE Transactions on Image Processing, vol. 13, no. 2, pp. 158–170, 2004.
    10. J. Hernández, F. Pérez-González, J. Rodríguez, and G. García, “Performance analysis of a 2-D-MASK watermarking scheme for still images,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 510–524, 1998.
    11. S. Mun, S. Lee, M. Park, and N. I. Cho, “A robust blind watermarking using convolutional neural networks,” arXiv preprint arXiv:1704.03248, 2017.
    12. J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, “HiDDeN: Hiding data with deep networks,” Advances in Neural Information Processing Systems (NeurIPS), vol. 31, 2018.
    13. M. Tancik, B. Mildenhall, and R. Ng, “StegaStamp: Invisible hyperlinks in physical photographs,” in Proc. IEEE/CVF Conf. Computer Vision and Pattern Recognition (CVPR), 2020, pp. 2117–2126.
    14. J. Hayes and G. Danezis, “Generating steganographic images via adversarial training,” Advances in Neural Information Processing Systems (NeurIPS), vol. 30, 2017.
    15. D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1167–1180, 1999.
    16. Y. Zhang, Z. Zheng, and J. Ma, “Blockchain-based secure data sharing system for multimedia healthcare data,” Information Sciences, vol. 495, pp. 219–232, 2019.
    17. K. H. Rhee, J. Kwak, S. Choi, and D. Won, “Challenges and research directions on secure watermarking for medical images,” Proc. IEEE EMBC, pp. 1103–1106, 2010.
    18. Z. Zhao, Z. Liu, and F. Wang, “Digital watermarking for copyright protection using blockchain technology,” IEEE Access, vol. 8, pp. 6754–6761, 2020.
    19. A. Singh and R. S. Chadha, “A survey of digital watermarking techniques, applications and attacks,” International Journal of Engineering and Innovative Technology, vol. 2, no. 9, pp. 165–175, 2013.
    20. M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press, 2004.
    21. F. Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques. CRC Press, 2017.
    22. H. Zhou, J. Ni, and Y. Q. Shi, “Security analysis of robust image watermarking based on perceptual hashing,” IEEE Transactions on Image Processing, vol. 26, no. 5, pp. 2510–2523, 2017.
    23. J. Fridrich, “Robust bit extraction from images,” Proc. IEEE International Conference on Multimedia Computing and Systems, vol. 2, pp. 536–540, 1999.
    24. A. Piva, “An overview on image forensics,” ISRN Signal Processing, vol. 2013, pp. 1–22, 2013.
    25. J. R. Hernández, M. Amado, and F. Pérez-González, “DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure,” IEEE Transactions on Image Processing, vol. 9, no. 1, pp. 55–68, 2000.
    26. G. Griffin, A. Holub, and P. Perona, “Caltech-256 object category dataset,” Caltech Technical Report, 2007.
    27. Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: From error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004.

Citation

Sachin Soni, A.P. Singh, "Intelligent Watermarking for Image Copyright Protection using Machine Learning Techniques" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.3, pp.16-22, 2025.

Deep Learning-Based Suicide Bomber and Weapon Detection in Thermal Imaging for Enhanced Security Surveillance

Utkarsh Dubey

Research Paper | Journal Paper

Vol.5, Issue.3, pp.23-28, Sept-2025

Abstract

The increasing threat of terrorism and armed attacks in public spaces necessitates advanced automated surveillance systems. Traditional visual spectrum cameras often fail under low-light or night-time conditions, making thermal imaging a promising alternative for detecting concealed weapons and potential suicide bombers. This research proposes a deep learning-based framework for real-time detection of suicide bombers and weapons using thermal imagery. The approach leverages convolutional neural networks (CNNs) and transfer learning to extract discriminative features from thermal images, enabling accurate identification under diverse environmental conditions. Experimental results demonstrate high detection accuracy, robustness to occlusion and variable poses, and real-time applicability. This study highlights the potential of thermal imaging combined with deep learning to enhance public security and preemptively mitigate threats.

Key-Words / Index Term: Suicide Bomber Detection, Weapon Detection, Thermal Imaging, Deep Learning, Convolutional Neural Networks (CNN), Object Detection, Surveillance Systems, Real-Time Threat Detection, Security Monitoring, Transfer Learning.

References

    1. M. Kutter and F. A. P. Petitcolas, “Fair evaluation methods for image watermarking systems,” Journal of Electronic Imaging, vol. 9, no. 4, pp. 445–456, 1999.
    2. N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, no. 3, pp. 385–403, 1998.
    3. I. J. Cox, M. L. Miller, and J. A. Bloom, “Digital watermarking,” Journal of Electronic Imaging, vol. 9, no. 4, pp. 451–459, 2000.
    4. C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. M. Liao, “Cocktail watermarking for digital image protection,” IEEE Transactions on Multimedia, vol. 2, no. 4, pp. 209–224, 2000.
    5. R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, 2002.
    6. M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 783–791, 2001.
    7. X. Kang, J. Huang, Y. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 776–786, 2003.
    8. A. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, pp. 385–403, 1998.
    9. Y. Wang and P. Moulin, “Optimized feature extraction for image watermark verification,” IEEE Transactions on Image Processing, vol. 13, no. 2, pp. 158–170, 2004.
    10. J. Hernández, F. Pérez-González, J. Rodríguez, and G. García, “Performance analysis of a 2-D-MASK watermarking scheme for still images,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 510–524, 1998.
    11. S. Mun, S. Lee, M. Park, and N. I. Cho, “A robust blind watermarking using convolutional neural networks,” arXiv preprint arXiv:1704.03248, 2017.
    12. J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, “HiDDeN: Hiding data with deep networks,” Advances in Neural Information Processing Systems (NeurIPS), vol. 31, 2018.
    13. M. Tancik, B. Mildenhall, and R. Ng, “StegaStamp: Invisible hyperlinks in physical photographs,” in Proc. IEEE/CVF Conf. Computer Vision and Pattern Recognition (CVPR), 2020, pp. 2117–2126.
    14. J. Hayes and G. Danezis, “Generating steganographic images via adversarial training,” Advances in Neural Information Processing Systems (NeurIPS), vol. 30, 2017.
    15. D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1167–1180, 1999.
    16. Y. Zhang, Z. Zheng, and J. Ma, “Blockchain-based secure data sharing system for multimedia healthcare data,” Information Sciences, vol. 495, pp. 219–232, 2019.
    17. K. H. Rhee, J. Kwak, S. Choi, and D. Won, “Challenges and research directions on secure watermarking for medical images,” Proc. IEEE EMBC, pp. 1103–1106, 2010.
    18. Z. Zhao, Z. Liu, and F. Wang, “Digital watermarking for copyright protection using blockchain technology,” IEEE Access, vol. 8, pp. 6754–6761, 2020.
    19. A. Singh and R. S. Chadha, “A survey of digital watermarking techniques, applications and attacks,” International Journal of Engineering and Innovative Technology, vol. 2, no. 9, pp. 165–175, 2013.
    20. M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press, 2004.
    21. F. Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques. CRC Press, 2017.
    22. H. Zhou, J. Ni, and Y. Q. Shi, “Security analysis of robust image watermarking based on perceptual hashing,” IEEE Transactions on Image Processing, vol. 26, no. 5, pp. 2510–2523, 2017.
    23. J. Fridrich, “Robust bit extraction from images,” Proc. IEEE International Conference on Multimedia Computing and Systems, vol. 2, pp. 536–540, 1999.
    24. A. Piva, “An overview on image forensics,” ISRN Signal Processing, vol. 2013, pp. 1–22, 2013.
    25. J. R. Hernández, M. Amado, and F. Pérez-González, “DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure,” IEEE Transactions on Image Processing, vol. 9, no. 1, pp. 55–68, 2000.
    26. G. Griffin, A. Holub, and P. Perona, “Caltech-256 object category dataset,” Caltech Technical Report, 2007.
    27. Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: From error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004.
    28. Muñoz, J. D., “Concealed Weapon Detection Using Thermal Cameras,” Journal of Security Technology, 2025.
    29. Alrammahi, A. A. H., “Suspicious People Detection and Tracking in Thermal Imagery,” International Journal of Computer Vision, 2025.
    30. Shah, I. A., Jhanjhi, N. Z., & Ujjan, R. M. A., “Weapon Detection Using Computer Vision and Edge Computing,” Engineering Proceedings, 2024.
    31. Shanthi, P., “Weapon Detection with FMR-CNN and YOLOv8 for Enhanced Surveillance,” Scientific Reports, 2025.
    32. Niranjana, J., “AI-Powered Weapon Detection with Deep Learning,” Advances in Computer Science, 2025.
    33. Redmon, J. et al., “You Only Look Once: Unified, Real-Time Object Detection,” CVPR, 2016.
    34. Ren, S., He, K., Girshick, R., & Sun, J., “Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks,” IEEE TPAMI, 2017.
    35. Simonyan, K., & Zisserman, A., “Very Deep Convolutional Networks for Large-Scale Image Recognition,” arXiv preprint, 2014.
    36. Howard, A. et al., “MobileNetV3: Efficient CNN for Mobile and Edge Devices,” CVPR, 2019.
    37. He, K., Zhang, X., Ren, S., & Sun, J., “Deep Residual Learning for Image Recognition,” CVPR, 2016.
    38. Everingham, M., Van Gool, L., Williams, C. K. I., Winn, J., & Zisserman, A., “The Pascal Visual Object Classes (VOC) Challenge,” IJCV, 2010.
    39. Lin, T.-Y. et al., “Microsoft COCO: Common Objects in Context,” ECCV, 2014.
    40. Wang, Y., & Yang, X., “Real-Time Threat Detection Using CNNs in Security Systems,” Journal of Applied AI, 2024.
    41. Zhou, H., Ni, J., & Shi, Y. Q., “Challenges in Concealed Object Detection Using Thermal Imaging,” IEEE Transactions on Image Processing, 2017.
    42. Tancik, M., Mildenhall, B., & Ng, R., “StegaStamp: Invisible Hyperlinks in Physical Photographs,” CVPR, 2020.
    43. J. Hayes and G. Danezis, “Generating steganographic images via adversarial training,” NeurIPS, 2017.
    44. Cox, I. J., Miller, M. L., & Bloom, J. A., “Digital Watermarking,” Journal of Electronic Imaging, 2000.
    45. Muñoz, J. D., “Thermal Image-Based Threat Detection for Public Safety,” Security Technology Review, 2024.
    46. Alrammahi, A. A. H., “Deep Learning Approaches for Occlusion-Robust Weapon Detection in Thermal Imagery,” IEEE Access, 2025.
    47. Shanthi, P., “Multi-Scale CNN Detection of Concealed Weapons in Thermal Images,” Scientific Reports, 2025.
    48. Wang, Y., & Yang, X., “Real-Time Edge Deployment of CNNs for Security Monitoring,” Journal of Applied AI, 2024.
    49. Redmon, J. et al., “YOLOv3: An Incremental Improvement,” arXiv preprint, 2018.
    50. Liu, W. et al., “SSD: Single Shot MultiBox Detector,” ECCV, 2016.
    51. Niranjana, J., “Transfer Learning-Based Thermal Weapon Detection Using CNNs,” Advances in Computer Science, 2025.

Citation

Utkarsh Dubey, "Deep Learning-Based Suicide Bomber and Weapon Detection in Thermal Imaging for Enhanced Security Surveillance" International Journal of Scientific Research in Technology & Management, Vol.5, Issue.3, pp.23-28, 2025.