powerfully changing in accordance with arising
gambles. By coordinating constant cautions utilizing
APIs like Twilio for moment warnings, these
frameworks typify a proactive way to deal with
security, guaranteeing opportune reactions and better
asset the executives.
2 RELATED WORKS
C. H. Espino-Salinas et al., 2024 An original
methodology integrating constant facial recognition
into existing thief location frameworks has been
proposed to upgrade observation and thief
counteraction in unique conditions. M. H. Siddiqi et
al., 2024; Venkatesan et al,. 2007 This approach
coordinates face recognition Accuracy boundaries,
live video handling, and SMS ready frameworks to
further develop reaction times and by and large
framework productivity. Y. Yuan et al., 2025
Recreation results demonstrate a 95% consolidated
discovery precision and a 30% decrease in
identification reaction time contrasted with customary
observation frameworks. K. Yan et al., 2024 As
security worries in metropolitan and high-risk regions
increment, the interest for ongoing and adaptable thief
identification arrangements becomes basic. R. Luo et
al., 2024; Dharanya, C.et al, 2024 To fulfil these
needs, late examination has investigated multi-
modular frameworks coordinating face recognition,
social examination, and article location, as well as the
utilization of brain network-based models like CNNs
for further developed Accuracy. C.-B. Yao and C.-T.
Lu, 2024 Besides, a refined strategy using Haar
Cascade Classifiers joined with Single Shot Detector
(SSD) calculations has shown eminent upgrades in
face identification power, considerably under testing
conditions like unfortunate lighting or impediments,
while keeping up with low computations above. X.
Cao et al., True testing of frameworks consolidating
dynamic updates to criminal data sets and live
cautions has shown a 15% improvement accordingly
viability. J. Al-Nabulsi et al., 2023; M. Venkatesan, et
al, 2009 The issues with get-together multi-camera
arrangements, bringing down misleading benefits in
troublesome circumstances, and expanding precision
in various lighting situations continue in spite of these
new turns of events. To close these holes and assure a
proactive and reliable reaction for public security
applications, the proposed structure mixes Twilio-
pulled in prompted frameworks, CNN-based
coordinate extraction, and SQLite-stays mindful of as
far as possible.
From the previous findings, it can be deduced that
the detection accuracy and response time of the system
compared to traditional systems such as the Haar
Cascade and Single Shot Detector (SSD)-based
systems are not up to par. The system needs to reduce
latency and enhance accuracy in an effective crime
detection system. A comparative study of a CNN-
based crime detection system with respect to Haar
Cascade and Single Shot Detector (SSD)-based
approaches aimed at improving detection accuracy
and efficiency is undertaken here.
3 MATERIALS AND METHODS
Q. Jia et al., 2024 Evaluations were done inside the
Network Lab at KSR Institute for Engineering and
Technology to test the developed CNN-based system
designed for crime detection using an established
computational set. A. M. Sheneamer et al., 2024; G.
Moheshkumar et al, 2024 The source data for this
exercise was extracted from kaggle.com facial images
of recorded crime perpetrators along with detailed
crime narratives and respective meta-data that served
to mimic as closely as possible real-time conditions
for the investigation of a detected crime. The
experimental design was divided into two groups.
Group 1 used the YOLOv3 algorithm with about
2,000 images as testing input. The performance
parameters for this group included a detection speed
of 6.5 FPS and an accuracy level of 86 %. Group 2
used the proposed CNN-based system, with 2,140
images as testing input. This system had achieved a
detection rate of 0.80 – 0.90 seconds per sample and
got an accuracy of 96 %. Such improvement in terms
of speed and accuracy was noted when compared to
YOLOv3. The system had been tested running with an
Intel i7 8th Gen processor and 16 GB of RAM with
pure Python-based tools and libraries. The library of
Python utilized was face recognition for the encoding
of the facial images. Video processing was handled
with OpenCV. The crucial parameters of the
experimental setup consisted of detection accuracy,
response time. This framework was based on CNN
and presented increased reliability when subjected to
tough conditions such as low light, occlusions, and
low-resolution inputs. It thus proved to be a good
robust and dynamic solution for real-time crime
detection. The system had been tested running with an
Intel i7 8th Gen processor and 16 GB of RAM with
pure Python-based tools and libraries. The library of
Python utilized was face recognition for the encoding
of the facial images. Video processing was handled