Begal-Detector: A Real-Time Street Crime Detection Framework Combining Human Activity Recognition and Object Detection on Raspberry Pi

Pulung Hendro Prastyo (1), Ismi Batari Agung (2), Ahmad Fadahil Ikram (3), Muhammad Herlan Pratama (4), Nia Mandasari (5)
(1) a:1:{s:5:"en_US";s:31:"Politeknik Negeri Ujung Pandang";}
(2) Department of Informatics and Computer Engineering, Politeknik Negeri Ujung Pandang
(3) Department of Informatics and Computer Engineering, Politeknik Negeri Ujung Pandang
(4) Department of Informatics and Computer Engineering, Politeknik Negeri Ujung Pandang
(5) Department of Informatics and Computer Engineering, Politeknik Negeri Ujung Pandang
Fulltext View | Download
How to cite (JITCE) :
Prastyo, P. H., Agung, I. B., Ikram, A. F., Pratama, M. H., & Mandasari, N. (2025). Begal-Detector: A Real-Time Street Crime Detection Framework Combining Human Activity Recognition and Object Detection on Raspberry Pi. JITCE (Journal of Information Technology and Computer Engineering), 9(2), 40–50. Retrieved from https://jitce.fti.unand.ac.id/index.php/JITCE/article/view/350

Currently, street crime remains a serious challenge in Indonesia, while conventional CCTV systems still function passively as recorders. One of the most concerning types of crime is robbery with violence, commonly known in Indonesia as begal, which remains among the most frequently reported cases. This study proposes the Begal-Detector, a YOLOv8-based system that integrates Human Activity Recognition (HAR) and Object Detection to identify suspicious activities in real time on edge devices. The experiments were conducted on Raspberry Pi 4, Raspberry Pi 5, and Raspberry Pi 5 with Hailo AI Kit, with variations in distance, camera angle, and lighting conditions. The test dataset consisted of 72 video samples, including both street crime and non-street crime scenarios, recorded using the EZVIZ H8C Outdoor CCTV camera. Experimental results show that the Begal-Detector performs very well, achieving a 100% detection accuracy at a distance of 2 meters, 94% at 3 meters, and 94% at a 45° camera angle. Under low-light conditions supported by infrared light, the system maintained an accuracy of up to 79%, making it feasible for real-world deployment. In terms of hardware performance, the Raspberry Pi 5 with Hailo AI Kit provided the most optimal results, achieving an average of 52.71 FPS with a stable temperature of 63 °C, significantly outperforming the Raspberry Pi 4 and Raspberry Pi 5 without an accelerator, both of which failed to operate the system in real time. The findings confirm that utilizing Raspberry Pi 5 with Hailo AI Kit is an effective solution to ensure that the Begal-Detector operates quickly, stably, and reliably.

[1] bps, “Statistik Kriminal 2024,” https://www.bps.go.id/. Accessed: Aug. 17, 2025. [Online]. Available: https://www.bps.go.id/id/publication/2024/12/12/13317138a55b2f7096589536/statistik-kriminal-2024.html

[2] pusiknas, “Tiap Bulan, Lebih 400 Kasus Curas Ditangani Polri,” https://pusiknas.polri.go.id/. Accessed: Aug. 15, 2025. [Online]. Available: https://pusiknas.polri.go.id/detail_artikel/tiap_bulan,_lebih_400_kasus_curas_ditangani_polri

[3] Human Kemenko Polkam RI, “Pemerintah Perkuat Sinkronisasi Nasional,” https://polkam.go.id/. Accessed: Aug. 15, 2025. [Online]. Available: https://polkam.go.id/kejahatan-meningkat-penyelesaian-menurun-pemerintah-perkuat-sinkronisasi-nasional/

[4] Z. Hasan, D. A. AS, A. Febriyanti, and S. Mariska, “Kriminalitas Pencurian Sepedah Motor Di Desa Gandri Kecamatan Penengahan Kabupaten Lampung Selatan,” Jurnal Rectum, vol. 5, no. 3, pp. 245–252, Sep. 2023, doi: 10.46930/jurnalrectum.v5i3.3501.

[5] M. R. N. Tjaya, M. R. Permana, and M. J. Prasetiyo, “Penegakan Hukum Terhadap Tindak Pidana Pencurian Kendaraan Bermotor Dengan Kekerasan,” Jurnal Kewarganegaraan, vol. 8, no. 1, pp. 324–330, 2024, [Online]. Available: http://repository.uir.ac.id/id/eprint/10028

[6] A. Meirza and N. R. Puteri, “Implementasi Metode YOLOV5 dan Tesseract OCR untuk Deteksi Plat Nomor Kendaraan,” Jurnal Ilmu Komputer dan Desain Komunikasi Visual, vol. 9, no. 1, 2024.

[7] M. A. Meidyan and W. Yustanti, “Implementasi Metode You Only Look Once (Yolov5) dalam Deteksi Pelanggaran Helm,” Journal of Emerging Information Systems and Business Intelligence, vol. 5, pp. 214–222, 2024.

[8] A. Muhammad, A. Alfajra, D. Syauqy, and G. E. Setyawan, “Perancangan Wearable Vest Pendeteksi Jatuh Lansia Berbasis Esp-32 dan Sensor Mpu9250 Menggunakan Algoritma Support Vector Machine,” vol. 1, no. 1, pp. 1–9, 2024.

[9] I. C. Pradana, E. Mulyanto, and R. F. Rachmadi, “Deteksi Senjata Genggam Menggunakan Faster R-CNN Inception V2,” Jurnal Teknik ITS, vol. 11, no. 2, 2022, doi: 10.12962/j23373539.v11i2.86587.

[10] A. N. Aziz, atul Khoiriyah, F. Abdillah, and I. Gede Wiryawan, “Prototipe Sederhana Sistem Deteksi Kriminal Berbasis Internet Of Things Menggunakan Teknologi YOLOv5,” Jurnal Sistem Komputer, vol. 13, no. 1, pp. 140–147, May 2024, doi: 10.34010/komputika.v13i1.12217.

[11] H. Feng, G. Mu, S. Zhong, P. Zhang, and T. Yuan, “Benchmark Analysis of YOLO Performance on Edge Intelligence Devices,” Cryptography, vol. 6, no. 2, Jun. 2022, doi: 10.3390/cryptography6020016.

[12] E. Humes, M. Navardi, and T. Mohsenin, “Squeezed Edge YOLO: Onboard Object Detection on Edge Devices,” Dec. 2023. Available: http://arxiv.org/abs/2312.11716

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

1. License

Creative Commons License

 

The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

2. Author(s)’ Warranties

The author(s) warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary permissions to quote from other sources have been obtained by the author(s).

3. User Rights

JITCE adopts the spirit of open access and open science, which disseminates articles published as free as possible under the Creative Commons license. JITCE permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and JITCE on distributing works in the journal.

4. Rights of Authors

Authors retain the following rights:

  • Copyright, and other proprietary rights relating to the article, such as patent rights,
  • the right to use the substance of the article in future own works, including lectures and books,
  • the right to reproduce the article for own purposes, 
  • the right to self-archive the article.
  • the right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Journal of Information Technology and Computer Engineering).

5. Co-Authorship

If the article was jointly prepared by other authors; upon submitting the article, the author is agreed on this form and warrants that he/she has been authorized by all co-authors on their behalf, and agrees to inform his/her co-authors. JITCE will be freed on any disputes that will occur regarding this issue. 

7. Royalties

By submitting the articles, the authors agreed that no fees are payable from JITCE.

 

8. Miscellaneous

JITCE will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed and JITCE or its sublicensee has become obligated to have the article published. JITCE may adjust the article to a style of punctuation, spelling, capitalization, referencing and usage that it deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers. 

Downloads

Download data is not yet available.