Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches

Document Type : Original Article

Authors

Assistant Professor, Department of Artificial Intelligence and Robotics, Faculty of Electrical and Computer Engineering, Malek Ashtar University of Technology, Tehran, Iran

Abstract

Detection of dangerous objects in images obtained by X-ray scanners in security inspections has played an important role in protecting the public space from security threats such as terrorism and the occurrence of dangerous crimes. Perform diagnostic operations by an expert despite the remarkable features of the human sensory and visual systems; Due to being exhausting, non-stop, excessive dependence on human error, etc., it has low operational value. One suitable solution for similar situations is to use car vision systems. In this study, we intend to first examine the hazardous object in the x-ray images in the SIX-ray database in a training phase with hard segmentation, and by extracting the properties of these objects by the SURF algorithm, which is capable of extracting properties even in complex conditions. It is confusing to create a database of properties of objects in different dimensions and angles. Then, in the detection phase, the experimental image first goes through a soft segmentation step, and then the image properties are extracted by the SURF algorithm. The extracted properties are matched with the properties of the object in the training database, and then the probability of the object being present, which is the ratio of the number of matching properties of the object to the total number of properties in the object, is calculated for each case. be. After finding the most likely valid matches, the M-estimator sample consensus algorithm (MSAC) removes the incorrect matching properties that originated from the image background. Finally, a two-dimensional transfer (Affine transformation) is obtained between the pairs of matching points of each valid state with the input image, and with the help of this transfer and dimensionality, a square is drawn around the object and the location of the object is identified. The following is a complete description of the training and diagnosis phase and the results of SIX-ray data.

Keywords


Smiley face

[1] S. M. Kharashadizadeh,V. Azadzadeh, & A. M. Latif, "Detection of digital images containing nudity using neural networks and support vector machines," Electronic and Cyber Defense, vol. 4, no. 4, pp. 79-88, 2017.(In Persian)
[2] H. Muslimi, A. Abbaspour Kazeruni, & A. Rabbani Nejad, "Identification from the Veins of the Back of the Hand in Infrared Images Using SVM Classification," Electronic and Cyber Defense, vol. 5, no. 3, pp. 27-38, 2017. (In Persian)
[3] R. Gesick, C. Saritac, & C.C. Hung, "Automatic image analysis process for the detection of concealed weapons," in Proceedings of the 5th annual workshop on cyber security and information intelligence research: cyber security and information intelligence challenges and strategies, pp. 1-4, 2009.
[4] J. Chan, A. Omar, J. P. O. Evans, D. Downes, X. Wang, & Y. Liu, "Feasibility of SIFT to synthesise KDEX imagery for aviation luggage security screening," in 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP 2009), pp. 1-6, IET, 2009.
[5] V. Riffo & D. Mery, "Automated detection of threat objects using adapted implicit shape model," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 46, no. 4, pp. 472-482, 2015.
[6] D. Mery, V. Riffo, I. Zuccar, & C. Pieringer, "Automated X-ray object recognition using an efficient search algorithm in multiple views," in Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp. 368-374, 2013.
[7] D. Mery, "Inspection of complex objects using multiple-X-ray views," IEEE/ASME Transactions on Mechatronics, vol. 20, no. 1, pp. 338-347, 2014.
[8] V. Riffo & D. Mery, "Active X-ray testing of complex objects," Insight-Non-Destructive Testing and Condition Monitoring, vol. 54, no. 1, pp. 28-35, 2012.
[9] D. Mery, E. Svec, M. Arias, V. Riffo, J. M. Saavedra, & S. Banerjee, "Modern computer vision techniques for x-ray testing in baggage inspection," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 47, no. 4, pp. 682-692, 2016.
[10] D. Mery & A. K. Katsaggelos, "A logarithmic X-ray imaging model for baggage inspection: Simulation and object detection," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 57-65, 2017.
[11] D. Mery & A. K. Katsaggelos. "GDXray: The database of X-ray images for nondestructive testing," Journal of Nondestructive Evaluation, vol. 34, no. 4, pp. 1-12, 2015.
[12] C. Miao. "Sixray: A large-scale security inspection x-ray benchmark for prohibited item discovery in overlapping images," in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 2119-2118, 2019.
[13] H. Bay, A. Ess, T. Tuytelaars, & L. Van Gool, "Speeded-up robust features (SURF)," Computer vision and image understanding, vol. 110, no. 3, pp. 346-359, 2008.
[14] D. G. Lowe, "Distinctive image features from scale-invariant keypoints," International journal of computer vision, vol. 60, no. 2, pp. 91-110, 2004.
[15] M. A. Fischler & R. C. Bolles, "Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography," Communications of the ACM, vol. 24, no. 6, pp. 381-395, 1981.
  • Receive Date: 21 February 2022
  • Revise Date: 27 April 2022
  • Accept Date: 09 August 2022
  • Publish Date: 21 January 2023