Vision-attribute-based X-ray security inspection contraband identification method

A recognition method, X-ray technology, applied in the field of computer vision, can solve problems such as slow speed, decreased concentration, and difficulty in realization

Active Publication Date: 2019-07-16
TONGJI UNIV
View PDF8 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has obvious disadvantages: 1. The staff will inevitably experience fatigue when performing object recognition for a long time, resulting in a decrease in concentration
This will have a certain impact on the monitoring results, reduce the identification rate of contraband, and give criminals an opportunity
2. The speed of staff's visual recognition is relatively slow, resulting in low efficiency of security inspection
3. The staff responsible for the security inspection and monitoring work need to undergo long-term training before taking up the job, which will consume a lot of manpower and material resources
However, the whole method needs to be based on a large number of physical conditions, such as nuclear density meters, spectral analyzers, etc., and the training process is complicated. When the category increases, the entire classifier needs to be retrained and the model modified. This method of individually training classifiers for each category is used in practice. difficult to achieve in the process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vision-attribute-based X-ray security inspection contraband identification method
  • Vision-attribute-based X-ray security inspection contraband identification method
  • Vision-attribute-based X-ray security inspection contraband identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0073] In order to make the object, technical scheme and advantages of the present invention clearer, below in conjunction with embodiment, specifically as figure 1 The shown algorithm flow chart further describes the present invention in detail. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0074] Step 1: Collect target samples and make a data set. The specific description is as follows: the collected X-ray security images are divided into high-energy images and low-energy images. The present invention uses these two types of images to generate a new image as a training data set , the specific implementation is as follows:

[0075] (1) The present invention creates a new image layer, and each pixel of the image layer is calculated and offset by the high-energy map and the low-energy map, and its definition is as follows:

[0076]

[0077] Among them, w, h repr...

specific Embodiment approach

[0120] figure 1 It is the realization flowchart of the present invention, and the specific implementation mode is as follows:

[0121] 1. Preprocess the original image of X-ray security inspection to obtain a new 16-bit color image based on visual-attribute as a data set;

[0122] 2. Input the training set image into the darknet-53 network for feature extraction to obtain the feature layer;

[0123] 3. Input the feature layer into the yolo layer for candidate frame parameter extraction

[0124] 4. Send the candidate frame parameters to the loss calculation layer, and use the gradient descent algorithm to backpropagate to optimize the network parameters

[0125] 5. Input the test set image into the trained model for testing

[0126] 6. Calculate the model mAP value according to the test results and evaluate the model performance

[0127] figure 2 : The embodiment synthesizes 16 three-channel images (grayscale display)

[0128] image 3 : Output image of contraband detec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of computer vision, and particularly relates to a vision-attribute-based X-ray security inspection contraband identification method by adopting a deep learning framework. The method comprises the following steps: 1) training samples are collected and labeled, original single-channel 16-bit high and low energy X-ray grayscale image are acquired, and through vision-attribute-based preprocessing, 16-bit three-channel color images are obtained as a data set for model training and testing; 2) the images in the training set are inputted to a network for training: adarknet network is used to extract features from the input image, a feature map is outputted, and a yolo layer is adopted to perform boundary frame prediction on the feature map at multiple scales, and after training, the model supports identification on already-labeled 12 categories of contrabands; and 3) images in a test set are inputted to the model for testing, identification results are outputted, the labeled contrabands are displayed on the input image, and according to IoU and R-P curves, mAP is calculated and obtained. Compared with the prior art, the method has the advantages of highaccuracy, high intelligence, high compatibility and the like.

Description

technical field [0001] The invention relates to the field of computer vision, in particular to a vision-attribute-based X-ray security inspection contraband identification method. Background technique [0002] In public places with a large flow of people, there are dense and complicated people, and criminals often carry knives, guns, bombs and other prohibited items to commit crimes. In order to avoid heavy casualties and property losses, these public places will be equipped with security inspection systems, the most common of which is the X-ray security inspection system. [0003] For the luggage image generated by the X-ray security inspection system, most of the monitoring methods now use manual identification, and rely on the staff to identify and locate the contraband in the luggage with the naked eye. However, this method has obvious disadvantages: 1. The staff will inevitably experience fatigue when performing object recognition for a long time, resulting in a decrea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01V5/00G01N23/04
CPCG01N23/04G01N2223/03G01N2223/1016G01N2223/401G01V5/0016
Inventor 赵才荣陈康傅佳悦
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products