CN116824185A - Security check image processing method and system - Google Patents

Security check image processing method and system Download PDF

Info

Publication number
CN116824185A
CN116824185A CN202311029514.5A CN202311029514A CN116824185A CN 116824185 A CN116824185 A CN 116824185A CN 202311029514 A CN202311029514 A CN 202311029514A CN 116824185 A CN116824185 A CN 116824185A
Authority
CN
China
Prior art keywords
security inspection
security
image
queue
images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311029514.5A
Other languages
Chinese (zh)
Inventor
廖育华
王强
刘晶晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nuctech Co Ltd
Original Assignee
Nuctech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nuctech Co Ltd filed Critical Nuctech Co Ltd
Priority to CN202311029514.5A priority Critical patent/CN116824185A/en
Publication of CN116824185A publication Critical patent/CN116824185A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/10Segmentation; Edge detection
    • G06T7/136Segmentation; Edge detection involving thresholding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/10Image acquisition modality
    • G06T2207/10116X-ray image

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Artificial Intelligence (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Image Processing (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The disclosure relates to a security inspection image processing method and system. The security inspection image processing method comprises the following steps: responding to a synchronizing instruction, triggering the synchronizing operation of a face list number queue corresponding to a preset number of packages and a security check image queue of the preset number of packages, so that the preset number is matched with the number of security check images in the synchronized security check image queue; the synchronizing operation includes: judging: judging whether the number of security check images in the security check image queue is equal to the number of face check numbers in the face check number queue; if the number is equal, the synchronous operation is exited; if the quantity is not equal, respectively carrying out image analysis on the optical images shot when each security inspection image in the security inspection image queue is generated, and determining the quantity of packages in the optical images; and performing segmentation operation or image threshold segmentation operation on the security inspection images with the parcel number more than 1 to obtain a plurality of security inspection images with the parcel number identical, and returning to the judging step.

Description

Security check image processing method and system
The application relates to a method and a system for processing security inspection images, which are divisional patent applications of which the application date is 2018, 12, 24, application number is 201811581337.0 and the application name is security inspection image processing method and system.
Technical Field
The disclosure relates to the field of security inspection, and in particular relates to a security inspection image processing method and system.
Background
In the field of radiation imaging security inspection, binding an image of an X-ray security inspection machine with other information of an article is an important means for realizing traceability of security inspection information. For example, in cargo logistics security inspection, the face sheet number is a unique numerical number that identifies a package. The logistics information of the package can be obtained by inquiring the face number. If the security information of the X-ray security inspection image and the face list number are bound one by one, when dangerous goods are clamped in the package, the security inspector can quickly obtain logistics information through the bound face list number so as to be convenient to dispose and report.
Generally, when a package passes through the security inspection machine, an image is formed, for example, the package object shown in fig. 1 (a) passes through the security inspection machine, and then the security inspection image shown in fig. 1 (b) is formed. In some fields, the package flow is large, and the package enters the security inspection machine almost continuously and uninterruptedly, so that a security inspection image often contains a plurality of packages (see fig. 2). This is typically due to more than two packages being placed at one point in time, or there being a succession of multiple packages overlapping into the tunnel.
In the field of logistics, this situation is more common. When the face list number of the package and the X-ray security inspection image of the package are required to be bound for subsequent retrieval, the problem of unsuccessful retrieval may occur. For example, referring to fig. 3, after the unloading workers scan the face sheets of packages a, B, they are placed on the load transfer track a 1. Because the placement mode is random placement, the situation that a plurality of packages are sequentially overlapped to enter the security inspection machine a2 is likely to be formed in the unloading security inspection process of one carriage, so that the number of security inspection images formed by the security inspection machine a2 is far less than the number of actual packages, and the corresponding security inspection images are difficult to accurately retrieve according to the surface single number, namely the missing inspection phenomenon is caused. This does not conform to the principle of security check per package in the field of logistics.
Disclosure of Invention
In view of the above, the embodiments of the present disclosure provide a security inspection image processing method and system, which can eliminate the missing inspection phenomenon during the face list number search as much as possible.
In one aspect of the present disclosure, there is provided a security inspection image processing method including:
responding to a synchronizing instruction, triggering the synchronizing operation of a face list number queue corresponding to a preset number of packages and a security check image queue of the preset number of packages, so that the preset number is matched with the number of security check images in the synchronized security check image queue;
the synchronizing operation includes:
judging: judging whether the number of security check images in the security check image queue is equal to the number of face check numbers in the face check number queue;
if the number is equal, the synchronous operation is exited;
if the quantity is not equal, respectively carrying out image analysis on the optical images shot when each security inspection image in the security inspection image queue is generated, and determining the quantity of packages in the optical images;
and performing segmentation operation or image threshold segmentation operation on the security inspection images with the parcel number more than 1 to obtain a plurality of security inspection images with the parcel number identical, and returning to the judging step.
In some embodiments, if a part or all of the security inspection images in the security inspection image queue lack corresponding optical images, or the number of packages cannot be obtained through analysis of the optical images, selecting a security inspection image with the largest width in the package transmission direction from the security inspection image queue, segmenting the selected security inspection image along the package transmission direction to obtain at least two segmented security inspection images, and returning to the judging step.
In some embodiments, after the synchronization operation is completed, each face number in the face number queue is in one-to-one correspondence with each security check image in the synchronized security check image queue according to the queue order.
In some embodiments, the security inspection image processing method further includes an operation of retrieving the security inspection image according to the face-sheet number, including:
inquiring a security check image corresponding to the face list number according to the input face list number;
and outputting at least one security check image of which the security check image is positioned before and/or after the security check image in the security check image queue.
In some embodiments, the synchronization instructions are generated automatically from external input based on a control panel or remote control or during package scanning.
In one aspect of the present disclosure, there is provided a security inspection image processing system comprising:
the scanning device is used for scanning the surface unit numbers of at least one package which is ready to enter the security inspection channel respectively to form a surface unit number queue comprising each surface unit number;
the security inspection device is used for scanning at least one package entering the security inspection channel and generating security inspection images so as to form a security inspection image queue comprising the security inspection images; and
and the synchronization device is configured to execute the security inspection image processing method.
In some embodiments, the security inspection image processing system further comprises:
and the optical imaging device is arranged in the security inspection equipment and is used for shooting an optical image of the scanned package when the security inspection image is generated.
In some embodiments, the security inspection image processing system further comprises:
and the synchronous operation switch is arranged on a control panel or a remote controller of the security inspection equipment and is used for sending a synchronous instruction to the synchronous device when being operated.
Therefore, according to the embodiment of the disclosure, when the package is subjected to security inspection, the synchronous operation of the face number queue and the security inspection image queue is performed according to the synchronous instruction, so that the number of the face numbers is matched with the number of the security inspection images, each face number can correspond to a certain security inspection image, and the missing inspection phenomenon when the face number is searched is eliminated as much as possible.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The disclosure may be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings in which:
FIGS. 1 (a) and 1 (b) are, respectively, a physical photograph and a security inspection image of an example of a package;
FIG. 2 is a security image including a plurality of packages;
FIG. 3 is a schematic diagram of a related art logistics security process;
FIG. 4 is a flow diagram of some embodiments of a security inspection image processing method according to the present disclosure;
FIG. 5 is a flow diagram of a synchronization operation in some embodiments of a security inspection image processing method according to the present disclosure;
FIG. 6 is a schematic illustration of the adjustment of a security inspection image sequence implemented in accordance with the synchronization operation in the embodiment of FIG. 5;
FIG. 7 is a flow diagram of a synchronization operation in further embodiments of a security inspection image processing method according to the present disclosure;
FIG. 8 is a schematic illustration of the adjustment of a security inspection image sequence implemented in accordance with the synchronization operation in the embodiment of FIG. 7;
FIG. 9 is a flow diagram of a synchronization operation in further embodiments of a security inspection image processing method according to the present disclosure;
FIG. 10 is a schematic illustration of the adjustment of a security inspection image sequence implemented in accordance with the synchronization operation in the embodiment of FIG. 9;
FIG. 11 is a schematic structural view of some embodiments of a security inspection image processing system according to the present disclosure;
fig. 12 is a schematic structural diagram of some embodiments of a security inspection image processing system according to the present disclosure.
It should be understood that the dimensions of the various elements shown in the figures are not drawn to actual scale. Further, the same or similar reference numerals denote the same or similar members.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. The description of the exemplary embodiments is merely illustrative, and is in no way intended to limit the disclosure, its application, or uses. The present disclosure may be embodied in many different forms and is not limited to the embodiments described herein. These embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. It should be noted that: the relative arrangement of the components and steps set forth in these embodiments should be construed as exemplary only and not as limiting unless specifically stated otherwise.
The terms "first," "second," and the like, as used in this disclosure, do not denote any order, quantity, or importance, but rather are used to distinguish one element from another. The word "comprising" or "comprises" and the like means that elements preceding the word encompass the elements recited after the word, and not exclude the possibility of also encompassing other elements. "upper", "lower", "left", "right", etc. are used merely to indicate relative positional relationships, which may also be changed when the absolute position of the object to be described is changed.
In this disclosure, when a particular device is described as being located between a first device and a second device, there may or may not be an intervening device between the particular device and either the first device or the second device. When it is described that a particular device is connected to other devices, the particular device may be directly connected to the other devices without intervening devices, or may be directly connected to the other devices without intervening devices.
All terms (including technical or scientific terms) used in this disclosure have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs, unless specifically defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
In order to eliminate the missing detection phenomenon during the face list number retrieval as much as possible, in some embodiments of the security inspection image processing method of the present disclosure, the method includes: and responding to the synchronous instruction, triggering synchronous operation of the face list number queues corresponding to the preset number of packages and the security check image queues of the preset number of packages, so that the preset number is matched with the number of the security check images in the security check image queues after synchronization. When the package is subjected to security inspection, the synchronous operation of the face list number queue and the security inspection image queue is performed according to the synchronous instruction, so that the number of the face list numbers is matched with the number of the security inspection images, each face list number can correspond to a certain security inspection image, and the missing inspection phenomenon during the face list number retrieval is eliminated as much as possible.
The face-sheet number array may be formed by scanning the package, for example, by a unloader or automated apparatus first scanning the face-sheet number of the package with a scanning device and then placing the package on the delivery track. The scanned face list numbers enter a face list number queue and can be sequentially arranged according to the entering sequence. The security inspection image queue can be obtained by scanning rays (such as X-rays) of security inspection equipment, security inspection images generated when packages pass through the beam surface of the rays enter the security inspection image queue, and the security inspection images can be sequentially arranged in the security inspection image queue according to the generation sequence.
As shown in fig. 4, a flow diagram of some embodiments of a security inspection image processing method according to the present disclosure is shown. Referring to fig. 4, in some embodiments, a security inspection image processing method includes:
step 100, responding to a synchronization instruction, triggering the synchronization operation of a face list number queue corresponding to a preset number of packages and a security check image queue of the preset number of packages, so that the preset number is matched with the number of security check images in the security check image queue after synchronization;
and 200, after the synchronous operation is finished, enabling each face number in the face number queue to be in one-to-one correspondence with each security inspection image in the synchronized security inspection image queue according to the queue sequence.
Before the synchronization operation is performed, if a plurality of packages enter the security inspection equipment in a mutually approaching or overlapping mode, the situation that the security inspection image comprises a plurality of packages possibly occurs, so that the number of the surface unit numbers in the scanned surface unit number queues of the plurality of packages is larger than that of the security inspection images in the security inspection image queues, one-to-one correspondence cannot be realized, and then the surface unit numbers cannot be searched.
At this time, the security inspector may input a synchronization instruction from the outside by manually operating the control panel or the remote controller to trigger the synchronization operation of step 100. For example, when a security inspection person browses the security inspection image and finds that the packages overlap or are too close, the corresponding synchronous key or handle is touched. Or the security inspection equipment automatically inspects the overlapping condition of the packages and sends out a prompt whether to synchronize or not to security inspection personnel so that the security inspection personnel can manually operate the control panel or the remote controller according to the prompt.
In addition, the synchronization instruction may be automatically generated during the package scanning process, for example, the security inspection device checks the packages for proximity or overlapping when scanning the packages, and generates the synchronization instruction, or periodically generates the synchronization instruction to trigger the synchronization operation of step 100.
Through synchronous operation, the quantity of the face list numbers in the face list number queue and the quantity of the security check images in the security check image queue are equal to the quantity of the packages which are actually scanned. In step 200, each face number in the face number queue is in one-to-one correspondence with each security check image in the synchronized security check image queue according to the queue order, so as to implement binding.
Thus, according to the relation between the bound face list number and the security inspection image, the operation of searching the security inspection image according to the face list number can be realized. When an operator inputs a certain face number, a security check image corresponding to the face number can be queried according to the input face number. In consideration of the situation that the corresponding package arrives at the beam flow surface of the security inspection device late due to the scanning of the surface serial number or the situation that the synchronized security inspection image deviates from the actual package (such as incomplete display or dislocation, etc.), when the search result is output, not only the security inspection image corresponding to the surface serial number, but also at least one security inspection image of the security inspection image, which is positioned before and/or after the security inspection image, in the security inspection image queue can be output. For example, a security inspection image corresponding to the face simplex number is output, and a preceding security inspection image and a following security inspection image. In this way, the retriever can learn more accurate conditions by viewing more security images.
As shown in fig. 5, a flow diagram of a synchronization operation in some embodiments of a security inspection image processing method according to the present disclosure is shown. Referring to fig. 5, in some embodiments, the synchronization operation may include:
step 110 (judging step), judging whether the number of the security check images in the security check image queue is equal to the number of the face check numbers in the face check number queue, if the number is equal, exiting the synchronous operation, and if the number is not equal, executing step 120;
step 120, selecting a security inspection image with the largest width in the package transmission direction from the security inspection image queue;
and 130, segmenting the selected security inspection image along the package transmission direction to obtain at least two segmented security inspection images, and returning to the step 110.
Step 110 provides an exit condition for the synchronization operation, i.e. the number of security check images is equal to the number of face sheets. And, after the segmentation in step 130, the process returns to step 110 to repeat the judgment operation. The segmented security images in step 130 may directly replace the segmented security images in the security image queue, which may be deleted or otherwise saved.
According to the embodiment, through one or more segmentation operations, the wider security inspection image can be effectively segmented into more relatively narrower security inspection images, so that the number of the security inspection images is increased, and the number of the security inspection images is matched with the number of the face sheets.
When the selected security inspection image is cut in step 130, the security inspection image with the largest width may be cut in half in width along the package transmission direction, so as to obtain two security inspection images with equal width after cutting. Of course, the segmentation may be performed in other proportions (e.g., 2:3, etc.), or into three or more security images.
If the widths of at least two security inspection images in the security inspection image queue are found to be equal and exceed the width of any other security inspection image before the splitting operation, that is, a plurality of security inspection images with the largest width are provided, one of the at least two security inspection images can be randomly selected for splitting. In other embodiments, one of the at least two security images may be selected by default for segmentation, for example, a first security image or a last security image of the at least two security images is selected by default for segmentation.
As shown in fig. 6, an adjustment schematic of the security inspection image sequence is implemented according to the synchronization operation in the embodiment of fig. 5. In fig. 6, the sequence of face sheets includes five face sheets 1001, 1002, 1003, 1004, and 1005, respectively, while there are only three security inspection images in the currently corresponding security inspection image sequence, namely image 1, image 2, and image 3, respectively. Since image 2 is the widest of the three security images, it is selected for half-segmentation. The original image 2 after the segmentation is replaced by an image 2 and an image 3, and the original image 3 becomes an image 4. At this time, the number of images in the security inspection image sequence is still smaller than the number of face sheets, so that the security inspection images are continuously selected for segmentation. Since the image 2 and the image 3 have the same width, the image 3 is randomly selected to be half-cut, so that the original image 3 becomes the image 3 and the image 4, and the original image 4 becomes the image 5. At this time, the number of security check images in the security check image queue is already equal to the number of face check numbers of the face check number sequence, so that the synchronous operation is exited, and each face check number can be in one-to-one correspondence with each security check image, so that the retrieval based on the face check number is possible.
In order to achieve higher retrieval requirements, the security inspection images are more accurately corresponding to the face sheets, and in other embodiments image analysis can be introduced in a synchronous operation. FIG. 7 is a flow chart illustrating synchronization operations in further embodiments of a security inspection image processing method according to the present disclosure. Referring to fig. 7, in some embodiments, the synchronization operation includes:
step 110 (judging step), judging whether the number of the security check images in the security check image queue is equal to the number of the face check numbers in the face check number queue, if the number is equal, exiting the synchronous operation, and if the number is not equal, executing step 140;
step 140, selecting a security inspection image capable of performing image threshold segmentation in the package transmission direction from the security inspection image queue;
and 150, performing image threshold segmentation on the selected security inspection images along the package transmission direction to obtain at least two segmented security inspection images, and returning to the judging step.
Considering that the background area in the security inspection image has uniform color level, for example, RGB is 255 or more than 200, and the foreground area of the security inspection image displaying the package is a pseudo-color area, which can be distinguished from the background area relatively obviously. Thus, a security inspection image that can be image thresholded may be selected in step 140. Specifically, an image segmentation position in the security inspection image can be determined according to a preset color level threshold, and then the security inspection image is segmented at the determined image segmentation position along the package transmission direction. The preset tone threshold is determined according to the tone of the background area in the security inspection image, for example, the preset tone threshold is set to be slightly lower than the tone of the background area.
Referring to fig. 8, the description of the face list number sequence and the security check image sequence in this example may refer to fig. 6, and will not be described herein. The image 2 comprises three packages, the color level of the position between the first package and the second package and the color level of the background area are relatively close to each other according to the left-to-right direction, and the set image threshold value is met, so that the image 2 is determined to be capable of carrying out image threshold segmentation, and the segmentation position can be set between the first package and the second package.
By performing image threshold segmentation on this image 2 in step 150, a segmented image 2 and an image 3 can be obtained, and the original image 3 becomes an image 4. Next, step 110 is returned to determine whether the number of face sheets is the same as the number of security images. Obviously, in fig. 8, the number of security inspection images of the security inspection image queue after the segmentation operation is still less than the number of face sheets, and no matter the image 2 or the image 3 lacks the area meeting the preset tone threshold, so that the image threshold segmentation cannot be performed. At this time, the splitting operation in the embodiment of fig. 5 may be adopted to perform splitting to obtain more security inspection images, that is, the security inspection image with the largest width in the package transmission direction is selected from the security inspection image queue, the selected security inspection image is split along the package transmission direction, at least two security inspection images after splitting are obtained, and then step 110 is returned.
The embodiment of fig. 5 is applicable to the embodiment of the present application in terms of the manner of splitting the security inspection image and the selection of security inspection images with equal widths. In fig. 8, the image 3 is a security inspection image having the largest width, and thus is selected to be half-cut, thereby obtaining an image 3 and an image 4, and the original image 4 becomes an image 5. The number of security check images in the security check image queue obtained after segmentation is the same as that of the face check numbers in the face check number sequence, so that one-to-one correspondence between the face check numbers and the security check images is realized.
According to the embodiment, the image threshold segmentation is introduced, so that the segmentation effect of the wider security inspection image can be improved, and the security inspection image can be matched with an actual package as much as possible. For a plurality of packages which are relatively loose to put, a more accurate corresponding relation between the face list number and the security inspection image can be obtained through an image threshold segmentation mode.
In this embodiment, the slicing operation may be performed a plurality of times until the face-sheet number and the number of security images match each other. In the steps of segmentation and segmentation, the segmented and segmented security inspection image can directly replace a segmented security inspection image in a security inspection image queue, and the segmented security inspection image can be deleted or otherwise stored.
For the case where there is a width overlap of multiple packages along the package transport direction, it may be considered to add additional ancillary information to assist the synchronization process. For example, an optical image pickup device is arranged in a channel of the security inspection equipment, and the photographed optical image is utilized to assist in image segmentation or segmentation.
As shown in fig. 9, a flow diagram of a synchronization operation in further embodiments of a security inspection image processing method according to the present disclosure is shown. Referring to fig. 9, in some embodiments, the synchronization operation includes:
step 110 (judging step), judging whether the number of the security check images in the security check image queue is equal to the number of the face check numbers in the face check number queue, if the number is equal, exiting the synchronous operation, and if the number is not equal, executing step 160;
step 160, respectively carrying out image analysis on the optical images shot when each security inspection image in the security inspection image queue is generated, and determining the quantity of packages in the optical images;
step 170, performing a segmentation operation or an image threshold segmentation operation on the security inspection images with the package quantity more than 1 to obtain a plurality of security inspection images with the package quantity identical to each other, and returning to the judging step.
The optical imaging device can take an image of the package while, before or after it passes through the beam surface of the security inspection device. The number of packages within the optical image may be more easily known by image analysis of the optical image of the package at step 160. Referring to fig. 10, the description of the related face list number sequence and the security check image sequence in this example may refer to fig. 6, and will not be described herein. The image 2 in the security image queue comprises three packages, and the number of packages in the security image can be obtained by analyzing one or more optical images corresponding to the security image.
For image 1 and image 3, it is also possible to derive that only a single package is obtained by optical image analysis, so that no segmentation or image thresholding is required. For image 2, more targeted segmentation or image threshold segmentation operations can be performed according to the number of packages analyzed. This may reduce or avoid unnecessary manipulation of the security images that do not require segmentation or segmentation.
In the actual synchronization process, a situation may occur in which part or all of the security inspection images in the security inspection image queue lack corresponding optical images (for example, the optical image capturing device has a fault or the capturing timing is not appropriate). Alternatively, there are cases where the number of packages cannot be obtained by analysis of the optical image (e.g., the optical image is not clear enough, or cannot be clearly distinguished from the background color). Then, reference may be made to the security inspection image selecting and splitting operation in the embodiment of fig. 5, that is, the security inspection image with the largest width in the package transmission direction is selected from the security inspection image queue, and the selected security inspection image is split along the package transmission direction, so as to obtain at least two split security inspection images, and then step 110 is returned.
The embodiments of the security inspection image processing method can be suitable for the requirements of different security inspection scenes, and the dependence on equipment is different. Moreover, each embodiment of the security inspection image processing method can be realized by security inspection equipment, a management platform at a network side or other special equipment. In order to eliminate the missing detection phenomenon during the face list number retrieval as much as possible, the disclosure also provides some embodiments of the security inspection image processing system.
As shown in fig. 11, is a schematic structural diagram of some embodiments of a security inspection image processing system according to the present disclosure. Referring to fig. 11, in some embodiments, a security inspection image processing system includes: scanning device 10, security inspection device 20 and synchronization device 30. The scanning device 10 may be used to scan the face-number of each of the at least one package prepared for entry into the security screening tunnel to form a face-number queue including the respective face-number. The security device 20 may be configured to scan at least one package entering the security screening tunnel and generate security images to form a security image queue including the respective security images. The synchronization device 30 may then be configured to perform an embodiment of any of the aforementioned security image processing methods. The synchronizing device 30 may be disposed inside the security inspection apparatus 20, may be disposed on the network side, or may be independent of the security inspection apparatus 20 and connected to the security inspection apparatus 20.
For embodiments requiring optical image assistance, referring to fig. 12, in some embodiments, the security image processing system may further include an optical camera 40. The optical imaging device 40 may be disposed within the security device 20 for capturing an optical image of the scanned package when generating a security image.
In addition, referring to fig. 12, in other embodiments of the security inspection image processing system, a synchronization operation switch may be further included, and the synchronization operation switch may be disposed on a control panel or a remote controller of the security inspection apparatus, for transmitting a synchronization instruction to the synchronization device when operated. The synchronous operation switch may include a physical or virtual key or handle.
In this specification, various embodiments are described in an incremental manner, where the emphasis of each embodiment is different, and where the same or similar parts of each embodiment are referred to each other. For the system embodiment, the whole and related components have corresponding relation with the content in the method embodiment, so that the description is simpler, and the relevant parts only need to be referred to the part of the description of the method embodiment.
Thus, various embodiments of the present disclosure have been described in detail. In order to avoid obscuring the concepts of the present disclosure, some details known in the art are not described. How to implement the solutions disclosed herein will be fully apparent to those skilled in the art from the above description.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the present disclosure. It will be understood by those skilled in the art that the foregoing embodiments may be modified and equivalents substituted for elements thereof without departing from the scope and spirit of the disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (8)

1. A security inspection image processing method, comprising:
responding to a synchronizing instruction, triggering the synchronizing operation of a face list number queue corresponding to a preset number of packages and a security check image queue of the preset number of packages, so that the preset number is matched with the number of security check images in the synchronized security check image queue;
the synchronizing operation includes:
judging: judging whether the number of security check images in the security check image queue is equal to the number of face check numbers in the face check number queue;
if the number is equal, the synchronous operation is exited;
if the quantity is not equal, respectively carrying out image analysis on the optical images shot when each security inspection image in the security inspection image queue is generated, and determining the quantity of packages in the optical images;
and performing segmentation operation or image threshold segmentation operation on the security inspection images with the parcel number more than 1 to obtain a plurality of security inspection images with the parcel number identical, and returning to the judging step.
2. The security inspection image processing method according to claim 1, wherein if part or all of security inspection images in a security inspection image queue lack corresponding optical images or the number of packages cannot be obtained through analysis of the optical images, selecting a security inspection image with the largest width in a package transmission direction from the security inspection image queue, segmenting the selected security inspection image along the package transmission direction to obtain at least two segmented security inspection images, and returning to the judging step.
3. The security inspection image processing method according to claim 1, wherein after the synchronization operation is completed, each face-number in the face-number queue is made to correspond to each security inspection image in the synchronized security inspection image queue one by one according to a queue order.
4. A security inspection image processing method according to claim 3, further comprising the operation of retrieving security inspection images by face-to-face single number, comprising:
inquiring a security check image corresponding to the face list number according to the input face list number;
and outputting at least one security check image of which the security check image is positioned before and/or after the security check image in the security check image queue.
5. The security inspection image processing method of claim 1, wherein the synchronization instruction is generated from an external input based on a control panel or remote control or automatically during package scanning.
6. A security inspection image processing system, comprising:
the scanning device is used for scanning the surface unit numbers of at least one package which is ready to enter the security inspection channel respectively to form a surface unit number queue comprising each surface unit number;
the security inspection device is used for scanning at least one package entering the security inspection channel and generating security inspection images so as to form a security inspection image queue comprising the security inspection images; and
a synchronization device configured to perform the security inspection image processing method of any one of claims 1 to 5.
7. The security inspection image processing system of claim 6, further comprising:
and the optical imaging device is arranged in the security inspection equipment and is used for shooting an optical image of the scanned package when the security inspection image is generated.
8. The security inspection image processing system of claim 6, further comprising:
and the synchronous operation switch is arranged on a control panel or a remote controller of the security inspection equipment and is used for sending a synchronous instruction to the synchronous device when being operated.
CN202311029514.5A 2018-12-24 2018-12-24 Security check image processing method and system Pending CN116824185A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311029514.5A CN116824185A (en) 2018-12-24 2018-12-24 Security check image processing method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202311029514.5A CN116824185A (en) 2018-12-24 2018-12-24 Security check image processing method and system
CN201811581337.0A CN111353518B (en) 2018-12-24 2018-12-24 Security check image processing method and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201811581337.0A Division CN111353518B (en) 2018-12-24 2018-12-24 Security check image processing method and system

Publications (1)

Publication Number Publication Date
CN116824185A true CN116824185A (en) 2023-09-29

Family

ID=71195469

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201811581337.0A Active CN111353518B (en) 2018-12-24 2018-12-24 Security check image processing method and system
CN202311029514.5A Pending CN116824185A (en) 2018-12-24 2018-12-24 Security check image processing method and system
CN202311029515.XA Pending CN116958605A (en) 2018-12-24 2018-12-24 Security check image processing method and system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201811581337.0A Active CN111353518B (en) 2018-12-24 2018-12-24 Security check image processing method and system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202311029515.XA Pending CN116958605A (en) 2018-12-24 2018-12-24 Security check image processing method and system

Country Status (1)

Country Link
CN (3) CN111353518B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1351781B9 (en) * 2001-01-18 2008-04-30 Federal Express Corporation Reading and decoding information on packages
JP4697761B2 (en) * 2001-05-18 2011-06-08 株式会社エイブイプランニングセンター Queue detection method and queue detection apparatus
CN106296535A (en) * 2016-08-02 2017-01-04 重庆微标科技股份有限公司 Realize hand baggage safety check information and associate the method and system reviewed with identity information
CN106503761A (en) * 2016-10-31 2017-03-15 紫光智云(江苏)物联网科技有限公司 Drawing system and method are sentenced in article safety check
JP2018106339A (en) * 2016-12-26 2018-07-05 キヤノンマーケティングジャパン株式会社 Information processing apparatus, system, information processing method and program

Also Published As

Publication number Publication date
CN111353518A (en) 2020-06-30
CN116958605A (en) 2023-10-27
CN111353518B (en) 2023-09-12

Similar Documents

Publication Publication Date Title
US7720194B2 (en) High throughput baggage inspection system
JP2017198671A (en) Image processor and image processing method
US9880314B2 (en) Methods for improving processing speed for object inspection
US20180156662A1 (en) Identification of Material Composition
CN108872265A (en) Detection method, apparatus and system
CN109257583B (en) Seamless splicing method and system for images of projection equipment
TW200815747A (en) Inspection system
CN111666816A (en) Method, device and equipment for detecting state of logistics piece
CN111353518B (en) Security check image processing method and system
CN109256341B (en) Method and device for inspecting monocrystalline silicon solar cells
CN105372715B (en) Shipping safety inspection method, system and rays safety detection apparatus
KR20120129020A (en) Apparatus and method for monitoring defect in film
US9858692B2 (en) Test support apparatus, test support method, and test support program for plant monitoring system
KR20200069853A (en) System of automatically up-loading online shopping product and Method of the same
WO2022183643A1 (en) Processing method and processing apparatus for out-of-control behavior in semiconductor manufacturing process
JP2019095984A (en) Image processing system
JPWO2022074992A5 (en)
CN112907540A (en) Splicing abnormity detection method, device, equipment and medium
CN115512283A (en) Parcel image processing method and device, computer equipment and storage medium
JP2011154463A (en) Failure analysis device
CN111861291A (en) Warehousing method and warehousing system
US20130235084A1 (en) Multi-source multiple documents comparison display (presentation or discussion) system
CN103995856B (en) Method and device for image search
CN115230133B (en) Film covering method and device of mobile terminal and storage medium
US20240119414A1 (en) Part management system and part management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination