WO2019096181A1 - Detection method, apparatus and system for security inspection, and electronic device - Google Patents
Detection method, apparatus and system for security inspection, and electronic device Download PDFInfo
- Publication number
- WO2019096181A1 WO2019096181A1 PCT/CN2018/115498 CN2018115498W WO2019096181A1 WO 2019096181 A1 WO2019096181 A1 WO 2019096181A1 CN 2018115498 W CN2018115498 W CN 2018115498W WO 2019096181 A1 WO2019096181 A1 WO 2019096181A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security
- ray image
- security inspection
- learning model
- ray
- Prior art date
Links
- 238000007689 inspection Methods 0.000 title claims abstract description 74
- 238000001514 detection method Methods 0.000 title claims abstract description 39
- 238000000034 method Methods 0.000 claims abstract description 44
- 238000013136 deep learning model Methods 0.000 claims abstract description 31
- 238000013527 convolutional neural network Methods 0.000 claims abstract description 24
- 238000007781 pre-processing Methods 0.000 claims abstract description 16
- 230000008569 process Effects 0.000 claims description 12
- 238000012549 training Methods 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 7
- 238000013135 deep learning Methods 0.000 claims description 4
- 238000000605 extraction Methods 0.000 claims description 4
- 238000010801 machine learning Methods 0.000 claims description 4
- 238000012935 Averaging Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 9
- 230000007613 environmental effect Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 5
- 230000011218 segmentation Effects 0.000 description 5
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 2
- 230000035515 penetration Effects 0.000 description 2
- 208000003464 asthenopia Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012706 support-vector machine Methods 0.000 description 1
- 239000013598 vector Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/20—Scenes; Scene-specific elements in augmented reality scenes
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01V—GEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
- G01V5/00—Prospecting or detecting by the use of ionising radiation, e.g. of natural or induced radioactivity
- G01V5/20—Detecting prohibited goods, e.g. weapons, explosives, hazardous substances, contraband or smuggled objects
- G01V5/22—Active interrogation, i.e. by irradiating objects or goods using external radiation sources, e.g. using gamma rays or cosmic rays
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/214—Generating training patterns; Bootstrap methods, e.g. bagging or boosting
Definitions
- the present application relates to the technical field of security devices, and in particular, to a security detection method, device, system, and electronic device.
- the general security inspection machine includes a motor, a conveyor system driven by a motor, a fuselage that is placed across the middle of the conveyor system, and of course a matching X-ray machine.
- a security inspection channel is formed between the body of the security inspection machine and the conveyor belt, and an X-ray machine is provided on at least one side of the security inspection channel.
- One end of the conveyor system is the area to be inspected.
- the object to be inspected After the object to be inspected is placed in the area to be inspected, it will be transmitted to the other end by the motor-driven conveyor system. In the middle, it must pass through the security inspection channel and be scanned by X-ray machine to generate X-ray imaging. Identify whether the object to be tested is a contraband.
- the existing detection method is susceptible to external environmental factors such as detection penetration and detection angle or external interference, which greatly reduces the recognition accuracy; and after the terminal displays the X-ray image, the security personnel are required to check the displayed image. . In this way, the security personnel can monitor the screen for a long time, which may cause visual fatigue, resulting in false detection, wrong inspection and missed detection.
- the existing security detection method is difficult to ensure the accuracy of identification, and the recognition efficiency is low, which is likely to cause security risks.
- the purpose of the present application is to provide a security detection method, device, system, and electronic device, so as to improve the recognition efficiency, effectively ensure the accuracy of identification of contraband, and prevent the occurrence of security risks.
- an embodiment of the present application provides a security detection method, including:
- the preset depth learning model includes a deep learning model based on a convolutional neural network
- the embodiment of the present application provides a first possible implementation manner of the first aspect, wherein the pre-processing the X-ray image comprises:
- the collected X-ray image is smoothed and denoised by a neighborhood averaging method to obtain a smooth and denoised X-ray image;
- the edge information of the smoothed and denoised image is enhanced by a histogram equalization method to obtain a preprocessed X-ray image.
- the embodiment of the present application provides a second possible implementation manner of the first aspect, wherein the deep learning model based on a convolutional neural network is trained by using sample data of a quantity exceeding a certain threshold.
- the item sample data includes pictures corresponding to different forms of contraband.
- the embodiment of the present application provides a third possible implementation manner of the first aspect, where the training process of the classifier includes:
- Depth feature of item specimen data is extracted by using a deep learning model based on convolutional neural network
- the item specimen data includes an X-ray picture of the specified different recognition result.
- the embodiment of the present application further provides a security detection device, including:
- the pre-processing module is configured to obtain an X-ray image acquired by the X-ray machine in the security inspection machine received by the security inspection terminal, and pre-process the X-ray image to obtain a pre-processed X-ray image;
- a feature extraction module configured to extract an item feature of the corresponding to-be-detected object in the pre-processed X-ray image according to a preset depth learning model, where the preset depth learning model includes deep learning based on a convolutional neural network model;
- a result identifying module configured to identify the item feature by using a classifier trained based on the preset depth learning model to generate a recognition result corresponding to the object to be detected;
- a result display module configured to send the identification result of the object to be detected to the security check terminal, so that the security check terminal displays the recognition result.
- the embodiment of the present application further provides a security inspection system, including a security inspection machine, a security inspection terminal, and a security identification device.
- the security inspection box of the security inspection machine is provided with an X-ray machine
- the security identification device includes a second The security detecting device of the aspect; the X-ray machine and the security detecting device are respectively connected to the security detecting terminal;
- the X-ray machine is configured to collect an X-ray image of the object to be detected passing through the security inspection channel of the security inspection machine, and send the X-ray image to the security inspection terminal;
- the security check terminal is configured to send the X-ray image to the security identification device when the received X-ray image is received, and configured to receive the recognition result of the object to be detected sent by the security identification device And displaying the recognition result through a display screen.
- the embodiment of the present application provides a first possible implementation manner of the third aspect, wherein the identification result includes two types of contraband and non-prohibited items; the system further includes an alarm device, An alarm device is connected to the security check terminal;
- the security terminal is further configured to send an alarm signal to the alarm device when the received recognition result is a contraband, so that the alarm device performs an alarm prompt.
- the embodiment of the present application provides a second possible implementation manner of the third aspect, wherein a bottom of the security inspection channel of the security inspection device is provided with a pressure sensor, and the pressure sensor is connected to the security inspection terminal;
- the pressure sensor is configured to collect pressure information received on the security inspection channel, and send the pressure information to the security inspection terminal;
- the security terminal is further configured to turn the X-ray machine on or off according to the pressure information.
- the embodiment of the present application provides a third possible implementation manner of the third aspect, wherein the security identification device includes an Nvidia Jetson TX2 chip.
- an embodiment of the present application further provides an electronic device, including a memory and a processor, where the computer stores a computer program executable on the processor, where the processor implements the computer program
- the embodiment of the present application provides a security detection method, device, system, and electronic device, wherein the method includes acquiring an X-ray image acquired by an X-ray machine in a security inspection machine received by a security inspection terminal, and pre-processing the X-ray image.
- the pre-processing is firstly used to reduce the influence of external environmental factors, and then the feature of the item is extracted by a deep learning model based on a convolutional neural network, and the classifier trained by the deep learning model is to be detected.
- the object is identified, which realizes the automatic identification and detection of contraband, and improves the recognition efficiency, effectively guarantees the accuracy of the contraband identification, and prevents the occurrence of security risks.
- FIG. 1 is a schematic flowchart of a security detection method provided by an embodiment of the present application.
- FIG. 2 is a schematic structural diagram of a security detecting device according to an embodiment of the present application.
- FIG. 3 is a communication connection diagram of a security detection system according to an embodiment of the present application.
- FIG. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
- the existing security detection method is difficult to ensure the accuracy of the identification, and the recognition efficiency is low, which is easy to cause a security risk.
- the security detection method, device, system and electronic device provided by the embodiments of the present application can be utilized.
- the processing reduces the influence of external environmental factors, and then extracts the feature of the article through the deep learning model based on the convolutional neural network, and uses the classifier trained by the deep learning model to identify the detected object, thus realizing the automatic identification detection of the contraband And while improving the recognition efficiency, it effectively ensures the accuracy of the identification of contraband and prevents the occurrence of security risks.
- Embodiment 1 is a diagrammatic representation of Embodiment 1:
- the security detection method provided by the embodiments of the present application may be, but is not limited to, applied to security inspection scenarios of important public places such as airports, ports, ports, subways, courts, and venues of major events.
- FIG. 1 is a schematic flow chart of a security detection method provided by an embodiment of the present application. As shown in FIG. 1, the security detection method includes:
- Step S101 Acquire an X-ray image acquired by an X-ray machine in the security inspection machine received by the security inspection terminal, and pre-process the X-ray image to obtain a pre-processed X-ray image.
- the security terminal can be, but is not limited to, a computer and a console. Specifically, when the product to be tested passes through the security inspection channel of the security inspection machine, the X-ray opportunity provided in the security inspection box of the security inspection machine scans the detection product and generates an X-ray image, and transmits the X-ray image to the security inspection terminal.
- the X-ray image is first required to have good performance.
- the preprocessing operation adopted by the embodiment of the present application mainly includes image enhancement and denoising due to external interference and the X-ray machine's own factors, and the preprocessing of the X-ray image includes:
- the collected X-ray image is smoothed and denoised by the neighborhood averaging method to obtain a smooth denoised X-ray image;
- the edge information of the smoothed and denoised image is enhanced by histogram equalization method, and the preprocessed X-ray image is obtained.
- edge information in the image can be enhanced, the interference (media scattering, high-speed motion and noise interference) is weakened to some extent, the performance of the image is improved, and the features of the image are fully displayed, and more Conducive to late feature extraction and representation.
- Step S102 Extract an item feature of the corresponding to-be-detected object in the pre-processed X-ray image according to a preset depth learning model, where the preset depth learning model includes a deep learning model based on a convolutional neural network.
- the deep learning model based on the convolutional neural network is trained by the sample sample data exceeding a certain threshold, and the sample sample data includes X-ray pictures corresponding to different forms of contraband.
- different forms of contraband include, for example, the state in which the gun is split into individual parts and the state in which the tool is folded.
- the above-described deep learning model based on convolutional neural networks can be implemented by the Caffe deep learning framework.
- the degree of various contraband pictures which facilitates the accurate identification of subsequent detection objects, overcomes the influence of external environmental factors, and improves the recognition ability of the deep learning model based on convolutional neural networks.
- the step S102 specifically includes: performing the feature training on the pre-processed X-ray image as an input image in a plurality of base layers included in the preset depth learning model, and extracting the multiple connectivity layers in the integration after the training is completed. Or other feature vectors that specify the output of the base layer as the feature of the item to be detected in the preprocessed X-ray image.
- the object feature of the corresponding object to be detected in the pre-processed X-ray image is extracted according to the preset depth learning model in step S102, and further includes:
- the preprocessed X-ray image is divided into two types: background and template, and the parameter with the largest variance between the two types is taken as the optimal threshold;
- the binarized image is obtained by the optimal threshold segmentation, and the binarized image is used as a preprocessed X-ray image.
- OTSU algorithm proposes that the segmentation method based on the variance between classes is recognized as the optimal threshold segmentation algorithm. It divides the image into two categories according to the grayscale characteristics of the image, and then calculates The variance between the two types takes the largest parameter as the optimal threshold, and then uses the optimal threshold segmentation to obtain a good binarized image.
- the gradation value of the pixel on the X-ray image is set to 0 or 255, the amount of data in the X-ray image is greatly reduced, and the image processing speed can be greatly reduced.
- Step S103 Identify the item feature by using a classifier trained based on the preset depth learning model to generate a recognition result corresponding to the object to be detected.
- the feature extracted in step 102 is used as an input of a classifier trained based on the preset depth learning model, and after the classifier recognizes, the final recognition result is obtained.
- the identification result is a contraband or a non-prohibited item, and may be, but is not limited to, being correctly or incorrectly identified, and applying different picture identifiers.
- the specific identification method is not limited herein.
- the training process of the classifier applied in step 103 includes:
- Depth feature of item specimen data is extracted by using a deep learning model based on convolutional neural network
- the sample data of the above item includes an X-ray picture of the specified different recognition result.
- the above machine learning algorithm may be a neighboring algorithm, a maximum expectation algorithm, and a support vector machine algorithm.
- the specific algorithm may be selected according to a specific situation, which is not limited herein.
- the item specimen data includes triple data; wherein the triple data includes: source data, forward data belonging to the same category as the source data, and different categories from the source data. Reverse data.
- the source data is sample data with the same recognition result randomly obtained from the item sample data.
- the forward data is sample data that is randomly obtained from the item sample data and is consistent with the recognition result of the source data; the matching degree of the source data is higher than the matching degree of the forward data.
- the reverse data is sample data randomly acquired from the item sample data that is inconsistent with the recognition result of the source data.
- the triplet data is: a first picture (source data) with good X-ray image performance in the item sample data, and a second picture with poor performance of the X-ray image captured in the item sample data ( Forward data), and a third picture as reverse data different from the first picture and the second picture recognition result.
- the recognition result of the first picture and the second picture is a contraband, and the recognition result of the second picture is a non-prohibited item.
- the second picture has a poorer image performance, such as a difference in definition and resolution from the first picture, and the matching degree is lower than the first picture.
- the third picture is the reverse data of the reverse comparison during training, and the positive opposition ratio is used once, which further enhances the recognition ability of the classifier.
- Step S104 the recognition result of the object to be detected is sent to the security check terminal, so that the security check terminal displays the recognition result.
- the security check terminal After receiving the recognition result of the object to be detected, the security check terminal performs rendering on the display interface of the display screen to display the recognition result.
- the pre-processing is firstly used to reduce the influence of external environmental factors, and then the feature of the item is extracted by a deep learning model based on a convolutional neural network, and the classifier trained by the deep learning model is to be detected.
- the object is identified, which realizes the automatic identification and detection of contraband, and improves the recognition efficiency, effectively guarantees the accuracy of the contraband identification, and prevents the occurrence of security risks.
- Embodiment 2 is a diagrammatic representation of Embodiment 1:
- FIG. 2 is a schematic structural diagram of a security detecting device provided by an embodiment of the present application. As shown in FIG. 2, the security detection device includes:
- the pre-processing module 11 is configured to acquire an X-ray image acquired by the X-ray machine in the security inspection machine received by the security inspection terminal, and pre-process the X-ray image to obtain a pre-processed X-ray image;
- the feature extraction module 12 is configured to extract an item feature of the corresponding to-be-detected object in the pre-processed X-ray image according to a preset depth learning model, where the preset depth learning model includes a deep learning model based on a convolutional neural network ;
- the result identification module 13 is configured to identify the item feature by using a classifier trained based on the preset depth learning model to generate a recognition result corresponding to the object to be detected;
- the result display module 14 is configured to send the identification result of the object to be detected to the security check terminal, so that the security check terminal displays the recognition result.
- the deep learning model based on the convolutional neural network is trained by the sample sample data exceeding a certain threshold, and the sample sample data includes X-ray pictures corresponding to different forms of contraband.
- different forms of contraband include, for example, the state in which the gun is split into individual parts and the state in which the tool is folded.
- the above-described deep learning model based on convolutional neural networks can be implemented by the Caffe deep learning framework.
- the pre-processing is firstly used to reduce the influence of external environmental factors, and then the feature of the item is extracted by a deep learning model based on a convolutional neural network, and the classifier trained by the deep learning model is to be detected.
- the object is identified, which realizes the automatic identification and detection of contraband, and improves the recognition efficiency, effectively guarantees the accuracy of the contraband identification, and prevents the occurrence of security risks.
- Embodiment 3 is a diagrammatic representation of Embodiment 3
- FIG. 3 is a diagram showing the communication connection of the security detection system provided by the embodiment of the present application.
- the security detection system includes: a security inspection machine 400, a security inspection terminal 500, and a security identification device 600.
- the security inspection box of the security inspection machine is provided with an X-ray machine 700, and the security identification device includes the second embodiment as in the second embodiment.
- the security inspection device; the X-ray machine and the security identification device are respectively connected with the security inspection terminal.
- the X-ray machine is configured to collect an X-ray image of the object to be detected passing through the security inspection channel of the security inspection machine, and send the X-ray image to the security inspection terminal.
- the security check terminal is configured to send the X-ray image to the security identification device when the received X-ray image is received, and configured to receive the recognition result of the object to be detected sent by the security identification device, and display the recognition result through the display screen .
- the pre-processing is firstly used to reduce the influence of external environmental factors, and then the feature of the item is extracted by a deep learning model based on a convolutional neural network, and the classifier trained by the deep learning model is to be detected.
- the object is identified, which realizes the automatic identification and detection of contraband, and improves the recognition efficiency, effectively guarantees the accuracy of the contraband identification, and prevents the occurrence of security risks.
- the identification result includes two types: contraband and non-prohibited; the security detection system further includes an alarm device 800, and the alarm device is connected to the security terminal.
- the security check terminal is further configured to send an alarm signal to the alarm device when the received recognition result is a contraband, so that the alarm device performs an alarm prompt.
- the alarm mode of the alarm device includes a light alarm, a voice alarm or a graphic display alarm.
- the bottom of the security inspection channel of the security machine is provided with a pressure sensor 900 that is coupled to the security terminal.
- the pressure sensor is configured to collect pressure information on the security channel and send the pressure information to the security terminal.
- the security terminal is also configured to turn the X-ray machine on or off based on the pressure information.
- the pressure value of the pressure sensor is read, and the pressure value is used as the pressure threshold.
- the pressure information sent by the pressure sensor received by the security check terminal exceeds the pressure threshold, the object to be detected is to pass the security check.
- the X-ray machine is turned on so that the X-ray machine collects an X-ray image of the object to be detected.
- the pressure information sent by the pressure sensor received by the security check terminal is restored to the pressure threshold, it indicates that the object to be detected has been taken away from the security inspection channel, and the X-ray machine is turned off. In this way, the automatic opening and closing of the X-ray machine is realized, which saves energy and prolongs the service life of the machine.
- the security identification device includes the Nvidia Jetson TX2 chip, which maintains a powerful computing power while achieving low power consumption, and can realize the identification of prohibited items in the X-ray picture at the millisecond level.
- the entire core is only the size of a credit card, which can realize the real-time identification of contraband without modifying the existing X-ray machine, and can be integrated with the X-ray machine to provide identification service.
- Embodiment 4 is a diagrammatic representation of Embodiment 4:
- an embodiment of the present application further provides an electronic device 100, including: a processor 40, a memory 41, a bus 42 and a communication interface 43.
- the processor 40, the communication interface 43 and the memory 41 are connected by a bus 42;
- the processor 40 is configured to execute an executable module, such as a computer program, stored in the memory 41.
- the memory 41 may include a high-speed random access memory (RAM), and may also include a non-volatile memory, such as at least one disk storage.
- RAM random access memory
- non-volatile memory such as at least one disk storage.
- the communication connection between the system network element and at least one other network element is implemented by at least one communication interface 43 (which may be wired or wireless), and may use an Internet, a wide area network, a local network, a metropolitan area network, or the like.
- the bus 42 can be an ISA bus, a PCI bus, or an EISA bus.
- the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one double-headed arrow is shown in Figure 4, but it does not mean that there is only one bus or one type of bus.
- the memory 41 is configured to store a program, and the processor 40 executes the program after receiving the execution instruction, and the method executed by the device defined by the flow process disclosed in any of the foregoing embodiments of the present application may be applied to the processing.
- processor 40 or implemented by processor 40.
- Processor 40 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 40 or an instruction in a form of software.
- the processor 40 may be a general-purpose processor, including a central processing unit (CPU) and a network processor (NP), and may also be a digital signal processor (DSP). ), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device and/or discrete hardware component.
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application may be directly implemented by the hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor.
- the software modules can be located in conventional storage media such as random access memory, flash memory, read only memory, programmable read only memory, electrically erasable programmable memory, and/or registers.
- the storage medium is located in the memory 41, and the processor 40 reads the information in the memory 41 and performs the steps of the above method in combination with its hardware.
- the security detection device, system and electronic device provided by the embodiments of the present application have the same technical features as the security detection detection method provided by the above embodiments, so that the same technical problem can be solved and the same technical effects can be achieved.
- a computer program product for performing a security detection method comprising a computer readable storage medium storing non-volatile program code executable by a processor, the program code comprising instructions configurable to execute the foregoing method
- each block of the flowchart or block diagram can represent a module, a program segment, or a portion of code that comprises one or more of the Executable instructions.
- the functions noted in the blocks may also occur in a different order than that illustrated in the drawings. For example, two consecutive blocks may be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending upon the functionality involved.
- each block of the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts can be implemented in a dedicated hardware-based system that performs the specified function or function. Or it can be implemented by a combination of dedicated hardware and computer instructions.
- the terms "first”, “second” or “third” are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
- the disclosed systems, devices, and methods may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some communication interface, device or unit, and may be electrical, mechanical or otherwise.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the functions, if implemented in the form of software functional units and sold or used as separate products, may be stored in a non-transitory computer readable storage medium executable by a processor.
- the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
- the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Life Sciences & Earth Sciences (AREA)
- Multimedia (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Evolutionary Computation (AREA)
- Evolutionary Biology (AREA)
- General Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioinformatics & Computational Biology (AREA)
- Artificial Intelligence (AREA)
- High Energy & Nuclear Physics (AREA)
- General Life Sciences & Earth Sciences (AREA)
- Geophysics (AREA)
- Image Analysis (AREA)
Abstract
A detection method, apparatus and system for security inspection and an electronic device. Said method comprises: acquiring an X-ray image received by a security inspection terminal and acquired by an X-ray machine in a security inspection machine, and pre-processing the X-ray image, so as to obtain a pre-processed X-ray image (S101); extracting, according to a preset deep learning model, an object feature of a corresponding object to be detected in the pre-processed X-ray image, the preset deep learning model comprising a convolutional neural network-based deep learning model (S102); identifying the object feature by means of a classifier trained on the basis of a preset deep learning model, and generating an identification result corresponding to the object to be detected (S103); and Sending, to the security inspection terminal, the identification result of the object to be detected, so that the security inspection terminal displays the identification result (S104). The method above implements automatic recognition and detection of prohibited goods, effectively ensuring the accuracy of recognition of prohibited goods while improving the efficiency of recognition, preventing the occurrence of security hazards.
Description
相关申请的交叉引用Cross-reference to related applications
本申请要求于2017年11月14日提交中国专利局的申请号为CN201711126618.2、名称为“安检检测方法、装置、系统及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to Chinese Patent Application No. CN201711126618.2, entitled "Security Inspection Method, Apparatus, System and Electronic Equipment" submitted by the Chinese Patent Office on November 14, 2017, the entire contents of which are incorporated by reference. In this application.
本申请涉及安检设备技术领域,尤其是涉及一种安检检测方法、装置、系统及电子设备。The present application relates to the technical field of security devices, and in particular, to a security detection method, device, system, and electronic device.
随着公众安全意识的增强,各种安检设备被广泛应用于机场、口岸、港口、地铁、法院和重大赛事的场馆等重要公共场所。而其中最常用的就是(X射线)安检机,目前安检机在客流和物流领域得到了越来越广泛的应用。一般安检机都包括电机,由电机驱动的传送带系统,跨设在传送带系统中部的机身,当然还有配套的X光机。通常安检机的机身与传送带之间形成安检通道,安检通道的至少一侧设有X光机。传送带系统的一端为待检区域,待检测物放置在待检区域后,会被电机驱动的传送带系统传输到另一端,中途必然经过安检通道,被X光机照射扫描生成X光成像,从而可以识别出待检测物是否为违禁品。With the increase of public safety awareness, various security inspection equipment is widely used in important public places such as airports, ports, ports, subways, courts and venues for major events. The most commonly used one is the (X-ray) security inspection machine. At present, the security inspection machine has been widely used in the passenger flow and logistics field. The general security inspection machine includes a motor, a conveyor system driven by a motor, a fuselage that is placed across the middle of the conveyor system, and of course a matching X-ray machine. Usually, a security inspection channel is formed between the body of the security inspection machine and the conveyor belt, and an X-ray machine is provided on at least one side of the security inspection channel. One end of the conveyor system is the area to be inspected. After the object to be inspected is placed in the area to be inspected, it will be transmitted to the other end by the motor-driven conveyor system. In the middle, it must pass through the security inspection channel and be scanned by X-ray machine to generate X-ray imaging. Identify whether the object to be tested is a contraband.
但是现有的检测方法由于容易受到检测穿透性和检测角度等外界环境因素或者外界干扰影响,大大降低了识别准确性;且在终端显示X光图像后,需要安检人员对显示的图片进行排查。这样安检人员长时间监视屏幕容易造成视觉疲劳,导致误检、错检和漏检等情况发生。However, the existing detection method is susceptible to external environmental factors such as detection penetration and detection angle or external interference, which greatly reduces the recognition accuracy; and after the terminal displays the X-ray image, the security personnel are required to check the displayed image. . In this way, the security personnel can monitor the screen for a long time, which may cause visual fatigue, resulting in false detection, wrong inspection and missed detection.
因此,现有的安检检测方法,难以保证识别的准确性,且识别效率低,容易造成安全隐患。Therefore, the existing security detection method is difficult to ensure the accuracy of identification, and the recognition efficiency is low, which is likely to cause security risks.
发明内容Summary of the invention
有鉴于此,本申请的目的在于提供一种安检检测方法、装置、系统及电子设备,以在提高识别效率的同时,有效保证对违禁品识别的准确性,预防安全隐患发生。In view of this, the purpose of the present application is to provide a security detection method, device, system, and electronic device, so as to improve the recognition efficiency, effectively ensure the accuracy of identification of contraband, and prevent the occurrence of security risks.
第一方面,本申请实施例提供了一种安检检测方法,包括:In a first aspect, an embodiment of the present application provides a security detection method, including:
获取安检终端接收到的安检机内的X光机采集的X光图像,对所述X光图像进行预处理,得到预处理后的X光图像;Obtaining an X-ray image acquired by an X-ray machine in the security inspection machine received by the security inspection terminal, and pre-processing the X-ray image to obtain a pre-processed X-ray image;
根据预设的深度学习模型提取所述预处理后的X光图像中对应的待检测物的物品特征,所述预设的深度学习模型包括基于卷积神经网络的深度学习模型;Extracting an item feature of the corresponding to-be-detected object in the pre-processed X-ray image according to a preset depth learning model, where the preset depth learning model includes a deep learning model based on a convolutional neural network;
利用基于所述预设的深度学习模型训练的分类器对所述物品特征进行识别,生成对应 所述待检测物的识别结果;Identifying, by the classifier trained based on the preset depth learning model, the item feature, and generating a recognition result corresponding to the object to be detected;
将所述待检测物的识别结果发送至所述安检终端,以使所述安检终端显示所述识别结果。And transmitting the identification result of the object to be detected to the security check terminal, so that the security check terminal displays the recognition result.
结合第一方面,本申请实施例提供了第一方面的第一种可能的实施方式,其中,所述对所述X光图像进行预处理,包括:With reference to the first aspect, the embodiment of the present application provides a first possible implementation manner of the first aspect, wherein the pre-processing the X-ray image comprises:
采用邻域平均法对采集的所述X光图像进行平滑去噪,得到平滑去噪后的X光图像;The collected X-ray image is smoothed and denoised by a neighborhood averaging method to obtain a smooth and denoised X-ray image;
采用直方图均衡法对所述平滑去噪后的图像的边缘信息进行增强,得到预处理后的X光图像。The edge information of the smoothed and denoised image is enhanced by a histogram equalization method to obtain a preprocessed X-ray image.
结合第一方面,本申请实施例提供了第一方面的第二种可能的实施方式,其中,所述基于卷积神经网络的深度学习模型是通过数量超过一定阈值的物品样本数据训练得到的,所述物品样本数据包括不同形态的违禁品对应的图片。With reference to the first aspect, the embodiment of the present application provides a second possible implementation manner of the first aspect, wherein the deep learning model based on a convolutional neural network is trained by using sample data of a quantity exceeding a certain threshold. The item sample data includes pictures corresponding to different forms of contraband.
结合第一方面,本申请实施例提供了第一方面的第三种可能的实施方式,其中,所述分类器的训练过程包括:With reference to the first aspect, the embodiment of the present application provides a third possible implementation manner of the first aspect, where the training process of the classifier includes:
利用基于卷积神经网络的深度学习模型提取物品标本数据的深度特征;Depth feature of item specimen data is extracted by using a deep learning model based on convolutional neural network;
基于机器学习算法,对所述深度特征训练分类器;Training a classifier for the depth feature based on a machine learning algorithm;
其中所述物品标本数据中包括指定的不同识别结果的X光图片。The item specimen data includes an X-ray picture of the specified different recognition result.
第二方面,本申请实施例还提供一种安检检测装置,包括:In a second aspect, the embodiment of the present application further provides a security detection device, including:
预处理模块,配置成获取安检终端接收到的安检机内的X光机采集的X光图像,对所述X光图像进行预处理,得到预处理后的X光图像;The pre-processing module is configured to obtain an X-ray image acquired by the X-ray machine in the security inspection machine received by the security inspection terminal, and pre-process the X-ray image to obtain a pre-processed X-ray image;
特征提取模块,配置成根据预设的深度学习模型提取所述预处理后的X光图像中对应的待检测物的物品特征,所述预设的深度学习模型包括基于卷积神经网络的深度学习模型;a feature extraction module, configured to extract an item feature of the corresponding to-be-detected object in the pre-processed X-ray image according to a preset depth learning model, where the preset depth learning model includes deep learning based on a convolutional neural network model;
结果识别模块,配置成利用基于所述预设的深度学习模型训练的分类器对所述物品特征进行识别,生成对应所述待检测物的识别结果;a result identifying module configured to identify the item feature by using a classifier trained based on the preset depth learning model to generate a recognition result corresponding to the object to be detected;
结果显示模块,配置成将所述待检测物的识别结果发送至所述安检终端,以使所述安检终端显示所述识别结果。And a result display module configured to send the identification result of the object to be detected to the security check terminal, so that the security check terminal displays the recognition result.
第三方面,本申请实施例还提供一种安检检测系统,包括安检机、安检终端及安检识别设备,所述安检机的安检箱内设置有X光机,所述安检识别设备包括如第二方面所述的安检检测装置;所述X光机和所述安检识别设备分别与所述安检终端连接;In a third aspect, the embodiment of the present application further provides a security inspection system, including a security inspection machine, a security inspection terminal, and a security identification device. The security inspection box of the security inspection machine is provided with an X-ray machine, and the security identification device includes a second The security detecting device of the aspect; the X-ray machine and the security detecting device are respectively connected to the security detecting terminal;
所述X光机,配置成采集经过所述安检机的安检通道的待检测物的X光图像,将所述X光图像发送至所述安检终端;The X-ray machine is configured to collect an X-ray image of the object to be detected passing through the security inspection channel of the security inspection machine, and send the X-ray image to the security inspection terminal;
所述安检终端,配置成当监听到接收的所述X光图像时,将所述X光图像发送至安检识别设备;还配置成接收所述安检识别设备发送的所述待检测物的识别结果,将所述识别 结果通过显示屏显示。The security check terminal is configured to send the X-ray image to the security identification device when the received X-ray image is received, and configured to receive the recognition result of the object to be detected sent by the security identification device And displaying the recognition result through a display screen.
结合第三方面,本申请实施例提供了第三方面的第一种可能的实施方式,其中,所述识别结果包括违禁品和非违禁品两种类型;所述系统还包括报警装置,所述报警装置与所述安检终端连接;With reference to the third aspect, the embodiment of the present application provides a first possible implementation manner of the third aspect, wherein the identification result includes two types of contraband and non-prohibited items; the system further includes an alarm device, An alarm device is connected to the security check terminal;
所述安检终端,还配置成当接收到的所述识别结果为违禁品时,发送报警信号至所述报警装置,以使所述报警装置进行报警提示。The security terminal is further configured to send an alarm signal to the alarm device when the received recognition result is a contraband, so that the alarm device performs an alarm prompt.
结合第三方面,本申请实施例提供了第三方面的第二种可能的实施方式,其中,所述安检机的安检通道的底部设置有压力传感器,所述压力传感器与所述安检终端连接;With reference to the third aspect, the embodiment of the present application provides a second possible implementation manner of the third aspect, wherein a bottom of the security inspection channel of the security inspection device is provided with a pressure sensor, and the pressure sensor is connected to the security inspection terminal;
所述压力传感器,配置成采集所述安检通道上承受的压力信息,将所述压力信息发送至所述安检终端;The pressure sensor is configured to collect pressure information received on the security inspection channel, and send the pressure information to the security inspection terminal;
所述安检终端,还配置成根据所述压力信息开启或者关闭所述X光机。The security terminal is further configured to turn the X-ray machine on or off according to the pressure information.
结合第三方面及其任一种可能的实施方式,本申请实施例提供了第三方面的第三种可能的实施方式,其中,所述安检识别设备包括Nvidia Jetson TX2芯片。With reference to the third aspect and any possible implementation manner thereof, the embodiment of the present application provides a third possible implementation manner of the third aspect, wherein the security identification device includes an Nvidia Jetson TX2 chip.
第四方面,本申请实施例还提供一种电子设备,包括存储器和处理器,所述存储器上存储有可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述第一方面及其任一种可能的实施方式所述的方法。In a fourth aspect, an embodiment of the present application further provides an electronic device, including a memory and a processor, where the computer stores a computer program executable on the processor, where the processor implements the computer program The method of the first aspect above and any one of its possible embodiments.
本申请实施例带来了以下有益效果:The embodiments of the present application bring the following beneficial effects:
本申请实施例提供了一种安检检测方法、装置、系统及电子设备,其中该方法包括获取安检终端接收到的安检机内的X光机采集的X光图像,对该X光图像进行预处理,得到预处理后的X光图像;根据预设的深度学习模型提取所述预处理后的X光图像中对应的待检测物的物品特征,该预设的深度学习模型包括基于卷积神经网络的深度学习模型;利用基于预设的深度学习模型训练的分类器对物品特征进行识别,生成对应待检测物的识别结果;将待检测物的识别结果发送至安检终端,以使安检终端显示该识别结果。在本申请实施例提供的技术方案中,首先利用预处理减小外界环境因素的影响,然后通过基于卷积神经网络的深度学习模型提取物品特征,并利用该深度学习模型训练的分类器对待检测物进行识别,这样实现了对违禁品的自动识别检测,且在提高识别效率的同时,有效保证了对违禁品识别的准确性,预防了安全隐患的发生。The embodiment of the present application provides a security detection method, device, system, and electronic device, wherein the method includes acquiring an X-ray image acquired by an X-ray machine in a security inspection machine received by a security inspection terminal, and pre-processing the X-ray image. Obtaining a pre-processed X-ray image; extracting, according to a preset depth learning model, an item feature of the corresponding to-be-detected object in the pre-processed X-ray image, the preset depth learning model including a convolutional neural network a deep learning model; the classifier trained based on the preset deep learning model identifies the item feature, generates a recognition result corresponding to the object to be detected; sends the recognition result of the object to be detected to the security terminal, so that the security terminal displays the Identify the results. In the technical solution provided by the embodiment of the present application, the pre-processing is firstly used to reduce the influence of external environmental factors, and then the feature of the item is extracted by a deep learning model based on a convolutional neural network, and the classifier trained by the deep learning model is to be detected. The object is identified, which realizes the automatic identification and detection of contraband, and improves the recognition efficiency, effectively guarantees the accuracy of the contraband identification, and prevents the occurrence of security risks.
本申请的其他特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本申请而了解。本申请的目的和其他优点在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。Other features and advantages of the present application will be set forth in the description which follows and become apparent from the description. The objectives and other advantages of the present invention are realized and attained by the structure of the invention.
为使本申请的上述目的、特征和优点能更明显易懂,下文特举较佳实施例,并配合所附附图,作详细说明如下。The above described objects, features, and advantages of the present invention will become more apparent from the following description.
为了更清楚地说明本申请具体实施方式或现有技术中的技术方案,下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the specific embodiments of the present application or the technical solutions in the prior art, the drawings to be used in the specific embodiments or the description of the prior art will be briefly described below, and obviously, the attached in the following description The drawings are some embodiments of the present application, and those skilled in the art can obtain other drawings based on these drawings without any creative work.
图1为本申请实施例提供的安检检测方法的流程示意图;1 is a schematic flowchart of a security detection method provided by an embodiment of the present application;
图2为本申请实施例提供的安检检测装置的结构示意图;2 is a schematic structural diagram of a security detecting device according to an embodiment of the present application;
图3为本申请实施例提供的安检检测系统的通信连接图;3 is a communication connection diagram of a security detection system according to an embodiment of the present application;
图4为本申请实施例提供的电子设备的结构示意图。FIG. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请的技术方案进行清楚且完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions of the present application will be clearly and completely described in the following with reference to the accompanying drawings. It is obvious that the described embodiments are a part of the embodiments of the present application, and not all of them. An embodiment. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without departing from the inventive scope are the scope of the present application.
目前现有的安检检测方法,难以保证识别的准确性,且识别效率低,容易造成安全隐患,基于此,本申请实施例提供的一种安检检测方法、装置、系统及电子设备,可以利用预处理减小外界环境因素的影响,然后通过基于卷积神经网络的深度学习模型提取物品特征,并利用该深度学习模型训练的分类器对待检测物进行识别,这样实现了对违禁品的自动识别检测,且在提高识别效率的同时,有效保证了对违禁品识别的准确性,预防了安全隐患的发生。At present, the existing security detection method is difficult to ensure the accuracy of the identification, and the recognition efficiency is low, which is easy to cause a security risk. Based on this, the security detection method, device, system and electronic device provided by the embodiments of the present application can be utilized. The processing reduces the influence of external environmental factors, and then extracts the feature of the article through the deep learning model based on the convolutional neural network, and uses the classifier trained by the deep learning model to identify the detected object, thus realizing the automatic identification detection of the contraband And while improving the recognition efficiency, it effectively ensures the accuracy of the identification of contraband and prevents the occurrence of security risks.
为便于对本实施例进行理解,首先对本申请实施例所公开的一种安检检测方法进行详细介绍。In order to facilitate the understanding of the embodiment, a security detection method disclosed in the embodiment of the present application is first introduced in detail.
实施例一:Embodiment 1:
本申请实施例提供的安检检测方法可以但不限于应用于机场、口岸、港口、地铁、法院和重大赛事的场馆等重要公共场所的安检情景中。The security detection method provided by the embodiments of the present application may be, but is not limited to, applied to security inspection scenarios of important public places such as airports, ports, ports, subways, courts, and venues of major events.
图1示出了本申请实施例提供的安检检测方法的流程示意图。如图1所示,该安检检测方法包括:FIG. 1 is a schematic flow chart of a security detection method provided by an embodiment of the present application. As shown in FIG. 1, the security detection method includes:
步骤S101,获取安检终端接收到的安检机内的X光机采集的X光图像,对该X光图像进行预处理,得到预处理后的X光图像。Step S101: Acquire an X-ray image acquired by an X-ray machine in the security inspection machine received by the security inspection terminal, and pre-process the X-ray image to obtain a pre-processed X-ray image.
该安检终端可以但不限于为电脑以及控制台。具体地,当待检测品经过安检机的安检 通道时,设置在安检机的安检箱内的X光机会对待检测品进行扫描并生成X光图像,将该X光图像发送至上述安检终端。The security terminal can be, but is not limited to, a computer and a console. Specifically, when the product to be tested passes through the security inspection channel of the security inspection machine, the X-ray opportunity provided in the security inspection box of the security inspection machine scans the detection product and generates an X-ray image, and transmits the X-ray image to the security inspection terminal.
在获取到安检终端发送的X光图像,检测X光图像的过程中,首先要求该X光图像具有良好的性能。但是由于外界干扰和X光机自身因素会造成X光图像质量的降低,基于此本申请实施例采用的预处理操作主要包括图像增强和去噪,上述对该X光图像进行预处理包括:In the process of acquiring the X-ray image transmitted by the security check terminal and detecting the X-ray image, the X-ray image is first required to have good performance. However, the preprocessing operation adopted by the embodiment of the present application mainly includes image enhancement and denoising due to external interference and the X-ray machine's own factors, and the preprocessing of the X-ray image includes:
采用邻域平均法对采集的X光图像进行平滑去噪,得到平滑去噪后的X光图像;The collected X-ray image is smoothed and denoised by the neighborhood averaging method to obtain a smooth denoised X-ray image;
采用直方图均衡法对平滑去噪后的图像的边缘信息进行增强,得到预处理后的X光图像。The edge information of the smoothed and denoised image is enhanced by histogram equalization method, and the preprocessed X-ray image is obtained.
通过上述的预处理方法,能够增强图像中的有用信息如边缘信息,在一定程度上削弱干扰(介质散射、高速运动和噪声干扰),提高图像的性能,使得图像的特征充分展现出来,更有利于后期的特征提取与表示。Through the above preprocessing method, useful information such as edge information in the image can be enhanced, the interference (media scattering, high-speed motion and noise interference) is weakened to some extent, the performance of the image is improved, and the features of the image are fully displayed, and more Conducive to late feature extraction and representation.
步骤S102,根据预设的深度学习模型提取上述预处理后的X光图像中对应的待检测物的物品特征,该预设的深度学习模型包括基于卷积神经网络的深度学习模型。Step S102: Extract an item feature of the corresponding to-be-detected object in the pre-processed X-ray image according to a preset depth learning model, where the preset depth learning model includes a deep learning model based on a convolutional neural network.
上述基于卷积神经网络的深度学习模型是通过数量超过一定阈值的物品样本数据训练得到的,该物品样本数据包括不同形态的违禁品对应的X光图片。其中,违禁品的不同形态包括如枪支拆分成各个零部件的状态和刀具折叠的状态等。在一个优选的实施例中,上述基于卷积神经网络的深度学习模型可以通过Caffe深度学习框架实现。The deep learning model based on the convolutional neural network is trained by the sample sample data exceeding a certain threshold, and the sample sample data includes X-ray pictures corresponding to different forms of contraband. Among them, different forms of contraband include, for example, the state in which the gun is split into individual parts and the state in which the tool is folded. In a preferred embodiment, the above-described deep learning model based on convolutional neural networks can be implemented by the Caffe deep learning framework.
具体地,上述X光图片的数量越多越好,数据越多,训练生成的基于卷积神经网络的深度学习模型的通用性越好,如上述X光图片包括多种角度和多种穿透程度的各种违禁品的图片,这样有利于后续对待检测物的准确识别,克服外界环境因素的影响,提高该基于卷积神经网络的深度学习模型的识别能力。Specifically, the more the number of the above X-ray pictures is, the better, the more data, the better the versatility of the training-generated deep learning model based on the convolutional neural network, such as the above X-ray picture including multiple angles and multiple penetrations. The degree of various contraband pictures, which facilitates the accurate identification of subsequent detection objects, overcomes the influence of external environmental factors, and improves the recognition ability of the deep learning model based on convolutional neural networks.
该步骤S102具体包括:将预处理后的X光图像作为输入图像在预设的深度学习模型中包含的多个基层中依次进行特征训练,当训练完成后,提取多个集成中的全连接层或者其他指定基层输出的特征向量作为预处理后的X光图像中对应待检测的物品特征。The step S102 specifically includes: performing the feature training on the pre-processed X-ray image as an input image in a plurality of base layers included in the preset depth learning model, and extracting the multiple connectivity layers in the integration after the training is completed. Or other feature vectors that specify the output of the base layer as the feature of the item to be detected in the preprocessed X-ray image.
进一步地,为了简单且迅速处理图像特征,在步骤S102中根据预设的深度学习模型提取预处理后的X光图像中对应的待检测物的物品特征之前,还包括:Further, before the image feature is processed in a simple and rapid manner, the object feature of the corresponding object to be detected in the pre-processed X-ray image is extracted according to the preset depth learning model in step S102, and further includes:
根据预处理后的X光图像的灰度特性把预处理后的X光图像分为背景和模板两类,将使两类间的方差取得最大的参数作为最佳阈值;According to the gradation characteristics of the preprocessed X-ray image, the preprocessed X-ray image is divided into two types: background and template, and the parameter with the largest variance between the two types is taken as the optimal threshold;
利用该最佳阈值分割得到二值化图像,将该二值化图像作为预处理后的X光图像。The binarized image is obtained by the optimal threshold segmentation, and the binarized image is used as a preprocessed X-ray image.
在各种阈值优化分割方法中,OTSU算法提出基于类间方差最大化分割法被公认为是最佳阈值分割算法,它根据图像的灰度特性把图像分为背景和目标两类,然后计算让两类 间的方差取得最大的参数作为最佳阈值,再利用最佳阈值分割得到效果良好的二值化图像。Among various threshold optimization segmentation methods, OTSU algorithm proposes that the segmentation method based on the variance between classes is recognized as the optimal threshold segmentation algorithm. It divides the image into two categories according to the grayscale characteristics of the image, and then calculates The variance between the two types takes the largest parameter as the optimal threshold, and then uses the optimal threshold segmentation to obtain a good binarized image.
由此,通过上述二值化处理,将X光图像上的像素点的灰度值设置为0或者255,X光图像中数据量大为减少,图像处理速度可以大大降低。Thereby, by the above-described binarization processing, the gradation value of the pixel on the X-ray image is set to 0 or 255, the amount of data in the X-ray image is greatly reduced, and the image processing speed can be greatly reduced.
步骤S103,利用基于上述预设的深度学习模型训练的分类器对上述物品特征进行识别,生成对应待检测物的识别结果。Step S103: Identify the item feature by using a classifier trained based on the preset depth learning model to generate a recognition result corresponding to the object to be detected.
即将步骤102中提取的特征作为基于预设的深度学习模型训练的分类器的输入,通过该分类器识别后,获得最终的识别结果。具体地,识别结果为违禁品或者非违禁品,可以但不限于通过正确或者错误标识,及应用不同的图片标识,具体标识方法这里不作限定。The feature extracted in step 102 is used as an input of a classifier trained based on the preset depth learning model, and after the classifier recognizes, the final recognition result is obtained. Specifically, the identification result is a contraband or a non-prohibited item, and may be, but is not limited to, being correctly or incorrectly identified, and applying different picture identifiers. The specific identification method is not limited herein.
在一个可选的实施例中,步骤103中应用的分类器的训练过程包括:In an optional embodiment, the training process of the classifier applied in step 103 includes:
利用基于卷积神经网络的深度学习模型提取物品标本数据的深度特征;Depth feature of item specimen data is extracted by using a deep learning model based on convolutional neural network;
基于机器学习算法,对上述深度特征训练分类器;Training the classifier for the above depth feature based on a machine learning algorithm;
其中上述物品标本数据中包括指定的不同识别结果的X光图片。上述机器学习算法可以是邻近算法、最大期望算法及支持向量机算法等,具体算法可以根据具体情况选择,这里不作限定。The sample data of the above item includes an X-ray picture of the specified different recognition result. The above machine learning algorithm may be a neighboring algorithm, a maximum expectation algorithm, and a support vector machine algorithm. The specific algorithm may be selected according to a specific situation, which is not limited herein.
在一个可选的实施例中,上述物品标本数据包括三元组数据;其中该三元组数据包括:源数据、与源数据属于同一类别的正向数据以及与该源数据分属不同类别的反向数据。In an optional embodiment, the item specimen data includes triple data; wherein the triple data includes: source data, forward data belonging to the same category as the source data, and different categories from the source data. Reverse data.
其中,源数据为从物品样本数据中随机获取到的识别结果相同的样本数据。The source data is sample data with the same recognition result randomly obtained from the item sample data.
正向数据为从物品样本数据中随机获取的与源数据的识别结果一致的样本数据;该源数据的匹配度高于正向数据的匹配度。The forward data is sample data that is randomly obtained from the item sample data and is consistent with the recognition result of the source data; the matching degree of the source data is higher than the matching degree of the forward data.
反向数据为从物品样本数据中随机获取的与源数据的识别结果不一致的样本数据。The reverse data is sample data randomly acquired from the item sample data that is inconsistent with the recognition result of the source data.
在一个具体的实施例中,三元组数据分别为:物品样本数据中X光图像性能良好的第一图片(源数据),物品样本数据中拍摄的X光图像性能较差的第二图片(正向数据),以及与第一图片和第二图片识别结果不同的作为反向数据的第三图片。第一图片和第二图片的识别结果为违禁品,第二图片的识别结果为非违禁品。第二图片由于图像性能较差,如在清晰度和分辨率等方面与第一图片存在差距,其匹配度低于第一图片。第三图片则是在训练时进行反向对比的反向数据,一次通过正反对比,进一步增强了分类器的识别能力。In a specific embodiment, the triplet data is: a first picture (source data) with good X-ray image performance in the item sample data, and a second picture with poor performance of the X-ray image captured in the item sample data ( Forward data), and a third picture as reverse data different from the first picture and the second picture recognition result. The recognition result of the first picture and the second picture is a contraband, and the recognition result of the second picture is a non-prohibited item. The second picture has a poorer image performance, such as a difference in definition and resolution from the first picture, and the matching degree is lower than the first picture. The third picture is the reverse data of the reverse comparison during training, and the positive opposition ratio is used once, which further enhances the recognition ability of the classifier.
步骤S104,将上述待检测物的识别结果发送至安检终端,以使安检终端显示该识别结果。Step S104, the recognition result of the object to be detected is sent to the security check terminal, so that the security check terminal displays the recognition result.
具体地,该安检终端在接收到待检测物的识别结果后,在显示屏的显示界面进行渲染,以显示该识别结果。Specifically, after receiving the recognition result of the object to be detected, the security check terminal performs rendering on the display interface of the display screen to display the recognition result.
在本申请实施例提供的技术方案中,首先利用预处理减小外界环境因素的影响,然后通过基于卷积神经网络的深度学习模型提取物品特征,并利用该深度学习模型训练的分类 器对待检测物进行识别,这样实现了对违禁品的自动识别检测,且在提高识别效率的同时,有效保证了对违禁品识别的准确性,预防了安全隐患的发生。In the technical solution provided by the embodiment of the present application, the pre-processing is firstly used to reduce the influence of external environmental factors, and then the feature of the item is extracted by a deep learning model based on a convolutional neural network, and the classifier trained by the deep learning model is to be detected. The object is identified, which realizes the automatic identification and detection of contraband, and improves the recognition efficiency, effectively guarantees the accuracy of the contraband identification, and prevents the occurrence of security risks.
实施例二:Embodiment 2:
图2示出了本申请实施例提供的安检检测装置的结构示意图。如图2所示,该安检检测装置包括:FIG. 2 is a schematic structural diagram of a security detecting device provided by an embodiment of the present application. As shown in FIG. 2, the security detection device includes:
预处理模块11,配置成获取安检终端接收到的安检机内的X光机采集的X光图像,对该X光图像进行预处理,得到预处理后的X光图像;The pre-processing module 11 is configured to acquire an X-ray image acquired by the X-ray machine in the security inspection machine received by the security inspection terminal, and pre-process the X-ray image to obtain a pre-processed X-ray image;
特征提取模块12,配置成根据预设的深度学习模型提取上述预处理后的X光图像中对应的待检测物的物品特征,该预设的深度学习模型包括基于卷积神经网络的深度学习模型;The feature extraction module 12 is configured to extract an item feature of the corresponding to-be-detected object in the pre-processed X-ray image according to a preset depth learning model, where the preset depth learning model includes a deep learning model based on a convolutional neural network ;
结果识别模块13,配置成利用基于上述预设的深度学习模型训练的分类器对上述物品特征进行识别,生成对应待检测物的识别结果;The result identification module 13 is configured to identify the item feature by using a classifier trained based on the preset depth learning model to generate a recognition result corresponding to the object to be detected;
结果显示模块14,配置成将上述待检测物的识别结果发送至安检终端,以使安检终端显示该识别结果。The result display module 14 is configured to send the identification result of the object to be detected to the security check terminal, so that the security check terminal displays the recognition result.
上述基于卷积神经网络的深度学习模型是通过数量超过一定阈值的物品样本数据训练得到的,该物品样本数据包括不同形态的违禁品对应的X光图片。其中,违禁品的不同形态包括如枪支拆分成各个零部件的状态和刀具折叠的状态等。在一个优选的实施例中,上述基于卷积神经网络的深度学习模型可以通过Caffe深度学习框架实现。The deep learning model based on the convolutional neural network is trained by the sample sample data exceeding a certain threshold, and the sample sample data includes X-ray pictures corresponding to different forms of contraband. Among them, different forms of contraband include, for example, the state in which the gun is split into individual parts and the state in which the tool is folded. In a preferred embodiment, the above-described deep learning model based on convolutional neural networks can be implemented by the Caffe deep learning framework.
在本申请实施例提供的技术方案中,首先利用预处理减小外界环境因素的影响,然后通过基于卷积神经网络的深度学习模型提取物品特征,并利用该深度学习模型训练的分类器对待检测物进行识别,这样实现了对违禁品的自动识别检测,且在提高识别效率的同时,有效保证了对违禁品识别的准确性,预防了安全隐患的发生。In the technical solution provided by the embodiment of the present application, the pre-processing is firstly used to reduce the influence of external environmental factors, and then the feature of the item is extracted by a deep learning model based on a convolutional neural network, and the classifier trained by the deep learning model is to be detected. The object is identified, which realizes the automatic identification and detection of contraband, and improves the recognition efficiency, effectively guarantees the accuracy of the contraband identification, and prevents the occurrence of security risks.
实施例三:Embodiment 3:
图3示出了本申请实施例提供的安检检测系统的通信连接图。如图3所示,该安检检测系统包括:包括安检机400、安检终端500及安检识别设备600,该安检机的安检箱内设置有X光机700,安检识别设备包括如实施例二中的安检检测装置;X光机和安检识别设备分别与安检终端连接。FIG. 3 is a diagram showing the communication connection of the security detection system provided by the embodiment of the present application. As shown in FIG. 3, the security detection system includes: a security inspection machine 400, a security inspection terminal 500, and a security identification device 600. The security inspection box of the security inspection machine is provided with an X-ray machine 700, and the security identification device includes the second embodiment as in the second embodiment. The security inspection device; the X-ray machine and the security identification device are respectively connected with the security inspection terminal.
X光机,配置成采集经过安检机的安检通道的待检测物的X光图像,将该X光图像发送至所述安检终端。The X-ray machine is configured to collect an X-ray image of the object to be detected passing through the security inspection channel of the security inspection machine, and send the X-ray image to the security inspection terminal.
安检终端,配置成当监听到接收的上述X光图像时,将X光图像发送至安检识别设备;还配置成接收安检识别设备发送的待检测物的识别结果,将该识别结果通过显示屏显示。The security check terminal is configured to send the X-ray image to the security identification device when the received X-ray image is received, and configured to receive the recognition result of the object to be detected sent by the security identification device, and display the recognition result through the display screen .
在本申请实施例提供的技术方案中,首先利用预处理减小外界环境因素的影响,然后通过基于卷积神经网络的深度学习模型提取物品特征,并利用该深度学习模型训练的分类器对待检测物进行识别,这样实现了对违禁品的自动识别检测,且在提高识别效率的同时,有效保证了对违禁品识别的准确性,预防了安全隐患的发生。In the technical solution provided by the embodiment of the present application, the pre-processing is firstly used to reduce the influence of external environmental factors, and then the feature of the item is extracted by a deep learning model based on a convolutional neural network, and the classifier trained by the deep learning model is to be detected. The object is identified, which realizes the automatic identification and detection of contraband, and improves the recognition efficiency, effectively guarantees the accuracy of the contraband identification, and prevents the occurrence of security risks.
在一个可选的实施例中,上述识别结果包括违禁品和非违禁品两种类型;上述安检检测系统还包括报警装置800,该报警装置与安检终端连接。In an optional embodiment, the identification result includes two types: contraband and non-prohibited; the security detection system further includes an alarm device 800, and the alarm device is connected to the security terminal.
具体地,该安检终端还配置成当接收到的上述识别结果为违禁品时,发送报警信号至报警装置,以使报警装置进行报警提示。其中报警装置的报警方式包括灯光报警、语音报警或者图文显示报警。Specifically, the security check terminal is further configured to send an alarm signal to the alarm device when the received recognition result is a contraband, so that the alarm device performs an alarm prompt. The alarm mode of the alarm device includes a light alarm, a voice alarm or a graphic display alarm.
在另一个可选的实施例中,安检机的安检通道的底部设置有压力传感器900,该压力传感器与安检终端连接。In another alternative embodiment, the bottom of the security inspection channel of the security machine is provided with a pressure sensor 900 that is coupled to the security terminal.
压力传感器配置成采集安检通道上承受的压力信息,将压力信息发送至安检终端。安检终端还配置成根据该压力信息开启或者关闭X光机。The pressure sensor is configured to collect pressure information on the security channel and send the pressure information to the security terminal. The security terminal is also configured to turn the X-ray machine on or off based on the pressure information.
具体地,当安检通道空载时读取压力传感器的压力数值,将该压力数值作为压力阈值,当安检终端接收到的压力传感器发送的压力信息超过该压力阈值时,说明有待检测物将要通过安检通道,则开启X光机,以使该X光机采集待检测物的X光图像。当安检终端接收到的压力传感器发送的压力信息恢复到该压力阈值时,说明待检测物已经从安检通道上被取走,关闭该X光机。这样,实现了X光机的自动打开与关闭,起到了节约能源和延长机器使用寿命的作用。Specifically, when the security check channel is idling, the pressure value of the pressure sensor is read, and the pressure value is used as the pressure threshold. When the pressure information sent by the pressure sensor received by the security check terminal exceeds the pressure threshold, the object to be detected is to pass the security check. For the channel, the X-ray machine is turned on so that the X-ray machine collects an X-ray image of the object to be detected. When the pressure information sent by the pressure sensor received by the security check terminal is restored to the pressure threshold, it indicates that the object to be detected has been taken away from the security inspection channel, and the X-ray machine is turned off. In this way, the automatic opening and closing of the X-ray machine is realized, which saves energy and prolongs the service life of the machine.
在一个实施例中,上述安检识别设备包括Nvidia Jetson TX2芯片,该芯片在低功耗的同时保持了强大的运算能力,可以实现在毫秒级识别X光图片中的违禁物品。整个核心仅有信用卡大小,既可在不对现有X光机进行改造的基础上实现违禁品的实时识别,又可与X光机整合在一起提供识别服务。In one embodiment, the security identification device includes the Nvidia Jetson TX2 chip, which maintains a powerful computing power while achieving low power consumption, and can realize the identification of prohibited items in the X-ray picture at the millisecond level. The entire core is only the size of a credit card, which can realize the real-time identification of contraband without modifying the existing X-ray machine, and can be integrated with the X-ray machine to provide identification service.
实施例四:Embodiment 4:
参见图4,本申请实施例还提供一种电子设备100,包括:处理器40,存储器41,总线42和通信接口43,所述处理器40、通信接口43和存储器41通过总线42连接;处理器40配置成执行存储器41中存储的可执行模块,例如计算机程序。Referring to FIG. 4, an embodiment of the present application further provides an electronic device 100, including: a processor 40, a memory 41, a bus 42 and a communication interface 43. The processor 40, the communication interface 43 and the memory 41 are connected by a bus 42; The processor 40 is configured to execute an executable module, such as a computer program, stored in the memory 41.
其中,存储器41可能包含高速随机存取存储器(RAM,Random Access Memory),也可能还包括非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。通过至少一个通信接口43(可以是有线或者无线)实现该系统网元与至少一个其他网元之间的通信连接,可以使用互联网,广域网,本地网,城域网等。The memory 41 may include a high-speed random access memory (RAM), and may also include a non-volatile memory, such as at least one disk storage. The communication connection between the system network element and at least one other network element is implemented by at least one communication interface 43 (which may be wired or wireless), and may use an Internet, a wide area network, a local network, a metropolitan area network, or the like.
总线42可以是ISA总线、PCI总线或EISA总线等。所述总线可以分为地址总线、数据总线和控制总线等。为便于表示,图4中仅用一个双向箭头表示,但并不表示仅有一根总线或一种类型的总线。The bus 42 can be an ISA bus, a PCI bus, or an EISA bus. The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one double-headed arrow is shown in Figure 4, but it does not mean that there is only one bus or one type of bus.
其中,存储器41配置成存储程序,所述处理器40在接收到执行指令后,执行所述程序,前述本申请实施例任一实施例揭示的流过程定义的装置所执行的方法可以应用于处理器40中,或者由处理器40实现。The memory 41 is configured to store a program, and the processor 40 executes the program after receiving the execution instruction, and the method executed by the device defined by the flow process disclosed in any of the foregoing embodiments of the present application may be applied to the processing. In processor 40, or implemented by processor 40.
处理器40可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器40中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器40可以是通用处理器,包括中央处理器(Central Processing Unit,简称CPU)和网络处理器(Network Processor,简称NP)等;还可以是数字信号处理器(Digital Signal Processing,简称DSP)、专用集成电路(Application Specific Integrated Circuit,简称ASIC)、现成可编程门阵列(Field-Programmable Gate Array,简称FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件和/或分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器、闪存、只读存储器、可编程只读存储器、电可擦写可编程存储器和/或寄存器等本领域成熟的存储介质中。该存储介质位于存储器41,处理器40读取存储器41中的信息,结合其硬件完成上述方法的步骤。 Processor 40 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 40 or an instruction in a form of software. The processor 40 may be a general-purpose processor, including a central processing unit (CPU) and a network processor (NP), and may also be a digital signal processor (DSP). ), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device and/or discrete hardware component. The methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed. The general purpose processor may be a microprocessor or the processor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly implemented by the hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor. The software modules can be located in conventional storage media such as random access memory, flash memory, read only memory, programmable read only memory, electrically erasable programmable memory, and/or registers. The storage medium is located in the memory 41, and the processor 40 reads the information in the memory 41 and performs the steps of the above method in combination with its hardware.
本申请实施例提供的安检检测装置、系统及电子设备,与上述实施例提供的安检检测方法具有相同的技术特征,所以也能解决相同的技术问题,达到相同的技术效果。The security detection device, system and electronic device provided by the embodiments of the present application have the same technical features as the security detection detection method provided by the above embodiments, so that the same technical problem can be solved and the same technical effects can be achieved.
本申请实施例所提供的进行安检检测方法的计算机程序产品,包括存储了处理器可执行的非易失的程序代码的计算机可读存储介质,所述程序代码包括的指令可配置成执行前面方法实施例中所述的方法,具体实现可参见方法实施例,在此不再赘述。A computer program product for performing a security detection method provided by an embodiment of the present application, comprising a computer readable storage medium storing non-volatile program code executable by a processor, the program code comprising instructions configurable to execute the foregoing method For the specific implementation of the method in the embodiment, refer to the method embodiment, and details are not described herein again.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的装置、系统及电子设备的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。A person skilled in the art can clearly understand that, for the convenience and brevity of the description, the specific working process of the device, the system and the electronic device described above can refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
附图中的流程图和框图显示了根据本申请的多个实施例方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个配置成实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框 图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。此外,术语“第一”、“第二”或“第三”仅用于描述目的,而不能理解为指示或暗示相对重要性。The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of methods and computer program products according to various embodiments of the present application. In this regard, each block of the flowchart or block diagram can represent a module, a program segment, or a portion of code that comprises one or more of the Executable instructions. It should also be noted that in some alternative implementations, the functions noted in the blocks may also occur in a different order than that illustrated in the drawings. For example, two consecutive blocks may be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending upon the functionality involved. It is also noted that each block of the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts, can be implemented in a dedicated hardware-based system that performs the specified function or function. Or it can be implemented by a combination of dedicated hardware and computer instructions. Moreover, the terms "first", "second" or "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,又例如,多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些通信接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. The device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner. For example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some communication interface, device or unit, and may be electrical, mechanical or otherwise.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个处理器可执行的非易失的计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The functions, if implemented in the form of software functional units and sold or used as separate products, may be stored in a non-transitory computer readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application, which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including The instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
最后应说明的是:以上所述实施例,仅为本申请的具体实施方式,用以说明本申请的技术方案,而非对其限制,本申请的保护范围并不局限于此,尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,其依然可以对前述实施例所记载的技术方案进行修改或可轻易想到变化,或者对其中部分技术特征进行等同替换;而这些修改、变化或者替换,并不使相应技术方案的本质脱离本申请实施例技术方案的精神和范围,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。Finally, it should be noted that the above-mentioned embodiments are only specific embodiments of the present application, and are used to explain the technical solutions of the present application, and are not limited thereto. The scope of protection of the present application is not limited thereto, although reference is made to the foregoing. The present invention has been described in detail with reference to the embodiments of the present invention. It will be understood by those skilled in the art that the technical solutions described in the foregoing embodiments can still be modified within the technical scope of the present disclosure. The changes may be easily conceived, or equivalently substituted for some of the technical features; and the modifications, variations, or substitutions of the present invention are not intended to depart from the spirit and scope of the technical solutions of the embodiments of the present application. Within the scope of protection. Therefore, the scope of protection of the present application should be determined by the scope of the claims.
Claims (10)
- 一种安检检测方法,其特征在于,包括:A security detection method, characterized in that it comprises:获取安检终端接收到的安检机内的X光机采集的X光图像,对所述X光图像进行预处理,得到预处理后的X光图像;Obtaining an X-ray image acquired by an X-ray machine in the security inspection machine received by the security inspection terminal, and pre-processing the X-ray image to obtain a pre-processed X-ray image;根据预设的深度学习模型提取所述预处理后的X光图像中对应的待检测物的物品特征,所述预设的深度学习模型包括基于卷积神经网络的深度学习模型;Extracting an item feature of the corresponding to-be-detected object in the pre-processed X-ray image according to a preset depth learning model, where the preset depth learning model includes a deep learning model based on a convolutional neural network;利用基于所述预设的深度学习模型训练的分类器对所述物品特征进行识别,生成对应所述待检测物的识别结果;Identifying, by the classifier trained based on the preset depth learning model, the item feature, and generating a recognition result corresponding to the object to be detected;将所述待检测物的识别结果发送至所述安检终端,以使所述安检终端显示所述识别结果。And transmitting the identification result of the object to be detected to the security check terminal, so that the security check terminal displays the recognition result.
- 根据权利要求1所述的方法,其特征在于,所述对所述X光图像进行预处理,包括:The method according to claim 1, wherein the preprocessing the X-ray image comprises:采用邻域平均法对采集的所述X光图像进行平滑去噪,得到平滑去噪后的X光图像;The collected X-ray image is smoothed and denoised by a neighborhood averaging method to obtain a smooth and denoised X-ray image;采用直方图均衡法对所述平滑去噪后的图像的边缘信息进行增强,得到预处理后的X光图像。The edge information of the smoothed and denoised image is enhanced by a histogram equalization method to obtain a preprocessed X-ray image.
- 根据权利要求1所述的方法,其特征在于,所述基于卷积神经网络的深度学习模型是通过数量超过一定阈值的物品样本数据训练得到的,所述物品样本数据包括不同形态的违禁品对应的图片。The method according to claim 1, wherein the deep learning model based on a convolutional neural network is trained by an item sample data exceeding a certain threshold, the item sample data including contraband corresponding to different forms. picture of.
- 根据权利要求1所述的方法,其特征在于,所述分类器的训练过程包括:The method of claim 1 wherein the training process of the classifier comprises:利用基于卷积神经网络的深度学习模型提取物品标本数据的深度特征;Depth feature of item specimen data is extracted by using a deep learning model based on convolutional neural network;基于机器学习算法,对所述深度特征训练分类器;Training a classifier for the depth feature based on a machine learning algorithm;其中所述物品标本数据中包括指定的不同识别结果的X光图片。The item specimen data includes an X-ray picture of the specified different recognition result.
- 一种安检检测装置,其特征在于,包括:A security detection device, comprising:预处理模块,配置成获取安检终端接收到的安检机内的X光机采集的X光图像,对所述X光图像进行预处理,得到预处理后的X光图像;The pre-processing module is configured to obtain an X-ray image acquired by the X-ray machine in the security inspection machine received by the security inspection terminal, and pre-process the X-ray image to obtain a pre-processed X-ray image;特征提取模块,配置成根据预设的深度学习模型提取所述预处理后的X光图像中对应的待检测物的物品特征,所述预设的深度学习模型包括基于卷积神经网络的深度学习模型;a feature extraction module, configured to extract an item feature of the corresponding to-be-detected object in the pre-processed X-ray image according to a preset depth learning model, where the preset depth learning model includes deep learning based on a convolutional neural network model;结果识别模块,配置成利用基于所述预设的深度学习模型训练的分类器对所述物品特征进行识别,生成对应所述待检测物的识别结果;a result identifying module configured to identify the item feature by using a classifier trained based on the preset depth learning model to generate a recognition result corresponding to the object to be detected;结果显示模块,配置成将所述待检测物的识别结果发送至所述安检终端,以使所述安检终端显示所述识别结果。And a result display module configured to send the identification result of the object to be detected to the security check terminal, so that the security check terminal displays the recognition result.
- 一种安检检测系统,其特征在于,包括安检机、安检终端及安检识别设备,所述安检机的安检箱内设置有X光机,所述安检识别设备包括如权利要求5所述的安检检测装置;所述X光机和所述安检识别设备分别与所述安检终端连接;A security inspection system, comprising: a security inspection machine, a security inspection terminal and a security identification device, wherein the security inspection box of the security inspection machine is provided with an X-ray machine, and the security identification device comprises the security inspection according to claim 5. a device; the X-ray machine and the security identification device are respectively connected to the security check terminal;所述X光机,配置成采集经过所述安检机的安检通道的待检测物的X光图像,将所述X光图像发送至所述安检终端;The X-ray machine is configured to collect an X-ray image of the object to be detected passing through the security inspection channel of the security inspection machine, and send the X-ray image to the security inspection terminal;所述安检终端,配置成当监听到接收的所述X光图像时,将所述X光图像发送至安检识别设备;还配置成接收所述安检识别设备发送的所述待检测物的识别结果,将所述识别结果通过显示屏显示。The security check terminal is configured to send the X-ray image to the security identification device when the received X-ray image is received, and configured to receive the recognition result of the object to be detected sent by the security identification device And displaying the recognition result through a display screen.
- 根据权利要求6所述的系统,其特征在于,所述识别结果包括违禁品和非违禁品两种类型;所述系统还包括报警装置,所述报警装置与所述安检终端连接;The system according to claim 6, wherein said identification result comprises two types of contraband and non-prohibited items; said system further comprising an alarm device, said alarm device being connected to said security check terminal;所述安检终端,还配置成当接收到的所述识别结果为违禁品时,发送报警信号至所述报警装置,以使所述报警装置进行报警提示。The security terminal is further configured to send an alarm signal to the alarm device when the received recognition result is a contraband, so that the alarm device performs an alarm prompt.
- 根据权利要求6所述的系统,其特征在于,所述安检机的安检通道的底部设置有压力传感器,所述压力传感器与所述安检终端连接;The system according to claim 6, wherein a bottom of the security inspection channel of the security inspection machine is provided with a pressure sensor, and the pressure sensor is connected to the security inspection terminal;所述压力传感器,配置成采集所述安检通道上承受的压力信息,将所述压力信息发送至所述安检终端;The pressure sensor is configured to collect pressure information received on the security inspection channel, and send the pressure information to the security inspection terminal;所述安检终端,还配置成根据所述压力信息开启或者关闭所述X光机。The security terminal is further configured to turn the X-ray machine on or off according to the pressure information.
- 根据权利要求6-8任一项所述的系统,其特征在于,所述安检识别设备包括Nvidia Jetson TX2芯片。The system of any of claims 6-8, wherein the security identification device comprises an Nvidia Jetson TX2 chip.
- 一种电子设备,包括存储器和处理器,所述存储器上存储有可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现上述权利要求1至4任一项所述的方法。An electronic device comprising a memory and a processor having stored thereon a computer program executable on the processor, wherein the processor executes the computer program to implement the above claims 1 to 4 The method of any of the preceding claims.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711126618.2 | 2017-11-14 | ||
CN201711126618.2A CN107871122A (en) | 2017-11-14 | 2017-11-14 | Safety check detection method, device, system and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019096181A1 true WO2019096181A1 (en) | 2019-05-23 |
Family
ID=61753983
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/115498 WO2019096181A1 (en) | 2017-11-14 | 2018-11-14 | Detection method, apparatus and system for security inspection, and electronic device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107871122A (en) |
WO (1) | WO2019096181A1 (en) |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110197480A (en) * | 2019-05-29 | 2019-09-03 | 江汉大学 | Detection method, device and the readable storage medium storing program for executing of Cr VI |
CN110222675A (en) * | 2019-07-02 | 2019-09-10 | 同略科技有限公司 | A kind of police strength dispatching method, system, terminal and storage medium |
CN110781812A (en) * | 2019-10-24 | 2020-02-11 | 谷琛 | Method for automatically identifying target object by security check instrument based on machine learning |
CN111310635A (en) * | 2020-02-10 | 2020-06-19 | 上海应用技术大学 | Security inspection contraband identification system and method based on TensorFlow |
CN111311470A (en) * | 2020-02-20 | 2020-06-19 | 苏州颢裕智能科技有限公司 | Mail package safety early warning monitoring method |
CN111323835A (en) * | 2020-03-20 | 2020-06-23 | 安徽启新明智科技有限公司 | Security inspection method and device based on personal bag association |
CN111382725A (en) * | 2020-04-01 | 2020-07-07 | 上海东普信息科技有限公司 | Method, device, equipment and storage medium for processing illegal express packages |
CN111815616A (en) * | 2020-07-21 | 2020-10-23 | 山西卡斯特网络科技有限公司 | Method for detecting dangerous goods in X-ray security inspection image based on deep learning |
CN111861330A (en) * | 2020-07-22 | 2020-10-30 | 南京奥拓电子科技有限公司 | Contraband identification and security inspection method and express delivery cabinet device |
CN111985497A (en) * | 2020-07-21 | 2020-11-24 | 国网山东省电力公司电力科学研究院 | Method and system for identifying crane operation under overhead transmission line |
CN112069907A (en) * | 2020-08-11 | 2020-12-11 | 盛视科技股份有限公司 | X-ray machine image recognition method, device and system based on example segmentation |
CN112084809A (en) * | 2019-06-12 | 2020-12-15 | 同方威视科技江苏有限公司 | Bearing mechanism, security check system, method, storage medium and electronic equipment |
CN112362656A (en) * | 2020-09-29 | 2021-02-12 | 江西鹭鹭行科技有限公司 | Pre-security inspection method, system, readable storage medium and pre-security inspection equipment |
CN112954003A (en) * | 2021-01-25 | 2021-06-11 | 鼎电智能科技(江苏)有限公司 | System for intelligent identification of security inspection contraband |
CN113139950A (en) * | 2021-05-08 | 2021-07-20 | 佳都科技集团股份有限公司 | Target object identification method and device |
CN113281814A (en) * | 2021-06-23 | 2021-08-20 | 重庆世纪科怡科技股份有限公司 | Security inspection device based on image recognition and security inspection method thereof |
CN113554598A (en) * | 2021-06-24 | 2021-10-26 | 浙江大华技术股份有限公司 | Article detection method, article detection device, electronic equipment and computer-readable storage medium |
CN113570543A (en) * | 2021-05-27 | 2021-10-29 | 浙江大华技术股份有限公司 | Security check package identification method, system, storage medium and equipment |
CN113657493A (en) * | 2021-08-17 | 2021-11-16 | 北京理工大学 | Method for detecting contraband in X-ray security inspection image based on attention of style characteristic channel |
CN113706497A (en) * | 2021-08-24 | 2021-11-26 | 南京金盾公共安全技术研究院有限公司 | Intelligent contraband identification device and system |
CN113822341A (en) * | 2021-08-31 | 2021-12-21 | 成都智元汇信息技术股份有限公司 | Graph judging client of centralized graph judging system for subway security check and working method of graph judging client |
CN113920285A (en) * | 2021-09-03 | 2022-01-11 | 浙江大华技术股份有限公司 | Article detection method, apparatus, electronic apparatus, and storage medium |
CN113971443A (en) * | 2021-10-29 | 2022-01-25 | 成都智元汇信息技术股份有限公司 | Image processing method, device and system for intelligent image judgment |
CN114332030A (en) * | 2021-12-30 | 2022-04-12 | 华中科技大学 | Valve body weld X-ray image denoising method, system and device |
CN114459971A (en) * | 2022-01-12 | 2022-05-10 | 武汉怡特环保科技有限公司 | Online operation and maintenance method and system for beta-ray method particle analyzer |
CN114660097A (en) * | 2022-03-23 | 2022-06-24 | 成都智元汇信息技术股份有限公司 | Synchronous correction method and system based on double sources and double visual angles |
CN114898131A (en) * | 2022-06-17 | 2022-08-12 | 北京师范大学 | Contraband detection method and system based on natural guidance and data enhancement |
CN115389532A (en) * | 2021-05-07 | 2022-11-25 | 顺丰科技有限公司 | Article safety inspection method and device, computer equipment and storage medium |
CN115718888A (en) * | 2022-11-29 | 2023-02-28 | 同方威视技术股份有限公司 | Trace substance detection method, detection device, electronic device, and medium |
CN117409199A (en) * | 2023-10-19 | 2024-01-16 | 中南大学 | Growing intelligent security inspection system and method based on cloud big data technology |
CN117422881A (en) * | 2023-11-15 | 2024-01-19 | 山东衡昊信息技术有限公司 | Intelligent centralized security check graph judging system |
CN117495861A (en) * | 2024-01-02 | 2024-02-02 | 同方威视科技江苏有限公司 | Security check image checking method and device |
WO2024114440A1 (en) * | 2022-12-01 | 2024-06-06 | 同方威视技术股份有限公司 | Online training method, security inspection image identification method and apparatus, device, and medium |
CN118365990A (en) * | 2024-06-19 | 2024-07-19 | 浙江啄云智能科技有限公司 | Model training method and device applied to contraband detection and electronic equipment |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107871122A (en) * | 2017-11-14 | 2018-04-03 | 深圳码隆科技有限公司 | Safety check detection method, device, system and electronic equipment |
CN108519625A (en) * | 2018-04-08 | 2018-09-11 | 安徽理工大学 | Recognizable prohibited items safe examination system based on ray technology and deep learning |
CN109001833A (en) * | 2018-06-22 | 2018-12-14 | 天和防务技术(北京)有限公司 | A kind of Terahertz hazardous material detection method based on deep learning |
CN108830276A (en) * | 2018-07-02 | 2018-11-16 | 合肥格泉智能科技有限公司 | A kind of intelligent identifying system based on X-ray machine image |
CN110261923B (en) * | 2018-08-02 | 2024-04-26 | 浙江大华技术股份有限公司 | Contraband detection method and device |
CN109101937A (en) * | 2018-08-22 | 2018-12-28 | 海尔优家智能科技(北京)有限公司 | Item identification method, device, cloud server, intelligent appliance equipment and system |
CN109086740B (en) * | 2018-08-25 | 2019-08-23 | 上海首安工程技术有限公司 | Stagewise ferry safety check mechanism |
CN111103629A (en) * | 2018-10-25 | 2020-05-05 | 杭州海康威视数字技术股份有限公司 | Target detection method and device, NVR (network video recorder) equipment and security check system |
CN109584339A (en) * | 2018-12-04 | 2019-04-05 | 中国民航大学 | A kind of safety check contraband x-ray image generation method based on production confrontation network |
CN109884721A (en) * | 2018-12-10 | 2019-06-14 | 深圳极视角科技有限公司 | Safety check prohibited items detection method, device and electronic equipment based on artificial intelligence |
CN111435119A (en) * | 2019-01-11 | 2020-07-21 | 合肥美亚光电技术股份有限公司 | X-ray foreign matter detection system and method based on block chain and computer equipment |
CN109975332A (en) * | 2019-02-25 | 2019-07-05 | 北京声迅电子股份有限公司 | A kind of intelligent quality testing system applied to X-ray machine |
CN109978827A (en) * | 2019-02-25 | 2019-07-05 | 平安科技(深圳)有限公司 | Violated object recognition methods, device, equipment and storage medium based on artificial intelligence |
CN109946746A (en) * | 2019-03-21 | 2019-06-28 | 长安大学 | A kind of safe examination system and method based on deep neural network |
CN109948565B (en) * | 2019-03-26 | 2021-05-25 | 浙江啄云智能科技有限公司 | Method for detecting contraband in postal industry without opening box |
CN110059618A (en) * | 2019-04-17 | 2019-07-26 | 北京易达图灵科技有限公司 | A kind of recognition methods of prohibited items and device |
CN110163191B (en) * | 2019-06-17 | 2021-04-02 | 北京航星机器制造有限公司 | Intelligent identification method and system for dangerous goods and safety inspection system for dangerous goods |
CN110378912B (en) * | 2019-07-12 | 2021-11-16 | 深圳码隆科技有限公司 | Package detection method and device, computer readable storage medium and computer equipment |
CN110286415B (en) * | 2019-07-12 | 2021-03-16 | 广东工业大学 | Security inspection contraband detection method, device, equipment and computer readable storage medium |
CN110794466A (en) * | 2019-07-16 | 2020-02-14 | 中云智慧(北京)科技有限公司 | X-ray machine picture acquisition auxiliary device and processing method |
CN110580710A (en) * | 2019-08-21 | 2019-12-17 | 深圳码隆科技有限公司 | object tracking method, device, computer readable storage medium and computer equipment |
CN110738096A (en) * | 2019-08-23 | 2020-01-31 | 银河水滴科技(北京)有限公司 | intelligent security inspection method, equipment and computer readable storage medium |
CN110543857A (en) * | 2019-09-05 | 2019-12-06 | 安徽启新明智科技有限公司 | Contraband identification method, device and system based on image analysis and storage medium |
CN110850493A (en) * | 2019-10-24 | 2020-02-28 | 武汉艾崴科技有限公司 | Linear array high-speed security inspection machine for visual image judgment of scanning imaging machine |
CN111126447A (en) * | 2019-11-29 | 2020-05-08 | 中国船舶重工集团公司第七一三研究所 | Intelligent passenger security check luggage image automatic identification method |
CN111126238B (en) * | 2019-12-19 | 2023-06-20 | 华南理工大学 | X-ray security inspection system and method based on convolutional neural network |
CN111167733A (en) * | 2020-01-14 | 2020-05-19 | 东莞理工学院 | Automatic visual defect detection system |
CN111901577A (en) * | 2020-01-15 | 2020-11-06 | 吴庆芹 | Instant projection system based on signal analysis and corresponding terminal |
CN113640321B (en) * | 2020-05-11 | 2024-04-02 | 同方威视技术股份有限公司 | Security inspection delay optimization method and equipment |
CN111665572A (en) * | 2020-05-30 | 2020-09-15 | 中国船舶重工集团公司第七一三研究所 | Airport passenger security inspection intelligent auxiliary system and method based on X-ray machine image |
JP7422023B2 (en) * | 2020-07-03 | 2024-01-25 | 株式会社日立ソリューションズ | X-ray image processing device and X-ray image processing method |
CN113436151A (en) * | 2021-06-07 | 2021-09-24 | 中国铁道科学研究院集团有限公司电子计算技术研究所 | Security check method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103744120A (en) * | 2013-12-30 | 2014-04-23 | 中云智慧(北京)科技有限公司 | Method and device for assisting identification of contraband |
CN106250936A (en) * | 2016-08-16 | 2016-12-21 | 广州麦仑信息科技有限公司 | Multiple features multithreading safety check contraband automatic identifying method based on machine learning |
CN106485268A (en) * | 2016-09-27 | 2017-03-08 | 东软集团股份有限公司 | A kind of image-recognizing method and device |
CN106886054A (en) * | 2017-04-13 | 2017-06-23 | 西安邮电大学 | Dangerous material automatic identification equipment and method based on 3 D X-ray imaging |
CN107871122A (en) * | 2017-11-14 | 2018-04-03 | 深圳码隆科技有限公司 | Safety check detection method, device, system and electronic equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103308538A (en) * | 2013-06-17 | 2013-09-18 | 开平市中铝实业有限公司 | Security check system for bus |
CN205210316U (en) * | 2015-11-18 | 2016-05-04 | 上海英迈吉东影图像设备有限公司 | Security check machine with energy -conserving function |
US10832136B2 (en) * | 2016-05-18 | 2020-11-10 | Nec Corporation | Passive pruning of filters in a convolutional neural network |
CN106198580A (en) * | 2016-08-26 | 2016-12-07 | 合肥丁点网络科技有限责任公司 | A kind of X-ray screening machine luggage dangerous materials fast automatic detecting alarm device and method |
-
2017
- 2017-11-14 CN CN201711126618.2A patent/CN107871122A/en active Pending
-
2018
- 2018-11-14 WO PCT/CN2018/115498 patent/WO2019096181A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103744120A (en) * | 2013-12-30 | 2014-04-23 | 中云智慧(北京)科技有限公司 | Method and device for assisting identification of contraband |
CN106250936A (en) * | 2016-08-16 | 2016-12-21 | 广州麦仑信息科技有限公司 | Multiple features multithreading safety check contraband automatic identifying method based on machine learning |
CN106485268A (en) * | 2016-09-27 | 2017-03-08 | 东软集团股份有限公司 | A kind of image-recognizing method and device |
CN106886054A (en) * | 2017-04-13 | 2017-06-23 | 西安邮电大学 | Dangerous material automatic identification equipment and method based on 3 D X-ray imaging |
CN107871122A (en) * | 2017-11-14 | 2018-04-03 | 深圳码隆科技有限公司 | Safety check detection method, device, system and electronic equipment |
Cited By (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110197480A (en) * | 2019-05-29 | 2019-09-03 | 江汉大学 | Detection method, device and the readable storage medium storing program for executing of Cr VI |
CN112084809A (en) * | 2019-06-12 | 2020-12-15 | 同方威视科技江苏有限公司 | Bearing mechanism, security check system, method, storage medium and electronic equipment |
CN110222675A (en) * | 2019-07-02 | 2019-09-10 | 同略科技有限公司 | A kind of police strength dispatching method, system, terminal and storage medium |
CN110781812A (en) * | 2019-10-24 | 2020-02-11 | 谷琛 | Method for automatically identifying target object by security check instrument based on machine learning |
CN111310635A (en) * | 2020-02-10 | 2020-06-19 | 上海应用技术大学 | Security inspection contraband identification system and method based on TensorFlow |
CN111310635B (en) * | 2020-02-10 | 2024-04-19 | 上海应用技术大学 | TensorFlow-based security inspection contraband identification system and TensorFlow-based security inspection contraband identification method |
CN111311470A (en) * | 2020-02-20 | 2020-06-19 | 苏州颢裕智能科技有限公司 | Mail package safety early warning monitoring method |
CN111311470B (en) * | 2020-02-20 | 2023-04-07 | 苏州颢裕智能科技有限公司 | Mail package safety early warning monitoring method |
CN111323835A (en) * | 2020-03-20 | 2020-06-23 | 安徽启新明智科技有限公司 | Security inspection method and device based on personal bag association |
CN111382725A (en) * | 2020-04-01 | 2020-07-07 | 上海东普信息科技有限公司 | Method, device, equipment and storage medium for processing illegal express packages |
CN111382725B (en) * | 2020-04-01 | 2023-04-07 | 上海东普信息科技有限公司 | Method, device, equipment and storage medium for processing illegal express packages |
CN111985497A (en) * | 2020-07-21 | 2020-11-24 | 国网山东省电力公司电力科学研究院 | Method and system for identifying crane operation under overhead transmission line |
CN111815616A (en) * | 2020-07-21 | 2020-10-23 | 山西卡斯特网络科技有限公司 | Method for detecting dangerous goods in X-ray security inspection image based on deep learning |
CN111985497B (en) * | 2020-07-21 | 2023-09-26 | 国网山东省电力公司电力科学研究院 | Crane operation identification method and system under overhead transmission line |
CN111861330A (en) * | 2020-07-22 | 2020-10-30 | 南京奥拓电子科技有限公司 | Contraband identification and security inspection method and express delivery cabinet device |
CN112069907A (en) * | 2020-08-11 | 2020-12-11 | 盛视科技股份有限公司 | X-ray machine image recognition method, device and system based on example segmentation |
CN112362656B (en) * | 2020-09-29 | 2024-01-30 | 江西鹭鹭行科技有限公司 | Pre-security inspection method, system, readable storage medium and pre-security inspection equipment |
CN112362656A (en) * | 2020-09-29 | 2021-02-12 | 江西鹭鹭行科技有限公司 | Pre-security inspection method, system, readable storage medium and pre-security inspection equipment |
CN112954003B (en) * | 2021-01-25 | 2023-10-13 | 鼎电智能科技(江苏)有限公司 | Intelligent security inspection forbidden article identification system |
CN112954003A (en) * | 2021-01-25 | 2021-06-11 | 鼎电智能科技(江苏)有限公司 | System for intelligent identification of security inspection contraband |
CN115389532A (en) * | 2021-05-07 | 2022-11-25 | 顺丰科技有限公司 | Article safety inspection method and device, computer equipment and storage medium |
CN113139950B (en) * | 2021-05-08 | 2024-04-16 | 佳都科技集团股份有限公司 | Target object identification method and device |
CN113139950A (en) * | 2021-05-08 | 2021-07-20 | 佳都科技集团股份有限公司 | Target object identification method and device |
CN113570543A (en) * | 2021-05-27 | 2021-10-29 | 浙江大华技术股份有限公司 | Security check package identification method, system, storage medium and equipment |
CN113281814A (en) * | 2021-06-23 | 2021-08-20 | 重庆世纪科怡科技股份有限公司 | Security inspection device based on image recognition and security inspection method thereof |
CN113554598A (en) * | 2021-06-24 | 2021-10-26 | 浙江大华技术股份有限公司 | Article detection method, article detection device, electronic equipment and computer-readable storage medium |
CN113657493A (en) * | 2021-08-17 | 2021-11-16 | 北京理工大学 | Method for detecting contraband in X-ray security inspection image based on attention of style characteristic channel |
CN113706497A (en) * | 2021-08-24 | 2021-11-26 | 南京金盾公共安全技术研究院有限公司 | Intelligent contraband identification device and system |
CN113706497B (en) * | 2021-08-24 | 2024-04-09 | 南京金盾公共安全技术研究院有限公司 | Intelligent contraband identification device and system |
CN113822341A (en) * | 2021-08-31 | 2021-12-21 | 成都智元汇信息技术股份有限公司 | Graph judging client of centralized graph judging system for subway security check and working method of graph judging client |
CN113920285A (en) * | 2021-09-03 | 2022-01-11 | 浙江大华技术股份有限公司 | Article detection method, apparatus, electronic apparatus, and storage medium |
CN113971443A (en) * | 2021-10-29 | 2022-01-25 | 成都智元汇信息技术股份有限公司 | Image processing method, device and system for intelligent image judgment |
CN114332030A (en) * | 2021-12-30 | 2022-04-12 | 华中科技大学 | Valve body weld X-ray image denoising method, system and device |
CN114459971A (en) * | 2022-01-12 | 2022-05-10 | 武汉怡特环保科技有限公司 | Online operation and maintenance method and system for beta-ray method particle analyzer |
CN114660097A (en) * | 2022-03-23 | 2022-06-24 | 成都智元汇信息技术股份有限公司 | Synchronous correction method and system based on double sources and double visual angles |
CN114898131A (en) * | 2022-06-17 | 2022-08-12 | 北京师范大学 | Contraband detection method and system based on natural guidance and data enhancement |
CN115718888A (en) * | 2022-11-29 | 2023-02-28 | 同方威视技术股份有限公司 | Trace substance detection method, detection device, electronic device, and medium |
WO2024114440A1 (en) * | 2022-12-01 | 2024-06-06 | 同方威视技术股份有限公司 | Online training method, security inspection image identification method and apparatus, device, and medium |
CN117409199A (en) * | 2023-10-19 | 2024-01-16 | 中南大学 | Growing intelligent security inspection system and method based on cloud big data technology |
CN117409199B (en) * | 2023-10-19 | 2024-05-14 | 中南大学 | Growing intelligent security inspection system and method based on cloud big data technology |
CN117422881A (en) * | 2023-11-15 | 2024-01-19 | 山东衡昊信息技术有限公司 | Intelligent centralized security check graph judging system |
CN117495861A (en) * | 2024-01-02 | 2024-02-02 | 同方威视科技江苏有限公司 | Security check image checking method and device |
CN118365990A (en) * | 2024-06-19 | 2024-07-19 | 浙江啄云智能科技有限公司 | Model training method and device applied to contraband detection and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN107871122A (en) | 2018-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019096181A1 (en) | Detection method, apparatus and system for security inspection, and electronic device | |
CN109142366B (en) | Spherical shell defect detection method and device and computer readable storage medium | |
US8792682B2 (en) | Method and system for identifying a license plate | |
US20160328623A1 (en) | Liveness testing methods and apparatuses and image processing methods and apparatuses | |
WO2019014812A1 (en) | Method for detecting blemish spot on human face, and intelligent terminal | |
US20130279758A1 (en) | Method and system for robust tilt adjustment and cropping of license plate images | |
CN108121982B (en) | Method and device for acquiring facial single image | |
US20140050387A1 (en) | System and Method for Machine Vision Inspection | |
US10445868B2 (en) | Method for detecting a defect on a surface of a tire | |
CN109447068A (en) | A method of it separating seal from image and calibrates seal | |
CN109978892B (en) | Intelligent security inspection method based on terahertz imaging | |
CN109344864B (en) | Image processing method and device for dense object | |
US9600736B2 (en) | Pose detection using depth camera | |
KR102257897B1 (en) | Apparatus and method for liveness test,and apparatus and method for image processing | |
US20160093046A1 (en) | Apparatus and method for supporting computer aided diagnosis | |
CN109784322B (en) | Method, equipment and medium for identifying vin code based on image processing | |
JP5832656B2 (en) | Method and apparatus for facilitating detection of text in an image | |
CN106920266B (en) | The Background Generation Method and device of identifying code | |
CN112784835A (en) | Method and device for identifying authenticity of circular seal, electronic equipment and storage medium | |
CN113781421A (en) | Underwater-based target identification method, device and system | |
JP2017521011A (en) | Symbol optical detection method | |
KR20190011722A (en) | Estimation of human orientation in images using depth information | |
US9053383B2 (en) | Recognizing apparatus and method, program, and recording medium | |
CN104102911A (en) | Image processing for AOI (automated optical inspection)-based bullet appearance defect detection system | |
CN111126314A (en) | Passenger flow statistical visual method and system based on 3D point cloud data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18877620 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18877620 Country of ref document: EP Kind code of ref document: A1 |