WO2024114440A1 - Online training method, security inspection image identification method and apparatus, device, and medium - Google Patents

Online training method, security inspection image identification method and apparatus, device, and medium Download PDF

Info

Publication number
WO2024114440A1
WO2024114440A1 PCT/CN2023/132906 CN2023132906W WO2024114440A1 WO 2024114440 A1 WO2024114440 A1 WO 2024114440A1 CN 2023132906 W CN2023132906 W CN 2023132906W WO 2024114440 A1 WO2024114440 A1 WO 2024114440A1
Authority
WO
WIPO (PCT)
Prior art keywords
security inspection
inspected
recognition
inspection image
online
Prior art date
Application number
PCT/CN2023/132906
Other languages
French (fr)
Chinese (zh)
Inventor
陈志强
李元景
张丽
唐虎
孙运达
戴智晟
魏国华
傅罡
Original Assignee
同方威视技术股份有限公司
清华大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 同方威视技术股份有限公司, 清华大学 filed Critical 同方威视技术股份有限公司
Publication of WO2024114440A1 publication Critical patent/WO2024114440A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • G06V10/12Details of acquisition arrangements; Constructional details thereof
    • G06V10/14Optical characteristics of the device performing the acquisition or on the illumination arrangements
    • G06V10/143Sensing or illuminating at different wavelengths
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/77Processing image or video features in feature spaces; using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
    • G06V10/774Generating sets of training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/70Labelling scene content, e.g. deriving syntactic or semantic representations

Definitions

  • the present disclosure relates to the field of security inspection technology, and more specifically, to an online training method, an online training system, a security inspection image recognition method, a device, a equipment, a medium and a program product of a security inspection image recognition model.
  • Security inspection machines are usually set up in places where security inspection is required to scan the objects being inspected, and determine whether there are security issues based on the scanned images.
  • an artificial intelligence-based security inspection image recognition model can be used to automatically identify the scanned images.
  • the above-mentioned security inspection image recognition model is obtained through offline training. For example, security inspection X-ray images containing contraband at the actual security inspection site are collected, and the intelligent recognition technology manufacturer performs internal annotation and training to generate a recognition algorithm model, which is then manually updated to the on-site equipment.
  • the inventors found that the offline training method requires a series of manual operations, which is long, time-consuming and labor-intensive.
  • some images of contraband at the scene may not be collected and sent back to the technology manufacturer due to information security restrictions, resulting in the algorithm model generated after the loss of these images not being fully matched with the actual application scene.
  • the present disclosure provides an online training method, an online training system, a security inspection image recognition method, an apparatus, a device, a medium and a program product of a security inspection image recognition model which are different from an offline training method.
  • One aspect of the disclosed embodiment provides an online training method for a security inspection image recognition model, comprising: obtaining M images of an object to be inspected with specific recognition results from N recognition terminals, wherein each recognition terminal is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and M and N are respectively greater than or equal to 1; obtaining the M images of the object to be inspected The data annotation results of each image of the object to be inspected are obtained; and each image of the object to be inspected and its data annotation results are used as training samples for online training to obtain a first security inspection image recognition model.
  • the method further includes: sending the first security inspection image recognition model to the N recognition terminals, wherein the N recognition terminals are configured to locally deploy the first security inspection image recognition model.
  • the method before sending the first security inspection image recognition model to the N recognition terminals, the method also includes: obtaining an evaluation index of the first security inspection image recognition model; when the evaluation index meets a preset condition, sending a model update instruction to the N recognition terminals, wherein the N recognition terminals are configured to obtain the first security inspection image recognition model in response to the model update instruction.
  • the step of acquiring M images of the object to be inspected having specific recognition results from N recognition terminals includes: receiving the M images of the object to be inspected uploaded by the N recognition terminals.
  • obtaining the data annotation result of each of the M images of the object to be inspected includes: distributing the M images of the object to be inspected according to task type, and the task type is determined according to the recognition result of each image of the object to be inspected; and obtaining the data annotation result of each image of the object to be inspected after distribution.
  • the data annotation result of each image of the object to be inspected includes the object type of at least one object to be inspected in the image of the object to be inspected, and/or the position information of at least one object to be inspected.
  • the online training of each image of the object to be inspected and the data annotation results thereof as training samples to obtain the first security inspection image recognition model includes: online training of the second security inspection image recognition model pre-deployed at each recognition terminal to obtain the first security inspection image recognition model; and/or online training of a pre-trained third security inspection image recognition model to obtain the first security inspection image recognition model; and/or online training of an untrained fourth security inspection image recognition model to obtain the first security inspection image recognition model.
  • the M images of the object to be inspected belong to at least one
  • the method comprises: performing online training on at least one image of the object to be inspected of the same task type and its data annotation results as training samples to obtain a first security inspection image recognition model corresponding to the task type.
  • the online training of each image of the object to be inspected and the data annotation results thereof as training samples to obtain the first security inspection image recognition model includes: when the number of the training samples is greater than or equal to a preset threshold, automatically performing online training to obtain the first security inspection image recognition model.
  • Another aspect of an embodiment of the present disclosure provides an online training method for a security inspection image recognition model, which is used for an identification terminal, including: obtaining S images of objects to be inspected from a corresponding security inspection machine, where S is greater than or equal to 1; determining the recognition result of each of the S images of objects to be inspected; and sending at least one image of the object to be inspected with a specific recognition result to an online terminal, wherein the online terminal is used to execute the online training method as described above to obtain a first security inspection image recognition model.
  • the identification terminal is communicatively connected with the security inspection machine, and obtaining S images of the object to be inspected from the corresponding security inspection machine includes: after the security inspection machine scans the inspected object to obtain each image of the object to be inspected, obtaining the image of the object to be inspected in real time.
  • the method further includes: acquiring the first security inspection image recognition model from the online end; and automatically deploying the first security inspection image recognition model.
  • the method before acquiring the first security inspection image recognition model from the online end, the method further includes: receiving a model update instruction sent by the online end.
  • Another aspect of an embodiment of the present disclosure provides a security inspection image recognition method for use at an identification end, comprising: obtaining Q images of objects to be inspected from a corresponding security inspection machine, where Q is greater than or equal to 1; and using a first security inspection image recognition model to identify the Q images of objects to be inspected to obtain a recognition result, wherein the first security inspection image recognition model is obtained according to the online training method as described above.
  • Another aspect of the disclosed embodiment provides an online training system for a security inspection image recognition model, comprising N recognition terminals and an online terminal, N being greater than or equal to 1, wherein: each of the N recognition terminals comprises a recognition device, the recognition device being used to determine a recognition result of an image of an object to be inspected from a corresponding security inspection machine, and to convert a specific recognition result into a recognition result.
  • At least one image of the object to be inspected is sent to the online end;
  • the online end includes a data management platform and an online training platform, wherein: the data management platform is used to receive the at least one image of the object to be inspected sent by the recognition device, and send the at least one image of the object to be inspected and the data annotation result to the online training platform; the online training platform is used to perform online training using the at least one image of the object to be inspected and the data annotation result as training samples to obtain a first security inspection image recognition model.
  • the online training platform is also used to send the first security inspection image recognition model to the recognition device; the recognition device is used to receive and automatically deploy the first security inspection image recognition model.
  • an online training device for a security inspection image recognition model comprising: a first image module, used to obtain M images of an object to be inspected with specific recognition results from N recognition terminals, wherein each recognition terminal is used to determine the recognition result of the image of the object to be inspected from a corresponding security inspection machine, and M and N are respectively greater than or equal to 1; a data annotation module, used to obtain the data annotation result of each image of the object to be inspected in the M images of the object to be inspected; and an online training module, used to perform online training using each image of the object to be inspected and its data annotation result as a training sample to obtain a first security inspection image recognition model.
  • an online training device for a security inspection image recognition model which is used for an identification end and includes: a second image module, which is used to obtain S images of an object to be inspected from a corresponding security inspection machine, where S is greater than or equal to 1; a first identification module, which is used to determine the identification result of each image of the object to be inspected in the S images of the object to be inspected; and a third image module, which is used to send at least one image of the object to be inspected with a specific identification result to an online end, wherein the online end is used to execute the online training method as described above to obtain a first security inspection image recognition model.
  • a security inspection image recognition device for an identification end, comprising: a fourth image module, used to obtain Q images of objects to be inspected from a corresponding security inspection machine, where Q is greater than or equal to 1; a second identification module, used to identify the Q images of objects to be inspected using a first security inspection image recognition model to obtain an identification result, wherein the first security inspection image recognition model is obtained according to the method described above.
  • Another aspect of the present disclosure provides an electronic device, including: one or more a processor; and a storage device for storing one or more programs, wherein when the one or more programs are executed by the one or more processors, the one or more processors execute the method as described above.
  • Another aspect of the embodiments of the present disclosure further provides a computer-readable storage medium having executable instructions stored thereon, which, when executed by a processor, causes the processor to execute the method as described above.
  • Another aspect of the embodiments of the present disclosure further provides a computer program product, including a computer program, which implements the above method when executed by a processor.
  • the online training process improves the conversion efficiency from image data to recognition models, and the entire data flow is highly automated, which greatly reduces the manual participation compared to the old offline solution. Due to the use of the online training solution, some sites that are restricted by information security do not have offline processing data and therefore meet information security requirements. Therefore, the recognition model obtained by using the site image as a training sample is more suitable for the actual site, which improves the applicability of the recognition model.
  • FIG1 schematically shows a flow chart of an online training method for an online terminal according to an embodiment of the present disclosure
  • FIG2 schematically shows a flow chart of model updating according to an embodiment of the present disclosure
  • FIG3 schematically shows a flow chart of obtaining data annotation results according to an embodiment of the present disclosure
  • FIG4 schematically shows a flow chart of an online training method for an identification terminal according to an embodiment of the present disclosure
  • FIG5 schematically shows a flow chart of model updating according to another embodiment of the present disclosure
  • FIG6 schematically shows a flow chart of a security inspection image recognition method according to an embodiment of the present disclosure
  • FIG7 schematically shows an architecture diagram of an online training system according to an embodiment of the present disclosure
  • FIG. 8 schematically shows a data closure of an online training system according to an embodiment of the present disclosure. Circulation diagram
  • FIG9 schematically shows a structural block diagram of an online training device for an online terminal according to an embodiment of the present disclosure
  • FIG10 schematically shows a structural block diagram of an online training device for an identification terminal according to an embodiment of the present disclosure
  • FIG11 schematically shows a structural block diagram of a security inspection image recognition device for an identification terminal according to an embodiment of the present disclosure.
  • FIG12 schematically shows a block diagram of an electronic device suitable for implementing an online training method or a recognition method according to an embodiment of the present disclosure.
  • the collection, storage, use, processing, transmission, provision, disclosure and application of user security inspection images involved are in compliance with the provisions of relevant laws and regulations, necessary confidentiality measures are taken, and do not violate public order and good morals.
  • the embodiments of the present disclosure provide an online training method, an online training system, a security inspection image recognition method, a device, equipment, a medium and a program product for a security inspection image recognition model.
  • the online training process improves the conversion efficiency from image data to an algorithm model, and the entire data flow is highly automated. Compared with the old offline solution, the manual participation part is greatly reduced. Due to the use of an online training solution, some sites restricted by information security do not have offline processing data, so they meet information security requirements. Therefore, the algorithm model obtained as a training sample is more suitable for the actual site, which improves the applicability of the algorithm model.
  • FIG1 schematically shows a flow chart of an online training method for an online terminal according to an embodiment of the present disclosure.
  • the online training method of the security inspection image recognition model of this embodiment includes operations S110 to S130. In some embodiments, it may also include operation S140.
  • M images of the object to be inspected with specific recognition results are obtained from N recognition terminals, wherein each recognition terminal is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and M and N are respectively greater than or equal to 1.
  • the security inspection machine may include an X-ray security inspection machine, which scans the inspected object through X-rays to obtain an image.
  • the recognition end may include a terminal device or
  • the server and the terminal device may include various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop computers, desktop computers, and the like.
  • the terminal device may be installed with a manual image judgment application and/or an automatic image judgment application.
  • the manual image judgment application may display the image of the object to be inspected to the judge to obtain the judgment result input by the judge, that is, as the determined recognition result.
  • the automatic image judgment application may call the security inspection image recognition model for automatic recognition to obtain the recognition result.
  • the recognition result may include the type of the object to be inspected in each image of the object to be inspected, such as clothing, food, electronic products or contraband, etc.
  • a specific recognition result may include a result of identifying that contraband is contained. For example, for a certain recognition terminal, if it identifies that 5 images out of 100 images of the object to be inspected contain contraband within a certain time period, then the 5 images are regarded as images with specific recognition results.
  • the online terminal can receive M images of the object to be inspected uploaded by N recognition terminals.
  • a data transmission interface is configured between each recognition terminal and the online terminal, and the recognition terminal can send M images of the object to be inspected online by calling the interface.
  • each recognition terminal may upload the image of the object to be detected having a specific recognition result to a shared database or a cloud server, and the online terminal may obtain M images of the object to be detected from the shared database or the cloud server.
  • the transmission of the image of the object to be inspected between the recognition end and the online end is performed online, which can reduce manual operations and save time, and avoid information security issues caused by offline.
  • the data annotation result may be automatically annotated by the recognition end during recognition, in which case it is obtained from the recognition end. It may also be annotated manually after obtaining M images of the object to be inspected, or it may be automatically annotated using automatic annotation software.
  • the data annotation result of each image of the object to be inspected includes the object type of at least one object to be inspected in the image of the object to be inspected, and/or the position information of at least one object to be inspected.
  • the object type may include the specific name of the object to be inspected, such as lighters, mobile phones, Knives, guns, explosives, drugs, etc., and may also include types of contraband, such as weapon types, inflammable and explosive types, or biological types, etc.
  • the location information may include an object annotation box on the image, which may be used to select the location of the object to be inspected.
  • each image of the object to be inspected and its data annotation results are used as training samples for online training to obtain a first security inspection image recognition model.
  • the first security inspection image recognition model is constructed based on the convolutional neural network algorithm and trained online.
  • Each training sample can include an image of the object to be inspected and the type and location labels of the contraband therein.
  • the online training process is to input multiple training samples into the initialized first security inspection image recognition model, and update the parameters in the model through continuous iteration and back propagation until the objective function of the model meets the requirements or the iteration ends.
  • each image of the object to be inspected and its data annotation results are used as training samples for online training to obtain a first security inspection image recognition model, including: when the number of training samples is greater than or equal to a preset threshold, automatically performing online training to obtain the first security inspection image recognition model.
  • the offline training method is to collect all the pre-collected training samples together and learn them at the same time.
  • the training time is long, and the model cannot be adjusted in real time to adapt to the actual security inspection scene that may change (such as the appearance of new contraband).
  • it since it involves many manual links, it will also take a long time and the final generated model will not be able to adapt.
  • the online training method can run automatically when the number of training samples is greater than or equal to a preset threshold, which can adapt well to the actual security inspection scene and can adapt well to the scene where new types of contraband or hiding methods may appear.
  • training can also be manually started according to user needs, such as canceling automatic training, waiting for manual training to be started regardless of whether the number of training samples is greater than or equal to a preset threshold or less than a preset threshold.
  • the method of automatically starting training when the number is greater than or equal to a preset threshold is retained, and training can also be manually started when the number of training samples is less than the preset threshold.
  • the conversion efficiency from the on-site image data of the security inspection machine to the recognition model can be improved, the degree of automation of the entire data flow process is improved, and the applicability of the recognition model to the actual security inspection site can also be improved.
  • each image of the object to be inspected and its data annotation results are used as training samples for online training to obtain the first security inspection image recognition model, including: online training of the second security inspection image recognition model pre-deployed at each recognition terminal to obtain the first security inspection image recognition model. Or online training of the pre-trained third security inspection image recognition model to obtain the first security inspection image recognition model. Or online training of the untrained fourth security inspection image recognition model to obtain the first security inspection image recognition model.
  • a variety of training measures can be provided online.
  • the third security inspection image recognition model may be pre-trained but not deployed. Continuing to train the third security inspection image recognition model in a transfer learning manner can obtain better recognition effects, and the training cost will also be reduced.
  • the fourth security inspection image recognition model can be initialized, and the model obtained by training it can be better applied to actual security inspection scenarios.
  • the first security inspection image recognition model after the first security inspection image recognition model is obtained by online training, it can be automatically deployed to N recognition terminals.
  • the first security inspection image recognition model is sent to the N recognition terminals, wherein the N recognition terminals are configured to deploy the first security inspection image recognition model locally.
  • the recognition end can send images of the actual security inspection site to the online end, and the online end can use the above images for online training to obtain a first security inspection image recognition model, which can then be deployed to the recognition end.
  • the online data closed loop the on-site image data is used to complete the training and generation of a new model, and then the new model is fed back to the on-site intelligent recognition device, thereby realizing the online training and upgrading of the security inspection image recognition model.
  • the online end may directly push the first security inspection image recognition model to the recognition end, or may send a model update instruction to the recognition end as shown in FIG. 2 , as follows.
  • FIG. 2 schematically shows a flow chart of model updating according to an embodiment of the present disclosure.
  • operations S210 to S220 may be included.
  • the samples in the test set can be input into the model, and the evaluation indicators such as accuracy, precision, recall or F1 value of the model can be obtained according to the recognition results.
  • the indicator evaluation report of the new model allows the user to choose whether to update the model and also execute the step of "comparing the indicators of the new model and the old model". If the new model is better than the old model, it will be automatically updated.
  • a model update instruction is sent to the N recognition terminals, wherein the N recognition terminals are configured to obtain a first security inspection image recognition model in response to the model update instruction.
  • the recognition terminals after sending a model update instruction to N recognition terminals, the recognition terminals can decide when to update, and can flexibly update in consideration of the actual local conditions of the recognition terminals.
  • FIG3 schematically shows a flow chart of obtaining data annotation results according to an embodiment of the present disclosure.
  • obtaining the data annotation result of each of the M images of the object to be inspected in operation S130 includes operations S310 to S320 .
  • M images of objects to be inspected are distributed according to task types, and the task type is determined according to the recognition result of each image of the object to be inspected.
  • the task type may correspond to the type of contraband, such as weapon type, inflammable and explosive type, or biological type, etc. For example, if the recognition result of an image of an object to be inspected is that there is a knife, it is classified as a weapon type, and if the recognition result of an image of an object to be inspected is that there is explosives, it is classified as an inflammable and explosive type.
  • the distribution may include sending the images to different annotators according to the task type, and manually annotating the images of the type. It may also include calling an automatic annotation application to set annotation tasks according to different task types. It may also include sending the images to different servers for automatic annotation when the amount of data is large.
  • M images of objects to be inspected belong to at least one task type, and each image of the object to be inspected and its data annotation results are used as training samples for online training to obtain a first security inspection image recognition model, including: using at least one image of the object to be inspected of the same task type and its data annotation results as training samples for online training to obtain a first security inspection image recognition model corresponding to the task type.
  • first security inspection image recognition models There may be multiple first security inspection image recognition models, for example, a model trained with samples of weapon type is used to identify weapons, and a model trained with samples of flammable and explosive type is used to identify The obtained model is used to identify inflammable and explosive items such as fireworks and explosives.
  • there is only one first security inspection image recognition model which can be obtained by training samples of multiple task types to identify different types of objects.
  • online training is performed for each task type to obtain a corresponding first security inspection image recognition model, which can improve the accuracy of image recognition of the object to be inspected.
  • FIG4 schematically shows a flow chart of an online training method for an identification terminal according to an embodiment of the present disclosure.
  • the online training method of the security inspection image recognition model of this embodiment includes operations S410 to S430 , which can be applied to any recognition end among N recognition ends.
  • S images of the object to be inspected are obtained from the corresponding security inspection machine, where S is greater than or equal to 1.
  • the identification terminal is in communication connection with the security inspection machine, and obtaining S images of the object to be inspected from the corresponding security inspection machine includes: after the security inspection machine scans the inspected object to obtain each image of the object to be inspected, obtaining the image of the object to be inspected in real time.
  • the security inspection machine uses a conveyor belt to transport the inspected object (such as luggage) into the X-ray inspection channel.
  • the luggage enters the X-ray inspection channel, triggering the X-ray source to emit an X-ray beam.
  • the X-ray beam passes through the inspected object on the conveyor belt, is absorbed by the inspected object, and finally bombards the detector installed in the channel.
  • the detector converts the X-ray into a signal and sends it to the recognition end in real time. After these signals are processed, an image can be formed and displayed on the display screen, which means that the image of the object to be inspected is acquired in real time.
  • At least one image of the object to be inspected having a specific recognition result is sent to an online end, wherein the online end is used to execute one or more embodiments corresponding to FIGS. 1 to 3 to obtain a first security inspection image recognition model.
  • the recognition end can directly send the image of the object to be inspected to the online end, and the image transmission is performed online, which improves the data flow efficiency, reduces the time cost, and ensures data security.
  • FIG. 5 schematically shows a flow chart of model updating according to another embodiment of the present disclosure.
  • the model updating of this embodiment includes operations S510 to S520 .
  • a first security inspection image recognition model is obtained from an online end.
  • the recognition end may monitor the model update status of the online end, may periodically send a query instruction to the online end to inquire whether the model has been updated, and may also receive the first security inspection image recognition model sent by the online end.
  • the method before obtaining the first security inspection image recognition model from the online terminal, the method further includes: receiving a model update instruction sent by the online terminal. After receiving the model update instruction, the recognition terminal can automatically obtain the first security inspection image recognition model from the online terminal.
  • a first security inspection image recognition model is automatically deployed.
  • the recognition end may originally be manually judged, in which case the first security inspection image recognition model can be automatically installed.
  • the recognition end may obtain the recognition result by using the pre-deployed second security inspection image recognition model, in which case the model upgrade may be completed automatically.
  • the model may be deployed by manual upgrade.
  • the first security inspection image recognition obtained by using the on-site image data is fed back online to the recognition end through an online data closed-loop method, thereby avoiding the defect that the offline training method still requires external manufacturers to arrange manual on-site upgrades.
  • FIG6 schematically shows a flow chart of a security inspection image recognition method according to an embodiment of the present disclosure.
  • the security inspection image recognition method of this embodiment includes operations S610 to S620 , which can be applied to any recognition terminal among N recognition terminals.
  • Q images of the object to be inspected are obtained from the corresponding security inspection machine, where Q is greater than or equal to 1.
  • the Q images of the object to be inspected may also be obtained in real time through data transmission after the object to be inspected enters the security inspection machine for scanning.
  • the first security inspection image recognition model is used to identify Q images of the object to be inspected. Perform recognition to obtain a recognition result, wherein the first security inspection image recognition model is obtained according to one or more embodiments corresponding to Figures 1 to 5.
  • the model can be run to recognize Q images of objects to be inspected, thereby obtaining more accurate recognition results with better applicability to the current actual security inspection site.
  • FIG. 7 schematically shows an architecture diagram of an online training system according to an embodiment of the present disclosure.
  • the online training system of this embodiment includes N identification terminals and online terminals, specifically including N security inspection machines (such as 711-security inspection machine 1, 712-security inspection machine 2 ... 713-security inspection machine N), N identification devices (such as 721-identification device 1, 722-identification device 2 ... 723-identification device N), a data management platform 731 and an online training platform 732.
  • the N identification terminals may include N identification devices and N security inspection machines
  • the online terminal includes a data management platform and 731 online training platform 732.
  • the data management platform 731 and the online training platform 732 may also be combined into one platform.
  • the above platform includes the operating environment of the computer hardware and/or software required to implement the corresponding functions.
  • one identification device can correspond to multiple security inspection machines, and there is no need for one-to-one correspondence, and the data management platform can still receive images transmitted by one or more identification devices.
  • each recognition terminal includes a recognition device, which is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and send at least one image of the object to be inspected with a specific recognition result to the online terminal.
  • the online end includes a data management platform 731 and an online training platform 732, wherein: the data management platform 731 is used to receive at least one image of the object to be inspected sent by N recognition devices, and send at least one image of the object to be inspected and the data annotation result to the online training platform 732.
  • the online training platform 732 is used to perform online training using at least one image of the object to be inspected and the data annotation result as training samples to obtain a first security inspection image recognition model.
  • the online training platform is further used to send the first security inspection image recognition model to N recognition devices.
  • the N recognition devices are used to receive and automatically deploy the first security inspection image recognition model.
  • the identification end of this embodiment can execute the above-mentioned FIG. 1 to FIG. 3 for the identification end
  • the online end may execute one or more steps of the online training method for the online end described in FIG. 4 to FIG. 5 .
  • Figure 7 are data flow diagrams. Taking 711-security inspection machine 1 and 721-identification device 1, data management platform 731 and online training platform 732 as examples, Figure 8 is used to expand the description of the data flow during the operation of the online training system.
  • FIG8 schematically shows a data closed-loop flow diagram of an online training system according to an embodiment of the present disclosure.
  • the data closed-loop flow process during the operation of the online training system of this embodiment includes operations S810 to S880 .
  • Operation S810 711-security inspection machine 1 performs X-ray scanning on the inspected object and transmits the signal to 721-identification device 1.
  • Operation S820, 721-the identification device 1 performs real-time contraband identification on the X-ray image passing through the security inspection machine.
  • 721-recognition device 1 uploads the X-ray image that intelligently identifies contraband to the data management platform 731.
  • 721-recognition device 1 can also obtain the manual judgment conclusion of the X-ray image from an external system, and then upload the X-ray image that is manually judged to contain contraband to the data management platform 731.
  • the data management platform 731 distributes the uploaded X-ray images to the image annotation terminals according to the task type, and the X-ray images are annotated manually or automatically.
  • the data management platform 731 uploads the annotated X-ray image and data to the online training platform 732 .
  • Operation S860 when a certain number of annotated X-ray images are accumulated, the online training platform 732 uses these images to automatically perform training and learning, generates a new algorithm model, and simultaneously provides an indicator evaluation report of the new model.
  • Operation S870 The user selects whether to update the existing algorithm model of 721-recognition device 1 according to the evaluation report. If the update is performed, a model update instruction is sent to 721-recognition device 1.
  • Operation S880 if the update instruction is executed, then 721- the recognition device 1 will obtain the specified algorithm model to complete the automatic upgrade.
  • an online training scheme including intelligent recognition equipment,
  • the data management platform and online training platform are several components that realize online training and upgrading of intelligent recognition algorithm models by real-time collection of security X-ray images containing prohibited items at the actual security inspection site.
  • the present disclosure also provides an online training device for the online security inspection image recognition model.
  • the device will be described in detail below in conjunction with FIG.
  • FIG9 schematically shows a structural block diagram of an online training device for an online terminal according to an embodiment of the present disclosure.
  • the online training device 900 of this embodiment includes a first image module 910 , a data annotation module 920 and a data annotation module 930 .
  • the first image module 910 can perform operation S110 to obtain M images of the object to be inspected with specific recognition results from N recognition terminals, wherein each recognition terminal is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and M and N are respectively greater than or equal to 1.
  • the first image module 910 is used to receive M images of the object to be inspected uploaded by N recognition terminals.
  • the data annotation module 920 may perform operation S120 to obtain a data annotation result for each of the M images of the object to be inspected.
  • the data labeling module 920 may perform operations S310 to S320, which will not be described in detail herein.
  • the online training module 930 may perform operation S130 to perform online training using each image of the object to be inspected and its data annotation result as a training sample to obtain a first security inspection image recognition model.
  • the online training module 930 is used to perform online training on the second security inspection image recognition model pre-deployed on each recognition terminal to obtain the first security inspection image recognition model. And/or perform online training on the pre-trained third security inspection image recognition model to obtain the first security inspection image recognition model. And/or perform online training on the untrained fourth security inspection image recognition model to obtain the first security inspection image recognition model.
  • the online training module 930 is used to perform online training using at least one image of an object to be inspected of the same task type and its data annotation results as training samples to obtain Obtain the first security inspection image recognition model corresponding to the task type.
  • online training is automatically performed to obtain a first security inspection image recognition model.
  • the online training device 900 may further include a model sending module, which may perform operation S140 to send the first security inspection image recognition model to N recognition terminals.
  • the module may further perform operations S210 to S220, which are not described in detail herein.
  • the present disclosure also provides an online training device for the security inspection image recognition model of the recognition terminal.
  • the device will be described in detail below in conjunction with FIG.
  • FIG10 schematically shows a structural block diagram of an online training device for an identification terminal according to an embodiment of the present disclosure.
  • the online training device 1000 of this embodiment includes a second image module 1010 , a first recognition module 1020 , and a third image module 1030 .
  • the second image module 1010 may perform operation S410 to obtain S images of the object to be inspected from the corresponding security inspection machine, where S is greater than or equal to 1.
  • the second image module 1010 is used to obtain each image of the object to be inspected in real time after the security inspection machine scans the object to be inspected to obtain the image of the object to be inspected.
  • the first recognition module 1020 may perform operation S420 to determine a recognition result of each of the S images of the object to be detected.
  • the third image module 1030 can perform operation S430 to send at least one image of the object to be inspected having a specific recognition result to an online end, wherein the online end is used to execute the online training method shown in Figures 1 to 3 to obtain a first security inspection image recognition model.
  • the online training device 1000 may further include a model upgrade module, which may perform operations S510 to S520, which are not described in detail herein.
  • the model upgrade module is used to receive a model update instruction sent by the online end before acquiring the first security inspection image recognition model from the online end.
  • the present disclosure further provides a security inspection image recognition device for an identification terminal.
  • the device will be described in detail below in conjunction with FIG.
  • FIG. 11 schematically shows a structural block diagram of a security inspection image recognition device for an identification terminal according to an embodiment of the present disclosure.
  • the security inspection image recognition device 1100 of this embodiment includes a fourth image module 1110 and a second recognition module 1120 .
  • the fourth image module 1110 may perform operation S610 to obtain Q images of the object to be inspected from the corresponding security inspection machine, where Q is greater than or equal to 1.
  • the second recognition module 1120 can perform operation S620 to recognize Q images of objects to be inspected by using the first security inspection image recognition model to obtain a recognition result, wherein the first security inspection image recognition model is obtained according to the online training method described in Figures 1 to 5.
  • any multiple modules in the online training device 900, the online training device 1000 or the security inspection image recognition device 1100 may be combined into one module for implementation, or any one of the modules may be split into multiple modules. Or both, at least part of the functions of one or more of these modules may be combined with at least part of the functions of other modules and implemented in one module.
  • At least one of the online training device 900, the online training device 1000, or the security inspection image recognition device 1100 may be at least partially implemented as a hardware circuit, such as a field programmable gate array (FPGA), a programmable logic array (PLA), a system on a chip, a system on a substrate, a system on a package, an application specific integrated circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging the circuit, or in any one of the three implementation methods of software, hardware, and firmware, or in a suitable combination of any of them.
  • FPGA field programmable gate array
  • PLA programmable logic array
  • ASIC application specific integrated circuit
  • at least one of the online training device 900, the online training device 1000, or the security inspection image recognition device 1100 may be at least partially implemented as a computer program module, and when the computer program module is executed, the corresponding function may be executed.
  • FIG12 schematically shows a block diagram of an electronic device suitable for implementing an online training method or a recognition method according to an embodiment of the present disclosure.
  • the electronic device 1200 includes a processor 1201, which can perform various appropriate actions and processes according to a program stored in a read-only memory (ROM) 1202 or a program loaded from a storage portion 1208 into a random access memory (RAM) 1203.
  • the processor 1201 may include, for example, a general-purpose microprocessor (e.g., a CPU), an instruction set processor and/or a related chipset and/or a dedicated microprocessor (e.g., an application-specific integrated circuit (ASIC)), etc.
  • the processor 1201 may also include an onboard memory for caching purposes.
  • the processor 1201 may include a single processing unit or multiple processing units for performing different actions of the method flow according to an embodiment of the present disclosure.
  • RAM 1203 various programs and data required for the operation of electronic device 1200 are stored.
  • Processor 1201, ROM 1202 and RAM 1203 are connected to each other through bus 1204.
  • Processor 1201 performs various operations of the method flow according to the embodiment of the present disclosure by executing the programs in ROM 1202 and/or RAM 1203. It should be noted that the program can also be stored in one or more memories other than ROM 1202 and RAM 1203.
  • Processor 1201 can also perform various operations of the method flow according to the embodiment of the present disclosure by executing the programs stored in one or more memories.
  • the electronic device 1200 may further include an input/output (I/O) interface 1205, which is also connected to the bus 1204.
  • the electronic device 1200 may further include one or more of the following components connected to the I/O interface 1205: an input portion 1206 including a keyboard, a mouse, etc.
  • An output portion 1207 including a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and a speaker, etc.
  • a storage portion 1208 including a hard disk, etc.
  • a communication portion 1209 including a network interface card such as a LAN card, a modem, etc.
  • the communication portion 1209 performs communication processing via a network such as the Internet.
  • a drive 1210 is also connected to the I/O interface 1205 as needed.
  • a removable medium 1211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 1210 as needed, so that the computer program read therefrom is installed into the storage portion 1208 as needed.
  • the present disclosure also provides a computer-readable storage medium, which may be included in the device/apparatus/system described in the above embodiments. It may also exist independently without being assembled into the device/apparatus/system.
  • the above computer-readable storage medium carries one or more programs, and when the above one or more programs are executed, the implementation Now, the method according to the embodiment of the present disclosure is described.
  • a computer-readable storage medium may be a non-volatile computer-readable storage medium, such as but not limited to: a portable computer disk, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the above.
  • a computer-readable storage medium may be any tangible medium containing or storing a program that may be used by or in conjunction with an instruction execution system, apparatus, or device.
  • a computer-readable storage medium may include the ROM 1202 and/or RAM 1203 described above and/or one or more memories other than ROM 1202 and RAM 1203.
  • the embodiment of the present disclosure also includes a computer program product, which includes a computer program, and the computer program contains program code for executing the method shown in the flowchart.
  • the program code is used to enable the computer system to implement the method provided by the embodiment of the present disclosure.
  • the computer program may rely on tangible storage media such as optical storage devices, magnetic storage devices, etc.
  • the computer program may also be transmitted and distributed in the form of signals on a network medium, and downloaded and installed through the communication part 1209, and/or installed from the removable medium 1211.
  • the program code contained in the computer program may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the above.
  • the computer program can be downloaded and installed from the network through the communication part 1209, and/or installed from the removable medium 1211.
  • the computer program is executed by the processor 1201, the above functions defined in the system of the embodiment of the present disclosure are performed.
  • the system, device, means, module, unit, etc. described above can be implemented by a computer program module.
  • any combination of one or more programming languages can be used.
  • the program code for executing the computer program provided by the embodiment of the present disclosure can be written together.
  • these computing programs can be implemented using high-level process and/or object-oriented programming languages, and/or assembly/machine languages.
  • Programming languages include, but are not limited to, Java, C++, python, "C" language or similar programming languages.
  • the program code can be executed entirely on the user computing device, partially on the user device, partially on the remote computing device, or entirely on the remote computing device or server.
  • the remote computing device can be connected to the user computing device through any type of network, including a local area network (LAN) or a wide area network (WAN), or can be connected to an external computing device (for example, using an Internet service provider to connect through the Internet).
  • LAN local area network
  • WAN wide area network
  • an Internet service provider to connect through the Internet
  • each box in the flow chart or block diagram can represent a module, a program segment, or a part of a code, and the above-mentioned module, program segment, or a part of a code contains one or more executable instructions for realizing the specified logical function.
  • the functions marked in the box can also occur in a different order from the order marked in the accompanying drawings. For example, two boxes represented in succession can actually be executed substantially in parallel, and they can sometimes be executed in the opposite order, depending on the functions involved.
  • each box in the block diagram or flow chart, and the combination of the boxes in the block diagram or flow chart can be implemented with a dedicated hardware-based system that performs a specified function or operation, or can be implemented with a combination of dedicated hardware and computer instructions.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computing Systems (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Image Analysis (AREA)

Abstract

Provided is an online training method for a security inspection image identification model, relating to the technical field of security inspection. An online training method for an online end comprises: obtaining M object images to be detected having specific identification results from N identification ends; obtaining a data annotation result of each of the M object images to be detected; and performing online training by using each object image to be detected and the data annotation result thereof as training samples, to obtain a first security inspection image identification model. An online training method for an identification end comprises: obtaining S object images to be detected from a corresponding security inspection machine; determining an identification result of each of the S object images to be detected; and sending at least one object image to be detected having a specific identification result to an online end. The conversion efficiency from on-site image data of a security inspection machine to an inspection model can be improved, the automation degree of the whole data transfer process is improved, and the applicability of the identification model to the actual security inspection site can be improved.

Description

在线训练方法、安检图像识别方法、装置、设备和介质Online training method, security inspection image recognition method, device, equipment and medium
本申请要求于2022年12月1日递交的中国专利申请No.202211545328.2的优先权,其内容一并在此作为参考。This application claims priority to Chinese Patent Application No. 202211545328.2 filed on December 1, 2022, the contents of which are incorporated herein by reference.
技术领域Technical Field
本公开涉及安检技术领域,更具体地,涉及一种安检图像识别模型的在线训练方法、在线训练系统、安检图像识别方法、装置、设备、介质和程序产品。The present disclosure relates to the field of security inspection technology, and more specifically, to an online training method, an online training system, a security inspection image recognition method, a device, a equipment, a medium and a program product of a security inspection image recognition model.
背景技术Background technique
在需要安检的场所通常设置安检机对过检对象进行扫描,根据扫描图像判断是否存在安全问题。相关技术中可以使用基于人工智能的安检图像识别模型对扫描图像进行自动识别。上述安检图像识别模型是通过离线训练得到的,例如将实际安检现场的含有违禁品的安检X光图像收集起来,由智能识别技术厂家进行内部标注、训练,生成识别算法模型,再手动更新到现场的设备中。Security inspection machines are usually set up in places where security inspection is required to scan the objects being inspected, and determine whether there are security issues based on the scanned images. In the related technology, an artificial intelligence-based security inspection image recognition model can be used to automatically identify the scanned images. The above-mentioned security inspection image recognition model is obtained through offline training. For example, security inspection X-ray images containing contraband at the actual security inspection site are collected, and the intelligent recognition technology manufacturer performs internal annotation and training to generate a recognition algorithm model, which is then manually updated to the on-site equipment.
在实现本公开发明构思的过程中,发明人发现:离线训练方法需经过一系列人工操作的过程,流程长,耗时耗力。并且有些现场的违禁品图像受信息安全限制,可能无法收集发回技术厂家,导致缺失该部分图像后最终生成的算法模型与实际应用现场不能完全匹配。In the process of implementing the disclosed invention, the inventors found that the offline training method requires a series of manual operations, which is long, time-consuming and labor-intensive. In addition, some images of contraband at the scene may not be collected and sent back to the technology manufacturer due to information security restrictions, resulting in the algorithm model generated after the loss of these images not being fully matched with the actual application scene.
发明内容Summary of the invention
鉴于上述问题,本公开提供了一种不同于离线训练方法的安检图像识别模型的在线训练方法、在线训练系统、安检图像识别方法、装置、设备、介质和程序产品。In view of the above problems, the present disclosure provides an online training method, an online training system, a security inspection image recognition method, an apparatus, a device, a medium and a program product of a security inspection image recognition model which are different from an offline training method.
本公开实施例的一个方面提供了一种安检图像识别模型的在线训练方法,包括:从N个识别端获取具有特定识别结果的M张待检对象图像,其中每个识别端用于确定来自对应安检机的待检对象图像的识别结果,M、N分别大于或等于1;获得所述M张待检对象图像 中每张待检对象图像的数据标注结果;将所述每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型。One aspect of the disclosed embodiment provides an online training method for a security inspection image recognition model, comprising: obtaining M images of an object to be inspected with specific recognition results from N recognition terminals, wherein each recognition terminal is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and M and N are respectively greater than or equal to 1; obtaining the M images of the object to be inspected The data annotation results of each image of the object to be inspected are obtained; and each image of the object to be inspected and its data annotation results are used as training samples for online training to obtain a first security inspection image recognition model.
根据本公开的实施例,在获得所述第一安检图像识别模型后,所述方法还包括:将所述第一安检图像识别模型发送至所述N个识别端,其中,所述N个识别端被配置为在本地部署所述第一安检图像识别模型。According to an embodiment of the present disclosure, after obtaining the first security inspection image recognition model, the method further includes: sending the first security inspection image recognition model to the N recognition terminals, wherein the N recognition terminals are configured to locally deploy the first security inspection image recognition model.
根据本公开的实施例,在将所述第一安检图像识别模型发送至所述N个识别端之前,所述方法还包括:获得所述第一安检图像识别模型的评估指标;在所述评估指标符合预设条件时,向所述N个识别端发送模型更新指令,其中,所述N个识别端被配置为响应于所述模型更新指令获取所述第一安检图像识别模型。According to an embodiment of the present disclosure, before sending the first security inspection image recognition model to the N recognition terminals, the method also includes: obtaining an evaluation index of the first security inspection image recognition model; when the evaluation index meets a preset condition, sending a model update instruction to the N recognition terminals, wherein the N recognition terminals are configured to obtain the first security inspection image recognition model in response to the model update instruction.
根据本公开的实施例,所述从N个识别端获取具有特定识别结果的M张待检对象图像包括:接收所述N个识别端上传的所述M张待检对象图像。According to an embodiment of the present disclosure, the step of acquiring M images of the object to be inspected having specific recognition results from N recognition terminals includes: receiving the M images of the object to be inspected uploaded by the N recognition terminals.
根据本公开的实施例,所述获得所述M张待检对象图像中每张待检对象图像的数据标注结果包括:按照任务类型分发所述M张待检对象图像,所述任务类型根据所述每张待检对象图像的识别结果确定;获取分发后所述每张待检对象图像的数据标注结果。According to an embodiment of the present disclosure, obtaining the data annotation result of each of the M images of the object to be inspected includes: distributing the M images of the object to be inspected according to task type, and the task type is determined according to the recognition result of each image of the object to be inspected; and obtaining the data annotation result of each image of the object to be inspected after distribution.
根据本公开的实施例,所述每张待检对象图像的数据标注结果包括该张待检对象图像中至少一个待检对象的对象类型,和/或至少一个待检对象的位置信息。According to an embodiment of the present disclosure, the data annotation result of each image of the object to be inspected includes the object type of at least one object to be inspected in the image of the object to be inspected, and/or the position information of at least one object to be inspected.
根据本公开的实施例,所述将所述每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型包括:对预先部署在所述每个识别端的第二安检图像识别模型进行在线训练,获得所述第一安检图像识别模型;和/或对预先训练好的第三安检图像识别模型进行在线训练,获得所述第一安检图像识别模型;和/或对未经训练的第四安检图像识别模型进行在线训练,获得所述第一安检图像识别模型。According to an embodiment of the present disclosure, the online training of each image of the object to be inspected and the data annotation results thereof as training samples to obtain the first security inspection image recognition model includes: online training of the second security inspection image recognition model pre-deployed at each recognition terminal to obtain the first security inspection image recognition model; and/or online training of a pre-trained third security inspection image recognition model to obtain the first security inspection image recognition model; and/or online training of an untrained fourth security inspection image recognition model to obtain the first security inspection image recognition model.
根据本公开的实施例,所述M张待检对象图像属于至少一个任 务类型,所述将所述每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型包括:将相同任务类型的至少一张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得该任务类型对应的第一安检图像识别模型。According to an embodiment of the present disclosure, the M images of the object to be inspected belong to at least one The method comprises: performing online training on at least one image of the object to be inspected of the same task type and its data annotation results as training samples to obtain a first security inspection image recognition model corresponding to the task type.
根据本公开的实施例,所述将所述每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型包括:在所述训练样本的数量大于或等于预设阈值的情况下,自动进行在线训练获得所述第一安检图像识别模型。According to an embodiment of the present disclosure, the online training of each image of the object to be inspected and the data annotation results thereof as training samples to obtain the first security inspection image recognition model includes: when the number of the training samples is greater than or equal to a preset threshold, automatically performing online training to obtain the first security inspection image recognition model.
本公开实施例的另一个方面提供了一种安检图像识别模型的在线训练方法,用于识别端,包括:从对应安检机获取S张待检对象图像,S大于或等于1;确定所述S张待检对象图像中每张待检对象图像的识别结果;将具有特定识别结果的至少一张待检对象图像发送至在线端,其中,所述在线端用于执行如上所述的在线训练方法获得第一安检图像识别模型。Another aspect of an embodiment of the present disclosure provides an online training method for a security inspection image recognition model, which is used for an identification terminal, including: obtaining S images of objects to be inspected from a corresponding security inspection machine, where S is greater than or equal to 1; determining the recognition result of each of the S images of objects to be inspected; and sending at least one image of the object to be inspected with a specific recognition result to an online terminal, wherein the online terminal is used to execute the online training method as described above to obtain a first security inspection image recognition model.
根据本公开的实施例,所述识别端与所述安检机通信连接,所述从对应安检机获取S张待检对象图像包括:在所述安检机对过检对象进行扫描获得每张待检对象图像后,实时获取该张待检对象图像。According to an embodiment of the present disclosure, the identification terminal is communicatively connected with the security inspection machine, and obtaining S images of the object to be inspected from the corresponding security inspection machine includes: after the security inspection machine scans the inspected object to obtain each image of the object to be inspected, obtaining the image of the object to be inspected in real time.
根据本公开的实施例,所述方法还包括:从所述在线端获取所述第一安检图像识别模型;自动部署所述第一安检图像识别模型。According to an embodiment of the present disclosure, the method further includes: acquiring the first security inspection image recognition model from the online end; and automatically deploying the first security inspection image recognition model.
根据本公开的实施例,在从所述在线端获取所述第一安检图像识别模型之前,所述方法还包括:接收所述在线端发送的模型更新指令。According to an embodiment of the present disclosure, before acquiring the first security inspection image recognition model from the online end, the method further includes: receiving a model update instruction sent by the online end.
本公开实施例的另一个方面提供了一种安检图像识别方法,用于识别端,包括:从对应安检机获取Q张待检对象图像,Q大于或等于1;利用第一安检图像识别模型对所述Q张待检对象图像进行识别,获得识别结果,其中,所述第一安检图像识别模型根据如上所述的在线训练方法获得。Another aspect of an embodiment of the present disclosure provides a security inspection image recognition method for use at an identification end, comprising: obtaining Q images of objects to be inspected from a corresponding security inspection machine, where Q is greater than or equal to 1; and using a first security inspection image recognition model to identify the Q images of objects to be inspected to obtain a recognition result, wherein the first security inspection image recognition model is obtained according to the online training method as described above.
本公开实施例的另一个方面提供了一种安检图像识别模型的在线训练系统,包括N个识别端和在线端,N大于或等于1,其中:所述N个识别端中每个识别端包括识别设备,所述识别设备用于确定来自对应安检机的待检对象图像的识别结果,并将具有特定识别结果 的至少一张待检对象图像发送至所述在线端;所述在线端包括数据管理平台和在线训练平台,其中:所述数据管理平台用于接收所述识别设备发送的所述至少一张待检对象图像,并将所述至少一张待检对象图像及数据标注结果发送至所述在线训练平台;所述在线训练平台用于将所述至少一张待检对象图像及数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型。Another aspect of the disclosed embodiment provides an online training system for a security inspection image recognition model, comprising N recognition terminals and an online terminal, N being greater than or equal to 1, wherein: each of the N recognition terminals comprises a recognition device, the recognition device being used to determine a recognition result of an image of an object to be inspected from a corresponding security inspection machine, and to convert a specific recognition result into a recognition result. At least one image of the object to be inspected is sent to the online end; the online end includes a data management platform and an online training platform, wherein: the data management platform is used to receive the at least one image of the object to be inspected sent by the recognition device, and send the at least one image of the object to be inspected and the data annotation result to the online training platform; the online training platform is used to perform online training using the at least one image of the object to be inspected and the data annotation result as training samples to obtain a first security inspection image recognition model.
根据本公开的实施例,其中:所述在线训练平台还用于将所述第一安检图像识别模型发送至所述识别设备;所述识别设备用于接收并自动部署所述第一安检图像识别模型。According to an embodiment of the present disclosure, wherein: the online training platform is also used to send the first security inspection image recognition model to the recognition device; the recognition device is used to receive and automatically deploy the first security inspection image recognition model.
本公开实施例的另一个方面提供了一种安检图像识别模型的在线训练装置,包括:第一图像模块,用于从N个识别端获取具有特定识别结果的M张待检对象图像,其中每个识别端用于确定来自对应安检机的待检对象图像的识别结果,M、N分别大于或等于1;数据标注模块,用于获得所述M张待检对象图像中每张待检对象图像的数据标注结果;在线训练模块,用于将所述每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型。Another aspect of an embodiment of the present disclosure provides an online training device for a security inspection image recognition model, comprising: a first image module, used to obtain M images of an object to be inspected with specific recognition results from N recognition terminals, wherein each recognition terminal is used to determine the recognition result of the image of the object to be inspected from a corresponding security inspection machine, and M and N are respectively greater than or equal to 1; a data annotation module, used to obtain the data annotation result of each image of the object to be inspected in the M images of the object to be inspected; and an online training module, used to perform online training using each image of the object to be inspected and its data annotation result as a training sample to obtain a first security inspection image recognition model.
本公开实施例的另一个方面提供了一种安检图像识别模型的在线训练装置,用于识别端,包括:第二图像模块,用于从对应安检机获取S张待检对象图像,S大于或等于1;第一识别模块,用于确定所述S张待检对象图像中每张待检对象图像的识别结果;第三图像模块,用于将具有特定识别结果的至少一张待检对象图像发送至在线端,其中,所述在线端用于执行如上所述的在线训练方法获得第一安检图像识别模型。Another aspect of an embodiment of the present disclosure provides an online training device for a security inspection image recognition model, which is used for an identification end and includes: a second image module, which is used to obtain S images of an object to be inspected from a corresponding security inspection machine, where S is greater than or equal to 1; a first identification module, which is used to determine the identification result of each image of the object to be inspected in the S images of the object to be inspected; and a third image module, which is used to send at least one image of the object to be inspected with a specific identification result to an online end, wherein the online end is used to execute the online training method as described above to obtain a first security inspection image recognition model.
本公开实施例的另一个方面提供了一种安检图像识别装置,用于识别端,包括:第四图像模块,用于从对应安检机获取Q张待检对象图像,Q大于或等于1;第二识别模块,用于利用第一安检图像识别模型对所述Q张待检对象图像进行识别,获得识别结果,其中,所述第一安检图像识别模型根据如上所述的方法获得。Another aspect of an embodiment of the present disclosure provides a security inspection image recognition device for an identification end, comprising: a fourth image module, used to obtain Q images of objects to be inspected from a corresponding security inspection machine, where Q is greater than or equal to 1; a second identification module, used to identify the Q images of objects to be inspected using a first security inspection image recognition model to obtain an identification result, wherein the first security inspection image recognition model is obtained according to the method described above.
本公开实施例的另一方面提供了一种电子设备,包括:一个或多 个处理器;存储装置,用于存储一个或多个程序,其中,当所述一个或多个程序被所述一个或多个处理器执行时,使得一个或多个处理器执行如上所述的方法。Another aspect of the present disclosure provides an electronic device, including: one or more a processor; and a storage device for storing one or more programs, wherein when the one or more programs are executed by the one or more processors, the one or more processors execute the method as described above.
本公开实施例的另一方面还提供了一种计算机可读存储介质,其上存储有可执行指令,该指令被处理器执行时使处理器执行如上所述的方法。Another aspect of the embodiments of the present disclosure further provides a computer-readable storage medium having executable instructions stored thereon, which, when executed by a processor, causes the processor to execute the method as described above.
本公开实施例的另一方面还提供了一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现如上所述的方法。Another aspect of the embodiments of the present disclosure further provides a computer program product, including a computer program, which implements the above method when executed by a processor.
上述一个或多个实施例至少具有如下有益效果:在线训练的过程提升了从图像数据到识别模型的转化效率,整个数据流转实现了高度自动化,相较旧的离线方案,大大减少了人工的参与部分。由于采用在线训练方案,某些受信息安全限制的现场没有离线处理数据所以符合信息安全要求,故将现场图像作为训练样本得到的识别模型更适用于实际现场,提升了识别模型的适用性。One or more of the above embodiments have at least the following beneficial effects: the online training process improves the conversion efficiency from image data to recognition models, and the entire data flow is highly automated, which greatly reduces the manual participation compared to the old offline solution. Due to the use of the online training solution, some sites that are restricted by information security do not have offline processing data and therefore meet information security requirements. Therefore, the recognition model obtained by using the site image as a training sample is more suitable for the actual site, which improves the applicability of the recognition model.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
通过以下参照附图对本公开实施例的描述,本公开的上述内容以及其他目的、特征和优点将更为清楚,在附图中:The above contents and other purposes, features and advantages of the present disclosure will become more apparent through the following description of the embodiments of the present disclosure with reference to the accompanying drawings, in which:
图1示意性示出了根据本公开实施例的用于在线端的在线训练方法的流程图;FIG1 schematically shows a flow chart of an online training method for an online terminal according to an embodiment of the present disclosure;
图2示意性示出了根据本公开实施例的模型更新的流程图;FIG2 schematically shows a flow chart of model updating according to an embodiment of the present disclosure;
图3示意性示出了根据本公开实施例的获取数据标注结果的流程图;FIG3 schematically shows a flow chart of obtaining data annotation results according to an embodiment of the present disclosure;
图4示意性示出了根据本公开实施例的用于识别端的在线训练方法的流程图;FIG4 schematically shows a flow chart of an online training method for an identification terminal according to an embodiment of the present disclosure;
图5示意性示出了根据本公开另一实施例的模型更新的流程图;FIG5 schematically shows a flow chart of model updating according to another embodiment of the present disclosure;
图6示意性示出了根据本公开实施例的安检图像识别方法的流程图;FIG6 schematically shows a flow chart of a security inspection image recognition method according to an embodiment of the present disclosure;
图7示意性示出了根据本公开实施例的在线训练系统的架构图;FIG7 schematically shows an architecture diagram of an online training system according to an embodiment of the present disclosure;
图8示意性示出了根据本公开实施例的在线训练系统的数据闭 环流向图;FIG. 8 schematically shows a data closure of an online training system according to an embodiment of the present disclosure. Circulation diagram;
图9示意性示出了根据本公开实施例的用于在线端的在线训练装置的结构框图;FIG9 schematically shows a structural block diagram of an online training device for an online terminal according to an embodiment of the present disclosure;
图10示意性示出了根据本公开实施例的用于识别端的在线训练装置的结构框图;FIG10 schematically shows a structural block diagram of an online training device for an identification terminal according to an embodiment of the present disclosure;
图11示意性示出了根据本公开实施例的用于识别端的安检图像识别装置的结构框图;以及FIG11 schematically shows a structural block diagram of a security inspection image recognition device for an identification terminal according to an embodiment of the present disclosure; and
图12示意性示出了根据本公开实施例的适于实现在线训练方法或识别方法的电子设备的方框图。FIG12 schematically shows a block diagram of an electronic device suitable for implementing an online training method or a recognition method according to an embodiment of the present disclosure.
具体实施方式Detailed ways
以下,将参照附图来描述本公开的实施例。但是应该理解,这些描述只是示例性的,而并非要限制本公开的范围。在下面的详细描述中,为便于解释,阐述了许多具体的细节以提供对本公开实施例的全面理解。然而,明显地,一个或多个实施例在没有这些具体细节的情况下也可以被实施。此外,在以下说明中,省略了对公知结构和技术的描述,以避免不必要地混淆本公开的概念。Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. However, it should be understood that these descriptions are exemplary only and are not intended to limit the scope of the present disclosure. In the following detailed description, for ease of explanation, many specific details are set forth to provide a comprehensive understanding of the embodiments of the present disclosure. However, it is apparent that one or more embodiments may also be implemented without these specific details. In addition, in the following description, descriptions of known structures and technologies are omitted to avoid unnecessary confusion of the concepts of the present disclosure.
在此使用的术语仅仅是为了描述具体实施例,而并非意在限制本公开。在此使用的术语“包括”、“包含”等表明了所述特征、步骤、操作和/或部件的存在,但是并不排除存在或添加一个或多个其他特征、步骤、操作或部件。The terms used herein are only for describing specific embodiments and are not intended to limit the present disclosure. The terms "include", "comprising", etc. used herein indicate the existence of the features, steps, operations and/or components, but do not exclude the existence or addition of one or more other features, steps, operations or components.
在此使用的所有术语(包括技术和科学术语)具有本领域技术人员通常所理解的含义,除非另外定义。应注意,这里使用的术语应解释为具有与本说明书的上下文相一致的含义,而不应以理想化或过于刻板的方式来解释。All terms (including technical and scientific terms) used herein have the meanings commonly understood by those skilled in the art, unless otherwise defined. It should be noted that the terms used herein should be interpreted as having a meaning consistent with the context of this specification, and should not be interpreted in an idealized or overly rigid manner.
在使用类似于“A、B和C等中至少一个”这样的表述的情况下,一般来说应该按照本领域技术人员通常理解该表述的含义来予以解释(例如,“具有A、B和C中至少一个的系统”应包括但不限于单独具有A、单独具有B、单独具有C、具有A和B、具有A和C、具有B和C、和/或具有A、B、C的系统等)。 When using expressions such as "at least one of A, B, and C", they should generally be interpreted according to the meaning of the expression commonly understood by technical personnel in this field (for example, "a system having at least one of A, B, and C" should include but is not limited to a system having A alone, B alone, C alone, A and B, A and C, B and C, and/or A, B, C, etc.).
在本公开的技术方案中,所涉及的用户安检图像的收集、存储、使用、加工、传输、提供、公开和应用等处理,均符合相关法律法规的规定,采取了必要保密措施,且不违背公序良俗。In the technical solution disclosed in the present invention, the collection, storage, use, processing, transmission, provision, disclosure and application of user security inspection images involved are in compliance with the provisions of relevant laws and regulations, necessary confidentiality measures are taken, and do not violate public order and good morals.
相关技术中离线训练方法会在安检现场收集一定量的违禁品(如武器、毒品、炸药、走私物品、走私生物或其他被安检场所禁止的物品)图像,再经过内部处理,再到现场设备手动更新,需要经过一系列人工操作的过程,成本高、效率低。而在机场、海关或具有信息安全要求的安检场所,可能内部网络与外部网络相隔离,如安检机的扫描图像等数据不允许离开内网而拷贝到外部技术厂家,厂家只能从其他途径采集所需图像,一方面厂家收集到足够数量的违禁品图像需要较长时间,另一方面厂家收集到的图像与实际安检现场存在一定的差异,造成最终生成的算法模型与应用现场不能完全匹配,导致操作受限、匹配度差。In the related technologies, offline training methods will collect a certain amount of images of contraband (such as weapons, drugs, explosives, smuggled goods, smuggled organisms or other items prohibited by security inspection sites) at the security inspection site, and then process them internally before manually updating the on-site equipment. This requires a series of manual operations, which is costly and inefficient. In airports, customs or security inspection sites with information security requirements, the internal network may be isolated from the external network. For example, the scanned images of security inspection machines are not allowed to leave the intranet and be copied to external technology manufacturers. Manufacturers can only collect the required images from other channels. On the one hand, it takes a long time for manufacturers to collect a sufficient number of images of contraband. On the other hand, there are certain differences between the images collected by manufacturers and the actual security inspection site, resulting in the final generated algorithm model not being able to fully match the application site, resulting in limited operation and poor matching.
本公开的实施例提供了安检图像识别模型的在线训练方法、在线训练系统、安检图像识别方法、装置、设备、介质和程序产品,在线训练的过程提升了从图像数据到算法模型的转化效率,整个数据流转实现了高度自动化,相较旧的离线方案,大大减少了人工的参与部分。由于采用在线训练方案,某些受信息安全限制的现场没有离线处理数据所以符合信息安全要求,故作为训练样本得到的算法模型更适用于实际现场,提升了算法模型的适用性。The embodiments of the present disclosure provide an online training method, an online training system, a security inspection image recognition method, a device, equipment, a medium and a program product for a security inspection image recognition model. The online training process improves the conversion efficiency from image data to an algorithm model, and the entire data flow is highly automated. Compared with the old offline solution, the manual participation part is greatly reduced. Due to the use of an online training solution, some sites restricted by information security do not have offline processing data, so they meet information security requirements. Therefore, the algorithm model obtained as a training sample is more suitable for the actual site, which improves the applicability of the algorithm model.
以下将结合图1~图12进一步详细介绍。The following will be further described in detail with reference to FIGS. 1 to 12 .
图1示意性示出了根据本公开实施例的用于在线端的在线训练方法的流程图。FIG1 schematically shows a flow chart of an online training method for an online terminal according to an embodiment of the present disclosure.
如图1所示,该实施例的安检图像识别模型的在线训练方法包括操作S110~操作S130。在一些实施例中,还可以包括操作S140。As shown in Fig. 1, the online training method of the security inspection image recognition model of this embodiment includes operations S110 to S130. In some embodiments, it may also include operation S140.
在操作S110,从N个识别端获取具有特定识别结果的M张待检对象图像,其中每个识别端用于确定来自对应安检机的待检对象图像的识别结果,M、N分别大于或等于1。In operation S110, M images of the object to be inspected with specific recognition results are obtained from N recognition terminals, wherein each recognition terminal is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and M and N are respectively greater than or equal to 1.
示例性地,安检机可以包括X射线安检机,其通过X光对过检对象进行扫描得到图像。识别端可以包括能够进行图像的终端设备或 服务器,终端设备可以包括具有显示屏并且支持网页浏览的各种电子设备,包括但不限于智能手机、平板电脑、膝上型便携计算机和台式计算机等等。For example, the security inspection machine may include an X-ray security inspection machine, which scans the inspected object through X-rays to obtain an image. The recognition end may include a terminal device or The server and the terminal device may include various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop computers, desktop computers, and the like.
终端设备上可以安装有人工判图应用和/或自动判图应用,例如人工判图应用可以将待检对象图像展示给判图员,来获得判图员输入的判图结果,即作为确定的识别结果。又例如自动判图应用可以调用安检图像识别模型进行自动识别,获得识别结果。The terminal device may be installed with a manual image judgment application and/or an automatic image judgment application. For example, the manual image judgment application may display the image of the object to be inspected to the judge to obtain the judgment result input by the judge, that is, as the determined recognition result. For another example, the automatic image judgment application may call the security inspection image recognition model for automatic recognition to obtain the recognition result.
示例性地,识别结果可以包括各张待检对象图像中的待检对象类型,如衣服、食品、电子产品或违禁品等。特定识别结果可以包括识别出包含违禁品的结果。例如对于某个识别端,其在某时间段内从100张待检对象图像中识别出5张图像中包含违禁品,则将该5张图像作为具有特定识别结果的图像。Exemplarily, the recognition result may include the type of the object to be inspected in each image of the object to be inspected, such as clothing, food, electronic products or contraband, etc. A specific recognition result may include a result of identifying that contraband is contained. For example, for a certain recognition terminal, if it identifies that 5 images out of 100 images of the object to be inspected contain contraband within a certain time period, then the 5 images are regarded as images with specific recognition results.
在一些实施例中,在线端可以接收N个识别端上传的M张待检对象图像。例如每个识别端与在线端之间配置有数据传输接口,识别端通过调用该接口可以在线发送M张待检对象图像。In some embodiments, the online terminal can receive M images of the object to be inspected uploaded by N recognition terminals. For example, a data transmission interface is configured between each recognition terminal and the online terminal, and the recognition terminal can send M images of the object to be inspected online by calling the interface.
在另一些实施例中,例如每个识别端可以将各自确定出具有特定识别结果的待检对象图像上传到共享数据库或云服务器,在线端可以从该共享数据库或云服务器获取M张待检对象图像。In other embodiments, for example, each recognition terminal may upload the image of the object to be detected having a specific recognition result to a shared database or a cloud server, and the online terminal may obtain M images of the object to be detected from the shared database or the cloud server.
根据本公开的实施例,与离线训练方法中需要人工拷贝不同,识别端和在线端之间的待检对象图像传输在线上进行,即可以减少人工操作节省时间,又可以避免离线导致的信息安全问题。According to the embodiments of the present disclosure, unlike the offline training method which requires manual copying, the transmission of the image of the object to be inspected between the recognition end and the online end is performed online, which can reduce manual operations and save time, and avoid information security issues caused by offline.
在操作S120,获得M张待检对象图像中每张待检对象图像的数据标注结果。In operation S120, a data annotation result of each of the M images of the object to be inspected is obtained.
示例性地,数据标注结果可以是识别端在识别时自动标注的,该情况下从识别端获得。还可以是在获取到M张待检对象图像让人工进行标注,或者使用自动标注软件实现自动标注。For example, the data annotation result may be automatically annotated by the recognition end during recognition, in which case it is obtained from the recognition end. It may also be annotated manually after obtaining M images of the object to be inspected, or it may be automatically annotated using automatic annotation software.
在一些实施例中,每张待检对象图像的数据标注结果包括该张待检对象图像中至少一个待检对象的对象类型,和/或至少一个待检对象的位置信息。In some embodiments, the data annotation result of each image of the object to be inspected includes the object type of at least one object to be inspected in the image of the object to be inspected, and/or the position information of at least one object to be inspected.
其中,对象类型可以包括具体的待检对象名称,如打火机、手机、 刀、枪、炸药、毒品等,还可以包括违禁品类型,如武器类型、易燃易爆类型或生物类型等。位置信息可以包括在图像上的对象标注框,可以框选出待检对象的位置。The object type may include the specific name of the object to be inspected, such as lighters, mobile phones, Knives, guns, explosives, drugs, etc., and may also include types of contraband, such as weapon types, inflammable and explosive types, or biological types, etc. The location information may include an object annotation box on the image, which may be used to select the location of the object to be inspected.
在操作S130,将每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型。In operation S130, each image of the object to be inspected and its data annotation results are used as training samples for online training to obtain a first security inspection image recognition model.
例如第一安检图像识别模型根据卷积神经网络算法构建获得,并进行在线训练。每个训练样本可以包括一张待检对象图像和其中的违禁品类型标签与位置标签,在线训练的过程即将多个训练样本输入至初始化的第一安检图像识别模型,通过不断迭代和反向传播来更新模型中的参数,直至模型的目标函数符合要求或迭代结束。For example, the first security inspection image recognition model is constructed based on the convolutional neural network algorithm and trained online. Each training sample can include an image of the object to be inspected and the type and location labels of the contraband therein. The online training process is to input multiple training samples into the initialized first security inspection image recognition model, and update the parameters in the model through continuous iteration and back propagation until the objective function of the model meets the requirements or the iteration ends.
在一些实施例中,将每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型包括:在训练样本的数量大于或等于预设阈值的情况下,自动进行在线训练获得第一安检图像识别模型。In some embodiments, each image of the object to be inspected and its data annotation results are used as training samples for online training to obtain a first security inspection image recognition model, including: when the number of training samples is greater than or equal to a preset threshold, automatically performing online training to obtain the first security inspection image recognition model.
离线训练方式是将预先收集好的所有的训练样本集中起来同时进行学习,当数据量比较大时其训练时间较长,无法实时调整模型以适应可能发生变化的实际安检现场(如出现新的违禁品),同样地,由于涉及到多处人工环节,也会导致耗时较长而最终生成的模型无法适应。The offline training method is to collect all the pre-collected training samples together and learn them at the same time. When the amount of data is large, the training time is long, and the model cannot be adjusted in real time to adapt to the actual security inspection scene that may change (such as the appearance of new contraband). Similarly, since it involves many manual links, it will also take a long time and the final generated model will not be able to adapt.
在线训练的方式等训练样本的数量大于或等于预设阈值时即可自动运行,能够很好地适应实际安检现场,并且能够很好地适应于可能出现新型违禁品或藏匿方式的场景中。The online training method can run automatically when the number of training samples is greater than or equal to a preset threshold, which can adapt well to the actual security inspection scene and can adapt well to the scene where new types of contraband or hiding methods may appear.
在一些实施例中,也可以根据用户需求手动启动训练,例如取消自动训练,无论在训练样本的数量大于或等于预设阈值或小于预设阈值时皆等待手动启动训练。又例如保留数量大于或等于预设阈值时自动启动训练的方式,而在训练样本的数量小于预设阈值时,亦可以手动启动训练。In some embodiments, training can also be manually started according to user needs, such as canceling automatic training, waiting for manual training to be started regardless of whether the number of training samples is greater than or equal to a preset threshold or less than a preset threshold. For another example, the method of automatically starting training when the number is greater than or equal to a preset threshold is retained, and training can also be manually started when the number of training samples is less than the preset threshold.
根据本公开的实施例,能够提升从安检机的现场图像数据到识别模型的转化效率,提高了整个数据流转过程的自动化程度,还能够提升识别模型对实际安检现场的适用性。 According to the embodiments of the present disclosure, the conversion efficiency from the on-site image data of the security inspection machine to the recognition model can be improved, the degree of automation of the entire data flow process is improved, and the applicability of the recognition model to the actual security inspection site can also be improved.
在一些实施例中,将每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型包括:对预先部署在每个识别端的第二安检图像识别模型进行在线训练,获得第一安检图像识别模型。或对预先训练好的第三安检图像识别模型进行在线训练,获得第一安检图像识别模型。或对未经训练的第四安检图像识别模型进行在线训练,获得第一安检图像识别模型。In some embodiments, each image of the object to be inspected and its data annotation results are used as training samples for online training to obtain the first security inspection image recognition model, including: online training of the second security inspection image recognition model pre-deployed at each recognition terminal to obtain the first security inspection image recognition model. Or online training of the pre-trained third security inspection image recognition model to obtain the first security inspection image recognition model. Or online training of the untrained fourth security inspection image recognition model to obtain the first security inspection image recognition model.
根据本公开的实施例,在线端可以提供多种训练措施。通过对第二安检图像识别模型在线训练,可以进一步在识别端原有的识别效果基础上提升准确度和适用性,降低训练成本。第三安检图像识别模型可能是预先训练好但未进行部署,以迁移学习的方式对第三安检图像识别模型继续训练可以获得更好的识别效果,且训练成本也会降低。第四安检图像识别模型可以是初始化得到的,对其进行训练得到的模型可以更好应用到实际安检场景。According to the embodiments of the present disclosure, a variety of training measures can be provided online. By training the second security inspection image recognition model online, the accuracy and applicability can be further improved on the basis of the original recognition effect of the recognition end, and the training cost can be reduced. The third security inspection image recognition model may be pre-trained but not deployed. Continuing to train the third security inspection image recognition model in a transfer learning manner can obtain better recognition effects, and the training cost will also be reduced. The fourth security inspection image recognition model can be initialized, and the model obtained by training it can be better applied to actual security inspection scenarios.
在一些实施例中,使用在线训练的方式得到第一安检图像识别模型后,可以自动部署到N个识别端。在操作S140,将第一安检图像识别模型发送至N个识别端,其中,N个识别端被配置为在本地部署第一安检图像识别模型。In some embodiments, after the first security inspection image recognition model is obtained by online training, it can be automatically deployed to N recognition terminals. In operation S140, the first security inspection image recognition model is sent to the N recognition terminals, wherein the N recognition terminals are configured to deploy the first security inspection image recognition model locally.
根据本公开的实施例,识别端可以将实际安检现场的图像发送至在线端,而在线端利用上述图像在线训练得到第一安检图像识别模型后又可以部署到识别端,换言之,通过在线数据闭环,利用现场图像数据完成新模型训练生成,再将新模型反馈到现场智能识别设备中,因此实现了安检图像识别模型的在线训练和升级。According to the embodiments of the present disclosure, the recognition end can send images of the actual security inspection site to the online end, and the online end can use the above images for online training to obtain a first security inspection image recognition model, which can then be deployed to the recognition end. In other words, through the online data closed loop, the on-site image data is used to complete the training and generation of a new model, and then the new model is fed back to the on-site intelligent recognition device, thereby realizing the online training and upgrading of the security inspection image recognition model.
在一些实施例中,在线端可以直接将第一安检图像识别模型推送到识别端,也可以如图2向识别端发送模型更新指令,具体如下。In some embodiments, the online end may directly push the first security inspection image recognition model to the recognition end, or may send a model update instruction to the recognition end as shown in FIG. 2 , as follows.
图2示意性示出了根据本公开实施例的模型更新的流程图。FIG. 2 schematically shows a flow chart of model updating according to an embodiment of the present disclosure.
在将第一安检图像识别模型发送至N个识别端之前,如图2所示,可以包括操作S210~操作S220。Before sending the first security inspection image recognition model to N recognition terminals, as shown in FIG. 2 , operations S210 to S220 may be included.
在操作S210,获得第一安检图像识别模型的评估指标。In operation S210, an evaluation index of a first security inspection image recognition model is obtained.
示例性地,可以将测试集中的样本输入至模型,根据识别结果获得该模型的准确率、精确率、召回率或F1值等评估指标。可以给出 新模型的指标评估报告由用户选择是否进行模型更新,也执行“新模型和旧模型指标比较”的步骤,若新模型优于旧模型则自动更新。For example, the samples in the test set can be input into the model, and the evaluation indicators such as accuracy, precision, recall or F1 value of the model can be obtained according to the recognition results. The indicator evaluation report of the new model allows the user to choose whether to update the model and also execute the step of "comparing the indicators of the new model and the old model". If the new model is better than the old model, it will be automatically updated.
在操作S220,在评估指标符合预设条件时,向N个识别端发送模型更新指令,其中,N个识别端被配置为响应于模型更新指令获取第一安检图像识别模型。In operation S220, when the evaluation index meets the preset conditions, a model update instruction is sent to the N recognition terminals, wherein the N recognition terminals are configured to obtain a first security inspection image recognition model in response to the model update instruction.
根据本公开的实施例,向N个识别端发送模型更新指令后,何时更新可以由识别端决定,可以考虑到识别端本地的实际情况灵活更新。According to an embodiment of the present disclosure, after sending a model update instruction to N recognition terminals, the recognition terminals can decide when to update, and can flexibly update in consideration of the actual local conditions of the recognition terminals.
图3示意性示出了根据本公开实施例的获取数据标注结果的流程图。FIG3 schematically shows a flow chart of obtaining data annotation results according to an embodiment of the present disclosure.
如图3所示,在操作S130中获得M张待检对象图像中每张待检对象图像的数据标注结果包括操作S310~操作S320。As shown in FIG. 3 , obtaining the data annotation result of each of the M images of the object to be inspected in operation S130 includes operations S310 to S320 .
在操作S310,按照任务类型分发M张待检对象图像,任务类型根据每张待检对象图像的识别结果确定。In operation S310 , M images of objects to be inspected are distributed according to task types, and the task type is determined according to the recognition result of each image of the object to be inspected.
其中,任务类型可以与违禁品类型对应,如武器类型、易燃易爆类型或生物类型等。举例而言,某张待检对象图像的识别结果为存在刀具,则归属为武器类型,某张待检对象图像的识别结果为存在炸药,则归属为易燃易爆类型。The task type may correspond to the type of contraband, such as weapon type, inflammable and explosive type, or biological type, etc. For example, if the recognition result of an image of an object to be inspected is that there is a knife, it is classified as a weapon type, and if the recognition result of an image of an object to be inspected is that there is explosives, it is classified as an inflammable and explosive type.
在操作S320,获取分发后每张待检对象图像的数据标注结果。In operation S320, the data annotation result of each image of the object to be inspected after distribution is obtained.
示例性地,分发可以包括按照任务类型发送到不同的标注人员手中,由人工对该类型的图像进行标注。还可以包括调用自动标注应用按照不同的任务类型设置标注任务。还可以包括在数据量大时发送到不同的服务器进行自动标注。For example, the distribution may include sending the images to different annotators according to the task type, and manually annotating the images of the type. It may also include calling an automatic annotation application to set annotation tasks according to different task types. It may also include sending the images to different servers for automatic annotation when the amount of data is large.
在一些实施例中,M张待检对象图像属于至少一个任务类型,将每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型包括:将相同任务类型的至少一张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得该任务类型对应的第一安检图像识别模型。In some embodiments, M images of objects to be inspected belong to at least one task type, and each image of the object to be inspected and its data annotation results are used as training samples for online training to obtain a first security inspection image recognition model, including: using at least one image of the object to be inspected of the same task type and its data annotation results as training samples for online training to obtain a first security inspection image recognition model corresponding to the task type.
其中,可以具有多个第一安检图像识别模型,例如利用武器类型的样本训练得到的模型用于识别武器,利用易燃易爆类型的样本训练 得到的模型用于识别烟花、炸药等易燃易爆物品。在一些实施例中,仅有一个第一安检图像识别模型,其可以通过多个任务类型的样本训练获得,以识别不同类型的对象。There may be multiple first security inspection image recognition models, for example, a model trained with samples of weapon type is used to identify weapons, and a model trained with samples of flammable and explosive type is used to identify The obtained model is used to identify inflammable and explosive items such as fireworks and explosives. In some embodiments, there is only one first security inspection image recognition model, which can be obtained by training samples of multiple task types to identify different types of objects.
根据本公开的实施例,对每个任务类型在线训练得到对应的第一安检图像识别模型,可以提高对待检对象图像识别的准确性。According to the embodiments of the present disclosure, online training is performed for each task type to obtain a corresponding first security inspection image recognition model, which can improve the accuracy of image recognition of the object to be inspected.
图4示意性示出了根据本公开实施例的用于识别端的在线训练方法的流程图。FIG4 schematically shows a flow chart of an online training method for an identification terminal according to an embodiment of the present disclosure.
如图4所示,该实施例的安检图像识别模型的在线训练方法包括操作S410~操作S430,其可以应用到N个识别端中任一识别端。As shown in FIG. 4 , the online training method of the security inspection image recognition model of this embodiment includes operations S410 to S430 , which can be applied to any recognition end among N recognition ends.
在操作S410,从对应安检机获取S张待检对象图像,S大于或等于1。In operation S410, S images of the object to be inspected are obtained from the corresponding security inspection machine, where S is greater than or equal to 1.
在一些实施例中,识别端与安检机通信连接,从对应安检机获取S张待检对象图像包括:在安检机对过检对象进行扫描获得每张待检对象图像后,实时获取该张待检对象图像。In some embodiments, the identification terminal is in communication connection with the security inspection machine, and obtaining S images of the object to be inspected from the corresponding security inspection machine includes: after the security inspection machine scans the inspected object to obtain each image of the object to be inspected, obtaining the image of the object to be inspected in real time.
示例性地,安检机借助于输送带将过检对象(如行李)送入X射线检查通道,行李进入X射线检查通道,触发X射线的射线源发射X射线束。X射线束穿过输送带上的过检对象,被过检对象吸收,最后轰击安装在通道内的探测器。探测器把X射线转变为信号,并实时送到识别端,这些信号处理后就可以形成图像,并可以在显示屏显示出来,即完成了实时获取该张待检对象图像。For example, the security inspection machine uses a conveyor belt to transport the inspected object (such as luggage) into the X-ray inspection channel. The luggage enters the X-ray inspection channel, triggering the X-ray source to emit an X-ray beam. The X-ray beam passes through the inspected object on the conveyor belt, is absorbed by the inspected object, and finally bombards the detector installed in the channel. The detector converts the X-ray into a signal and sends it to the recognition end in real time. After these signals are processed, an image can be formed and displayed on the display screen, which means that the image of the object to be inspected is acquired in real time.
在操作S420,确定S张待检对象图像中每张待检对象图像的识别结果。In operation S420, a recognition result of each of the S images of the object to be inspected is determined.
在人工判图时,安保人员通过显示屏根据物品轮廓以及物品成像颜色进行识别违禁品,并作出判图结论,该判图结论即为识别结果。在自动判图时,如运行安检图像识别模型处理图像,则可以不配置显示屏,模型自动输出识别结果。从而根据识别结果可以有效的排除人员携带的随身包裹里面是否携带了违禁物品。During manual image judgment, security personnel use the display screen to identify prohibited items based on the outline of the item and the color of the item image, and make a judgment conclusion, which is the recognition result. During automatic image judgment, if the security inspection image recognition model is used to process the image, the display screen can be omitted, and the model automatically outputs the recognition result. Therefore, based on the recognition result, it is possible to effectively exclude whether the carry-on bag carried by the person contains prohibited items.
在操作S430,将具有特定识别结果的至少一张待检对象图像发送至在线端,其中,在线端用于执行图1~图3对应的一个或多个实施例来获得第一安检图像识别模型。 In operation S430, at least one image of the object to be inspected having a specific recognition result is sent to an online end, wherein the online end is used to execute one or more embodiments corresponding to FIGS. 1 to 3 to obtain a first security inspection image recognition model.
根据本公开的实施例,识别端可以直接将待检对象图像发送至在线端,图像传输在线上进行,提高了数据流转效率,降低了耗时成本,保证了数据安全。According to the embodiments of the present disclosure, the recognition end can directly send the image of the object to be inspected to the online end, and the image transmission is performed online, which improves the data flow efficiency, reduces the time cost, and ensures data security.
图5示意性示出了根据本公开另一实施例的模型更新的流程图。FIG. 5 schematically shows a flow chart of model updating according to another embodiment of the present disclosure.
如图5所示,该实施例的模型更新包括操作S510~操作S520。As shown in FIG. 5 , the model updating of this embodiment includes operations S510 to S520 .
在操作S510,从在线端获取第一安检图像识别模型。In operation S510, a first security inspection image recognition model is obtained from an online end.
示例性地,识别端可以监控在线端的模型更新情况,也可以定时向在线端发送模型是否更新的查询指令,还可以接收在线端发送的第一安检图像识别模型。Exemplarily, the recognition end may monitor the model update status of the online end, may periodically send a query instruction to the online end to inquire whether the model has been updated, and may also receive the first security inspection image recognition model sent by the online end.
在一些实施例中,在从在线端获取第一安检图像识别模型之前,还包括:接收在线端发送的模型更新指令。识别端在接收到模型更新指令后,可以自动去在线端获取第一安检图像识别模型。In some embodiments, before obtaining the first security inspection image recognition model from the online terminal, the method further includes: receiving a model update instruction sent by the online terminal. After receiving the model update instruction, the recognition terminal can automatically obtain the first security inspection image recognition model from the online terminal.
在操作S520,自动部署第一安检图像识别模型。In operation S520, a first security inspection image recognition model is automatically deployed.
在一些实施例中,识别端可能原本是由人工判图,该情况下可以自动安装第一安检图像识别模型。In some embodiments, the recognition end may originally be manually judged, in which case the first security inspection image recognition model can be automatically installed.
在另一些实施例中,识别端可以利用预先部署的第二安检图像识别模型获得识别结果,该情况下可以自动完成模型升级。在另一些实施例中,区别于操作S520,可以通过手动升级的方式部署模型。In other embodiments, the recognition end may obtain the recognition result by using the pre-deployed second security inspection image recognition model, in which case the model upgrade may be completed automatically. In other embodiments, different from operation S520, the model may be deployed by manual upgrade.
根据本公开的实施例,通过在线数据闭环的方式,将利用现场图像数据获得的第一安检图像识别在线反馈到识别端,避免了离线训练方法还需要外部厂家安排人工去现场手动升级的缺陷。According to the embodiments of the present disclosure, the first security inspection image recognition obtained by using the on-site image data is fed back online to the recognition end through an online data closed-loop method, thereby avoiding the defect that the offline training method still requires external manufacturers to arrange manual on-site upgrades.
图6示意性示出了根据本公开实施例的安检图像识别方法的流程图。FIG6 schematically shows a flow chart of a security inspection image recognition method according to an embodiment of the present disclosure.
如图6所示,该实施例的安检图像识别方法包括操作S610~操作S620,其可以应用到N个识别端中任一识别端。As shown in FIG. 6 , the security inspection image recognition method of this embodiment includes operations S610 to S620 , which can be applied to any recognition terminal among N recognition terminals.
在操作S610,从对应安检机获取Q张待检对象图像,Q大于或等于1。In operation S610, Q images of the object to be inspected are obtained from the corresponding security inspection machine, where Q is greater than or equal to 1.
示例性地,该Q张待检对象图像也可以是在过检对象进入安检机扫描后通过数据传输实时获得。Exemplarily, the Q images of the object to be inspected may also be obtained in real time through data transmission after the object to be inspected enters the security inspection machine for scanning.
在操作S620,利用第一安检图像识别模型对Q张待检对象图像 进行识别,获得识别结果,其中,第一安检图像识别模型根据图1~图5对应的一个或多个实施例获得。In operation S620, the first security inspection image recognition model is used to identify Q images of the object to be inspected. Perform recognition to obtain a recognition result, wherein the first security inspection image recognition model is obtained according to one or more embodiments corresponding to Figures 1 to 5.
如上述在线训练和升级第一安检图像识别模型之后,可以运行该模型以对Q张待检对象图像进行识别,从而能够得到更准确的识别结果,对当前实际安检现场具有更好的适用性。After the first security inspection image recognition model is trained and upgraded online as described above, the model can be run to recognize Q images of objects to be inspected, thereby obtaining more accurate recognition results with better applicability to the current actual security inspection site.
图7示意性示出了根据本公开实施例的在线训练系统的架构图。FIG. 7 schematically shows an architecture diagram of an online training system according to an embodiment of the present disclosure.
如图7所示,该实施例的在线训练系统包括N个识别端和在线端,具体包括N个安检机(如711-安检机1、712-安检机2……713-安检机N)、N个识别设备(如721-识别设备1、722-识别设备2……723-识别设备N)、数据管理平台731和在线训练平台732。其中,N个识别端可以包括N个识别设备和N个安检机,在线端包括数据管理平台和731在线训练平台732。在一些实施例中,数据管理平台731和在线训练平台732也可以合并为一个平台。上述平台包括实现对应功能所需要的计算机硬件和/或软件的操作环境。需要说明的是,图7所示的架构图仅是示例性地,在实现本公开实施例的在线训练模型的构思下,可以对在线训练系统的架构进行变形,例如在一些实施例中,1个识别设备可以对应多个安检机,并不需要一一对应,而数据管理平台依然可以接收一个或多个识别设备传输的图像。As shown in FIG7 , the online training system of this embodiment includes N identification terminals and online terminals, specifically including N security inspection machines (such as 711-security inspection machine 1, 712-security inspection machine 2 ... 713-security inspection machine N), N identification devices (such as 721-identification device 1, 722-identification device 2 ... 723-identification device N), a data management platform 731 and an online training platform 732. Among them, the N identification terminals may include N identification devices and N security inspection machines, and the online terminal includes a data management platform and 731 online training platform 732. In some embodiments, the data management platform 731 and the online training platform 732 may also be combined into one platform. The above platform includes the operating environment of the computer hardware and/or software required to implement the corresponding functions. It should be noted that the architecture diagram shown in FIG7 is only exemplary. Under the concept of implementing the online training model of the embodiment of the present disclosure, the architecture of the online training system can be deformed. For example, in some embodiments, one identification device can correspond to multiple security inspection machines, and there is no need for one-to-one correspondence, and the data management platform can still receive images transmitted by one or more identification devices.
参照图7,每个识别端包括识别设备,识别设备用于确定来自对应安检机的待检对象图像的识别结果,并将具有特定识别结果的至少一张待检对象图像发送至在线端。7 , each recognition terminal includes a recognition device, which is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and send at least one image of the object to be inspected with a specific recognition result to the online terminal.
在线端包括数据管理平台731和在线训练平台732,其中:数据管理平台731用于接收N个识别设备发送的至少一张待检对象图像,并将至少一张待检对象图像及数据标注结果发送至在线训练平台732。在线训练平台732用于将至少一张待检对象图像及数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型。The online end includes a data management platform 731 and an online training platform 732, wherein: the data management platform 731 is used to receive at least one image of the object to be inspected sent by N recognition devices, and send at least one image of the object to be inspected and the data annotation result to the online training platform 732. The online training platform 732 is used to perform online training using at least one image of the object to be inspected and the data annotation result as training samples to obtain a first security inspection image recognition model.
在另一些实施例中,在线训练平台还用于将第一安检图像识别模型发送至N个识别设备。N个识别设备用于接收并自动部署第一安检图像识别模型。In some other embodiments, the online training platform is further used to send the first security inspection image recognition model to N recognition devices. The N recognition devices are used to receive and automatically deploy the first security inspection image recognition model.
该实施例的识别端可以执行上述图1~图3描述的用于识别端的 在线训练方法的一个或多个步骤,在线端可以执行图4~图5描述的上述用于在线端的在线训练方法的一个或多个步骤。The identification end of this embodiment can execute the above-mentioned FIG. 1 to FIG. 3 for the identification end One or more steps of the online training method, the online end may execute one or more steps of the online training method for the online end described in FIG. 4 to FIG. 5 .
尤其说明,图7中的箭头为数据流向图,下面以711-安检机1和721-识别设备1,数据管理平台731和在线训练平台732举例,通过图8展开对在线训练系统运行过程数据流向的说明。In particular, the arrows in Figure 7 are data flow diagrams. Taking 711-security inspection machine 1 and 721-identification device 1, data management platform 731 and online training platform 732 as examples, Figure 8 is used to expand the description of the data flow during the operation of the online training system.
图8示意性示出了根据本公开实施例的在线训练系统的数据闭环流向图。FIG8 schematically shows a data closed-loop flow diagram of an online training system according to an embodiment of the present disclosure.
如图8所示,该实施例的在线训练系统运行过程中的数据闭环流向过程包括操作S810~操作S880。As shown in FIG. 8 , the data closed-loop flow process during the operation of the online training system of this embodiment includes operations S810 to S880 .
操作S810,711-安检机1对过检对象进行X光扫描,将信号传输到721-识别设备1。Operation S810, 711-security inspection machine 1 performs X-ray scanning on the inspected object and transmits the signal to 721-identification device 1.
操作S820,721-识别设备1对安检机的过机X光图像进行实时违禁品识别。Operation S820, 721-the identification device 1 performs real-time contraband identification on the X-ray image passing through the security inspection machine.
操作S830,721-识别设备1将智能识别出违禁品的X光图像上传到数据管理平台731。721-识别设备1也可以从外部系统获得X光图像的人工判图结论,然后将人工判图有违禁品的X光图像上传到数据管理平台731。Operation S830, 721-recognition device 1 uploads the X-ray image that intelligently identifies contraband to the data management platform 731. 721-recognition device 1 can also obtain the manual judgment conclusion of the X-ray image from an external system, and then upload the X-ray image that is manually judged to contain contraband to the data management platform 731.
操作S840,数据管理平台731将上传来的X光图像按照任务类型分发到图像标注终端,由人工进行X光图像标注或是自动标注。In operation S840, the data management platform 731 distributes the uploaded X-ray images to the image annotation terminals according to the task type, and the X-ray images are annotated manually or automatically.
操作S850,数据管理平台731将标注后的X光图像及数据上传到在线训练平台732。In operation S850 , the data management platform 731 uploads the annotated X-ray image and data to the online training platform 732 .
操作S860,当标注后的X光图像积累到一定数量后,在线训练平台732使用这些图像自动进行训练学习,生成新的算法模型,并同时给出新模型的指标评估报告。Operation S860, when a certain number of annotated X-ray images are accumulated, the online training platform 732 uses these images to automatically perform training and learning, generates a new algorithm model, and simultaneously provides an indicator evaluation report of the new model.
操作S870,用户根据评估报告的情况,选择是否对721-识别设备1的现有算法模型进行更新。如执行更新,则向721-识别设备1发送模型更新指令。Operation S870: The user selects whether to update the existing algorithm model of 721-recognition device 1 according to the evaluation report. If the update is performed, a model update instruction is sent to 721-recognition device 1.
操作S880,如执行更新指令,则721-识别设备1将获取指定的算法模型完成自动升级。Operation S880, if the update instruction is executed, then 721- the recognition device 1 will obtain the specified algorithm model to complete the automatic upgrade.
根据本公开实施例,采用在线训练的方案,包含智能识别设备、 数据管理平台、在线训练平台几个组成部分,通过在实际安检现场实时采集含有违禁品的安检X光图像,来实现智能识别算法模型的在线训练和升级。According to the embodiment of the present disclosure, an online training scheme is adopted, including intelligent recognition equipment, The data management platform and online training platform are several components that realize online training and upgrading of intelligent recognition algorithm models by real-time collection of security X-ray images containing prohibited items at the actual security inspection site.
基于上述用于在线端的安检图像识别模型的在线训练方法,本公开还提供了一种用于在线端的安检图像识别模型的在线训练装置。以下将结合图9对该装置进行详细描述。Based on the above-mentioned online training method for the online security inspection image recognition model, the present disclosure also provides an online training device for the online security inspection image recognition model. The device will be described in detail below in conjunction with FIG.
图9示意性示出了根据本公开实施例的用于在线端的在线训练装置的结构框图。FIG9 schematically shows a structural block diagram of an online training device for an online terminal according to an embodiment of the present disclosure.
如图9所示,该实施例的在线训练装置900包括第一图像模块910,数据标注模块920和数据标注模块930。As shown in FIG. 9 , the online training device 900 of this embodiment includes a first image module 910 , a data annotation module 920 and a data annotation module 930 .
第一图像模块910可以执行操作S110,用于从N个识别端获取具有特定识别结果的M张待检对象图像,其中每个识别端用于确定来自对应安检机的待检对象图像的识别结果,M、N分别大于或等于1。The first image module 910 can perform operation S110 to obtain M images of the object to be inspected with specific recognition results from N recognition terminals, wherein each recognition terminal is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and M and N are respectively greater than or equal to 1.
在一些实施例中,第一图像模块910用于接收N个识别端上传的M张待检对象图像。In some embodiments, the first image module 910 is used to receive M images of the object to be inspected uploaded by N recognition terminals.
数据标注模块920可以执行操作S120,用于获得M张待检对象图像中每张待检对象图像的数据标注结果。The data annotation module 920 may perform operation S120 to obtain a data annotation result for each of the M images of the object to be inspected.
在一些实施例中,数据标注模块920可以执行操作S310~操作S320,在此不做赘述。In some embodiments, the data labeling module 920 may perform operations S310 to S320, which will not be described in detail herein.
在线训练模块930可以执行操作S130,用于将每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型。The online training module 930 may perform operation S130 to perform online training using each image of the object to be inspected and its data annotation result as a training sample to obtain a first security inspection image recognition model.
在一些实施例中,在线训练模块930用于对预先部署在每个识别端的第二安检图像识别模型进行在线训练,获得第一安检图像识别模型。和/或对预先训练好的第三安检图像识别模型进行在线训练,获得第一安检图像识别模型。和/或对未经训练的第四安检图像识别模型进行在线训练,获得第一安检图像识别模型。In some embodiments, the online training module 930 is used to perform online training on the second security inspection image recognition model pre-deployed on each recognition terminal to obtain the first security inspection image recognition model. And/or perform online training on the pre-trained third security inspection image recognition model to obtain the first security inspection image recognition model. And/or perform online training on the untrained fourth security inspection image recognition model to obtain the first security inspection image recognition model.
在一些实施例中,在线训练模块930用于将相同任务类型的至少一张待检对象图像及其数据标注结果作为训练样本进行在线训练,获 得该任务类型对应的第一安检图像识别模型。In some embodiments, the online training module 930 is used to perform online training using at least one image of an object to be inspected of the same task type and its data annotation results as training samples to obtain Obtain the first security inspection image recognition model corresponding to the task type.
在一些实施例中,在训练样本的数量大于或等于预设阈值的情况下,自动进行在线训练获得第一安检图像识别模型。In some embodiments, when the number of training samples is greater than or equal to a preset threshold, online training is automatically performed to obtain a first security inspection image recognition model.
在一些实施例中,在线训练装置900还可以包括模型发送模块,可以执行操作S140,用于将第一安检图像识别模型发送至N个识别端。在一些实施例中,该模块还可以执行操作S210~操作S220,在此不做赘述。In some embodiments, the online training device 900 may further include a model sending module, which may perform operation S140 to send the first security inspection image recognition model to N recognition terminals. In some embodiments, the module may further perform operations S210 to S220, which are not described in detail herein.
基于上述用于识别端的安检图像识别模型的在线训练方法,本公开还提供了一种用于识别端的安检图像识别模型的在线训练装置。以下将结合图10对该装置进行详细描述。Based on the above-mentioned online training method for the security inspection image recognition model of the recognition terminal, the present disclosure also provides an online training device for the security inspection image recognition model of the recognition terminal. The device will be described in detail below in conjunction with FIG.
图10示意性示出了根据本公开实施例的用于识别端的在线训练装置的结构框图。FIG10 schematically shows a structural block diagram of an online training device for an identification terminal according to an embodiment of the present disclosure.
如图10所示,该实施例的在线训练装置1000包括第二图像模块1010、第一识别模块1020和第三图像模块1030。As shown in FIG. 10 , the online training device 1000 of this embodiment includes a second image module 1010 , a first recognition module 1020 , and a third image module 1030 .
第二图像模块1010可以执行操作S410,用于从对应安检机获取S张待检对象图像,S大于或等于1。The second image module 1010 may perform operation S410 to obtain S images of the object to be inspected from the corresponding security inspection machine, where S is greater than or equal to 1.
在一些实施例中,第二图像模块1010用于在安检机对过检对象进行扫描获得每张待检对象图像后,实时获取该张待检对象图像。In some embodiments, the second image module 1010 is used to obtain each image of the object to be inspected in real time after the security inspection machine scans the object to be inspected to obtain the image of the object to be inspected.
第一识别模块1020可以执行操作S420,用于确定S张待检对象图像中每张待检对象图像的识别结果。The first recognition module 1020 may perform operation S420 to determine a recognition result of each of the S images of the object to be detected.
第三图像模块1030可以执行操作S430,用于将具有特定识别结果的至少一张待检对象图像发送至在线端,其中,在线端用于执行图1~图3示出的在线训练方法获得第一安检图像识别模型。The third image module 1030 can perform operation S430 to send at least one image of the object to be inspected having a specific recognition result to an online end, wherein the online end is used to execute the online training method shown in Figures 1 to 3 to obtain a first security inspection image recognition model.
在一些实施例中,在线训练装置1000还可以包括模型升级模块,可以执行操作S510~操作S520,在此不做赘述。在一些实施例中,模型升级模块用于在从在线端获取第一安检图像识别模型之前,接收在线端发送的模型更新指令。In some embodiments, the online training device 1000 may further include a model upgrade module, which may perform operations S510 to S520, which are not described in detail herein. In some embodiments, the model upgrade module is used to receive a model update instruction sent by the online end before acquiring the first security inspection image recognition model from the online end.
基于上述用于识别端的安检图像识别方法,本公开还提供了一种用于识别端的安检图像识别装置。以下将结合图11对该装置进行详细描述。 Based on the above security inspection image recognition method for an identification terminal, the present disclosure further provides a security inspection image recognition device for an identification terminal. The device will be described in detail below in conjunction with FIG.
图11示意性示出了根据本公开实施例的用于识别端的安检图像识别装置的结构框图。FIG. 11 schematically shows a structural block diagram of a security inspection image recognition device for an identification terminal according to an embodiment of the present disclosure.
如图11所示,该实施例的安检图像识别装置1100包括第四图像模块1110和第二识别模块1120。As shown in FIG. 11 , the security inspection image recognition device 1100 of this embodiment includes a fourth image module 1110 and a second recognition module 1120 .
第四图像模块1110可以执行操作S610,用于从对应安检机获取Q张待检对象图像,Q大于或等于1。The fourth image module 1110 may perform operation S610 to obtain Q images of the object to be inspected from the corresponding security inspection machine, where Q is greater than or equal to 1.
第二识别模块1120可以执行操作S620,用于利用第一安检图像识别模型对Q张待检对象图像进行识别,获得识别结果,其中,第一安检图像识别模型根据图1~图5描述的在线训练方法获得。The second recognition module 1120 can perform operation S620 to recognize Q images of objects to be inspected by using the first security inspection image recognition model to obtain a recognition result, wherein the first security inspection image recognition model is obtained according to the online training method described in Figures 1 to 5.
需要说明的是,各个装置部分实施例中各模块/单元/子单元等的实施方式、解决的技术问题、实现的功能、以及达到的技术效果分别与方法部分实施例中各对应的步骤的实施方式、解决的技术问题、实现的功能、以及达到的技术效果相同或类似,在此不再赘述。It should be noted that the implementation methods, technical problems solved, functions realized, and technical effects achieved of each module/unit/sub-unit, etc. in each device part embodiment are the same or similar to the implementation methods, technical problems solved, functions realized, and technical effects achieved of each corresponding step in the method part embodiment, and will not be repeated here.
根据本公开的实施例,在线训练装置900、在线训练装置1000或安检图像识别装置1100中的任意多个模块可以合并在一个模块中实现,或者其中的任意一个模块可以被拆分成多个模块。或二者,这些模块中的一个或多个模块的至少部分功能可以与其他模块的至少部分功能相结合,并在一个模块中实现。According to an embodiment of the present disclosure, any multiple modules in the online training device 900, the online training device 1000 or the security inspection image recognition device 1100 may be combined into one module for implementation, or any one of the modules may be split into multiple modules. Or both, at least part of the functions of one or more of these modules may be combined with at least part of the functions of other modules and implemented in one module.
根据本公开的实施例,在线训练装置900、在线训练装置1000或安检图像识别装置1100中的至少一个可以至少被部分地实现为硬件电路,例如现场可编程门阵列(FPGA)、可编程逻辑阵列(PLA)、片上系统、基板上的系统、封装上的系统、专用集成电路(ASIC),或可以通过对电路进行集成或封装的任何其他的合理方式等硬件或固件来实现,或以软件、硬件以及固件三种实现方式中任意一种或以其中任意几种的适当组合来实现。或者,在线训练装置900、在线训练装置1000或安检图像识别装置1100中的至少一个可以至少被部分地实现为计算机程序模块,当该计算机程序模块被运行时,可以执行相应的功能。According to an embodiment of the present disclosure, at least one of the online training device 900, the online training device 1000, or the security inspection image recognition device 1100 may be at least partially implemented as a hardware circuit, such as a field programmable gate array (FPGA), a programmable logic array (PLA), a system on a chip, a system on a substrate, a system on a package, an application specific integrated circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging the circuit, or in any one of the three implementation methods of software, hardware, and firmware, or in a suitable combination of any of them. Alternatively, at least one of the online training device 900, the online training device 1000, or the security inspection image recognition device 1100 may be at least partially implemented as a computer program module, and when the computer program module is executed, the corresponding function may be executed.
图12示意性示出了根据本公开实施例的适于实现在线训练方法或识别方法的电子设备的方框图。 FIG12 schematically shows a block diagram of an electronic device suitable for implementing an online training method or a recognition method according to an embodiment of the present disclosure.
如图12所示,根据本公开实施例的电子设备1200包括处理器1201,其可以根据存储在只读存储器(ROM)1202中的程序或者从存储部分1208加载到随机访问存储器(RAM)1203中的程序而执行各种适当的动作和处理。处理器1201例如可以包括通用微处理器(例如CPU)、指令集处理器和/或相关芯片组和/或专用微处理器(例如,专用集成电路(ASIC))等等。处理器1201还可以包括用于缓存用途的板载存储器。处理器1201可以包括用于执行根据本公开实施例的方法流程的不同动作的单一处理单元或者是多个处理单元。As shown in FIG12 , the electronic device 1200 according to an embodiment of the present disclosure includes a processor 1201, which can perform various appropriate actions and processes according to a program stored in a read-only memory (ROM) 1202 or a program loaded from a storage portion 1208 into a random access memory (RAM) 1203. The processor 1201 may include, for example, a general-purpose microprocessor (e.g., a CPU), an instruction set processor and/or a related chipset and/or a dedicated microprocessor (e.g., an application-specific integrated circuit (ASIC)), etc. The processor 1201 may also include an onboard memory for caching purposes. The processor 1201 may include a single processing unit or multiple processing units for performing different actions of the method flow according to an embodiment of the present disclosure.
在RAM 1203中,存储有电子设备1200操作所需的各种程序和数据。处理器1201、ROM 1202以及RAM 1203通过总线1204彼此相连。处理器1201通过执行ROM 1202和/或RAM 1203中的程序来执行根据本公开实施例的方法流程的各种操作。需要注意,程序也可以存储在除ROM 1202和RAM 1203以外的一个或多个存储器中。处理器1201也可以通过执行存储在一个或多个存储器中的程序来执行根据本公开实施例的方法流程的各种操作。In RAM 1203, various programs and data required for the operation of electronic device 1200 are stored. Processor 1201, ROM 1202 and RAM 1203 are connected to each other through bus 1204. Processor 1201 performs various operations of the method flow according to the embodiment of the present disclosure by executing the programs in ROM 1202 and/or RAM 1203. It should be noted that the program can also be stored in one or more memories other than ROM 1202 and RAM 1203. Processor 1201 can also perform various operations of the method flow according to the embodiment of the present disclosure by executing the programs stored in one or more memories.
根据本公开的实施例,电子设备1200还可以包括输入/输出(I/O)接口1205,输入/输出(I/O)接口1205也连接至总线1204。电子设备1200还可以包括连接至I/O接口1205的以下部件中的一项或多项:包括键盘、鼠标等的输入部分1206。包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分1207。包括硬盘等的存储部分1208。以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分1209。通信部分1209经由诸如因特网的网络执行通信处理。驱动器1210也根据需要连接至I/O接口1205。可拆卸介质1211,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器1210上,以便于从其上读出的计算机程序根据需要被安装入存储部分1208。According to an embodiment of the present disclosure, the electronic device 1200 may further include an input/output (I/O) interface 1205, which is also connected to the bus 1204. The electronic device 1200 may further include one or more of the following components connected to the I/O interface 1205: an input portion 1206 including a keyboard, a mouse, etc. An output portion 1207 including a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and a speaker, etc. A storage portion 1208 including a hard disk, etc. And a communication portion 1209 including a network interface card such as a LAN card, a modem, etc. The communication portion 1209 performs communication processing via a network such as the Internet. A drive 1210 is also connected to the I/O interface 1205 as needed. A removable medium 1211, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 1210 as needed, so that the computer program read therefrom is installed into the storage portion 1208 as needed.
本公开还提供了一种计算机可读存储介质,该计算机可读存储介质可以是上述实施例中描述的设备/装置/系统中所包含的。也可以是单独存在,而未装配入该设备/装置/系统中。上述计算机可读存储介质承载有一个或者多个程序,当上述一个或者多个程序被执行时,实 现根据本公开实施例的方法。The present disclosure also provides a computer-readable storage medium, which may be included in the device/apparatus/system described in the above embodiments. It may also exist independently without being assembled into the device/apparatus/system. The above computer-readable storage medium carries one or more programs, and when the above one or more programs are executed, the implementation Now, the method according to the embodiment of the present disclosure is described.
根据本公开的实施例,计算机可读存储介质可以是非易失性的计算机可读存储介质,例如可以包括但不限于:便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本公开中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。例如,根据本公开的实施例,计算机可读存储介质可以包括上文描述的ROM 1202和/或RAM 1203和/或ROM 1202和RAM 1203以外的一个或多个存储器。According to an embodiment of the present disclosure, a computer-readable storage medium may be a non-volatile computer-readable storage medium, such as but not limited to: a portable computer disk, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the above. In the present disclosure, a computer-readable storage medium may be any tangible medium containing or storing a program that may be used by or in conjunction with an instruction execution system, apparatus, or device. For example, according to an embodiment of the present disclosure, a computer-readable storage medium may include the ROM 1202 and/or RAM 1203 described above and/or one or more memories other than ROM 1202 and RAM 1203.
本公开的实施例还包括一种计算机程序产品,其包括计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。当计算机程序产品在计算机系统中运行时,该程序代码用于使计算机系统实现本公开实施例所提供的方法。The embodiment of the present disclosure also includes a computer program product, which includes a computer program, and the computer program contains program code for executing the method shown in the flowchart. When the computer program product is run in a computer system, the program code is used to enable the computer system to implement the method provided by the embodiment of the present disclosure.
在该计算机程序被处理器1201执行时执行本公开实施例的系统/装置中限定的上述功能。根据本公开的实施例,上文描述的系统、装置、模块、单元等可以通过计算机程序模块来实现。The above functions defined in the system/device of the embodiment of the present disclosure are performed when the computer program is executed by the processor 1201. According to the embodiment of the present disclosure, the system, device, module, unit, etc. described above can be implemented by a computer program module.
在一种实施例中,该计算机程序可以依托于光存储器件、磁存储器件等有形存储介质。在另一种实施例中,该计算机程序也可以在网络介质上以信号的形式进行传输、分发,并通过通信部分1209被下载和安装,和/或从可拆卸介质1211被安装。该计算机程序包含的程序代码可以用任何适当的网络介质传输,包括但不限于:无线、有线等等,或者上述的任意合适的组合。In one embodiment, the computer program may rely on tangible storage media such as optical storage devices, magnetic storage devices, etc. In another embodiment, the computer program may also be transmitted and distributed in the form of signals on a network medium, and downloaded and installed through the communication part 1209, and/or installed from the removable medium 1211. The program code contained in the computer program may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the above.
在这样的实施例中,该计算机程序可以通过通信部分1209从网络上被下载和安装,和/或从可拆卸介质1211被安装。在该计算机程序被处理器1201执行时,执行本公开实施例的系统中限定的上述功能。根据本公开的实施例,上文描述的系统、设备、装置、模块、单元等可以通过计算机程序模块来实现。In such an embodiment, the computer program can be downloaded and installed from the network through the communication part 1209, and/or installed from the removable medium 1211. When the computer program is executed by the processor 1201, the above functions defined in the system of the embodiment of the present disclosure are performed. According to the embodiment of the present disclosure, the system, device, means, module, unit, etc. described above can be implemented by a computer program module.
根据本公开的实施例,可以以一种或多种程序设计语言的任意组 合来编写用于执行本公开实施例提供的计算机程序的程序代码,具体地,可以利用高级过程和/或面向对象的编程语言、和/或汇编/机器语言来实施这些计算程序。程序设计语言包括但不限于诸如Java,C++,python,“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算设备上执行、部分地在用户设备上执行、部分在远程计算设备上执行、或者完全在远程计算设备或服务器上执行。在涉及远程计算设备的情形中,远程计算设备可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算设备,或者,可以连接到外部计算设备(例如利用因特网服务提供商来通过因特网连接)。According to the embodiments of the present disclosure, any combination of one or more programming languages can be used. The program code for executing the computer program provided by the embodiment of the present disclosure can be written together. Specifically, these computing programs can be implemented using high-level process and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, Java, C++, python, "C" language or similar programming languages. The program code can be executed entirely on the user computing device, partially on the user device, partially on the remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device can be connected to the user computing device through any type of network, including a local area network (LAN) or a wide area network (WAN), or can be connected to an external computing device (for example, using an Internet service provider to connect through the Internet).
附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,上述模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图或流程图中的每个方框、以及框图或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flow chart and block diagram in the accompanying drawings illustrate the possible architecture, function and operation of the system, method and computer program product according to various embodiments of the present disclosure. In this regard, each box in the flow chart or block diagram can represent a module, a program segment, or a part of a code, and the above-mentioned module, program segment, or a part of a code contains one or more executable instructions for realizing the specified logical function. It should also be noted that in some alternative implementations, the functions marked in the box can also occur in a different order from the order marked in the accompanying drawings. For example, two boxes represented in succession can actually be executed substantially in parallel, and they can sometimes be executed in the opposite order, depending on the functions involved. It should also be noted that each box in the block diagram or flow chart, and the combination of the boxes in the block diagram or flow chart can be implemented with a dedicated hardware-based system that performs a specified function or operation, or can be implemented with a combination of dedicated hardware and computer instructions.
本领域技术人员可以理解,本公开的各个实施例和/或权利要求中记载的特征可以进行多种组合或/或结合,即使这样的组合或结合没有明确记载于本公开中。特别地,在不脱离本公开精神和教导的情况下,本公开的各个实施例和/或权利要求中记载的特征可以进行多种组合和/或结合。所有这些组合和/或结合均落入本公开的范围。It will be appreciated by those skilled in the art that the features described in the various embodiments and/or claims of the present disclosure may be combined and/or combined in a variety of ways, even if such combinations and/or combinations are not explicitly described in the present disclosure. In particular, the features described in the various embodiments and/or claims of the present disclosure may be combined and/or combined in a variety of ways without departing from the spirit and teachings of the present disclosure. All of these combinations and/or combinations fall within the scope of the present disclosure.
以上对本公开的实施例进行了描述。但是,这些实施例仅仅是为了说明的目的,而并非为了限制本公开的范围。尽管在以上分别描述了各实施例,但是这并不意味着各个实施例中的措施不能有利地结合使用。本公开的范围由所附权利要求及其等同物限定。不脱离本公开的范围,本领域技术人员可以做出多种替代和修改,这些替代和修改 都应落在本公开的范围之内。 The embodiments of the present disclosure are described above. However, these embodiments are only for illustrative purposes and are not intended to limit the scope of the present disclosure. Although each embodiment is described above separately, it does not mean that the measures in each embodiment cannot be used in combination to advantage. The scope of the present disclosure is defined by the attached claims and their equivalents. Without departing from the scope of the present disclosure, those skilled in the art may make various substitutions and modifications, which All should fall within the scope of this disclosure.

Claims (22)

  1. 一种安检图像识别模型的在线训练方法,包括:An online training method for a security inspection image recognition model, comprising:
    从N个识别端获取具有特定识别结果的M张待检对象图像,其中每个识别端用于确定来自对应安检机的待检对象图像的识别结果,M、N分别大于或等于1;Obtaining M images of the object to be inspected with specific recognition results from N recognition terminals, wherein each recognition terminal is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and M and N are respectively greater than or equal to 1;
    获得所述M张待检对象图像中每张待检对象图像的数据标注结果;Obtaining a data annotation result for each of the M images of the object to be inspected;
    将所述每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型。Each image of the object to be inspected and the data annotation results thereof are used as training samples for online training to obtain a first security inspection image recognition model.
  2. 根据权利要求1所述的方法,其中,在获得所述第一安检图像识别模型后,所述方法还包括:The method according to claim 1, wherein after obtaining the first security inspection image recognition model, the method further comprises:
    将所述第一安检图像识别模型发送至所述N个识别端,其中,所述N个识别端被配置为在本地部署所述第一安检图像识别模型。The first security inspection image recognition model is sent to the N recognition terminals, wherein the N recognition terminals are configured to locally deploy the first security inspection image recognition model.
  3. 根据权利要求2所述的方法,其中,在将所述第一安检图像识别模型发送至所述N个识别端之前,所述方法还包括:The method according to claim 2, wherein, before sending the first security inspection image recognition model to the N recognition terminals, the method further comprises:
    获得所述第一安检图像识别模型的评估指标;Obtaining evaluation indicators of the first security inspection image recognition model;
    在所述评估指标符合预设条件时,向所述N个识别端发送模型更新指令,其中,所述N个识别端被配置为响应于所述模型更新指令获取所述第一安检图像识别模型。When the evaluation index meets the preset condition, a model update instruction is sent to the N recognition terminals, wherein the N recognition terminals are configured to obtain the first security inspection image recognition model in response to the model update instruction.
  4. 根据权利要求1所述的方法,其中,所述从N个识别端获取具有特定识别结果的M张待检对象图像包括:The method according to claim 1, wherein obtaining M images of the object to be inspected having specific recognition results from N recognition terminals comprises:
    接收所述N个识别端上传的所述M张待检对象图像。Receive the M images of the objects to be inspected uploaded by the N recognition terminals.
  5. 根据权利要求4所述的方法,其中,所述获得所述M张待检对象图像中每张待检对象图像的数据标注结果包括:The method according to claim 4, wherein obtaining the data annotation result of each of the M images of the object to be inspected comprises:
    按照任务类型分发所述M张待检对象图像,所述任务类型根据所述每张待检对象图像的识别结果确定;Distributing the M images of the objects to be inspected according to task types, wherein the task types are determined according to the recognition results of each of the images of the objects to be inspected;
    获取分发后所述每张待检对象图像的数据标注结果。Obtain the data annotation results of each image of the object to be inspected after distribution.
  6. 根据权利要求5所述的方法,其中,所述每张待检对象图像的 数据标注结果包括该张待检对象图像中至少一个待检对象的对象类型,和/或至少一个待检对象的位置信息。The method according to claim 5, wherein each image of the object to be inspected The data annotation result includes the object type of at least one object to be inspected in the image of the object to be inspected, and/or the position information of at least one object to be inspected.
  7. 根据权利要求5所述的方法,其中,所述将所述每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型包括:The method according to claim 5, wherein the step of performing online training using each image of the object to be inspected and the data annotation results thereof as training samples to obtain the first security inspection image recognition model comprises:
    对预先部署在所述每个识别端的第二安检图像识别模型进行在线训练,获得所述第一安检图像识别模型;和/或Performing online training on the second security inspection image recognition model pre-deployed at each recognition terminal to obtain the first security inspection image recognition model; and/or
    对预先训练好的第三安检图像识别模型进行在线训练,获得所述第一安检图像识别模型;和/或Performing online training on the pre-trained third security inspection image recognition model to obtain the first security inspection image recognition model; and/or
    对未经训练的第四安检图像识别模型进行在线训练,获得所述第一安检图像识别模型。The untrained fourth security inspection image recognition model is trained online to obtain the first security inspection image recognition model.
  8. 根据权利要求7所述的方法,其中,所述M张待检对象图像属于至少一个任务类型,所述将所述每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型包括:The method according to claim 7, wherein the M images of the object to be inspected belong to at least one task type, and the step of performing online training using each image of the object to be inspected and its data annotation results as training samples to obtain a first security inspection image recognition model comprises:
    将相同任务类型的至少一张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得该任务类型对应的第一安检图像识别模型。At least one image of the object to be inspected of the same task type and its data annotation results are used as training samples for online training to obtain a first security inspection image recognition model corresponding to the task type.
  9. 根据权利要求1~8任一项所述的方法,其中,所述将所述每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型包括:According to the method according to any one of claims 1 to 8, wherein the step of performing online training using each image of the object to be inspected and the data annotation result thereof as a training sample to obtain the first security inspection image recognition model comprises:
    在所述训练样本的数量大于或等于预设阈值的情况下,自动进行在线训练获得所述第一安检图像识别模型。When the number of the training samples is greater than or equal to a preset threshold, online training is automatically performed to obtain the first security inspection image recognition model.
  10. 一种安检图像识别模型的在线训练方法,用于识别端,包括:An online training method for a security inspection image recognition model, used for a recognition terminal, includes:
    从对应安检机获取S张待检对象图像,S大于或等于1;Obtain S images of the object to be inspected from the corresponding security inspection machine, where S is greater than or equal to 1;
    确定所述S张待检对象图像中每张待检对象图像的识别结果;Determining a recognition result of each of the S images of the object to be inspected;
    将具有特定识别结果的至少一张待检对象图像发送至在线端,其中,所述在线端用于执行权利要求1~9中任一项所述的方法获得第一安检图像识别模型。At least one image of the object to be inspected having a specific recognition result is sent to an online terminal, wherein the online terminal is used to execute the method according to any one of claims 1 to 9 to obtain a first security inspection image recognition model.
  11. 根据权利要求10所述的方法,其中,所述识别端与所述安检机通信连接,所述从对应安检机获取S张待检对象图像包括: The method according to claim 10, wherein the identification terminal is in communication with the security inspection machine, and the acquiring S images of the object to be inspected from the corresponding security inspection machine comprises:
    在所述安检机对过检对象进行扫描获得每张待检对象图像后,实时获取该张待检对象图像。After the security inspection machine scans the inspected object to obtain each image of the object to be inspected, the image of the object to be inspected is acquired in real time.
  12. 根据权利要求10所述的方法,其中,所述方法还包括:The method according to claim 10, wherein the method further comprises:
    从所述在线端获取所述第一安检图像识别模型;Acquire the first security inspection image recognition model from the online terminal;
    自动部署所述第一安检图像识别模型。The first security inspection image recognition model is automatically deployed.
  13. 根据权利要求12所述的方法,其中,在从所述在线端获取所述第一安检图像识别模型之前,所述方法还包括:The method according to claim 12, wherein, before acquiring the first security inspection image recognition model from the online end, the method further comprises:
    接收所述在线端发送的模型更新指令。Receive the model update instruction sent by the online end.
  14. 一种安检图像识别方法,用于识别端,包括:A security inspection image recognition method, used for an identification terminal, comprising:
    从对应安检机获取Q张待检对象图像,Q大于或等于1;Obtain Q images of the object to be inspected from the corresponding security inspection machine, where Q is greater than or equal to 1;
    利用第一安检图像识别模型对所述Q张待检对象图像进行识别,获得识别结果,其中,所述第一安检图像识别模型根据权利要求1~13中任一项所述的方法获得。The Q images of the objects to be inspected are identified by using a first security inspection image recognition model to obtain a recognition result, wherein the first security inspection image recognition model is obtained according to the method according to any one of claims 1 to 13.
  15. 一种安检图像识别模型的在线训练系统,包括N个识别端和在线端,N大于或等于1,其中:An online training system for a security inspection image recognition model includes N recognition terminals and online terminals, where N is greater than or equal to 1, wherein:
    所述N个识别端中每个识别端包括识别设备,所述识别设备用于确定来自对应安检机的待检对象图像的识别结果,并将具有特定识别结果的至少一张待检对象图像发送至所述在线端;Each of the N recognition terminals includes a recognition device, which is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and send at least one image of the object to be inspected with a specific recognition result to the online terminal;
    所述在线端包括数据管理平台和在线训练平台,其中:The online end includes a data management platform and an online training platform, wherein:
    所述数据管理平台用于接收所述识别设备发送的所述至少一张待检对象图像,并将所述至少一张待检对象图像及数据标注结果发送至所述在线训练平台;The data management platform is used to receive the at least one image of the object to be inspected sent by the recognition device, and send the at least one image of the object to be inspected and the data annotation result to the online training platform;
    所述在线训练平台用于将所述至少一张待检对象图像及数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型。The online training platform is used to perform online training using the at least one image of the object to be inspected and the data annotation result as training samples to obtain a first security inspection image recognition model.
  16. 根据权利要求15所述的在线训练系统,其中:The online training system according to claim 15, wherein:
    所述在线训练平台还用于将所述第一安检图像识别模型发送至所述识别设备;The online training platform is also used to send the first security inspection image recognition model to the recognition device;
    所述识别设备用于接收并自动部署所述第一安检图像识别模型。The recognition device is used to receive and automatically deploy the first security inspection image recognition model.
  17. 一种安检图像识别模型的在线训练装置,包括:An online training device for a security inspection image recognition model, comprising:
    第一图像模块,用于从N个识别端获取具有特定识别结果的M 张待检对象图像,其中每个识别端用于确定来自对应安检机的待检对象图像的识别结果,M、N分别大于或等于1;The first image module is used to obtain M images with specific recognition results from N recognition terminals. Each recognition terminal is used to determine the recognition result of the image of the object to be inspected from the corresponding security inspection machine, and M and N are respectively greater than or equal to 1;
    数据标注模块,用于获得所述M张待检对象图像中每张待检对象图像的数据标注结果;A data annotation module, used to obtain a data annotation result of each of the M images of the object to be inspected;
    在线训练模块,用于将所述每张待检对象图像及其数据标注结果作为训练样本进行在线训练,获得第一安检图像识别模型。The online training module is used to perform online training using each image of the object to be inspected and its data annotation results as training samples to obtain a first security inspection image recognition model.
  18. 一种安检图像识别模型的在线训练装置,用于识别端,包括:An online training device for a security inspection image recognition model, used for a recognition terminal, comprising:
    第二图像模块,用于从对应安检机获取S张待检对象图像,S大于或等于1;The second image module is used to obtain S images of the object to be inspected from the corresponding security inspection machine, where S is greater than or equal to 1;
    第一识别模块,用于确定所述S张待检对象图像中每张待检对象图像的识别结果;A first recognition module, used to determine the recognition result of each of the S images of the object to be detected;
    第三图像模块,用于将具有特定识别结果的至少一张待检对象图像发送至在线端,其中,所述在线端用于执行权利要求1~9中任一项所述的方法获得第一安检图像识别模型。The third image module is used to send at least one image of the object to be inspected with a specific recognition result to an online end, wherein the online end is used to execute the method according to any one of claims 1 to 9 to obtain a first security inspection image recognition model.
  19. 一种安检图像识别装置,用于识别端,包括:A security inspection image recognition device, used for an identification terminal, comprising:
    第四图像模块,用于从对应安检机获取Q张待检对象图像,Q大于或等于1;A fourth image module, used to obtain Q images of the object to be inspected from the corresponding security inspection machine, where Q is greater than or equal to 1;
    第二识别模块,用于利用第一安检图像识别模型对所述Q张待检对象图像进行识别,获得识别结果,其中,所述第一安检图像识别模型根据权利要求1~13中任一项所述的方法获得。The second recognition module is used to use a first security inspection image recognition model to recognize the Q images of the objects to be inspected to obtain a recognition result, wherein the first security inspection image recognition model is obtained according to the method described in any one of claims 1 to 13.
  20. 一种电子设备,包括:An electronic device, comprising:
    一个或多个处理器;one or more processors;
    存储装置,用于存储一个或多个程序,a storage device for storing one or more programs,
    其中,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行根据权利要求1~14中任一项所述的方法。When the one or more programs are executed by the one or more processors, the one or more processors are enabled to execute the method according to any one of claims 1 to 14.
  21. 一种计算机可读存储介质,其上存储有可执行指令,该指令被处理器执行时使处理器执行根据权利要求1~14中任一项所述的方法。A computer-readable storage medium stores executable instructions, which, when executed by a processor, cause the processor to execute the method according to any one of claims 1 to 14.
  22. 一种计算机程序产品,包括计算机程序,所述计算机程序被 处理器执行时实现根据权利要求1~14中任一项所述的方法。 A computer program product comprising a computer program, the computer program being When executed by a processor, the method according to any one of claims 1 to 14 is implemented.
PCT/CN2023/132906 2022-12-01 2023-11-21 Online training method, security inspection image identification method and apparatus, device, and medium WO2024114440A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211545328.2A CN118135347A (en) 2022-12-01 2022-12-01 Online training method, security inspection image recognition method, device, equipment and medium
CN202211545328.2 2022-12-01

Publications (1)

Publication Number Publication Date
WO2024114440A1 true WO2024114440A1 (en) 2024-06-06

Family

ID=91236550

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/132906 WO2024114440A1 (en) 2022-12-01 2023-11-21 Online training method, security inspection image identification method and apparatus, device, and medium

Country Status (2)

Country Link
CN (1) CN118135347A (en)
WO (1) WO2024114440A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019096181A1 (en) * 2017-11-14 2019-05-23 深圳码隆科技有限公司 Detection method, apparatus and system for security inspection, and electronic device
CN112712121A (en) * 2020-12-30 2021-04-27 浙江智慧视频安防创新中心有限公司 Image recognition model training method and device based on deep neural network and storage medium
CN112884085A (en) * 2021-04-02 2021-06-01 中国科学院自动化研究所 Method, system and equipment for detecting and identifying contraband based on X-ray image
CN113688887A (en) * 2021-08-13 2021-11-23 百度在线网络技术(北京)有限公司 Training and image recognition method and device of image recognition model

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019096181A1 (en) * 2017-11-14 2019-05-23 深圳码隆科技有限公司 Detection method, apparatus and system for security inspection, and electronic device
CN112712121A (en) * 2020-12-30 2021-04-27 浙江智慧视频安防创新中心有限公司 Image recognition model training method and device based on deep neural network and storage medium
CN112884085A (en) * 2021-04-02 2021-06-01 中国科学院自动化研究所 Method, system and equipment for detecting and identifying contraband based on X-ray image
CN113688887A (en) * 2021-08-13 2021-11-23 百度在线网络技术(北京)有限公司 Training and image recognition method and device of image recognition model

Also Published As

Publication number Publication date
CN118135347A (en) 2024-06-04

Similar Documents

Publication Publication Date Title
US20200249936A1 (en) Method and system for a platform for api based user supplied algorithm deployment
US20200387836A1 (en) Machine learning model surety
JP5540160B2 (en) Program analysis / verification service providing system, control method thereof, control program, control program for causing computer to function, program analysis / verification device, program analysis / verification tool management device
US20190244139A1 (en) Using meta-learning for automatic gradient-based hyperparameter optimization for machine learning and deep learning models
CN108304201A (en) Object updating method, device and equipment
US11250951B2 (en) Feature engineering method, apparatus, and system
WO2024027624A1 (en) Metaverse-based intelligent resource matching method, and metaverse system
CN105432075A (en) Method and apparatus for mobile quality management inspections
CN110391918A (en) Utilize communication channel recommender system, method and the computer-readable medium of machine learning
US11615269B2 (en) Processing method, system, program, and storage medium for generating learning data, and learning data generation method and system
US20230298333A1 (en) Information processing system
CN109857630A (en) Code detection method, system and equipment
US20230004486A1 (en) Software testing using machine learning
US20220366244A1 (en) Modeling Human Behavior in Work Environment Using Neural Networks
CN107481018A (en) Goods attribute authentication method, apparatus and system based on Internet technology
CN109522214A (en) Test method, platform, client and system calculate equipment and readable medium
CN115766861A (en) Automatic driving data closed loop system, method and medium for vehicle software upgrade
WO2024114440A1 (en) Online training method, security inspection image identification method and apparatus, device, and medium
Miranda et al. AKFruitData: A dual software application for Azure Kinect cameras to acquire and extract informative data in yield tests performed in fruit orchard environments
US20210158214A1 (en) Method of performing a process using artificial intelligence
US11599801B2 (en) Method for solving problem, computing system and program product
CN117235527A (en) End-to-end containerized big data model construction method, device, equipment and medium
CN113590484B (en) Algorithm model service testing method, system, equipment and storage medium
US20220044150A1 (en) Systems, methods, and apparatus to classify personalized data
CN113609018A (en) Test method, training method, device, apparatus, medium, and program product