Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches

Journal Title: Electronic and Cyber Defense - Year 2023, Vol 10, Issue 4

Abstract

Detection of dangerous objects in images obtained by X-ray scanners in security inspections has played an important role in protecting the public space from security threats such as terrorism and the occurrence of dangerous crimes. Perform diagnostic operations by an expert despite the remarkable features of the human sensory and visual systems; Due to being exhausting, non-stop, excessive dependence on human error, etc., it has low operational value. One suitable solution for similar situations is to use car vision systems. In this study, we intend to first examine the hazardous object in the x-ray images in the SIX-ray database in a training phase with hard segmentation, and by extracting the properties of these objects by the SURF algorithm, which is capable of extracting properties even in complex conditions. It is confusing to create a database of properties of objects in different dimensions and angles. Then, in the detection phase, the experimental image first goes through a soft segmentation step, and then the image properties are extracted by the SURF algorithm. The extracted properties are matched with the properties of the object in the training database, and then the probability of the object being present, which is the ratio of the number of matching properties of the object to the total number of properties in the object, is calculated for each case. be. After finding the most likely valid matches, the M-estimator sample consensus algorithm (MSAC) removes the incorrect matching properties that originated from the image background. Finally, a two-dimensional transfer (Affine transformation) is obtained between the pairs of matching points of each valid state with the input image, and with the help of this transfer and dimensionality, a square is drawn around the object and the location of the object is identified. The following is a complete description of the training and diagnosis phase and the results of SIX-ray data.

Authors and Affiliations

Kourosh Dadashtabar Ahmadi,ali akbar kiaei,

Keywords

Related Articles

Distributed Solving of Weapon Target Assignment Problem using Learning Automata

This article presents a method to solve the weapon target assignment problem, which is one of the problems of distributed constraint optimization. The previous methods do not guarantee the convergence problem properly an...

Identify malicious traffic on IoT infrastructure using neural networks and deep learning

The Internet of Things is a network of physical devices and equipment that includes sensors, software, and other technologies for exchanging data with other devices and systems over the Internet. The spread of the Intern...

A Malware Classification Method Using visualization and Word Embedding Features

With the explosive growth of threats to Internet security, malware visualization in malware classification has become a promising study area in security and machine learning. This paper proposes a visualization method fo...

Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning

Abstract:In recent years, Unmanned Aerial Vehicles have become significantly available to the public of people. Affordable prices, being equipped with advanced technologies, small sizes, easy portability and … etc. cre...

Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis

Cybercriminals are targeting more humans than machines these days because they try to exploit users' vulnerabilities to achieve their destructive goals. The main purpose of this study is to identify the factors affecting...

Download PDF file
  • EP ID EP731688
  • DOI -
  • Views 42
  • Downloads 0

How To Cite

Kourosh Dadashtabar Ahmadi, ali akbar kiaei, (2023). Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches. Electronic and Cyber Defense, 10(4), -. https://europub.co.uk/articles/-A-731688