Volume 45 Issue 10
Oct.  2019
Turn off MathJax
Article Contents
ZHAO Guo, QIN Shiyin. Detection and localization of concealed forbidden objects on human body based on complementary advantages of PMMWI and Ⅵ[J]. Journal of Beijing University of Aeronautics and Astronautics, 2019, 45(10): 2011-2025. doi: 10.13700/j.bh.1001-5965.2019.0019(in Chinese)
Citation: ZHAO Guo, QIN Shiyin. Detection and localization of concealed forbidden objects on human body based on complementary advantages of PMMWI and Ⅵ[J]. Journal of Beijing University of Aeronautics and Astronautics, 2019, 45(10): 2011-2025. doi: 10.13700/j.bh.1001-5965.2019.0019(in Chinese)

Detection and localization of concealed forbidden objects on human body based on complementary advantages of PMMWI and Ⅵ

doi: 10.13700/j.bh.1001-5965.2019.0019
Funds:

National Natural Science Foundation of China 61731001

More Information
  • Corresponding author: QIN Shiyin, E-mail: qsy@buaa.edu.cn
  • Received Date: 17 Jan 2019
  • Accepted Date: 28 May 2019
  • Publish Date: 20 Oct 2019
  • According to the performance requirements and technology demands of human security check in public place, combining the performance advantages of perspective imaging of passive millimeter wave imaging (PMMWI) and high discriminability in image details of visible imaging (Ⅵ), an approach for detection and localization of concealed forbidden objects on human body is presented in this paper based on the complementary advantages of PMMWI and Ⅵ. Firstly, an improved U-Net based on feature fusion in low layers is presented to enhance the sensitivity of deep neural networks (DNN) to the contour of dim small targets, and improve the accuracy of segmentation of human contours and concealed forbidden objects. Meanwhile, the pixel-level segmentation of human contours in Ⅵ is also implemented. Then, the contours of human body in PMMWI are registered with some corresponding ones in Ⅵ by scale transform and sliding fit, so the concealed forbidden objects on human body can be detected from a single frame with a high precision. Finally, the concealed forbidden objects are localized by contrasting fusion and optimizing decision according to detection results with sequence images. A series of comprehensive experiments and comparative analysis results validate the good performance of the proposed detection and localization algorithm of concealed forbidden objects on human body towards security check of public places.

     

  • loading
  • [1]
    王任肩, 王宇光, 陈志福, 等.大型活动中的安检排爆工作及技术保障研究[J].警察技术, 2018(5):19-22. doi: 10.3969/j.issn.1009-9875.2018.05.004

    WANG R J, WANG Y G, CHEN Z F, et al.Research on exploder clearing work and technical support in security inspection of large activities[J].Police Technology, 2018(5):19-22(in Chinese). doi: 10.3969/j.issn.1009-9875.2018.05.004
    [2]
    费鹏, 方维海, 温鑫, 等.用于人员安检的主动毫米波成像技术现状与展望[J].微波学报, 2015, 31(2):91-96. http://d.old.wanfangdata.com.cn/Periodical/wbxb201502020

    FEI P, FANG W H, WEN X, et al.State of the art and future prospect of the active millimeter wave imaging technique for personnel screening[J].Journal of Microwaves, 2015, 31(2):91-96(in Chinese). http://d.old.wanfangdata.com.cn/Periodical/wbxb201502020
    [3]
    GROSSMAN E N, MILLER A J.Active millimeter-wave imaging for concealed weapons detection[C]//Proceedings of Conference on Passive Millimeter-Wave Imaging Technology Ⅵ and Radar International Society for Optics and Photonics.Bellingham: SPIE, 2003, 5077: 62-70.
    [4]
    ANDREWS D A, HARMER S W, BOWRING N J, et al.Active millimeter wave sensor for standoff concealed threat detection[J].IEEE Sensors Journal, 2013, 13(12):4948-4954. doi: 10.1109/JSEN.2013.2273487
    [5]
    DU K, ZHANG L, CHEN W, et al.Concealed objects detection based on FWT in active millimeter-wave images[C]//Proceedings of 7th International Conference on Electronics and Information Engineering.Bellingham: SPIE, 2017, 10322: 103221O.
    [6]
    REN S, HE K, GIRSHICK R, et al.Faster R-CNN:Towards real-time object detection with region proposal networks[J].IEEE Transaction on Pattern Analysis and Machine Intelligence, 2017, 39(6):1137-1149. doi: 10.1109/TPAMI.2016.2577031
    [7]
    骆尚, 吴晓峰, 杨明辉, 等.基于卷积神经网络的毫米波图像人体隐匿物检测[J].复旦学报(自然科学版), 2018, 57(4):442-452. http://d.old.wanfangdata.com.cn/Periodical/fdxb201804005

    LUO S, WU X F, YANG M H, et al.Convolutional-neural-network-based human concealed object detection for millimeter wave images[J].Journal of Fudan University(Natural Science), 2018, 57(4):442-452(in Chinese). http://d.old.wanfangdata.com.cn/Periodical/fdxb201804005
    [8]
    SINCLAIR G N, ANDERTON R N, APPLEBY R.Passive millimeter-wave concealed weapon detection[C]//Proceedings of Enabling Technologies for Law Enforcement and Security.Bellingham: SPIE, 2001, 4232: 142-152.
    [9]
    YEOM S, LEE D, SON J, et al.Real-time outdoor concealed-object detection with passive millimeter wave imaging[J].Optics Express, 2011, 19(3):2530-2536. doi: 10.1364/OE.19.002530
    [10]
    YEOM S, LEE D, JANG Y, et al.Real-time concealed-object detection and recognition with passive millimeter wave imaging[J].Optics Express, 2012, 20(9):9371-9381. doi: 10.1364/OE.20.009371
    [11]
    周健, 叶金晶, 孙谦晨, 等.主动毫米波成像性别识别算法研究[J].红外, 2018, 39(9):34-40. doi: 10.3969/j.issn.1672-8785.2018.09.006

    ZHOU J, YE J J, SUN Q C, et al.Study of a gender identification algorithm for active millimeter-wave imaging[J].Infrared, 2018, 39(9):34-40(in Chinese). doi: 10.3969/j.issn.1672-8785.2018.09.006
    [12]
    SHELHAMER E, LONG J, DARRELL T.Fully convolutional networks for semantic segmentation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017, 39(4):640-651. doi: 10.1109/TPAMI.2016.2572683
    [13]
    BADRINARAYANAN V, KENDALL A, CIPOLLA R.SegNet:A deep convolutional encoder-decoder architecture for image segmentation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017, 39(12):2481-2495. doi: 10.1109/TPAMI.2016.2644615
    [14]
    RONNEBERGER O, FISCHER P, BROX T.U-Net: Convolutional networks for biomedical image segmentation[C]//Proceedings of International Conference on Medical Image Computing and Computer-Assisted Intervention.Berlin: Springer, 2015: 234-241.
    [15]
    桑伟, 岳胜利.毫米波成像技术在人体安全检查领域的应用[J].中国安防, 2013(4):83-87. doi: 10.3969/j.issn.1673-7873.2013.04.018

    SANG W, YUE S L.Application of millimeter wave imaging technology on the area of human body security inspection[J].China Security & Protection, 2013(4):83-87(in Chinese). doi: 10.3969/j.issn.1673-7873.2013.04.018
    [16]
    IGLOVIKOV V, SHVETS A.TernausNet: U-Net with VGG11 encoder pre-trained on ImageNet for image segmentation[D].(2018-01-17)[2018-12-20].https://arxiv.org/abs/1801.05746. https://arxiv.org/abs/1801.05746
    [17]
    LIN M, CHEN Q, YAN S C.Network in network[D].(2014-03-04)[2018-12-20].https://arxiv.org/abs/1312.4400.
    [18]
    SZEGEDY C, LIU W, JIA Y, et al.Going deeper with convolutions[C]//Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.Piscataway, NJ: IEEE Press, 2015: 1-9.
    [19]
    SZEGEDY C, VANHOUCKE V, IOFFE S, et al.Rethinking the inception architecture for computer vision[D].(2015-12-11)[2018-12-20].https://arxiv.org/abs/1512.00567v2.
    [20]
    HE K M, ZHANG X Y, REN S Q, et al.Deep residual learning for image recognition[D].(2015-12-10)[2018-12-20].https://arxiv.org//abs/1512.03385.
    [21]
    XIE S, GIRSHICK R, DOLLÁR P, et al.Aggregated residual transformations for deep neural networks[D].(2017-04-11)[2018-12-20].https://arxiv.org/abs/1611.05431.
    [22]
    KINGMA D P, BA J L.Adam: A method for stochastic optimization[D].(2017-01-30)[2018-12-20].https://arxiv.org/abs/1412.6980.
    [23]
    ZEILER M D, FERGUS R.Visualizing and understanding convolutional networks[C]//Proceedings of European Conference on Computer Vision.Berlin: Springer, 2014: 818-833.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(27)  / Tables(1)

    Article Metrics

    Article views(822) PDF downloads(515) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return