Shadow Image Processing of X-Ray Screening System for Aviation Security

Full Text (PDF, 1273KB), PP.26-46

Views: 0 Downloads: 0

Author(s)

Maksym Zaliskyi 1,* Olga Shcherbyna 2 Lidiia Tereshchenko 3 Alina Osipchuk 1 Olena Zharova 1

1. National Aviation University/Department of Telecommunication and Radioelectronic Systems, Kyiv, 03058, Ukraine

2. National Aviation University/Department of Electronics, Robotics, Monitoring and IoT Technologies, Kyiv, 03058, Ukraine

3. National Aviation University/Department of Software Engineering, Kyiv, 03058, Ukraine

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2022.06.03

Received: 7 Jun. 2022 / Revised: 16 Jul. 2022 / Accepted: 24 Aug. 2022 / Published: 8 Dec. 2022

Index Terms

Aviation Security, X-Ray Equipment, Shadow Image Reconstruction, Objects Recognition, Scanning Methods.

Abstract

The aviation security is an important component of aviation safety providing. One of the main goals of aviation security service is to detect dangerous and prohibited objects during passengers and baggage screening. For this purpose, aviation security personnel use various equipment: X-ray screening system, body-scans, metal detectors, moving ions detectors, explosive trace detectors. The X-ray screening system gives information on internal structure of baggage. The main disadvantage of X-ray screening system is rather high level of the false alarm probability. This requires developing new methods of image processing and recognition of dangerous and prohibited objects on the background of other objects. This article develops the principles of shadow image processing while screening the baggage using X-ray system to fix the mentioned disadvantage. The math equation for shadow image is obtained based on the laws of geometry and Beer-Lambert equation taking into account the chosen scanning technique. Based on this, the article is focused to the analysis of simple objects images and their application for complex objects recognition. The article discusses the example of handgun recognition using a new approach based on spectral analysis of developed shadow images. The results of the research can be used for improvement of algorithmic toolkit in aviation security automatic decision-making system while screening the baggage by X-ray equipment.

Cite This Paper

Maksym Zaliskyi, Olga Shcherbyna, Lidiia Tereshchenko, Alina Osipchuk, Olena Zharova, "Shadow Image Processing of X-Ray Screening System for Aviation Security", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.14, No.6, pp. 26-46, 2022. DOI:10.5815/ijigsp.2022.06.03

Reference

1]S. K. Cusick, A. I. Cortes and C. C. Rodrigues, Commercial Aviation Safety, Sixth Edition, New York: McGraw-Hill Education, 2012, 696 p.

[2]Doc 9859, Safety Management Manual. Montreal: International Civil Aviation Organization, 2018.

[3]M. Chen, Y. Zhang and Y. Chen, “Review on Civil Aviation Safety Investment Research,” In 2016 11th International Conference on Reliability, Maintainability and Safety (ICRMS), 2016, pp. 1–5, doi: 10.1109/ICRMS.2016.8050113.

[4]I. Ostroumov and N. Kuzmenko, “Statistical Analysis and Flight Route Extraction from Automatic Dependent Surveillance-Broadcast Data,” In 2022 Integrated Communication, Navigation and Surveillance Conference (ICNS),2022, pp. 1–9, doi: 10.1109/ICNS54818.2022.9771515.

[5]I. V. Ostroumov and N. S. Kuzmenko, “Accuracy Estimation of Alternative Positioning in Navigation,” In 4th International Conference on Methods and Systems of Navigation and Motion Control, 2016, pp. 291–294, doi:10.1109/MSNMC.2016.7783164.

[6]T. Shmelova, D. Bondarev and Y. Znakovska, “Modeling of the Decision Making by UAV’s Operator in Emergency Situations,” In 4th International Conference on Methods and Systems of Navigation and Motion Control, 2016, pp. 31–34, doi: 10.1109/MSNMC.2016.7783099.

[7]I. Ostroumov and N. Kuzmenko, “Configuration Analysis of European Navigational Aids Network,” In 2021 Integrated Communications Navigation and Surveillance Conference (ICNS), 2021, pp. 1–9, doi: 10.1109/ICNS52807.2021.9441576.

[8]A. I. Nosich, Y. M. Poplavko, D. M. Vavriv and F. J. Yanovsky, “Microwaves in Ukraine,” IEEE Microwave Magazine, Vol. 3, No. 4, pp. 82–90, Dec. 2002, doi: 10.1109/MMW.2002.1145680.

[9]R. B. Sinitsyn and F. J. Yanovsky, “Acoustic Noise Atmospheric Radar with Nonparametric Copula Based Signal Processing,” Telecommunications and Radio Engineering, Vol. 71, No. 4, 2012, pp. 327–335, doi: 10.1615/TelecomRadEng.v71.i4.30.

[10]R. B. Sinitsyn and F. J. Yanovsky, “MIMO Radar Copula Ambiguity Function,” In European Microwave Week 2012: “Space for Microwaves”, EuMW 2012, Conference Proceedings – 9th European Radar Conference, EuRAD 2012, 31 Oct.-2 Nov. 2012, Amsterdam, Netherlands, pp. 146–149. 

[11]Annex 17 to the Convention on International Civil Aviation, Security, Montreal: ICAO, 2006.

[12]Wu Wei, “The Application Research of Airport Security Information Management System on the Field of Civil Aviation Security,” In International Carnahan Conference on Security Technology, 2009, pp. 277–280, doi: 10.1109/CCST.2009.5335522.

[13]M. Merzbacher and T. Gable, “Applying Data Mining to False Alarm Reduction in an Aviation Explosives Detection System,” In 44th Annual 2010 IEEE International Carnahan Conference on Security Technology, 2010, pp. 161–164, doi: 10.1109/CCST.2010.5678738.

[14]D. Li and H. Chen, “Review of Security Inspection Networking System Development in China Airports and Its Trend in the Future,” In Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, 2005, pp. 178–181, doi: 10.1109/CCST.2005.1594825.

[15]R. Lazarick, “Applications of Technology in Airport Access Control,” In Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology, 2001, pp. 85–95, doi: 10.1109/CCST.2001.962817.

[16]A. S. Barry, K. P. Dickie and D. S. Mazel, “Perimeter Security at San Francisco International Airport: Leveraging Independent, Existing Systems to Form an Integrated Solution,” In 2009 IEEE Conference on Technologies for Homeland Security, 2009, pp. 35–42, doi: 10.1109/THS.2009.5168012.

[17]S. Gnatyuk, “Critical Aviation Information Systems Cybersecurity,” Meeting Security Challenges Through Data Analytics and Decision Support, NATO Science for Peace and Security Series, D: Information and Communication Security. IOS Press Ebooks, 2016, Vol. 47, № 3, рр. 308–316, doi: 10.3233/978-1-61499-716-0-308.

[18]M. Kalimoldayev, S. Tynymbayev, S. Gnatyuk, M. Ibraimov and M. Magzom, “The Device for Multiplying Polynomials Modulo an Irreducible Polynomial,” News of the National Academy of Sciences of the Republic of Kazakhstan, Series of Geology and Technical Sciences, 2019, № 2 (434), pp. 199–205.

[19]M. Zaliskyi, R. Odarchenko, S. Gnatyuk, Y. Petrova and A. Chaplits, “Method of Traffic Monitoring for DDoS Attacks Detection in E-Health Systems and Networks,” CEUR Workshop Proceedings, 2018, Vol. 2255, pp 193–204.

[20]Z. Hu, R. Odarchenko, S. Gnatyuk, M. Zaliskyi, A. Chaplits, S. Bondar and V. Borovik, “Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior,” International Journal of Computer Network and Information Security (IJCNIS), 2020, Vol. 12, No 6, pp 1–13,doi: 10.5815/ijcnis.2020.06.01.

[21]S. Gnatyuk, B. Akhmetov, V. Kozlovskyi, V. Kinzeryavyy, M. Aleksander and D. Prysiazhnyi, “New Secure Block Cipher for Critical Applications: Design, Implementation, Speed and Security Analysis,” Advances in Intelligent Systems and Computing, 2020, Vol. 1126, pp. 93–104, doi: 10.1007/978-3-030-39162-1_9.

[22]M. Dyvak, A. Melnyk, A. Kovbasistyi, R. Shevchuk, O. Huhul and V. Tymchyshyn, “Mathematical Modeling of the Estimation Process of Functioning Efficiency Level of Information Web-Resources,” In 10th International Conference on Advanced Computer Information Technologies, 2020, pp. 492–496, doi: 10.1109/ACIT49673.2020.9208846.

[23]L. Ji and Y. Mou, “Research on the Feasibility of Application of Millimeter-wave Security Screening Equipment in Civil Aviation,” In 2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT), 2021, pp. 71-75, doi: 10.1109/ICCASIT53235.2021.9633747.

[24]O. O. Semenov, Aviation Security Equipment, Kyiv: NAU, 2013, 264 p. (in Ukrainian)

[25]D. Anderson, “Optimising Multi-layered Security Screening,” Journal of Transportation Security, Vol. 14, 2021, pp. 249–273, doi: 10.1007/s12198-021-00237-3.

[26]I. Ostroumov et al., “A Probability Estimation of Aircraft Departures and Arrivals Delays,” In: Gervasi O. et al. (eds) “Computational Science and Its Applications – ICCSA 2021,” Lecture Notes in Computer Science, Vol. 12950, 2021, pp. 363–377, doi: 10.1007/978-3-030-86960-1_26.

[27]K. Leone, “Security System Throughput Modeling,” In Proceedings of 36th Annual 2002 International Carnahan Conference on Security Technology, 2002, pp. 144–150, doi: 10.1109/CCST.2002.1049240.

[28]P. Gupta, Z. Sinno, J. L. Glover, N. G. Paulter and A. C. Bovik, “Predicting Detection Performance on Security X-Ray Images as a Function of Image Quality,” IEEE Transactions on Image Processing, Vol. 28, No. 7, 2019, pp. 3328–3342, doi: 10.1109/TIP.2019.2896488.

[29]S. Almazroui, W. Wang and G. Zhang, “Imaging Technologies in Aviation Security,” European Journal of Applied Sciences, Vol. 3, No. 4, 2015, pp. 12–27, doi: 10.14738/aivp.34.1433.

[30]J. Skorupski and P. Uchroński, “A Human Being as a Part of the Security Control System at the Airport,” Procedia Engineering, Vol. 134, 2016, pp. 291–300, doi: 10.1016/j.proeng.2016.01.010.

[31]O. Solomentsev, M. Zaliskyi, T. Herasymenko and Y. Petrova, “Data Processing Method for Deterioration Detection during Radio Equipment Operation,” In 2019 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), 2019, pp. 1–4, doi: 10.1109/MTTW.2019.8897232.

[32]O. Solomentsev, M. Zaliskyi, O. Shcherbyna and O. Kozhokhina, “Sequential Procedure of Changepoint Analysis During Operational Data Processing,” In 2020 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), 2020, pp. 168–171, doi: 10.1109/MTTW51045.2020.9245068.

[33]V. Cutler and S. Paddock, “Use of Threat Image Projection (TIP) to Enhance Security Performance,” In 43rd Annual 2009 International Carnahan Conference on Security Technology, 2009, pp. 46–51, doi: 10.1109/CCST.2009.5335565.

[34]C. C. von Bastian, A. Schwaninger and S. Michel, “The Impact of Color Composition on X-ray Image Interpretation in Aviation Security Screening,” In 43rd Annual 2009 International Carnahan Conference on Security Technology, 2009, pp. 201–205, doi: 10.1109/CCST.2009.5335539.

[35]A. V. Goncharenko, “Optimal UAV Maintenance Periodicity Obtained on the Multi-optional Basis,” In Proceedings of IEEE 4th International Conference on Actual Problems of UAV Developments, 2017, pp 65–68, doi: 10.1109/APUAVD.2017.8308778.

[36]A. Raza and V. Ulansky, “Optimization of Condition Monitoring Decision Making by the Criterion of Minimum Entropy,” Entropy (Basel), Vol. 21, Issue 12, 2019, pp 1193, doi: 10.3390/e21121193.

[37]O. Shcherbyna et al., “Diagnostic Process Efficiency Analysis for Block Diagram of Electric Field Parameters Meter,” In IEEE XIIth International Conference on Electronics and Information Technologies (ELIT), 2021, pp. 5–9, doi: 10.1109/ELIT53502.2021.9501136.

[38]O. V. Solomentsev, M. Yu. Zaliskyi, O. V. Zuiev and M. M. Asanov, “Data Processing in Exploitation System of Unmanned Aerial Vehicles Radioelectronic Equipment,” In IEEE 2nd International Conference Actual Problems of Unmanned Air Vehicles Developments (APUAVD), 2013, pp. 77–80, doi: 10.1109/APUAVD.2013.6705288.

[39]M. Zaliskyi et al., “Sequential Method of Reliability Parameters Estimation for Radio Equipment,” In IEEE XIIth International Conference on Electronics and Information Technologies (ELIT), 2021, pp. 37–40. doi: 10.1109/ELIT53502.2021.9501099.

[40]M. Zaliskyi and O. Solomentsev, “Method of Sequential Estimation of Statistical Distribution Parameters in Control Systems Design,” In IEEE 3rd International Conference Methods and Systems of Navigation and Motion Control (MSNMC), 2014, pp. 135–138. doi: 10.1109/MSNMC.2014.6979752.

[41]O. Solomentsev, M. Zaliskyi and O. Zuiev, “Radioelectronic Equipment Availability Factor Models,” In Signal Processing Symposium 2013 (SPS 2013), 2013, pp. 1–4. doi: 10.1109/SPS.2013.6623616.

[42]C. Luo, Y. Hao and Z. Tong, “Research on Digital Image Processing Technology and Its Application,” In Proceedings of the 2018 8th International Conference on Management, Education and Information (MEICI 2018), 2018, pp. 587–592, doi: 10.2991/meici-18.2018.116.

[43]R. Alberts, Modeling and Control of Image Processing for Interventional X-Ray, Eindhoven: Technische Universiteit Eindhoven, 2010, 202 p.

[44]I. Prokopenko, I. Omelchuk and M. Maloyed, “Synthesis of Signal Detection Algorithms under Conditions of Aprioristic Uncertainty,” In IEEE Ukrainian Microwave Week, 2020, pp 418–423, doi: 10.1109/UkrMW49653.2020.9252687.

[45]O. Shmatko et al., “Synthesis of the Optimal Algorithm and Structure of Contactless Optical Device for Estimating the Parameters of Statistically Uneven Surfaces,” Radioelectronic and Computer Systems, No. 4, 2021, pp. 199–213, doi: 10.32620/reks.2021.4.16. 

[46]L. Wang, A. Mohammad-Djafari and N. Gac, “X-ray Computed Tomography Simultaneous Image Reconstruction and Contour Detection Using a Hierarchical Markovian Model,” In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6070–6074, doi: 10.1109/ICASSP.2017.7953322.

[47]R. Gesick, C. Saritac and C.-C. Hung, “Automatic Image Analysis Process for the Detection of Concealed Weapons,” In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, 2009, pp. 1–12, doi: 10.1145/1558607.1558630.

[48]V. Riffo and D. Mery, “Automated Detection of Threat Objects Using Adapted Implicit Shape Model,” IEEE Transactions on Systems, Man, and Cybernetics Systems, Vol. 46, No. 4, 2016, pp. 472–482, doi: 10.1109/TSMC.2015.2439233.

[49]S. Akçay, M. E. Kundegorski, M. Devereux and T. P. Breckon, “Transfer Learning Using Convolutional Neural Networks for Object Classification within X-ray Baggage Security Imagery,” In 2016 IEEE International Conference on Image Processing (ICIP), 2016, pp. 1057–1061, doi: 10.1109/ICIP.2016.7532519.

[50]B. Gu, R. Ge, Y. Chen, L. Luo and G. Coatrieux, “Automatic and Robust Object Detection in X-Ray Baggage Inspection Using Deep Convolutional Neural Networks,” IEEE Transactions on Industrial Electronics, Vol. 68, No. 10, 2021, pp. 10248–10257, doi: 10.1109/TIE.2020.3026285.

[51]Y. F. A. Gaus, N. Bhowmik, S. Akçay, P. M. Guillén-Garcia, J. W. Barker and T. P. Breckon, “Evaluation of a Dual Convolutional Neural Network Architecture for Object-wise Anomaly Detection in Cluttered X-ray Security Imagery,” In 2019 International Joint Conference on Neural Networks (IJCNN), 2019, pp. 1–8, doi: 10.1109/IJCNN.2019.8851829.

[52]J. Zhang, X. Song, J. Feng and J. Fei, “X-Ray Image Recognition Based on Improved Mask R-CNN Algorithm,” Mathematical Problems in Engineering, Vol. 2021, pp. 1–14, doi: 10.1155/2021/6544325.

[53]I. V. Ostroumov, K. Marais and N. S. Kuzmenko, “Aircraft Positioning Using Multiple Distance Measurements and Spline Prediction,” Aviation, Vol. 26, Issue 1, 2022, pp. 1-10, doi:10.3846/aviation.2022.16589.

[54]I. G. Prokopenko, “Robust Methods and Algorithms of Signal Processing,” In 2017 IEEE Microwaves, Radar and Remote Sensing Symposium (MRRS), 2017, pp. 71–74, doi: 10.1109/MRRS.2017.8075029.

[55]Y. Averyanova et al., “Polarimetric-radar Drop Size Evaluation for Wind Speed Estimate Based on Weber Criterion,” In Signal Processing Symposium (SPSympo), 2021, pp 17–22, doi: 10.1109/SPSympo51155.2020.9593349.

[56]I. V. Ostroumov, N. S. Kuzmenko and K. Marais, “Optimal Pair of Navigational Aids Selection,” In 5th International Conference on Methods and Systems of Navigation and Motion Control, 2018, pp. 32–35, doi: 10.1109/MSNMC.2018.8576293.

[57]Y. Averyanova et al., “Model for Wind-related Phenomena Estimation Using Polarization Characteristics of Microwave Radar Signal,” In IEEE 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, 2022, pp. 173–177, doi: 10.1109/TCSET55632.2022.9767049.

[58]V. Volosyuk et al., “Optimal Method for Polarization Selection of Stationary Objects against the Background of the Earth’s Surface,” International Journal of Electronics and Telecommunications, 2022, Vol. 68, No. 1, pp. 83–89. doi: 10.24425/ijet.2022.139852.

[59]S. Zhyla et al., “Statistical Synthesis of Aerospace Radars Structure with Optimal Spatio-temporal Signal Processing, Extended Observation Area and High Spatial Resolution,” Radioelectronic and Computer Systems, 2022, No. 1 (101), pp. 178–194, doi: 10.32620/reks.2022.1.14.

[60]V. Chikovani, O. Sushchenko and H. Tsiruk, “Redundant Information Processing Techniques Comparison for Differential Vibratory Gyroscope,” Eastern-European Journal of Enterprise Technologies, 2016, Vol. 4, No 7 (82), pp 45–52, doi: 10.15587/1729-4061.2016.75206.

[61]Yu. Averyanova, A. Averyanov and F. Yanovsky, “The Approach to Estimating Critical Wind Speed in Liquid Precipitation using Radar Polarimetry,” In International Conference on Mathematical Methods in Electromagnetic Theory, MMET, 2012, pp. 517–520, doi: 10.1109/MMET.2012.6331259.

[62]F. J. Yanovsky and I. M. Braun, “Models of Scattering on Hailstones in X-band,” In First European Radar Conference, EURAD, Amsterdam, Netherlands, 2004, pp. 229–232.

[63]A. K. Shukla, Medical Imaging Methods: Theory and Applications. Boca Raton: CRC Press, 2022, 200 p.

[64]J. Hsieh, B. Nett, Z. Yu, K. Sauer, J.-B. Thibault and C. A. Bouman, “Recent Advances in CT Image Reconstruction,” Current Radiology Reports, Vol. 1, 2013, pp. 39–51, doi: 10.1007/s40134-012-0003-7.

[65]V. Hnatushenko, V. Hnatushenko, V. Kashtan, O. Reuta and I. Udovyk, “Voxel Approach to the Shadow Formation Process in Image Analysis,” In 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021, pp. 33–36, doi: 10.1109/IDAACS53288.2021.9660909.

[66]B. D. Man and S. Basu, “Distance-driven Projection and Backprojection in Three Dimensions,” Physics in Medicine and Biology, Vol. 49, No 11, 2004, pp. 2463–2475, doi: 10.1088/0031-9155/49/11/024.

[67]J. A. Fessler, “Statistical Image Reconstruction Methods for Transmission Tomography,” In: J. M. Fitzpatrick and M. Sonka (eds), “Handbook of Medical Imaging, Volume 2. Medical Image Processing and Analysis,” 2000, pp. 1–70, doi: 10.1117/3.831079.ch1.

[68]J. Jakubek, “Data Processing and Image Reconstruction Methods for Pixel Detectors,” Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, Vol. 576, No 1, 2007, pp. 223–234.  doi: 10.1016/j.nima.2007.01.157.

[69]R. K. Schulze, O. Weinheimer, D. D. Brüllmann, F. Röder, B. d'Hoedt and E. Schoemer, “Software for Automated Application of a Reference-based Method for a Posteriori Determination of the Effective Radiographic Imaging Geometry,” Dentomaxillofac Radiology, Vol. 34, No 4, 2005, pp. 205–211. doi: 10.1259/dmfr/56357032. PMID: 15961593.