Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2024 Dec 24;7(1):30.
doi: 10.1186/s42492-024-00182-7.

Semi-supervised contour-driven broad learning system for autonomous segmentation of concealed prohibited baggage items

Affiliations

Semi-supervised contour-driven broad learning system for autonomous segmentation of concealed prohibited baggage items

Divya Velayudhan et al. Vis Comput Ind Biomed Art. .

Abstract

With the exponential rise in global air traffic, ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation security. Although X-ray baggage monitoring is now standard, manual screening has several limitations, including the propensity for errors, and raises concerns about passenger privacy. To address these drawbacks, researchers have leveraged recent advances in deep learning to design threat-segmentation frameworks. However, these models require extensive training data and labour-intensive dense pixel-wise annotations and are finetuned separately for each dataset to account for inter-dataset discrepancies. Hence, this study proposes a semi-supervised contour-driven broad learning system (BLS) for X-ray baggage security threat instance segmentation referred to as C-BLX. The research methodology involved enhancing representation learning and achieving faster training capability to tackle severe occlusion and class imbalance using a single training routine with limited baggage scans. The proposed framework was trained with minimal supervision using resource-efficient image-level labels to localize illegal items in multi-vendor baggage scans. More specifically, the framework generated candidate region segments from the input X-ray scans based on local intensity transition cues, effectively identifying concealed prohibited items without entire baggage scans. The multi-convolutional BLS exploits the rich complementary features extracted from these region segments to predict object categories, including threat and benign classes. The contours corresponding to the region segments predicted as threats were then utilized to yield the segmentation results. The proposed C-BLX system was thoroughly evaluated on three highly imbalanced public datasets and surpassed other competitive approaches in baggage-threat segmentation, yielding 90.04%, 78.92%, and 59.44% in terms of mIoU on GDXray, SIXray, and Compass-XP, respectively. Furthermore, the limitations of the proposed system in extracting precise region segments in intricate noisy settings and potential strategies for overcoming them through post-processing techniques were explored (source code will be available at https://github.com/Divs1159/CNN_BLS .).

Keywords: Baggage X-ray imagery; Broad learning systems; Threat detection; Threat segmentation.

PubMed Disclaimer

Conflict of interest statement

Declarations. Competing interests: The authors state that there are no known competing interests.

Figures

Fig. 1
Fig. 1
Block diagram of the proposed C-BLX framework. The RCR block employs the polydirectional coherent tensor extraction approach recursively to extract the candidate segments containing items of varying density effectively from the input scan. These candidate region segments are passed to the CNN backbones, trained via cross-entropy loss, to extract features that are concatenated and eventually classified by the BLS. Detected threats are localized using bounding boxes of the region segments identified as prohibited items, and masks are created from the contours generated by RCR corresponding to these threat objects, ensuring precise segmentation
Fig. 2
Fig. 2
Top row shows extracted region segments with isolated objects, while the bottom row shows segmented regions containing occluded, merged and cluttered objects
Fig. 3
Fig. 3
Six unique tensor representations yielded for L = 3. Each row corresponds to a different scan, with the first column showing the original scan and the subsequent columns displaying tensor maps. These maps, arranged from left to right, represent ρ00,ρ01,ρ02,ρ11,ρ12,ρ22, obtained by computing image gradients along the angles 0, 2π3 , and 4π3
Fig. 4
Fig. 4
Visualization of threat detection process: a Original scan; b Generated coherent tensor map highlighting object boundaries and local patterns; c Objects post non-maximum suppression; d, e Regions of interest after rectangle fitting; f, g Mask generation by filling inner pixels; and h Final threat segmentation overlaid on the original image
None
Algorithm 1 Proposed RCR approach
Fig. 5
Fig. 5
BLS Parameter Optimization. a and c represent the performance variation with different numbers of enhancement nodes and feature nodes per window using SIXray and GDXray, respectively; b and d show the accuracy achieved with different numbers of windows of feature nodes for the SIXray and GDXray datasets, respectively
Fig. 6
Fig. 6
Qualitative evaluations of the proposed framework on SIXray, GDXray and COMPASS-XP
Fig. 7
Fig. 7
Illustration of failure cases

Similar articles

References

    1. Velayudhan D, Hassan T, Damiani E, Werghi N (2023) Recent advances in baggage threat detection: a comprehensive and systematic survey. ACM Comput Surv 55(8):165. 10.1145/3549932
    1. Wong S, Brooks N (2015) Evolving risk-based security: a review of current issues and emerging trends impacting security screening in the aviation industry. J Air Transp Manage 48:60–64. 10.1016/j.jairtraman.2015.06.013
    1. Hassan T, Akcay S, Bennamoun M, Khan S, Werghi N (2022) A novel incremental learning driven instance segmentation framework to recognize highly cluttered instances of the contraband items. IEEE Trans Syst Man Cybern Syst 52(11):6937–6951. 10.1109/TSMC.2021.3131421
    1. Michel S, Koller SM, de Ruiter JC, Moerland R, Hogervorst M, Schwaninger A (2007) Computer-based training increases efficiency in X-ray image interpretation by aviation security screeners. In: Proceedings of the 41st annual IEEE international Carnahan conference on security technology, IEEE, Ottawa, 8–11. 10.1109/CCST.2007.4373490
    1. Isaac-Medina BKS, Yucer S, Bhowmik N, Breckon TP (2023) Seeing through the data: a statistical evaluation of prohibited item detection benchmark datasets for X-ray security screening. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops, IEEE, Vancouver, 17–24. 10.1109/CVPRW59228.2023.00059

LinkOut - more resources