
Analysis on airport security of baggage screening using deep learning
- 1 Department of CSE, GMR Institute of Technology, Rajam, AP-532127, India
- 2 Department of CSE, GMR Institute of Technology, Rajam, AP-532127, India
- 3 Department of CSE, GMR Institute of Technology, Rajam, AP-532127, India
- 4 Department of CSE, GMR Institute of Technology, Rajam, AP-532127, India
- 5 Department of CSE, GMR Institute of Technology, Rajam, AP-532127, India
- 6 Department of CSE, GMR Institute of Technology, Rajam, AP-532127, India
* Author to whom correspondence should be addressed.
Abstract
Airports are the places where landings and take offs of the flights take place. In general, airports are preferred for traveling over large distances. While traveling in flights we carry our baggage which consists of various items, but the items that are prohibited in the baggage are scissors, knives, gun, and the electronic devices which cannot be switched off. Carrying dangerous items may lead to hijacking of flights and it even led to unusual situations in the airport. To prevent public from threat, airports generally have security inspection in which you will be required to pass your luggage through an X-ray machine where it will be checked for dangerous items. This analysis deals with software side of the security inspection and it is a brief study on various state-of-art proposed deep learning intended methods that are used to detect threat in baggage screening, advantages of their methodology, limitations, and gaps to be implemented.
Keywords
Airport Inspection, Threat Items, Hijacking, X-ray machine, Deep Learning.
[1]. Hassan, T., Akçay, S., Bennamoun, M., Khan, S., & Werghi, N. (2021). Unsupervised anomaly instance segmentation for baggage threat recognition. Journal of Ambient Intelligence and Humanized Computing, 1-12.
[2]. Gao, Q., & Liang, P. (2021). Airline baggage appearance transportability detection based on A novel dataset and sequential hierarchical sampling CNN model. IEEE Access, 9, 41833-41843.
[3]. Wei, Y., Zhu, Z., Yu, H., & Zhang, W. (2021). An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution. Journal of Real-Time Image Processing, 18(3), 923-935.
[4]. Steno, P., Alsadoon, A., Prasad, P. W. C., Al-Dala’in, T., & Alsadoon, O. H. (2021). A novel enhanced region proposal network and modified loss function: threat object detection in secure screening using deep learning. The Journal of Supercomputing, 77(4), 3840-3869.
[5]. Benedykciuk, E., Denkowski, M., & Dmitruk, K. (2021). Material classification in X-ray images based on multi-scale CNN. Signal, Image and Video Processing, 15(6), 1285-1293.
[6]. Kim, H. Y., Cho, S. J., Baek, S. J., Jung, S. W., & Ko, S. J. (2021). Learning-Based Image Synthesis for Hazardous Object Detection in X-Ray Security Applications. IEEE Access, 9, 135256-135265.
[7]. Tao, R., Wei, Y., Li, H., Liu, A., Ding, Y., Qin, H., & Liu, X. (2021). Over-sampling de-occlusion attention network for prohibited items detection in noisy X-ray images. arXiv preprint arXiv:2103.00809.
[8]. Saavedra, D., Banerjee, S., & Mery, D. (2021). Detection of threat objects in baggage inspection with X-ray images using deep learning. Neural Computing and Applications, 33(13), 7803-7819.
[9]. Dumagpi, J. K., & Jeong, Y. J. (2021). Pixel-Level Analysis for Enhancing Threat Detection in Large-Scale X-ray Security Images. Applied Sciences, 11(21), 10261.
[10]. Wang, B., Zhang, L., Wen, L., Liu, X., & Wu, Y. (2021). Towards real-world prohibited item detection: A large-scale x-ray benchmark. In Proceedings of the IEEE/CVF International Conference on Computer Vision (pp. 5412-5421).
[11]. Hassan, T., & Werghi, N. (2020). Trainable structure tensors for autonomous baggage threat detection under extreme occlusion. In Proceedings of the Asian Conference on Computer Vision.
[12]. Hassan, T., Shafay, M., Akçay, S., Khan, S., Bennamoun, M., Damiani, E., & Werghi, N. (2020). Meta-transfer learning driven tensor-shot detector for the autonomous localization and recognition of concealed baggage threats. Sensors, 20(22), 6450.
[13]. Kim, H. Y., Park, S., Shin, Y. G., Jung, S. W., & Ko, S. J. (2020). Detail restoration and tone mapping networks for x-ray security inspection. IEEE Access, 8, 197473-197483.
[14]. Gu, B., Ge, R., Chen, Y., Luo, L., & Coatrieux, G. (2020). Automatic and robust object detection in x-ray baggage inspection using deep convolutional neural networks. IEEE Transactions on Industrial Electronics, 68(10), 10248-10257.
[15]. Bhowmik, N., Gaus, Y. F. A., & Breckon, T. P. (2019, November). Using deep neural networks to address the evolving challenges of concealed threat detection within complex electronic items. In 2019 IEEE International Symposium on Technologies for Homeland Security (HST) (pp. 1-6). IEEE.
[16]. Ma, Q., Jiang, J., Liu, X., & Ma, J. (2021). Deep unfolding network for spatiospectral image super-resolution. IEEE Transactions on Computational Imaging, 8, 28-40.
[17]. Sahu, S., Singh, A. K., Ghrera, S. P., & Elhoseny, M. (2019). An approach for de-noising and contrast enhancement of retinal fundus image using CLAHE. Optics & Laser Technology, 110, 87-98.
[18]. Zhang, M., Wang, X., Sathishkumar, V. E., & Sivakumar, V. (2021). Machine learning techniques based on security management in smart cities using robots. Work, 68(3), 891-902.
[19]. Liu, Y., Sathishkumar, V. E., & Manickam, A. (2022). Augmented reality technology based on school physical education training. Computers and Electrical Engineering, 99, 107807.
[20]. Sathishkumar, V. E., Park, J., & Cho, Y. (2020). Using data mining techniques for bike sharing demand prediction in metropolitan city. Computer Communications, 153, 353-366.
[21]. VE, S., Shin, C., & Cho, Y. (2021). Efficient energy consumption prediction model for a data analytic-enabled industry building in a smart city. Building Research & Information, 49(1), 127-143.
Cite this article
Suraj,C.;Malyada,A.;Anjali,B.;Bhagavan,R.;Vardhan,H.;Karrothu,A. (2023). Analysis on airport security of baggage screening using deep learning. Applied and Computational Engineering,4,260-266.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 3rd International Conference on Signal Processing and Machine Learning
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).