SlideShare a Scribd company logo
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume- 9, Issue- 3 (June 2019)
www.ijemr.net https://doi.org/10.31033/ijemr.9.3.03
40 This work is licensed under Creative Commons Attribution 4.0 International License.
Passenger Screening using Deep Learning and Artificial Neural Networks
Sarthak Arora1
, Ankit Singh Rathore2
and Saurabh Gautam3
1
Student, Department of Information Technology, Maharaja Agrasen Institute of Technology, GGSIPU, INDIA
2
Student, Department of Information Technology, Maharaja Agrasen Institute of Technology, GGSIPU, INDIA
3
Assistant Professor, Department of Information Technology, Maharaja Agrasen Institute of Technology, GGSIPU, INDIA
1
Correspondence Author: sarthakarora.1997@gmail.com
ABSTRACT
In this research, we have to detect the contrabands
hidden in the human body’s scanned images at airport
security machines using segmentation and classification.
Present algorithm of security scanning machines at the
airports of USA are producing high rate of false negatives
which in cases lead to engage in a secondary, manual
screening process that slows everything down. So to resolve
this problem and to improve the detection of contrabands, new
and efficient algorithm need to be made.
Keywords-- Transportation Security Administration,
Advanced Image Technology, CNN
I. INTRODUCTION
Use of Neural networks and deep learning in
airport security is a major breakthrough. Deep learning can
provide new capabilities and approaches for addressing
security problems. Airport security refers to the techniques
and methods used in an attempt to protect passengers, staff
and planes which use the airports from accidental/malicious
harm, crime, and other threats. Aviation security is a
combination of human and material resources to safeguard
civil aviation against unlawful interference. Unlawful
interference could be acts of terrorism, sabotage, threat to
life and property, communication of false threat, bombing,
etc. Large numbers of people pass through airports every
day. This presents potential targets for terrorism and other
forms of crime because of the number of people located in
one place. Similarly, the high concentration of people on
large airliners increases the potentially high death rate with
attacks on aircraft, and the ability to use a hijacked airplane
as a lethal weapon may provide an alluring target for
terrorism. So to resolve this problem and to improve the
detection of contrabands, new and efficient algorithm need
to be made. For this, dataset has been downloaded from
kagglehttps://www.kaggle.com/c/passenger-screening-
algorithm-challenge/data, which was provided by DHS
(Department of Homeland Security) to kaggle. The dataset
contains large number of body scans obtained by new
generation of millimetre wave scanner called High
Definition-Advanced Imaging Technology (HD-AIT)
system. The scans comprise of subjects who are wearing
different clothing types, having different BMI’s, different
number of contrabands or threats and different types of
contrabands. To pre-process the images and to train our
CNN model, python is used as a prominent programming
language. During pre-processing of dataset’s images ,
cropping and segmentation of images of about 1200 bodies
has been done and labelled those segmented and cropped
regions as a train data and test data. The preprocessed data
are pipelined to CNN deep learning model to predict
probability of contrabands in predefined 17 body zones.
According to Bart Elias, Transportation Security
Administration (TSA) has deployed 1,800 units Advanced
Image Technology (AIT) throughout the airports on US and
the acquisition cost per unit is about $175,000. To fully
implement this system, the overall annual cost for
purchasing, installing, staffing, operating, supporting,
upgrading and maintaining sum to about 1.17 billion. In
addition, the Department of Homeland Security’s (DHS) in
USA has found a higher false alarm that is produced from
the algorithms which is used in today’s scanners at the
airports. Although, the investment being made represents a
huge amount of money, it is not solving the security
problem with regarding to the detection of threats. The
Security still needs to develop technology to fix these
algorithms to minimize the errors. Like others cleaners of
data, working with images need a special care in filter data
that should be a ground truth as possible. Many difficulties
are aroused in filtering the noise in the images and in
segmenting the images in regions that contains the object.
Errors in the segmentation can mislead the security system
and generally produces false results. The ideal is to reduce
the noise and produce some threshold that correct the
segmentation regions. Considering this scenario, this
project will present a model to do the classification of the
regions of the body´s images using supervised machine
learning to identify the hidden threats hired in the human
bodies. The results will be analyzed to verify the true or
false of the information collected in the model. The
objectives proposed in this project are: Produce an
algorithm that fractionated the human body image in
regions to be able to identify the body’s region correctly.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume- 9, Issue- 3 (June 2019)
www.ijemr.net https://doi.org/10.31033/ijemr.9.3.03
41 This work is licensed under Creative Commons Attribution 4.0 International License.
II. LITERATURE REVIEW
While long lines and frantically shuffling luggage
into plastic bins isn’t a fun experience, airport security is a
critical and necessary requirement for safe travel.
No one understands the need for both through
security screenings and short wait times more than U.S.
Transportation Security Administration (TSA). They’re
responsible for all U.S. airport security, screening more
than two million passengers daily.
Whenever TSA’s sensors and algorithms predict a
potential threat, TSA staff needs to engage in a secondary,
manual screening process that slows everything down. And
as the number of travelers increase every year and new
threats develop, their prediction algorithms need to
continually improve to meet the increased demand.
Currently, TSA purchases updated algorithms
exclusively from the manufacturers of the scanning
equipment used. These algorithms are proprietary,
expensive, and often released in long cycles. In this
competition, TSA is stepping outside their established
procurement process and is challenging the broader data
science community to help improve the accuracy of their
threat prediction algorithms. Using a dataset of images
collected on the latest generation of scanners, participants
are challenged to identify the presence of simulated threats
under a variety of object types, clothing types, and body
types. Even a modest decrease in false alarms will help
TSA significantly improve the passenger experience while
maintaining high levels of security.
III. METHODOLOGY
DataSet Available
The dataset used in this project comes from DHS
and Kaggle competition at:
https://www.kaggle.com/c/passenger-screening-algorithm-
challenge/data. This dataset contains a large number of
body scans acquired by a new generation of millimeter
wave scanner called the High Definition-Advanced Imaging
Technology (HD-AIT) system. The competition task is to
predict the probability that a given body zone (out of 17
total body zones) has a threat present. The images in the
dataset are designed to capture real scanning conditions.
They are comprised of volunteers wearing different
clothing types (from light summer clothes to heavy winter
clothes), different body mass indices, different genders,
different numbers of threats, and different types of threats.
Due to restrictions on revealing the types of threats for
which the TSA screens, the threats in the competition
images are "inert" objects with varying material properties.
These materials were carefully chosen to simulate real
threats
Approach
1. Analyzing Threat Zones
The scans to be analyzed in this project all
segment the body into numbered "threat zones". Our
modeling and results will have to give probability of
contraband within a given threat zone. It included a
visualization of the threat zones and the corresponding
numbering scheme.
2. Segmenting and Cropping the Scans
Scans are images with views from shots taken at a
regular interval of 22.5-degree rotation, 360 degrees around
the subject scanned. So for each subject, we'll get 16 scans.
Each scan will contain a view from a given angle of any
visible threat zones. Part of our approach in this Project is
to isolate each individual threat zone from every visible
angle. Later, we want to be able to make features out of
each individual threat zone from each angle that a given
threat zone is visible. That will allow us to later train on
each threat zone individually from every view in a 2D
format. Each image is divided into "sectors", the sector
numbers used below correspond to the threat zone number.
But as the images in the sequence rotate around the subject,
threat zones may be visible from another sector. Below,
we'll use these vertices to capture isolated views of a give
threat zone
3. Threat Zone Slice Lists and Crop Lists
For each zone, we pick the sector with the best
view of that threat zone. Since there are 16 images per
subject, each zone's slice list contains 16 entries each
naming the sector where the given threat zone is best
visible. At some angles, a given threat zone may not be
visible. We just set those values to None so that it's easy to
iterate the list and ignore the scans where a given zone is
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume- 9, Issue- 3 (June 2019)
www.ijemr.net https://doi.org/10.31033/ijemr.9.3.03
42 This work is licensed under Creative Commons Attribution 4.0 International License.
not visible. We call this a threat zone slice list. To create a
feature for a given threat zone. We'll iterate this list and use
the vertices to establish a region of interest and mask off the
threat zone. We used the same technique to then crop the
segmented images to reduce the size. Each element in the
zone slice list contains the sector to use in the call to roi().
4. The Preprocessor
Passengers who are being scanned for contraband
are referred to as "subjects". Our approach in this project is
to isolate each individual threat zone from every visible
angle and then make features out of each individual threat
zone from each angle that a given threat zone is visible.
This allows us to train on each threat zone individually
from every view in a 2D format. The preprocessor loops
through the data one subject at a time, transforms the
images, isolates threat zones, and uses a set of vertices to
crop each image to 250x250. Images are saved in mini
batches by threat zone, so that they can be read into the
trainer.
IV. RESULT
In this Passenger Screening Algorithm, we have
trained our model with about preprocessed images of
having threat probability and preprocessed images of
having non-threat probability. The accuracy obtained
during training is 95.04% and the loss is about 0.0414.
After the training phase, Passenger Screening Algorithm is
tested over subject images to find the probability and threat
percentage in each body zone.
V. CONCLUSION
To address the ever-evolving threats to airport
security, we present the most prominent and enhanced
model to detect the concealed threats in the human body by
passenger screening algorithm. In this project, it was
developed a method to do the segmentation of the body in
zones. It was presented 17 zones to do the learning process.
Using robust module CNN and ResNet, the model could
learn the zones with threat or not. Combining all these, the
model could classify those zones of the bodies with a robust
result that can help One important point to be considered
here is the fact that the model worked for the trained images
of the sample used, it was not considered any external
image. The results produced by the algorithm is highly
accurate for predict zones, it can indicate an over fitting of
learning. Thus outperforming traditional methods of threat
detection.
REFERENCES
[1] M. Barreno, B. Nelson, A. D. Joseph, & J. D. Tygar.
(2010). The security of machine learning. Machine
Learning, 81, 121–148. Available at:
https://people.eecs.berkeley.edu/~tygar/papers/SML/sec_m
ach_learn_journal.pdf.
[2] B. Nelson, B. I. P. Rubinstein, L. Huang, A. D. Joseph,
S. J. Lee, S. Rao, & J. D. Tygar. (2012). Query strategies
for evading convex-inducing classifiers. Journal of
Machine Learning Research, 13, 1293–1332.
[3] L. Bottou. (2012). Stochastic gradient descent tricks. In
Neural networks: Tricks of the trade. Springer, 421–436.
[4] S. Sarraf & G. Toghi. (2016). Deep learning-based
pipeline to recognize alzheimer’s disease using fmri data. In
Future Technologies Conference (FTC). IEEE, 816–820.
[5] S. V. D. Walt, S. C. Colbert, & G. Varoquaux. (2011).
The numpy array: a structure for efficient numerical
computation. Computing in Science & Engineering, 13(2),
22–30.

More Related Content

PDF
Deep Unified Model for Intrusion Detection Based on Convolutional Neural Network
PDF
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
PDF
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
PDF
IRJET- Smart Mirror using Eye Gaze Tracking
PDF
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
PDF
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
PDF
Top Cited Articles in 2019 - International Journal of Network Security & Its ...
PDF
Ijacsa published research paper march 2020
Deep Unified Model for Intrusion Detection Based on Convolutional Neural Network
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- Smart Mirror using Eye Gaze Tracking
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
Top Cited Articles in 2019 - International Journal of Network Security & Its ...
Ijacsa published research paper march 2020

Similar to Passenger Screening using Deep Learning and Artificial Neural Networks (20)

PDF
Artificial intelligence andCyberSecurity_zhang2021.pdf
PDF
IRJET - Automobile Black Box System for Vehicle Accident Analysis
PDF
Survey of accident detection systems
PDF
4. paper 10 nov 10, 2017 edit sat
PDF
Designing of Application for Detection of Face Mask and Social Distancing Dur...
PDF
Personalized Driver Alerting System using object detection
PDF
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
PDF
SPOT-THE-CAMEL: COMPUTER VISION FOR SAFER ROADS
PDF
SPOT-THE-CAMEL: COMPUTER VISION FOR SAFER ROADS
PDF
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
PDF
IRJET - Driving Safety Risk Analysis using Naturalistic Driving Data
PDF
Person Detection in Maritime Search And Rescue Operations
PDF
Person Detection in Maritime Search And Rescue Operations
PDF
Distracted Driver Detection
PDF
System call frequency analysis-based generative adversarial network model for...
PDF
Artificial Intelligence Techniques for Cyber Security
PDF
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
PDF
IRJET- Identification of Crime and Accidental Area using IoT
PDF
IRJET- Damage Assessment for Car Insurance
PDF
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
Artificial intelligence andCyberSecurity_zhang2021.pdf
IRJET - Automobile Black Box System for Vehicle Accident Analysis
Survey of accident detection systems
4. paper 10 nov 10, 2017 edit sat
Designing of Application for Detection of Face Mask and Social Distancing Dur...
Personalized Driver Alerting System using object detection
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
SPOT-THE-CAMEL: COMPUTER VISION FOR SAFER ROADS
SPOT-THE-CAMEL: COMPUTER VISION FOR SAFER ROADS
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET - Driving Safety Risk Analysis using Naturalistic Driving Data
Person Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue Operations
Distracted Driver Detection
System call frequency analysis-based generative adversarial network model for...
Artificial Intelligence Techniques for Cyber Security
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET- Identification of Crime and Accidental Area using IoT
IRJET- Damage Assessment for Car Insurance
GUARDIAN:AI Supervision Patrol Drone For Defence And FederalSector
Ad

More from Dr. Amarjeet Singh (20)

PDF
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
PDF
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
PDF
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
PDF
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
PDF
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
PDF
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
PDF
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
PDF
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
PDF
A Study on Derivative Market in India
PDF
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
PDF
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
PDF
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
PDF
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
PDF
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
PDF
Role of Indians in the Battle of 1857
PDF
Haryana's Honour Killings: A Social and Legal Point of View
PDF
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
PDF
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
PDF
Capacity Expansion Banes in Indian Steel Industry
PDF
Metamorphosing Indian Blockchain Ecosystem
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
A Study on Derivative Market in India
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Role of Indians in the Battle of 1857
Haryana's Honour Killings: A Social and Legal Point of View
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Capacity Expansion Banes in Indian Steel Industry
Metamorphosing Indian Blockchain Ecosystem
Ad

Recently uploaded (20)

PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Welding lecture in detail for understanding
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Geodesy 1.pptx...............................................
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
composite construction of structures.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
Project quality management in manufacturing
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Construction Project Organization Group 2.pptx
PDF
PPT on Performance Review to get promotions
bas. eng. economics group 4 presentation 1.pptx
Welding lecture in detail for understanding
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
R24 SURVEYING LAB MANUAL for civil enggi
Geodesy 1.pptx...............................................
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
composite construction of structures.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Project quality management in manufacturing
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Mechanical Engineering MATERIALS Selection
Construction Project Organization Group 2.pptx
PPT on Performance Review to get promotions

Passenger Screening using Deep Learning and Artificial Neural Networks

  • 1. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume- 9, Issue- 3 (June 2019) www.ijemr.net https://doi.org/10.31033/ijemr.9.3.03 40 This work is licensed under Creative Commons Attribution 4.0 International License. Passenger Screening using Deep Learning and Artificial Neural Networks Sarthak Arora1 , Ankit Singh Rathore2 and Saurabh Gautam3 1 Student, Department of Information Technology, Maharaja Agrasen Institute of Technology, GGSIPU, INDIA 2 Student, Department of Information Technology, Maharaja Agrasen Institute of Technology, GGSIPU, INDIA 3 Assistant Professor, Department of Information Technology, Maharaja Agrasen Institute of Technology, GGSIPU, INDIA 1 Correspondence Author: sarthakarora.1997@gmail.com ABSTRACT In this research, we have to detect the contrabands hidden in the human body’s scanned images at airport security machines using segmentation and classification. Present algorithm of security scanning machines at the airports of USA are producing high rate of false negatives which in cases lead to engage in a secondary, manual screening process that slows everything down. So to resolve this problem and to improve the detection of contrabands, new and efficient algorithm need to be made. Keywords-- Transportation Security Administration, Advanced Image Technology, CNN I. INTRODUCTION Use of Neural networks and deep learning in airport security is a major breakthrough. Deep learning can provide new capabilities and approaches for addressing security problems. Airport security refers to the techniques and methods used in an attempt to protect passengers, staff and planes which use the airports from accidental/malicious harm, crime, and other threats. Aviation security is a combination of human and material resources to safeguard civil aviation against unlawful interference. Unlawful interference could be acts of terrorism, sabotage, threat to life and property, communication of false threat, bombing, etc. Large numbers of people pass through airports every day. This presents potential targets for terrorism and other forms of crime because of the number of people located in one place. Similarly, the high concentration of people on large airliners increases the potentially high death rate with attacks on aircraft, and the ability to use a hijacked airplane as a lethal weapon may provide an alluring target for terrorism. So to resolve this problem and to improve the detection of contrabands, new and efficient algorithm need to be made. For this, dataset has been downloaded from kagglehttps://www.kaggle.com/c/passenger-screening- algorithm-challenge/data, which was provided by DHS (Department of Homeland Security) to kaggle. The dataset contains large number of body scans obtained by new generation of millimetre wave scanner called High Definition-Advanced Imaging Technology (HD-AIT) system. The scans comprise of subjects who are wearing different clothing types, having different BMI’s, different number of contrabands or threats and different types of contrabands. To pre-process the images and to train our CNN model, python is used as a prominent programming language. During pre-processing of dataset’s images , cropping and segmentation of images of about 1200 bodies has been done and labelled those segmented and cropped regions as a train data and test data. The preprocessed data are pipelined to CNN deep learning model to predict probability of contrabands in predefined 17 body zones. According to Bart Elias, Transportation Security Administration (TSA) has deployed 1,800 units Advanced Image Technology (AIT) throughout the airports on US and the acquisition cost per unit is about $175,000. To fully implement this system, the overall annual cost for purchasing, installing, staffing, operating, supporting, upgrading and maintaining sum to about 1.17 billion. In addition, the Department of Homeland Security’s (DHS) in USA has found a higher false alarm that is produced from the algorithms which is used in today’s scanners at the airports. Although, the investment being made represents a huge amount of money, it is not solving the security problem with regarding to the detection of threats. The Security still needs to develop technology to fix these algorithms to minimize the errors. Like others cleaners of data, working with images need a special care in filter data that should be a ground truth as possible. Many difficulties are aroused in filtering the noise in the images and in segmenting the images in regions that contains the object. Errors in the segmentation can mislead the security system and generally produces false results. The ideal is to reduce the noise and produce some threshold that correct the segmentation regions. Considering this scenario, this project will present a model to do the classification of the regions of the body´s images using supervised machine learning to identify the hidden threats hired in the human bodies. The results will be analyzed to verify the true or false of the information collected in the model. The objectives proposed in this project are: Produce an algorithm that fractionated the human body image in regions to be able to identify the body’s region correctly.
  • 2. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume- 9, Issue- 3 (June 2019) www.ijemr.net https://doi.org/10.31033/ijemr.9.3.03 41 This work is licensed under Creative Commons Attribution 4.0 International License. II. LITERATURE REVIEW While long lines and frantically shuffling luggage into plastic bins isn’t a fun experience, airport security is a critical and necessary requirement for safe travel. No one understands the need for both through security screenings and short wait times more than U.S. Transportation Security Administration (TSA). They’re responsible for all U.S. airport security, screening more than two million passengers daily. Whenever TSA’s sensors and algorithms predict a potential threat, TSA staff needs to engage in a secondary, manual screening process that slows everything down. And as the number of travelers increase every year and new threats develop, their prediction algorithms need to continually improve to meet the increased demand. Currently, TSA purchases updated algorithms exclusively from the manufacturers of the scanning equipment used. These algorithms are proprietary, expensive, and often released in long cycles. In this competition, TSA is stepping outside their established procurement process and is challenging the broader data science community to help improve the accuracy of their threat prediction algorithms. Using a dataset of images collected on the latest generation of scanners, participants are challenged to identify the presence of simulated threats under a variety of object types, clothing types, and body types. Even a modest decrease in false alarms will help TSA significantly improve the passenger experience while maintaining high levels of security. III. METHODOLOGY DataSet Available The dataset used in this project comes from DHS and Kaggle competition at: https://www.kaggle.com/c/passenger-screening-algorithm- challenge/data. This dataset contains a large number of body scans acquired by a new generation of millimeter wave scanner called the High Definition-Advanced Imaging Technology (HD-AIT) system. The competition task is to predict the probability that a given body zone (out of 17 total body zones) has a threat present. The images in the dataset are designed to capture real scanning conditions. They are comprised of volunteers wearing different clothing types (from light summer clothes to heavy winter clothes), different body mass indices, different genders, different numbers of threats, and different types of threats. Due to restrictions on revealing the types of threats for which the TSA screens, the threats in the competition images are "inert" objects with varying material properties. These materials were carefully chosen to simulate real threats Approach 1. Analyzing Threat Zones The scans to be analyzed in this project all segment the body into numbered "threat zones". Our modeling and results will have to give probability of contraband within a given threat zone. It included a visualization of the threat zones and the corresponding numbering scheme. 2. Segmenting and Cropping the Scans Scans are images with views from shots taken at a regular interval of 22.5-degree rotation, 360 degrees around the subject scanned. So for each subject, we'll get 16 scans. Each scan will contain a view from a given angle of any visible threat zones. Part of our approach in this Project is to isolate each individual threat zone from every visible angle. Later, we want to be able to make features out of each individual threat zone from each angle that a given threat zone is visible. That will allow us to later train on each threat zone individually from every view in a 2D format. Each image is divided into "sectors", the sector numbers used below correspond to the threat zone number. But as the images in the sequence rotate around the subject, threat zones may be visible from another sector. Below, we'll use these vertices to capture isolated views of a give threat zone 3. Threat Zone Slice Lists and Crop Lists For each zone, we pick the sector with the best view of that threat zone. Since there are 16 images per subject, each zone's slice list contains 16 entries each naming the sector where the given threat zone is best visible. At some angles, a given threat zone may not be visible. We just set those values to None so that it's easy to iterate the list and ignore the scans where a given zone is
  • 3. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume- 9, Issue- 3 (June 2019) www.ijemr.net https://doi.org/10.31033/ijemr.9.3.03 42 This work is licensed under Creative Commons Attribution 4.0 International License. not visible. We call this a threat zone slice list. To create a feature for a given threat zone. We'll iterate this list and use the vertices to establish a region of interest and mask off the threat zone. We used the same technique to then crop the segmented images to reduce the size. Each element in the zone slice list contains the sector to use in the call to roi(). 4. The Preprocessor Passengers who are being scanned for contraband are referred to as "subjects". Our approach in this project is to isolate each individual threat zone from every visible angle and then make features out of each individual threat zone from each angle that a given threat zone is visible. This allows us to train on each threat zone individually from every view in a 2D format. The preprocessor loops through the data one subject at a time, transforms the images, isolates threat zones, and uses a set of vertices to crop each image to 250x250. Images are saved in mini batches by threat zone, so that they can be read into the trainer. IV. RESULT In this Passenger Screening Algorithm, we have trained our model with about preprocessed images of having threat probability and preprocessed images of having non-threat probability. The accuracy obtained during training is 95.04% and the loss is about 0.0414. After the training phase, Passenger Screening Algorithm is tested over subject images to find the probability and threat percentage in each body zone. V. CONCLUSION To address the ever-evolving threats to airport security, we present the most prominent and enhanced model to detect the concealed threats in the human body by passenger screening algorithm. In this project, it was developed a method to do the segmentation of the body in zones. It was presented 17 zones to do the learning process. Using robust module CNN and ResNet, the model could learn the zones with threat or not. Combining all these, the model could classify those zones of the bodies with a robust result that can help One important point to be considered here is the fact that the model worked for the trained images of the sample used, it was not considered any external image. The results produced by the algorithm is highly accurate for predict zones, it can indicate an over fitting of learning. Thus outperforming traditional methods of threat detection. REFERENCES [1] M. Barreno, B. Nelson, A. D. Joseph, & J. D. Tygar. (2010). The security of machine learning. Machine Learning, 81, 121–148. Available at: https://people.eecs.berkeley.edu/~tygar/papers/SML/sec_m ach_learn_journal.pdf. [2] B. Nelson, B. I. P. Rubinstein, L. Huang, A. D. Joseph, S. J. Lee, S. Rao, & J. D. Tygar. (2012). Query strategies for evading convex-inducing classifiers. Journal of Machine Learning Research, 13, 1293–1332. [3] L. Bottou. (2012). Stochastic gradient descent tricks. In Neural networks: Tricks of the trade. Springer, 421–436. [4] S. Sarraf & G. Toghi. (2016). Deep learning-based pipeline to recognize alzheimer’s disease using fmri data. In Future Technologies Conference (FTC). IEEE, 816–820. [5] S. V. D. Walt, S. C. Colbert, & G. Varoquaux. (2011). The numpy array: a structure for efficient numerical computation. Computing in Science & Engineering, 13(2), 22–30.