A Reference Architecture for Plausible Threat Image Projection (TIP) Within 3D X-ray Computed Tomography Volumes

BACKGROUND Threat Image Projection (TIP) is a technique used in X-ray security baggage screening systems that superimposes a threat object signature onto a benign X-ray baggage image in a plausible and realistic manner. It has been shown to be highly effective in evaluating the ongoing performance of human operators, improving their vigilance and performance on threat detection. OBJECTIVE With the increasing use of 3D Computed Tomography (CT) in aviation security for both hold and cabin baggage screening a significant challenge arises in extending TIP to 3D CT volumes due to the difficulty in 3D CT volume segmentation and the proper insertion location determination. In this paper, we present an approach for 3D TIP in CT volumes targeting realistic and plausible threat object insertion within 3D CT baggage images. METHOD The proposed approach consists of dual threat (source) and baggage (target) volume segmentation, particle swarm optimisation based insertion determination and metal artefact generation. In our experiments, real baggage data collected from airports are used to generate TIP volumes for evaluation. We also propose a TIP quality score metric to automatically estimate the quality of generated TIP volumes. RESULT In our experiments with real baggage CT volumes and varying threat items, 90.25% of the generated TIP volumes are graded as good by human evaluation, 7% of them are of medium quality with minor flaws and 2.75% of them are bad. CONCLUSION Qualitative evaluations on real 3D CT baggage imagery show that our approach is able to generate realistic and plausible TIP which are indiscernible from real CT volumes and the TIP quality scores are consistent with human evaluations.

[1]  A. Rahmim,et al.  Metal artifact reduction in CT-based attenuation correction of PET using sobolev sinogram restoration , 2011, 2011 IEEE Nuclear Science Symposium Conference Record.

[2]  Bram van Ginneken,et al.  A survey on deep learning in medical image analysis , 2017, Medical Image Anal..

[3]  A. Rahmim,et al.  Sparsity constrained sinogram inpainting for metal artifact reduction in x-ray computed tomography , 2011, 2011 IEEE Nuclear Science Symposium Conference Record.

[4]  Azriel Rosenfeld,et al.  Digital picture analysis , 1976 .

[5]  Ajith Abraham,et al.  Inertia Weight strategies in Particle Swarm Optimization , 2011, 2011 Third World Congress on Nature and Biologically Inspired Computing.

[6]  Calvin R. Maurer,et al.  A Linear Time Algorithm for Computing Exact Euclidean Distance Transforms of Binary Images in Arbitrary Dimensions , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  D. Neil,et al.  Threat Image Projection in CCTV , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.

[8]  Yue Shi,et al.  A modified particle swarm optimizer , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).

[9]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[10]  Sarah Eichmann,et al.  The Radon Transform And Some Of Its Applications , 2016 .

[11]  D. M. McAnulty,et al.  Operational Assessment for Screener Proficiency Evaluation and Reporting System (SPEARS) Threat Image Projection. , 1996 .

[12]  Peter J. Angeline,et al.  Evolutionary Optimization Versus Particle Swarm Optimization: Philosophy and Performance Differences , 1998, Evolutionary Programming.

[13]  Toby P. Breckon,et al.  Investigating existing medical CT segmentation techniques within automated baggage and package inspection , 2013, Optics/Photonics in Security and Defence.

[14]  Toby P. Breckon,et al.  Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery , 2018, IEEE Transactions on Information Forensics and Security.

[15]  Geoffrey I. Webb,et al.  Encyclopedia of Machine Learning , 2011, Encyclopedia of Machine Learning.

[16]  Toby P. Breckon,et al.  An Approach for Adaptive Automatic Threat Recognition Within 3D Computed Tomography Images for Baggage Security Screening , 2019, Journal of X-ray science and technology.

[17]  Lester James V. Miranda,et al.  PySwarms: a research toolkit for Particle Swarm Optimization in Python , 2018, J. Open Source Softw..

[18]  Toby P. Breckon,et al.  Radon transform based automatic metal artefacts generation for 3D threat image projection , 2013, Optics/Photonics in Security and Defence.

[19]  Nicole Hättenschwiler,et al.  Detecting Bombs in X-Ray Images of Hold Baggage: 2D Versus 3D Imaging , 2018, Hum. Factors.

[20]  F Hofer,et al.  Using threat image projection data for assessing individual screener performance , 2005 .

[21]  P. Suetens,et al.  Metal streak artifacts in X-ray computed tomography: a simulation study , 1998, 1998 IEEE Nuclear Science Symposium Conference Record. 1998 IEEE Nuclear Science Symposium and Medical Imaging Conference (Cat. No.98CH36255).

[22]  Toby P. Breckon,et al.  The Good, the Bad and the Ugly: Evaluating Convolutional Neural Networks for Prohibited Item Detection Using Real and Synthetically Composited X-ray Imagery , 2019, ArXiv.

[23]  Rolf Adams,et al.  Seeded Region Growing , 1994, IEEE Trans. Pattern Anal. Mach. Intell..

[24]  Sos S. Agaian,et al.  3D threat image projection , 2008, Electronic Imaging.

[25]  Victoria Cutler,et al.  Use of threat image projection (TIP) to enhance security performance , 2009, 43rd Annual 2009 International Carnahan Conference on Security Technology.

[26]  Toby P. Breckon,et al.  GANomaly: Semi-Supervised Anomaly Detection via Adversarial Training , 2018, ACCV.

[27]  Johan Nuyts,et al.  An experimental survey of metal artefact reduction in computed tomography. , 2013, Journal of X-ray science and technology.

[28]  E. Dubois,et al.  Digital picture processing , 1985, Proceedings of the IEEE.

[29]  Lewis D. Griffin,et al.  Threat Image Projection (TIP) into X-ray images of cargo containers for training humans and machines , 2016, 2016 IEEE International Carnahan Conference on Security Technology (ICCST).

[30]  Fiona Donald,et al.  CCTV: A challenging case for threat image projection implementation , 2015 .

[31]  Ken Shoemake,et al.  Animating rotation with quaternion curves , 1985, SIGGRAPH.

[32]  Najla Megherbi Bouallagu,et al.  Fully automatic 3D Threat Image Projection: Application to densely cluttered 3D Computed Tomography baggage images , 2012, 2012 3rd International Conference on Image Processing Theory, Tools and Applications (IPTA).