CN111122687A - Anti-terrorist security inspection method for explosives - Google Patents

Anti-terrorist security inspection method for explosives Download PDF

Info

Publication number
CN111122687A
CN111122687A CN201911150122.8A CN201911150122A CN111122687A CN 111122687 A CN111122687 A CN 111122687A CN 201911150122 A CN201911150122 A CN 201911150122A CN 111122687 A CN111122687 A CN 111122687A
Authority
CN
China
Prior art keywords
molecules
face
particles
identity card
passenger
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911150122.8A
Other languages
Chinese (zh)
Other versions
CN111122687B (en
Inventor
汪陆生
袁真
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guozhengtong Technology Co ltd
Original Assignee
Guozhengtong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guozhengtong Technology Co ltd filed Critical Guozhengtong Technology Co ltd
Priority to CN201911150122.8A priority Critical patent/CN111122687B/en
Publication of CN111122687A publication Critical patent/CN111122687A/en
Application granted granted Critical
Publication of CN111122687B publication Critical patent/CN111122687B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N27/00Investigating or analysing materials by the use of electric, electrochemical, or magnetic means
    • G01N27/62Investigating or analysing materials by the use of electric, electrochemical, or magnetic means by investigating the ionisation of gases, e.g. aerosols; by investigating electric discharges, e.g. emission of cathode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Chemical & Material Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Educational Administration (AREA)
  • Electrochemistry (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Biochemistry (AREA)
  • Immunology (AREA)
  • Pathology (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Development Economics (AREA)
  • Chemical Kinetics & Catalysis (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Emergency Alarm Devices (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses an anti-terrorism security inspection method for explosives, which is characterized by comprising the following steps: step 1: after passenger images are collected, comparing the passenger images with personnel image information in a database; step 2: reading passenger identity card information and verifying the identity information; and step 3: extracting molecules and/or particles on the passenger identity card, and detecting and judging whether the molecules and/or particles contain explosive molecules and/or particles; and 4, step 4: and when any step judges that the person is the suspicious person, outputting judgment information that the person is the suspicious person. The invention improves the people flow rate, reduces the labor cost of security inspection and improves the working efficiency by the three-in-one case measure.

Description

Anti-terrorist security inspection method for explosives
Technical Field
The invention relates to the technical field of comprehensive detection, in particular to a method and a system for detecting explosives, which are mainly applied to airports and railway stations and used for delineating potential dangerous persons through face recognition, certificate recognition and explosive detection.
Background
With the continuous change of the public security situation and the requirement of anti-terrorism work in the current society, more and more anti-terrorism technical means for searching and exploding are applied. In order to ensure safety, measures such as dog search, biometric identification, certificate identification, X-ray detection, metal detection, chemical detection and the like are commonly combined in related security check to improve the detection accuracy. However, each additional detection means requires at least one more detection person, which increases the detection time, and causes inconvenience to facilities such as airports and stations that deal with large passenger flows.
In addition, explosives detection instruments also typically exhibit false positives and false negatives, often due to cross contamination of the instrument itself, the sampling tool, and the operator with explosives. For an explosive detector, the detection capability of the explosive detector reaches picogram level, the higher the precision and the sensitivity of the explosive detector are, the more difficult the false alarm is to control, and after the explosive detector gives an alarm, the explosive detector usually needs to be debugged and calibrated to be normal, and during the debugging waiting period, the explosive detector can influence the passage of passengers. Further, the detection result is greatly influenced by the types of explosives, requirements on operators, working duration and surrounding environment. Explosives carried by a human body are usually subjected to sealing shielding treatment by terrorists, in large public places such as stations and airports, explosive molecules volatilized into air are diluted to volume concentration ppbv or even pptv magnitude by air circulation, and the low-concentration explosive molecules are difficult to detect by directly adopting trace detection technologies (such as ion mobility spectrometry, chemiluminescence, Raman spectrometry, terahertz spectrometry, mass spectrometry and the like).
Therefore, a detection mode with high detection speed and high precision is needed, and the security inspection strength is effectively improved.
Disclosure of Invention
In order to solve the defects of the prior art, the invention provides an anti-terrorism security inspection method and system for explosives, which are used for solving the problem that the security inspection complexity is improved while the security inspection strength is improved in the related technology.
In an exemplary embodiment of the present invention, the anti-terrorism security inspection method for explosives includes:
step 1: after passenger images are collected, comparing the passenger images with personnel image information in a database;
step 2: reading passenger identity card information and verifying the identity information;
and step 3: extracting molecules and/or particles on the passenger identity card, and detecting and judging whether the molecules and/or particles contain explosive molecules and/or particles;
the method comprises the steps of acquiring images in real time; detecting a human face in a designated area of the image; displaying the identity card to be placed in the identity card verification area, and prompting a user to place the identity card in the specified identity card verification area; the method comprises the steps of simultaneously carrying out face comparison on a specific crowd in a face image database collected in real time and an identity card image in an identity card verification area, then obtaining particle molecules on the identity card, and determining whether the personnel carry explosives through test paper and ion mobility spectrometry. For suspicious molecules, the focus is examined.
According to a second aspect of the present invention, there is provided an anti-terrorist security system for explosives. The system comprises an identity card rapid detection device 100, a computer device 200 and a camera device 201. The device 100 for rapidly detecting an identity card comprises: the device comprises a scanning device 101, a wiping sampling device 102, a detection device 103, an identity card 104, a spring device 105, a semiconductor heating sheet 106, a conveying device 107, an air direction guiding device 108, an ion mobility spectrometry device 109 and a laser device 110.
The quick identity card detection device 100 comprises a fixing device 401 and a protrusion 402.
The fixing device 401 is fixed, in order to increase the contact area and avoid the damage of the test paper, the protrusion 402 forms the contact area of the test paper 403 into a semicircular arc shape, when the identity card 104 contacts the spring device 105, the fixing device 401 releases the test paper 403, attaches the test paper to the identity card, and then exits the accommodating device 301 through the spring device 105.
The invention has the advantages that through three-in-one case measures, the people flow rate is improved, the labor cost of security inspection is reduced, and the working efficiency is improved.
Drawings
Fig. 1 is a diagram of an anti-terrorism security inspection method for explosives.
Fig. 2 is an architecture diagram of an anti-terrorist security inspection system for explosives.
FIG. 3 is a schematic view of the connection point of the test strip.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth.
Further, the drawings are merely schematic illustrations of the present invention, in which the same reference numerals denote the same or similar parts, and thus, a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Fig. 1 is a block diagram of a flow chart of an anti-terrorism security check method for explosives in an exemplary embodiment of the invention. Referring to fig. 1, the security check process may include:
step 1: after passenger images are collected, comparing the passenger images with personnel image information in a database;
step 2: reading passenger identity card information and verifying the identity information;
and step 3: extracting molecules and/or particles on the passenger identity card, and detecting and judging whether the molecules and/or particles contain explosive molecules and/or particles;
wherein the step 1 comprises: the first face image is acquired by a camera device that may use a depth camera of a KINECT.
101, acquiring surrounding environment parameters;
step 102, determining target shooting parameters corresponding to the surrounding environment parameters;
and 103, photographing according to the target photographing parameters to obtain the first face three-dimensional image.
Wherein the environmental parameter may be at least one of: brightness, ambient color temperature, ambient humidity, ambient electromagnetic interference intensity, etc., without limitation. The photographing parameters may include at least one of: focal length, exposure duration, sensitivity, aperture size, and the like. The camera device can acquire the target environmental parameter through a sensor, and the sensor can be at least one of the following: ambient light sensors, temperature sensors, humidity sensors, electromagnetic interference detection sensors, and the like. The imaging device can pre-store the mapping relation between the environmental parameters and the shooting parameters, further determine target shooting parameters corresponding to the target environmental parameters according to the mapping relation, and shoot according to the target shooting parameters to obtain a first face three-dimensional image.
And 104, preprocessing the point cloud data of the first face stereo image to obtain a corresponding stereo face depth image.
The pretreatment comprises the following steps: and determining the characteristic points of the nose tip.
The method comprises the following steps of;
first, the quantization angle: firstly [ -90 DEG, 90 DEG ]]This angular interval was equally divided by 90 equal portions. Secondly, nose tip point determination was performed: for each angle thetaiBy the following transformation:
Figure BDA0002283307270000041
maximum Z coordinate ZiThe point of (1) is taken as a candidate point of the nose tip point, and the coordinate of the candidate point is recorded as Pi(Xi,Yi,Zi). Let Z be max { Z ═ ZiAnd the vertex corresponding to Z is the nose tip point. Wherein x, y and z are three-dimensional coordinates of the stereo face, and x ', y ' and z ' areThree-dimensional coordinates centered on the nose tip point.
The point cloud of the tip of the nose is converted to the origin and then those points more than 8 cm away from the origin are removed, so that a point cloud of only the curved surface area of the face can be obtained. And then, performing principal component analysis on the three-dimensional face data, taking the minimum eigenvalue vector as a Z axis and the maximum eigenvalue vector as a Y axis of a new coordinate system, and establishing a right-hand coordinate system. And taking the nose tip point as the origin of the whole right-hand coordinate system, converting the three-dimensional face point cloud data into the right-hand coordinate system, finishing the correction of the face posture and realizing the normalization processing of the face data.
After pose correction, a mirror point cloud is created by replacing the X value of the original point cloud with the inverse (-X). Calculating the Euclidean distance from the original point cloud (only XY value) to the nearest point, if the distance is less than a threshold value delta, deleting the mirror image point, and if and only if no neighborhood point exists at a certain position, adding the mirror image point. The remaining mirror points are then merged with the original point cloud. And performing meshing operation on the extracted three-dimensional face point cloud, performing smooth resampling on the three-dimensional face model by adopting a mesh-based smoothing algorithm, and recovering the smooth three-dimensional face mesh obtained through iterative processing into the three-dimensional face point cloud.
After the normalization processing of the face data, two nasal wing points are searched in a rectangle of 42mm multiplied by 50mm with the tip of the nose as the center. And extracting 12 feature points including a nose cusp point, 2 nasal wing points, a left inner eye angular point, a right outer eye angular point, a middle point of the edges of the upper lip and the lower lip, a chin point and a left mouth angular point and a right mouth angular point.
And selecting 8 feature points for automatically detecting the central points of upper and lower eyelids of the left and right eyes and the inner and outer boundary points of the left and right eyebrows on a two-dimensional feature image (2D feature image) corresponding to the point cloud of the human face.
The detection of the central points of the upper eyelid and the lower eyelid of the left eye and the right eye comprises the following steps: then, the gray gradient of the eye region is calculated by using a secondary differential operator, and the process comprises smoothing denoising, gradient calculation and binarization denoising again, so that a binary image of the eye region is obtained. Then searching out an upper eyelid curve from the image after the second differentiation. Determining a starting point and an end point, taking a right eye as an example, selecting a right eye outer eye angular point mapped by the three-dimensional point cloud as the starting point, taking a right eye inner eye angular point as the end point, searching the edge of the upper eyelid from the starting point and terminating the edge with the right eye outer eye angular point, and selecting a point on a curve with an upper horizontal coordinate as the middle point of the starting point and the end point horizontal coordinate as the upper eyelid point.
And selecting three-dimensional Euclidean distances between 20 points from the obtained 20 characteristic points to form 20-dimensional vectors as characteristics.
The distance characteristics between the 20 points and the points are selected as follows
Feature(s) Distance between two points
1 Nose tip point-right intraocular canthus point
2 Nose tip point-angular point of inner eye of left eye
3 Left mouth corner point-chin point
4 Right mouth corner point-chin point
5 Lower lip midpoint-chin point
6 Middle of upper lip-middle of lower lip
7 Nasal tip point-middle point of upper lip
8 Left nasal wing point-left mouth corner point
9 Right nasal wing point-right mouth angle point
10 Right eyebrow outer boundary point-right eyebrow inner boundary point
11 Outer boundary point of left eye eyebrow-inner boundary point of left eye eyebrow
12 Inner boundary point of right eyebrow-inner boundary point of left eyebrow
13 Right eye inner eye angular point-left eye inner eye angular point
14 Inner boundary point of right eyebrow hair-inner canthus point of right eye
15 Inner boundary point of left eye eyebrow-inner eye corner point of left eye
16 Right eyebrow outer boundary point-right eye outer corner point
17 Midpoint of right superior eyelid-midpoint of right inferior eyelid
18 Midpoint of upper left eyelid-midpoint of lower left eyelid
19 Right eye corner point-right nose wing point
20 Right eye corner point-right nose wing point
And comparing the similarity of the acquired 20-dimensional feature vector with the face feature vector in the database, and further judging whether the face features are similar. The acquired stereo image is preprocessed through the algorithm in the invention, and then the characteristic points are acquired for comparison, and the characteristic comparison can be rapidly carried out, thereby avoiding that the performance of two-dimensional face recognition is reduced due to factors such as illumination, posture, makeup, expression, age change and the like, and also avoiding that a large amount of three-dimensional face data is calculated, thereby saving time.
The step 2 comprises the following steps: when the information of the second generation identity card is read, the face photo on the identity card is obtained at the same time, the face photo is processed by adopting a face recognition algorithm based on deep learning, and first face characteristic data is extracted.
And identifying the identity card number information on the identity card, acquiring a certificate photo corresponding to the identity card number in a public security system database according to the identity card number after identifying the identity card number in the identity card image, and extracting the certificate photo by adopting a face recognition algorithm based on deep learning to acquire second face characteristic data.
And judging the similarity value of the first face feature data and the second face feature data. And carrying out consistency check on the identity card carrier and the identity card carried by the identity card carrier according to the similarity value comparison result.
The step 3: and extracting molecules and/or particles on the passenger identity card, and detecting and judging whether the molecules and/or particles contain explosive molecules and/or particles.
And the step 3 comprises detecting the particles on the identity card through test paper and ion mobility spectrometry so as to judge whether the person is a suspicious molecule.
Fig. 2 is an identity card rapid detection device. As shown in fig. 2, the apparatus 100 for rapidly detecting an identification card includes: a scanning device 101, a wiping sampling device 102, a detection device 103, an identity card 104, a spring device 105, a semiconductor heating sheet 106, a conveying device 107, an air direction guiding device 108, an ion mobility spectrometry device 109, a laser device 110, and a computer 200
The accommodating device 301 is used for accommodating the inserted id card to be tested, and the scanning device 101 is used for acquiring and verifying the information of the id card to be tested placed in the accommodating device.
Wiping sampling device 102 includes: for replacing the sampling test paper.
The detection device 103 includes: and the test paper is used for wiping and sampling the identity card to be detected. The test paper comprises a basal layer and hydrogel arranged in a detection reagent, and the color change of the test paper is observed, so that whether the identity card contains explosive or not is judged.
Further, when the identification card 104 is conveyed to the accommodating device 301, the detecting device 103 starts to rub and collect the particulate matter on the identification card, and after the spring device 105 ejects the identification card, the test paper is attached to the identification card and then exits the accommodating device 301. The tester can compare the color change of the test paper with a standard color card, so as to judge whether the identity card contains explosive particles.
Further, in order to prevent the test paper from being damaged during the rubbing process, the test paper fixing mode is as shown in fig. 3. One end of the test paper is fixed by a controllable fixing device 401, in order to increase the contact area and avoid the damage of the test paper, the protrusion 402 forms the contact area of the test paper 403 into a semicircular arc shape, when the identity card 104 contacts the spring device 105, the fixing device 401 releases the test paper 403 and attaches to the identity card, and then the identity card exits from the accommodating device 301 through the spring device 105.
The conveying device 107 conveys the identity card 104 by rotating the sampling belt and obtains attached particles below the identity card 104, and the semiconductor heating sheet 106 is used for heating the sampling belt and enhancing the motion activity of the attached particles on the sampling belt.
The air blowing device blows off the particle molecules on the conveying device 107 and conveys the particles carrying the particle molecules to the ion mobility spectrometry device 109. The ion mobility spectrometry device 109 comprises an ion source, an ion reaction chamber, an ion gate and an ion mobility chamber, wherein particles blown from a wind direction enter the ionization chamber, are ionized by laser emitted by a laser device 110 and then are firstly gathered in front of the ion gate, when the ion gate is opened, ions synchronously enter a mobility area, and different ions have different mobility rates, so that an ion mobility spectrogram changing along with time is obtained, an oscilloscope can be used for collecting the mobility spectrometry, the mobility spectrometry is controlled and displayed by a computer, and a detection result is output.
The particles include at least one of: gasoline molecules, kerosene molecules, alcohol gasoline mixtures, ammonium nitrate molecules, trinitrotoluene or C4 plastic explosive particles.
In other words, when the identification card is stained with the explosive composition, some fine particles or gas molecules are scattered in the explosive composition. These discrete explosive molecules and/or particles are blown away by creating an air flow in the device for rapid identification card detection. By collecting and detecting the blown-off molecules and/or particles, if they contain explosive molecules and/or particles, the person can be identified as possibly harboring explosives or being judged as a suspect.
And when any step judges that the person is the suspicious person, outputting judgment information that the person is the suspicious person.
Illustratively, the determination of the suspicious person includes sending an alarm signal, and either an audible and visual alarm device may send an audible and visual alarm in response to the alarm signal, or a security check person may view the security check signal to implement manual interception. The type and mode of the alarm can be determined by the whole security check system, and a person skilled in the art can set a response mechanism to the alarm signal according to the actual situation.
According to the anti-terrorism security inspection method and the security inspection equipment suitable for the open area, molecules and/or particles blown away from a human body are collected and detected by utilizing the characteristic that the explosive components of explosives are scattered out of fine particles or molecules, and if the molecules and/or particles contain the explosive components, suspicious persons possibly hiding the explosives can be identified. The security inspection equipment is simple, and the security inspection result is reliable.
In the description of the present invention, it is to be understood that the terms "first", "second" and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
In the present invention, unless otherwise expressly stated or limited, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can, for example, be fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; either directly or indirectly through intervening media, either internally or in any other relationship. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (9)

1. An anti-terrorist security inspection method for explosives, comprising:
step 1: after passenger images are collected, comparing the passenger images with personnel image information in a database;
step 2: reading passenger identity card information and verifying the identity information;
and step 3: extracting molecules and/or particles on the passenger identity card, and detecting and judging whether the molecules and/or particles contain explosive molecules and/or particles;
and 4, step 4: and when any step judges that the person is the suspicious person, outputting judgment information that the person is the suspicious person.
2. The method of claim 1,
wherein the step 1 comprises: acquiring a first face image through a camera device, wherein the camera device can use a depth camera of KINECT,
101, acquiring surrounding environment parameters;
step 102, determining target shooting parameters corresponding to the surrounding environment parameters;
103, photographing according to the target photographing parameters to obtain a first face three-dimensional image;
and 104, preprocessing the point cloud data of the first face stereo image to obtain a corresponding stereo face depth image.
3. The method as claimed in claim 2, wherein 20-dimensional vectors are formed by obtaining three-dimensional Euclidean distances between 20 feature points in the face point cloud, and similarity comparison is performed between the obtained 20-dimensional feature vectors and the face feature vectors in the database, so as to judge whether the face features are similar.
4. The method of claim 1, wherein reading the identification information comprises obtaining a passenger identification number, an identification card face image.
5. The method of claim 1, wherein the steps of extracting molecules and/or particles on the passenger identification card, detecting, and determining whether the molecules and/or particles contain explosives comprise collecting molecules and/or particles within a preset range on the surface of the identification card; and analyzing the molecules and/or particles and outputting test data.
6. The method of claim 1, wherein the identity information is transmitted to a verification mechanism and an authentication signal is transmitted in response to a verification result of the verification mechanism.
7. The method of any one of claims 1 to 5, wherein an alarm signal is sent when any one of face recognition, the identity information, test data does not meet a preset condition.
8. An apparatus for rapidly detecting an identification card performing the method of claim 1 comprises: the device comprises a scanning device 101, a wiping sampling device 102, a detection device 103, an identity card 104, a spring device 105, a semiconductor heating sheet 106, a conveying device 107, an air direction guiding device 108, an ion mobility spectrometry device 109, a laser device 110 and a computer 200.
9. The device of claim 8, wherein one end of the strip in the detecting device 103 is fixed by a controllable fixing device 401, in order to increase the contact area and avoid the strip breakage, the protrusion 402 forms the contact area of the strip 403 into a semi-arc shape, when the identity card 104 contacts the spring device 105, the fixing device 401 releases the strip 403 and attaches to the identity card, and then exits the containing device 301 through the spring device 105.
CN201911150122.8A 2019-11-21 2019-11-21 Anti-terrorist security inspection method for explosives Active CN111122687B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911150122.8A CN111122687B (en) 2019-11-21 2019-11-21 Anti-terrorist security inspection method for explosives

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911150122.8A CN111122687B (en) 2019-11-21 2019-11-21 Anti-terrorist security inspection method for explosives

Publications (2)

Publication Number Publication Date
CN111122687A true CN111122687A (en) 2020-05-08
CN111122687B CN111122687B (en) 2022-09-20

Family

ID=70496200

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911150122.8A Active CN111122687B (en) 2019-11-21 2019-11-21 Anti-terrorist security inspection method for explosives

Country Status (1)

Country Link
CN (1) CN111122687B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111882729A (en) * 2020-06-30 2020-11-03 同方威视技术股份有限公司 Gate system and control method of gate system
CN112634534A (en) * 2020-12-18 2021-04-09 深圳市沐腾科技有限公司 Storage cabinet control method and device, control equipment, storage medium and storage cabinet
CN113340861A (en) * 2021-05-21 2021-09-03 上海工物高技术产业发展有限公司 Pedestrian passageway gate system and explosive detection method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008056777A1 (en) * 2006-11-10 2008-05-15 Konica Minolta Holdings, Inc. Authentication system and authentication method
CN104965235A (en) * 2015-06-12 2015-10-07 同方威视技术股份有限公司 Security check system and method
CN106570460A (en) * 2016-10-20 2017-04-19 三明学院 Single-image human face posture estimation method based on depth value
CN107247916A (en) * 2017-04-19 2017-10-13 广东工业大学 A kind of three-dimensional face identification method based on Kinect
US20180005018A1 (en) * 2016-06-30 2018-01-04 U.S. Army Research Laboratory Attn: Rdrl-Loc-I System and method for face recognition using three dimensions
CN208109765U (en) * 2018-05-09 2018-11-16 清华大学 Gate system for sample detection
CN108846306A (en) * 2018-03-28 2018-11-20 中科博宏(北京)科技有限公司 A kind of identity card Compare System and method based on deep learning recognition of face
CN109726617A (en) * 2017-10-30 2019-05-07 同方威视科技江苏有限公司 Safe examination system and safety inspection method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008056777A1 (en) * 2006-11-10 2008-05-15 Konica Minolta Holdings, Inc. Authentication system and authentication method
CN104965235A (en) * 2015-06-12 2015-10-07 同方威视技术股份有限公司 Security check system and method
US20180005018A1 (en) * 2016-06-30 2018-01-04 U.S. Army Research Laboratory Attn: Rdrl-Loc-I System and method for face recognition using three dimensions
CN106570460A (en) * 2016-10-20 2017-04-19 三明学院 Single-image human face posture estimation method based on depth value
CN107247916A (en) * 2017-04-19 2017-10-13 广东工业大学 A kind of three-dimensional face identification method based on Kinect
CN109726617A (en) * 2017-10-30 2019-05-07 同方威视科技江苏有限公司 Safe examination system and safety inspection method
CN108846306A (en) * 2018-03-28 2018-11-20 中科博宏(北京)科技有限公司 A kind of identity card Compare System and method based on deep learning recognition of face
CN208109765U (en) * 2018-05-09 2018-11-16 清华大学 Gate system for sample detection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
魏尚: "基于Kinect深度图像的三维人脸识别技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111882729A (en) * 2020-06-30 2020-11-03 同方威视技术股份有限公司 Gate system and control method of gate system
CN112634534A (en) * 2020-12-18 2021-04-09 深圳市沐腾科技有限公司 Storage cabinet control method and device, control equipment, storage medium and storage cabinet
CN113340861A (en) * 2021-05-21 2021-09-03 上海工物高技术产业发展有限公司 Pedestrian passageway gate system and explosive detection method

Also Published As

Publication number Publication date
CN111122687B (en) 2022-09-20

Similar Documents

Publication Publication Date Title
CN111122687B (en) Anti-terrorist security inspection method for explosives
US9940515B2 (en) Image analysis for authenticating a product
CN103827916B (en) Wrinkle detects the methods, devices and systems assessed with wrinkle
US9798918B2 (en) Method and system for analyzing biological specimens by spectral imaging
US20160253807A1 (en) Method and System for Determining 3D Object Poses and Landmark Points using Surface Patches
US20180034852A1 (en) Anti-spoofing system and methods useful in conjunction therewith
CN111027481B (en) Behavior analysis method and device based on human body key point detection
US20080084553A1 (en) Method And Apparatus For Multimodal Detection
CN110334571B (en) Millimeter wave image human body privacy protection method based on convolutional neural network
RU2716465C1 (en) Optical inspection method and device using it
Marzec et al. Automatic method for detection of characteristic areas in thermal face images
KR20190038203A (en) Facial expression recognition system and method using machine learning
EP2976735A2 (en) Method and system for analyzing biological specimens by spectral imaging
Dumaliang et al. Coin identification and conversion system using image processing
CN110693458B (en) Intraoperative real-time parathyroid gland identification method based on near-infrared autofluorescence
KR20190114241A (en) Apparatus for algae classification and cell countion based on deep learning and method for thereof
Khodaskar et al. Human face detection & recognition using raspberry Pi
CN105138989B (en) A kind of vehicle sun visor condition detection method and device
US11599738B2 (en) Method for examining distributed objects by segmenting an overview image
JP2006293720A (en) Face detection apparatus, face detection method, and face detection program
Bexten et al. Discussion of using machine learning for safety purposes in human detection
WO2006019991A2 (en) Method and apparatus for multimodal detection
CN110766848A (en) Analysis method based on biological characteristics
Wang et al. Artificial aging of faces by support vector machines
KR101087250B1 (en) Apparatus for detecting face using skin region detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant