IMPROVEMENTS IN OR RELATING TO THREAT CLASSIFICATION
20210364629 · 2021-11-25
Inventors
- Philip Edward RYDER (Herefordshire, GB)
- David LEONARD (Birmingham, GB)
- Tony TSZ-HONG YAU (Birmingham, GB)
- Srikrishna NUDURUMATI (Birmingham, GB)
Cpc classification
G01S7/411
PHYSICS
G06V10/255
PHYSICS
G06V40/103
PHYSICS
G06V20/52
PHYSICS
G06V10/763
PHYSICS
G01S13/887
PHYSICS
International classification
G01S13/88
PHYSICS
G01S13/86
PHYSICS
Abstract
A system (100) for remote detection of one or more dimensions of a metallic and/or dielectric object (116), comprising: at least one sensor component configured to identify one or more candidate objects (111), a transmission apparatus, including a transmission element (106), configured to direct microwave and/or mm wave radiation, a detection apparatus (108,109) configured to receive radiation from an entity resulting from the transmitted radiation and to generate one or more detection signals in the frequency domain, and a controller (104), the controller being operable to: generate location data for the one or more candidate objects (111) based on data received from the sensor component; cause the transmission apparatus to direct radiation towards a candidate object, cause the transmitted radiation to be continuously swept over a predetermined range of frequencies, perform a transform operation on the detection signals to generate one or more transformed signals, and determine, from one or more features of the transformed signal, one or more characteristics of the candidate object upon which the transmitted radiation is incident.
Claims
1. A system for remote detection of one or more dimensions of a metallic and/or dielectric object, comprising: at least one sensor component configured to identify one or more candidate objects, a transmission apparatus, including a transmission element, configured to direct microwave and/or mm wave radiation, a detection apparatus configured to receive radiation from an entity resulting from the transmitted radiation and to generate one or more detection signals in the frequency domain, and a controller, the controller being operable to: (i) generate location data for the one or more candidate objects based on data received from the sensor component; (ii) cause the transmission apparatus to direct radiation towards a candidate object , (iii) cause the transmitted radiation to be continuously swept over a predetermined range of frequencies, (iv) perform a transform operation on the detection signal(s) to generate one or more transformed signals, and (v) determine, from one or more features of the transformed signal, one or more characteristics of the candidate object upon which the transmitted radiation is incident.
2. The system according to claim 1, wherein the system is further configured to determine, based on the characteristics, that the candidate object is an object of interest.
3. The system according to claim 2, wherein upon determining that the candidate object is an object of interest, the system is configured to track the candidate object using the at least one sensor.
4. The system according to any preceding claim, wherein the at least one sensor component comprises a video sensor.
5. The system according to claim 4, wherein generating location data comprises generating an estimated position of the candidate object within a model of the scene viewed by the video sensor.
6. The system according to any of claim 4 or 5, wherein the controller is further configured to determine a height and/or width of the candidate object.
7. The system according to any preceding claim, wherein the controller is housed within the detection apparatus.
8. The system according to any preceding claim, wherein the controller is configured to be in communication with a web application, and controllable through an associated web-based client.
9. The system according to any preceding claim, wherein identifying and determining the characteristics of the candidate objects is performed autonomously.
10. The system according to any preceding claim, wherein causing the radiation to be directed towards the candidate object comprises controlling the transmission apparatus to sweep a beam of radiation over the candidate object.
11. The system according to claim 10, wherein the beam of radiation has a diameter of between 10 and 50 centimetres.
12. The system according to any preceding claim, wherein the characteristics of the object include one or more of the surface contours, the surface texture, the dielectric texture and/or the 3-dimensional shape of the candidate object.
13. The system according to any preceding claim, wherein the controller is operable to determine one of more characteristics of the object using a clustering algorithm.
14. The system according to any preceding claim, wherein the controller is operable to determine one of more characteristics of the object, through a preliminary step of filtering to eliminate spikes from the transformed signals.
15. The system according to claim 14, wherein the controller is operable to perform a least mean squares fit on the transformed signals subsequent to the preliminary step of filtering to eliminate spikes from the transformed signals.
16. The system according to any preceding claim, wherein the controller is operable to determine one or more characteristics of an object upon which the transmitted radiation is incident by curve fitting to an n.sup.th order polynomial.
17. The system according to claim 16, wherein more than one representation of the curve is prepared using a different polynomial.
18. The system according to claim 17, wherein the polynomials are 3.sup.rd and 8.sup.th order polynomials.
19. The system according to any of claims 16 to 18, wherein a weighting is applied to at least one co-efficient of a polynomial.
20. The system according to any preceding claim, wherein the system includes a memory in which a plurality of classifiers indicative of different object characteristics are stored.
Description
[0040] The invention will now be further and more particularly described, by way of example only, and with reference to the accompanying drawings, in which:
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049] Various further aspects and embodiments of the present invention will be apparent to those skilled in the art in view of the present disclosure.
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0050] Embodiments of the present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the Invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.
[0051] If will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the present invention. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
[0052] It will be understood that when an element such as a layer, region or substrate is referred to as being “on” or extending “onto” another element, it can be directly on or extend directly onto the other element or intervening elements may also be present. In contrast, when an element is referred to as being “directly on” or extending “directly onto” another element, there are no intervening elements present. It will also be understood that when an element is referred to as being “connected” or “coupled” to another element, it can be directly connected or coupled to the other element or intervening elements may be present. In contrast, when an element is referred to as being “directly connected” or “directly coupled” to another element, there are no intervening elements present.
[0053] Relative terms such as “below” or “above” or “upper” or “lower” or “horizontal” or “vertical” may be used herein to describe a relationship of one element, layer or region to another element, layer or region as illustrated in the figures. It will be understood that these terms are intended to encompass different orientations of the device in addition to the orientation depicted in the figures.
[0054] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise, it will be further understood that the terms “comprises” “comprising,” “includes” and/or “including” when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
[0055] Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, it will be further understood that terms used herein should be interpreted as having a meaning that is consistent with their meaning in the context of this specification and the relevant art and wilt not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
[0056] As used herein, “threat object” is taken to mean a metallic or dielectric object, whether specifically designed or intended for offensive use or not, that have potential to be used in an offensive or violent manner. It is intended to include fragmentation weapons which may comprise a plurality of individual parts severally located, rather than presenting as a single object.
[0057] The present invention is described below with reference to flowchart illustrations and/or block diagrams of methods, systems and computer program products according to embodiments of the invention. It will be understood that some blocks of the flowchart illustrations and/or block diagrams, and combinations of some blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be stored or implemented in a microcontroller, microprocessor, digital signal processor (DSP), field programmable gate array (FPGA), a state machine, programmable logic controller (PLC) or other processing circuit, general purpose computer, special purpose computer, or other programmable data processing apparatus such as to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
[0058] These computer program instructions may also be stored in a computer readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.
[0059] The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block, or blocks. It is to be understood that the functions/acts noted in the blocks may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Although some of the diagrams include arrows on communication paths to show a primary direction of communication, it is to be understood that communication may occur in the opposite direction to the depicted arrows.
[0060] Embodiments of the invention may be used for remotely detecting the presence and/or size of metal and/or dielectric objects concealed underneath clothing. Embodiments herein may be used for remotely detecting metal and/or dielectric objects. A dielectric in this context is a non-conducting (i.e. insulating) substance such as ceramic that has a low enough permittivity to allow microwaves to pass through. A ceramic knife or gun, or a block of plastic explosive, are examples of this type of material.
[0061] Some embodiments of detection systems are disclosed herein.
[0062]
[0063] In use and operation, the system 100 uses electromagnetic radiation in the microwave or millimeter (mm) wave band, where the wavelength is comparable or shorter than the size of the object 116 to be detected. The object 116 may be on and/or in the body of a person, within containers and/or items of luggage, and/or concealed in and/or on some other entity (not shown). The suspect entity (e.g., a person; not shown) has radiation directed by transmitter 106 onto it, so that the (threat) object 116 is entirely illuminated by a continuous wave of this radiation (i.e., the radiation is not pulsed, but kept continuously on). The radiation intensity is well within safe operating limits, but may be in any case determined by the sensitivity of the detector 110. As an example, in the range 14-40 GHz, 0 dBm of power is used with a typical beam area 118 of 0.125 m.sup.2 which equates to a 20 cm diameter beam. However, in some embodiments, the hardware may be designed so as generate a beam area 118 of greater or lesser size.
[0064] The frequency and consequently the wavelength of the radiation, is swept through a reasonable range and may be referred to as swept CW and/or continuous wave radiation. Limits may be set by the devices used or regulations in the location of use, but include, for example a 5 GHz sweep starting at 75 GHz; a 20 GHz or more sweep starting at 14, 50 or 75 GHz; and a 35 GHz sweep starting at 75 GHz. The data is as a real-time continuous sweep. Typically 256 or more data points may be acquired. In some embodiments, data may be taken between 14 to 40 GHz, providing a sweep range of 26 GHz.
[0065] The illumination and detection may be undertaken remotely from the object 116 in question, for example, at a distance of a meter or more, although there is no lower or upper limit on this distance. The upper limit on detection distance may be set by the millimeter or microwave focussing optics, although, with this technique, a small beam at the diffraction limit is not necessary. The effective range of the system 100 includes a few tens of centimeters (cm) to many tens of meters (m). In some embodiments, a device may be operated at a range of approximately 1 m to 10 m depending on the frequency chosen. Some microwave frequencies are attenuated by the atmosphere, and atmospheric windows such as that found around 94 GHz are generally chosen to minimise these effects. In some embodiments, the source of electromagnetic radiation 102 and the detector 110 may be mounted next to each other and they may be focussed onto some distant object 116 or entity (not shown).
[0066] The microwave and/or mm wave source 102; the transmitter 106; the first 108 and second 109 receivers, the two detectors 110, the two amplifiers 112 and the high speed data acquisition card 114 are all located within a housing (not shown). The housing is attached to a suitable substrate using a mount (not shown). The mount enables the housing as a whole to pan and tilt. Alternatively, the mount may be configured to provide only pan or only tilt movement depending on the location of the substrate to which the housing is mounted. The substrate may be a wall, roof or other piece of street furniture or internal architecture and it is chosen to give the transmitter 106 optimum coverage of the area to be surveyed.
[0067] Alternatively, as shown in the example of
[0068]
[0069] The high speed data acquisition card 114 acquires the data from the amplifiers 112 and then sends this to the 104 for processing. The link between the card 114 and the 104 is achieved via any suitable local area network, including, but not limited to Wi-Fi.
[0070] In some embodiments, the controller 104 comprises an embedded computer such as a microcontroller, the microcontroller being co-located with the detection apparatus in the housing. In such embodiments, the microcontroller can be configured for wireless, two-way communication with a processor external to the housing to enable remote control of the detection apparatus.
[0071] An external processor may enable a user to access and control the detection apparatus via a web-based interface, thus shifting the burden of processing to the detection apparatus, and allowing users operating the threat object detection security system to do so via non-specialist hardware devices such as, for example, a low specification phone, tablet, or laptop with access to the internet.
[0072]
[0073] A real data set that has been subject to smoothing is shown in
[0074] The polynomial coefficients are plotted in an n.sup.th degree space.
[0075] The variance within the training data set will convert into a level of certainty in the classification. If there is too much data from varied sources this will result in a more aggressive overlap between clusters which may, in turn, make classification more challenging. In circumstances where the clusters are not well-defined, it may be possible to combine several classifications in order to identify the probability of the presence of a threat item.
[0076] The data shown in
[0077] In some embodiments, weightings of the coefficients can be introduced in order to scale the data so as to normalise it. This may be useful where there is considerable overlap in clusters which prevents a clear classification to be made.
[0078] In some embodiments, hardware corresponding to the systems herein may form and/or be part of a portable device (i.e. small enough to be carried by one person, or transported in an automobile, so as to be operable therein).
[0079] Referring to
[0080] The term “sensor component” as defined herein refers to any sensor or set of sensors capable of providing information about a location of interest. For example, the sensor component may comprise one or more video cameras, thermal imaging sensors, passive SONAR detectors, or LIDAR detectors.
[0081] If the sensor component comprises multiple types of sensors providing information about a location of interest, the system of the present invention may comprise a sensor fusion module interfacing with the sensors and configured to aggregate the different types of information to reconstruct a three dimensional scene of the location of interest. In some embodiments, the sensor fusion module also processes the aggregated sensor data to identify which candidate objects 111 are potential threats and should be screened by the microwave radiation source.
[0082] In other embodiments, the sensors themselves are equipped with low level processing capabilities, and are configured to identify candidate objects and decide which candidate objects should be screened. In yet other embodiments both the identification of the candidate objects and the threat classification steps are performed by a server or a central processing unit.
[0083] In some embodiments, the sensor component comprises one or more video cameras configured to identify a number of candidate objects of interest within a field of view of the one or more cameras, and to communicate with the controller of the threat object detection system to direct radiation towards identified candidate objects. In some embodiments, the sensor component may comprise a plurality of video cameras or even an entire surveillance camera network with which the threat object detection system of the present invention can be integrated.
[0084] Referring to
[0085] Specifically,
[0086] A square “checkerboard” pattern is used as a known target to calibrate the initial parameters of the cameras 115 and 117, enabling parameters such as position and orientation of the cameras with respect to each other to be determined. This computer vision technique is also used to generate the matrices of the cameras, which include other relevant parameters such as lens distortion, pitch, roll, yaw. Once these factors have been determined, the cameras are able to generate three dimensional positional estimates for candidate objects that enter their field of view.
[0087] The information from each camera is combined to produce a robust tracking solution. The location of the candidate objects, for example pedestrians and unattended bags, are determined and represented by bounding boxes in a three dimensional pixel coordinate system. In some embodiments, this bounding box is sent to a higher level component in the software architecture for inclusion in a video overlay. The information is also used to calculate changes in the orientation of the cameras, for example changes in the pan and tilt or rotation of the cameras caused by the cameras tracking an object of interest.
[0088] In some embodiments where the sensor component comprises multiple video cameras 115 and 117, the method of implementing the above described threat detection comprises three stages.
[0089] In a first stage, a candidate object is detected and identified in a video feed, optionally being assigned a unique ID by a processor, and their position, and optionally their size dimensions, is/are defined relative to the video camera.
[0090] Software components are connected to each individual camera, and to the other sensor components if there are any, and extract metrics from each camera image and each other sensed parameter. These metrics are used to create a model of the sensed scene in 3D. Metrics might include object detection or feature point recognition. This module may also calculate estimates of the spatial location in 3D space. In some embodiments, one instance of this software component runs for each camera or other sensor, and the execution of this process may occur either locally or remotely to the sensor(s).
[0091] Various methods of metric extraction are available including background subtraction in the case of fixed cameras and object detection algorithms using deep neural networks.
[0092] In some embodiments, each set of metrics are sent from the cameras on a frame by frame basis, and require synchronisation using methods that may include meta-data time stamps. The system can thus compensate for varying factors between cameras, including differences in latency and frame rate.
[0093] This first stage could further comprise performing object classification on the candidate objects, once identified, to determine if they are a person or an item, such as for example a suitcase. The first stage could also further comprise the step of, if the candidate object is determined to be a person, performing facial recognition and even behavioural analysis on that person and comparing determined attributes to a database of known individuals of interest. Such video analysis can be performed by deep learning algorithms and neural networks.
[0094] Features such as image segmentation of the candidate object, along with pose estimation may also be employed to provide the classification algorithms with contextual awareness. The purpose of this being to augment information regarding the body context of the radar beam to amend the threat classification appropriately. If the radar beam is directed at an area of the candidate known to produce a challenging environment for a given classification library, for example belts and zips are known to risk producing false positives in some classification libraries, the algorithm may instead switch to a more appropriate classification library.
[0095] In a second stage, the position of the identified candidate object/person is used in a coordinate transform as described above to calculate the change in pointing direction of the threat object detection apparatus required to direct radiation towards the candidate object/person. For example, a pan/tilt/zoom for the system may be determined. Alternatively, a rotation of a gimbal-mounted system may be calculated.
[0096] In a third stage, the identified candidate object/person may be scanned partially or completely by the threat object detection system in order to classify the candidate object as a threat or a non-threat. This may comprise, for example, oscillating or “nodding” the pointing direction of the radiation emitted by the threat object detection system back and forth over the candidate object/person to wholly or partially scan them and determine whether the candidate object is an object of interest. This is illustrated in
[0097] In some embodiments, reinforcement learning algorithms may be employed by the controller to, rather than causing the radiation to be directed over objects using a simple nodding movement, use a scanning pattern based on the perceived shape of the candidate object to ensure the entire profile of the candidate object is screened prior to threat evaluation. Such optimised scanning procedures ensure that individuals and items are not marked as non-threats if parts of their profile have not yet been scanned for concealed threat objects.
[0098] In other embodiments, scanning may comprise adjusting the direction of the radiation beam using the rotatable mirror 119 described above in relation to
[0099] Furthermore, unlike conventional wide beamwidth detectors, which may also be able to rapidly scan clusters of candidate objects, the approach of the present disclosure of assigning a unique ID to each identified object and associating threat/non-threat classifications with those objects once screened enables candidate objects of interest from within the cluster to be resolved and tracked even if the cluster disperses. For example, a person of interest may be identified in a crowd and followed subsequent to parting with the crowd.
[0100] In some embodiments, if the candidate object is determined to be a threat or an object of interest, the system may further be configured to use the unique ID assigned to the object during the identification stage to track and monitor the object of interest using the sensor component, while at the same time continuing to identify and scan new candidate objects as described above.
[0101] Metrics representing candidate object positions are determined for each camera. With sufficient cameras present to cover all reasonable viewpoints (which may include directly above), it is possible to augment these data to overcome problems with occlusions, missing detections, false detections (which may appear from one viewpoint, but not from others) and other limitations.
[0102] Furthermore, to account for the possibility of missed detections in frames in the tracking method, caused either by occlusion or by another algorithm limitation, the use of an Extended Kalman Filter, a particle filter, or other machine learning based tracking filter may be helpful, especially since it is unlikely that the physical environment in which the system is deployed will permit comprehensive, un-occluded oversight of the scene. Such techniques allow for candidate objects to continue to be tracked in the absence of sensed data, and may take place for each camera, and/or may also take place at the higher level within the 3D reconstruction.
[0103] In some embodiments, if a candidate object is determined not to be a threat, that object may have a non-threat classification associated with their unique ID to avoid screening the same object twice, at this point the system may cease to track them.
[0104] Although example tracking policies are described herein, it will be appreciated that the threat detection system of the present invention is configurable, and in particular that the tracking policy of the system may be configured to track or not track objects according to user requirements.
[0105] In some embodiments, the integration of the sensor component and the threat object detection system enables autonomous identification and scanning candidate objects and subsequent autonomous tracking of those objects determined to be objects of interest.
[0106] In some embodiments, the sensor component may be housed in a nearby but different location to the threat object detection system. Beneficially, such a configuration may enable occlusions of target objects to be resolved, by having the candidate object always in view of at least one of the sensor component and the threat object detection apparatus.
[0107] It will further be appreciated by those skilled in the art that although the invention has been described by way of example with reference to several embodiments. It is not limited to the disclosed embodiments and that alternative embodiments could be constructed without departing from the scope of the invention as defined in the appended claims.