> 
 > 
Subscription Review Article

International Journal of Mobile Computing Technology

by 
   Muhammad Nadeem,    Ayesha,    Jahanzaib Ali Khan,    Waqas Ahmad,    Syeda Wajiha Zahra,    Ali Arshad,    Saman Riaz,    Usman Shahid,
Volume :  01 | Issue :  01 | Received :  June 1, 2023 | Accepted :  June 2, 2023 | Published :  July 20, 2023
DOI :  10.37591/IJMCT

[This article belongs to International Journal of Mobile Computing Technology(ijmct)]

Keywords

LTDP, LBP, baggage detection, pattern-based image retrieval algorithms, baggage detection

Abstract

Nowadays, pattern-based image retrieval algorithms are gaining popularity just because of their uniqueness. There are several issues in the previously proposed systems. The proposed system resolves issues highlighted in the literature. Our proposed system is tested on two image datasets ILIDS and PETS 2006. LTDP provides good results as compared to LBP in baggage detection on two classes that either bag is present or not in an image because LTDP works on finding the difference between adjacent neighbors and magnitude pattern which is either 0 or 1 which means either bag is present or not. In addition to LTDP patterns, HOG transformation has also been used for better feature extraction results. The results obtained through ANN are 90% whereas SVM depicts 50% accuracy and through classification learner, 75% accuracy is obtained.

Full Text

References

1. T. Khanam and K. Deb, “Baggage Recognition in Occluded Environment using Boosting Technique,” TIIS, vol. 11, pp. 5436-5458, 2017.
2. T. Khanam and K. Deb, “Human and carried baggage detection & classification based on RSD-HOG in video frame,” in 2016 9th International Conference on Electrical and Computer Engineering (ICECE), 2016, pp. 415-418.
3. K. Leone and R. R. Liu, “The key design parameters of checked baggage security screening systems in airports,” Journal of Air Transport Management, vol. 11, pp. 69-78, 2005.
4. Nadeem, Muhammad & Arshad, Ali & Riaz, Saman & Zahra, Syedawajiha & Rashid, Muhammad & S. Band, Shahab & Mosavi, Amir. (2022). Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN. 74. 2641-2659. 10.32604/cmc.2023.028796. K. Smith, P. Quelhas, and D. Gatica-Perez, “Detecting abandoned luggage items in a public space,” in IEEE Performance
Evaluation of Tracking and Surveillance Workshop (PETS), 2006, pp. 75-82.
5. J.-Y. Chang, H.-H. Liao, and L.-G. Chen, “Localized detection of abandoned luggage,” EURASIP Journal on Advances in Signal Processing, vol. 2010, p. 675784, 2010.
6. G. Tzanidou, I. Zafar, and E. A. Edirisinghe, “Carried object detection in videos using color information,” IEEE Transactions on Information Forensics and Security, vol. 8, pp. 1620-1631, 2013.
7. C. Beleznai, P. Gemeiner, and C. Zinner, “Reliable left luggage detection using stereo depth and intensity cues,” in Proceedings of the IEEE International Conference on Computer Vision Workshops, 2013, pp. 59-66.
8. K. Lin, S.-C. Chen, C.-S. Chen, D.-T. Lin, and Y.-P. Hung, “Left-luggage detection from finite-state-machine analysis in static-camera videos,” in 2014 22nd International Conference on Pattern Recognition, 2014, pp. 4600-4605.
9. Zahra, S.W., Arshad, A., Nadeem, M., Riaz, S., Dutta, A.K., Alzaid, Z., Alabdan, R., Almutairi, B. and Almotairi, S. (2022). Development of Security Rules and Mechanisms to Protect Data from Assaults. Applied Sciences, [online] 12(24), p.12578. doi:10.3390/app122412578.
10. Wahyono, Jo KH. Detecting and recognizing LED dot matrix text in natural scene images. InEmerging Intelligent Computing Technology and Applications: 9th International Conference, ICIC 2013, Nanning, China, July 28-31, 2013. Proceedings 9 2013 (pp. 153-158). Springer Berlin Heidelberg.
11. M. Johnstone, D. Creighton, and S. Nahavandi, “Simulation-based baggage handling system merge analysis,” Simulation Modelling Practice and Theory, vol. 53, pp. 45-59, 2015.
12. Nadeem, Muhammad & Arshad, Ali & Riaz, Saman & Zahra, Syeda & Dutta, Ashit & Alaybani, Sultan. (2022). Preventing the Cloud Networks through Semi-Supervised Clustering from Both Sides Attacks. Applied Sciences. 12. 1-19. 10.3390/app12157701.
13. K.-H. Jo, “Carried baggage detection and classification using part-based model,” in International Conference on Intelligent Computing, 2015, pp. 289-296.
14. G. Szwoch, “Extraction of stable foreground image regions for unattended luggage detection,” Multimedia Tools and Applications, vol. 75, pp. 761-786, 2016.
15. N. Hättenschwiler, Y. Sterchi, M. Mendes, and A. Schwaninger, “Automation in airport security X-ray screening of cabin baggage: Examining benefits and possible implementations of automated explosives detection,” Applied ergonomics, vol. 72, pp. 58-68, 2018.
16. C. Wang, J. Liu, Y. Chen, H. Liu, and Y. Wang, “Towards In-baggage Suspicious Object Detection Using Commodity WiFi,” in 2018 IEEE Conference on Communications and Network Security (CNS), 2018, pp. 1-9.
17. S. Smeureanu and R. T. Ionescu, “Real-time deep learning method for abandoned luggage detection in video,” in 2018 26th European Signal Processing Conference (EUSIPCO), 2018, pp. 1775-1779.
18. Nadeem, Muhammad & Arshad, Ali & Riaz, Saman & S. Band, Shahab & Mosavi, Amir. (2021). Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. IEEE Access. PP. 1-1. 10.1109/ACCESS.2021.3126535.