A Contraband Detection Scheme in X-ray Security Images Based on Improved YOLOv8s Network Model
<p>The network structure of the SRGAN generator.</p> "> Figure 2
<p>The network structure of the SRGAN discriminator.</p> "> Figure 3
<p>The super-resolution reconstruction training procedure.</p> "> Figure 4
<p>The network structure of YOLOv8s model.</p> "> Figure 5
<p>The schematic diagram of SPPF module, bottleneck module, CspLayer module, and C2f module. (<b>a</b>) SPPF module; (<b>b</b>) bottleneck module; (<b>c</b>) CspLayer module; (<b>d</b>) C2f module.</p> "> Figure 6
<p>The structure diagram of the EMA attention mechanism.</p> "> Figure 7
<p>Illustration of 3 × 3 deformable convolution net v2.</p> "> Figure 8
<p>The network structure of the YOLOv8s-DCN-EMA model.</p> "> Figure 9
<p>The flow chart of optimization of learning rate based on improved pigeon-inspired optimization algorithm.</p> "> Figure 10
<p>The comparative experiment of detection accuracy of YOLOv8s and other improved models on all kinds of contraband. (<b>a</b>) YOLOv8s, (<b>b</b>) YOLOv8s-EMA, (<b>c</b>) YOLOv8s-DCN, (<b>d</b>) YOLOv8s-DCN-EMA.</p> "> Figure 11
<p>Samples of eight types of contraband and corresponding X-ray scan images and enhanced X-ray scan images.</p> "> Figure 12
<p>The comparative experiment of detection accuracy of YOLOv8s and other improved models based on SRGAN and data enhancement of all kinds of contraband. (<b>a</b>) YOLOv8s*, (<b>b</b>) YOLOv8s-EMA*, (<b>c</b>) YOLOv8s-DCN*, (<b>d</b>) YOLOv8s-DCN-EMA*.</p> "> Figure 12 Cont.
<p>The comparative experiment of detection accuracy of YOLOv8s and other improved models based on SRGAN and data enhancement of all kinds of contraband. (<b>a</b>) YOLOv8s*, (<b>b</b>) YOLOv8s-EMA*, (<b>c</b>) YOLOv8s-DCN*, (<b>d</b>) YOLOv8s-DCN-EMA*.</p> "> Figure 13
<p>Evolution and optimization of improved pigeon-inspired optimization. (<b>a</b>) Outer-cycle evolution curve, (<b>b</b>) Optimization process.</p> "> Figure 14
<p>The YOLOv8s-DCN-EMA-IPIO* detection model and the YOLOv8s-DCN-EMA* detection model are compared experimentally in this diagram. (<b>a</b>) YOLOv8s-DCN-EMA*, (<b>b</b>) YOLOv8s-DCN-EMA-IPIO*.</p> ">
Abstract
:1. Introduction
- (1)
- The data enhancement of the X-ray security inspection data set and the introduction of SRGAN super-resolution reconstruction technology can improve the resolution and brightness of the original image, make the appearance and shape of the items to be inspected in the picture more precise and have more information, which is conducive to the feature extraction operation of the model.
- (2)
- To enhance the feature extraction network and improve the ability of the model to detect contraband on different scales, DCNv2 (deformable convolution net v2) is introduced into the backbone network. An EMA (efficient multi-scale attention) module is proposed to implement the adaptive calibration of feature map channels, thereby improving the model’s attention to the target region and improving the reduction in complicated background interference and the overlapping occlusion issue.
- (3)
- A pigeon colony algorithm based on a cross-mutation approach is developed to improve the learning rate parameters in the model’s hyperparameters by mimicking the behavioral traits of flock homing. The algorithm’s features include a broad search range and quick response time. The model’s initial learning rate is generated by the improved pigeon-inspired optimization, and the mAP index serves as the fitness function. Continuous iteration is applied to obtain the optimal learning rate, which is then translated into a corresponding mAP value that improves target detection accuracy.
2. Materials and Methods
2.1. Data Enhancement
2.2. The Design of the YOLOv8s-DCN-EMA Model to Optimize the Detection Accuracy of Contraband
2.2.1. The YOLOv8s Network Structure
2.2.2. The EMA Attention Mechanism
2.2.3. The Design of Deformable Convolution Net v2 Module
2.3. The Pigeon-Inspired Optimization (PIO) Design Based on Cross-Mutation Operator to Optimize Learning Rate
2.3.1. The Basic Theory of the PIO Algorithm
2.3.2. Improved Strategy Based on Cross-Mutation Operator
2.3.3. Improved PIO Algorithm
Algorithm 1 Improved pigeon-inspired optimization |
Step 1: Set the flock parameters and initialize the flock, such as population number , search dimension space , compass operator , map and compass operator’s maximum quantity of iterations , maximum amount of iterations for a landmark operator , maximum number of iterations . |
Step 2: Determine the current ideal position by assigning each pigeon a random speed and position, then figuring out each one’s fitness value. |
Step 3: The population was crossed and mutated, and the pigeons’ positions were updated using the upgraded compass operator. |
Step 4: Compute the relevant fitness value, and then use the fitness value comparison to update the current global optimal location. |
Step 5: Verify if the compass operator’s maximum number of iterations has been reached. If yes, continue. Otherwise, go back to Step 3. |
Step 6: The population’s center location is calculated, then the population is mutated and crossed, and the enhanced landmark operator is utilized to update the pigeons’ location. |
Step 7: Calculate the corresponding fitness value, and then compare it to the current global ideal position. |
Step 8: Replenishing the population. Step 9: Check whether the maximum quantity of iterations of the landmark operator is reached. If yes, the global optimal solution is displayed. Otherwise, go back to Step 6. |
3. Results and Discussion
3.1. YOLOv8s Detection Model Test Experiment Based on DCNv2 Deformable Convolution and EMA Attention Mechanism Optimization
3.1.1. Dataset Construction and Experimental Environment Configuration
3.1.2. Experimental Evaluation Indexes
- (1)
- Precision
- (2)
- Recall rate
- (3)
- Balanced score (F1 Score)
- (4)
- Average precision (AP)
- (5)
- Mean average precision (mAP)
3.1.3. Experimental Results
3.2. Test Experiment of Detection Model Based on Data Enhancement
3.3. Detection Model Test Experiment Based on an Improved Pigeon-Inspired Algorithm to Optimize Model Learning Rate
3.4. Ablation Study and Analysis
3.5. Comparative Experiment of Performance of Different Models
3.6. The Comparison Results with Related Strategies
3.7. Validation of the Generalization Ability of the Model
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- European Parliament. Aviation Security with a Special Focus on Security Scanners. European Parliament Resolution of 6 July 2011 on Aviation Security, with a Special Focus on Security Scanners (2010/2154(INI)). 2012; pp. 1–10. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52011IP0329&rid=1 (accessed on 6 February 2024).
- Mery, D.; Svec, E.; Arias, M.; Riffo, V.; Saavedra, J.M.; Banerjee, S. Modern Computer Vision Techniques for X-Ray Testing in Baggage Inspection. IEEE Trans. Syst. Man Cybern. Syst. 2017, 47, 682–692. [Google Scholar] [CrossRef]
- Schwaninger, A.; Bolfing, A.; Halbherr, T.; Helman, S.; Belyavin, A.; Hay, L. The impact of image based factors and training on threat detection performance in X-ray screening. In Proceedings of the 3rd International Conference on Research in Air Transportation, ICRAT 2008, Fairfax, VA, USA, 1–4 June 2008; pp. 317–324. [Google Scholar]
- Blalock, G.; Kadiyali, V.; Simon, D.H. The impact of post-9/11 airport security measures on the demand for air travel. J. LawEcon. 2007, 50, 731–755. [Google Scholar] [CrossRef]
- Hou, Y. Research on the Relationship between Work-Stress and Safety Performance of Airport Security Inspectors. Master’s Thesis, Beijing Jiaotong University, Beijing, China, 2018. (In Chinese). [Google Scholar]
- Michel, S.; Koller, S.M.; de Ruiter, J.C.; Moerland, R.; Hogervorst, M.; Schwaninger, A. Computer-based training increases efficiency in X-ray image interpretation by aviation security screeners. In Proceedings of the 2007 41st Annual IEEE International Carnahan Conference on Security Technology, Ottawa, ON, Canada, 8–11 October 2007; pp. 201–206. [Google Scholar]
- Wu, Y.; Zhao, X.; Jin, Y.; Zhang, X. Application of edge detection operator in extracting golden region of image. Beijing Inst. Print. Technol. J. 2013, 21, 34–37. (In Chinese) [Google Scholar]
- Mei, H. Research and Application of Contour Extraction Method for Moving Objects in Surveillance Video. Master’s Thesis, Central China Normal University, Wuhan, China, 2015. (In Chinese). [Google Scholar]
- Su, B.; Chen, J.; Chen, Y. X-ray Image Contraband Classification Method Based on Joint Feature. Digit. Technol. Appl. 2019, 37, 76–77. (In Chinese) [Google Scholar]
- Wang, Y.; Zhou, W.H.; Yang, X.M.; Jiang, W.; Wu, W. Classification of foreign bodies in X-ray images based on computer vision. Chin. J. Liq. Cryst. Disp. 2017, 32, 287–293. (In Chinese) [Google Scholar] [CrossRef]
- Han, P.; Liu, Z.; He, W. An effective two-stage enhancement method for Airport Security X-ray carry-on image. Photoelectronics 2011, 38, 99–105. [Google Scholar]
- Krizhevsky, A.; Sutskever, I.; Hinton, G.E. ImageNet Classification with Deep Convolutional Neural Networks. In Proceedings of the Advances in Neural Information Processing Systems, Lake Tahoe, NV, USA, 3–6 December 2012; pp. 1097–1105. [Google Scholar]
- Szegedy, C.; Ioffe, S.; Vanhoucke, V.; Alemi, A.A. Inception-v4, inception-ResNet and the impact of residual connections on learning. In Proceedings of the AAAI Conference on Artificial Intelligence, San Francisco, CA, USA, 4–9 February 2017; pp. 4278–4284. [Google Scholar]
- Zhu, Y.; Newsam, S. DenseNet for dense flow. In Proceedings of the 2017 IEEE International Conference on Image Processing (ICIP), Beijing, China, 17–20 September 2017; pp. 790–794. [Google Scholar]
- Bastan, M.; Yousefifi, M.R.; Thomas, M.B. Visual words on baggage X-ray images. In International Conference on Computer Analysis of Images and Patterns; Springer: Berlin/Heidelberg, Germany, 2011; pp. 360–368. [Google Scholar]
- Jongseo, P.; Minjoo, C. A k-means Clustering Algorithm to Determine Representative Operational Profiles of a Ship Using AIS Data. J. Mar. Sci. Eng. 2022, 10, 1245. [Google Scholar]
- Esteve, M.; Aparicio, J.; Rodriguez-Sala, J.J.; Zhu, J. Random Forests and the measurement of super efficiency in the context of Free Disposal Hull. Eur. J. Oper. Res. 2023, 304, 729–744. [Google Scholar] [CrossRef]
- Hearst, M.A.; Dumais, S.T.; Osuna, E.; Platt, J.; Scholkopf, B. Support vector machines. IEEE Intell. Syst. Appl. 1998, 13, 18–28. [Google Scholar] [CrossRef]
- Mery, D.; Svec, E.; Arias, M. Object recognition in baggage inspection using adaptive sparse representations of X-ray images. In Proceedings of the PSIVT 2015: Image and Video Technology, Auckland, New Zealand, 25–27 November 2015; Springer: Cham, Switzerland, 2016; pp. 709–720. [Google Scholar]
- Mery, D.; Riffo, V.; Zuccar, I.; Pieringer, C. Automated X-ray object recognition using an efficient search algorithm in multiple views. In Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, Portland, OR, USA, 23–28 June 2013; pp. 368–374. [Google Scholar]
- Mery, D.; Mondragon, G.; Riffo, V.; Zuccar, I. Detection of regular objects in baggage using multiple X-ray views. Insight-Non-Destr. Test. Cond. Monit. 2013, 55, 16–20. [Google Scholar] [CrossRef]
- Wu, H.-B.; Wei, X.-Y.; Liu, M.-H.; Wang, A.-L.; Liu, H.; Iwahori, Y. Improved YOLOv4 for dangerous goods detection in X-ray inspection combined with atrous convolution and transfer learning. Chin. Opt. 2021, 14, 1417–1425. (In Chinese) [Google Scholar]
- Dong, Y.; Li, Z.; Guo, J.; Chen, T.; Lu, S. An improved YOLOv5 model for X-ray prohibited items detection. Laster Optoelectron. Prog. 2023, 60, 0415005. [Google Scholar]
- Liu, W.; Anguelov, D.; Erhan, D.; Szegedy, C.; Reed, S.; Fu, C.-Y.; Berg, A.C. SSD: Single shot multibox detector. In European Conference on Computer Vision; Springer: Cham, Switzerland; Amsterdam, The Netherlands, 2016; pp. 21–37. [Google Scholar]
- Zhang, Y.K.; Su, Z.G.; Zhang, H.G.; Yang, J.F. Multi-scale Prohibited Item Detection in X-ray Security Image. J. Signal Process. 2020, 36, 1096–1106. [Google Scholar]
- Guo, S.; Zhang, L. Yolo-C: One-stage network for prohibited items detection within X-ray images. Laser Optoelectron. Prog. 2021, 58, 0810003. (In Chinese) [Google Scholar]
- Ren, S.; He, K.; Girshick, R.; Sun, J. Faster R-CNN: Towards real-time object detection with region proposal networks. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 7–12 December 2015; pp. 91–99. [Google Scholar]
- Lin, T.-Y.; Dollár, P.; Girshick, R.; He, K.; Hariharan, B.; Belongie, S. Feature pyramid networks for object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA, 21–26 July 2017; pp. 2117–2125. [Google Scholar]
- Gao, R.; Sun, Z.; Huyan, J.; Li, W.; Xiao, L.; Yao, B.; Wang, H. Small Foreign Metal Objects Detection in X-Ray Images of Clothing Products Using Faster R-CNN and Feature Pyramid Network. IEEE Trans. Instrum. Meas. 2021, 70, 99. [Google Scholar] [CrossRef]
- Wei, Y.; Tao, R.; Wu, Z.; Ma, Y.; Zhang, L.; Liu, X. Occluded prohibited items detection: An X-ray security inspection benchmark and de-occlusion attention module. In Proceedings of the 28th ACM International Conference on Multimedia, Seattle, WA, USA, 12–16 October 2020; pp. 138–146. [Google Scholar]
- Zhang, N.; Luo, Y.; Bao, X.; Jin, Y.; Tu, X. X-ray Security Inspection for Contraband Detection Based on Improved Cascade RCNN Network. Comput. Syst. Appl. 2022, 31, 224–230. (In Chinese) [Google Scholar]
- You, X.; Hou, J.; Ren, D.; Yang, P.; Du, M. Adaptive Security Check Prohibited Items Detection Method with Fused Spatial Attention. Comput. Eng. Appl. 2023, 59, 176–186. (In Chinese) [Google Scholar]
- Wang, Z.; Xu, H.; Zhu, X.; Li, S.; Liu, Z.; Wang, Z. Improved Dense pedestrian detection algorithm based on YOLOv8: MER-YOLO. Comput. Eng. Sci. 2023, 43, 1–17. (In Chinese) [Google Scholar] [CrossRef]
- Gao, A.; Liang, X.; Xia, C.; Zhang, C. An Improved YOLOv8 Dense pedestrian detection algorithm. J. Graph. 2023, 44, 890–898. [Google Scholar]
- Li, S.; Shi, T.; Jing, F. Improved Road damage detection algorithm of YOLOv8. Comput. Eng. Appl. 2023, 59, 165–174. (In Chinese) [Google Scholar]
- Leng, R. Application of Foreign Objects Identification of Transmission Lines Based on YOLOv8 Algorithm. Master’s Thesis, Northeast Forestry University, Harbin, China, 2023. (In Chinese). [Google Scholar]
- Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.; Bengio, Y. Generative adversarial networks. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 8–13 December 2014; p. 27. [Google Scholar]
- Ledig, C.; Theis, L.; Huszar, F.; Caballero, J.; Cunningham, A.; Acosta, A.; Aitken, A.; Tejani, A.; Totz, J.; Wang, Z.; et al. Photo-realistic single image super-resolution using a generative adversarial network. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA, 21–26 July 2017; pp. 4681–4690. [Google Scholar]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778. [Google Scholar]
- Redmon, J.; Divvala, S.; Girshick, R.; Farhadi, A. You Only Look Once: Unified, Real-Time Object Detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 779–788. [Google Scholar]
- Redmon, J.; Farhadi, A. YOLO9000: Better, Faster, Stronger. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA, 21–26 July 2017; pp. 7263–7271. [Google Scholar]
- Redmon, J.; Farhadi, A. YOLOv3: An Incremental Improvement. arXiv 2018, arXiv:1804.02767. [Google Scholar]
- Bochkovskiy, A.; Wang, C.Y.; Liao, H.Y.M. YOLOv4: Optimal Speed and Accuracy of Object Detect-ion. arXiv 2020, arXiv:2004.10934. [Google Scholar]
- Wang, C.Y.; Bochkovskiy, A.; Liao, H.Y.M. YOLOv7: Trainable bag-of-freebies sets new state-of-the-art for real-time object detectors. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Vancouver, BC, Canada, 18–22 June 2023; pp. 7464–7475. [Google Scholar]
- Ouyang, D.; He, S.; Zhang, G.; Luo, M. Efficient Multi-Scale Attention Module with Cross-Spatial Learning. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece, 4–10 June 2023; pp. 1–5. [Google Scholar]
- Woo, S.; Park, J.; Lee, J.Y.; Kweon, I.S. CBAM: Convolutional block attention module. In Proceedings of the European Conference on Computer Vision (ECCV), Munich, Germany, 8–14 September 2018; pp. 3–19. [Google Scholar]
- Hu, J.; Shen, L.; Sun, G. Squeeze-and-Excitation Networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–23 June 2018; pp. 7132–7141. [Google Scholar]
- Hou, Q.; Zhou, D.; Feng, J. Coordinate Attention for Efficient Mobile Network Design. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA, 20–25 June 2021. [Google Scholar]
- Wang, Q.; Wu, B.; Zhu, P.; Li, P.; Zuo, W.; Hu, Q. ECA-Net: Efficient Channel Attention for Deep Convolutional Neural Networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 13–19 June 2020. [Google Scholar]
- Dai, J.; Qi, H.; Xiong, Y.; Li, Y.; Zhang, G.; Hu, H.; Wei, Y. Deformable convolutional networks. In Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy, 22–29 October 2017; pp. 764–773. [Google Scholar]
- Zhu, X.; Hu, H.; Lin, S.; Dai, J. Deformable convnets v2:more deformable, better results. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA, 15–20 June 2019; pp. 9300–9308. [Google Scholar]
- Duan, H.; Qiao, P. Pigeon-inspired optimization: A new swarm intelligence optimizer for air robot path planning. Int. J. Intell. Comput. Cybern. 2014, 7, 24–37. [Google Scholar] [CrossRef]
- Carion, N.; Massa, F.; Synnaeve, G.; Usunier, N.; Kirillov, A.; Zagoruyko, S. End-to-end object detection with transformers. In Proceedings of the ECCV 2020, Glasgow, UK, 23–28 August 2020. [Google Scholar]
- Lv, W.; Zhao, Y.; Xu, S. DETRs Beat YOLOs on Real-time Object Detection. arXiv 2023, arXiv:2304.08069. [Google Scholar]
- Li, C.; Li, L.; Jiang, H.; Weng, K.; Geng, Y.; Li, L.; Ke, Z.; Li, Q.; Cheng, M.; Nie, W.; et al. YOLOv6: A Single-Stage Object Detection Framework for Industrial Applications. arXiv 2022, arXiv:2209.02976. [Google Scholar]
Model | mAP/% | Categories (AP)/% | |||||||
---|---|---|---|---|---|---|---|---|---|
Computer | Powerbank | Lighter | Scissors | Pressure | Umbrella | Bottle | Knives | ||
Y8n | 62.65 | 94.0 | 51.2 | 41.0 | 45.8 | 68.2 | 87.5 | 63.1 | 50.4 |
Y8nE | 64.95 | 94.2 | 53.9 | 43.6 | 48.7 | 70.9 | 89.8 | 65.7 | 52.8 |
Y8nD | 65.55 | 94.9 | 52.1 | 41.2 | 52.9 | 73.1 | 89.5 | 62.6 | 58.1 |
Y8nDE | 66.06 | 94.7 | 52.8 | 41.4 | 53.9 | 69.8 | 90.5 | 65.8 | 59.6 |
Y8s | 69.45 | 95.5 | 60.6 | 53.5 | 59.4 | 75.0 | 91.5 | 63.7 | 56.4 |
Y8sE | 71.35 | 94.3 | 60.4 | 54.2 | 62.5 | 76.8 | 91.5 | 68.0 | 63.1 |
Y8sD | 71.75 | 94.4 | 62.5 | 54.3 | 65.1 | 78.2 | 92.2 | 67.5 | 59.8 |
Y8sDE | 71.94 | 94.9 | 60.2 | 55.7 | 66.7 | 77.5 | 92.6 | 67.8 | 60.1 |
Model | mAP/% | Categories (AP)/% | |||||||
---|---|---|---|---|---|---|---|---|---|
Computer | Powerbank | Lighter | Scissors | Pressure | Umbrella | Bottle | Knives | ||
Y8n* | 64.68 | 94.5 | 53.5 | 42.8 | 48.1 | 70.5 | 89.6 | 65.9 | 52.5 |
Y8nE* | 66.13 | 94.7 | 53.7 | 43.8 | 51.6 | 72.3 | 89.4 | 65.7 | 57.8 |
Y8nD* | 66.85 | 95.2 | 53.9 | 44.3 | 53.7 | 73.5 | 89.6 | 66.1 | 58.5 |
Y8nDE* | 67.48 | 95.3 | 54.3 | 44.8 | 54.5 | 73.9 | 90.8 | 66.2 | 60.0 |
Y8s* | 70.63 | 95.5 | 62.7 | 53.4 | 61.2 | 77.5 | 92.3 | 62.2 | 60.2 |
Y8sE* | 71.85 | 94.7 | 62.6 | 54.9 | 62.6 | 78.6 | 91.6 | 66.9 | 62.9 |
Y8sD* | 72.24 | 94.6 | 62.9 | 55.3 | 65.7 | 78.4 | 92.4 | 67.8 | 60.8 |
Y8sDE* | 72.66 | 95.1 | 62.2 | 55.6 | 65.9 | 78.6 | 92.5 | 68.3 | 63.1 |
Model | mAP/% | Categories (AP)/% | |||||||
---|---|---|---|---|---|---|---|---|---|
Computer | Powerbank | Lighter | Scissors | Pressure | Umbrella | Bottle | Knives | ||
Y8sDE* | 72.66 | 95.1 | 62.2 | 55.6 | 65.9 | 78.6 | 92.5 | 68.3 | 63.1 |
Y8sDEP* | 73.43 | 95.5 | 62.9 | 56.2 | 67.4 | 79.4 | 93.1 | 69.0 | 63.9 |
YOLOv8s | SRGAN | DCN | EMA | IPIO | Precision | Recall | F1 Score | mAP | mAP (50–95) | FPS |
---|---|---|---|---|---|---|---|---|---|---|
✓ | 71.4% | 65.2% | 68.2% | 69.5% | 47.4% | 123 | ||||
✓ | ✓ | 73.2% | 65.8% | 69.3% | 70.6% | 47.9% | 124 | |||
✓ | ✓ | 75.6% | 64.7% | 69.7% | 71.8% | 48.9% | 96 | |||
✓ | ✓ | 74.1% | 64.4% | 68.9% | 71.4% | 48.8% | 111 | |||
✓ | ✓ | ✓ | 76.4% | 64.8% | 70.1% | 72.2% | 49.5% | 96 | ||
✓ | ✓ | ✓ | 74.8% | 66.5% | 70.4% | 71.9% | 49.3% | 112 | ||
✓ | ✓ | ✓ | 75.3% | 64.9% | 69.9% | 71.9% | 49.0% | 91 | ||
✓ | ✓ | ✓ | ✓ | 77.7% | 66.2% | 71.5% | 72.7% | 50.3% | 92 | |
✓ | ✓ | ✓ | ✓ | ✓ | 78.2% | 67.3% | 72.3% | 73.4% | 50.6% | 95 |
Model | mAP/% | mAP (50–95)/% | Params/M | FLOPs/G | FPS (GPU) |
---|---|---|---|---|---|
Faster RCNN | 64.8 | 43.4 | 137.1 | 370.3 | 54 |
DETR | 70.1 | 44.2 | 41.5 | 100.9 | 56 |
RT-DETR-L | 71.3 | 46.5 | 32.9 | 110.2 | 78 |
YOLOv3-tiny | 63.5 | 41.2 | 12.1 | 19.2 | 238 |
YOLOv5s | 67.8 | 46.8 | 7.1 | 16.7 | 167 |
YOLOv6s-ReLU | 66.1 | 45.9 | 16.3 | 42.8 | 152 |
YOLOv7-tiny | 67.0 | 46.7 | 6.0 | 13.2 | 189 |
YOLOv8n | 62.7 | 41.6 | 3.1 | 8.2 | 255 |
YOLOv8s | 69.5 | 47.4 | 10.9 | 28.4 | 123 |
YOLOv8s-DCN-EMA | 71.9 | 49.0 | 11.5 | 30.6 | 91 |
YOLOv8s-DCN-EMA-IPIO* | 73.4 | 50.6 | 11.5 | 30.6 | 95 |
Model | mAP/% | mAP (50–95)/% | Params/M | FLOPs/G | FPS(GPU) |
---|---|---|---|---|---|
YOLOv8s | 69.5 | 47.4 | 10.9 | 28.4 | 123 |
YOLOv8s + CA | 70.7 | 48.3 | 11.0 | 28.6 | 116 |
YOLOv8s + ECA | 71.1 | 48.4 | 10.9 | 28.5 | 114 |
YOLOv8s + CBAM | 70.9 | 48.1 | 11.1 | 28.6 | 112 |
YOLOv8s + SE | 70.3 | 47.9 | 11.0 | 28.5 | 119 |
YOLOv8s + EMA | 71.4 | 48.8 | 11.2 | 28.9 | 111 |
Model | mAP/% | mAP (50–95)/% | Params/M | FLOPs/G | FPS(GPU) |
---|---|---|---|---|---|
YOLOv8s | 69.5 | 47.4 | 10.9 | 28.4 | 123 |
YOLOv8s + IPIO | 70.4 | 48.0 | 10.9 | 28.4 | 125 |
YOLOv8s + EMA | 71.4 | 48.8 | 11.2 | 28.9 | 111 |
YOLOv8s + EMA + IPIO | 72.3 | 49.3 | 11.2 | 28.9 | 112 |
YOLOv8s + DCN | 71.8 | 48.9 | 11.4 | 29.5 | 96 |
YOLOv8s + DCN + IPIO | 72.6 | 49.4 | 11.4 | 29.5 | 98 |
YOLOv8s + DCN + EMA | 71.9 | 49.0 | 11.5 | 30.6 | 91 |
YOLOv8s + DCN + EMA + IPIO | 72.8 | 49.7 | 11.5 | 30.6 | 93 |
YOLOv8s + DCN + EMA* | 72.7 | 50.3 | 11.5 | 30.6 | 92 |
YOLOv8s + DCN + EMA* + IPIO | 73.4 | 50.6 | 11.5 | 30.6 | 95 |
Model | mAP/% | mAP (50–95)/% | Params/M | FLOPs/G | FPS (GPU) |
---|---|---|---|---|---|
YOLOv8s | 68.7 | 46.2 | 10.9 | 28.4 | 123 |
YOLOv8s-DCN-EMA-IPIO* | 72.8 | 50.1 | 11.5 | 30.6 | 95 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gao, Q.; Deng, H.; Zhang, G. A Contraband Detection Scheme in X-ray Security Images Based on Improved YOLOv8s Network Model. Sensors 2024, 24, 1158. https://doi.org/10.3390/s24041158
Gao Q, Deng H, Zhang G. A Contraband Detection Scheme in X-ray Security Images Based on Improved YOLOv8s Network Model. Sensors. 2024; 24(4):1158. https://doi.org/10.3390/s24041158
Chicago/Turabian StyleGao, Qingji, Haozhi Deng, and Gaowei Zhang. 2024. "A Contraband Detection Scheme in X-ray Security Images Based on Improved YOLOv8s Network Model" Sensors 24, no. 4: 1158. https://doi.org/10.3390/s24041158
APA StyleGao, Q., Deng, H., & Zhang, G. (2024). A Contraband Detection Scheme in X-ray Security Images Based on Improved YOLOv8s Network Model. Sensors, 24(4), 1158. https://doi.org/10.3390/s24041158