System and method for identifying objects of interest in image data
First Claim
1. A method of identifying a threat object of interest in X-ray image data, comprising:
- receiving the X-ray image data; and
applying at least one bifurcation transform to the X-ray image data to effect divergence of the threat object of interest from other objects.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for identifying objects of interest in image data is provided. The present invention utilizes principles of dynamic discontinuity in which objects in images, when subjected to special transformations, will exhibit radically different responses based on the chemical properties of the imaged objects. Using the system and methods of the present invention, certain objects that appear indistinguishable from other objects to the eye or computer recognition systems, or are otherwise statistically identical, generate radically different and statistically significant differences that can be easily measured.
-
Citations
23 Claims
-
1. A method of identifying a threat object of interest in X-ray image data, comprising:
-
receiving the X-ray image data; and
applying at least one bifurcation transform to the X-ray image data to effect divergence of the threat object of interest from other objects. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An apparatus configured to identify a threat object of interest in X-ray image data, comprising:
-
an input device configured to receive the X-ray image data; and
an image transformation recognition system configured to apply at least one bifurcation transform to the X-ray image data to effect divergence of the threat object of interest from other objects.
-
-
21. A method of creating a bifurcation transform for a class of threat objects, comprising:
-
selecting a point operation;
performing said point operation on a subset of images, wherein said subset of images includes at least one image containing an object in said class of threat objects; and
repeating said selecting and said performing steps until said point operation bifurcates said object. - View Dependent Claims (22, 23)
-
Specification