{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:40:34Z","timestamp":1765546834157,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030891305"},{"type":"electronic","value":"9783030891312"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-89131-2_7","type":"book-chapter","created":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T06:18:05Z","timestamp":1635574685000},"page":"75-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Method for Adaptive Material Classification and Pseudo-Coloring of the Baggage X-Ray Images"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1464-5822","authenticated-orcid":false,"given":"Krzysztof","family":"Dmitruk","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2491-091X","authenticated-orcid":false,"given":"Marcin","family":"Denkowski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2704-5025","authenticated-orcid":false,"given":"Pawe\u0142","family":"Miko\u0142ajczak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1542-6747","authenticated-orcid":false,"given":"Emil","family":"Benedykciuk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,31]]},"reference":[{"key":"7_CR1","unstructured":"Ak\u00e7ay, S., Breckon, T.P.: Towards automatic threat detection: a survey of advances of deep learning within x-ray security imaging. CoRR abs\/2001.01293 (2020)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Alvarez, R., Macovski, A.: Energy-selective reconstructions in x-ray computerized tomography. Phys. Med. Biol. 21, 733\u2013744 (1976)","DOI":"10.1088\/0031-9155\/21\/5\/002"},{"key":"7_CR3","first-page":"21","volume":"6","author":"J Andrews","year":"2016","unstructured":"Andrews, J., Morton, E., Griffin, L.: Detecting anomalous data using auto-encoders. Int. J. Mach. Learn. Comput. 6, 21 (2016)","journal-title":"Int. J. Mach. Learn. Comput."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Benedykciuk, E., Denkowski, M., Dmitruk, K.: Learning-based material classification in x-ray security images. In: Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 4: VISAPP, pp. 284\u2013291. INSTICC, SciTePress (2020)","DOI":"10.5220\/0008951702840291"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Benedykciuk, E., Denkowski, M., Dmitruk, K.: Material classification in x-ray images based on multi-scale CNN. Signal Image Video Process. 1\u20139 (2021)","DOI":"10.1007\/s11760-021-01859-9"},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1088\/0031-9155\/33\/4\/005","volume":"33","author":"KS Chuang","year":"1988","unstructured":"Chuang, K.S., Huang, H.K.: Comparison of four dual energy image decomposition methods. Phys. Med. Biol. 33(4), 455\u2013466 (1988)","journal-title":"Phys. Med. Biol."},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1515\/eletel-2016-0006","volume":"62","author":"K Dmitruk","year":"2016","unstructured":"Dmitruk, K., Mazur, M., Denkowski, M., Miko\u0142ajczak, P.: Method for filling and sharpening false colour layers of dual energy x-ray images. Int. J. Electron. Telecommun. 62(1), 49\u201354 (2016)","journal-title":"Int. J. Electron. Telecommun."},{"issue":"4","key":"7_CR8","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s11760-016-1001-7","volume":"11","author":"K Dmitruk","year":"2018","unstructured":"Dmitruk, K., Denkowski, M., Mazur, M., Miko\u0142ajczak, P.: Sharpening filter for false color imaging of dual-energy x-ray scans. SIViP 11(4), 613\u2013620 (2018)","journal-title":"SIViP"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1016\/j.patcog.2013.02.008","volume":"46","author":"G Flitton","year":"2013","unstructured":"Flitton, G., Breckon, T., Megherbi, N.: A comparison of 3D interest point descriptors with application to airport baggage object detection in complex CT imagery. Pattern Recogn. 46, 2420\u20132436 (2013)","journal-title":"Pattern Recogn."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Hassan, T., Werghi, N.: Trainable structure tensors for autonomous baggage threat detection under extreme occlusion. In: Proceedings of the Asian Conference on Computer Vision (ACCV), November 2020","DOI":"10.1007\/978-3-030-69544-6_16"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"323","DOI":"10.3233\/XST-16199","volume":"25","author":"N Jaccard","year":"2017","unstructured":"Jaccard, N., Rogers, T., Morton, E., Griffin, L.: Detection of concealed cars in complex cargo x-ray imagery using deep learning. J. X-Ray Sci. Technol. 25, 323\u2013339 (2017)","journal-title":"J. X-Ray Sci. Technol."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Kalender, W.A., Perman, W.H., Vetter, J.R., Klotz, E.: Evaluation of a prototype dual-energy computed tomographic apparatus. i. phantom studies. Med. Phys. 13(3), 334\u2013339 (1986)","DOI":"10.1118\/1.595958"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Kim, S., Lee, J., Ko, B., Nam, J.: X-ray image classification using random forests with local binary patterns. In: 2010 International Conference on Machine Learning and Cybernetics, vol. 6, pp. 3190\u20133194, July 2010","DOI":"10.1109\/ICMLC.2010.5580711"},{"issue":"4","key":"7_CR14","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/s10278-006-1052-3","volume":"20","author":"T Kimpe","year":"2006","unstructured":"Kimpe, T., Tuytschaever, T.: Increasing the number of gray shades in medical display system-how much is enough? J. Digit. Imaging 20(4), 422\u201332 (2006)","journal-title":"J. Digit. Imaging"},{"key":"7_CR15","unstructured":"Kolkoori, S., Wrobel, N., Deresch, A., Redmer, B., Ewert, U.: Dual high-energy x-ray digital radiography for material discrimination in cargo containers. In: 11th European Conference on Non-Destructive Testing (ECNDT 2014), Prague 2014, 6\u201311 October 2014 (2014)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Kundegorski, M., Akcay, S., Devereux, M., Mouton, A., Breckon, T.: On using feature descriptors as visual words for object detection within x-ray baggage security screening. In: 7th International Conference on Imaging for Crime Detection and Prevention (ICDP 2016), p. 6 (2016)","DOI":"10.1049\/ic.2016.0080"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1007\/s11548-019-01933-1","volume":"14","author":"S Mehta","year":"2019","unstructured":"Mehta, S., Sebro, R.: Random forest classifiers aid in the detection of incidental osteoblastic osseous metastases in dexa studies. Int. J. Comput. Assisted Radiol. Surg. 14, 903\u2013909 (2019)","journal-title":"Int. J. Comput. Assisted Radiol. Surg."},{"key":"7_CR18","unstructured":"Noa, A.G., Reyes, E.B.G.: Image processing methods for x-ray luggage images: a survey (2011)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Rebuffel, V., Dinten, J.M.: Dual-energy x-ray imaging: benefits and limits. Insight: Non-Destr. Test. Cond. Monit. 49, 589\u2013594 (2007)","DOI":"10.1784\/insi.2007.49.10.589"},{"key":"7_CR20","first-page":"187","volume":"2","author":"M Roomi","year":"2012","unstructured":"Roomi, M.: Detection of concealed weapons in x-ray images using fuzzy K-NN. Int. J. Comput. Sci. Eng. Inf. Technol. 2, 187\u2013196 (2012)","journal-title":"Int. J. Comput. Sci. Eng. Inf. Technol."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Wei, Y., Tao, R., Wu, Z., Ma, Y., Zhang, L., Liu, X.: Occluded prohibited items detection: an x-ray security inspection benchmark and de-occlusion attention module. In: Proceedings of the 28th ACM International Conference on Multimedia, MM 2020, pp. 138\u2013146. Association for Computing Machinery, New York (2020)","DOI":"10.1145\/3394171.3413828"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"86536","DOI":"10.1109\/ACCESS.2020.2992861","volume":"8","author":"Y Zhu","year":"2020","unstructured":"Zhu, Y., Zhang, Y., Zhang, H., Yang, J., Zhao, Z.: Data augmentation of x-ray images in baggage inspection based on generative adversarial networks. IEEE Access 8, 86536\u201386544 (2020)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Computer Analysis of Images and Patterns"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-89131-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T03:21:32Z","timestamp":1726024892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-89131-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030891305","9783030891312"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-89131-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"31 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Analysis of Images and Patterns","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caip2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cyprusconferences.org\/caip2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyAcademia","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"129","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}