IDENTIFICATION OF SOLDIERS AND WEAPONS IN MILITARY ARMORY BASED ON COMPARISON IMAGE PROCESSING AND RFID TAG

Dušan Lj. Bogićević, Ivan A. Tot, Radomir I. Prodanović, Bojan J. Todorović a Serbian Armed Forces, General Staff, Department for Telecommunication and Informatics (Ј-6), Center for C4 and IT support, Belgrade, Republic of Serbia; University of Niš, Faculty of Electronic Engineering, Niš, Republic of Serbia, e-mail: dusan.bogicevic@gmail.com, ORCID iD: http://orcid.org/0000-0002-4300-2490 b University of Defence in Belgrade, Military Academy, Department for information systems and telecommunication engineering, Belgrade, Republic of Serbia, e-mail: ivan.tot@va.mod.gov.rs, corresponding author, ORCID iD: http://orcid.org/0000-0002-5862-9042 c Serbian Armed Forces, General Staff, Department for Telecommunication and Informatics (Ј-6), Center for Applied Mathematics and Electronics, Belgrade, Republic of Serbia, e-mail: radomir.prodanovic@vs.rs, ORCID iD: http://orcid.org/0000-0002-2067-2758 d Serbian Armed Forces, General Staff, Military Police Detachment for Special Purposes "Kobre", Belgrade, Republic of Serbia, e-mail: todorovicbojan@yahoo.com, ORCID iD: https://orcid.org/0000-0002-7028-274X


IDENTIFICATION OF SOLDIERS AND WEAPONS IN MILITARY ARMORY BASED ON COMPARISON IMAGE PROCESSING AND RFID TAG Introduction
The process of issuing and retrieving weapons in the military should be fast enough and should provide immediate availability of accurate information on the weapon status. Manual maintaining records of weapons issuing and returning is slow and error-prone. This approach is inappropriate for a military organization. Therefore, it is necessary to develop a system based on state-of-the-art technologies that will enable rapid and accurate record keeping of the weapon status, as well as information on when the weapon was taken, returned, and who used the weapon.
In (Lien, 2011), the author describes the implementation of active and passive RFID tags in the military to improve accountability and accuracy. The paper cites its price as one of the advantages of a system based on RFID tags. On the other hand, in (Nicholls, 2017), the author describes what would be the advantages and disadvantages of implanting RFID tags in military personnel. The authors in (Chattaraj et al, 2009) see the implementation of RFID tags in traffic control. In terms of authentication of military personnel, in addition to RFID tags that would be embedded in them, biometrics can also be applied. Biometrics can be used for authentication to improve various systems as presented in (Kour et al, 2016), who see the application of biometrics as the key to the future of cyber security.
It is necessary first to identify the weapon which has to be issued or returned. One way to do it is by using a camera as a sensor and the Optical Character Recognition (OCR) technique. Using the OCR, we can extract the text or the serial number of the weapon from the image. Algorithms that allow a text to be read from an image are machine learning algorithms and fall under the domain of Artificial Intelligence (AI). The authors in (Hanmandlu et al, 2017) used an image of a finger knuckle for the personnel authentication.
This paper explores the possibility of improving the process of keeping records of weapons issued and returned. The possibility of identifying weapons and identifying users is being explored. Weapon identification is considered by identifying the serial number by processing the image obtained from the camera as well as processing data from the RFID sensor in the process of weapon identification. User identification is considered through the application of one of the biometric techniques, such as fingerprint identification.
The authors developed an architecture for identifying weapons using RFID technology and identifying weapons users using fingerprint recognition. The architecture allows collection and processing of identification data in real time because processing is performed on the device itself, where the data is generated.

Material and methods
The problem with weapons identification, in terms of research, can be classified as the Internet of Things (IoT). The IoT is a term that refers to connecting various devices to a network. These devices are present at the edge of the network, where real-time data is generated and processed. The amount of data generated at the edge of a network can be large. The architecture where data processing is done on Edge devices is called Edge computing (Reale, 2017). Edge computing provides: privacy, delay reduction, data filtering, and pre-processing.
Conversion of a text from paper to a digital text is known as Optical Character Recognition (OCR). This conversion method has been explored for decades (Prajapati et al, 2018). Artificial intelligence is used for image processing and text recognition, and OCR is one of the branches of artificial intelligence (Pawar et al, 2019). One of the AI techniques used for text recognition is the Artificial Neural Network (ANN) (Prajapati et al, 2018). There are a number of currently implemented OCR software programs. Common to all software programs currently developed is that they cannot read every text without making an error. In the case of a handwritten text, the Intelligent Character Recognition (ICR) technique is used (SimpleSoftware, 2020). One of the software solutions that can beused for OCR is the Tesseract engine (Pyimagesearch, 2018).
Radio Frequency Identification (RFID) belongs to a group of shortrange wireless communications. This type of communication is based on the RFID reader and the RFID tag. The reader emits a radio signal, to which the tag, if within the range of the reader, responds by sending its code (tag). Depending on the tag power type, there are a passive reader (powered by the power it receives from the reader), a semi-passive reader (has a battery that powers the processor), and an active reader (has its own power). The frequency bands 125-134.2 kHz and 140-148.5 kHz belong to the LF-Low Frequency readers and their range is less than 0.5 meters. The range 6.775-6.795 MHz belongs to midrange readers. The high frequency group includes readers with a frequency higher than 13.553 MHz (HF-High Frequency) and their range can go up to one meter, and if the frequency range 858-930 MHz (UH-Ultra High Frequency) is used, it can go up to 10 meters. Using self-powered tags can increase the range of the reader in all operating ranges, and in the case of using the UHF range, the range can go up to 500 meters (Electronicsnotes, 2020), (SkyRFIDInc, 2020).
The Fingerprint is one of the biometric recognition techniques and it can be used for face, iris, voice, or palm recognition (Maltoni et al, 2009). Technologies which can be used to digitize fingerprints can be grouped in optical (Frustrated Total Internal Reflection), electrical (capacitive, thermal, electric field, and piezoelectric), and ultrasound (Maltoni et al, 2009). One of the problems with finger digitization is the storage of a large number of prints. In order to optimize the memory space needed for storage, compression mechanisms have been created. The most famous is Wavelet Scalar Quantization (WSQ). This algorithm was developed by the FBI, the National Institute of Standards and Technology (NIST), and the Los Alamos National Laboratory (Thakkar, 2020). Biometric data are lefton most of the objects people touch. This fact represents one of the biggest flaws, which is reflected in the generation of a false fingerprint (Nogueira et al, 2016).
An Edge computing architecture was proposed in this paper for research purposes. Edge devices were used to digitize the process of keeping records of weapons issuing and returning. These devices should be able to process image and data from RFID and biometric readers.
The Edge device used is the Raspberry PI 3 (Processor: 64 bits, 4 cores, 1.2GHz; RAM 1 GB) which has 4 USB ports and 40 GPIO pins, Ethernet, Wi-Fi, Bluetooth. Due to the possibility of connecting a greater number of different devices and sensors, its small dimensions (85 x 49 mm), price, as well as satisfactory performances, this device was chosen. The Raspberry Pi Camera (5-megapixel OV5647 sensor) and Tesseract Engine for OCR and OpenCV software were used to test the serial number recognition on the image. The NFC-tag (Ntag213) and the RFID reader RC522 were used to test the possibility of applying RFID technology.

Results
Two approaches have been used to address the problem of identification of weapons and keeping their records. The first approach to solving the problem of identifying a weapon is based on something possessed by the weapon, while the second approach is based on something attached to the weapon. In the first approach, a camera was used to read the existing serial number of the weapon, while in the second approach, RFID technology was used.

Analysis of proposed solutions
For the purpose of the research, two weapons identification architectures were created. The architectures are based on a Raspberry Pi computer, a monitor, and a data acquisition device (camera or RFID reader), as shown in Figure 1.
A weapon identification architecture that uses a camera to read a weapon's serial number is shown in Figure 1a. With this architecture, the user brings in a weapon facing the serial number towards the camera. After generating the image, the computer processes the image by trying to identify the serial number of the weapon.
Before testing the image processing from the camera, the architecture was tested by recognizing the text from the previously processed image. The aim was to determine whether the Raspberry Pi could extract a text from the image. During testing, we determined that the Raspberry Pi could read a text from an image for 2s to 8s depending on the image quality. However, the percentage of read characters of the serial number from the image ranged from 78% to 100%. The whole serial number recognition rate is 28% of all attempts (75 attempts, 21 serial numbers recognized).

Figure 1 -System architecture: (a) for image testing, (b) for RFID tag processing)
We then tested the reading of the serial number of the weapon from the image generated by the camera. Figure 2 shows the images of the weapon serial numbers. The time required to recognize a serial number is greater than that of the image previously processed and ranged from 5s to 20s. The precision was much lower and ranged from 0 to 70% of the maximum read characters of the serial number. The reading results are shown in Table 1. Characteristically, the whole serial number of the weapon was not recognized in any of the 150 recognition attempts. One possible solution to solving image processing speed and serial number recognition quality would be to use a server that recognizes the image as described in (Saleous et al, 2016). The second approach to problem solving was to use RFID readers. When testing the RFID weapons identification architecture, an NFC-tag test environment (Ntag213) was developed and the RFID reader RC522 was used. The architecture of the test system for processing RFID tags is shown in Figure 1b. A flexible NFC tag with a diameter of 25mm is placed inside the weapon. Figure 1b, as a separate section, shows the handrail and the exact location of the NFC tag. During testing, the response was found to depend on the tag distance from the RFID reader as well as where the tag was placed. Table 1 shows that the maximum distance from which RFID tag readings start is 25 to 30 mm, depending on the position of the tag in the weapon.
Based on the performed testing, Table 2 shows a comparative overview of the two architectures. Based on the analysis, the architecture for weapons identification using RFID technology was selected. In terms of person authentication, finger, iris, and facebiometrics was considered as well as RFID tag-based authentication. It was concluded that in order to achieve adequate reliability and speed of authentication based on iris and face biometrics, additional conditions were required. These conditions apply to the lighting and hardware on which the authentication would be performed (Maltoni et al, 2009). We opted for solutions that did not require special environmental conditions and were not hardware-demanding. The solutions that could be implemented are the fingerprint and the RFID tag. As RFID tags are not embedded in persons, it is suggested that person identification should be based on fingerprint authentication.

Proposed architecture for identifying weapons and users
Based on the results of the testing and comparative analysis of weapons identification architectures, a combined architecture for weapons and user identification is proposed. This architecture uses RFID technology for weapon identification while user identification is based on the fingerprint method. In addition to visual notification of the identification of a user and weapon on the monitor, voice notification is also proposed for faster release or return dynamics. The architecture of the proposed solution is shown in Figure 3.

Figure 3 -Proposed weapon and user identification architecture Рис. 3 -Предлагаемая архитектура для идентификации оружия и пользователя Слика 3 -Предложена архитектура за идентификацију наоружања и корисника
Weapon and user identification is done as follows: -The user logs on to the system with a fingerprint. When a person logs in, he or she has 30s to read their weapon, otherwise they need to log back in, -When a person is logged in, the weapon tag is read and the status of the weapon changes (issued or returned by the user), -After each change, the system notifies the status of the weapon or a new person.
The system allows the verification of weapon data (weapon type, model, serial number) based on RFID tags even if the user is not logged in. The weapon and user identification algorithm is shown in Figure 4. The architecture consists of the Raspberry Pi computer, which is an integrator of the whole system, to which status notification devices (monitor, speakers) and data acquisition devices (RFID reader and fingerprint reader) are connected. The architecture also includes a database, which allows records to be kept. In order to enable faster logging in and logging out, data processing and database are hosted on the Raspberry Pi. In this way, most of the data processing is done at the edge of the network. This kind of approach in the architecture relieves network resources.
EDGE architecture takes data processing near the source. In this work, we use the Raspberry Pi as a local server. The layers which are above the local layer use Containerization and Orchestration to receive data from multiple different sources. In the upper layers, it is possible to apply some of the techniques such as AI and Machine learning. These techniques can lead to better analyses and recommendations for some organizational changes and also changes regarding weapons which are in use in a unit, which in return can provide better efficiency of the unit.
The Raspberry PI enables applications on all layers of architecture to exchange information. This architecture reduces latency and provides reliability. In terms of security, it decreases potential weaknessess in cecommunication with the main server is reduced. In military systems, it is important to reduce communication because military band widths are often limited.

Implementation of the proposed solution
The architecture was practically designed by deploying the Raspberry Pi computer inside each weapon warehouse with data collection and notification devices. The Raspberry Pi is connected to the network. An online service has been implemented enabling the collection of data on the current status, processing and exchange of data, presentation of data and remote administration of the system. Each weapon is intended to have an RFID tag as an identifier. The implemented architecture enables the exchange of data with a central database. In this way, the network is relieved and information processing is provided as close as possible to the source, which is the tendency in similar systems that belong to the concept of the Internet of Things.
All the needed hardware introduced as System architecture and presented in Figure 3 is housed in a special shielded box. The process of registering an individual is shown in Figure 5a, and begins with the person pointing his or her finger at the fingerprint reader. The application identifies the person, and if the identification is successful, the person's information is displayed on the monitor or spoken through the speakers. We used the text-to-speech library FreeTTS (Freetts.Sourceforge, 2017) to ensure that the person's name was read.
The process of identifying the weapon is shown in Figure 5b and is carried out by moving the weapon to the side where the RFID tag is attached to the RFID reader. After reading the RFID tag, the application checks for the existence of such a weapon and records it as being issued or returned. Figure 5c shows the place selected for the RFID tag placement.

Discussion
The results obtained from testing the architecture for identifying weapons using a camera indicate that such an architecture is not suitable for identifying weapons. The test results show that there was no successful reading of all characters of the serial number regardless of the number of characters and the number of attempts. The reasons for the unsuccessful reading are due to the following problems: determining the most suitable distance between the weapon and the camera, poor visibility of the serial number due to the color of the print, wear, or concealment of accessories that can be mounted on the weapon. Another issue which makes this architecture a not so good solution is the problem of image processing speed which recognizes a serial number from an image. Testing has shown that the processing speed is low, which can create a problem of crowding when taking or returning a weapon form or to a weapon warehouse. One solution that can fix the results of processing the image obtained from a camera is to paste stickers with a serial number or an OCR code onto the weapon on its outside.
A weapon identification solution using RFID technology overcomes the problems of the previously mentioned solution. RFID technology requires additional modifications regarding the implementation of tags on or into weapons so that readings can be made. The position of the tag in the weapon affects the distance required to read. However, in the event that the weapon is propped up against the reader, a secure reading is made, thereby achieving system reliability.
The weapons used for testing are newer generation weapons. They have places where plastic-like materials can be used to include the stock (where wood was commonly used) or grips. Such places are suitable for tagging.
The Fingerprint is one of the most commonly used authentication methods. In military processes where reliability and speed are required, the fingerprint can meet the requirements. There are fingerprint sensors on the market that do not require high-performance computers. On the other hand, the amount of memory required to store a fingerprint is small, so that fingerprint readers can store the prints in their memory.

Conclusion
The implemented weapon identification solution based on RFID technology and a user identification solution with biometric authentication enables easy and reliable identification, speed of issuing and retrieval of weapons, network relieving, and real-time monitoring of weapon status. In this way, a solution can be implemented to improve the process of recording and monitoring weapons in weapon warehouses.
Tracking the development of science in fields such as the IoT, AI, and Edge computing is certainly of interest in military applications. This paper shows the disadvantages of using AI in weapons image processing. The main drawback is a low degree of reliability. RFID systems are reliable systems for keeping track of things. By combining more techniques and technologies such as RFID, IoT, and AI, it is possible to increase the performance of military systems. Digitization of basic military processes results in better use of time as a resource.