Share Email Print

Proceedings Paper

Digital image processing in the SECURE concealed-object detection system
Author(s): Steven W. Smith
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

A new technology has been developed for detecting explosives and other dangerous objects concealed under persons' clothing. The 'Subambient Exposure, Computer Utilized Reflected Energy' (SECURE) method uses a very low level of back-scattered x-rays in conjunction with digital image processing to produce an image of the person and any concealed objects. Image processing algorithms, used in the system are directed at presenting information to a human operator in the best possible manner for foreign object detection. These algorithms are viewed as being near optimum, and additional development is probably not justified. Algorithm development is needed in the area of automatic threat detection. This has the potential of reducing the invasion of privacy associated with having a security operator view each image. It also has the potential of reducing the serious problem of operator complacency. In one approach, the new algorithm must (1) recognize and isolate objects in the image, (2) discriminate between concealed objects and human anatomy, and (3) discriminate between dangerous and benign concealed objects. The images produced with the SECURE technology are extremely noisy due to the low levels of radiation used. Any algorithm developed must perform well in this noisy environment. Execution of the algorithm must be accomplished in less than a few seconds. Hardware to implement the algorithm must be of a complexity and cost compatible with the commercial SECURE system.

Paper Details

Date Published: 1 April 1993
PDF: 5 pages
Proc. SPIE 1824, Applications of Signal and Image Processing in Explosives Detection Systems, (1 April 1993);
Show Author Affiliations
Steven W. Smith, IRT Corp. (United States)

Published in SPIE Proceedings Vol. 1824:
Applications of Signal and Image Processing in Explosives Detection Systems
James M. Connelly; Shiu M. Cheung, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?