Share Email Print

Proceedings Paper

Buried threat detection using a handheld ground penetrating radar system
Author(s): Mary Knox; Peter Torrione; Leslie Collins; Kenneth Morton Jr.
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In this work, we explore the efficacy of two buried threat detectors on handheld data. The first algorithm is an energy-based algorithm, which computes how anomalous a given A-scan measurement after it is normalized according to its local statistics. It is based on a commonly used prescreener for the Husky Mounted Detection System (HMDS). In the HMDS setting measurements are sampled on a crosstrack-downtrack grid, and sequential measurements are at neighboring downtrack locations. In contrast, in the handheld setting sequential scans are often taken at neighboring crosstrack locations, and neighboring downtrack locations can be hundreds of scans away. In order to include both downtrack and crosstrack information, we compute local statistics over a much larger area than in the HMDS setting. The second algorithm is a shape-based algorithm. Shape Invariant Feature Transform (SIFT) features, which capture the gradient distributions of local patches, are extracted and used to train a non-linear Support Vector Machine (SVM). We found that in terms of AUC, the SIFT-SVM algorithm results in a 2.2% absolute improvement over the energy-based algorithm, with the greatest gains seen at lower false alarm rates.

Paper Details

Date Published: 14 May 2015
PDF: 9 pages
Proc. SPIE 9454, Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XX, 94540F (14 May 2015); doi: 10.1117/12.2177812
Show Author Affiliations
Mary Knox, Duke Univ. (United States)
Peter Torrione, Duke Univ. (United States)
Leslie Collins, Duke Univ. (United States)
Kenneth Morton Jr., Duke Univ. (United States)

Published in SPIE Proceedings Vol. 9454:
Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XX
Steven S. Bishop; Jason C. Isaacs, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?