I. G. Maqueda, N. P. D. L. Blanca, R. Molina, A. Katsaggelos
{"title":"Fast millimeter wave threat detection algorithm","authors":"I. G. Maqueda, N. P. D. L. Blanca, R. Molina, A. Katsaggelos","doi":"10.1109/EUSIPCO.2015.7362453","DOIUrl":null,"url":null,"abstract":"Millimeter Wave (MMW) imaging systems are currently being used to detect hidden threats. Unfortunately the current performance of detection algorithms is very poor due to the presence of severe noise, the low resolution of MMW images and, in general, the poor quality of the acquired images. In this paper we present a new real time MMW threat detection algorithm based on a tailored de-noising, body and threat segmentation, and threat detection process that outperforms currently existing detection procedures. A complete comparison with a state of art threat detection algorithm is presented in the experimental section.","PeriodicalId":401040,"journal":{"name":"2015 23rd European Signal Processing Conference (EUSIPCO)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 23rd European Signal Processing Conference (EUSIPCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EUSIPCO.2015.7362453","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
Millimeter Wave (MMW) imaging systems are currently being used to detect hidden threats. Unfortunately the current performance of detection algorithms is very poor due to the presence of severe noise, the low resolution of MMW images and, in general, the poor quality of the acquired images. In this paper we present a new real time MMW threat detection algorithm based on a tailored de-noising, body and threat segmentation, and threat detection process that outperforms currently existing detection procedures. A complete comparison with a state of art threat detection algorithm is presented in the experimental section.