{"title":"基于图像处理技术的隐蔽武器检测研究进展","authors":"R. Mahajan, Devanand Padha","doi":"10.1109/ICSCCC.2018.8703346","DOIUrl":null,"url":null,"abstract":"In today’s modern era security is one of the major concern. The security surveillance cameras are installed everywhere in order to detect any kind of concealed object which may pose a threat to the security. The concealed object can be any kind of firearms or any weapon including knife, scissors, etc. The researchers have focused on techniques to track and detect concealed objects. The process involves the feature extraction of arms, segmentation of images with any concealed object and detection of the weapon. This paper deals with the various techniques used for detection of concealed objects and the respective pitfalls in the current security system.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Detection Of Concealed Weapons Using Image Processing Techniques: A Review\",\"authors\":\"R. Mahajan, Devanand Padha\",\"doi\":\"10.1109/ICSCCC.2018.8703346\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today’s modern era security is one of the major concern. The security surveillance cameras are installed everywhere in order to detect any kind of concealed object which may pose a threat to the security. The concealed object can be any kind of firearms or any weapon including knife, scissors, etc. The researchers have focused on techniques to track and detect concealed objects. The process involves the feature extraction of arms, segmentation of images with any concealed object and detection of the weapon. This paper deals with the various techniques used for detection of concealed objects and the respective pitfalls in the current security system.\",\"PeriodicalId\":148491,\"journal\":{\"name\":\"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCCC.2018.8703346\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCCC.2018.8703346","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection Of Concealed Weapons Using Image Processing Techniques: A Review
In today’s modern era security is one of the major concern. The security surveillance cameras are installed everywhere in order to detect any kind of concealed object which may pose a threat to the security. The concealed object can be any kind of firearms or any weapon including knife, scissors, etc. The researchers have focused on techniques to track and detect concealed objects. The process involves the feature extraction of arms, segmentation of images with any concealed object and detection of the weapon. This paper deals with the various techniques used for detection of concealed objects and the respective pitfalls in the current security system.