SlideShare a Scribd company logo
1 of 2
GATED IMAGING
In such specific conditions, where the medium can be fog, heavy rain, dense smoke or even
a snowstorm, the physical elements in the atmosphere can obstruct the light path and
moreover, increase the backscattering. The final image is degraded by the disturbances due
to the medium and by this backscattering effect. Indeed, the latter adds a disturbance signal
over the target useful signal. The signal coming from the target is thus blurred by parasitic
light..
Active imaging is a specific technique for imaging a scene or an object. The target is
illuminated and the reflected light is collected on an imaging sensor. In a pure medium, the
incident light is reflected practically only by the targeted object. The quality of vision
through the camera can be sufficient. However, if the medium of propagation is disturbed
by what is called an “obscurant”, the incident light is not only reflected by the object, but
also by the environment, likely to return a proportion of the incident light on the sensor,
called “backscattering effect”.
1
Gated imaging is the solution to prevent this effect. The active illumination is here
produced by a pulsed source, often a laser, which is controlled by an external user. The
pulsed source is synchronized with the sensor exposure time. The sensor is then able to
integrate a specific segment of the reflected light (Fig1) and hence, taking into account the
speed of light, to image a slice at a specific depth in a scene.
Fig1 : Gated imaging principle
StepA : Light emission
StepB : Light reflection
StepC : Integration by the sensor
Visible camera Gated SWIR camera
New Imaging Technologies (NIT) has developed a complete portfolio of InGaAs
sensors and cameras specially designed to include a gated mode. The patented pixel
structure of NIT’s sensors enables to offer an effective exposure time down to 100 ns, with a
very short rise time of 20 ns, whereas a traditional InGaAs sensor will be adequate for
exposure times greater than 10 µs with a slow rise. Shorter is the exposure time, narrower is
the observed slice. Correlated with negligible sensitivity outside the exposure window, and
a short rise time, the region of interest is accurately delimited. Thus, with WiDy SWIR
cameras, targets can be imaged through severe weather conditions in slices down to only
15m, with a precision of 3m on the slice location.
Fig4 : Imaging through smoke in maritime environment with ISL’s 1,5µm system
Fig2 : without gated imaging Fig3 : with gated imaging
A snowstorm illustrates this technique: instead of collecting all the rays reflected by each
snowflake (Fig2), the camera is set up to record only the rays coming back at the distance
of the targeted object (Fig3). Backscattering due to up-front particles will be removed,
avoiding the gray-out effect. The quality of the final image is then highly improved.
Courtesy of ISL Courtesy of ISL
Institut Saint Louis
2

More Related Content

Recently uploaded

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Which standard is best for your content?
Which standard is best for your content?Which standard is best for your content?
Which standard is best for your content?Rustici Software
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 

Recently uploaded (20)

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Which standard is best for your content?
Which standard is best for your content?Which standard is best for your content?
Which standard is best for your content?
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 

Gated Imaging - NIT Application note

  • 1. GATED IMAGING In such specific conditions, where the medium can be fog, heavy rain, dense smoke or even a snowstorm, the physical elements in the atmosphere can obstruct the light path and moreover, increase the backscattering. The final image is degraded by the disturbances due to the medium and by this backscattering effect. Indeed, the latter adds a disturbance signal over the target useful signal. The signal coming from the target is thus blurred by parasitic light.. Active imaging is a specific technique for imaging a scene or an object. The target is illuminated and the reflected light is collected on an imaging sensor. In a pure medium, the incident light is reflected practically only by the targeted object. The quality of vision through the camera can be sufficient. However, if the medium of propagation is disturbed by what is called an “obscurant”, the incident light is not only reflected by the object, but also by the environment, likely to return a proportion of the incident light on the sensor, called “backscattering effect”. 1 Gated imaging is the solution to prevent this effect. The active illumination is here produced by a pulsed source, often a laser, which is controlled by an external user. The pulsed source is synchronized with the sensor exposure time. The sensor is then able to integrate a specific segment of the reflected light (Fig1) and hence, taking into account the speed of light, to image a slice at a specific depth in a scene. Fig1 : Gated imaging principle StepA : Light emission StepB : Light reflection StepC : Integration by the sensor
  • 2. Visible camera Gated SWIR camera New Imaging Technologies (NIT) has developed a complete portfolio of InGaAs sensors and cameras specially designed to include a gated mode. The patented pixel structure of NIT’s sensors enables to offer an effective exposure time down to 100 ns, with a very short rise time of 20 ns, whereas a traditional InGaAs sensor will be adequate for exposure times greater than 10 µs with a slow rise. Shorter is the exposure time, narrower is the observed slice. Correlated with negligible sensitivity outside the exposure window, and a short rise time, the region of interest is accurately delimited. Thus, with WiDy SWIR cameras, targets can be imaged through severe weather conditions in slices down to only 15m, with a precision of 3m on the slice location. Fig4 : Imaging through smoke in maritime environment with ISL’s 1,5µm system Fig2 : without gated imaging Fig3 : with gated imaging A snowstorm illustrates this technique: instead of collecting all the rays reflected by each snowflake (Fig2), the camera is set up to record only the rays coming back at the distance of the targeted object (Fig3). Backscattering due to up-front particles will be removed, avoiding the gray-out effect. The quality of the final image is then highly improved. Courtesy of ISL Courtesy of ISL Institut Saint Louis 2