SlideShare a Scribd company logo
Journal for Research| Volume 01| Issue 12 | February 2016
ISSN: 2395-7549
All rights reserved by www.journalforresearch.org 1
Detecting Items Hidden Inside a Body
Mr. Sanjay Nag Ms. Nabanita Basu
Research Scholar Research Scholar
Department of Computer Science & Engineering Department of Computer Science & Engineering
University of Calcutta University of Calcutta
Prof.(Dr.) Samir Kumar Bandyopadhyay
Professor
Department of Computer Science & Engineering
University of Calcutta
Abstract
People sometimes hide contraband inside body cavities. For instance, prison inmates and visitors may hide money or cell phones
this way. Smugglers may carry drugs, and terrorists may conceal explosives inside the body. The paper proposed a method for
detecting hidden item inside human body. It can detect both metal and non-metal objects and display them as images on a video
screen.
Keywords: Concealed Weapon Detection, Color image, and IR image
_______________________________________________________________________________________________________
I. INTRODUCTION
A weapon is any object that can do harm to another individual or group of individuals. This definition not only includes objects
typically thought of as weapons, such as knives and firearms, but also explosives, chemicals, etc. so this harmful things need to
be detect for securing general public as well as public assets like airports and buildings etc. Already used manual screening
procedure sometimes gives wrong alarm indication, and fails when the object is not in the range of security personnel as well as
when it is impossible to manage the flow of people through a controlled procedure. It also disappoints us when we try to identify
a person who is the victim of an accident in future. We have recently witnessed the series of bomb blasts in Mumbai, Delhi, and
Guwahati etc. Bombs went off in buses and underground stations. And killed many and left many injured and left the world in
shell shock and the Indians in terror. This situation is not limited to India but it can happen or already happened anywhere and
anytime in the world. People think bomb blasts can’t be predicted before handled. In all of these cases CWD by scanning the
images gives satisfactory results. But no single sensor technology can provide acceptable performance. So we try to bring the
eventual deployment of automatic detection and recognition of concealed weapons. It is a technological challenge that requires
innovative solutions in sensor technologies and image processing. The problem also presents challenges in the legal arena; a
number of sensors based on different phenomenology as well as image processing support are being developed to observe
objects underneath people’s clothing. Now image fusion has been identified as a key technology to achieve improved CWD
procedures. In our current work we focus on fusing visual and low cost IR images for CWD.
Infrared images are depends on the temperature distribution information of the target to form an image. Usually the theory
follows here is that the infrared radiation emitted by the human body is absorbed by clothing and then re-emitted by it. In the IR
image the background is almost black with little detail because of the high thermal emissivity of body. The weapon is darker than
the surrounding body due to a temperature difference between it and the body (it is colder than human body). The visual image is
a mental image that is similar to a visual perception. The resolution in the visual image is much higher than that of the IR image.
It is nothing but a RGB image that supports human visual perception. But there is no useful information on the concealed
weapon in the visual image. The human visual system is very sensitive to colours. To utilize this ability if we apply this image
with other image in fusion technique we get a better fused image that helps for detection.
People sometimes hide contraband inside body cavities. For instance, prison inmates and visitors may hide money or cell
phones this way. Smugglers may carry drugs, and terrorists may conceal explosives inside the body. A weapon is any object that
can do harm to another individual or group of individuals. This definition not only includes objects typically thought of as
weapons, such as knives and firearms, but also explosives, chemicals, etc. Contraband items include illegal drugs and any other
item that is controlled or forbidden by a particular law enforcement or corrections agency. Consequently, contraband may
include tobacco, any metallic object that can be used to defeat security constraints, drug paraphernalia, etc.
For the computer to recognize a specific weapon or threat item, the computer will have to compare the threat item with an
electronic catalog of images of uniquely-shaped threat items, and this includes images for all possible unique orientations for
each unique threat item. Only catalogued images of uniquely-shaped threat items are required for comparison because no new
information is obtained if a catalogued image is only a scaled replica of another catalogued image. Unique orientations, on the
other hand, are important because a weapon may have a significantly different appearance if viewed from the sides, the top, etc.
Detecting Items Hidden Inside a Body
(J4R/ Volume 01 / Issue 12 / 001)
All rights reserved by www.journalforresearch.org 2
Concealed weapons can be detected through various techniques which are Image Processing, Active and Passive millimeter -
wave sensors, Phased Antenna array, and explosives can be detected through Signal Processing and Pattern Recognition. For the
perfect effectiveness and visualization, image processing methods are generally opting.
II. REVIEW WORKS
Imaging techniques based on a combination of sensor technologies and processing will potentially play a key role in addressing
the concealed weapon detection problem. One critical issue is the challenge of performing detection at a distance with high
probability of detection and low probability of false alarm. Yet another difficulty to be surmounted is forging portable
multisensory instruments. Also, detection systems go hand in hand with subsequent response by the operator, and system
development should take into account the overall context of deployment [1]. Concealed Weapon using the radar image are
proposed by Yu-Wen Chang ET all [2, 3] in which drawbacks such as glint and specular reflection or artifacts such as coherent
interference these problems should be able to be overcome.
There are many layers in processing of image which scan out the real picture of concealed material. Sensors are also very
effective for the security. It helps to complete the aim of detection of weapons, explosive, chemical threats. A pulse synthesized,
time domain approach relaying on Stepped Frequency Continuous Wave (SFCW) radar implemented in a phased array of
antenna is proposed. Both the location of items (that support appreciable induced surface currents) concealed on the human body
and the nature of these concealed item [3].
In order to detect contraband, it is important to understand their characteristics. Gozani lists the properties that are of greatest
interest in identifying both drugs and explosives. For examples, drugs have following constitutes: carbon (high), oxygen (low),
chlorine (moderate), and density (moderate). On the other hand for the explosives we get: carbon (moderate), nitrogen
(high/moderate), oxygen (very high/ high) and density (very high). Nitrogen based explosives, rich in nitrogen (bonding agent)
and oxygen (oxidizing agent) are commonly used due to their high power. The explosives also contain carbon and sometimes
hydrogen as fuel. Usually, explosive device consist of two main components: an explosive agent and a detonating system.
The blasting material consists primarily of inorganic nitrates and carbonaceous fuels and detonators are made of metallic tubes or
shells with an initiating explosive. In case of plastic explosives, they can self -detonate due to their unstable nature. There are
more than one hundred types of military and civilian explosives and around twenty commonly used drugs. A number of
explosives characteristics can be used for their detection [4].
A new algorithms proposed by Zhiyun Xue et all[6] in which fuse a color visual image and a corresponding IR image for such
a concealed weapon detection application in which they have great success. So fusion is an important step, we use here DWT
fusion , some more improve method are there such as Chu-Hui Lee et all[13] produce a easy applications to adjust for anytime,
and anywhere you like, make sure that may work and take a photograph nicely. The DWT fusion methods provide
computationally ancient image fusion techniques various fusion rules for the selection and combination of sub band coefficients
increase the quality perceptual and quantitatively measurable of image fusion in specific applications. For binaries the fused
image there are several method[8-10] Otsu method are chosen because this method are global method and effective for this type
of image. The concept of small area removal is taken from [11-14]. However, based on biological research results, the human
visual system is very sensitive to colours. To utilize this ability, some researchers map three individual monochrome
multispectral images to the respective channels of an RGB image to produce a false color fused image. In many cases, this
technique is applied in combination with another image fusion procedure. Such a technique is sometimes called color composite
fusion. we present a new technique to fuse a color visual image with a corresponding IR image for a CWD application.
III.PROPOSED METHOD
In our proposed technique for CWD we consider two types of image – a visual image and an IR image. Visual image is nothing
but an RGB image which has three main colour components Red, Green and Blue. Since the human visual system is very
sensitive to colours this image creates a natural perception of an object to human vision but not helps so much in the detection of
concealed weapon. For this we consider IR image as second input. It basically depends on high thermal emissivity of the body.
Basically the infrared radiation emitted by the body is absorbed by clothing and then re-emitted by it, is sensed by the infrared
sensors. Due to difference in thermal emissivity we can realize the hidden object but since the background is almost black this
image cannot help in CWD alone. The prosed algorithm is given below.
Algorithm for Detecting Concealed Weapon:
Input: X Ray Image
Output: Identification of Concealed weapon
1) Step1: Read the input color or grayscale image.
2) Step2: Converts input colour image in to grayscale image which is done by forming a weighted sum of each three (RGB)
component, eliminating the saturation and hue information while retaining the luminance and the image returns a grayscale
colour map.
3) Step3: Resize this image in to 200 × 200 image matrix.
Detecting Items Hidden Inside a Body
(J4R/ Volume 01 / Issue 12 / 001)
All rights reserved by www.journalforresearch.org 3
4) Step4: Filters the multidimensional array with the multidimensional filter. Each element of the output an integer or in array,
then output elements that exceed the certain range of the integer type is shortened, and fractional values are rounded.
5) Step5: Add step2, step4 image and an integer value 45 and pass it in to a median filter to get the resultant enhanced image.
6) Step6: Computes a global threshold that can be used to convert an intensity image (Step5) to a binary image with a
normalized intensity value which lies in between range 0 and 1.
7) Step7: Compute watershed segmentation by mat lab command watershed (step6 image).
8) Step8: Compute the morphological operation by two mat lab command imerode and imdilate and strel with arbitrary shape.
9) Step9: Store the size of the step 8 image into var1 and var2 i.e no. Of rows and column in pixels by[var1 var2]=size(step8
image)
10) Step10: For i=1:1:var1 do
11) Step11: For j=1:1:var2 do
12) Step12: If step8 image (i,j) == 1 do
13) Step13: step2 image (i,j) = 255
14) Step14: Else do
15) Step15: step2 image (i,j) = step2 image (i,j) * 0.3
16) Step16: End If
17) Step17: End For
18) Step18: End For
19) Step19: Convert in to binary image and traces the exterior boundaries of objects, as well as boundaries of holes inside these
objects, in the binary image and into an RGB color image for the purpose of visualizing labeled regions.
20) Step20: Show only tumor portion of the image by remove the small object area.
21) Step21: Compute edge detection using sobel edge detection technique.
/*Algorithm for Area Calculation of Concealed Weapon*/
22) Step22:- Read the input color or grayscale image.
23) Step23:- Converts input colour image in to grayscale image which is done by forming a weighted sum of each three (RGB)
component, eliminating the saturation and hue information while retaining the luminance and the image returns a grayscale
colour map and store it into variable I.
24) Step24:- Compute numbers of rows and column in pixels by [r2 c2] = size (I)
25) Step25:- Initialize a variable A=0
For i=1:1:r2
Do Step4:- For j=1:1:c2
Do
If I (i,j)==255
Do A=A+0
Else
Do A=A+1
End IF
End For
End For
26) Step 26:-Display the area A and store the value in buffer for future processing.
27) Step 27: Take a visual image (basically, RGB image) and an infrared (IR) image as input from Disk
28) Step 28: Resize this two image so that they have same size.
29) Step 29: Combine i.e. add resized Visual and IR image.
30) Step 30: Complement the IR image.
31) Step 31: Combine i.e. add resized Visual image and complemented IR image.
32) Step 32: Convert the visual RGB image to its HSV format.
33) Step 33: Perform DWT fusion on Step 5’s combined image and Step 6’s converted HSV image.
34) Step 34: Convert the fused image into its gray scale format.
35) Step 35: Binarize the Fused image.
36) Step 36: Detect the weapon from that image.
It is a technique of fusing the visual and IR image after registration. We find that the body is brighter than the background in
the IR image. Also background is almost black and gives little details because of the high thermal emissivity of body. Also
weapon is darker than the surrounding body due to a temperature difference between it and the body (it is colder than human
body). The resolution in the visual image is much higher than that of the IR image, but there is no information on the weapon in
the visual image. It is shown in Figure 1.
Detecting Items Hidden Inside a Body
(J4R/ Volume 01 / Issue 12 / 001)
All rights reserved by www.journalforresearch.org 4
a) Visual image b) IR image c) Fused image with visible weapon d) Detected image with weapon highlighted
Fig. 1: Concealed weapon detection
Fig. 2: RGB image Fig. 3: IR image Fig. 4: Gray image
Fig. 5: Combined image Fig. 6: Complemented IR Fig. 7: Combined1 image
Fig. 8: HSV image Fig. 9: Fused image Fig. 10: Fused Gray Image
Fig. 11: Weapon in binary image Fig. 12: Weapon in visual image Fig. 13: Contour of the Weapon image
Two images in the same pose visual RGB image and IR image are shown in figure 2 and figure 3. Resize these two types of
image because image fusion and addition are not able to perform if the sizes are not same. Combine basically add visual image
and IR image and the result is shown in figure 4.
Detecting Items Hidden Inside a Body
(J4R/ Volume 01 / Issue 12 / 001)
All rights reserved by www.journalforresearch.org 5
Actually we want to detect the hiding details from figure 5 but image from figure 4 is hazy, so we do not get enough
information from figure4. Complement the IR image which is use full in the next operation and this complement image is shown
in figure 6. IR image lies the intensity between 0 to 255 intensity thus complement means subtracting all matrix component from
255 and we get complemented form or reverse form of the IR image. Then add visual image and complemented IR image which
is shown in figure 7.
We do these steps because in this step difference between hiding details and man are recognizable. Then we convert IR image
into HSV colour model and it is shown in figure8 because components of IR image are all correlated with the amount of light
hitting the object, and therefore with each other, image descriptions in terms of those components make object discrimination
difficult. Descriptions in terms of hue/lightness/saturation are often more relevant. After converting HSV model the image is
now three components. Now we can use fusion technique because two images have the same dimension with same size. Then we
use DWT fusion technique between HSV color image and combined image is shown in figure 9. The discrete wavelet transform
DWT is a spatial frequency decomposition that provides a flexible multi resolution analysis of an image. In wavelet
transformation due to sampling, the image size is halved in both spatial directions at each level of decomposition process thus
leading to a multi1resolution signal representation. The advantages of image fusion over visual comparison of multi-modality
are: (a) the fusion technique is useful to correct for variability in orientation, position and dimension; (b) it allows precise
anatomic1physiologic correlation; and (c) it permits regional quantisation. Many image processing like de-noising, contrast
enhancement, edge detection, segmentation, texture analysis and compression can be easily and successfully performed in the
wavelet domain. Wavelet techniques thus provide a powerful set of tools for image enhancement and analysis together with a
common framework for various fusion tasks. Applying fusion technique image sharpness and contrast enhanced. Then this fused
image converted into gray scale image is shown in figure 9.
This steps is required for the next step in which we use a binarization technique. There are several binarization techniques
among them Otsu, Bernsen, savala , th-mean, niblack and iterative partitioning as a framework method are showing good result
for this type of image. Here we use Otsu method which is a global Thresholding method i.e threshold value are calculated locally
and get the result, no extra threshold value is added here. Extract this weapon portion by calculating all connected area
component then remove too small component according to the area values. This only weapon portion binary image is shown in
figure 10. Let us we want to show the weapon in the actual RGB visual image. The weapon binary images are stored into three
different components because we want multiply it with three dimensional RGB image. Multiply individual element to element
between two matrixes. In this step we detect weapon with visual RGB image is shown in figure 11.
Contour detection is used to detect edges of weapon from the weapon binary image. Edge detection refers to the process of
identifying and locating sharp discontinuities in an image. The discontinuities are abrupt changes in pixel intensity which
characterize boundaries of objects in a scene. There is an extremely large number of edge detection operators available, each
designed to be sensitive to certain types of edges. Here we use canny edge detection techniques. The Canny edge detection
algorithm is known to many as the optimal edge detector. Canny’s edge detection algorithm is computationally more expensive
compared to Sobel, Prewitt and Robert’s operator. However, the Canny’s edge detection algorithm performs better than all these
operators under almost all scenarios. This contour detection of concealed weapon is shown in figure 12. Then this binarizes
contour image are divided into three component and multiply as before and get contour with visual RGB image which is shown
in figure 13 where we can see the concealed weapon under person clothes easily.
IV.CONCLUSION
In this paper we introduce a color image fusion technique for CWD where we fuse a visual RGB image and IR image. We can
able to detect the weapon concealed under person’s clothes and bags. But infrared radiation can be used to show the image of a
concealed weapon only when the clothing is tight, thin, and stationary. For normally loose clothing, the emitted infrared radiation
will be spread over a larger clothing area, thus decreasing the ability to image a weapon.
REFERENCES
[1] Hua-Mei Chen, Seungsin Lee, Raghuveer M. Rao, Mohamed-Adel Slamani, and Pramod K. Varshney. : A tutorial overview of development in imaging
sensors and processing. IEEE SIGNAL PROCESSING MAGAZINE, pp.52-61, MARCH 2005.
[2] Yu-Wen Chang ; Michael Johnson. : Portable Concealed Weapon Detection Using Millimeter Wave FMCW Radar Imaging. Federal funds provided by the
U.S. Department of Justice August 30, 2001.
[3] Z. Xue, R. S. Blum, and Y. Li. : Fusion of Visual and IR Images for Concealed Weapon Detection1. U. S. Army Research Office under grant number
DAAD19-00-1-0431, pp 1198-1205.
[4] Sudipta Roy and Prof. Samir K. Bandyopadhyay. : Visual Image Based Hand Recognitions. Asian JournalOf Computer Science And Information
Technolog(AJCSIT)y1:4 (2011), pp.106 – 110. http://innovativejournal.in/index.php/ajcsit/article/view/94
[5] Mohamed-Adel Slamani , Pramod K. Varshney , David D. Ferris. : Survey of Image Processing Techniques Applied to the Enhancement and Detection of
Weapons in MMW Data. SPIE Vol. 4719 (2002).
[6] Zhiyun Xue, Rick S. Blum. : Concealed Weapon Detection Using Color Image Fusion. ISIF, pp-622-627,2003.
[7] R. C. Gonzalez, R. E. Woods. : Digital Image Processing. Second Edition, Prentice Hall, New Jersey 2002.
[8] Otsu, N.: A threshold selection method from gray-level histogram. IEEE Trans. Syst. Man Cybern. 9, 62–66 (1979)
[9] Niblack,W.: An Introduction to Digital Image Processing. pp. 115–116. Prentice Hall, Eaglewood Cliffs (1986)
[10] Sauvola, J., Pietikainen, M.: Adaptive document image binarization. Pattern Recogn. 33(2), 225–236 (2000)
Detecting Items Hidden Inside a Body
(J4R/ Volume 01 / Issue 12 / 001)
All rights reserved by www.journalforresearch.org 6
[11] Manjusha Deshmukh, Udhav Bhosale.: Image Fusion and Image Quality Assessment of Fused Images. International Journal of Image Processing (IJIP), pp.
484-508, Volume (4): Issue (5).
[12] M. Aguilar, and J. R. New. : Fusion of multi-modality volumetric medical imagery. ISIF 2002, pp. 1206-1212.
[13] Sudipta Roy, Prof. Samir K. Bandyopadhyay, “Contour Detection of Human Knee”, International Journal of Computer Science Engineering and
Technology (IJCSET) ,September 2011 , Vol 1, Issue 8,pp. 484-487.
[14] Chu-Hui Lee and Zheng-Wei Zhou . : Comparison of Image Fusion based on DCT-STD and DWT-STD. Proceedings of the International Multiconference
of Engineers and computer scientists 2012, vol me, IMECS 2012, Hong Kong.

More Related Content

What's hot

Password Based Hand Gesture Controlled Robot
Password Based Hand Gesture Controlled Robot Password Based Hand Gesture Controlled Robot
Password Based Hand Gesture Controlled Robot
IJERA Editor
 
Image processing
Image processingImage processing
Image processing
kamal330
 
Markerless motion capture for 3D human model animation using depth camera
Markerless motion capture for 3D human model animation using depth cameraMarkerless motion capture for 3D human model animation using depth camera
Markerless motion capture for 3D human model animation using depth camera
TELKOMNIKA JOURNAL
 
winter project
winter projectwinter project
winter project
Shantanu Bharadwaj
 
Design of Image Projection Using Combined Approach for Tracking
Design of Image Projection Using Combined Approach for  TrackingDesign of Image Projection Using Combined Approach for  Tracking
Design of Image Projection Using Combined Approach for Tracking
IJMER
 
Digital Image Processing and Edge Detection
Digital Image Processing and Edge DetectionDigital Image Processing and Edge Detection
Digital Image Processing and Edge Detection
Seda Yalçın
 
Robotics
RoboticsRobotics
Robotics
A Tê Hát
 
Industrial robovision
Industrial robovisionIndustrial robovision
Industrial robovision
Harshal Gosavi
 
DIGITAL IMAGE TECHNOLOGY
DIGITAL IMAGE TECHNOLOGYDIGITAL IMAGE TECHNOLOGY
DIGITAL IMAGE TECHNOLOGY
100677809
 
Motion capture document
Motion capture documentMotion capture document
Motion capture document
harini501
 
G0342039042
G0342039042G0342039042
G0342039042
ijceronline
 
Sensors optimized for 3 d digitization
Sensors optimized for 3 d digitizationSensors optimized for 3 d digitization
Sensors optimized for 3 d digitization
Basavaraj Patted
 
E0543135
E0543135E0543135
E0543135
IOSR Journals
 
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...
IRJET-  	  A Vision based Hand Gesture Recognition System using Convolutional...IRJET-  	  A Vision based Hand Gesture Recognition System using Convolutional...
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...
IRJET Journal
 
2D mapping using omni-directional mobile robot equipped with LiDAR
2D mapping using omni-directional mobile robot equipped with LiDAR2D mapping using omni-directional mobile robot equipped with LiDAR
2D mapping using omni-directional mobile robot equipped with LiDAR
TELKOMNIKA JOURNAL
 
Mitchell Reifel (pmdtechnologies ag): pmd Time-of-Flight – the Swiss Army Kni...
Mitchell Reifel (pmdtechnologies ag): pmd Time-of-Flight – the Swiss Army Kni...Mitchell Reifel (pmdtechnologies ag): pmd Time-of-Flight – the Swiss Army Kni...
Mitchell Reifel (pmdtechnologies ag): pmd Time-of-Flight – the Swiss Army Kni...
AugmentedWorldExpo
 
Sensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar reportSensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar report
Vishnu Prasad
 
Digital imaging
Digital imagingDigital imaging
Digital imaging
Indian dental academy
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
IRJET Journal
 
IRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural NetworkIRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET Journal
 

What's hot (20)

Password Based Hand Gesture Controlled Robot
Password Based Hand Gesture Controlled Robot Password Based Hand Gesture Controlled Robot
Password Based Hand Gesture Controlled Robot
 
Image processing
Image processingImage processing
Image processing
 
Markerless motion capture for 3D human model animation using depth camera
Markerless motion capture for 3D human model animation using depth cameraMarkerless motion capture for 3D human model animation using depth camera
Markerless motion capture for 3D human model animation using depth camera
 
winter project
winter projectwinter project
winter project
 
Design of Image Projection Using Combined Approach for Tracking
Design of Image Projection Using Combined Approach for  TrackingDesign of Image Projection Using Combined Approach for  Tracking
Design of Image Projection Using Combined Approach for Tracking
 
Digital Image Processing and Edge Detection
Digital Image Processing and Edge DetectionDigital Image Processing and Edge Detection
Digital Image Processing and Edge Detection
 
Robotics
RoboticsRobotics
Robotics
 
Industrial robovision
Industrial robovisionIndustrial robovision
Industrial robovision
 
DIGITAL IMAGE TECHNOLOGY
DIGITAL IMAGE TECHNOLOGYDIGITAL IMAGE TECHNOLOGY
DIGITAL IMAGE TECHNOLOGY
 
Motion capture document
Motion capture documentMotion capture document
Motion capture document
 
G0342039042
G0342039042G0342039042
G0342039042
 
Sensors optimized for 3 d digitization
Sensors optimized for 3 d digitizationSensors optimized for 3 d digitization
Sensors optimized for 3 d digitization
 
E0543135
E0543135E0543135
E0543135
 
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...
IRJET-  	  A Vision based Hand Gesture Recognition System using Convolutional...IRJET-  	  A Vision based Hand Gesture Recognition System using Convolutional...
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...
 
2D mapping using omni-directional mobile robot equipped with LiDAR
2D mapping using omni-directional mobile robot equipped with LiDAR2D mapping using omni-directional mobile robot equipped with LiDAR
2D mapping using omni-directional mobile robot equipped with LiDAR
 
Mitchell Reifel (pmdtechnologies ag): pmd Time-of-Flight – the Swiss Army Kni...
Mitchell Reifel (pmdtechnologies ag): pmd Time-of-Flight – the Swiss Army Kni...Mitchell Reifel (pmdtechnologies ag): pmd Time-of-Flight – the Swiss Army Kni...
Mitchell Reifel (pmdtechnologies ag): pmd Time-of-Flight – the Swiss Army Kni...
 
Sensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar reportSensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar report
 
Digital imaging
Digital imagingDigital imaging
Digital imaging
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
 
IRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural NetworkIRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural Network
 

Similar to DETECTING ITEMS HIDDEN INSIDE A BODY

Pixel Based Fusion Methods for Concealed Weapon Detection
Pixel Based Fusion Methods for Concealed Weapon DetectionPixel Based Fusion Methods for Concealed Weapon Detection
Pixel Based Fusion Methods for Concealed Weapon Detection
IJERA Editor
 
Detection of abnormal human behavior using deep learning
Detection of abnormal human behavior using deep learningDetection of abnormal human behavior using deep learning
Detection of abnormal human behavior using deep learning
BOHRInternationalJou1
 
Robust Motion Detection and Tracking of Moving Objects using HOG Feature and ...
Robust Motion Detection and Tracking of Moving Objects using HOG Feature and ...Robust Motion Detection and Tracking of Moving Objects using HOG Feature and ...
Robust Motion Detection and Tracking of Moving Objects using HOG Feature and ...
CSCJournals
 
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
IJET - International Journal of Engineering and Techniques
 
A BRIEF OVERVIEW ON DIFFERENT ANIMAL DETECTION METHODS
A BRIEF OVERVIEW ON DIFFERENT ANIMAL DETECTION METHODSA BRIEF OVERVIEW ON DIFFERENT ANIMAL DETECTION METHODS
A BRIEF OVERVIEW ON DIFFERENT ANIMAL DETECTION METHODS
sipij
 
Crowd Sensing Systems A Mini Review
Crowd Sensing Systems A Mini ReviewCrowd Sensing Systems A Mini Review
Crowd Sensing Systems A Mini Review
ijtsrd
 
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
IJET - International Journal of Engineering and Techniques
 
Design of algorithm for detection of hidden objects from Tera hertz images
Design of algorithm for detection of hidden objects from Tera hertz imagesDesign of algorithm for detection of hidden objects from Tera hertz images
Design of algorithm for detection of hidden objects from Tera hertz images
IOSR Journals
 
bazgir2020.pdf
bazgir2020.pdfbazgir2020.pdf
bazgir2020.pdf
NISHRO
 
bazgir2020.pdf
bazgir2020.pdfbazgir2020.pdf
bazgir2020.pdf
NISHRO
 
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
IRJET Journal
 
Introduction to image processing-Class Notes
Introduction to image processing-Class NotesIntroduction to image processing-Class Notes
Introduction to image processing-Class Notes
Dr.YNM
 
IRJET- Survey on Detection of Crime
IRJET-  	  Survey on Detection of CrimeIRJET-  	  Survey on Detection of Crime
IRJET- Survey on Detection of Crime
IRJET Journal
 
15mafaz wali--final (1)
15mafaz wali--final (1)15mafaz wali--final (1)
15mafaz wali--final (1)
QSC-Fabrication laboratory
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
IRJET Journal
 
Survey on video object detection & tracking
Survey on video object detection & trackingSurvey on video object detection & tracking
Survey on video object detection & tracking
ijctet
 
Hybrid Approach for Brain Tumour Detection in Image Segmentation
Hybrid Approach for Brain Tumour Detection in Image SegmentationHybrid Approach for Brain Tumour Detection in Image Segmentation
Hybrid Approach for Brain Tumour Detection in Image Segmentation
ijtsrd
 
Godeye An Efficient System for Blinds
Godeye An Efficient System for BlindsGodeye An Efficient System for Blinds
Godeye An Efficient System for Blinds
ijtsrd
 
Degree Project
Degree ProjectDegree Project
Degree Project
Udhav Pawar
 
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
csandit
 

Similar to DETECTING ITEMS HIDDEN INSIDE A BODY (20)

Pixel Based Fusion Methods for Concealed Weapon Detection
Pixel Based Fusion Methods for Concealed Weapon DetectionPixel Based Fusion Methods for Concealed Weapon Detection
Pixel Based Fusion Methods for Concealed Weapon Detection
 
Detection of abnormal human behavior using deep learning
Detection of abnormal human behavior using deep learningDetection of abnormal human behavior using deep learning
Detection of abnormal human behavior using deep learning
 
Robust Motion Detection and Tracking of Moving Objects using HOG Feature and ...
Robust Motion Detection and Tracking of Moving Objects using HOG Feature and ...Robust Motion Detection and Tracking of Moving Objects using HOG Feature and ...
Robust Motion Detection and Tracking of Moving Objects using HOG Feature and ...
 
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
[IJET-V1I3P20] Authors:Prof. D.S.Patil, Miss. R.B.Khanderay, Prof.Teena Padvi.
 
A BRIEF OVERVIEW ON DIFFERENT ANIMAL DETECTION METHODS
A BRIEF OVERVIEW ON DIFFERENT ANIMAL DETECTION METHODSA BRIEF OVERVIEW ON DIFFERENT ANIMAL DETECTION METHODS
A BRIEF OVERVIEW ON DIFFERENT ANIMAL DETECTION METHODS
 
Crowd Sensing Systems A Mini Review
Crowd Sensing Systems A Mini ReviewCrowd Sensing Systems A Mini Review
Crowd Sensing Systems A Mini Review
 
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
 
Design of algorithm for detection of hidden objects from Tera hertz images
Design of algorithm for detection of hidden objects from Tera hertz imagesDesign of algorithm for detection of hidden objects from Tera hertz images
Design of algorithm for detection of hidden objects from Tera hertz images
 
bazgir2020.pdf
bazgir2020.pdfbazgir2020.pdf
bazgir2020.pdf
 
bazgir2020.pdf
bazgir2020.pdfbazgir2020.pdf
bazgir2020.pdf
 
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
 
Introduction to image processing-Class Notes
Introduction to image processing-Class NotesIntroduction to image processing-Class Notes
Introduction to image processing-Class Notes
 
IRJET- Survey on Detection of Crime
IRJET-  	  Survey on Detection of CrimeIRJET-  	  Survey on Detection of Crime
IRJET- Survey on Detection of Crime
 
15mafaz wali--final (1)
15mafaz wali--final (1)15mafaz wali--final (1)
15mafaz wali--final (1)
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
 
Survey on video object detection & tracking
Survey on video object detection & trackingSurvey on video object detection & tracking
Survey on video object detection & tracking
 
Hybrid Approach for Brain Tumour Detection in Image Segmentation
Hybrid Approach for Brain Tumour Detection in Image SegmentationHybrid Approach for Brain Tumour Detection in Image Segmentation
Hybrid Approach for Brain Tumour Detection in Image Segmentation
 
Godeye An Efficient System for Blinds
Godeye An Efficient System for BlindsGodeye An Efficient System for Blinds
Godeye An Efficient System for Blinds
 
Degree Project
Degree ProjectDegree Project
Degree Project
 
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
 

More from Journal For Research

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Journal For Research
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
Journal For Research
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Journal For Research
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
Journal For Research
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
Journal For Research
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
Journal For Research
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
Journal For Research
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
Journal For Research
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
Journal For Research
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
Journal For Research
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
Journal For Research
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Journal For Research
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
Journal For Research
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
Journal For Research
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
Journal For Research
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
Journal For Research
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
Journal For Research
 

More from Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
 

Recently uploaded

ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 

DETECTING ITEMS HIDDEN INSIDE A BODY

  • 1. Journal for Research| Volume 01| Issue 12 | February 2016 ISSN: 2395-7549 All rights reserved by www.journalforresearch.org 1 Detecting Items Hidden Inside a Body Mr. Sanjay Nag Ms. Nabanita Basu Research Scholar Research Scholar Department of Computer Science & Engineering Department of Computer Science & Engineering University of Calcutta University of Calcutta Prof.(Dr.) Samir Kumar Bandyopadhyay Professor Department of Computer Science & Engineering University of Calcutta Abstract People sometimes hide contraband inside body cavities. For instance, prison inmates and visitors may hide money or cell phones this way. Smugglers may carry drugs, and terrorists may conceal explosives inside the body. The paper proposed a method for detecting hidden item inside human body. It can detect both metal and non-metal objects and display them as images on a video screen. Keywords: Concealed Weapon Detection, Color image, and IR image _______________________________________________________________________________________________________ I. INTRODUCTION A weapon is any object that can do harm to another individual or group of individuals. This definition not only includes objects typically thought of as weapons, such as knives and firearms, but also explosives, chemicals, etc. so this harmful things need to be detect for securing general public as well as public assets like airports and buildings etc. Already used manual screening procedure sometimes gives wrong alarm indication, and fails when the object is not in the range of security personnel as well as when it is impossible to manage the flow of people through a controlled procedure. It also disappoints us when we try to identify a person who is the victim of an accident in future. We have recently witnessed the series of bomb blasts in Mumbai, Delhi, and Guwahati etc. Bombs went off in buses and underground stations. And killed many and left many injured and left the world in shell shock and the Indians in terror. This situation is not limited to India but it can happen or already happened anywhere and anytime in the world. People think bomb blasts can’t be predicted before handled. In all of these cases CWD by scanning the images gives satisfactory results. But no single sensor technology can provide acceptable performance. So we try to bring the eventual deployment of automatic detection and recognition of concealed weapons. It is a technological challenge that requires innovative solutions in sensor technologies and image processing. The problem also presents challenges in the legal arena; a number of sensors based on different phenomenology as well as image processing support are being developed to observe objects underneath people’s clothing. Now image fusion has been identified as a key technology to achieve improved CWD procedures. In our current work we focus on fusing visual and low cost IR images for CWD. Infrared images are depends on the temperature distribution information of the target to form an image. Usually the theory follows here is that the infrared radiation emitted by the human body is absorbed by clothing and then re-emitted by it. In the IR image the background is almost black with little detail because of the high thermal emissivity of body. The weapon is darker than the surrounding body due to a temperature difference between it and the body (it is colder than human body). The visual image is a mental image that is similar to a visual perception. The resolution in the visual image is much higher than that of the IR image. It is nothing but a RGB image that supports human visual perception. But there is no useful information on the concealed weapon in the visual image. The human visual system is very sensitive to colours. To utilize this ability if we apply this image with other image in fusion technique we get a better fused image that helps for detection. People sometimes hide contraband inside body cavities. For instance, prison inmates and visitors may hide money or cell phones this way. Smugglers may carry drugs, and terrorists may conceal explosives inside the body. A weapon is any object that can do harm to another individual or group of individuals. This definition not only includes objects typically thought of as weapons, such as knives and firearms, but also explosives, chemicals, etc. Contraband items include illegal drugs and any other item that is controlled or forbidden by a particular law enforcement or corrections agency. Consequently, contraband may include tobacco, any metallic object that can be used to defeat security constraints, drug paraphernalia, etc. For the computer to recognize a specific weapon or threat item, the computer will have to compare the threat item with an electronic catalog of images of uniquely-shaped threat items, and this includes images for all possible unique orientations for each unique threat item. Only catalogued images of uniquely-shaped threat items are required for comparison because no new information is obtained if a catalogued image is only a scaled replica of another catalogued image. Unique orientations, on the other hand, are important because a weapon may have a significantly different appearance if viewed from the sides, the top, etc.
  • 2. Detecting Items Hidden Inside a Body (J4R/ Volume 01 / Issue 12 / 001) All rights reserved by www.journalforresearch.org 2 Concealed weapons can be detected through various techniques which are Image Processing, Active and Passive millimeter - wave sensors, Phased Antenna array, and explosives can be detected through Signal Processing and Pattern Recognition. For the perfect effectiveness and visualization, image processing methods are generally opting. II. REVIEW WORKS Imaging techniques based on a combination of sensor technologies and processing will potentially play a key role in addressing the concealed weapon detection problem. One critical issue is the challenge of performing detection at a distance with high probability of detection and low probability of false alarm. Yet another difficulty to be surmounted is forging portable multisensory instruments. Also, detection systems go hand in hand with subsequent response by the operator, and system development should take into account the overall context of deployment [1]. Concealed Weapon using the radar image are proposed by Yu-Wen Chang ET all [2, 3] in which drawbacks such as glint and specular reflection or artifacts such as coherent interference these problems should be able to be overcome. There are many layers in processing of image which scan out the real picture of concealed material. Sensors are also very effective for the security. It helps to complete the aim of detection of weapons, explosive, chemical threats. A pulse synthesized, time domain approach relaying on Stepped Frequency Continuous Wave (SFCW) radar implemented in a phased array of antenna is proposed. Both the location of items (that support appreciable induced surface currents) concealed on the human body and the nature of these concealed item [3]. In order to detect contraband, it is important to understand their characteristics. Gozani lists the properties that are of greatest interest in identifying both drugs and explosives. For examples, drugs have following constitutes: carbon (high), oxygen (low), chlorine (moderate), and density (moderate). On the other hand for the explosives we get: carbon (moderate), nitrogen (high/moderate), oxygen (very high/ high) and density (very high). Nitrogen based explosives, rich in nitrogen (bonding agent) and oxygen (oxidizing agent) are commonly used due to their high power. The explosives also contain carbon and sometimes hydrogen as fuel. Usually, explosive device consist of two main components: an explosive agent and a detonating system. The blasting material consists primarily of inorganic nitrates and carbonaceous fuels and detonators are made of metallic tubes or shells with an initiating explosive. In case of plastic explosives, they can self -detonate due to their unstable nature. There are more than one hundred types of military and civilian explosives and around twenty commonly used drugs. A number of explosives characteristics can be used for their detection [4]. A new algorithms proposed by Zhiyun Xue et all[6] in which fuse a color visual image and a corresponding IR image for such a concealed weapon detection application in which they have great success. So fusion is an important step, we use here DWT fusion , some more improve method are there such as Chu-Hui Lee et all[13] produce a easy applications to adjust for anytime, and anywhere you like, make sure that may work and take a photograph nicely. The DWT fusion methods provide computationally ancient image fusion techniques various fusion rules for the selection and combination of sub band coefficients increase the quality perceptual and quantitatively measurable of image fusion in specific applications. For binaries the fused image there are several method[8-10] Otsu method are chosen because this method are global method and effective for this type of image. The concept of small area removal is taken from [11-14]. However, based on biological research results, the human visual system is very sensitive to colours. To utilize this ability, some researchers map three individual monochrome multispectral images to the respective channels of an RGB image to produce a false color fused image. In many cases, this technique is applied in combination with another image fusion procedure. Such a technique is sometimes called color composite fusion. we present a new technique to fuse a color visual image with a corresponding IR image for a CWD application. III.PROPOSED METHOD In our proposed technique for CWD we consider two types of image – a visual image and an IR image. Visual image is nothing but an RGB image which has three main colour components Red, Green and Blue. Since the human visual system is very sensitive to colours this image creates a natural perception of an object to human vision but not helps so much in the detection of concealed weapon. For this we consider IR image as second input. It basically depends on high thermal emissivity of the body. Basically the infrared radiation emitted by the body is absorbed by clothing and then re-emitted by it, is sensed by the infrared sensors. Due to difference in thermal emissivity we can realize the hidden object but since the background is almost black this image cannot help in CWD alone. The prosed algorithm is given below. Algorithm for Detecting Concealed Weapon: Input: X Ray Image Output: Identification of Concealed weapon 1) Step1: Read the input color or grayscale image. 2) Step2: Converts input colour image in to grayscale image which is done by forming a weighted sum of each three (RGB) component, eliminating the saturation and hue information while retaining the luminance and the image returns a grayscale colour map. 3) Step3: Resize this image in to 200 × 200 image matrix.
  • 3. Detecting Items Hidden Inside a Body (J4R/ Volume 01 / Issue 12 / 001) All rights reserved by www.journalforresearch.org 3 4) Step4: Filters the multidimensional array with the multidimensional filter. Each element of the output an integer or in array, then output elements that exceed the certain range of the integer type is shortened, and fractional values are rounded. 5) Step5: Add step2, step4 image and an integer value 45 and pass it in to a median filter to get the resultant enhanced image. 6) Step6: Computes a global threshold that can be used to convert an intensity image (Step5) to a binary image with a normalized intensity value which lies in between range 0 and 1. 7) Step7: Compute watershed segmentation by mat lab command watershed (step6 image). 8) Step8: Compute the morphological operation by two mat lab command imerode and imdilate and strel with arbitrary shape. 9) Step9: Store the size of the step 8 image into var1 and var2 i.e no. Of rows and column in pixels by[var1 var2]=size(step8 image) 10) Step10: For i=1:1:var1 do 11) Step11: For j=1:1:var2 do 12) Step12: If step8 image (i,j) == 1 do 13) Step13: step2 image (i,j) = 255 14) Step14: Else do 15) Step15: step2 image (i,j) = step2 image (i,j) * 0.3 16) Step16: End If 17) Step17: End For 18) Step18: End For 19) Step19: Convert in to binary image and traces the exterior boundaries of objects, as well as boundaries of holes inside these objects, in the binary image and into an RGB color image for the purpose of visualizing labeled regions. 20) Step20: Show only tumor portion of the image by remove the small object area. 21) Step21: Compute edge detection using sobel edge detection technique. /*Algorithm for Area Calculation of Concealed Weapon*/ 22) Step22:- Read the input color or grayscale image. 23) Step23:- Converts input colour image in to grayscale image which is done by forming a weighted sum of each three (RGB) component, eliminating the saturation and hue information while retaining the luminance and the image returns a grayscale colour map and store it into variable I. 24) Step24:- Compute numbers of rows and column in pixels by [r2 c2] = size (I) 25) Step25:- Initialize a variable A=0 For i=1:1:r2 Do Step4:- For j=1:1:c2 Do If I (i,j)==255 Do A=A+0 Else Do A=A+1 End IF End For End For 26) Step 26:-Display the area A and store the value in buffer for future processing. 27) Step 27: Take a visual image (basically, RGB image) and an infrared (IR) image as input from Disk 28) Step 28: Resize this two image so that they have same size. 29) Step 29: Combine i.e. add resized Visual and IR image. 30) Step 30: Complement the IR image. 31) Step 31: Combine i.e. add resized Visual image and complemented IR image. 32) Step 32: Convert the visual RGB image to its HSV format. 33) Step 33: Perform DWT fusion on Step 5’s combined image and Step 6’s converted HSV image. 34) Step 34: Convert the fused image into its gray scale format. 35) Step 35: Binarize the Fused image. 36) Step 36: Detect the weapon from that image. It is a technique of fusing the visual and IR image after registration. We find that the body is brighter than the background in the IR image. Also background is almost black and gives little details because of the high thermal emissivity of body. Also weapon is darker than the surrounding body due to a temperature difference between it and the body (it is colder than human body). The resolution in the visual image is much higher than that of the IR image, but there is no information on the weapon in the visual image. It is shown in Figure 1.
  • 4. Detecting Items Hidden Inside a Body (J4R/ Volume 01 / Issue 12 / 001) All rights reserved by www.journalforresearch.org 4 a) Visual image b) IR image c) Fused image with visible weapon d) Detected image with weapon highlighted Fig. 1: Concealed weapon detection Fig. 2: RGB image Fig. 3: IR image Fig. 4: Gray image Fig. 5: Combined image Fig. 6: Complemented IR Fig. 7: Combined1 image Fig. 8: HSV image Fig. 9: Fused image Fig. 10: Fused Gray Image Fig. 11: Weapon in binary image Fig. 12: Weapon in visual image Fig. 13: Contour of the Weapon image Two images in the same pose visual RGB image and IR image are shown in figure 2 and figure 3. Resize these two types of image because image fusion and addition are not able to perform if the sizes are not same. Combine basically add visual image and IR image and the result is shown in figure 4.
  • 5. Detecting Items Hidden Inside a Body (J4R/ Volume 01 / Issue 12 / 001) All rights reserved by www.journalforresearch.org 5 Actually we want to detect the hiding details from figure 5 but image from figure 4 is hazy, so we do not get enough information from figure4. Complement the IR image which is use full in the next operation and this complement image is shown in figure 6. IR image lies the intensity between 0 to 255 intensity thus complement means subtracting all matrix component from 255 and we get complemented form or reverse form of the IR image. Then add visual image and complemented IR image which is shown in figure 7. We do these steps because in this step difference between hiding details and man are recognizable. Then we convert IR image into HSV colour model and it is shown in figure8 because components of IR image are all correlated with the amount of light hitting the object, and therefore with each other, image descriptions in terms of those components make object discrimination difficult. Descriptions in terms of hue/lightness/saturation are often more relevant. After converting HSV model the image is now three components. Now we can use fusion technique because two images have the same dimension with same size. Then we use DWT fusion technique between HSV color image and combined image is shown in figure 9. The discrete wavelet transform DWT is a spatial frequency decomposition that provides a flexible multi resolution analysis of an image. In wavelet transformation due to sampling, the image size is halved in both spatial directions at each level of decomposition process thus leading to a multi1resolution signal representation. The advantages of image fusion over visual comparison of multi-modality are: (a) the fusion technique is useful to correct for variability in orientation, position and dimension; (b) it allows precise anatomic1physiologic correlation; and (c) it permits regional quantisation. Many image processing like de-noising, contrast enhancement, edge detection, segmentation, texture analysis and compression can be easily and successfully performed in the wavelet domain. Wavelet techniques thus provide a powerful set of tools for image enhancement and analysis together with a common framework for various fusion tasks. Applying fusion technique image sharpness and contrast enhanced. Then this fused image converted into gray scale image is shown in figure 9. This steps is required for the next step in which we use a binarization technique. There are several binarization techniques among them Otsu, Bernsen, savala , th-mean, niblack and iterative partitioning as a framework method are showing good result for this type of image. Here we use Otsu method which is a global Thresholding method i.e threshold value are calculated locally and get the result, no extra threshold value is added here. Extract this weapon portion by calculating all connected area component then remove too small component according to the area values. This only weapon portion binary image is shown in figure 10. Let us we want to show the weapon in the actual RGB visual image. The weapon binary images are stored into three different components because we want multiply it with three dimensional RGB image. Multiply individual element to element between two matrixes. In this step we detect weapon with visual RGB image is shown in figure 11. Contour detection is used to detect edges of weapon from the weapon binary image. Edge detection refers to the process of identifying and locating sharp discontinuities in an image. The discontinuities are abrupt changes in pixel intensity which characterize boundaries of objects in a scene. There is an extremely large number of edge detection operators available, each designed to be sensitive to certain types of edges. Here we use canny edge detection techniques. The Canny edge detection algorithm is known to many as the optimal edge detector. Canny’s edge detection algorithm is computationally more expensive compared to Sobel, Prewitt and Robert’s operator. However, the Canny’s edge detection algorithm performs better than all these operators under almost all scenarios. This contour detection of concealed weapon is shown in figure 12. Then this binarizes contour image are divided into three component and multiply as before and get contour with visual RGB image which is shown in figure 13 where we can see the concealed weapon under person clothes easily. IV.CONCLUSION In this paper we introduce a color image fusion technique for CWD where we fuse a visual RGB image and IR image. We can able to detect the weapon concealed under person’s clothes and bags. But infrared radiation can be used to show the image of a concealed weapon only when the clothing is tight, thin, and stationary. For normally loose clothing, the emitted infrared radiation will be spread over a larger clothing area, thus decreasing the ability to image a weapon. REFERENCES [1] Hua-Mei Chen, Seungsin Lee, Raghuveer M. Rao, Mohamed-Adel Slamani, and Pramod K. Varshney. : A tutorial overview of development in imaging sensors and processing. IEEE SIGNAL PROCESSING MAGAZINE, pp.52-61, MARCH 2005. [2] Yu-Wen Chang ; Michael Johnson. : Portable Concealed Weapon Detection Using Millimeter Wave FMCW Radar Imaging. Federal funds provided by the U.S. Department of Justice August 30, 2001. [3] Z. Xue, R. S. Blum, and Y. Li. : Fusion of Visual and IR Images for Concealed Weapon Detection1. U. S. Army Research Office under grant number DAAD19-00-1-0431, pp 1198-1205. [4] Sudipta Roy and Prof. Samir K. Bandyopadhyay. : Visual Image Based Hand Recognitions. Asian JournalOf Computer Science And Information Technolog(AJCSIT)y1:4 (2011), pp.106 – 110. http://innovativejournal.in/index.php/ajcsit/article/view/94 [5] Mohamed-Adel Slamani , Pramod K. Varshney , David D. Ferris. : Survey of Image Processing Techniques Applied to the Enhancement and Detection of Weapons in MMW Data. SPIE Vol. 4719 (2002). [6] Zhiyun Xue, Rick S. Blum. : Concealed Weapon Detection Using Color Image Fusion. ISIF, pp-622-627,2003. [7] R. C. Gonzalez, R. E. Woods. : Digital Image Processing. Second Edition, Prentice Hall, New Jersey 2002. [8] Otsu, N.: A threshold selection method from gray-level histogram. IEEE Trans. Syst. Man Cybern. 9, 62–66 (1979) [9] Niblack,W.: An Introduction to Digital Image Processing. pp. 115–116. Prentice Hall, Eaglewood Cliffs (1986) [10] Sauvola, J., Pietikainen, M.: Adaptive document image binarization. Pattern Recogn. 33(2), 225–236 (2000)
  • 6. Detecting Items Hidden Inside a Body (J4R/ Volume 01 / Issue 12 / 001) All rights reserved by www.journalforresearch.org 6 [11] Manjusha Deshmukh, Udhav Bhosale.: Image Fusion and Image Quality Assessment of Fused Images. International Journal of Image Processing (IJIP), pp. 484-508, Volume (4): Issue (5). [12] M. Aguilar, and J. R. New. : Fusion of multi-modality volumetric medical imagery. ISIF 2002, pp. 1206-1212. [13] Sudipta Roy, Prof. Samir K. Bandyopadhyay, “Contour Detection of Human Knee”, International Journal of Computer Science Engineering and Technology (IJCSET) ,September 2011 , Vol 1, Issue 8,pp. 484-487. [14] Chu-Hui Lee and Zheng-Wei Zhou . : Comparison of Image Fusion based on DCT-STD and DWT-STD. Proceedings of the International Multiconference of Engineers and computer scientists 2012, vol me, IMECS 2012, Hong Kong.