Home A Multi-Thresholding Method Based on Otsu’s Algorithm for the Detection of Concealed Threats in Passive Millimeter-Wave Images
Article
Licensed
Unlicensed Requires Authentication

A Multi-Thresholding Method Based on Otsu’s Algorithm for the Detection of Concealed Threats in Passive Millimeter-Wave Images

  • Hakan Işıker and Caner Özdemir ORCID logo EMAIL logo
Published/Copyright: May 9, 2019
Become an author with De Gruyter Brill

Abstract

In this study, an algorithm to the detection and imaging of hidden arms for passive millimeter-wave (PMMW) imaging systems is proposed. This technique is; in fact, an improved version of our previously developed auto-classification algorithm by extending it by exploiting the Otsus multi-level thresholding method. The detailed derivation and the brief steps of the proposed algorithm are given. The proposed algorithm is tested and validated by real PMMW images obtained by a real radiometric imaging system. Resultant measured images are obtained with the employment of signal and image processing procedures of the suggested technique. It is demonstrated by the constructed PMMW images that proposed technique successfully detects a concealed metal threat and also predicts its size by drawing the shape outline based on Otsus multi-level thresholding routine that was specially tailored to our auto-classification technique.

Acknowledgements

This work was supported by Mersin University Scientific Research Unit under Project No. 2017-1-TP3-2129. The authors are also grateful to Dr İlhami Ünal, Mr Mustafa Kılıç and Mr Mustafa Tekbaş for his help during the experiments.

References

[1] L. Yujiri, M. Shoucri, and P. Moffa, “Passive millimeter-wave imaging,” IEEE Microw. Mag., vol. 4, pp. 39–50, 2003. doi:10.1109/mmw.2003.1237476.Search in Google Scholar

[2] S. Yeom, D.-S. Lee, Y. Jang, M.-K. Lee, and S.-W. Jung, “Real-time concealed-object detection and recognition with passive millimeter wave imaging,” Opt. Express, vol. 20, pp. 9371, 2012. doi:10.1364/oe.20.009371.Search in Google Scholar

[3] A. Agurto, Y. Li, G. Y. Tian, N. Bowring, and S. Lockwood, “A review of concealed weapon detection and research in perspective,” in 2007 IEEE International Conference on Networking, Sensing and Control. doi:10.1109/icnsc.2007.372819Search in Google Scholar

[4] C. Zheng, X. Yao, A. Hu, and J. Miao, “Initial results of a passive millimeter-wave imager used for concealed weapon detection Bhu-2D-U,” Prog. Electromagnet. Res. C, vol. 43, pp. 151–163, 2013. doi:10.2528/pierc13062801.Search in Google Scholar

[5] X. Shi and M. Yang, “Development of passive millimeter wave imaging for concealed weapon detection indoors,” Microw. Opt. Technol. Lett., vol. 56, pp. 1701–1706, 2014. doi:10.1002/mop.28420.Search in Google Scholar

[6] D. Sheen, D. Mcmakin, and T. Hall, “Three-dimensional millimeter-wave imaging for concealed weapon detection,” IEEE Trans. Microw. Theory Tech., vol. 49, pp. 1581–1592, 2001. doi:10.1109/22.942570.Search in Google Scholar

[7] R. Li, C. Li, H. Li, S. Wu, and G. Fang, “Study of automatic detection of concealed targets in passive terahertz images for intelligent security screening,” IEEE Trans. Terahertz Sci. Technol, vol. 9, pp. 165–176, 2019. doi:10.1109/TTHZ.2018.2889407.Search in Google Scholar

[8] D. Herranz and P. Vielva, “Cosmic microwave background images,” IEEE Signal Process Mag., vol. 27, pp. 67, 2010. doi:10.1109/msp.2009.934716.Search in Google Scholar

[9] M. E. Tiuri, “Radio astronomy receivers,” IEEE Trans. Mil. Electron., vol. 8, pp. 264–272, 1964. doi:10.1109/tme.1964.4323154.Search in Google Scholar

[10] B. Sankur, “Survey over image thresholding techniques and quantitative performance evaluation,” J. Electron. Imaging, vol. 13, pp. 146, 2004. doi:10.1117/1.1631315.Search in Google Scholar

[11] N. R. Pal and S. K. Pal, “A review on image segmentation techniques,” Pattern Recognit., vol. 26, pp. 1277–1294, 1993. doi:10.1016/0031-3203(93)90135-j.Search in Google Scholar

[12] S. López-Tapia, R. Molina, and N. Pérez De La Blanca, “Using machine learning to detect and localize concealed objects in passive millimeter-wave images,” Eng. Appl. Artif. Intell., vol. 67, pp. 81–90, 2018. doi:10.1016/j.engappai.2017.09.005.Search in Google Scholar

[13] V. Dey, Y. Zhang, and M. Zhong, “A review on image segmentation techniques with remote sensing perspective,” in Proceedings of ISPRS TC VII Symposium – 100 Years ISPRS, Vienna, Austria, July 2010, 31–42Search in Google Scholar

[14] T. Brox and J. Weickert, “Level set segmentation with multiple regions,” IEEE Trans. Image Proces., vol. 15, pp. 3213–3218, 2006. doi:10.1109/tip.2006.877481.Search in Google Scholar PubMed

[15] J. Shi and J. Malik, “Normalized cuts and image segmentation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, pp. 888–905, 2000. doi:10.1109/34.868688.Search in Google Scholar

[16] L. Grady, “Random walks for image segmentation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, pp. 1768–1783, 2006. doi:10.1109/tpami.2006.233.Search in Google Scholar PubMed

[17] L. Yuanjiang, Y. WeiYang, J. F. Chen, M. Gong, Y. Zhang, and F. Li, “A visible and passive millimeter wave image fusion algorithm based on pulse-coupled neural network in tetrolet domain for early risk warning,” Math. Prob. Eng., vol. 2018, pp. 1–11, 2018. Article ID 4205308. doi:10.1155/2018/4205308.Search in Google Scholar

[18] M.-H. Bisjerdi and M.-R. Mosavi, “An optimal algorithm for fusion of passive millimeter wave and visible images based on non-subsampled shearlet transform and improved spiking cortical model,” Wirel. Pers. Commun., vol. 103, pp. 2599–2620, 2018. doi:10.1007/s11277-018-5950-8.Search in Google Scholar

[19] H. Zong, L. Bao, B. Liu, and J. Qiu, “Application of convolutional neural network in target detection of millimeter wave imaging,” in 2018 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, Boston, MA, 1217–1218. doi:10.1109/APUSNCURSINRSM.2018.8608485Search in Google Scholar

[20] Z. Ou, H. Geng, X. Zheng, H. Ma, and Y. Yu, “Segmentation of concealed objects in active terahertz images,” in 2018 IEEE International Conference on Imaging Systems and Techniques (IST), Krakow, 1–5. doi:10.1109/IST.2018.8577111Search in Google Scholar

[21] S. López-Tapia, R. Molina, and N. P. de la Blanca, “Using machine learning to detect and localize concealed objects in passive millimeter-wave images,” Eng. Appl. Artif. Intell., vol. 67, pp. 81–90, 2018. doi:10.1016/j.engappai.2017.09.005.Search in Google Scholar

[22] P. Roy, S. Dutta, N. Dey, G. Dey, S. Chakraborty, and R. Ray, “Adaptive thresholding: A comparative study,” in 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kanyakumari, 1182–1186. doi:10.1109/ICCICCT.2014.6993140.Search in Google Scholar

[23] J. Chaki, N. Dey, F. Shi, and R. S. Sherratt, “Pattern mining approaches used in sensor-based biometric recognition: A review,” IEEE Sens. J., vol. 19, pp. 3569–3580, 2019. doi:10.1109/JSEN.2019.2894972.Search in Google Scholar

[24] H. Işiker, I. Ünal, M. Tekbaş, and C. Özdemir, “An auto-classification procedure for concealed weapon detection in millimeter-wave radiometric imaging systems,” Microw. Opt. Technol. Lett., vol. 60, pp. 583–594, 2018. doi:10.1002/mop.31005.Search in Google Scholar

[25] N. Otsu, “A threshold selection method from gray-level histograms,” IEEE Trans. Syst. Man. Cybern., vol. 9, pp. 62–66, 1979. doi:10.1109/tsmc.1979.4310076.Search in Google Scholar

[26] M. Sezgin and B. Sankur, “Survey over image thresholding techniques and quantitative performance evaluation,” J. Electron. Imaging, vol. 13, no. 1, pp. 146–165, 2004. doi:10.1117/1.1631315.Search in Google Scholar

[27] P. Liao, T. Chen, and P. Chung, “A fast algorithm for multilevel thresholding,” J. Inf. Sci. Eng., vol. 17, pp. 713–727, 2001.Search in Google Scholar

[28] J. Xiong, S. Li, J. Yang et al., “A novel Otsu method based on prior area information for concealed target detection in PMMW images,” Proc. MATEC Web Conf. ICFST, vol. 59, pp. 1–5, May 2016. doi:10.1051/matecconf/20165908002.Search in Google Scholar

[29] D. Huang and C. Wang, “Optimal multi-level thresholding using a two-stage Otsu optimization approach,” Pattern Recogn. Lett., vol. 30, pp. 275–284, 2009. doi:10.1016/j.patrec.2008.10.003.Search in Google Scholar

[30] J. Canny, “A computational approach to edge detection,” IEEE Trans. Pattern Anal. Mach. Intell., vol. PAMI-8, pp. 679–698, 1986. doi:10.1109/tpami.1986.4767851.Search in Google Scholar

[31] A. Vertiy, S. Ozbek, A. Pavlyuchenko, et al., “Passive radiometric imaging systems in millimeter wavelength range,” in 2011 IEEE International Symposium on Antennas and Propagation (APSURSI), Spokane, WA, July. 2011, 2111–2114. doi:10.1109/APS.2011.5996927Search in Google Scholar

[32] H. Işiker, C. Özdemir, and İ. Ünal, “Millimeter-wave band radiometric imaging experiments for the detection of concealed objects,” in Proceedings of 2015 IEEE Radar Conference, Johannesburg, South Africa, Oct. 2015, 23–26. doi:10.1109/RadarConf.2015.7411847Search in Google Scholar

[33] R. Appleby and H. Wallace, “Standoff detection of weapons and contraband in the 100 GHz to 1 THz region,” IEEE Trans. Antennas Propag., vol. 55, pp. 2944–2956, 2007. doi:10.1109/tap.2007.908543.Search in Google Scholar

[34] R. Dicke, “The measurement of thermal radiation at microwave frequencies,” Rev. Sci. Instrum., vol. 17, pp. 268–275, 1946. doi:10.1063/1.1770483.Search in Google Scholar PubMed

[35] L. Gilreath, V. Jain, and P. Heydari, “Design and analysis of a W-band SiGe direct-detection-based passive imaging receiver,” IEEE J. Solid-State Circuits, vol. 46, pp. 2240–2252, 2011. doi:10.1109/jssc.2011.2162792.Search in Google Scholar

[36] D. Lioubtchenko, S. Dudorov, J. Mallat et al., “Dielectric rod waveguide antenna for W band with good input match,” IEEE Microw. Wirel. Compon. Lett., vol. 15. pp. 4–6, 2005. doi:10.1109/lmwc.2004.840946.Search in Google Scholar

Received: 2018-12-17
Published Online: 2019-05-09
Published in Print: 2019-05-27

© 2019 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 11.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/freq-2018-0255/html
Scroll to top button