Skip to main content

A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection Systems

  • Conference paper
  • First Online:
  • 1490 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 514))

Abstract

In this paper, we discuss different types of threat assessment approaches for use in surveillance systems. We look at each method separately from others with the aim of showing the evolvement of the technology. A detailed description and an in-depth look at current research are conducted in order to give a more concise review. Doing an in-depth individual analysis of each method allows for a better comparison approach with other methods. We also look at the advantages and disadvantages of each approach and compare it with other methods in order to get a better sense of the performance of the technique as compared to others. A discussion on a benchmark comparison of these methods is also given and a few recommendations are presented along with our proposed approach.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bonanno CM, Levenson RL Jr (2014) School shooters: history, current theoretical and empirical findings, and strategies for prevention. Sage Open 4(1):2158244014525425

    Article  Google Scholar 

  2. Agurto A, Li Y, Tian GY, Bowring N, Lockwood S (2007) A review of concealed weapon detection and research in perspective. In: 2007 IEEE international conference on networking, sensing and control. IEEE, pp 443–448

    Google Scholar 

  3. Parande M, Soma S (2013) Concealed weapon detection in a human body by infrared imaging. Int J Sci Res 4(9):182–188

    Google Scholar 

  4. Roomi MM, Rajashankari R (2012) Detection of concealed weapons in X-ray images using Fzz K-NN. Int J Comput Sci Eng Inf Technol (IJCSEIT) 2(2):187–19

    Google Scholar 

  5. Parande M, Soma S (2015) Concealed weapon detection in a human body by infrared imaging

    Google Scholar 

  6. Xue Z, Blum RS, Li Y (2002) Fusion of visual and IR images for concealed weapon detection. In: Proceedings of the fifth international conference on information fusion, 2002, vol 2. IEEE, pp 1198–1205

    Google Scholar 

  7. Cho S, Tin N (2010) Using infrared imaging technology for concealed weapons detection and visualization, Fukuoka, 2010

    Google Scholar 

  8. Zhang Z, Blum RS (1997) Region-based image fusion scheme for concealed weapon detection. In: Proceedings of the 31st annual conference on information sciences and systems, pp 168–173

    Google Scholar 

  9. Xue Z, Blum RS (2003) Concealed weapon detection using color image fusion. In: Proceedings of the 6th international conference on information fusion, vol 1, pp 622–627

    Google Scholar 

  10. Nair BM, Kendricks KD (2016) Deep network for analyzing gait patterns in low resolution video towards threat identification. Electron Imaging 2016(11):1–8

    Article  Google Scholar 

  11. Stevenage V, Nixon MS, Carter JN, Cunado D, Huang PS (1999) In: Jain A, Bolle R, Pankanti S (eds) Biometrics: personal identification in a networked society. Kluwer Academic Publishing, Dordrecht, pp 231–250

    Google Scholar 

  12. Jain AK, Bolle R, Pankanti S (eds) (1999) Biometrics: personal identification in a networked society. Kluwer Academic Publishing, Dordrecht, pp 231–250

    Google Scholar 

  13. Razali NS, Manaf AA (2011) Gait analysis for criminal identification based on motion capture

    Google Scholar 

  14. BenAbdelkader C, Davis L (2002) Detection of people carrying objects: a motion-based recognition approach. In: Proceedings fifth IEEE international conference on automatic face and gesture recognition, 2002. IEEE, pp 378–383

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dustin van der Haar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mhou, K., van der Haar, D. (2019). A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection Systems. In: Kim, K., Baek, N. (eds) Information Science and Applications 2018. ICISA 2018. Lecture Notes in Electrical Engineering, vol 514. Springer, Singapore. https://doi.org/10.1007/978-981-13-1056-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1056-0_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1055-3

  • Online ISBN: 978-981-13-1056-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics