SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
A
Technical Seminar
on
CONCEALED WEAPON DETECTION USING DIGITAL
IMAGE PROCESSING
in
Vivekananda Institute of Technology and Science
Electronics and Communication Engineering
Guide: Presented by:
Mrs. G. Jamuna Ms. G. Amala
Assistant professor 19N61A0401
CONTENT
• Introduction
• Proposed methods
• Image sensors
• Imaging processing architecture
• Algorithm
• Challenges
• Conclusions
INTRODUCTION
• In the present scenario, bomb blasts are rampant all around the world. Bombs
went of in buses and underground stations, killed many and left many injured.
Bomb blasts can not be predicted beforehand. This report is all about the
technology which predicts the suicide bombers and explosion of weapons through
“CONCEALED WEAPON DETECTION USING DIGITALIMAGE
PROCESSING”
• The detection of weapons concealed underneath a person’s clothing is very
much important to the improvement of the security of the general public as well as
the safety of public assets like airports, buildings, and railway stations etc.
• It is desirable sometimes to be able to detect concealed weapons from a standoff
distance
Proposed method
• In our proposed technique for CWD we consider two types of image - a visual
image and an IR image. Visual image is nothing but an RGB image which has
three main color components Red, Green and Blue
• we consider IR image as second input. It basically depends on high thermal
emissivity of the body. Basically the infrared radiation emitted by the body is
absorbed by clothing and then re-emitted by it, is sensed by the infrared sensors.
RGB image (visual image) & IR image
Resize two input images:
• Since these two input images are taken from two different image
sensing devices so they are of different size. So we first resize these
two types of images because the image fusion and other operations are
not possible if the sizes are not same
Combine two images
• Perform the addition operation between visual and IR (visual + IR) images to
get the Iv_IR image. But the resultant image does not give enough
information.Then we complement the IR image (IIR_c) to remove the
background darkness.
• Then add visual image and complemented IR image (visual + complemented
IR) and get a resultant image which is denoted by Iv_IR_c.
Conversion of IR to HSV
• we convert IR image into HSV colour model (IIR_HSV) because
components of IR image are all correlated with the amount of light
hitting the object, and therefore with each other, image descriptions in
terms of those components make object discrimination difficult.
Descriptions in terms of hue/lightness/saturation are often more
relevant.
Fused two images
• After converting HSV model the image is now three components. Now we
can use fusion technique because two images have the same dimension with
same size and we use DWT fusion technique between HSV colour image
(IIR_HSV) and combined image Iv_IR_c
Algoritham:
• Step 1: Take a visual image (basically, RGB image) and an infrared (IR)
image as input.
• Step 2: Resize this two image so that they have same size.
• Step 3: Combine i.e. add resized Visual and IR image.
• Step 4: Complement the IR image.
• Step5: Combine i.e. add resized Visual image and complemented IR image.
• Step 6: Convert the visual RGB image to its HSV format.
• Step 7: Perform DWT fusion on Step 5’s combined image and Step 6’s
converted HSV image.
• Step 8: Convert the fused image into its gray scale format.
• Step 9: Binarize the Fused image.
• Step 10: Detect the weapon from that image.
• Step 11: Combine this detected weapon with visual image.
• Step 12: For detecting the weapon clearly we find out the contour of the
weapon.
• Step 13: Then combine the contour of the weapon with visual image.
• Step 14: End
IMAGING SENSORS:
• INFRARED IMAGER : Infrared imagers utilize the temperature distribution
information of the target to form an image. infrared radiation can be used to show the
image of a concealed weapon only when the clothing is tight, thin, and stationary.
• P M W IMAGING SENSORS : Passive millimeter wave (MMW) sensors measure the
apparent temperature through the energy that is emitted or reflected by sources. .
Clothing penetration for concealed weapon detection is made possible by MMW
sensors due to the low emissive and high reflectivity of objects like metallic guns
An imaging processing architecture overview for CWD
CHALLENGES:
• There are several challenges ahead. One critical issue is the challenge
of performing detection at a distance with high probability of
detection and low probability of false alarm. Yet another difficulty to
be surmounted is forging portable multi-sensor instruments. Also,
detection systems go hand in hand with subsequent response by the
operator, and system development should take into account the overall
context of deployment.
CONCLUSION:
• In this report I introduce a color image fusion technique for CWD where
we fuse a visual RGB image and IR image. Wecan able to detect the
weapon concealed under person’s clothes and bags. But infrared radiation
can be used to show the image of a concealed weapon only when the
clothing is tight, thin, and stationary. For normally loose clothing, the
emitted infrared radiation will be spread over a larger clothing area, thus
decreasing the ability to image a weapon. To solve this problem some more
research should be done on CWD.
REFERENCES & BIBLIOGRAPHY:
• N. G. Paulter, “Guide to the technologies of concealed weapon
imaging and detection,” NIJ Guide 602-00,2001
• An Article from “IEEE SIGNAL PROCESSING MAGAZINE” March 2005
pp. 52-61
• R. C. Gonzalez, R. E. Woods, “Digital Image Processing”, Second
Edition, Prentice Hall, New Jersey 2002.
THANK YOU

Contenu connexe

Similaire à Amala ppt.pptx

DreamPose: Fashion Image to Video Synthesis via Stable Diffusion
DreamPose: Fashion Image to Video Synthesis via Stable DiffusionDreamPose: Fashion Image to Video Synthesis via Stable Diffusion
DreamPose: Fashion Image to Video Synthesis via Stable Diffusiondrawais8
 
Goal location prediction based on deep learning using RGB-D camera
Goal location prediction based on deep learning using RGB-D cameraGoal location prediction based on deep learning using RGB-D camera
Goal location prediction based on deep learning using RGB-D camerajournalBEEI
 
3-d interpretation from single 2-d image III
3-d interpretation from single 2-d image III3-d interpretation from single 2-d image III
3-d interpretation from single 2-d image IIIYu Huang
 
Deep VO and SLAM
Deep VO and SLAMDeep VO and SLAM
Deep VO and SLAMYu Huang
 
Dental digital radiography
Dental digital radiographyDental digital radiography
Dental digital radiographyhasan al ameeri
 
Motion analysis in video surveillance using edge detection techniques
Motion analysis in video surveillance using edge detection techniquesMotion analysis in video surveillance using edge detection techniques
Motion analysis in video surveillance using edge detection techniquesIOSR Journals
 
3-d interpretation from single 2-d image IV
3-d interpretation from single 2-d image IV3-d interpretation from single 2-d image IV
3-d interpretation from single 2-d image IVYu Huang
 
A Smart Target Detection System using Fuzzy Logic and Background Subtraction
A Smart Target Detection System using Fuzzy Logic and Background SubtractionA Smart Target Detection System using Fuzzy Logic and Background Subtraction
A Smart Target Detection System using Fuzzy Logic and Background SubtractionIRJET Journal
 
Image processing
Image processingImage processing
Image processingkamal330
 
Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...IRJET Journal
 
Intrusion Tracking, Recognition and Destruction for Surveillance and Security
Intrusion Tracking, Recognition and Destruction for Surveillance and SecurityIntrusion Tracking, Recognition and Destruction for Surveillance and Security
Intrusion Tracking, Recognition and Destruction for Surveillance and SecurityIRJET Journal
 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdfmokamojah
 
Chap_1_Digital_Image_Fundamentals_DD (2).pdf
Chap_1_Digital_Image_Fundamentals_DD (2).pdfChap_1_Digital_Image_Fundamentals_DD (2).pdf
Chap_1_Digital_Image_Fundamentals_DD (2).pdfMrNeon5
 
Virtual retinal-display ppt
Virtual retinal-display pptVirtual retinal-display ppt
Virtual retinal-display pptRohithasangaraju
 
detection and disabling of digital camera
detection and disabling of digital cameradetection and disabling of digital camera
detection and disabling of digital cameraVipin R Nair
 
3D Imaging for Digital Heritage Preservation and Project Collaboration
3D Imaging for Digital Heritage Preservation and Project Collaboration3D Imaging for Digital Heritage Preservation and Project Collaboration
3D Imaging for Digital Heritage Preservation and Project CollaborationDavidLandrecht
 
IRJET-Implementation of Image Processing using Augmented Reality
IRJET-Implementation of Image Processing using Augmented RealityIRJET-Implementation of Image Processing using Augmented Reality
IRJET-Implementation of Image Processing using Augmented RealityIRJET Journal
 

Similaire à Amala ppt.pptx (20)

DreamPose: Fashion Image to Video Synthesis via Stable Diffusion
DreamPose: Fashion Image to Video Synthesis via Stable DiffusionDreamPose: Fashion Image to Video Synthesis via Stable Diffusion
DreamPose: Fashion Image to Video Synthesis via Stable Diffusion
 
Goal location prediction based on deep learning using RGB-D camera
Goal location prediction based on deep learning using RGB-D cameraGoal location prediction based on deep learning using RGB-D camera
Goal location prediction based on deep learning using RGB-D camera
 
3-d interpretation from single 2-d image III
3-d interpretation from single 2-d image III3-d interpretation from single 2-d image III
3-d interpretation from single 2-d image III
 
Augumented reallity
Augumented reallityAugumented reallity
Augumented reallity
 
Deep VO and SLAM
Deep VO and SLAMDeep VO and SLAM
Deep VO and SLAM
 
Dental digital radiography
Dental digital radiographyDental digital radiography
Dental digital radiography
 
Motion analysis in video surveillance using edge detection techniques
Motion analysis in video surveillance using edge detection techniquesMotion analysis in video surveillance using edge detection techniques
Motion analysis in video surveillance using edge detection techniques
 
D04432528
D04432528D04432528
D04432528
 
3-d interpretation from single 2-d image IV
3-d interpretation from single 2-d image IV3-d interpretation from single 2-d image IV
3-d interpretation from single 2-d image IV
 
A Smart Target Detection System using Fuzzy Logic and Background Subtraction
A Smart Target Detection System using Fuzzy Logic and Background SubtractionA Smart Target Detection System using Fuzzy Logic and Background Subtraction
A Smart Target Detection System using Fuzzy Logic and Background Subtraction
 
Image processing
Image processingImage processing
Image processing
 
Digital image processing
Digital image processingDigital image processing
Digital image processing
 
Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...
 
Intrusion Tracking, Recognition and Destruction for Surveillance and Security
Intrusion Tracking, Recognition and Destruction for Surveillance and SecurityIntrusion Tracking, Recognition and Destruction for Surveillance and Security
Intrusion Tracking, Recognition and Destruction for Surveillance and Security
 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
 
Chap_1_Digital_Image_Fundamentals_DD (2).pdf
Chap_1_Digital_Image_Fundamentals_DD (2).pdfChap_1_Digital_Image_Fundamentals_DD (2).pdf
Chap_1_Digital_Image_Fundamentals_DD (2).pdf
 
Virtual retinal-display ppt
Virtual retinal-display pptVirtual retinal-display ppt
Virtual retinal-display ppt
 
detection and disabling of digital camera
detection and disabling of digital cameradetection and disabling of digital camera
detection and disabling of digital camera
 
3D Imaging for Digital Heritage Preservation and Project Collaboration
3D Imaging for Digital Heritage Preservation and Project Collaboration3D Imaging for Digital Heritage Preservation and Project Collaboration
3D Imaging for Digital Heritage Preservation and Project Collaboration
 
IRJET-Implementation of Image Processing using Augmented Reality
IRJET-Implementation of Image Processing using Augmented RealityIRJET-Implementation of Image Processing using Augmented Reality
IRJET-Implementation of Image Processing using Augmented Reality
 

Dernier

Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 

Dernier (20)

Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 

Amala ppt.pptx

  • 1. A Technical Seminar on CONCEALED WEAPON DETECTION USING DIGITAL IMAGE PROCESSING in Vivekananda Institute of Technology and Science Electronics and Communication Engineering Guide: Presented by: Mrs. G. Jamuna Ms. G. Amala Assistant professor 19N61A0401
  • 2. CONTENT • Introduction • Proposed methods • Image sensors • Imaging processing architecture • Algorithm • Challenges • Conclusions
  • 3. INTRODUCTION • In the present scenario, bomb blasts are rampant all around the world. Bombs went of in buses and underground stations, killed many and left many injured. Bomb blasts can not be predicted beforehand. This report is all about the technology which predicts the suicide bombers and explosion of weapons through “CONCEALED WEAPON DETECTION USING DIGITALIMAGE PROCESSING” • The detection of weapons concealed underneath a person’s clothing is very much important to the improvement of the security of the general public as well as the safety of public assets like airports, buildings, and railway stations etc.
  • 4. • It is desirable sometimes to be able to detect concealed weapons from a standoff distance Proposed method • In our proposed technique for CWD we consider two types of image - a visual image and an IR image. Visual image is nothing but an RGB image which has three main color components Red, Green and Blue • we consider IR image as second input. It basically depends on high thermal emissivity of the body. Basically the infrared radiation emitted by the body is absorbed by clothing and then re-emitted by it, is sensed by the infrared sensors.
  • 5. RGB image (visual image) & IR image
  • 6. Resize two input images: • Since these two input images are taken from two different image sensing devices so they are of different size. So we first resize these two types of images because the image fusion and other operations are not possible if the sizes are not same
  • 7. Combine two images • Perform the addition operation between visual and IR (visual + IR) images to get the Iv_IR image. But the resultant image does not give enough information.Then we complement the IR image (IIR_c) to remove the background darkness. • Then add visual image and complemented IR image (visual + complemented IR) and get a resultant image which is denoted by Iv_IR_c.
  • 8. Conversion of IR to HSV • we convert IR image into HSV colour model (IIR_HSV) because components of IR image are all correlated with the amount of light hitting the object, and therefore with each other, image descriptions in terms of those components make object discrimination difficult. Descriptions in terms of hue/lightness/saturation are often more relevant.
  • 9. Fused two images • After converting HSV model the image is now three components. Now we can use fusion technique because two images have the same dimension with same size and we use DWT fusion technique between HSV colour image (IIR_HSV) and combined image Iv_IR_c
  • 10. Algoritham: • Step 1: Take a visual image (basically, RGB image) and an infrared (IR) image as input. • Step 2: Resize this two image so that they have same size. • Step 3: Combine i.e. add resized Visual and IR image. • Step 4: Complement the IR image. • Step5: Combine i.e. add resized Visual image and complemented IR image. • Step 6: Convert the visual RGB image to its HSV format. • Step 7: Perform DWT fusion on Step 5’s combined image and Step 6’s converted HSV image. • Step 8: Convert the fused image into its gray scale format. • Step 9: Binarize the Fused image. • Step 10: Detect the weapon from that image. • Step 11: Combine this detected weapon with visual image. • Step 12: For detecting the weapon clearly we find out the contour of the weapon. • Step 13: Then combine the contour of the weapon with visual image. • Step 14: End
  • 11. IMAGING SENSORS: • INFRARED IMAGER : Infrared imagers utilize the temperature distribution information of the target to form an image. infrared radiation can be used to show the image of a concealed weapon only when the clothing is tight, thin, and stationary. • P M W IMAGING SENSORS : Passive millimeter wave (MMW) sensors measure the apparent temperature through the energy that is emitted or reflected by sources. . Clothing penetration for concealed weapon detection is made possible by MMW sensors due to the low emissive and high reflectivity of objects like metallic guns
  • 12. An imaging processing architecture overview for CWD
  • 13. CHALLENGES: • There are several challenges ahead. One critical issue is the challenge of performing detection at a distance with high probability of detection and low probability of false alarm. Yet another difficulty to be surmounted is forging portable multi-sensor instruments. Also, detection systems go hand in hand with subsequent response by the operator, and system development should take into account the overall context of deployment.
  • 14. CONCLUSION: • In this report I introduce a color image fusion technique for CWD where we fuse a visual RGB image and IR image. Wecan able to detect the weapon concealed under person’s clothes and bags. But infrared radiation can be used to show the image of a concealed weapon only when the clothing is tight, thin, and stationary. For normally loose clothing, the emitted infrared radiation will be spread over a larger clothing area, thus decreasing the ability to image a weapon. To solve this problem some more research should be done on CWD.
  • 15. REFERENCES & BIBLIOGRAPHY: • N. G. Paulter, “Guide to the technologies of concealed weapon imaging and detection,” NIJ Guide 602-00,2001 • An Article from “IEEE SIGNAL PROCESSING MAGAZINE” March 2005 pp. 52-61 • R. C. Gonzalez, R. E. Woods, “Digital Image Processing”, Second Edition, Prentice Hall, New Jersey 2002.