Abstract
In this paper, we discuss different types of threat assessment approaches for use in surveillance systems. We look at each method separately from others with the aim of showing the evolvement of the technology. A detailed description and an in-depth look at current research are conducted in order to give a more concise review. Doing an in-depth individual analysis of each method allows for a better comparison approach with other methods. We also look at the advantages and disadvantages of each approach and compare it with other methods in order to get a better sense of the performance of the technique as compared to others. A discussion on a benchmark comparison of these methods is also given and a few recommendations are presented along with our proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bonanno CM, Levenson RL Jr (2014) School shooters: history, current theoretical and empirical findings, and strategies for prevention. Sage Open 4(1):2158244014525425
Agurto A, Li Y, Tian GY, Bowring N, Lockwood S (2007) A review of concealed weapon detection and research in perspective. In: 2007 IEEE international conference on networking, sensing and control. IEEE, pp 443–448
Parande M, Soma S (2013) Concealed weapon detection in a human body by infrared imaging. Int J Sci Res 4(9):182–188
Roomi MM, Rajashankari R (2012) Detection of concealed weapons in X-ray images using Fzz K-NN. Int J Comput Sci Eng Inf Technol (IJCSEIT) 2(2):187–19
Parande M, Soma S (2015) Concealed weapon detection in a human body by infrared imaging
Xue Z, Blum RS, Li Y (2002) Fusion of visual and IR images for concealed weapon detection. In: Proceedings of the fifth international conference on information fusion, 2002, vol 2. IEEE, pp 1198–1205
Cho S, Tin N (2010) Using infrared imaging technology for concealed weapons detection and visualization, Fukuoka, 2010
Zhang Z, Blum RS (1997) Region-based image fusion scheme for concealed weapon detection. In: Proceedings of the 31st annual conference on information sciences and systems, pp 168–173
Xue Z, Blum RS (2003) Concealed weapon detection using color image fusion. In: Proceedings of the 6th international conference on information fusion, vol 1, pp 622–627
Nair BM, Kendricks KD (2016) Deep network for analyzing gait patterns in low resolution video towards threat identification. Electron Imaging 2016(11):1–8
Stevenage V, Nixon MS, Carter JN, Cunado D, Huang PS (1999) In: Jain A, Bolle R, Pankanti S (eds) Biometrics: personal identification in a networked society. Kluwer Academic Publishing, Dordrecht, pp 231–250
Jain AK, Bolle R, Pankanti S (eds) (1999) Biometrics: personal identification in a networked society. Kluwer Academic Publishing, Dordrecht, pp 231–250
Razali NS, Manaf AA (2011) Gait analysis for criminal identification based on motion capture
BenAbdelkader C, Davis L (2002) Detection of people carrying objects: a motion-based recognition approach. In: Proceedings fifth IEEE international conference on automatic face and gesture recognition, 2002. IEEE, pp 378–383
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mhou, K., van der Haar, D. (2019). A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection Systems. In: Kim, K., Baek, N. (eds) Information Science and Applications 2018. ICISA 2018. Lecture Notes in Electrical Engineering, vol 514. Springer, Singapore. https://doi.org/10.1007/978-981-13-1056-0_21
Download citation
DOI: https://doi.org/10.1007/978-981-13-1056-0_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1055-3
Online ISBN: 978-981-13-1056-0
eBook Packages: EngineeringEngineering (R0)