Skip to main content

Advertisement

Log in

An optimal deep learning model for recognition of hidden hazardous weapons in terahertz and millimeter wave images

  • Research
  • Published:
Earth Science Informatics Aims and scope Submit manuscript

Abstract

In video surveillance, real-time detection of hidden or concealed objects under the clothes of humans is a challenging task. Very few research works have been carried out on this hidden object detection and recognition with the aid of various coherent technologies namely Millimeter wave (MMW) imaging, Infrared (IR) imaging, and Terahertz (THz) imaging systems. Hidden objects that include weapons like axe, knife, gun, bomb, pistol, etc., are a major threat to security surveillance as it needs to be recognized in a few seconds irrespective of their size. This paper proposes an efficient hidden object recognition method that focuses on the detection and recognition of concealed weapons in humans using Modified Weighted You Only Look Once v5 (MWYOLOv5) model. The probable occurrence of inaccurate forecast results due to the sense of a low confidence score is mitigated by the use of the weighted boxes fusion (WBF) method. As a result, higher-confidence boxes contribute more to fused box coordinates than lower-confidence boxes. Meanwhile, it is significant to select optimal hyperparameter values for training YOLOv5 model with CSPDarknet53 based feature extractor and Path Aggregation Network (PANet) based feature aggregation procedures to predict concealed objects. To achieve this, a new crossover salp swarm algorithm (CSSA) is developed to tune the YOLO hyperparameters such as learning rate, momentum, weight decay and batch size. This provides more accuracy in recognizing hidden objects on using THz and MMW images on comparison with existing methods. The proposed hazardous weapon recognition model is trained and tested on both MMW and THz Imagery datasets and it shows that the proposed methodology is showing good results with high mAP@.5 and mAP@.5:95.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1:
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

Code availability

Not applicable.

References

Download references

Author information

Authors and Affiliations

Authors

Contributions

All authors agreed on the content of the study. JJ, KSD, SVM and SKS collected all the data for analysis. KSD agreed on the methodology. JJ, KSD, SVM and SKS completed the analysis based on agreed steps. Results and conclusions are discussed and written together. The author read and approved the final manuscript.

Corresponding author

Correspondence to Suganya Devi K.

Ethics declarations

Ethics approval

This article does not contain any studies with human participants.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Consent to participate

Not applicable.

Consent for publication

Not applicable.

Competing interests

The authors declare no competing interests.

Additional information

Communicated by: H. Babaie

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jayachitra, J., K, S.D., Manisekaran, S.V. et al. An optimal deep learning model for recognition of hidden hazardous weapons in terahertz and millimeter wave images. Earth Sci Inform 16, 2709–2726 (2023). https://doi.org/10.1007/s12145-023-01056-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12145-023-01056-x

Keywords

Navigation