A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection Systems

In this paper, we discuss different types of threat assessment approaches for use in surveillance systems. We look at each method separately from others with the aim of showing the evolvement of the technology. A detailed description and an in-depth look at current research are conducted in order to give a more concise review. Doing an in-depth individual analysis of each method allows for a better comparison approach with other methods. We also look at the advantages and disadvantages of each approach and compare it with other methods in order to get a better sense of the performance of the technique as compared to others. A discussion on a benchmark comparison of these methods is also given and a few recommendations are presented along with our proposed approach.

[1]  Rick S. Blum,et al.  Concealed weapon detection using color image fusion , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[2]  R. Levenson,et al.  School Shooters , 2014 .

[3]  Gui Yun Tian,et al.  A Review of Concealed Weapon Detection and Research in Perspective , 2007, 2007 IEEE International Conference on Networking, Sensing and Control.

[4]  Larry S. Davis,et al.  Detection of people carrying objects : a motion-based recognition approach , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.

[5]  Siu-Yeung Cho,et al.  Using infrared imaging technology for concealed weapons detection and visualization , 2010, TENCON 2010 - 2010 IEEE Region 10 Conference.

[6]  Azizah Abdul Manaf,et al.  Gait Analysis for Criminal Identification Based on Motion Capture , 2011 .

[7]  Rick S. Blum,et al.  Fusion of visual and IR images for concealed weapon detection , 2002, Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997).

[8]  Kimberly D. Kendricks,et al.  Deep network for analyzing gait patterns in low resolution video towards threat identification. , 2016 .

[9]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .