You are on page 1of 25

Signal Processing 83 (2003) 31 55

www.elsevier.com/locate/sigpro

Review
Explosives detection systems (EDS) for
aviation security
Sameer Singh , Maneesha Singh
PANN Research, Department of Computer Science, University of Exeter, Prince of Wales Road, Exeter, Devon EX4 4PT, UK
Received 21 January 2002; received in revised form 3 June 2002

Abstract

The detection of explosives and illicit material for the purposes of aviation security is an important area for preventing
terrorism and smuggling. A number of di-erent methods of explosive detection have been developed in the past that can
detect such material from a very small up to a very large quantity. For the purposes of aviation security, the checks are
performed on passengers, their carry on luggage, checked baggage, and cargo containers. Similar technology is used in
post-o2ces for detecting dangerous substances in mail. In this paper we review some of these technologies and in particular
discuss the application of computers for the analysis of data and images generated from security equipment.
? 2002 Elsevier Science B.V. All rights reserved.

Keywords: Explosives; Security; Screening; Signal processing; Pattern recognition

1. Aviation security The 9rst line of defence is based on police intelli-


gence to deny suspected terrorists from using aviation
The aviation security programmes are based on facilities. The second barrier of security inspection
three principles [88]: (i) Every reasonable e-ort is the most important guard against the carrying of
should be made to deny the terrorist access to civil avi- dangerous materials on board a plane whereas the
ation facilities. (ii) In the event that the terrorist pen- third barrier is simply a damage control mechanism.
etrate the 9rst line of defence, they should encounter In this paper we discuss the prevention mechanism
a system of explosivesweapons detection devices denying explosive materials getting on board a plane
and procedures that will prevent further penetration through security screening. In particular, we discuss
into aviation facilities. (iii) If a device evades the step the various techniques that are available or being re-
two, then the aircraft structure and systems must be searched to detect explosives and drugs. In addition,
hardened to the maximum extent feasible to negate a we also discuss the research into signal process-
blast and minimise damage providing a higher prob- ing of data collected from di-erent methods espe-
ability of survivability of passengers and property. cially using pattern recognition and image processing
techniques.
The large number of airline bombings shows the
Corresponding author. Department of Computer Science,
real threat to the air passenger travel. From 1985 to
School of Engineering and Computer Science, Harrison Build-
ing, University of Exeter, Exeter, EX4 4QF, UK. Tel.:
1997, eight commercial aircrafts were lost or damaged
+44-1392-264061; fax: +44-1392-264-053. due to suspected terrorist bombings and about 1100
E-mail address: s.singh@exeter.ac.uk (S. Singh). people died in these tragedies [83]. The following

0165-1684/03/$ - see front matter ? 2002 Elsevier Science B.V. All rights reserved.
PII: S 0 1 6 5 - 1 6 8 4 ( 0 2 ) 0 0 3 9 1 - 2
32 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

incidents were caused as a result of explosions within aviation-related computer systems; (ii) airport access
aircrafts. controls and (iii) passenger and carry-on luggage
1. On June 23, 1985, Air India Boeing 747 crashed screening including how the USA di-ers from other
into the sea as a result of the explosion in the cargo countries.
hold. This committee had earlier reported in the year 2000
2. On November 29, 1987, Korean Air Jight 858 that there were several weaknesses found with screen-
was destroyed in Jight from an explosive device inside ers in tests in the USA. In 1987, screeners missed 20%
the cabin. of potentially dangerous objects and recent tests ap-
3. On December 21, 1988, PanAm Jight 103 was proximating real threats showed that the performance
destroyed by a 12 ounce bomb hidden in a portable degrades even further. The main problem is because
radio over Lockerbie, Scotland. of less experienced sta-, large turnover because of
4. On September 19, 1989 an UTA Jight was de- low wages, limited bene9ts, and repetitive nature of
stroyed over the Sahara from an explosion in the for- the work. In addition, the amount of work at airports
ward cargo component of a DC-10 aircraft. makes it impossible to check every bag (over 2 mil-
5. On November 27, 1989, an Avianca Boeing 727 lion passengers and their bags must be checked per
was destroyed by an explosive device in the cabin. day in USA alone).
6. On July 17, 1984, an Alas Chiricanas Airline Air carriers can use their own employees to con-
EMB-110 crashed from a bomb explosion in the cabin duct screening activities but mostly they hire security
during a Jight from Colon City to Panama City. companies to perform screening. In the USA, Fed-
7. On December 11, 1994 a Philippine Airlines eral Aviation Authority (FAA) monitors the perfor-
Boeing 727 was attacked in Jight from a bomb explo- mance of screeners by periodically testing them with
sion in the cabin. FAA special agents posing as passengers. Two impor-
8. On July 9, 1997, an explosive device in the tant reasons explain why screeners fail: rapid screener
passenger cabin detonated on a Transporte Aereo Mer- turnover and inadequate attention to human factors.
cosur Fokker 100 during the Jight. From May 1998 to April 1999, screener turnover av-
In addition, on the morning of September 11, 2001, eraged 126% in 19 major airports in the USA, 200%
in a mission allegedly masterminded by Al-Qaida at 9ve airports and one with a turnover of 416%. This
network, terrorists hijacked four commercial US air- is attributed to low wages and minimal bene9ts for
planes. The hijackers crashed two of the planes into screeners. Generally, screeners are paid at the minimal
the 110-story twin towers of the World Trade Center wage with a starting salary of $6.00/h or lessactually
in New York City, destroying the towers; another into wages at fast food restaurants are much higher. The
the Pentagon in Washington, DC; and the fourth plane demands of the job also a-ect performance. The du-
into a 9eld in Stony Creek Township, Pennsylvania. ties are repetitive and too little attention is given to
Nearly 3500 people died as a result of this attack. factors such as: (a) improving individuals aptitudes
As a result of serious breaches of security in the for e-ectively performing screener duties; (b) the suf-
recent past, research into advanced screening equip- 9ciency of the training provided to screeners and how
ment and associated technologies has become a pri- well they comprehend it; and (c) the monotony of the
ority. Of most concern is detecting explosives in both job and distractions that reduce screeners vigilance.
checked and early-on baggage [24,78]. Other tech- FAA has been recommended to use threat-projection
niques relate to monitoring passengers for weapons as systems that place images of dangerous objects on the
they transit the terminal building, especially crowds monitors of X-ray machines to keep scanners alert and
gathered at the metal detectors and X-ray machines. monitor their performanceand a certi9cation pro-
As the technology has become smarter at detect- gram to make screening companies accountable for
ing illegal objects, so have the methods to disguise the training and performance of the screeners that
such material. Following the September 11th attack, they employ. The threat-projection systems are useful
Dillinghams testimony [22] was provided before the as they monitor screener performance, and help train
Committee on Commerce, Science and Transporta- them to identify more di2cult objects for the future.
tion, US Senate to discuss security concerns with: (i) It is expected that FAA will deploy this technology in
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 33

airports by 2003 and also more FAA security screen- screeners is discussed next. Finally, we discuss some
ers will be used. of the research issues for the future of aviation se-
Dillingham [22] also compares the di-erences in curity, in particular the automation of the screening
screening between USA and 9ve other countries process.
(Belgium, Canada, France, Netherlands and UK).
The main conclusions were: (a) Screening operations
in most countries, Belgium, Netherlands and UK, 2. Security screening technologies
were more stringent, where they routinely touch or
pat down passengers in response to metal detector Security screening technologies are used to either
alarms. In these countries only ticketed passengers go inspect passengers or their luggage. Screening of
through the screening checkpoints thereby reducing people walking through portals requires sophisticated
the number of people checked. Also countries such technology. A screening solution must not only be ac-
as UK and Belgium have higher police presence at curate, but also publicly acceptable [84]. In terms of
airports. (ii) Screener quali9cations are more inten- what should be reported by a screening system and its
sive. For example, Belgium requires that screeners performance characteristics, certain guidelines have
be citizens, France requires them to be EC citizens, been set by aviation authority [42]. In particular, the
Netherlands requires them to be a resident for at least screening equipment should report the following [82]:
5 years. Also the amount of training is more in some (i) Type of illicit material.
European countries. For example, FAA requires only (ii) The minimum quantity (mass).
12 h of classroom training but Belgium, Canada, (iii) The object shape (bulk, sheet, thickness, etc.).
France and the Netherlands require more. France re- (iv) The location of the illicit material in the bag.
quires 60 h of training and Belgium requires at least Hallowell [46] discusses a number of research issues
40 h of training with an additional 16 24 h for each related to screening airline passengers. It is quite com-
activity. (iii) Screeners get more bene9ts in other mon for explosives, weapons or drugs to be concealed
countries. In Netherlands they get a minimum of with the passenger. Unfortunately, a number of tech-
$7.50 (30% higher than fast food shop wages in that nologies that can be used for scanning luggage cannot
country), in Belgium they get $14/h. The turnover be used for screening passengers for health reasons.
rates in these countries are 50% or lower in these While strip-searching is one of the best methods, it
countries. (iv) The screening responsibility rests with is not always possible to search everywhere. Popular
airport authority or with the government. The airports methods to date include walk-through metal detectors,
can in turn hire screening companies to perform se- metal detector hand wands and pat down searches.
curity checks. Out of 102 countries with international An ideal portal would be able to screen a person for
airports, except for Canada and Bermuda, every other weapons, drugs or explosives in real time without im-
country places screening responsibility with the air- peding the tra2c Jow. The current research on portal
port or government. From these 9ndings, it is clear development focuses on: (i) enhancing the e2ciency
that much more needs to be done both on research of metal detectors in portals; (ii) development of posi-
and on training of personnel. tion discrimination capability of concealed weapons;
There is no doubt that security screening provides and (iii) expansion of portal detection capabilities
a barrier in the 9ght against terrorism and smuggling. to include explosives and/or drugs. The emerging
The recent tragedies have provided a new impetus technologies are based on either imaging or trace
for renewed and more intensive research in the area detection. Imaging technologies can see through
of using computers and advanced security screening the clothing and produce an image of the human body
equipment for human and luggage checking. In this re- and concealed items underneath. The images can be
view we present recent technologies in this vital area. manipulated for improving their quality to assist
This paper is laid out as follows. First we discuss the human operators. Some examples of imaging tech-
security screening technologies used at airports and nologies used include X-ray systems, millemetre
those under research. The issues related to the use of wave systems, and dielectric portal development (mi-
computers for security screening and the training of crowave). Anomaly detectors can be used to give
34 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

information on the presence of an object, its size and (iii) Elemental composition: It was originally pro-
location without producing an image. Trace detec- posed that the presence of high concentrations
tion, on the other hand, samples air or material from of nitrogen is necessary to indicate the presence
the clothing or bodies of people to perform a chemi- of a nitrogen-based explosive. However, it has
cal analysis of the sample to detect target substance. been realised that multi-element analysis is the
Trace detection technologies include ion mobility best way to lower false alarm rates. Its presence
spectrometry, chemiluminescence, electron capture combined with high oxygen concentration can be
detection, electrochemistry and olfaction. used to determine explosives. Some explosives
For luggage inspection, the two major subprograms can be picked up by analysing high concentra-
in the aviation security are bulk detection and vapour tions of chlorine. Also, narcotics such as hero-
detection. Unlike bulk detection that aim to detect ine or cocaine are in chloride form. Narcotics are
large quantities of explosives, vapour detectors look poor in nitrogen and oxygen but rich in carbon
for very small quantities, less than a microgram. Hy- and hydrogen. Their density is not much di-erent
drogen, nitrogen, carbon and oxygen are the main from other organic material and vapour emission
components in an explosive. Even a small quantity of analysis can be used to detect them.
vapours escaping from these explosives in small quan- (iv) Vapour emissions: Nitrogen can be detected in
tities can be detected using techniques including ion a vapour sample.
mobility, electron capture, mass spectroscopy, olfac- There are a number of methods used in the detec-
tion, bio-technology and surface acoustic waves. tion of explosives in airport luggage including X-ray
In order to detect contraband, it is important to techniques including scatter, dual energy and trans-
understand their characteristics. Gozani [40] lists the mission imaging, X-ray-based computed tomography
properties that are of greatest interest in identifying [94], vapour detection [17], quadrupole resonance
both drugs and explosives. For example, drugs have analysis [89], and nuclear techniques [39]. The fol-
following constituents: carbon (high), oxygen (low), lowing sections detail a number of technologies used
chlorine (moderate), and density (moderate). On the for explosives detection. Considering the overwhelm-
other hand for explosives we get: carbon (moderate), ing use of X-ray and neutron technology for aviation
nitrogen (high/moderate), oxygen (very high/high) security, our review presents them in more detail. In
and density (very high) [35]. Nitrogen-based explo- our discussion we assume that the luggage can be
sives, rich in nitrogen (bonding agent) and oxygen imaged thoroughlyfor a review of techniques
(oxidising agent), are commonly used due to their where luggage is available from only one side, e.g.
high power. The explosives also contain carbon and an unattended bag against the wall, please see
sometimes hydrogen as fuel. Usually, explosive de- Hussein and [52].
vices consist of two main components: an explosive
agent and a detonating system. The blasting material 2.1. Bulk detection systems
consists primarily of inorganic nitrates and carbona-
ceous fuels and the detonators are made of metallic A number of techniques based on X-rays, gamma
tubes or shells with an initiating explosive. In the rays, electromagnetic 9eld, and millimetre waves have
case of plastic explosives, they can self-detonate due been employed for detecting weapons and explosives
to their unstable nature. There are more than 100 [10]. The techniques for explosive detection are de-
types of military and civilian explosives and around tailed below.
20 commonly used drugs. A number of explosive
characteristics can be used for their detection [52]. 2.1.1. X-ray-based screening
(i) Geometry: The presence of a metallic detonator The physical principles of X-ray interactions can
and associated wires can be detected using image be used to interpret the results to deduce the type of
shape analysis. materials present [96]. X-ray detection methods are
(ii) Material density: Explosive material is more the most common means to inspect luggage at the
dense than most organic material but not as airport for the following reasons: (i) X-ray tech-
dense as metals. nology can help to provide information on the object
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 35

density d and the e-ective atomic number Ze- . The location of the bag. It does not matter how the X-ray
e-ective atomic number is the estimate of the hypo- is removed from the pencil beam. Hence, the atomic
thetical single element that will give the same X-ray cross-section determines the attenuation at any loca-
attenuation as the substance being evaluated. Theo- tion in the transmission image and is the total X-ray
retically, an objects material type can be uniquely interactive cross-sectionthe sum of the photoelectric
determined using its density and Ze- [27]; (ii) X-ray and the scattering cross-section. Conventional X-ray
technology has been developed for over a century; screening systems measure the attenuated X-ray en-
(iii) X-ray technology is safer to human beings and ergy after it has passed through a scanned object [61].
contents inside the luggage than for example nuclear The standard airport hand-baggage scanner has a
magnetic resonance; (iv) X-ray physics is well un- fan shaped or scanning X-ray beam whose absorption
derstood; and (v) they are less expensive and easy to is measured by a line of detectors, and a high-quality
operate than neutron-based methods. image derived from the degree of absorption is pro-
The following are important considerations for the duced. These devices cannot distinguish between a
deployment of X-ray technology at airports [37]. thin sheet of strong absorber and a thick slab of weak
(i) The devices vary in their ability to detect types, absorber. Fig. 1 shows some example images.
quantities and shapes of explosives. Nowadays Dual-energy X-ray. Early security systems used
explosives can be hidden and modi9ed in a vari- high-energy X-ray for the detection of weapons. At
ety of ways so a simple analysis of shape or type higher energy levels, over 100 kV, the absorbed en-
is not very productive. ergy depends primarily on the density of the material.
(ii) Explosive detection devices typically produce a The higher the density, the more the energy absorbed
number of false alarms that must be resolved by the object and therefore the darker the image. Ob-
either by human intervention or technical means. jects such as metal or weapons would appear very
Given that there are millions of bags processed dark in the transmission image. However, the prob-
every day, even modest false alarm rates could lem of an explosive object behind a denser material
lead to thousands of items requiring additional remained unsolved. In order to resolve the problem,
security. luggage is scanned at two energy levels (lower energy
(iii) The devices depend on human operators to re- around 80 kV). At lower energies the absorption de-
solve alarms. It can require for the operators to pends mainly on the e-ective atomic number as well as
either inspect computer images more closely or the thickness of the material. The higher energy view
actually hand search the item. The higher the su-ers less absorption. While areas of heavy metal are
false alarm rate, the more the system depends on dark in both views, areas of light elements are darker
human operators. This has consequences for op- in lower energy view. Light elements such as carbon,
erator training. nitrogen and oxygen can be detected by comparing
(iv) Laboratory test performances of several equip- both views. A system that uses two X-ray energy lev-
ment is much better than their real life perfor- els is called a dual-energy system (multi-energy sys-
mances [103]. For example, the FAA certi9ed tems are essentially the same as above except that they
CTX5000 did not perform as well in operational have a single X-ray tube that transmits a broad spec-
testing at two airports [37]. trum of energies and di-erent detectors are used to se-
A number of di-erent X-ray techniques are used lect speci9c energy regions). Several techniques exist
for security screening. Amongst the most popular for the collection of multi-energy images, including
methods are conventional transmission imaging, dual varying the input energy of the X-ray source [28], 9l-
energy X-ray, scatter imaging and 3D imaging. The tering the energy at the X-ray sensor [27] and using
principles behind these methods are described below. multiple sensors with di-erent spectral responses [77].
Conventional transmission X-ray. X-ray technol- Some commercial systems at airports feature
ogy is extensively used in the aviation industry for dual-energy analysis to estimate the atomic numbers
contraband detection [79]. In standard transmission of the materials in luggage bags [27,64,112]. For a
X-ray, the equipment measures how many X-ray pho- single energy system, a thin, high Z (atomic number)
tons were removed from an illuminating beam at each material will have the same attenuation as a thick,
36 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

Fig. 1. Some example images of the conventional X-ray of luggage at airports.

low Z material. However, in a dual-energy system, Zeff


the measurements obtained at di-erent energies can
separate these two cases. The dual-energy method ap-
plied to a simple object yields an area density that in
turn gives a measure of density and thickness by us- Inorganic
materials
ing a priori information between atomic number and
density. The main limitation of the method is that the
real density of objects is poorly known for real lug-
gage items and the system only generates an estimate Organic
Drugs Explosives
of atomic number, i.e. e-ective atomic number. materials
Using dual-energy transmission technology, infor-
mation related to Ze- is obtained. Organic material
Density
(low Z) can theoretically be distinguished from in-
organic materials and metals (high Z). It should be Fig. 2. The role of the e-ective atomic number and density in
remembered that X-ray intensities for each object are separating explosives from other materials.
not only related to its material composition which
reJects the intrinsic property, but also some extrinsic
parameters such as position, orientation and thickness. better than single energy can be easily confused with-
In the real-world, simple dual-energy analysis which is out the knowledge of material density (see Fig. 2).
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 37

Several approaches for its e-ective use in complex high-density characteristics of plastic explosives. This
images have been pursued including transmission makes the scatter imaging techniques more speci9c.
plus scattering and computed tomography [43] so that Scatter imaging has been proposed by a number
information on the e-ective atomic number as well of studies as an e-ective way of luggage inspection
as the density is available. The false alarm rate of [2,43,52,96]. Image data is collected from scattered
dual-energy systems are roughly 20% [114]. X-ray energy that is reJected back towards the X-ray
One of the limitations of the dual-energy systems source or scattered X-ray energy that passed forward
is that unless they are combined with volume imag- through the scanned object, called the back scatter-
ing, e.g. CT or stereoscopic imaging, they only pro- ing and forward scattering images, respectively. For
vide an indication of the e-ective atomic number as an scatter images, each location along the pencil beam
integrated e-ect throughout the scanned object. Even in the objects adds to the amount of scatter seen in
when used with volume imaging, the sensitivity and scatter image. The amount depends on the number of
speci9city are low and at best only allow materials to X-ray photons reaching the location, the electron den-
be characterised broadly as inorganic or organic. An- sity at that location, the scattering cross-section, and
other problem encountered with dual-energy systems attenuation that the scattered photons undergo while
is that the computation of Ze- depends on the mate- exiting the bag. In this way, two di-erent materials
rial and objects that it overlapscalled background with the same transmission characteristics would still
overlapping e8ect. One of the algorithms developed produce two very di-erent sets of scatter images (e.g.
to tackle this problem by Krug et al. [66] and Krug aluminium and plastic).
and Stein [65] calculates a characteristic value KMAT The transmitted beam produces a typical X-ray im-
for each illicit material from the attenuation coe2- age showing the absorption of heavy metals. In addi-
cients. The algorithm examines each image pixel in tion, the backscatter signal intensity depends on how
turn whose corresponding characteristic value is cal- much of the transmitted beam has been absorbed, how
culated as KTB . If KMAT = KTB , then a counter is in- much is backscattered, and how many backscattered
cremented. If the counter exceeds a threshold then the X-rays reach the backscatter detectors. The back-
pixel comes from an illicit material. This algorithm, scatter signal depends on the competition between
however, does not work very well and a better method photoelectric absorption and Compton scattering.
is proposed by Krug et al. [63]. In this method, two The photoelectric cross-section increases with the
images of low- and high-energy X-ray beams are ob- atomic number of the object, Z while the Comp-
tained with no reference material present. Then two ton cross-section is relatively independent of the
images with the reference material are obtained. On atomic number. Hence, the resulting backscatter sig-
the basis of these four images, a measure k is calcu- nal favours low Z elements of high density, such
lated as the ratio of the attenuation coe2cients and a as plastic explosives and provides a direct measure
new image is generated by calculating new pixel val- of the density of elements with low atomic number.
ues on the basis of k. The new image is di-erent from Backscatter information has been used for explosives
the original image because the objects that have the detection. A system based on the Jying spot technol-
same Ze- as reference material are no longer present. ogy was built as a prototype by Swift [117,118] for
Scatter imaging. Explosives are typically mixed the inspection of vehicles and cargo.
with common harmless materials, which makes their Image scatter can be characterised as coherent (elas-
detection very di2cult. Two characteristics of plas- tic) or incoherent (inelastic or Compton scattering).
tic explosives make them unique in terms of their Forward scatter in the region of 310 contains pre-
interaction with the X-rays. First, they consist of dominantly coherently scattered photons and at large
elements having low atomic numbers. Second, they angles the scattered beam is dominated by incoher-
have a physical density that is 30 50% higher than ently scattered photons. Measurements of both of these
common plastics and about 9ve to eight times higher is quite useful. Coherent scatter leads to di-raction
than typical packed clothing [2]. While dual-energy e-ects whose intensity gives information on atomic
methods attempt to exploit the 9rst of these charac- number and physical density. Incoherent scatters in-
teristics, a scatter image exploits both the low-Z and tensity is dependent on density and hence both of these
38 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

techniques can be combined to isolate atomic num- methods for the detection of explosives. The main cri-
ber information. An advantage of using scatter tech- teria for the acceptance will be: (a) classi9cation per-
niques is that their measurements depend on particular formance in terms of detection rate vs. false alarm rate;
volumes within an object and hence allow a form of (b) inspection time or throughput of the system. Three
volume imaging. Scatter methods are highly speci9c areas that need to be improved for the advancement
and localised allowing detection of sheet explosives of CSRS are: (a) the total photon Jux in the scatter
[73]. Details of coherent and incoherent X-ray scatter spectrum, which determines its noise; (b) the mixing
are available in Speller [110]. of substance of interest with others; and (c) the atten-
The position of an object relative to X-ray source uation of primary and scatter reduction. The results of
and the detector has a strong inJuence on the de- the experiments in this study showed near 100% de-
tected forward and backward scatter signals resulting tection rates and less than 1% false alarm rate. Speller
in an input error to the classi9cation system. Forward et al. [111] studied X-ray scattering at low angles.
and backward scatter systems measure the incoherent X-ray scattering at low angles shows di-raction e-ects
scattering e-ect. A single-energy system using back that can be used to characterise materials. This tech-
scatter images for explosives was developed by the nique is successful in 9nding explosives that may be
American Science and Engineering [96]. The Jying shielded by other matter. This paper details the impor-
spot technology developed by American Science and tant features of scattering that can be used as unique
Engineering in 1996, can obtain very high-quality signatures. Luggar et al. [72] study the elastic scat-
scatter images (see [4] for details). This eliminates tered photons for the rapid identi9cation of material
the need for an expensive sensor array by using with low atomic number. Luggar et al. [75] developed
a concentrated beam of X-rays and a few large a low angle X-ray scattering machine called the sheet
photo-multipliers for detection. The primary source explosive X-ray imager (SEXI). The optimisation of
of information is back scatter images where forward the geometry for such a system in terms of scatter an-
scatter images are included as an option. With good gle, collimation and X-ray distribution are discussed
transmission and scatter qualities, materials charac- in Luggar et al. [74]. This system attempts to detect
terisation is greatly improved. This technology has minimum amounts of explosive material in an item of
been shown to perform well on car and truck (cargo) luggage in the range of 150 300 cc. The low attenua-
where explosives can be present in large quantities tion in conventional X-ray system through explosives
[97]; airport luggage presents a more serious problem yields little natural contrast. SEXI identi9es materi-
with small quantities of explosives. None of the im- als with image molecular structure and di-erentiates
plemented systems has fully explored the high-quality between explosive materials and other objects. SEXI
forward and backward scatter images provided using can be used in conjunction with normal X-ray systems
the Jying-spot technology for automated explosives with little disruption to security procedures. Low-level
detection. Since this technology is cheaper and faster X-rays have also been used with digital image pro-
than CT, the analysis of scatter images could lead to a cessing for explosives detection by Smith [107]. The
smater system. In addition, dual-energy transmission new technology is called subambient explosive com-
technology can be combined with scatter technology puter utilised reJected energy (SECURE) which uses
to improve results [25]. a range of image processing algorithms before the im-
Coherent scattering has been used in a number of age is presented to the operator. Strecker [114] de-
studies considering its advantages over dual-energy scribes the use of elastic X-ray scatter for the purpose
and CAT scanners. Strecker et al. [115] investigated of automatic detection of explosives. A recent pro-
high-energy (30 100 keV) Coherent X-ray scattering totype was produced by Philips for Hamburg airport
CXRS (see Harding and Shreiber [47] for more details [50]. The in-elastic or Compton scatter radiation pro-
of the technology). The study deals with an alternative vides a measure of the number of electrons involved
approach to X-ray di-raction, X-ray scatter. The mea- in the scatter process. However, in the case, of elas-
sured di-raction patterns contain material-speci9c in- tic scatter, material testing is strongly oriented in the
formation. This information is used as a 9ngerprint to forward direction due to its short wavelength. In this
identify explosives. Strecker [113] researched CXRS case, the polychromatic bremsstrahlung spectrum of
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 39

the X-ray tube serves as a source and the scatter radia- parameters one needs to know exact material
tion is measured at a small 9xed angle using an energy composition, weight fractions, and geometry in-
resolving detectors. The resulting scatter spectra pro- formation for all objects in the luggage. It is not
vide information on the crystallographic structure of possible to get this information using dual-energy
the scattering materials. For security application, the luggage X-ray system to date. Hence, some ex-
scatter spectra of dangerous substances are stored in trinsic parameters such as thickness and orienta-
a library and retrieved for comparison and automatic tion of the material would negatively a-ect the
detection of suspicious material. The trials at Ham- material characterisation.
burg airport show a false alarm rate of 1%. (iii) The error and uncertainty change the statistical
Bla-ert [9] tried to prove that peak detection and distribution of classes; this has a negative e-ect
spectra identi9cation techniques developed for X-ray on object classi9cation.
di-raction and IR spectroscopy can be used for explo- Related techniques. A number of recent studies
sives detection provided that good quality noise 9lters have investigated novel X-ray technologies for se-
are used to clean the spectra to a reasonable level. curity screening. Bjorkholm and Wang [8] detail an
Similarly, Jupp et al. [55,56] used angular dispersive improved X-ray detector such that maximum possible
X-ray di-raction to provide chemically speci9c detec- information about physical characteristics of the ob-
tion of explosives from benign materials using char- jects can be gained. Z-scan is an X-ray system that
acteristic Bragg features seen in coherently scattered gives two views with dual energy. By scanning ob-
X-rays. To implement this technique in a prototype jects from orthogonal angles, organic materials in the
screening system, a detector has been designed which, object are turned into 3D models. The model is then
when coupled with the appropriate analysis algorithm, divided into regions that are searched for explosives
provides chemically speci9c material identi9cation. using density information. Any threat objects are high-
Even though the X-ray technology is the preferred lighted. The system can work at a rate of 10 pieces/min
method of explosives screening, it is by no means the and the system is currently used at Heathrow airport.
best option. It continues to be preferred as it is safer A new X-ray detection system is described by
to humans and luggage, cheap to buy and operate, Bernbach and Vey [6]. An L-shaped X-ray beam is
and it is well understood. However, one of the main used to eliminate blind-spots. For detection, X-rays
disadvantage of using X-ray technology is the high are converted to visible light that is detected using
false alarm rate (when the system alarms frequently photo-diodes. The object has to be moved through the
on harmless objects). There are several reasons for beam for complete scanning. The system can scan 10
these false alarms: pieces/min.
(i) Some materials are non-separable to systems Shi [104] introduces a new model of prototype
based on X-attenuation methods designed to X-ray scanning system developed at Virginia Tech.
distinguish material based on their physical In addition, an algorithm is developed to correct the
density and e-ective atomic number. This is non-uniformity of transmission detectors in the pro-
because several materials possess similar atten- totype scanning system. The X-ray source output is
uation pro9les as explosives. For example in the not monochromatic which leads to the problem of
(Ze- ; d) domain, some plastics and rubbers fall spectrum overlap and output signal imbalance be-
in the black powder area, and the others fall in tween high- and low-energy levels which degrades
the smokeless powder area [62]. This can lead the performance of the dual energy X-ray sensing. A
to plastics and rubber substances causing false copper 9lter is introduced and a numerical optimisa-
alarms. tion method to remove thickness e-ects of objects has
(ii) The characterisation for a certain material may been developed to improve the system performance.
spread into a wider range in feature space due Armstrong et al. [3] detail how materials can be
to the method actually used. In a simple setting, characterised based on the interaction of X-ray and
most explosives can be separated from harmless gamma ray radiation using a high-intensity monochro-
materials using 2D information (Ze- ; d). How- matic source. The design and properties of the
ever, in order to accurately determine these two new Juorescent X-ray tube are described. The tube
40 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

generates a quasi-monochromatic output. The out- et al. [32,33] describe four types of 3D transmission
put is compared with those of radioisotope sources X-ray imaging that is appropriate for security screen-
in terms of purity, stability and radiance and it is ing. This includes:
shown that the new technology is a good method for (a) Computed tomography [98]: Computed tomog-
materials characterisation. raphy initially developed for 3D medical imaging
The SYCOSCAN developed by Schlumberger is applications has been applied for luggage screening
a radioscopic control system developed based on [94,95,105,108]. The X-ray transmission through an
X-ray detection using multiwire proportional cham- object is a function of its e-ective atomic number,
ber (MWPC) technology [116]. This study presents density and thickness. For a given X-ray path, the
the working principle behind this equipment and linear attenuation coe2cient is the sum of attenua-
compares it to conventional scintillator/photodiode tion coe2cients of each element in the path and CT
combinations. produces cross-section images of the object by recon-
Direct imaging of explosives using a nitrogen cam- structing the X-ray attenuation coe2cients matrix.
era has been suggested by Knapp et al. [60]. The basic These cross-section images can be used to generate
idea is to capture images of nitrogen concentrations 3D images of the objects. The 9nal aim is to deter-
on the basis of which robust screening technology can mine the objects density and e-ective atomic num-
be developed. It is well known that when high-energy ber. This is achieved in the following manner. First,
photons interact with chemical elements in an ex- in the volume rendered image, the reconstruction
plosive they generate unique signatures that can be algorithm determines the attenuation coe2cient for
used for identi9cation. When a high-intensity pulse each volume element. Second, given the knowledge
of high-energy photons from an accelerator source is of the volume element dimension from the scanning
Jashed on an object, a variety of isotopes are pro- equipment geometry, the attenuation coe2cient is
duced, almost all of which decay with half-lives of mapped as a direct function of the atomic number
seconds or longer. However, if nitrogen, carbon or and density. This gives two unknown quantities and
oxygen are present, radioisotopes decay very quickly by taking measurements at two di-erent energies, it
with very short half-lives of the order of 10 20 ms. leaves two equations with two unknowns that are
On the basis of this principle, images are generated solved for atomic number and density. Thus, the vol-
that gives an indication of the presence of nitrogen ume elements can be mapped according to Ze- and
that can be analysed by the operator. density, and the correlation of these variables can
A novel technique has been developed by Habiger provide both feature and material discrimination [23].
et al. [44] for detecting explosives using RF linac. The CT system is based on the principle of syn-
The patented EXDEP technology uses an intense chronous movement of the object/source and X-ray
X-ray beam to photo-activate the nitrogen component detector. The system produces images as a result of
present in most explosives. Activated nitrogen decays intensity summation recorded over a period of time in
emitting a positron that annihilates and produces two which the objects overlying and underlying the planes
photons that are detected. The EXDEP technique mea- of interest cause blurring on the 9lm. The CT method-
sures the nitrogen concentration on a matter per unit ology generates a stack of contiguous slice images or
volume basis together with 3D tomography (CTX) tomograms that help 3D image reconstruction to pro-
scanner that measures the physical density. The de- duce volumetric views of the object. The objects can
termination of whether or not there is an explosive be viewed as solid or transparent models [93] that
present is based on two factors: (i) the count rate for are enhanced using depth cues such as hidden sur-
each volume element and (ii) the number of volume face removal, perspective transformation, rotation and
elements that have the appropriate count rate. The depth-weighted shading. This technology is now avail-
probability of detection for the EXDEP/CTX system able for security screening [48,94] but the operational
should be over 99% with a false alarm probability cost remains quite high.
substantially less than 1%. For security applications, the CT system 9rst pro-
3D X-ray imaging. 3D image modelling can lead to duces an X-ray scan similar to the conventional airport
an improved explosives detection system [59]. Evans X-ray scanner. An automated inspection algorithm
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 41

determines the locations within the baggage where the In some respects this data can be compared with the
absorption indicates a suspicious area. Cross-section X-ray CT. The main di-erence is that in the case of
CT slices are then used to determine the density, tex- CT, each slice of information is called a tomogram
ture, mass and shape of the object. Since the CT scan whereas in stereoscopic imaging it is called a depth
produces cross-section slices, it can identify objects plane. The main advantage they cite for the stereo-
that are surrounded by other objects and hidden. The scopic system is that CT systems are data hungry
operator can also make further slices to detect other and require several views for image reconstruction,
object properties. whereas stereoscopic system uses the geometric re-
CT requires of the order of 100 views from a 1024 lationship between a pair of perspective images in
element linear X-ray detector to produce a 10001000 order to represent the 3D image data.
pixel slice image of the object under consideration. Evans et al. [31,32] describe how this works. The
The technology requires high signal-to-noise ratio and raw image data is produced in the form of a left and
hence very high X-ray source levels. As a result, the right perspective image. These are acquired within 5 s
high level of radiation requires substantial radiation and stored in 1024 648 digital format. The folded
screening. In addition, in order to achieve a high spa- array sensor modules utilise linear arrays consisting
tial resolution, the helical-scan CT system needs high of a pair of discrete 9bre-optic cables to optically cou-
rotational speed, e.g. for an object moving at 0:25 m=s ple the low- and high-energy signals produced by the
requires the X-ray sensor to rotate at 15; 000 rpm to scintillation process directly onto the faceplate of a
achieve an axial resolution of 1 mm. CTX5000 is three-stage intensi9ed coupled device camera (ICCD).
the only FAA approved system based on CT tech- The 2D images are formed by cyclically storing the
nique which was developed by InVision Technologies individual signal outputs of each 9bre optic via the
and has been installed in a number of airports in the ICCD in digital memory. The image is therefore accu-
USA. Heiskanen and Roder [49] discuss what can be mulated strip by strip over a time interval determined
gained from the experience of such technology in the by the scan frequency of the scintillation signals and
real-world since its implementation. the translation speed of the object. A 3D modelling
(b) Multi-source/sensor imaging. In this technol- stage using these images then generates the 9nal im-
ogy, a number of di-erent X-ray sources and sensors ages to be viewed. The identi9cation of depth planes
are used. For example Benjamin and Prakoonwit [5] or slices in stereoscopic images is presented in Robin-
discuss the use of 15 fan-beam sources. The main dif- son et al. [93].
9culty with this approach is the high system cost, and Evans et al. [32] argue the case for the 3D analysis
high complexity of the mechanical equipment and dif- as, for image interpretation, 2D view cannot generate
9culty in collimation alignment. physiological cues. According to Okoshi [85], an ob-
(c) Twin orthogonal views. Bjorkholm and Wang server has up to a total of 10 cues for depth perception
[8] generate two orthogonal views using a pair of including psychological cues (occlusion, shadows and
X-ray sources and linear arrays. shading, linear perspective, texture gradient, retinal
(d) Stereoscopic tomography. Evans et al. [32] image size and arial perspective), and physiological
illustrate a 3D image modelling technique utilis- cues (binocular parallax, monocular movement paral-
ing line-scan X-ray equipment called stereoscopic lax, accommodation and convergence). The psycho-
tomography [92]. The resultant images have sim- logical cues can be induced from the 2D image but
ilar properties to volume rendered X-ray computed the physiological cues cannot be. A fully operational
tomography system. Earlier research by these re- prototype of stereoscopic system has been constructed
searchers with HM Customs and Excise in the UK for Police Scienti9c Development Branch, UK. Re-
was based on line-scan technology [29,91]. More re- cently, Evans and Hon [30] extended the stereoscopic
cent work with Police Scienti9c Development Branch system by introducing the concept of motion parallax
in UK is based on dual-energy line scanners which in addition to binocular parallax as a powerful depth
provide materials identi9cation capability. The cur- cue to better interpret 3D images.
rent research focuses on the automatic extraction of At present, each of the above discussed X-ray
3D information from the stereoscopic pair of images. technology is used separately; however, there is a
42 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

strong case for using a combination of systems, e.g. radiation is available in Hussein [51] and Gozani [41]
multi-sensor X-ray approach using data fusion tech- and the basic principle is explained in Speller [110].
niques [1,18,19,65]. For example, Zou [129] details Thermal neutron analysis (TNA). The main aim
a system that uses both dual-energy and scatter tech- of this analysis is to identify nitrogen in explosives.
nology such that this information is derived from A neutron striking a nucleus is absorbed with a cer-
the object simultaneously. In this study a quantity R tain probability and the process is accompanied by the
that is related to Ze- (e-ective atomic number), and emission of gamma rays with the energy that is char-
a quantity L that is density related are used together acteristics of the nucleus. The type of element present
by identifying illicit objects in the RL plane. Using can be inferred from the analysis of neutron radiation
this technique, illicit materials can be separated from for gamma ray intensity and energy. The luggage is
metal, inorganic materials, and other harmless organic moved through a bath of thermal (slow) neutrons
materials. Since practical X-ray sources are poly- generated by a radioactive source. The capture of neu-
chromatic rather than ideally monochromatic, Monte trons in nitrogen results in a high-energy gamma ray.
Carlo N particle (MNCP) simulations can be used The signals from gamma ray detectors are analysed to
to study the relationship between R and Ze- [127]. generate a spatial distribution for nitrogen. The cur-
Tumer et al. [120] detail how the use of two di-erent rent TNA equipment have been designed to detect a
3D imaging techniques simultaneously can be used limited range of plastic explosives, with the ability to
for screening. In their study they use 3D images based detect nitrogen but not oxygen or carbon; although
on neutrons and gamma rays simultaneously. hydrogen, chlorine and some other elements could be
detected to enhance the performance. One of the main
di2culties is the systems inability to di-erentiate be-
2.1.2. Laser-based explosives detection
tween nitrogen in explosives and the nitrogen back-
Haley and Hallowell [45] describe explosive detec-
ground from innocent materials, thereby leading to a
tion using lasers. This technique involves the use of
high false alarm rate. Also, the sensitivity (probability
laser-generated infrared radiation to scan the surface
of detection for a given quantity of explosives) is lim-
of objects. The interaction of the laser radiation with
ited. In addition, the equipment can be very expensive
any residual explosive on the surface of the object will
($.75 $1.0 million).
initiate micro bursts. The resulting light generated
Using thermal neutrons, tomographic images can
by these bursts can be detected and is characteristic of
be reconstructed that have been shown to perform
the explosive involved. Temporal and spectral analy-
better than X-ray tomography. Da Silva and Crispim
ses of the emitted light reveal unique signal patterns
[21] conducted an experiment with lead and iron tubes
that are used to di-erentiate the micro bursts. The
with phantom inserts. For X-ray tomography, cocaine
results are preliminary, however, the technique o-ers
and explosives detection was not possible, since lead
the potential for detecting explosives in near-real time.
and iron possess high linear attenuation coe2cients
Thus, the technique could be used to scan carry-on
for photons at high energy levels. As such, dense ma-
baggage as the individual pieces of luggage travel on
terials like iron or lead, at photon energies of 120 keV,
the X-ray systems conveyer belt.
give rise to low penetration power and cannot be
inspected using tomography with X-rays and thus
2.1.3. Nuclear-based explosives detection cannot be used for detecting explosives or drugs.
Nuclear-based explosive detection techniques use However, the images reconstructed using thermal
neutrons instead of photons and have been shown to neutrons clearly show cocaine and explosive samples
generate better results however at a higher cost and concealed by iron and lead.
slow speed. The main modes of analysis include ther- Thermal neutron analysis was originally developed
mal neutron analysis (TNA), fast neutron analysis to 9nd concealed explosives for the airline industry in
(FNA), pulsed fast neutron analysis (PFNA), pulsed 1980s but it is currently being used for a number of
fast thermal neutron analysis (PFTNA) and Nuclear other applications. Brown and Gozani [13] discuss the
Resonance absorption (NRA) of gamma rays. A re- use of TNA for the detection of drugs in passenger
view of detecting explosive material using nuclear luggage, detection of explosives and drugs in small
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 43

packages, detection of liquid explosives in bottles, de- neutron capture gamma rays. A detailed discussion
tection of buried landmines and unexploded ordnance. is available in Vourvopoulos [122], Vourvopoulos
Fast neutron analysis (FNA). This technique is and Womble [123] and Womble et al. [125]. Also,
an improvement on TNA using high-energy neutrons. Womble et al. [126] recently discussed the current
The use of high-energy neutrons results in gamma rays status of the PELAN portable detection system that
at di-erent energies, characteristics of the elements, woks on this principle.
that can be detected and distinguished. Common ex- Nuclear resonance absorption (NRA) of gamma
plosives display a unique range of nitrogen density rays. This technique is derived from the narrow state
to oxygen density. FNA is able to measure these two of excitation energy in nitrogen atom resulting in a
quantities as well as carbon and hydrogen density, sharp resonance of the cross-section for the reaction
14
which allows it to be more sensitive and produces less N(y; p)13 C producing a proton and a carbon nu-
number of false alarms. On the other hand, the main cleus. The gamma ray transition state from the ground
shortcoming is that fast high-energy neutrons create a state of nitrogen atom to the excited state is extraordi-
signi9cant background in gamma ray detectors, mak- narily large. The gamma rays of exactly the resonant
ing it di2cult to extract the information. energy are therefore very strongly absorbed by ordi-
Pulsed fast neutron analysis (PFNA). The con- nary nitrogen nuclei, thus providing a unique and clear
cept behind PFNA is similar to that of FNA except signature for the presence of nitrogen, as opposed to
that a pulsed beam of neutrons is utilised. A focussed other elements. The inverse reaction (protons on the
collimated beam is passed through the object and the target of 13 C nuclei) can be used to generate the prob-
gamma rays emitted at certain energies are analysed. ing beam of gamma rays, resulting in gamma rays of
The method uses penetrating neutrons at lower ener- just the right energy. The e-ective size of the source of
gies than FNA. The gamma rays are detected by scin- these gamma rays can be made very small, allowing an
tillators that provide gamma ray energy information. imaging capability. This technique has been demon-
The neutron beam pro9le provides the 2D position strated to work extremely well on detecting nitrogen.
information required to determine the spatial dis- Since the signature is unique (gamma rays are very
tribution. The third dimension, derived by timing penetrating), the technique works well with shielded
and image reconstruction, constitutes a major im- explosives. The main advantage of NRA is its high
provement over the basic FNA technique. The main sensitivity, adequate spatial resolution, and unambigu-
advantage of using PFNA is that it unambiguously ous measurement of nitrogen. The main limitation is
determines the elemental composition of explosives that it only measures nitrogen and nothing else. This
and the spatial location of these elemental concentra- technology is still in research stage.
tions. The main challenges in developing PFNA into A number of studies have used nuclear techniques
a practical system is the tedious process of construct- for the detection of explosives and drugs. Burnett and
ing a practical, collimated, pulsed energetic neutron McKay [14] have developed a method for screening
beam that makes the operation safe and operationally liquid explosives in unopened bottles. The system can
acceptable and cost e-ective. This technology is still detect speci9c explosives or verify the labelling on the
in research stage. Recently Brown et al. [12] describe bottle. NMR technology is used for this with param-
a cargo inspection system based on this principle eters signal amplitude, spin lattice, relaxation time,
aimed at screening 9ve trucks/h. spinspin coupling constant and the di-usion constant.
Pulsed fast thermal neutron analysis (PFTNA). Unique NMR signatures for liquids can be obtained
This technique provides a bulk analysis of the chem- by setting radiofrequency (RF) pulses to respond to
ical present. Compared to PFNA which uses 2 ns one or more parameters.
pulsing, PFTNA uses 10 ms pulsing and has the Vartsky et al. [121] developed an explosive detec-
main advantage of being portable. PFTNA allows the tion system based on nuclear resonance absorption
neutrons to be moderated and it can provide thermal of gamma rays, 14 N. Explosives generally contain ni-
neutron information like TNA but in addition it also trogen as a nitrate salt or in organic form. The rel-
measures fast neutron reactions (C, O and N) and its atively high nitrogen density of most explosives can
advantage over PFNA is that it can measure thermal be exploited as a means of distinguishing them from
44 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

a host of other materials. The study shows that a the measurement of radiofrequency electromagnetic
high-nitrogen region of a suitcase can be scanned by (RFEM) waves reJected by an object. Firearms,
high-energy gamma rays and a measurement can be knives and other metallic weapons can be detected
taken from the transmission pro9le of photons. by low-power radar. More recently, it is seen that
Seed and Zahrt [99] develop a resonance millimetre wave radar systems can display TV-like
absorption-based explosive detection system as a vir- radar imagery of weapons concealed under clothing.
tual prototype (on the computer only). The following Non-metallic objects also reJect radio waves and can
processes are modelled: RF quadrupole proton beam, be detected and imaged by radio reJectometrythis
resonant-energy gamma ray production, gamma ray is called dielectometry and can be used for explosives
transport through injected objects, individual detector detection [100].
response, throughput of tomographic detector array Sheen et al. [102] describe various millimetre wave
and tomographic image construction. imaging systems that are capable of detection through
Gokhale and Hussein [38] propose a technique for clothing. One of the advantages of these methods over
explosive detection that uses characteristic variations X-ray is that they are not known to cause any health
in the elemental cross-sections with energy to iden- hazard. High-resolution images of concealed weapons
tify explosives. Transmitted neutrons are analysed by can be obtained using 2D holographic scanning. Using
the changes in their energy spectrum. Pattern recogni- the holographic wavefront technique, data is converted
tion techniques are used for material recognition and into a high-resolution image for inspection by an oper-
identi9cation. ator. In order to overcome the drawbacks of an earlier
KirWaly et al. [58] describe the use of elastically design, Sheen et al. [101] developed a circular imag-
backscattered neutrons combined with thermal neu- ing system that moves around the target for a complete
tron reJection method for the identi9cation of illicit 360 scan. McMakin et al. [76] developed a 3D volu-
material by detecting hydrogen, carbon, nitrogen and metric hologram using wideband millimetre imaging.
oxygen elements. Di-erent materials have di-erent This system allows for higher resolution by showing
spectra (net spectral yield plotted against neutron contours in the persons body. The person still needs
energy) and these di-erent signatures can be distin- to turn left, right and back to get a complete scan.
guished using pattern recognition techniques.
An excellent summary of the performance abilities 2.2. Vapour detection systems
of the various neutron-based systems built to date is
available in Speller [110]. PFNA shows the least false The following techniques are used for vapour de-
alarm rate of 5% or less. TNA on the other hand is the tection systems [54].
most sensitive of up to 200 g of material. However,
it should be noted here that due to security reasons 2.2.1. Gas chromatography with chemiluminescence
it is not possible to quote sensitivity results for other These devices use gas chromatography to sepa-
techniques. rate a sample of molecules from a carrier gas and to
isolate molecules of di-erent chemical compounds
2.1.4. Electromagnetic detection of metals and from each other. The samples can be taken with a
weapons portable hand-held collection unit that heats up the
The two major categories of RF electromagnetic sampled surface with infrared lamps and sucks air
methods used for screening include inductive methods from near the surface. The sample is then injected
(used by metal detectors at airports), and reJectome- into chromatographic columns, which consist of thin
try including dielectrometry and short-range imaging tubes lined with a material to absorb molecules of
radar. The 9rst class of methods detect the changes interest. Di-erent molecules are dissolved to di-er-
in mutual inductance caused by additional presence ent extends and the material with the least a2nity
of metal in the portal or detecting eddy currents pro- for the column substrate goes fastest. Since di-erent
duced in the metal within the portal by a RF pulse. materials are released from the column at di-erent
The amount of magnetic 9eld to which public can times, mixtures of materials can be identi9ed. At
be exposed is limited to 1 G. Radio reJectometry is the termination of the separation process, column
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 45

contents are heated to pyrolyse the explosive com- position in time and magnitude of the peaks is anal-
pounds into fragments, among them nitric oxide. ysed by the microprocessor to identify the concentra-
The chemiluminescent reaction of nitric oxide with tion of the vapour being detected. Previous tests with
ozone yields photons that are detected using con- this technology have shown that it works well in de-
ventional means. This signal is then analysed by a tecting high-vapour-pressure explosives but fails on
microprocessor to determine whether it comes from a low-vapour-pressure materials such as TNT or RDX.
dangerous substance. The timing of photon detection A critical review is available in Ewing et al. [34].
is used for this as di-erent compounds have di-erent
speeds of migration through the column. Through a
2.2.4. Two-stage mass spectrometry
proprietary combination of column lengths and tem-
(MS/MSlow pressure glow discharge ionisation)
perature cycles, plastic explosives can be quickly
The main theory behind this technique is that
detected.
explosive molecules are unique in terms of their
electro-negativity in their propensity to attract and
2.2.2. Gas chromatography with electron capture capture an extra electron to become negative ions.
detector (GC/ECD) Once ionised, they can be accelerated and analysed by
This technology tests for low volatility, high subjecting them to electric and/or magnetic 9elds. The
electro-negativity substances. Similar to the previous mass-to-charge ratios of the ions can be determined by
method, this technique also uses the chromatographic a variety of methods referred to collectively as mass
column as a 9rst step to separate explosive molecules spectrometry. As a 9rst step, the vapours are sampled
from other components in a gas stream. The main into a chamber with electric current that ionises air
di-erence is the detector. A small radioactive source and explosive vapours. The ions are injected into the
ionises a gas mixture to form free electrons that Jow 9rst mass spectrometer that only contains 15% of
towards the anode thereby creating a constant current. the explosive molecules. By capturing the output of
Molecules emerging from the column are mixed with the 9rst-stage mass spectrometer at a given time after
these electrons and since the explosive molecules injection or at a predetermined location, usually a slit,
are electro-negative, they grab some of the electrons. the ions with particular mass-to-charge ratios are sep-
Fewer electrons now migrate to the anode and this arated from the mixture. Large molecules of explosive
results in a decreased current. Microprocessors anal- compounds can be fragmented into smaller pieces.
yse this change for 9nding explosives. This technol- The output of the 9rst stage is brought into collision
ogy is quite good at detecting high-vapour-pressure with a stream of neutral atoms such as helium and the
compounds but fails to detect plastics and very low impact causes the large molecules to fragment into
volatility materials. smaller ions whose masses can be determined by the
second mass spectrometer. Since it is unlikely that
more than one kind of molecule will both ionise to
2.2.3. Ion mobility spectrometry (IMS)
the correct mass-to-charge ratio and break down into
The vapours or stream of airborne particles for test
proper fragments, this technique is considered very
are 9rst sampled. Air and explosive molecules di-use
speci9c in detecting explosive materials with a very
through a membrane or a 9lter into a chamber where
low false alarm rate.
sealed 63 Ni radioactive source ionises the sample. At a
high frequency (e.g. 50 times a second), small bursts
of ions are released into a separation region by an elec- 2.2.5. Fluroimmunoassay (antigenantibody
tronic gating grid. Under the inJuence of the electric reactions as a test technique)
9eld, these ions drift against the Jow of a separation In this technique a continuous Jow of vapour is
gas. The speed with which the ions move through the drawn into a preconcentrator at a rate of 2000 l=min
tube is a function of their mass, charge, physical shape and collected in 1 ml of aqueous solvent. The
and the amount of di-usion. Heavier ions of explo- output of the preconcentrator is then taken to the
sive compounds travel slowly than lighter ones. The detection unit (200 ml) vial containing immo-
drift region terminates in a collector electrode. The bilised antibodies and Juorescent labelled analogs of
46 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

explosive molecules. The antibody reacts with ex- for security purposes have been constructed [128]. In
treme speci9city to only one particular explosive. If addition, a lot of data from other devices is now col-
present in the sample, the explosive antigen will dis- lected digitally making its computer analysis quicker.
place its Juorescent labelled analog that is easily de-
tected downstream. Using this method a test takes no 3.1. Automated screening
more than 1 min and for minimising false alarms two
columns can be used in parallel with the second col- Computers can be used for signal processing and
umn containing an irrelevant antibody. A substance pattern recognition areas for the following purposes:
that causes an alarm in both columns is obviously (i) Improvement of data quality: Images viewed by
not reacting with the antibody and is a false alarm. human operators can be enhanced by the com-
The main advantage of this method is that it is fairly puter so that contraband appears in stark contrast
inexpensive, fast and fully automated. However, the to its surroundings so that humans can easily de-
antibodies of all material likely to be encountered are tect it.
needed. (ii) Automated detection of dangerous explosives:
The advances in screening technologies themselves The methodology will depend on the modality of
are not enough for developing robust screening sys- gathering data. In the case of images, the system
tems. Recently, it has been realised that an equal will have to automatically process such data to
amount of e-ort needs to be put into the computer enhance its quality, segment objects of interest
analysis of data or images generated by the various and then use some features to characterise the re-
techniques. This is important as computers can help sulting regions. However, if the data for analysis
either to automate the screening systems or help the is a 1D signal (spectra), the task involves tem-
understanding of data by assisting human operators. plate matching where test spectra are matched
The investigation of computer-based data analysis with known templates. The data could be simply
in the context of aviation security is very much an a measurement (a point in n-dimensional feature
open-ended research topic as this has not been stud- space) that needs to be classi9ed using pattern
ied in enough detail as one might expect. In the next recognition techniques.
section, we detail two important areas where signal Improvement of data quality is of major importance
processing and pattern recognition can make an in most systems. In the case of spectra matching with
important contribution. These are computer aided neutron-based techniques for explosives detection,
screening and computer-based training of screening peak identi9cation and matching is the most common
personnel. technique. If the signal is mixed with noise, the peaks
may occur with varied magnitude and false peaks
could a-ect the similarity measure with templates.
3. Computer aided screening In a number of studies, spectra must be cleaned
(smoothed) to 9nd the true peaks before any match-
In this paper we discuss two areas where computer ing with stored templates is performed [9] and signals
technology is crucial to security screening: automated processed to improve the signal-to-noise ratio. In
detection of explosives [7] and the training of screen- recent research, many more advanced pattern recog-
ers. The role of computers is likely to become crucial nition techniques are being used for spectra analysis
as we move into the age of digital X-ray techniques. including neural networks (ANCORE TNA system
Cowen [20] describes a number of advantages that dig- developed by Gozani and associates), fuzzy logic sys-
ital X-ray technology o-ers over analog X-ray. Digital tems (PELAN developed by Womble and associates),
X-ray will allow a range of computer-based analysis etc. In these approaches, pattern recognition systems
to take place in real time, e.g. magnify, enhance, direct are trained to recognise speci9c signatures during
attention to image areas, etc. and o-er high-resolution testing. The generalisation ability of such learning
images for security purposes. The digital X-ray tech- systems is quoted on test data.
nology, though a bit expensive, is already commer- Computers can also be used for modifying the qual-
cially available and portable X-ray imaging devices ity of images or data in a form most suited to human
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 47

operators for analysis. X-ray images are invariably select the appropriate enhancement algorithm on a
degraded by errors of approximation due to discrete per image basis such that this improves the quality of
nature of the image, X-ray source, detector and elec- the image by at least 20% on an objective scale that
tronic device noise. This causes random changes to correlates well with the human perception.
the grey levels of the image pixels. The image quality Burrows et al. [15] discuss how the quality of
performance speci9cation for X-ray scanners from the images can be improved for visual inspection. Specif-
requirements of the US Customs service is detailed ically they attempt to locate components, such as a
by Khan and Smith [57]. The requirements are stated detonator, wires and (less successfully) plastic ex-
in terms of resolution, contrast and penetration for the plosive, which would constitute a bomb. Standard
detection of contraband in parcels, boxes, suitcases, thresholding techniques to extract lead solder, for ex-
crates and cargo containers. ample, do not use any spatial information. By using
Noise can create problems with the visual inspec- prior knowledge, a number of contextual techniques
tion of images or automated image segmentation. In have been explored. They use a deblurring algorithm
the case of distinguishing between explosives and on the image that is convolved with a blurred point
other material on the basis of e-ective atomic num- spread function and then deconvolved with a prior
ber and density using X-rays, sophisticated classi9ers encouraging neighbouring pixels to be alike. The
need to be used to learn decision boundaries from results obtained always seem to improve the visual
training data. A number of outlier removal methods quality of images.
and noise 9ltering methods are useful in this context In addition to improving the quality of images, at-
to improve the quality of training data. Image smooth- tention direction mechanisms are extremely useful for
ing and enhancement can remove the noise improving screening operators. The issues surrounding e-ective
the quality of the images. A number of 9lters have interface designs and pointing mechanisms have not
been developed for noise removal and special empha- been fully researched. Security-based devices present
sis has been given in literature to those that preserve the overall image or information to a human operator
the edge information [81]. In the case of image anal- for decision making. By using software tools to point
ysis, image enhancement methods can be applied to attention in the images to certain areas or presenting
make the contraband more visible against its back- the most important part of the information only, the
ground. To achieve this, one must have a measure of performance of visual inspection can be improved.
image quality IQ that correlates well with the human Automated detection of explosives requires that
visual system. Only on the basis of such an objective the computer analysis can automatically di-erenti-
measure, one can rank a number of image enhance- ate between explosives and harmless substances. As
ment algorithms for a given image. Even though input, the system will have image or n-dimensional
considerable work has been done on image quality data for analysis. From the images themselves, an
measures in general, e.g. for digital video, there is n-dimensional vector of features per object present
hardly any research at developing such measures needs to be derived in order to characterise them.
to evaluate image enhancement. Recently, Bovis This process will involve image enhancement, image
and Singh [11] presented three new measures of segmentation, feature extraction and classi9cation.
how separable tumours and their background were We detail these brieJy.
in mammographic X-ray images based on contrast
quanti9cation between tumours and their surround- 3.1.1. Image enhancement
ings. However, extending such measures to images Most images are corrupted by noise at di-erent
containing explosives and other items of luggage levels and of di-erent distributions. The current
is quite di2cult. This is because of the large num- X-ray images appear either as grey scale or if taken
ber of objects present in the security X-ray images with a brown 9lter, di-erent shades of brown (light
and lack of homogeneity in grey levels within the yellow to black). The images are to be enhanced such
same object (tumours in medical images have a that the edge information should not be lost [81].
homogeneous structure). In an ideal situation, a The role of the image enhancement algorithm should
computer-based imaging system will automatically be to manipulate the contrast between objects and
48 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

their background, and to clearly present the visual also play an important part [67,82], however, it has
structures within objects or associated with them. A been suggested recently that such analysis is only of
variety of simplistic enhancement algorithms such as limited use considering the variety of objects, schemes
histogram equalisation, low-pass and high-pass 9lters to conceal objects and overlapping objects in luggage
are not suited to this and specialist algorithms are [69]. A summary of state-of-the art methods on shape
needed. analysis is available in Loncaric [68]. Additional cues
on depth can be obtained with performing a 3D image
analysis, by studying shape from shading. By observ-
3.1.2. Image segmentation
ing the shading e-ects in grey scale and its texture,
Before any object can be labelled as suspicious,
cues to the 3D structure of the object can be obtained.
it must be isolated from all others. Image segmenta-
Hardly any work has been done in this area for explo-
tion groups pixels into regions that have some form
sives detection.
of homogeneity. There is signi9cant evidence from
radiological research in medicine that conventional
3.1.4. Classi>cation
image segmentation algorithms are not suited to im-
A number of classi9ers are available for the dis-
ages encountered with unimodal distributions as in
crimination of data from di-erent classes. In particu-
our case. A number of suitable image segmentation
lar, previous studies in the area of explosives detection
methods have been designed for X-rays and simi-
have used both linear methods [104] and non-linear
lar images [106]. The quality of image segmentation
methods (e.g. [36]).
can be further improved by using relaxation labelling
A number of studies addressed the issue of au-
[119].
tomated image analysis. These studies, however,
A image thresholding method has been used by
only apply very basic image processing and pat-
Paranjape et al. [87] for the segmentation of X-ray im-
tern recognition tools. Feather et al. [36] describe a
ages. In this method, histogram information of grey
computer-assisted screening system that involves an
levels is used to segment the image. Thresholding
image processing stage and an object classi9cation
method is only useful where the image contains a few
stage. During the image processing stage, noise is
objects and each object is in strong contrast to the oth-
suppressed, image is restored and distinct regions
ers. The method is best suited for solid objects but not
corresponding to di-erent objects are located. A neu-
so much for textile objects with considerable variation.
ral network is used for object classi9cation based on
Boundary-based methods are based on the following
extracted features from the image.
principle: the grey level di-erence of two boundary
Reis [90] describes a two-stage X-ray detection sys-
pixels that belong to two di-erent neighbouring re-
tem. In the 9rst stage, a standard luggage inspection
gions is much larger than the di-erence between pixels
system is used with improved material inspection abil-
of the same region. Region-based methods use homo-
ity. Only those objects that are labelled dangerous at
geneity in image regions for their segmentation and
the 9rst stage are taken to the second stage that uses
hybrid methods combine the boundary and region in-
X-ray di-raction. This produces a high degree of reli-
formation for e-ective segmentation.
ability with less number of false alarms. On average,
one items takes 15 s for the complete system. If the
3.1.3. Feature extraction article is dangerous after the second stage, an alarm
In X-ray images, the image processing part could sounds.
involve the detection of objects with speci9c colour Wilder et al. [124] use an X-ray di-raction spec-
(dark objects have higher density and a higher chance tra. Features are extracted from these spectra and used
of being explosives) or speci9c shape (elongated ob- with a neural tree network to recognise explosives.
jects can be detonators, weapons such as knives, etc.). Bla-ert [9] tried to prove that peak detection and
In the case of colour analysis, the distribution of grey spectra identi9cation techniques developed for X-ray
levels of illicit objects could be modelled and in test di-raction and IR spectroscopy can be used for ex-
images each pixel can be evaluated how likely it is plosive detection. This study used a CXRS luggage
that it comes from an illicit object. Shape analysis can scanner to collect spectral data.
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 49

The main aim of the study by Liu [67] was to auto- develops a procedure to determine this true grey level
matically detect elongated objects such as detonator to improve the separability of objects in RL plane.
using Gabor 9lters, Hough transform and information [69] states: Unfortunately, most existing systems
fusion. This study looks at determining the size of fail to develop very sophisticated image-processing
the detonator by modelling image geometry in terms systems. In fact most research has ignored the need
of the orientation of the object, angle of X-ray, etc. to 9nd true grey levels.
To describe the orientation of the detonator, a plane Lus study also designs an algorithm for spatially
perpendicular to the conveyor and to the X-ray plane registering images. Image registration is important
that passes through the stationary slit will be used as since in multi-sensing technologies, objects in di-er-
the reference plane. In this research, the image of a ent imaging modalities need to be registered before
detonator at orientation of the =40 and =0 has an further computation can be done. This study also de-
image size of 32 23 pixels. The main steps of the signs a robust image segmentation method for X-ray
detection algorithm include: (a) 9rst use three sepa- images based on region and boundary methods. In
rate templates to detect the left, middle and right parts X-ray images, objects in a bag can be characterised
of the detonator; (b) for all non-zero pixels in the as textile objects or solid objects. It is not easy to seg-
middle output, Hough transform is used in the middle ment solid objects because textile objects are usually
window to search for all possible lines; (c) fuse the overlapped with solid objects because of their inherent
information to detect detonator. The 9rst step of tem- large grey level variations [71]. Lu [69] suggests four
plate matching, a suitable template is required which approaches to X-ray image segmentation for security
will be convolved with the image whose output is applications: thresholding methods, boundary-based
evaluated using a normalised cross-correlation mea- methods, region-based methods and hybrid methods.
sure. The drawbacks of template matching include:
(a) as the template is of small size, convolution with 3.2. Computer-based training and assistance
the image is very time consuming; (b) it is di2cult
to distinguish between two objects on the basis of It is well acknowledged that the amount of training
simple template matching alone; (c) the method is screeners receive is much less than required. A num-
very sensitive to the orientation of the detonator. The ber of companies provide X-ray interpretation courses.
template is constructed by modelling a mask that will Participants can bring their own X-ray equipment or
generate maximum output for cylindrical objects. This make arrangements with the company to provide the
approach was found to be superior to the use of equipment. The training is usually based on portable
Gabor 9lters where the real part was used for blob 9lm-based, real-time and cabinet-type X-ray systems
detection and the imaginary part was used for edge and it can be conducted at clients site. Obviously,
detection. The threshold for template matching is training courses cost money. For example, for 1 day,
determined empirically. The study evaluates the ap- 8 h course with up to eight students the training cost
proach for the e-ects of object overlapping, luggage can be between $3000 and $5000 including the in-
position, and orientation variation. structor fee and travel expenses. The topics covered
Lu and Conner [70,71] and Lu [69] use both the by these courses which are based on one-third lectures
dual-energy and the scatter technology for generating and two-thirds hands-on-training include: (i) details of
images. Based on the previous work of [129], illicit recent domestic and international incidents; (ii) details
materials can be separated from others using the RL of bombs and improvised explosive devices; (iii) in-
plane, where R is a quantity related to Ze- , and quan- formation on radiation safety; (iv) information on the
tity L is density related. These quantities can only be operation of X-ray machines; (v) details of standard
calculated reliably from the images if the true grey operative procedures; (vi) bomb recognition points;
level of image pixels is known. The true grey level of (vii) X-ray interpretation; and (vii) suspicious articles
an object can be explained as follows: when an object procedure.
of interest is placed in air, and there is no background Unfortunately, such training is not regularly pro-
objects appearing, the grey level measured is called vided to screeners and only a few hours of training is
true grey level for that imaging modality. Lus study available considering the high cost. This increases the
50 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

risk of missing to spot dangerous articles as these are are several problems why e-ective screening con-
well concealed and appear in a variety of shapes. In tinue to present a challenge for years to come. First,
addition, as security screening is monotonous, keep- the terrorists are moving towards non-conventional
ing concentration is not easy. explosives that are easy to obtain and synthesize
It has been universally accepted that computers can at home [86] and it makes their detection di2cult.
be used in a number of ways to improve the training Obviously, research e-ort is needed to tackle such
of screening personnel. First, computers can be used non-conventional explosives. Second, because explo-
for generating test pictures that contain objectionable sive detection systems are used to screen the luggage
items to a variety of complexity. These images can of foreign nationals, the acceptance criteria must be
be used in isolation for training purposes or mixed internationally agreed. This process is outlined by
with on-line images to test whether the operator is Murray and Riordon [80]. It has been suggested that
actively e2cient. In May 1998, FAA announced that from basic research to implementation of technolo-
it will introduce computer-based security screening gies in the real-world, it takes roughly 10 years and
training. This is a module of the screener pro9ciency getting agreement from various aviation agencies
evaluation and reporting system (SPEARS) which and government further delays this process. Third,
has been developed by FAA to train, evaluate, and not all research can be translated into commercial
monitor the performance of employees who oper- products. Approximately 107 pieces of luggage are
ate X-ray screening checkpoints. Airlines can use checked every year at large international airports such
SPEARS to recruit e2cient candidates. FAA awarded as Heathrow [110]. This translates into an inspection
Safe Passage International $11 million contract to time of 6 s/item. Unfortunately the systems that gen-
install the SPEARS computer-based training work- erate the lowest alarm rates are also the slowest ones
stations and train instructors. In the year 2000, FAA and unable to meet the 6 s inspection window criteria.
along with Rapiscan Security Products and Perkin As a result of this, multi-level screening is becom-
Elmer ing more popular and automatic threat recognition
Instruments received the innovation award for systems are now in demand.
generating the threat-projection system (TIP). TIP There are a number of factors that will determine
can randomly project computer generated images of the popularity of detection methods:
hundreds of guns, knives and bombs to keep screen- 1. Detectors need to be fast so that the travellers are
ers alert and test their skills at detecting dangerous not inconvenienced and accurate to 9nd any explo-
objects. When the screener detects a threat and pushes sives no matter how well hidden.
the button, TIP Jashes a congratulations message and 2. The number of false alarms should be very low.
records the screeners performance. TIP also records 3. The explosive material should be visually dis-
missed threat images. The system will help train tinguishable from other material for image-based
screeners and monitor their performance. In July 2000 methods.
FAA announced $120 million worth of three contracts 4. The cost of the technology should be low.
to Rapiscan, PerkinElmer and Heimann Systems to 5. There should be ways of keeping human operators
purchase 800 TIP installed X-ray machines from each alert for systems that need them.
vendor. By 2003, all machines with have the TIP Undoubtedly, research must focus on computational
ability. signal analysis and pattern recognition techniques.
These techniques must have the required sensitivity
and speci9city for the task of detecting explosives.
4. Discussion and conclusions The basic features of several di-erent technologies
for explosive and narcotics detection which are avail-
In this paper we have reviewed some of the screen- able in commercial devices, from the viewpoint of
ing methods to prevent the use of conventional sensitivity, selectivity, response time, complexity,
explosives to threaten aircraft safety. The review of cost and health hazards, are listed by Cable [16].
techniques to prevent biological weapons is outside Hyatt et al. [53] advocate stringent methods based
the scope of this article but presents a real threat. There on probability theory to be applied for performance
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 51

characterisation of screening system. Speller [110] Thesis, Department of Electrical and Computer Engineering,
states that in the area of aviation security, much can Virginia Tech. and State University, 1997.
[5] R. Benjamin, S. Prakoonwit, Automatic X-ray screening of
be learnt from the experiences of medical computer
aircraft hold luggage, IEE Pub. No. 437, ECOS97, 1997,
aided diagnosis (CAD) systemsautomated systems pp. 5 9.
have been produced but none is clinically being used [6] R. Bermbach, S. Vey, Detection of dangerous objects in
as they do not meet the clinical requirements. Since X-ray images, Proc. SPIE 1824 (1992) 199210.
most laboratory-based research cannot be conducted [7] P. Bjorkholm, T.R. Wang, Contraband detection using
X-rays with computer assisted image analysis, Proceedings
using real explosives, an area of research is the de- of the Symposium on Contraband and Cargo Inspection
velopment of good quality simulants, as using real Technology, 1992, pp. 111115.
explosives for getting data for analysis can be danger- [8] P. Bjorkholm, T.R. Wang, Explosives detection using three
ous [26]. Explosive simulants are proper substitutes dimensional computer assisted image analysis, SPIE 1824
for real explosives and inert by nature with accurately (1992) 122126.
[9] T. Bla-ert, Theory of stochastic processing for the
controlled physical properties. They can reliably du- optimisation of CXRS explosives detection, Proc. SPIE 2511
plicate characteristics such as density and e-ective (1995) 108119.
atomic number of the explosives [109]. Early simu- [10] J.F. Bouisset, Security technologies and techniques: airport
lants were rigid plastics with limited utility. Currently security systems, J. Test. Eval. 22 (3) (1994) 247250.
[11] K.J. Bovis, S. Singh, Enhancement technique evaluation
a number of simulants are in use (see Lu [69] for
using quantitative measures on digital mammograms, in:
details). In addition to simulants, other test objects M.J. Ya-e (Ed.), Proceedings of the Fifth International
are often also considered for studies such as plastic, Workshop on Digital Mammography, Medical Physics
aluminium and steel wedges. Publishing, Toronto, Canada, 2000, pp. 547553.
We expect that this review will provide a good [12] D.R. Brown, A. Coates, S.N. Kuo, R. Loveman, E. Pentaleri,
R.C. Rynes, Cargo inspection based on pulsed fast neutron
background to researchers in signal processing, image analysis, Proc. SPIE 2396 (1997) 7685.
analysis and pattern recognition communities about [13] D.R. Brown, T. Gozani, Thermal neutron analysis
explosives detection systems to encourage further technology, Proc. SPIE 2396 (1997) 8594.
work from the point of view of signal analysis rather [14] L.J. Burnett, D.R. McKay, Signal processing considerations
than signal generation. For several years, the com- in NMR detection of liquid explosives, Proc. SPIE 1824
(1992) 212222.
mercial companies and other agencies have thought [15] J.D. Burrows, J.A. Little, K.V. Mardia, C.C. Taylor,
that better screening performances are only possible A.N. Walder, Statistical approaches to image restoration,
by better quality hardwarewith an increased role European Convention on Security and Detection, Brighton,
of computers for signal processing, there is no doubt 1995, pp. 59 63.
[16] A.P. Cable, Some aspects of the use of intelligent systems
that much is to be gained from the computational
engineering in the design of airport security programmes,
analysis of data and images from such hardware. Proceedings of the First International Conference
on Intelligent Systems Engineering, Edinburgh, 1992,
pp. 7785.
[17] A. Chutjian, M.R. Darrach, Improved portable reversal
References electron attachment (READ) vapor detection system for
explosives detection, Proceedings of the Second Explosives
[1] A.L. Abbot, R.W. Conners, X. Wei, N. Chen, Simulation Detection Symposium and Aviation Security Technology
of X-ray imaging for luggage inspection, Proceedings of Conference, 1996, pp. 176 180.
the Second Explosives Detection Symposium and Aviation [18] R.W. Conners, A.L. Abbot, Q. Lu, T.H. Drayer, S. Zou,
Security Conference, 1996, pp. 248253. P.E. LaCasse, S.M. Zhong, A multisensor X-ray system
[2] M. Annis, P. Bjorkholm, D. Schafer, Automatic detection of for the detection of explosives in luggage, Proceedings of
explosives using X-ray imaging, in: T.P. Tsccounmis (Ed.), the Second Explosives Detection Technology Symposium
Access Security Screening Challenges and Solutions, ASTM and Aviation Security Technology Conference, 1996,
STP 1127, American Society for Testing and Materials, pp. 254 259.
Philadelphia, 1992, pp. 6881. [19] R.W. Conners, A.L. Abbot, Q. Lu, T.N. Drayer, S. Zou,
[3] R. Armstrong, S.M. McDaid, M.J. Cooper, G. Harding, P.E. LaCasse, S.M. Zhong, X. Shi, W. Liu, Smart multiple
Potential applications of a novel X-ray source in material X-ray sensor system for explosives detection, Proceedings
characterisation, Proc. SPIE 2092 (1993) 411416. of the Second Explosives Detection Technology Symposium
[4] P.J. Arvanitis, Developing an automated explosives detection and Aviation Security Technology Conference, 1996, pp.
prototype based on the AS&E 101ZZ system, Masters 248253.
52 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

[20] A.R. Cowen, Digital X-ray imaging, Meas. Sci. Technol. 2 [36] T. Feather, I. Guan, A. Lee-Kwen, R.B. Paranjape,
(1991) 691707. CAXSSan intelligent threat detection system, Proc. SPIE
[21] A.X. da Silva, V.R. Crispim, Use of thermal neutron 1824 (1993) 152161.
tomography for the detection of drugs and explosives, [37] K.O. Fultz, Aviation security: technologys role in ad-
Radiat. Phys. Chem. 61 (2001) 767769. dressing vulnerabilities, Statements GAO/T-RCED/NSIAD-
[22] G.L. Dillingham, Aviation security: terrorist acts 96-262, September 1996.
demonstrate urgent need to improve security at nations [38] P. Gokhale, E.M.A. Hussein, Analysis of transmitted neutron
airports, Testimony before committee on commerce, science spectrum for identi9cation of materials using isotropic
and transportation, US Senate, GAO-01-1162T, September sources, Proc. SPIE 2511 (1995) 2532.
20, 2001. [39] T. Gozani, Principles of nuclear-based explosive detection
[23] K.W. Dolan, R.W. Ryon, D.J. Schneberk, H.E. Martz, R.D. systems, Proceedings of the First International Symposium
Rikard, Explosives detection limitations using dual-energy on Explosives Detection Technology, 1991, pp. 2755.
radiography and computed tomography, Proceedings of [40] T. Gozani, Novel applications of fast neutron interrogation
the First International Symposium on Explosives Detection methods, Nucl. Instrum. Methods A 353 (1994) 635640.
Technology, 1991, pp. 252260. [41] T. Gozani, Inspection techniques based on neutron
[24] R.H. Doney, The UK perspective on aviation security, interrogation, Proc. SPIE 2396 (1997) 920.
Proceedings of the First International Symposium on [42] D.R. Greenlee, A framework for the objective test and
Explosives Detection Technology, 1991, pp. 19 22. evaluation of explosive detection technology, Proceedings of
[25] T.H. Drayer, Q. Lu, P. Arvanitis, X. Shi, Y. Cui, R.W. the First International Symposium on Explosive Detection
Conners, A.L. Abbot, Prototype multiple sensor luggage Technology, 1991, pp. 376 380.
inspection system for explosives detection, Proceedings of [43] L. Grodzins, Photons in-photons out: non-destructive
the 1998 International Conference on Imaging Science, inspection of containers using X-ray and gamma
Systems and Technology, July 6, 1998. ray techniques, Proceedings of the First International
[26] R.F. Eilbert, Development and evaluation of simulants for Symposium on Explosive Detection Technology, 1991, pp.
X-ray based explosive detection systems, in: Proceedings of 201211.
the Second Explosives Detection Technology Symposium [44] K.W. Habiger, J.R. Cli-ord, R.B. Miller, W.F. McCullough,
and Aviation Security Technology Conference, 1996, pp. EXDEP/CTX: an explosive detection system for screening
49 54. luggage with high energy X-rays, Proceedings of the IEEE
Particle Accelerator Conference, San Francisco, Vol. 4,
[27] R.F. Eilbert, K.D. Krug, Aspects of image recognition in
1991, pp. 26222624.
vivid technologys dual-energy X-ray system for explosive
[45] L.V. Haley, S.F. Hallowell, Laser based explosives
detection, SPIE 1824 (1992) 127143.
detection, Proceedings of IEEE 34th Annual International
[28] Europ Scan Inc., Xcalibur, an innovative multi-energy
Carnahan Conference on Security Technology, Ottawa,
X-ray explosive device detection systems, Proceeding of
2000, pp. 207217.
the Second Explosives Detection Symposium and Aviation
[46] S.F. Hallowell, Screening people for illicit substances: a
Security Conference, 1996, pp. 230 235.
survey of current portal technology, Talanta 54 (3) (2001)
[29] J.P.O. Evans, Development of a 3-D X-ray system, Ph.D.
447 458.
Thesis, Department of Electrical Engineering, Nottingham
[47] G. Harding, B. Shreiber, Coherent X-ray scatter imaging and
Trent University, UK, 1993.
its applications in biomedical science and industry, Radiat.
[30] J.P.O. Evans, H.W. Hon, Dynamic stereoscopic X-ray Phys. Chem. 56 (12) (1999) 229245.
imaging, NDT&E International 35 (5) (2002) 337345 [48] K. Heiskanen, T. Meyer, D. Pillor, E. Scheinman, S. Wol-,
[31] J.P.O. Evans, M. Robinson, J. Bentley, 3-D X-ray image F. Roder, Illicit drug detection using CTX5000, Proceedings
modelling-latest developments, Proc. European Conference of the Symposium on Counter Law Enforcement: Applied
on Security and Detection, IEE, 1997, pp. 183187. Technology for Improved Operational E-ectiveness, 1995,
[32] J.P.O. Evans, M. Robinson, S.X. Godber, Pseudo- pp. 6 33.
tomographic X-ray imaging for use in aviation security, [49] K.A. Heiskanen, F.L. Roder, Explosives detection systems:
IEEE AES Systems Mag. 13 (1998) 25 30. the real-world experience, Proc. SPIE 2396 (1997) 142
[33] J.P.O. Evans, M. Robinson, D. Lacey, Testing and 155.
evaluation of an advanced (3-D) X-ray screening system, [50] S. Hnatnicky, CXRS explosives detection airport prototype,
in: Proceedings of the European Convention on Security and Proc. SPIE 2396 (1997) 180190.
Detection, IEE, London, 1997, pp. 50 54. [51] E.M.A. Hussein, Detection of explosive materials using
[34] R.G. Ewing, D.A. Atkinson, G.A. Eiceman, G.J. Ewing, A nuclear radiation: a critical review, Proc. SPIE 1736 (1992)
critical review of ion mobility spectrometry for the detection 130137.
of explosives and explosive related compounds, Talanta, 54 [52] E.M.A. Hussein, E.J. Walker, Review of one-side
(3) (2001) 515 529. approaches to radiographic imaging for the detection of
[35] A. Fainberg, Explosives detection for aviation security, explosives and narcotics, Radiat. Meas. 29 (6) (1998)
Science 255 (1992) 15311537. 581591.
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 53

[53] R. Hyatt, M.L. Spradling, J.J. Pennella, Application [69] Q. Lu, The utility of X-ray dual-energy transmission and
of probability-of-detection concepts to performance scatter technologies for illicit material detection, Ph.D.
characterisation of contraband detection systems, processes Thesis, Department of Computer Engineering, Virginia
and personnel at border crossing, Proc. SPIE 2396 (1997) Polytechnic Institute and State University, Blacksburg, VA,
4047. 1999.
[54] P.Z. Jankowski, A.G. Mercado, S.F. Hallowell, FAA [70] Q. Lu, R.W. Conners, X-ray image analysis for luggage
explosive vapor/particle detection technology, Proc. SPIE detection, Proceedings of the Second Explosives Detection
1824 (1992) 1324. Technology Symposium and Aviation Security Technology
[55] I.D. Jupp, P.T. Durrant, D. Ramsden, T. Carter, G. Dermody, Conference, 1996, pp. 242247.
L.B. Pleasants, D. Burrows, The non-invasive inspection of [71] Q. Lu, R.W. Conners, A new image analysis method
baggage using coherent X-ray scattering, IEEE Trans. Nucl. for automated illicit material detection, Proceedings of
Sci. 47 (6) (2000) 19871994. the JCIS98-Joint Conference on Information Science,
[56] I.D. Jupp, P.T. Durrant, D. Ramsden, T. Carter, G. Vol. IV, Research Triangle Park, NC, 2328 October, 1998,
Dermody, L.B. Pleasants, D. Burrows, S.J. Mackenzie, The pp. 178182.
non-invasive inspection of baggage using coherent X-ray [72] R.D. Luggar, W.B. Gilboy, N. MacCuaig, Industrial
scattering, Proceedings of the Nuclear Science Symposium, potential of Rayleigh scattered X-rays for identi9cation of
Toronto, Vol. 2, 1998, pp. 1006 1013. low-Z materials, Proc. SPIE 2092 (1993) 378386.
[57] S.M. Khan, D.E. Smith, U.S. customs service imaging [73] R.D. Luggar, J.A. Horrocks, M.J. Farquharson, R.D. Speller,
requirements for X-ray scanners, Proc. SPIE 2092 (1993) R.J. Lacey, Real-time analysis of scattered X-ray spectra
437446. for sheet explosives detection, Proc. SPIE 2396 (1997)
[58] KirWaly, L. OlWah, J. Csikai, Neutron-based techniques for 219228.
detection of explosives and drugs, Radiat. Phys. Chem. 61 [74] R.D. Luggar, J.A. Horrocks, R.D. Speller, R.J. Lacey, Low
(2001) 781784. angle X-ray scatter for explosives detection: a geometry
[59] D. Kitzinger, S. Cheung, High resolution 3D geometric optimisation, Appl. Radiat. Isot. 48 (2) (1997) 215224.
modeling for improved explosive detection scheme, [75] R.D. Luggar, J.A. Horrocks, R.D. Speller, G.J. Royle, R.
Proceedings of the Second Explosives Detection Technology Lacey, Optimisation of a low angle X-ray scatter system for
Symposium and Aviation Security Technology Conference, explosives detection, Proc. SPIE 2511 (1995) 4655.
1996, pp. 113117.
[76] D.L. McMakin, D.M. Sheen, H.D. Collins, T.E. Hall,
[60] E.A. Knapp, R.B. Moler, A.W. Saunders, W.P. Trower,
R.H. Severtsen, Wideband, millimeter-wave, holographic
Direct imaging of explosives, Appl. Radiat. Isot. 53 (2000)
weapons surveillance systems, Proc. SPIE 2511 (1995)
711716.
131141.
[61] H.A. Kramers, On the theory of X-ray absorption and of
[77] A.G. Michette, C.J. Buckley, X-ray Science and Technology,
the continuous X-ray spectrum, Philos. Mag. 46 (1923)
Institute of Physics Publishing, Bristol, 1993, pp. 1 44.
836871.
[78] P. Morvan, Role of advanced technology within a broad
[62] R.A. Krauss, W.J. Hughes, Signatures of explosives by
security approach, Proceedings of the First International
elemental composition analysis, Proceedings of the Second
Symposium on Explosive Detection Technology, 1991, pp.
Explosives Detection Technology Symposium and Aviation
2325.
Security Technology Conference, 1996, pp. 1825.
[63] K.D. Krug, W.F. Aitkenhead, R.F. Eilbert, J.H. Stillson, [79] N.C. Murray, R.J. Lacey, P.H. Mason, Exploitation of
J.A. Stein, Detecting explosives or other contraband by X-ray technology for the detection of contraband-aviation
employing transmitted and scattered X-rays, US Patent security applications, in: European Conference on Security
5,600,700, February 4, 1997. and Detection, IEE, London, 1997, pp. 1318.
[64] K.D. Krug, J.A. Stein, Advanced dual energy X-ray for [80] N.C. Murray, K. Riordon, Evaluation of automatic
explosives detection, Proceedings of the First International explosive detection systems, Proceedings of the 29th Annual
Symposium on Explosive Detection Technology, 1991, pp. International Carnahan Conference on Security Technology,
282284. Sanderstead, UK, 1995, pp. 175 179.
[65] K.D. Krug, J.A. Stein, Device and method for inspection of [81] M. Nagao, T. Matsuyama, Edge preserving smoothing,
baggage and other objects, US Patent 5,490,218, February Proceedings of the Fourth International Conference on
6, 1996. Pattern Recognition, 1978, pp. 518520.
[66] K.D. Krug, J.A. Stein, A.L. Taylor, Device and method [82] J.A. Navarro, D.A. Becker, B.T. Kenna, C.F. Kossack, A
for inspection of baggage and other objects, US Patent 5, general protocol for operational testing and evaluation of
319,547, June 7, 1994. bulk explosive detection systems, Proceedings of the Second
[67] W. Liu, Automatic detection of elongated objects in Explosives Detection Technology Symposium and Aviation
X-ray images of luggage, Masters Thesis, Department of Security Technology Conference, 1996, pp. 347367.
Electrical and Computer Engineering, Virginia Tech. and [83] A.K. Novako-, FAA bulk technology overview for explosive
State University, Blacksburg, VA, 1997. detection, SPIE 1824 (1992) 212.
[68] S. Loncaric, A survey of shape analysis technique, Pattern [84] NRC, Airline Passenger and Security Screening, new
Recognition 31 (8) (1998) 9831001. Technologies and Implementation Issues, National Research
54 S. Singh, M. Singh / Signal Processing 83 (2003) 31 55

Council, publication NMAB-482-1, National Academy [104] X. Shi, Improving object classi9cation in X-ray luggage
Press, Washington, DC, 1996. inspection, Ph.D. Thesis, Department of Computer and
[85] T. Okoshi, Three Dimensional Imaging Techniques, Electrical Engineering, Virginia Tech. and State University,
Academic Press, New York, 1976. 2000.
[86] J.C. Oxley, Explosives detection: potential problems, Proc. [105] D.C. Shreve, R. Schirato, R. Polichar, V. Orphan,
SPIE 2511 (1995) 217226. 3-dimensional X-ray imaging for the detection of
[87] R. Paranjape, M. Sluser, K. Runtz, Segmentation of contraband, Proceedings of the First International
handguns in dual energy X-ray imagery of passenger Symposium on Explosive Detection Technology, 1991, pp.
carry-on-luggage, Proceedings of the 1998 11th Canadian 285 296.
Conference on Electrical and Computer Engineering, [106] S. Singh, K.J. Bovis, Digital mammography segmentation,
CCECE, Vol. 1, Toronto, Canada, 24 28 May, 1998. in: J. Suri, S.K. Setarehdan, S. Singh (Eds.), Advanced
[88] P.A. Polski, International aviation security research and Algorithmic Approach to Medical Image Segmentation:
development, J. Test. Eval. 22 (3) (1994) 267274. State-of-the-Art Application in Cardiology, Neurology,
[89] T. Rayner, B. Thorson, S. Beevor, R. West, Explosives Mammography and Pathology, Springer, Berlin, 2002, pp.
detection using quadrupole resonance analysis, Proceedings 440540.
of the Second Explosives Detection Symposium and [107] S.W. Smith, Detection of objects concealed under persons
Aviation Security Conference, 1996, pp. 275 280. clothing using the SECURE system, Proceedings of
[90] H. Reis, Two-level X-ray based explosives detection system, the First International Symposium on Explosive Detection
Proc. SPIE 2278 (1994) 5863. Technology, 1991, pp. 261268.
[91] M. Robinson, Three dimensional visual screening system, [108] R.C. Smith, P.R. Krall, Full volume dual-energy high
EC Patent 0261984, 1987. speed computed tomography (CT) explosives detection
[92] M. Robinson, The visual presentation of information derived system, Proceedings of the Second Explosives Detection
from a 3-D image system, EC Patent 94300822.7, 1997. Symposium and Aviation Security Conference, 1996,
[93] M. Robinson, J.P.O. Evans, S.X. Godber, N. Murray, Solid pp. 260 263.
image models derived from security X-ray equipment, in: [109] L. Spanier, J.W. Kury, Design and validation of inert bulk
Proceedings of the European Convention on Security and energetic material simulants for 9eld testing X-ray based
Detection, IEE Conf. Publication 408, London, 1995, pp. inspection systems, Proceedings of the Second Explosives
306 309. Detection Technology Symposium and Aviation Security
[94] F.L. Roder, The evolution of computed tomography (CT) Technology Conference, 1996, pp. 55 59.
as an explosives detection modality, Proceedings of the [110] R. Speller, Radiation-based security, Radiat. Phys. Chem.
First International Symposium on Explosive Detection 61 (2001) 293300.
Technology, 1991, pp. 297308. [111] R.D. Speller, J.A. Horrocks, R.J. Lacey, X-ray scattering
[95] F.L. Roder, B.G. Stebler, Image processing requirements signatures for materials identi9cation, Proc. SPIE 2092
for computed tomographic explosives detection, Proc. SPIE (1993) 366377.
1824 (1992) 3038. [112] J.A. Stein, Baggage inspection and the like, US Patent
[96] D. Schafer, M. Annis, M. Hacker, New X-ray technology 5,044,002, August 27, 1991.
for the detection of explosives, Proceedings of the [113] H. Strecker, Simulation based training and testing of
First International Symposium on Explosive Detection classi9cation schemes for CXRS explosives detection, Proc.
Technology, 1991, pp. 269 281. SPIE 2511 (1995) 8898.
[97] D. Schafer, R.D. Swift, AS&E cargo vehicle X-ray [114] H. Strecker, Automatic detection of explosives in airline
inspection system, Proc. SPIE 2093 (1993) 472482. baggage using elastic X-ray scatter, Medicamundi 42 (2)
[98] M. Schmidt, A review of X-ray computed axial tomography, (1998) 3033.
NDT-Australia 26 (2) (1989) 4247. [115] H. Strecker, G. Harding, H. Bomsdorf, J. Kanzenback,
[99] T. Seed, J.D. Zahrt, A virtual prototype for an explosives R. Linde, G. Martens, Detection of explosives in airport
detection system, Proc. SPIE 2092 (1993) 482491. baggage using coherent X-ray scatter, Substance Detection
[100] D.C. Seward, Explosive detection using dielectrometry, Systems, Proc. SPIE 2092 (1993) 399410.
Proceedings of the First International Symposium on [116] D. Sunderman, G. Gaillard, A.P. Lilot, S. Maitrejean, P.O.
Explosive Detection Technology, 1991, pp. 441 443. Pellegrin, D. Sedaries, Gaseous X-ray detectors to examine
[101] D.M. Sheen, D.L. McMakin, H.D. Collins, Circular scanned freight containers and vehicles, Proc. SPIE 2092 (1993)
millimeter-wave imaging system for weapon detection, Proc. 417428.
SPIE 2511 (1995) 122130. [117] R.D. Swift, Mobile X-ray backscatter imaging system
[102] D.M. Sheen, D.L. McMakin, H.D. Collins, T.E. Hall, for inspection of vehicles, Proc. SPIE 2396 (1997)
Near-9eld millimeter-wave imaging for weapon detection, 124132.
Proc. SPIE 1824 (1992) 223233. [118] R.D. Swift, Conceptual development of a transportable/
[103] T.G. Sheldon, R.J. Lacey, N.C. Murray, G.M. Smith, deployable X-ray inspection system for cars and vans, Proc.
Performance testing of explosives and weapon detection SPIE 2396 (1997) 133139.
systems, Proceedings of the First International Symposium [119] T.Q. Thai, Segmentation of X-ray images using probabilistic
on Explosive Detection Technology, 1991, pp. 368380. relaxation labelling, Proceedings of the First International
S. Singh, M. Singh / Signal Processing 83 (2003) 31 55 55

Symposium on Explosive Detection Technology, 1991, pp. Proceedings of the 13th International Conference on
860 872. Applications of Accelerators in Research and Industry,
[120] T.O. Tumer, C.T. Groton, J. Baritelle, B. Rhoton, Denton, TX, NIM B99, 1995, p. 757.
Three-dimensional container and cargo inspection system, [126] P.C. Womble, G. Vourvopoulos, I. Novikov, J. Paschal,
Proc. SPIE 2396 (1997) 4857. PELAN 2001: current status of the PELAN explosives
[121] D. Vartsky, G. Engler, M.B. Goldberg, A method detection system, Proceedings of the SPIE Conference on
for detection of explosives based on nuclear resonance Hard X-ray and Gamma Detector Physics, San Diego, 2001.
absorption of gamma rays in 14N, Proc. SPIE 2092 (1993) [127] W. Xie, Simulation of X-ray imaging system for luggage
307316. inspection, Masters Thesis, Department of Electrical and
[122] G. Vourvopoulos, Methods for the detection of explosives Computer Engineering, Virginia Tech. and State University,
and contraband, Chem. Ind. 8 (1994) 297300. Blacksburg, VA, 1995.
[123] G. Vourvopoulos, P.C. Womble, Pulsed fast/thermal neutron [128] W. Yi, W. Jingjin, W. Kuilu, L. Guozhi, Z. Guofu, Z.
analysis: a technique for explosives detection, Talanta 54 Yuanlin, D. Hongliang, Portable pulsed electronic digital
(2001) 449468. X-ray imager, NDT&E J. 32 (1999) 215218.
[124] J. Wilder, A. Garcia, S. Weiner, Neural net based explosives [129] S. Zou, A sensor fusion approach for explosives
recognition with coherent X-ray scatter, Proc. SPIE 2511 detection, Masters Thesis, Department of Electrical and
(1995) 99107. Computer Engineering, Virginia Tech. and State University,
[125] P.C. Womble, F.J. Shultz, G. Vourvopoulos, Non-destructive Blacksburg, VA, 1998.
characterisation using pulsed fast-thermal neutrons,

You might also like