Professional Documents
Culture Documents
TABLE I
M ETAL C ONTENT AND B URIAL D EPTH OF THE E XPERIMENTAL T HREAT
P OPULATION . T HE P RECISE D EPTH R ANGES FOR E ACH B URIAL
D EPTH C ATEGORY H AVE B EEN O MITTED TO O BSCURE
THE P RECISE P ERFORMANCE C HARACTERISTICS OF THE
P ROPRIETARY GPR-BASED BTD S YSTEM . T HE “S TANDARD
B URIAL D EPTHS ” C ATEGORY H AS A M EDIAN B URIAL
D EPTH OF A PPROXIMATELY F OUR I NCHES . “D EEP
B URIAL D EPTHS ” C ORRESPONDS TO THE
D EEPEST 10 P ERCENT OF T HREATS , AND
H AS A G REATER M EDIAN D EPTH
Fig. 8. Illustration of the process for computing the SED feature. Around
the spatial coordinates of the prescreener alarm location and at the time-index
estimated using MSEK, a 15 × 15 pixel patch is extracted which is divided
into a 3 × 3 grid of cells. In each cell, a histogram of gradients is computed
using four angle bins. The final descriptor vector supplied to the classifier
is the average of computing SED on 50 temporal scans, with the first one Fig. 9. ROC curves for the two individual prescreeners, F2 and CCY, as well
computed at five temporal locations above the MSEK temporal location and as their fusion. Note that the y-axis has been truncated to the range Pd =
the last one is 44 time samples lower. [0.5, 1]. The x-axis labels have been omitted—see Section III-C for details.
A final decision statistic is computed for each track by to data set changes. We note that both using edge templates
summing the top 12 classifier decision statistics. The two and a “no-edge” bin are similarly implemented in the EHD
resulting statistics, one from cross-track and one from down- algorithm [32].
track, are multiplied to obtain a final statistic for the alarm. 2) Classifier and Training: A SVM [48] with the radial
basis function was used for class prediction. This was imple-
mented using the libSVM package [49], with parameters γ =
D. Spatial Edge Descriptors 0.001 and SVM cost parameter C = 15, which were chosen in
The SED algorithm is based upon extracting shape informa- cross-validation. At each spatial location indicated by the pre-
tion, via gradient histograms, in 2-D GPR images. Unlike most screener, the time index of the buried threat signal is estimated
descriptors proposed for GPR-based BTD, SED operates on using an energy-based procedure referred to as MSEK [38].
spatial imagery: images comprised of GPR returns collected The MSEK method computes the signal energy along an
at the same instance in time. In these images, referred to A-scan (i.e., over the GPR temporal dimension, smooths the
as T-scans, buried threat signals appear circular rather than energy timeseries, and then identifies local maxima. For both
hyperbolic. This is illustrated in Fig. 8. The SED algorithm threat and nonthreat data, we extract two local maxima for
is designed to capture this shape to provide a descriptor of training.
buried threats to the classifier. 3) Threat Inference: During threat inference, SED features
1) Feature Extraction: The SED feature is extracted from are extracted at regular intervals down the temporal (or depth)
a GPR volume located at the prescreener alarm location, axis. The temporal locations are obtained, beginning with the
S(x, y, t), with sizes (T ,XT,DT) = (50, 15, 15). The process first temporal index, and then by sampling one location every
for computing SED is illustrated in Fig. 8. For the i th temporal 25 temporal indices. This results in a total of 14 temporal
sample in the volume, ti , we extract an image I (x, y) = locations. At each of these locations, we extract SED features
S(x, y, t = ti ). The image is divided into a 3 × 3 grid of cells. at each spatial location within a 5 × 5 spatial grid. This
In each cell, a histogram of gradients is computed using four results in a total of 350 full SED feature vectors for each
(i)
angle bins, resulting in a 36-D descriptor for the image, Hx y . prescreener alarm. This extraction can be done very efficiently
The final descriptor is constructed
by averaging the descriptors by reusing gradient computations between neighboring SED
over time, Hx y = (1/T ) i Hxi y . The averaging step is feature vectors. A final decision statistic for a given pre-
intended to increase the signal-to-noise ratio of the descriptor, screener alarm location is computed by applying the classifier
due to uncertainty in the temporal location of the threat signal, to all 350 SED feature vectors, and then summing the top
and the tendency of the threat signal to appear over many time 25 resulting decision statistics. We have found the performance
samples. to be largely insensitive to the number of decision statistics in
The gradients at each pixel are computed using four the summation.
3 × 3 pixel Sobel filters, each rotated by 45°. An additional bin
is added in this step corresponding to “no-edge” if the response VI. E XPERIMENTAL R ESULTS
to all templates is less than a specified threshold. In that case,
a count is maintained of the number of pixels in the cell whose A. Prescreener Results
gradient response was less than the threshold. The threshold The performance results obtained by applying the prescreen-
we use is 3, and this parameter has been relatively insensitive ers to the experimental GPR data set are presented in Fig. 9.
MALOF et al.: LARGE-SCALE MULTI-INSTITUTIONAL EVALUATION OF ADVANCED DISCRIMINATION ALGORITHMS 6937
Fig. 11. ROC curves of all the individual discrimination algorithms when Fig. 12. ROC curves of all the individual discrimination algorithms when
applied (but not trained) to threats buried at standard burial depths (i.e., not applied (but not trained) on threats buried at deep burial depths. Note that
deep). Note that the y-axis has been truncated to the range Pd = [0.5, 1]. the y-axis has not been truncated to the range Pd = [0.5, 1]. Also, the x-axis
Also, the x-axis labels have been omitted—see Section III-C for details. labels have been omitted—see Section III-C for details.
a substantial improvement in Pd across all values of FAR. Among threats buried at common depths, the SED algorithm
The substantial benefit of fusion, without any subselection or performs best over most of the ROC curve, and gains a
weighting of the individual discriminators, suggests that the noticeable performance advantage over LG. EHD also gains
algorithms possess some complementary decision characteris- performance relative to LG in this regard. This is consistent
tics, despite utilizing seemingly similar processing approaches. with the hypothesis that threats may require different process-
ing depending upon their burial depth.
TABLE II
C ONCEPTUAL D IFFERENCES B ETWEEN THE F EATURES IN T HIS W ORK .
W ITH R ESPECT TO T HESE Q UALITIES , N O T WO F EATURES
IN THE G ROUP A RE I DENTICAL
Fig. 13. Conceptual processing pipeline for feature extraction used by our
group. All features presented in this paper represent special cases of this
pipeline. The pipeline begins with edge extraction, in which filters are used
to identify the locations, strengths, and orientations of edges in the GPR
imagery. For example, LG uses LG filters at multiple scales and orientations;
while gprHOG, EHD, and SED use simpler single-scale filters. The next
step of processing aims to pool, or “aggregate,” the edge information within
predefined spatial or temporal regions. Examples of aggregation regions can
be found in Fig. 7 (gprHOG) and Fig. 8 (SED). The edge information within
each aggregation region is summarized using an “encoding,” with the aim of
compressing the information and reducing the dimensionality of the resulting
feature. Encodings may involve counting (EHD, SED), summing (gprHOG),
or taking the max-order statistic (LG) of the edges within each pooling region.
small cube of GPR data (e.g., centered at a suspicious spatial suggesting that some of the feature concepts are highly
location), and return a decision statistic, indicating the relative complementary.
likelihood that a buried threat is located at that location. The
discriminators produced in this effort were compared using a Algorithm 1 Algorithm to Compute Concavity Measures, c+
large GPR data set collected using a vehicle-mounted GPR and c−
BTD system comprised of 120 000 m2 of surface area and Input: A GPR slice, S(t, z), where t is the temporal axis
4552 buried threat encounters. and z is the spatial dimension. Denote the spatial center of
Four discriminators were submitted: LG, EHD, gprHOG, the patch by z 0 .
and SED and the results reveal similar performance among Parameters:
them, but with the SED and LG algorithm providing the best ω = Size of the search window for maxima (positive integer)
detection rates over most of the considered range of FAR. γ = The threshold to retain maxima values
Further analysis revealed that the LG discriminator had a Output: Two concavity measures, c+ and c−
substantial advantage over the others on deeply buried threats, 1. Compute S (t, z) = | max(S(t, z), 0)|∀(t, z)
while SED almost always achieved the best performance on 2. Compute t ∗ = max S (i, z 0 )
threats with common burial depths (i.e., all nondeeply buried i
3. If S (t ∗ , z 0 ) ≥ γ set c+ = 0 and go to step (9), else,
threats). A simple fusion of the discriminators, involving no
initialize the set of coordinates X = {(t ∗ , z 0 )}
discriminator subselection or weighting, yielded substantial
4. For j = 1 . . . 5
performance improvements.
(a) Set i ∗ = arg min |t ∗ − i |s.t.S (t ∗ + i, z 0 + j ) ≥ γ
i∈[−ω,ω]
A. Major Conclusions Regarding Discriminator Design (b) If no i ∗ = ∅, go to step (5),
Our conclusions are divided into two parts. The first does else add (t ∗ + i ∗ , z 0 + j ) to X and set t ∗ = t ∗ + i ∗
not directly involve the experimental results and instead End
focuses on discriminator design practices that our group has 5. Repeat step (4), with j = −1 . . . − 5. The set C now
found to be beneficial over the last decade. These are practices contains a sequence of (spatially) neighboring points, with
that were employed by all members of the group in the a maximum potential length of 11 points. See Fig. 6 for
design of their discriminators and thereby form a consensus examples on real data.
of opinion. These practices are described in more detail in 6. Construct X as the set of all possible sequences of
Section VIII-A, but we summarize our findings as follows. consecutive points that can be constructed from the points
1) We employ two-stage discriminator processing in X.
pipelines, comprised of feature extraction and a 7. c+ = 1/|X | x∈C f (x), where f (.) is a function that
conventional supervised classification model. measures concavity as the difference between a sequence’s
2) Processing GPR imagery (2-D slices) has been more midpoint and the average of its end-points.
effective than processing 3-D GPR data directly, 8. Set S = −S and repeat steps (1)-(7) to obtain c−
although we suggest this for future work (see
Section IX-B).
3) We have found that effective features focus on succinctly
B. Future Challenges With Discriminator Design
encoding the locations, strengths, and orientations of
edges in the GPR imagery. All of our features employ There are many open questions regarding the design of
the conceptual processing pipeline in Fig. 13, which GPR-based BTD algorithms, and opportunities to improve
relies upon this strategy. performance. We describe a few that we believe are most
Our second set of conclusions focuses on the experimental promising for future work.
results presented in this paper, and their implications regarding 1) Feature Learning and Deep Learning: All of the algo-
discriminator design concepts. A detailed discussion of these rithms presented in this paper, and many in the litera-
implications is provided in Section VIII-C, but we summarize ture, employ a conventional image-based object recognition
them as follows. pipeline comprised of hand-crafted features and a conventional
1) The circular threat model, upon which the SED discrim- supervised classification model. Deep learning algorithms,
inator is based, is a viable alternative to the popular such as convolutional neural networks, have the capability
hyperbolic model (see Fig. 14). to learn features directly from the data, and they yielded
2) Multiscale feature representations (e.g., in LG) are likely groundbreaking results in other application domains. Some
to be beneficial for the detection of threats across papers have investigated applying these methods to GPR-based
multiple burial depths. BTD [24], [64], [65]; however, our group has not (yet)
3) Encoding shape change along the temporal axis of found these approaches to outperform conventional methods.
B-scans (e.g., as gprHOG does) provides relatively little Nonetheless, we see great potential in deep learning tech-
useful decision-relevant information, while substantially niques, and consider their investigation an important line of
increasing feature dimensionality, and thereby it tends inquiry.
lower overall detection performance. 2) 3-D Processing: All of the approaches here, and most in
4) A simple fusion of the discriminators in this the literature, perform detection by analyzing GPR imagery
paper substantially increased detection performance, (2-D slices of 3-D GPR data). There have been several
6942 IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 57, NO. 9, SEPTEMBER 2019
A PPENDIX Fig. 16. (Left) Illustration of a GPR slice. (Middle) Sequences of local
maxima values (in red) that were identified for computing c+ . This sequence
P RESCREENER A LGORITHM D ETAILS was identified within the black dashed box in the GPR slice. The full
This appendix provides technical descriptions of the two procedure for identifying such sequences, and computing c+ , are described
in Table III. The sequences of local minima values (in blue) that were
prescreener algorithms employed in this paper, as well as identified for computing c− .
their fusion. Note that, prior to prescreening, preprocessing is
applied in which the time of the ground response is estimated
at each spatial location, and then each A-scan is shifted the detection rate and the false alarm rate of the prescreener.
so that the ground response occurs at the same time index This balance, and therefore the threshold, was set by the
across all spatial locations. Subsequently all data at, or above, sponsoring agency based upon their operational needs.
the ground response is removed. These two preprocessing
steps are common in GPR BTD [21], [29], [66], [67]. Finally, B. CCY Prescreener
note also that all of the prescreener parameters, including
the preprocessing, were established prior to the discrimination The CCY prescreener implementation begins by statistically
design process. These parameters were assumed to be fixed whitening each point in the GPR volume based upon statistics
by the discriminator designers. computed on neighboring points at the same depth (time
index). This step mitigates signal attenuation with respect to
depth. Once this preprocessing is completed, a CCY measure-
A. F2 Prescreener
ment is computed at every spatial location in the GPR volume.
The F2 prescreener is comprised of a series of smoothing This CCY measurement is itself computed from two CCY
and constant-false-alarm-rate (CFAR) filtering steps [21], [68]. measurements: one computed on a down-track slice of GPR
CFAR filtering estimates how anomalous an input datum data, and one computed on a cross-track slice of GPR data.
is based upon the surrounding data. In this context, CFAR We have found that the presence of a CCY in both tracks of
filtering assumes that the (nonanomalous) observed data are data increases the probability that a threat is present.
generated by a nonstationary Gaussian process [68]. Based Given either slice of GPR data, the CCY calculation pro-
upon this assumption, there are many variants of CFAR ceeds in the same manner, and produces two CCY measures,
filtering, however, the basic process involves computing a c+ and c− that are summed to obtain one CCY measure
rolling (or moving) estimate of the mean and variance of the for the slice. A detailed description of the algorithm used to
data, denoted μbg and σbg 2 , respectively. The output of the filter
compute c+ and c− is presented in Table III, but we outline the
at each input datum p is computed by ( p − μbg )2 /σ 2 . algorithm here. The algorithm attempts to identify sequences
With this basic definition of CFAR filtering, the F2 pre- of high magnitude pixels that form a concave curve. This
screener involves the following major steps. search proceeds by considering the positive signals and the
1) At each time index, median filtering the GPR volume in negative signals separately. For example, we consider only
the down-track direction, to mitigate noise. the positive signal by setting all of the negative pixel values to
2) At each time index, subtraction of the mean in the zero, and then identifying local maxima in the resulting image
cross-track dimension, in order to remove panel-specific that exceed some value threshold. This processing is illustrated
signal variations. on real GPR data in Fig. 16 (middle image). c+ is a measure
3) Depth binning, whereby each A-scan is divided into of the CCY of the sequence of local maxima identified in the
nonoverlapping bins (i.e., subsets of time indices). The image. A similar process is applied to identify the negative
set of A-scan values within each bin is replaced by the signals to obtain c− . The negative image maxima are also
average of the top two values within that bin. illustrated in Fig. 16.
4) CFAR filtering is applied along the time axis. The final estimate of CCY at a particular spatial loca-
5) The processed GPR volume is summed along the time tion consists of summing the two CCY measures from the
axis, resulting in a single value at each spatial location down-track slice (i.e., c+ and c− ) with those from the cross-
(i.e., a 2-D spatial map of intensities). track slice (i.e., four total). Once a CCY measure is computed
6) The 2-D CFAR and Gaussian smoothing operations are for every spatial location, a smoothing filter is applied to
applied, in that order, to the spatial map. the resulting 2-D map of CCY values. The CCY prescreener
7) Nonmaximum suppression to reduce false alarms. employs nonmaximum suppression to the resulting 2-D map
Alarms are obtained from the processed spatial map by in order to obtain alarms. This threshold was set in order to
applying a threshold to the resulting intensity values, and balance the detection rate and the FAR of the prescreener. This
identifying connected components of pixels with intensities balance, and therefore the threshold, was set by the sponsoring
above the threshold. This threshold was set in order to balance agency based upon their operational needs.
MALOF et al.: LARGE-SCALE MULTI-INSTITUTIONAL EVALUATION OF ADVANCED DISCRIMINATION ALGORITHMS 6943
C. Fusion of the Prescreeners [8] D. P. Nabelek and K. C. Ho, “Detection of shallow buried objects using
an autoregressive model on the ground penetrating radar signal,” Proc.
Due to the complementary nature of the F2 (energy- SPIE, vol. 8709, Jun. 2013, Art. no. 87091I.
focused) and CCY (shape-focused) prescreeners, it has been [9] A. Karem, A. B. Khalifa, and H. Frigui, “A Fisher vector representation
advantageous to prescreening performance to fuse their respec- of GPR data for detecting buried objects,” Proc. SPIE, vol. 9823,
May 2016, Art. no. 98231C.
tive outputs. This can be accomplished by treating the alarms [10] P. Klȩsk, M. Kapruziak, and B. Olech, “Boosted classifiers for antitank
made by F2 and CCY as though they were generated from mine detection in C-scans from ground-penetrating radar,” in Proc. Adv.
Intell. Syst. Comput., vol. 342, 2015, pp. 191–205.
a single prescreener. However, it is likely that many pairs of [11] Y. Zheng and A. Elmaghraby, “A vehicle threat detection system
alarms (i.e., one from F2 and one from CCY) will correspond using correlation analysis and synthesized X-ray images,” Proc. SPIE,
to the same object (e.g., buried threat, subsurface rocks, and vol. 8709, Jun. 2013, Art. no. 87090V.
[12] V. Kovalenko, A. G. Yarovoy, and L. P. Ligthart, “A novel clutter
roots). This may result in wasteful processing of the same suppression algorithm for landmine detection with GPR,” IEEE Trans.
object via several different alarms, and create unnecessary Geosci. Remote Sens., vol. 45, no. 11, pp. 3740–3750, Oct. 2007.
[13] K. Tbarki, S. Ben Said, and N. Ellouze, “Non-linear filtering for
vehicle stops or slowdowns if the object is perceived as a landmine detection on ground penetration radar data,” in Proc. 2nd
threat. Int. Conf. Adv. Technol. Signal Image Process. (ATSIP), Mar. 2016,
To address this problem, we merge alarms that are likely pp. 200–205.
[14] K. Tbarki, S. B. Said, R. Ksantini, and Z. Lachiri, “Covariance-guided
to be redundant. A simple and effective proxy for alarm landmine detection and discrimination using ground-penetrating radar
redundancy is the relative proximity of the two alarms, and data,” Int. J. Remote Sens., vol. 39, no. 2, pp. 289–314, 2018.
so alarms are merged using a proximity threshold. The exact [15] S. Lameri, F. Lombardi, P. Bestagini, M. Lualdi, and S. Tubaro, “Land-
mine detection from GPR data using convolutional neural networks,”
details of the merging process are omitted here due to space in Proc. 25th Eur. Signal Process. Conf. (EUSIPCO), Aug./Sep. 2017,
considerations. In the event of a merger, however, the two pp. 508–512.
[16] J. M. Malof, D. Reichman, and L. M. Collins, “Discriminative dictionary
alarms are usually replaced with a single alarm, and the learning to learn effective features for detecting buried threats in
decision statistic assigned to the new alarm is given by a ground penetrating radar data,” Proc. SPIE, vol. 10182, May 2017,
weighted sum (i.e., an average) of the statistics from the Art. no. 101820W.
[17] I. Giannakis, S. Xu, P. Aubry, A. Yarovoy, and J. Sala, “Signal processing
individual alarms. for landmine detection using ground penetrating radar,” in Proc. IEEE
In general, the F2 and CCY decision statistics can differ by Int. Geosci. Remote Sens. Symp. (IGARSS), Jul. 2016, pp. 7442–7445.
orders of magnitude, potentially interfering with the effective- [18] J. N. Wilson, P. Gader, W.-H. Lee, H. Frigui, and K. C. Ho, “A large-
scale systematic evaluation of algorithms using ground-penetrating radar
ness of the weighted average, because the magnitude of one for landmine detection and discrimination,” IEEE Trans. Geosci. Remote
prescreener statistic dominates the other. To mitigate this prob- Sens., vol. 45, no. 8, pp. 2560–2572, Aug. 2007.
lem, the CCY statistics are rescaled as follows: a∗CCYb +c. [19] E. Tebchrany, F. Sagnard, V. Baltazart, J-P. Tarel, and X. Dérobert,
“Assessment of statistical-based clutter reduction techniques on ground-
In our experiments, the three parameters, a, b, and c, were coupled GPR data for the detection of buried objects in soils,” in Proc.
determined using training data to maximize the area under 15th Int. Conf. Ground Penetrating Radar, Jun./Jul. 2014, pp. 604–609.
[20] Y. Liao, L. W. Nolte, and L. M. Collins, “Decision fusion of ground-
the ROC curve on the training data. penetrating radar and metal detector algorithms—A robust approach,”
IEEE Trans. Geosci. Remote Sens., vol. 45, no. 2, pp. 398–409,
ACKNOWLEDGMENT Feb. 2007.
[21] P. Gader, W.-H. Lee, and J. N. Wilson, “Detecting landmines with
The authors would like to thank M. Scholl and P. Howard ground-penetrating radar using feature-based rules, order statistics, and
for their support of this work. They would also like to thank adaptive whitening,” IEEE Trans. Geosci. Remote Sens., vol. 42, no. 11,
pp. 2522–2534, Nov. 2004.
M. DeLong and Duke Research Computing at Duke Univer- [22] P. Klȩsk, A. Godziuk, M. Kapruziak, and B. Olech, “Fast analysis of
sity, Durham, NC, USA, for their computational support for c-scans from ground penetrating radar via 3-D Haar-like features with
this work. application to landmine detection,” Trans. Geosci. Remote Sens., vol. 53,
no. 7, pp. 3996–4009, Jul. 2015.
R EFERENCES [23] P. A. Torrione, K. D. Morton, R. Sakaguchi, and L. M. Collins,
“Histograms of oriented gradients for landmine detection in ground-
[1] D. Nabelek and K. C. Ho, “Detection of deeply buried non-metal objects penetrating radar data,” IEEE Trans. Geosci. Remote Sens., vol. 52, no. 3,
by ground penetrating radar using non-negative matrix factorization,” pp. 1539–1550, Mar. 2014.
Proc. SPIE, vol. 9454, May 2015, Art. no. 945419. [24] D. Reichman, L. M. Collins, and J. M. Malof, “Somegood practices
[2] K. L. Lee and M. M. Mokji, “Automatic target detection in GPR images for applying convolutional neural networks to buried threat detection
using Histogram of Oriented Gradients (HOG),” in Proc. 2nd Int. Conf. in Ground Penetrating Radar,” in Proc. 9th Int. Workshop Adv. Ground
Electron. Design (ICED), Aug. 2014, pp. 181–186. Penetrating Radar (IWAGPR), Jun. 2017, pp. 1–5.
[3] A. Hamdi, O. Missaoui, and H. Frigui, “An SVM classifier with HMM- [25] S. E. Yuksel, J. Bolton, and P. D. Gader, “Landmine detection with
based kernel for landmine detection using ground penetrating radar,” in multiple instance hidden Markov models,” in Proc. IEEE Int. Workshop
Proc. IEEE Int. Geosci. Remote Sens. Symp., Jul. 2010, pp. 4196–4199. Mach. Learn. Signal Process., Sep. 2012, pp. 1–6.
[4] K. C. Ho, L. Carin, P. D. Gader, and J. N. Wilson, “An investigation [26] A. Manandhar, K. D. Morton, L. M. Collins, and P. A. Torrione,
of using the spectral characteristics from ground penetrating radar for “Multiple instance hidden Markov models for GPR-based landmine
landmine/clutter discrimination,” IEEE Trans. Geosci. Remote Sens., detection,” Proc. SPIE, vol. 8709, Jun. 2013, Art. no. 87091L.
vol. 46, no. 4, pp. 1177–1191, Apr. 2008. [27] E. Pasolli, F. Melgani, and M. Donelli, “Automatic analysis of GPR
[5] F. Abujarad, G. Nadim, and A. Omar, “Wavelet packets for GPR images: A pattern-recognition approach,” IEEE Trans. Geosci. Remote
detection of non-metallic anti-personnel land mines based on higher- Sens., vol. 47, no. 7, pp. 2206–2217, Jul. 2009.
order-statistic,” in Proc. 3rd Int. Workshop Adv. Ground Penetrating [28] D. Reichman, L. M. Collins, and J. M. Malof, “Learning improved
Radar (IWAGPR), May 2005, pp. 21–25. pooling regions for the Histogram of Oriented Gradient (HOG) feature
[6] H. Frigui, O. Missaoui, and P. Gader, “Landmine detection using discrete for buried threat detection in ground penetrating radar,” Proc. SPIE,
hidden Markov models with Gabor features,” Proc. SPIE, vol. 6553, vol. 10182, May 2017, Art. no. 101820V.
May 2007, Art. no. 65532A. [29] R. N. Nagashree, N. Aswini, A. Dyana, and C. H. S. Rao, “Detection
[7] D. Reichman, J. M. Malof, and L. M. Collins, “Algorithm development and classification of ground penetrating radar image using textrual fea-
for deeply buried threat detection in GPR data,” Proc. SPIE, vol. 9823, tures,” in Proc. Int. Conf. Adv. Electron. Comput. Commun., Oct. 2014,
May 2016, Art. no. 98231A. pp. 1–5.
6944 IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 57, NO. 9, SEPTEMBER 2019
[30] R. Mendez-Rial, U. Uschkerat, F. I. Rial, and M. A. González-Huici, [55] E. Temlioglu, I. Erer, and D. Kumlu, “Histograms of dominant orien-
“Evaluation of landmine detection performance applying two different tations for anti-personnel landmine detection using ground penetrating
algorithms to GPR field data,” Proc. SPIE, vol. 8709, Jun. 2013, radar,” in Proc. 4th Int. Conf. Elect. Electron. Eng. (ICEEE), Apr. 2017,
Art. no. 87091J. pp. 329–332.
[31] J. Wood, J. Wilson, and J. Bolton, “Extracting edge histogram detector [56] D. Reichman, L. M. Collins, and J. M. Malof. (2018). “gprHOG
features from ground penetrating radar data without ground alignment,” and the popularity of Histogram of Oriented Gradients (HOG) for
Proc. SPIE, vol. 8357, May 2012, Art. no. 83571W. buried threat detection in ground-penetrating radar.” [Online]. Available:
[32] H. Frigui and P. D. Gader, “Detection and discrimination of land mines https://arxiv.org/abs/1806.01349
in ground-penetrating radar based on edge histogram descriptors and [57] L. Breiman, “Random forests,” Mach. Learn., vol. 45, no. 1, pp. 5–32,
a possibilistic K -nearest neighbor classifier,” IEEE Trans. Fuzzy Syst., 2001.
vol. 17, no. 1, pp. 185–199, Feb. 2009. [58] J. C. Platt, “Probabilistic outputs for support vector machines and
[33] D. Reichman, L. M. Collins, and J. M. Malof, “Improvements to the comparisons to regularized likelihood methods,” Adv. Large Margin
Histogram of Oriented Gradient (HOG) prescreener for buried threat Classifiers, vol. 10, no. 3, pp. 61–74, 1999.
detection in ground penetrating radar data,” Proc. SPIE, vol. 10182, [59] H. Chen and A. G. Cohn, “Probabilistic robust hyperbola mixture model
May 2017, Art. no. 101820U. for interpreting ground penetrating radar data,” in Proc. Int. Joint Conf.
[34] A. Hamdi and H. Frigui, “Ensemble hidden Markov models with Neural Netw. (IJCNN), Jul. 2010, pp. 1–8.
application to landmine detection,” EURASIP J. Adv. Signal Process., [60] H. Harkat, Y. Elfakir, S. D. Bennani, G. Khaissidi, and M. Mrabti,
vol. 2015, no. 1, p. 75, 2015. “Ground penetrating radar hyperbola detection using scale-invariant
[35] A. Karem, A. Fadeev, H. Frigui, and P. Gader, “Comparison of different feature transform,” in Proc. Int. Conf. Elect. Inf. Technol. (ICEIT),
classification algorithms for landmine detection using GPR,” Proc. SPIE, May 2016, pp. 392–397.
vol. 7664, Apr. 2010, Art. no. 76642K. [61] T. Noreen and U. S. Khan, “Using pattern recognition with HOG to
[36] J. Bolton, S. E. Yuksel, and P. Gader, “Multiple instance learning for automatically detect reflection hyperbolas in ground penetrating radar
hidden Markov models: Application to landmine detection,” Proc. SPIE, data,” in Proc. Int. Conf. Elect. Comput. Technol. Appl. (ICECTA),
vol. 8709, Jun. 2013, Art. no. 87091M. Nov. 2017, pp. 1–6.
[37] H. Frigui and P. Gader, “Detection and discrimination of land mines [62] D. Reichman, L. M. Collins, and J. M. Malof, “How much shape
based on edge histogram descriptors and fuzzy K-nearest neighbors,” in information is enough, or too much? Designing imaging descriptors
Proc. IEEE Int. Conf. Fuzzy Syst., Jul. 2006, pp. 1494–1499. for threat detection in ground penetrating radar data,” Proc. SPIE,
[38] D. Reichman, L. M. Collins, and J. M. Malof, “On choosing training and vol. 10628, Apr. 2018, Art. no. 106280E.
testing data for supervised algorithms in ground-penetrating radar data [63] H. Frigui, L. Zhang, P. Gader, and D. Ho, “Context-dependent fusion
for buried threat detection,” IEEE Trans. Geosci. Remote Sens., vol. 56, for landmine detection with ground-penetrating radar,” Proc. SPIE,
no. 1, pp. 497–507, Jan. 2018. vol. 6553, Apr. 2007, Art. no. 655321.
[39] C. R. Ratto, K. D. Morton, L. M. Collins, and P. A. Torrione, “A hidden [64] L. E. Besaw and P. J. Stimac, “Deep convolutional neural networks
Markov context model for GPR-based landmine detection incorporating for classifying GPR B-scans,” Proc. SPIE, vol. 9454, May 2015,
stick-breaking priors,” in Proc. IEEE Int. Geosci. Remote Sens. Symp., Art. no. 945413.
Jul. 2011, pp. 874–877. [65] J. M. Malof, J. Bralich, D. Reichman, and L. M. Collins, “Improving
[40] H. Frigui, L. Zhang, P. Gader, J. N. Wilson, K. C. Ho, and A. Mendez- the histogram of oriented gradient feature for threat detection in ground
Vazquez, “An evaluation of several fusion algorithms for anti-tank penetrating radar by implementing it as a trainable convolutional neural
landmine detection and discrimination,” Inf. Fusion, vol. 13, no. 2, network,” Proc. SPIE, vol. 10628, Apr. 2018, Art. no. 106280D.
pp. 161–174, Apr. 2012. [66] M. P. Masarik, J. Burns, B. T. Thelen, J. Kelly, and T. C. Havens,
[41] J. Bolton, P. Gader, H. Frigui, and P. Torrione, “Random set framework “GPR anomaly detection with robust principal component analysis,”
for multiple instance learning,” Inf. Sci., vol. 181, no. 11, pp. 2061–2070, Proc. SPIE, vol. 9454, May 2015, Art. no. 945414.
2011. [67] J. Roberts, Y. Shkolnikov, J. Varsanik, T. Chevalier, and A. D. Mulliken,
[42] P. A. Torrione, C. S. Throckmorton, and L. M. Collins, “Performance of “Robust entropy-guided image segmentation for ground detection in
an adaptive feature-based processor for a wideband ground penetrating GPR,” Proc. SPIE, vol. 8709, Jun. 2013, Art. no. 87091N.
radar system,” IEEE Trans. Aerosp. Electron. Syst., vol. 42, no. 2, [68] I. S. Reed and X. Yu, “Adaptive multiple-band CFAR detection of an
pp. 644–658, Apr. 2006. optical pattern with unknown spectral distribution,” IEEE Trans. Acoust.,
[43] J. S. Varsanik, J. W. Roberts, T. W. Chevalier, and A. D. Mulliken, “GPR Speech Signal Process., vol. 38, no. 10, pp. 1760–1770, Oct. 1990.
preprocessing optimization with signal-to-clutter metrics,” Proc. SPIE,
vol. 8709, Jun. 2013, Art. no. 87091O.
[44] M. A. González-Huici, I. Catapano, and F. Soldovieri, “A comparative
study of GPR reconstruction approaches for landmine detection,” IEEE
J. Sel. Topics Appl. Earth Observ. Remote Sens., vol. 7, no. 12,
pp. 4869–4878, Dec. 2014.
[45] F. Giovanneschi and M. A. González-Huici, “A preliminary analysis of a Jordan M. Malof (S’15–M’18) received the B.S.
sparse reconstruction based classification method applied to GPR data,” degree from the University of Louisville, Louisville,
in Proc. 8th Int. Workshop Adv. Ground Penetrating Radar (IWAGPR), KY, USA, in 2008, and the Ph.D. degree from Duke
Jul. 2015, pp. 1–4. University, Durham, NC, USA, in 2015.
[46] S. E. Yuksel, J. Bolton, and P. Gader, “Multiple-instance hidden Markov He is currently an Assistant Research Professor
models with applications to landmine detection,” IEEE Trans. Geosci. with Duke University, where he focuses on statistical
Remote Sens., vol. 53, no. 12, pp. 6766–6775, Dec. 2015. modeling, machine learning, and computer vision for
[47] C. S. Won, D. K. Park, and S.-J. Park, “Efficient use of MPEG-7 edge remote sensing applications.
histogram descriptor,” ETRI J., vol. 24, no. 1, pp. 23–30, 2002.
[48] C. Cortes and V. Vapnik, “Support-vector networks,” Mach. Learn.,
vol. 20, no. 3, pp. 273–297, 1995.
[49] C. Chang and C. Lin, “LIBSVM,” ACM Trans. Intell. Syst. Technol.,
vol. 2, no. 3, pp. 1–27, 2011.
[50] S. Mallat, A Wavelet Tour of Signal Processing: The Sparse Way.
New York, NY, USA: Academic, 2008.
[51] K. C. Ho, P. D. Gader, and J. N. Wilson, “Improving landmine detection
using frequency domain features from ground penetrating radar,” in Daniël Reichman received the B.S.E.E. and
Proc. IEEE Int. Geosci. Remote Sens. Symp., Sep. 2004, pp. 1617–1620. M.S.E.E. from The Cooper Union for the Advance-
[52] S. Harris, K. C. Ho, and A. Zare, “On the use of log-Gabor features ment of Science and Art, New York, NY, USA,
for subsurface object detection using ground penetrating radar,” Proc. in 2013, and the Ph.D. degree in electrical and com-
SPIE, vol. 9823, May 2016, Art. no. 98230K. puter engineering from Duke University, Durham,
[53] N. Dalal and B. Triggs, “Histograms of oriented gradients for human NC, USA, in 2017.
detection,” in Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern He is currently a Research Scientist with the
Recognit. (CVPR), Jun. 2005, pp. 886–893. Applied Machine Learning Laboratory, Duke Uni-
[54] Q. Chen, Z. Song, J. Dong, Z. Huang, Y. Hua, and S. Yan, “Contex- versity. His research interests include machine learn-
tualizing object detection and classification,” IEEE Trans. Pattern Anal. ing, statistical signal processing, and computer
Mach. Intell., vol. 37, no. 1, pp. 13–27, Jan. 2015. vision applied to remote sensing applications.
MALOF et al.: LARGE-SCALE MULTI-INSTITUTIONAL EVALUATION OF ADVANCED DISCRIMINATION ALGORITHMS 6945
Andrew Karem is currently pursuing the Ph.D. Joseph N. Wilson (M’05) received the B.S. degree
degree in computer engineering and computer sci- in applied mathematics with an emphasis on
ence with the University of Louisville, Louisville, computer science from Florida State University,
KY, USA. Tallahassee, FL, USA, in 1977, and the M.S. degree
He has been a Research Assistant with the Mul- in applied mathematics and computer science and
timedia Research Lab, University of Louisville for the Ph.D. degree in computer science from the
the past few years. His research interests include University of Virginia, Charlottesville, VA, USA,
image processing and machine learning with empha- in 1980 and 1985, respectively.
sis on multiple instance learning, and the detection Since 1984, he has been with University of Florida,
of buried explosive objects using ground penetrat- Gainesville, FL, USA, where he is currently an
ing radar and wideband electromagnetic induction Associate Professor with the Computer and Infor-
sensors. mation Science and Engineering Department. He was an Associate Chair of
the department from 1994 to 2001. His research interests include machine
Hichem Frigui (S’92–M’98) has been active in the learning, image and signal processing, and information security.
research fields of machine learning; data mining;
audio, image, and video processing; and multisensor
information fusion. He has developed and applied
algorithms from the above fields to a wide range of
applications including: detection of buried explosive
Wen-Hsiung Lee received the B.S. degree in
objects using ground penetrating radar and wideband
electronics engineering from National Chiao-Tung
electromagnetic induction sensors; segmentation and
University, Hsinchu, Taiwan, in 1990, and the mas-
analysis of images and video; analysis of CT images
ter’s and Ph.D. degrees from the University of
for the diagnosis of lung cancer; and computational
Florida, Gainesville, FL, USA, in 1994 and 2001,
tools for predicting material properties. He is cur-
respectively.
rently a Professor of computer engineering and computer science and the
Since 2006, he has been a Senior Scientist with
Director of the Multimedia Research Lab with the University of Louisville,
CSES (formerly NIITEK Inc.), Sterling, VA, USA.
Louisville, KY, USA.