By Topic

Use of an Automatic Under-Vehicle Inspection System as a Tool to Streamline Vehicle Screening at Ports of Entry and Security Checkpoints

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ruiz, E.E. ; Dept. of Syst. & Ind. Eng., Univ. of Arizona, Tucson, AZ, USA ; Head, K.L.

Vehicle inspection at ports of entry is a critical component of border security. One part of the vehicle screening process involves customs and border protection (CBP) personnel performing a preliminary inspection of the underside of random vehicles by looking under the vehicle through a mirror mounted on a stick, searching for anomalies or foreign objects present on the undercarriage structure and components of a vehicle. If any deviances are detected, the vehicle is directed to a secondary and more thorough inspection. This paper presents a project that aims at automating this preliminary undercarriage inspection by using an automatic under-vehicle inspection system (AUVIS) and image processing algorithms to assist personnel in identifying vehicles for secondary inspection. The inspection system will image the undercarriage of every car in a lane as they approach the CBP agent and use a novel change detection algorithm to compare the captured image to a corresponding reference image of the vehicle's make and model. The software will detect and highlight any differences between the two images to provide a rapid and objective recommendation for secondary inspection.

Published in:

Intelligence and Security Informatics Conference (EISIC), 2012 European

Date of Conference:

22-24 Aug. 2012