Imaging Technologies in Aviation Security

  • Sultan Almazroui University of Sussex
  • William Wang University of Sussex
  • Guangfu Zhang National University of Defense Technology, Changsha 410073, China
Keywords: Aviation Security, X-ray Scanners, Millimeter wave Scanners, Imaging Technology, Microwave imaging, Privacy, Integration.


Imaging technologies have been an essential part of security screening especially in aviation security. Aviation security uses different kinds of scanning systems including X-rays, millimeter waves. New development has been researched in both imaging technologies in the past years all over the world. Recently microwave imaging systems for security applications has been researched in the University of Sussex with new finding in the imaging results. This paper will discuss the integration, factors and other management issues when it comes to deploy new imaging technology to serve the environment of aviation security.

Author Biographies

Sultan Almazroui, University of Sussex

Sultan Almazroui is a researcher in the field of  Security Management at the University of Sussex. He received his bachelor degree of electromechanical engineering and Master of Sience in Embedded Digital Systems  from the University of Sussex, Brighton City ,in 2003 and 2005, his research interest is in the area of microwave imaging in the field of security applications. He is a member of IEEE and sponsered by the government of United Arab Emirates.

William Wang, University of Sussex

Senior Lecturer in Engineering (Engineering and Design, Automotive systems, dynamics and control)

DPhil (University of Oxford)

MEng & DEng (Nanjing University of Aeronautics and Astronotics)

Guangfu Zhang, National University of Defense Technology, Changsha 410073, China

Guangfu Zhang received the B.S., M.S., and Ph.D. degrees in microwave engineering from National University of Defense Technology (NUDT), Changsha, China, in 1997, 2000, and 2004, respectively. Now he was an associate professor at NUDT and an Academic Visitor at University of Sussex, UK. His current study interests include UWB antennas and systems, computational electromagnetics and RF signal processing.


(1) “White House Commission on Aviation Safety and Security FEBRUARY 12, 1997.” [Online]. Available: [Accessed: 01-Aug-2014].

(2) D. Petersen and P. Polski, “International Aviation Security Research and Development,” J. Test. Eval., vol. 22, no. 3, p. 267, 1994.

(3) “ - Google Search.” [Online]. Available: [Accessed: 13-Aug-2015].

(4) “wcms_208108.pdf.” [Online]. Available: [Accessed: 02-Aug-2013].

(5) K. Leone and R. Liu, “Measures of effectiveness for passenger-baggage security screening,” Transp. Res. Rec. J. Transp. Res. Board, vol. 1822, no. 1, pp. 40–48, 2003.

(6) B. . Klock, “Test and evaluation report for X-ray detection of threats using different X-ray functions,” in 39th Annual 2005 International Carnahan Conference on Security Technology, 2005. CCST ’05, 2005, pp. 182–184.

(7) S. Michel, S. M. Koller, M. Ruh, and A. Schwaninger, “Do‘ Image Enhancement’ Functions Really Enhance X-Ray Image Interpretation?,” in Proceedings of the 29th Annual Cognitive Science Society, 2007, pp. 1301–1306.

(8) J. M. Wolfe, T. S. Horowitz, M. J. Van Wert, N. M. Kenner, S. S. Place, and N. Kibbi, “Low target prevalence is a stubborn source of errors in visual search tasks,” J. Exp. Psychol. Gen., vol. 136, no. 4, pp. 623–638, 2007.

(9) M. S. Fleck and S. R. Mitroff, “Rare Targets Are Rarely Missed in Correctable Search,” Psychol. Sci., vol. 18, no. 11, pp. 943–947, Nov. 2007.

(10) K. M. Ghylin, C. G. Drury, R. Batta, and L. Lin, “Temporal Effects in a Security Inspection Task: Breakdown of Performance Components,” Proc. Hum. Factors Ergon. Soc. Annu. Meet., vol. 51, no. 2, pp. 93–97, Oct. 2007.

(11) N. H. Mackworth, “The breakdown of vigilance durning prolonged visual search,” Q. J. Exp. Psychol., vol. 1, no. 1, pp. 6–21, Apr. 1948.

(12) M. Mendes, A. Schwaninger, N. Strebel, and S. Michel, “Why laptops should be screened separately when conventional x-ray screening is used,” in 2012 IEEE International Carnahan Conference on Security Technology (ICCST), 2012, pp. 267–273.

(13) P. Mehta and R. Smith-Bindman, “Airport full-body screening: what is the risk?,” Arch. Intern. Med., vol. 171, no. 12, pp. 1112–1115, Jun. 2011.

(14) S. Almazroui, W. Wang, and G. Zhang, “Microwave imaging using sub-space based TR-MUSIC method for security applications,” 2012.

(15) “” [Online]. Available: [Accessed: 03-Aug-2014].

(16) T. Orouji, S. M. H. Pooya, M. Jafarizadeh, H. R. Khosravi, and H. R. Mohammad, “Doses to the scanned individual and to the operator from an X-ray body scanner system,” Radiat. Prot. Dosimetry, vol. 147, no. 1–2, pp. 227–229, Sep. 2011.

(17) D. A. Schauer, “Does Security Screening with Backscatter X-Rays Do More Good than Harm?,” Radiology, vol. 259, no. 1, pp. 12–16, Apr. 2011.

(18) A. Frimpong, “Introduction of full body image scanners at the airports: a delicate balance of protecting privacy and ensuring national security,” J. Transp. Secur., vol. 4, no. 3, pp. 221–229, Sep. 2011.

(19) F. Hofer and O. E. Wetter, “Operational and human factors issues of new airport security technology—two case studies,” J. Transp. Secur., vol. 5, no. 4, pp. 277–291, Dec. 2012.

(20) A. Bolfing, T. Halbherr, and A. Schwaninger, “How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening,” in HCI and Usability for Education and Work, A. Holzinger, Ed. Springer Berlin Heidelberg, 2008, pp. 419–

(21) A. Schwaninger, F. Hofer, and O. E. Wetter, “Adaptive computer-based training increases on the job performance of x-ray screeners,” in Security Technology, 2007 41st Annual IEEE International Carnahan Conference on, 2007, pp. 117–124.

(22) S. Michel, S. M. Koller, J. C. de Ruiter, R. Moerland, M. Hogervorst, and A. Schwaninger, “Computer-based training increases efficiency in X-ray image interpretation by aviation security screeners,” in Security Technology, 2007 41st Annual IEEE International Carnahan Conference

on, 2007, pp. 201–206.

(23) D. Hardmeier, F. Hofer, and A. Schwaninger, “The X-ray object recognition test (X-ray ORT) - a reliable and valid instrument for measuring visual abilities needed in X-ray screening,” in 39th Annual 2005 International Carnahan Conference on Security Technology, 2005. CCST ’05, 2005, pp. 189–192.

(24) A. Schwaninger, “Training of airport security screeners,” AIRPORT, vol. 2003, no. 5, pp. 11–13, 2003.

(25) S. M. Steiner-Koller, A. Bolfing, and A. Schwaninger, “Assessment of X-ray image interpretation competency of aviation security screeners,” in Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on, 2009, pp. 20–27.

(26) A. Schwaninger, “Increasing efficiency in airport security screening,” WIT Trans. Built Environ., vol. 82, pp. 407–416, 2005.

(27) O. E. Wetter, D. Hardmeier, and F. Hofer, “Covert testing at airports: Exploring methodology and results,” in 42nd Annual IEEE International Carnahan Conference on Security Technology, 2008. ICCST 2008, 2008, pp. 357–363.

(28) S. D. Warren and L. D. Brandeis, “Right to Privacy,” Harv. Law Rev., vol. 4, p. 193, 1891 1890.

(29) O. Mironenko, “Body scanners versus privacy and data protection,” Comput. Law Secur. Rev., vol. 27, no. 3, pp. 232–244, Jun. 2011.

(30) “The Universal Declaration of Human Rights.” [Online]. Available: [Accessed: 20-Mar-2014].

(31) C. Eze, “Africa: Now Showing at MMIA: Nude Images of Passengers,” This Day (Lagos), 21-Sep-2010.

(32) “Full body scanners to be installed at nine more airports,” Mail

Online. [Online]. Available: [Accessed: 20-Mar-2014].

(33) “TSA Pre✓TM Application Program,” Transportation Security Administration. [Online]. Available: /tsa-precheck/application-program. [Accessed: 21-Mar-2014].

(34) Q. Feng, H. Sahin, and K. C. Kapur, “Designing airport checked-baggage-screening strategies considering system capability and reliability,” Reliab. Eng. Syst. Saf., vol. 94, no. 2, pp. 618–627, Feb.

(35) L. A. McLay, S. H. Jacobson, and J. E. Kobza, “Integer programming models and analysis for a multilevel passenger screening problem,” IIE Trans., vol. 39, no. 1, pp. 73–81, 2007.

(36) A. J. Lee, L. A. McLay, and S. H. Jacobson, “Designing Aviation Security Passenger Screening Systems Using Nonlinear Control,” SIAM J. Control Optim., vol. 48, no. 4, pp. 2085–2105, Jan. 2009.

(37) L. A. McLay, A. J. Lee, and S. H. Jacobson, “Risk-Based Policies for Airport Security Checkpoint Screening,” Transp. Sci., vol. 44, no. 3, pp. 333–349, Jan. 2010.

(38) V. L. Lazar Babu, R. Batta, and L. Lin, “Passenger grouping under constant threat probability in an airport security system,” Eur. J. Oper. Res., vol. 168, no. 2, pp. 633–644, Jan. 2006.

(39) X. Nie, R. Batta, C. G. Drury, and L. Lin, “Passenger grouping with risk levels in an airport security system,” Eur. J. Oper. Res., vol. 194, no. 2, pp. 574–584, Apr. 2009.

(40) A. G. Nikolaev, S. H. Jacobson, and L. A. McLay, “A Sequential Stochastic Security System Design Problem for Aviation Security,” Transp. Sci., vol. 41, no. 2, pp. 182–194, May 2007.

(41) J. Filipiak, “Dynamic Routing in a Queueing System with a Multiple Service Facility,” Oper. Res., vol. 32, no. 5, pp. 1163–1180, Oct. 1984.

(42) F. P. Kelly and C. N. Laws, “Dynamic routing in open queueing networks: Brownian models, cut constraints and resource pooling,” Queueing Syst., vol. 13, no. 1–3, pp. 47–86, Mar. 1993.

(43) M. Jain, “Finite capacity M/M/r queueing system with queue-dependent servers,” Comput. Math. Appl., vol. 50, no. 1–2, pp. 187–199, Jul. 2005.

(44) P. R. Kumar and J. Walrand, “Individually Optimal Routing in Parallel Systems,” J. Appl. Probab., vol. 22, no. 4, p. 989, Dec. 1985.

(45) W. Winston, “Optimality of the Shortest Line Discipline,” J. Appl. Probab., vol. 14, no. 1, p. 181, Mar. 1977.

(46) J. M. Harrison and L. M. Wein, “Scheduling networks of queues: Heavy traffic analysis of a simple open network,” Queueing Syst., vol. 5, no. 4, pp. 265–279, Dec. 1989.

(47) B. L. Schwartz, “Queuing Models with Lane Selection: A New Class of Problems,” Oper. Res., vol. 22, no. 2, pp. 331–339, Apr. 1974.

(48) X. Nie, G. Parab, R. Batta, and L. Lin, “Simulation-based Selectee Lane queueing design for passenger checkpoint screening,” Eur. J. Oper. Res., vol. 219, no. 1, pp. 146–155, May 2012.

(49) A. J. Lee and S. H. Jacobson, “The impact of aviation checkpoint queues on optimizing security screening effectiveness,” Reliab. Eng. Syst. Saf., vol. 96, no. 8, pp. 900–911, Aug. 2011.

(50) International Commission on Non-Ionizing Radiation Protection, “ICNIRP statement on the ‘Guidelines for limiting exposure to time-varying electric, magnetic, and electromagnetic fields (up to 300 GHz),’” Health Phys., vol. 97, no. 3, pp. 257–258, Sep. 2009.

(51) “IEEE Standard for Safety Levels With Respect to Human Exposure to Radio Frequency Electromagnetic Fields, 3 kHz to 300 GHz,” IEEE Std C951-2005 Revis. IEEE Std C951-1991, pp. 0_1–238, 2006.

(52) O. E. Wetter, J. Wegge, K. Jonas, and K.-H. Schmidt, “Dual Goals for Speed and Accuracy on the Same Performance Task,” J. Pers. Psychol., vol. 11, no. 3, pp. 118–126, Jan. 2012.

(53) O. E. Wetter, H. Fuhrmann, M. Lipphardt, and F. Hofer, “Bringing adversaries together: The importance of a common management-level approach in complex work domains,” in 2011 IEEE International Carnahan Conference on Security Technology (ICCST), 2011, pp. 1–6.

(54) “Measuring and Improving Organizational Productivity: A Practical Guide - Robert D. Pritchard - Google Books.” [Online]. Available: [Accessed: 05-Aug-2014].

(55) O. E. Wetter and M. Fuhrer, “A holistic approach for evaluating liquid explosive detection systems,” J. Transp. Secur., vol. 6, no. 4, pp. 377–388, Dec. 2013.

(56) “Transportation Security Administration,” Transportation Security

Administration. [Online]. Available: /. [Accessed: 28-Aug-2013].

(57) “Most fake bombs missed by screeners -” [Online]. Available: [Accessed: 28-Aug-2013].

(58) N. G. Cutmore, Y. Liu, and J. R. Tickner, “Development and

commercialization of a fast-neutron/x-ray Cargo Scanner,” in 2010 IEEE International Conference on Technologies for Homeland Security (HST), 2010, pp. 330–336.