Full Content is available to subscribers

Subscribe/Learn More  >
Proceedings Article

Super-resolution reconstruction of terahertz images

[+] Author Affiliations
Yue Li, Li Li, Andrew Hellicar, Y. Jay Guo

Commonwealth Scientific and Industrial Research Organisation (Australia)

Proc. SPIE 6949, Terahertz for Military and Security Applications VI, 69490J (April 15, 2008); doi:10.1117/12.777814
Text Size: A A A
From Conference Volume 6949

  • Terahertz for Military and Security Applications VI
  • James O. Jensen; Hong-Liang Cui; Dwight L. Woolard; R. Jennifer Hwu
  • Orlando, FL | March 16, 2008

abstract

A prototype of terahertz imaging system has been built in CSIRO. This imager uses a backward wave oscillator as the source and a Schottky diode as the detector. It has a bandwidth of 500-700 GHz and a source power 10 mW. The resolution at 610 GHz is about 0.85 mm. Even though this imaging system is a coherent system, only the signal power is measured at the detector and the phase information of the detected wave is lost. Some initial images of tree leaves, chocolate bars and pinholes have been acquired with this system. In this paper, we report experimental results of an attempt to improve the resolution of this imaging system beyond the limitation of diffraction (super-resolution). Due to the lack of phase information needed for applying any coherent super-resolution algorithms, the performance of the incoherent Richardson-Lucy super-resolution algorithm has been evaluated. Experimental results have demonstrated that the Richardson-Lucy algorithm can significantly improve the resolution of these images in some sample areas and produce some artifacts in other areas. These experimental results are analyzed and discussed.

© (2008) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.
Citation

Yue Li ; Li Li ; Andrew Hellicar and Y. Jay Guo
"Super-resolution reconstruction of terahertz images", Proc. SPIE 6949, Terahertz for Military and Security Applications VI, 69490J (April 15, 2008); doi:10.1117/12.777814; http://dx.doi.org/10.1117/12.777814


Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).

Figures

Tables

NOTE:
Citing articles are presented as examples only. In non-demo SCM6 implementation, integration with CrossRef’s "Cited By" API will populate this tab (http://www.crossref.org/citedby.html).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement


  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.