Information-theoretic analysis of x-ray scatter and phase architectures for anomaly detection

David Coccarelli, Qian Gong, Razvan Ionut Stoian, Joel A. Greenberg, Michael E. Gehm, Yuzhang Lin, Liang Chih Huang, Amit Ashok

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations


Conventional performance analysis of detection systems confounds the effects of the system architecture (sources, detectors, system geometry, etc.) with the effects of the detection algorithm. Previously, we introduced an information-theoretic approach to this problem by formulating a performance metric, based on Cauchy-Schwarz mutual information, that is analogous to the channel capacity concept from communications engineering. In this work, we discuss the application of this metric to study novel screening systems based on x-ray scatter or phase. Our results show how effective use of this metric can impact design decisions for x-ray scatter and phase systems.

Original languageEnglish (US)
Title of host publicationAnomaly Detection and Imaging with X-Rays (ADIX)
EditorsMichael E. Gehm, Amit Ashok, Mark A. Neifeld
ISBN (Electronic)9781510600881
StatePublished - 2016
EventAnomaly Detection and Imaging with X-Rays (ADIX) Conference - Baltimore, United States
Duration: Apr 19 2016Apr 20 2016

Publication series

NameProceedings of SPIE - The International Society for Optical Engineering
ISSN (Print)0277-786X
ISSN (Electronic)1996-756X


OtherAnomaly Detection and Imaging with X-Rays (ADIX) Conference
Country/TerritoryUnited States


  • High Dimensionality
  • Information Theory
  • Simulation
  • X-Ray Phase
  • X-Ray Scatter
  • X-Ray System Architecture
  • X-Ray System Geometry

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Computer Science Applications
  • Applied Mathematics
  • Electrical and Electronic Engineering


Dive into the research topics of 'Information-theoretic analysis of x-ray scatter and phase architectures for anomaly detection'. Together they form a unique fingerprint.

Cite this