Signature Region of Interest using Auto cropping
|
|
|
- Piers Jackson
- 10 years ago
- Views:
Transcription
1 ISSN (Online): ISSN (Print): Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department, Faculty of science, Tafila Technical University Tafila, 66110, Jordan 2 Computer Engineering Department, Faculty of Engineering, Mutah University Mutah, 61710, Jordan Abstract A new approach for signature region of interest pre-processing was presented. It used new auto cropping preparation on the basis of the image content, where the intensity value of pixel is the source of cropping. This approach provides both the possibility of improving the performance of security systems based on signature images, and also the ability to use only the region of interest of the used image to suit layout design of biometric systems. Underlying the approach is a novel segmentation method which identifies the exact region of foreground of signature for feature extraction usage. Evaluation results of this approach shows encouraging prospects by eliminating the need for false region isolating, reduces the time cost associated with signature false points detection, and addresses enhancement issues. A further contribution of this paper is an automated cropping stage in bio-secure based systems. Keywords: Pre-processing, Normalization, skeletonization, Region of interest, Cropping. 1. Introduction There has been relatively little work done in the field of pre-processing of biometric images for the usage of biometric authentication and bio crypto key generation. Signature is one of behavioral biometric types. Signatures are a special case of handwriting subject to intrapersonal variation and interpersonal differences. This variability makes necessary to analyze signatures as complete images and not as collection of letters and words [1]. Any signature verification system built on five stages: data acquisition, pre-processing, feature extraction, comparison process and performance evaluation [2]. We concern in this paper on the pre-processing stage, where this stage consists of several steps: one of these steps is noise removing [3]. Another one which proposed in [4] is a noise filtering which is applied to remove the noise caused by the scanner, where the image is cropped to the bounding rectangle of the signature, then a transformation from color to grayscale and so forth to black and white, finally the bounding pixels of the signature are marked and removed without eliminating the ending point until get the signature skeleton, i.e. Skeletonization, unless a pixel has less than three neighbors left, or any path between the neighbor pixels would be interrupted by the action. A nonuniformity correction for sensor elements, localization of the signature in the picture, extraction of the signature from the background, slicing, thresholding, segmentation, normalization and data reduction[5] are another steps for pre-processing. An experimental database has been acquired on a restricted size grid [6], Normalization includes basic techniques like, scaling, translation, and rotation etc [5] presented to avoid signature rotational problems. A given signature images threshold using Otsu s method [7]. A proposed approach consists of: image binarization, image normalization (resize), image thresholding, image enhancement using morphological operators, edge detection, and finally cropping. In signature verification technology, many algorithms used manual cropping such as in [2], while automatic cropping algorithms suffers from cropping information lost, since it is drawing rectangle rounded the signature then transfer the region inside it into another matrix (false rectangle). The region of interest term referred to object interest sub region of an image, leaving other regions unchanged. In signature verification system the signature it self is the ROI.
2 2 Convert image into binary Image Normalization Thresholding Morphology acquired images may degrade the final result of built on system; therefore we start with enhancement as preprocessing technique to sort out from low quality images as well to enhance the performance of the whole system. 3.1 Binarization The first step in given approach is to convert the acquisitioned signature to binary form, i.e. black and white pixels. Working in this form is more useful than any other form, since it is easy to work with 2 bits representation of image. Coloured image (2D) Binary image Image Cropping Edge Detection Fig. 1 Signature pre-processing stages Fig. 2 colored Vs binary image matrixes. The required time to process colored image is longer than binary one, as example applying radon transform on different types of image (colored Vs binary) shows the following deference s. Fig. 1 Examples of signature As in figure 2; the signature surrounded by unwanted area, this area may take role in post processing, such as increase the processing time. This area will be eliminated using auto cropping to keep only ROI for next stage of system verification or process generation of security based key. 2. Database Approach has been performed and tested on base of 160 signatures. These signatures were acquired using pen tablet; the acquisitioned signatures were in JPEG format, 610X410, 24 colors. 3. Pre-Processing Pre-processing is an important and diverse set of image preparation for next stage of image processing based application. Image pre-processing techniques have an important role in increasing the accuracy and performance of post processing application. Working directly on Table 1: processing time comparison Type Coloured(3D) Gray scale(2d) Binary Time Image normalization (resizing). Normalization is one of the most important steps of image pre-processing techniques. Experimental Database has been acquired on a restricted size grid, Normalization includes basic techniques like, scaling, translation, and rotation etc, is used to avoid scaling and rotational problems. As well in systems where the writer may have to sign on tablets or paper with different active areas, signature size normalization may be required. People normally scale their signatures to fit the area available for the signature. However size difference may be a problem in comparing the two signatures. Therefore signatures are normalized with respect to width, height or both [8]. To achieve logical results, the signatures must have the same size, which means normalized one, in our approach the reference sizes are [ ].
3 3 3.3 Thresholding We used Otsu s method or basically gray threshold computed used global image threshold values. Otsu s method is based on threshold selection by statistical criteria [7]. Otsu suggested minimizing the weighted sum of within-class variances of the object and background pixels to establish an optimum threshold. Threshold value based on this method will be between 0 and 1, after achieve this value we can segment an image based on it. 3.4 Morphological operators The Mathematical Morphology is calculated based on simple mathematical concepts from set theory, morphological operators are useful for binary image, it views binary image as asset of its foreground (1-valued) pixels, and set operations such as union and intersection can be applied directly to binary image sets [9]. In our approach, we used bridge to connect discontinuity of pixels, then used remove operator to remove interior pixels keeping the boundaries of signature. A skeletonization is used to remove pixels on the boundaries of objects but does not allow objects to break apart. The pixels remaining make up the image skeleton. the boundary between two regions. There are many operators could be used with edge detection technique such as canny, sobel, prewitt and roberts. In our proposed approach we used can for the reason of clearness, table 2 shows some of comparison results between these operators on our prepared database. Table 2: edge detection operatores copmarsion, R is subject reader Operator Clock R 1 R 2 R 3 R 4 Clearance Canny % 96% 97% 96% 96% Sobel % 66% 66% 69% 67% Prewitt % 22% 18% 24% 23% Roberts % 81% 80% 81% 80% The comparison was decided subjectively by given edged figures to the group of subject s researchers who are working in the image processing field to decide the clearance according to the following factors: Contrast clearance. Edge clearance. Continuity clearance. The canny method differs from the other edge-detection methods in that it uses two different thresholds (to detect strong and weak edges), and includes the weak edge in the output only if they are connected to strong edge. This method is therefore less likely than the other to be fooled by noise, and more likely to detect true weak edges. 4. Image Normalization (Auto Cropping) Fig. 3 bridge then remove operator s effect In this stage the ROI is determined using auto cropping approach. Region of Interest (ROI) is the signature object itself. Using cropping we segment the signature smoothly. Signature cropping process is less complexity in process and time, since the area under process will be reduced. Applying Radon transform to check the time complexity approved this hypothesis, figure 6 show this result. Fig. 4 skeleton operator effect Original image Cropped image We did not use thinning because of this operator may cause lost of information, but using remove and bridge operator save the greatest amount of information, since they keep the boundary of signature. 3.5 Edge Detection Edge detection is a fundamental tool used in most image processing applications to obtain information from the frames as a precursor step to feature extraction and object segmentation. This process detects outlines of an object and boundaries between objects and the background in the image [10]. Edge is a set of connected pixels that lie on Processing time = Processing time= Fig. 6 Radon check of original and cropped images Two types of cropping technique were used; manual and automatic cropping. Manual cropping is achieved using Matlab function (imcrop), but it may cause false cropping rectangle and it is tedious work. While automatic cropping is saving more work and it is reducing a processing time over and above the cropping rectangle is truly detecting. Auto cropping approach, Figure 8, is
4 4 firstly, determine the positions of ones in image, then calculate minimum and maximum coordinates from these positions, minimum coordinate will be the first corner (upper-left), the second one (lower-right) will be determined by subtract minimum coordinate from maximum coordinate. After that image cropping will be used with these corners as: I2=imcrop(I1, x1 y1 x2 y2); where; I2: cropped image (output), I1= original image (input), x1,y1: first corner, x2,y2: second corner. According to the previous mechanism a good and true cropping rectangle was determined, so no lose in the information meaning of the signature object. Figure 7 shows this results, while Figure 8 show the whole flowchart of auto cropping approach. Original image Cropped image Fig. 5 Auto cropping results Fig. 6 auto cropping flowchart 5. Conclusion This paper proposed new approaches of pre-processing and auto cropping of signature images, where the given approach shows high accuracy of signature object detection and segmentation, the performance of this approach was shown through its speed time, and keeping the content information of the signature object without losing.
5 5 References [1] Fang, B. Off-line signature verification with generated training samples. in IEE Proc.Vis. Image and Signal Processing [2] Plamondon, R. and G. Lorette, Automatic signature verification and writer identification: The state of the art. Pattern Recognition, (2): p [3] Abuhaiba, I.S., Offline Signature Verification Using Graph Matching. Turk. J. Elec. Engin, (1): p [4] Kővári, B. Extraction of Dynamic Features for Off-line Signature Analysis. in Automation and Applied Computer Science Workshop (AACS) [5] Santosh, K. and N. Cholwich, A Comprehensive Survey on On-Lie Handwriting Recognition Technology and its Real Application to the Nepalese Natural Handwriting. Kathmandu University Journal of Science, Engineering and Technology, (1): p [6] Fierrez-Aguilar, J., Alonso-Hermira, N., Moreno-Marquez, G., Ortega-Garcia, J., An off-line signature verification system based on fusion of local and global information. Proc. of BIOAW, Springer LNCS-3087, 2004: p [7] Otsu, N., A threshold selection method from gray level histograms. IEEE Trans. Systems, Man and Cybernetics, : p [8] Muralidharan, N. Signature Verification: A Popular Biometric technology. in Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology [9] Gonzalez, R.C., R.E. Woods, and S.L. Eddins, Digital Image Processing USING MATLAB. 2004: Pearson Prentice Hall. [10] Neoh., H.S. and A. Hazanchuk. Adaptive Edge Detection for Real-Time Video Processing using FPGAs. in GSPx 2004 Conference Bassam AL-Mahadeen is an assistant professor at Math & IT department, faculty of science at Tafila Technical University, Jordan. He obtained his PhD in CIS from Arab Academy for Banking & Financial Sciences, Jordan in He also holds MSc in Computer Science from Al Al-Byte University, Jordan in 1999, and BSc in Computer Science from Mutah University, Jordan in His research interests include Wireless image sensor networks, RFID applications, Healthcare Simulation and Modeling, image processing, and Interconnection Networks. He was the Director of Computer Center at Tafila Technical University, and Full Time Lecturer at Mutah University. He is a member of IAJIT. Mokhled S. AlTarawneh is an assistant professor at computer engineering department, faculty of engineering at Mutah University, Jordan. He is also a director of computer center, Mutah University. His research interests include computer vision, pattern recognition, image processing, image quality assessment, and biometrics. Altarawneh is a member of Jordan Engineers Association (JEA), member of Arab Computer Society (ACS), member of IET, UK and International Engineers Association (IAENG). AlTarawneh holds a Doctorate degree in computer engineering from Newcastle University, United Kingdom. He received the master's degree from University of the Ryukyus, Okinawa, Japan, the BE degree in computer engineering from Azerbaijan Technical University, Baku, Azerbaijan.
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
Automatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4].
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Technique
Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature
3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun
A Method of Caption Detection in News Video
3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
Mouse Control using a Web Camera based on Colour Detection
Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,
Automatic Traffic Estimation Using Image Processing
Automatic Traffic Estimation Using Image Processing Pejman Niksaz Science &Research Branch, Azad University of Yazd, Iran [email protected] Abstract As we know the population of city and number of
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
Building an Advanced Invariant Real-Time Human Tracking System
UDC 004.41 Building an Advanced Invariant Real-Time Human Tracking System Fayez Idris 1, Mazen Abu_Zaher 2, Rashad J. Rasras 3, and Ibrahiem M. M. El Emary 4 1 School of Informatics and Computing, German-Jordanian
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
Implementation of Canny Edge Detector of color images on CELL/B.E. Architecture.
Implementation of Canny Edge Detector of color images on CELL/B.E. Architecture. Chirag Gupta,Sumod Mohan K [email protected], [email protected] Abstract In this project we propose a method to improve
Signature Segmentation from Machine Printed Documents using Conditional Random Field
2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Morphological segmentation of histology cell images
Morphological segmentation of histology cell images A.Nedzved, S.Ablameyko, I.Pitas Institute of Engineering Cybernetics of the National Academy of Sciences Surganova, 6, 00 Minsk, Belarus E-mail [email protected]
Automatic License Plate Recognition using Python and OpenCV
Automatic License Plate Recognition using Python and OpenCV K.M. Sajjad Department of Computer Science and Engineering M.E.S. College of Engineering, Kuttippuram, Kerala [email protected] Abstract Automatic
STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK
Volume 6, Issue 3, pp: 335343 IJESET STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Dipti Verma 1, Sipi Dubey 2 1 Department of Computer
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Document Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wireless Hardware Control
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3129-3133 ISSN: 2249-6645 Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wireless Hardware Control Tarachand Saini,Savita Sivani Dept. of Software
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Signature verification using Kolmogorov-Smirnov. statistic
Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,[email protected]
Super-resolution method based on edge feature for high resolution imaging
Science Journal of Circuits, Systems and Signal Processing 2014; 3(6-1): 24-29 Published online December 26, 2014 (http://www.sciencepublishinggroup.com/j/cssp) doi: 10.11648/j.cssp.s.2014030601.14 ISSN:
Poker Vision: Playing Cards and Chips Identification based on Image Processing
Poker Vision: Playing Cards and Chips Identification based on Image Processing Paulo Martins 1, Luís Paulo Reis 2, and Luís Teófilo 2 1 DEEC Electrical Engineering Department 2 LIACC Artificial Intelligence
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH Vikas J Dongre 1 Vijay H Mankar 2 Department of Electronics & Telecommunication, Government Polytechnic, Nagpur, India 1 [email protected]; 2
Low-resolution Image Processing based on FPGA
Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Handwritten Signature Verification using Neural Network
Handwritten Signature Verification using Neural Network Ashwini Pansare Assistant Professor in Computer Engineering Department, Mumbai University, India Shalini Bhatia Associate Professor in Computer Engineering
Multisensor Data Fusion and Applications
Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: [email protected]
Visual Structure Analysis of Flow Charts in Patent Images
Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Barcode Based Automated Parking Management System
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Barcode Based Automated Parking Management System Parth Rajeshbhai Zalawadia 1 Jasmin
Virtual Mouse Using a Webcam
1. INTRODUCTION Virtual Mouse Using a Webcam Since the computer technology continues to grow up, the importance of human computer interaction is enormously increasing. Nowadays most of the mobile devices
Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011)
2011 International Conference on Document Analysis and Recognition Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011) Marcus Liwicki, Muhammad Imran Malik, C. Elisa
Colour Image Segmentation Technique for Screen Printing
60 R.U. Hewage and D.U.J. Sonnadara Department of Physics, University of Colombo, Sri Lanka ABSTRACT Screen-printing is an industry with a large number of applications ranging from printing mobile phone
Algorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers
Algorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers Isack Bulugu Department of Electronics Engineering, Tianjin University of Technology and Education, Tianjin, P.R.
Canny Edge Detection
Canny Edge Detection 09gr820 March 23, 2009 1 Introduction The purpose of edge detection in general is to significantly reduce the amount of data in an image, while preserving the structural properties
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Thresholding technique with adaptive window selection for uneven lighting image
Pattern Recognition Letters 26 (2005) 801 808 wwwelseviercom/locate/patrec Thresholding technique with adaptive window selection for uneven lighting image Qingming Huang a, *, Wen Gao a, Wenjian Cai b
COLOR-BASED PRINTED CIRCUIT BOARD SOLDER SEGMENTATION
COLOR-BASED PRINTED CIRCUIT BOARD SOLDER SEGMENTATION Tz-Sheng Peng ( 彭 志 昇 ), Chiou-Shann Fuh ( 傅 楸 善 ) Dept. of Computer Science and Information Engineering, National Taiwan University E-mail: [email protected]
Computer Vision for Quality Control in Latin American Food Industry, A Case Study
Computer Vision for Quality Control in Latin American Food Industry, A Case Study J.M. Aguilera A1, A. Cipriano A1, M. Eraña A2, I. Lillo A1, D. Mery A1, and A. Soto A1 e-mail: [jmaguile,aciprian,dmery,asoto,]@ing.puc.cl
Edge detection. (Trucco, Chapt 4 AND Jain et al., Chapt 5) -Edges are significant local changes of intensity in an image.
Edge detection (Trucco, Chapt 4 AND Jain et al., Chapt 5) Definition of edges -Edges are significant local changes of intensity in an image. -Edges typically occur on the boundary between two different
ESE498. Intruder Detection System
0 Washington University in St. Louis School of Engineering and Applied Science Electrical and Systems Engineering Department ESE498 Intruder Detection System By Allen Chiang, Jonathan Chu, Siwei Su Supervisor
Navigation Aid And Label Reading With Voice Communication For Visually Impaired People
Navigation Aid And Label Reading With Voice Communication For Visually Impaired People A.Manikandan 1, R.Madhuranthi 2 1 M.Kumarasamy College of Engineering, [email protected],karur,india 2 M.Kumarasamy
Euler Vector: A Combinatorial Signature for Gray-Tone Images
Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, [email protected] Indian Statistical Institute,
AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM
Journal of Engineering Science and Technology EURECA 2014 Special Issue January (2015) 45-59 School of Engineering, Taylor s University AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM EU TSUN CHIN*, WEI
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
An Efficient Geometric feature based License Plate Localization and Stop Line Violation Detection System
An Efficient Geometric feature based License Plate Localization and Stop Line Violation Detection System Waing, Dr.Nyein Aye Abstract Stop line violation causes in myanmar when the back wheel of the car
Automatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
19th International Conference on Mechatronics and Machine Vision in Practice (M2VIP12), 28-30th Nov 2012, Auckland, New-Zealand
Monitoring and Remote Sensing of the Street Lighting System Using Computer Vision and Image Processing Techniques for the Purpose of Mechanized Blackouts Pooya Najafi Zanjani 1,2, Vahid Ghods 2, Morteza
A Fast Algorithm for Multilevel Thresholding
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 713-727 (2001) A Fast Algorithm for Multilevel Thresholding PING-SUNG LIAO, TSE-SHENG CHEN * AND PAU-CHOO CHUNG + Department of Electrical Engineering
A SECURE EMAIL CLIENT APPLICATION USING RETINAL IMAGE MATCHING
A SECURE EMAIL CLIENT APPLICATION USING RETINAL IMAGE MATCHING ANKITA KANTESH 1, SUPRIYA S. BEHERA 2, JYOTI BHOITE 3, ANAMIKA KUMARI 4 1,2,3,4 B.E, University of Pune Abstract- As technology advances,
A New Image Edge Detection Method using Quality-based Clustering. Bijay Neupane Zeyar Aung Wei Lee Woon. Technical Report DNA #2012-01.
A New Image Edge Detection Method using Quality-based Clustering Bijay Neupane Zeyar Aung Wei Lee Woon Technical Report DNA #2012-01 April 2012 Data & Network Analytics Research Group (DNA) Computing and
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences Byoung-moon You 1, Kyung-tack Jung 2, Sang-kook Kim 2, and Doo-sung Hwang 3 1 L&Y Vision Technologies, Inc., Daejeon,
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Implementing Optical Character Recognition on the Android Operating System for Business Cards
1 Implementing Optical Character Recognition on the Android Operating System for Business Cards Sonia Bhaskar, Nicholas Lavassar, Scott Green EE 368 Digital Image Processing Abstract This report presents
Automatic Labeling of Lane Markings for Autonomous Vehicles
Automatic Labeling of Lane Markings for Autonomous Vehicles Jeffrey Kiske Stanford University 450 Serra Mall, Stanford, CA 94305 [email protected] 1. Introduction As autonomous vehicles become more popular,
Automatic Recognition Algorithm of Quick Response Code Based on Embedded System
Automatic Recognition Algorithm of Quick Response Code Based on Embedded System Yue Liu Department of Information Science and Engineering, Jinan University Jinan, China [email protected] Mingjun Liu
An Algorithm for Classification of Five Types of Defects on Bare Printed Circuit Board
IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 3, July 2011 CSES International 2011 ISSN 0973-4406 An Algorithm for Classification of Five Types of Defects on Bare
QUALITY TESTING OF WATER PUMP PULLEY USING IMAGE PROCESSING
QUALITY TESTING OF WATER PUMP PULLEY USING IMAGE PROCESSING MRS. A H. TIRMARE 1, MS.R.N.KULKARNI 2, MR. A R. BHOSALE 3 MR. C.S. MORE 4 MR.A.G.NIMBALKAR 5 1, 2 Assistant professor Bharati Vidyapeeth s college
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN [email protected] Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Colour Image Encryption and Decryption by using Scan Approach
Colour Image Encryption and Decryption by using Scan Approach, Rinkee Gupta,Master of Engineering Scholar, Email: [email protected] Jaipal Bisht, Asst. Professor Radharaman Institute Of Technology
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
A Study of Automatic License Plate Recognition Algorithms and Techniques
A Study of Automatic License Plate Recognition Algorithms and Techniques Nima Asadi Intelligent Embedded Systems Mälardalen University Västerås, Sweden [email protected] ABSTRACT One of the most
Development of Palmprint Verification System Using Biometrics
ISSN 1000-985, CDEN RUXUEW E-mail: [email protected] Journal of Software, Vol.17, No.8, August 006, pp.184 1836 http://www.jos.org.cn DI: 10.1360/jos17184 Tel/Fax: +86-10-656563 006 by Journal of Software.
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
A Simple Feature Extraction Technique of a Pattern By Hopfield Network
A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani
Template-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
Lecture Video Indexing and Analysis Using Video OCR Technology
Lecture Video Indexing and Analysis Using Video OCR Technology Haojin Yang, Maria Siebert, Patrick Lühne, Harald Sack, Christoph Meinel Hasso Plattner Institute (HPI), University of Potsdam P.O. Box 900460,
Embedded Vision on FPGAs. 2015 The MathWorks, Inc. 1
Embedded Vision on FPGAs 2015 The MathWorks, Inc. 1 Enhanced Edge Detection in MATLAB Test bench Read Image from File Add noise Frame To Pixel Median Filter Edge Detect Pixel To Frame Video Display Design
Demo: Real-time Tracking of Round Object
Page 1 of 1 Demo: Real-time Tracking of Round Object by: Brianna Bikker and David Price, TAMU Course Instructor: Professor Deepa Kundur Introduction Our project is intended to track the motion of a round
Final Year Project Progress Report. Frequency-Domain Adaptive Filtering. Myles Friel. Supervisor: Dr.Edward Jones
Final Year Project Progress Report Frequency-Domain Adaptive Filtering Myles Friel 01510401 Supervisor: Dr.Edward Jones Abstract The Final Year Project is an important part of the final year of the Electronic
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
Finding skewness and deskewing scanned document
Finding skewness and deskewing scanned document Sunita Parashar[1],Sharuti Sogi[2] Department of Computer Sc. & Engineering, H.C.T.M, Kaithal, Haryana (India) [email protected][1],[email protected][2]
Introduction. Chapter 1
1 Chapter 1 Introduction Robotics and automation have undergone an outstanding development in the manufacturing industry over the last decades owing to the increasing demand for higher levels of productivity
