Euler Vector: A Combinatorial Signature for Gray-Tone Images
|
|
|
- Zoe Reeves
- 10 years ago
- Views:
Transcription
1 Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, [email protected] Indian Statistical Institute, 203, B. T. Road, Kolkata Tinku Acharya [email protected] Intel Corporation, Chandler, AZ-85226, USA Abstract A new combinatorial characterization of a gray-tone image called Euler Vector is proposed. Euler number of a binary image is a well-known topological feature, which remains invariant under translation, rotation, scaling, and rubber-sheet transformation of the image. Euler vector comprises of a 4-tuple, where each element is an integer representing the Euler number of the partial binary image formed by the four most significant bit planes of the graytone image. Experimental results demonstrate robustness of Euler vector under compression and inclusion of noise followed by filtering. The vector is topologically invariant and can be used for image indexing and retrieval. Index Terms-Euler number, digital image processing. 1. Introduction Feature extraction of a gray-tone image for fast and robust characterization is a challenging task. Compact image features are always needed for an efficient management of image database, search and retrieval. Defining a good numerical characterization of an image is a fundamental problem in image processing. Further, the characteristic parameters of the image should preferably remain invariant in the presence of various perturbations or transformations, such as translation, rotation, scaling, rubber-sheet shearing, inclusion of noise, compression, etc. Earlier approaches to image characterization include, i) spatial features like amplitude and histogram descriptors; ii) transform features like Fourier descriptor, DCT, iii) shape based features like boundaries, regions, area, Euler number, center of mass, moments, eccentricity, etc., iv) syntactic features based on structural peculiarities, v) statistical and structural texture features [1, 8, 9, 10]. Determination of a compact set of parameters for a gray-tone image which is easy to compute, suitable for efficient database search, and admits robustness against transformations, is now highly needed in the emerging domain of the Internet technology. In this work, we define a new parameter called Euler vector of a gray-tone image. For a binary image, Euler number (genus) is a well-known geometric feature, which is defined as the difference between the number of connected components (objects) and the number of holes [2, 3, 4, 5, 12, 13]. Euler number is extensively used in optical character recognition, medical diagnosis, skin detection, and in many other applications. Efficient techniques of computing Euler number of a binary image are also well known [2, 4, 14, 15]. However, to the best of our knowledge, nothing is known in the literature on the use of Euler number or similar characterization of a gray-tone image. In an attempt to generalize the concept for a gray-tone image, we consider gray code representation of the intensity values in the pixel matrix, and observe the first 4 most significant bit planes. Each bit plane consists of only 0 s and 1 s, and hence forms a binary (two-tone) image. We compute Euler number of the partial image formed by each of the 4 bit planes to obtain a 4-tuple of integers, called Euler vector of the original gray-tone image. Bit planes based on gray codes were also used earlier for other bio-medical applications [7]. We give experimental results on a 31-image database. The Euler vector of a image is found to remain near invariant under inclusion of salt and pepper or gaussian noise followed by filtering, and also under JPEG compression. It has a strong discriminatory power and can thus be used to augment other features to facilitate image searching and retrieval. This workis funded by a grant from Intel Corp., #CAC ); US Patent pending, Nov y Author for correspondence USA (PO
2 2. Combinatorial Feature of Gray Images 2.1. Bit-planes We assume that a gray-tone image be represented as an (N M ) matrix, where each element is an integer lying between [0 255] denoting the intensity of the corresponding pixel. Thus, a 8-bit binary vector, fb 7 b 6 b 5 b 4 ::: b 0 g can represent the intensity value of each pixel. Each b i is either `0` or `1`. Thus, the i th bit-plane of the image is a binary matrix of size N M and hence, can be thought of as a two-tone image. The given image therefore, comprises 8 bit planes Implementation details Noise can corrupt the image changing intensity levels and affect the bit-planes. To make the Euler vector more robust, the given image is cleaned successively by median and mean filters. Other sophisticated filters may also be used. Further, we rescale the dynamic range of intensity levels of the image. Visually similar images may differ in their dynamic ranges resulting in different bit-plane representations. To circumvent the problem, the images are rescaled such that their intensity level dynamic range is mapped to [0, 255]. We next describe the proposed algorithm Euler vector To characterize a gray-tone image, we now define a 4- tuple called Euler vector. We retain the first 4mostsignificant bit planes (corresponding to (b 7 b 6 b 5 b 4 ))asthey contain most of the information of the image, and ignore the remaining planes. However, each of these 4-bit binary vectors is converted to its corresponding reflected gray code (g 7 g 6 g 5 g 4 )[11], which is defined as: g 7 = b 7 g 6 = b 7 b 6 g 5 = b 6 b 5 g 4 = b 5 b 4,where, denotes XOR (modulo-2) operation. For any binary vector, the corresponding reflected gray code is unique and vice-versa. Consider the first 4 most significant bit planes of the given image in gray code. Each bit plane now represents a twotone image. See Figure 1 for an example. Definition: The Euler vector of a gray-tone image is a 4-tuple E 7 E 6 E 5 E 4 where E i is the Euler number of the partial two-tone image formed by the i th bit-plane, 7 i 4, corresponding to the reflected gray code representation of intensity values. For the gray-tone image (Africa) shown in Figure 1, the Euler vector is found to be f79 ;13 ;391 ;16 24g. Gray code representation of intensity values offers a distinct advantage over standard binary representation in this particular context. Euler vector is found to be more insensitive to noise and other changes, if the gray code is used. This happens because two consecutive numbers have unit hamming distance in gray-code representation, and for most of the cases, a small change in intensity values is not likely to affect all the 4 bit planes simultaneously in gray code representation. Euler vector serves as a fundamental topological feature of a gray-tone image. Like Euler number of a binary image, it remains invariant under translation, rotation, scaling, and rubber-sheet transformation of the image. Since Euler number depends on the combinatorial properties of 0 ; 1 runs in the binary pixel matrix [12, 13] and is easily computable [14, 15], Euler vector of a gray-tone image also provides a quickcombinatorial signature. (b) (d) (a) (c) (e) Figure 1. Gray-code bit planes and Euler vector (a) Gray-tone image, (b) Most significant bit-plane g 7, Euler number =79, (c) bit-plane g 6, Euler number = ;13, (d) bit-plane g 5, Euler number = ;391, (e) bit-plane g 7, Euler number = ;1624. Euler vector = f79, -13, -391, -1624g 2.4. Algorithm Method Input: A pixel matrix for a gray-tone image I. Output: Euler vector. Compute Euler Vector Step 1: Apply median filtering followed by mean filtering on I;
3 Step 2: Linearly rescale the dynamic range of the image to [0-255]; Step 3: Consider the first 4 most significant binary bit planes of I; Step 4: Convert each 4-bit vector to its corresponding reflected gray code; Step 5: For each bit plane, compute Euler number; Step 6: Output the Euler Vector; 3. Results We have coded our algorithm in C and run on Ultra - 10 Sun Workstation. A database consisting of several graytone images is considered. Few samples are shown in Figure 2. For each of these images, we computed the Euler vector after cleaning them by median and mean filters. The effects of adding salt and pepper or gaussian noise, and JPEG compression have been studied. Results are shown in Table - 1. It has been observed that Euler vector provides a quick signature with robust behavior in the presence of noise and compression. Each image is of size ( ). For each image, the Euler vector fe 7 E 6 E 5 E 4 g is shown, the top one corresponds to E 7. Results shown in the Table 1 for images shown in Figure 2 were obtained after filtering the images successively by median and mean filter each of size (3 3). The salt & pepper noise was a random noise which affected 5% of the image (= pixels approximately). The gaussian noise is a white noise with mean and variance 0 0: Conclusions We have introduced a new combinatorial parameter for gray-tone images called Euler vector. It derives its definition from the concept of Euler number of a binary image. Euler vector retains the topological properties of Euler number and serves as a numerical signature of a gray-tone image. Results show that Euler vector is also robust against noise effects and compression. References [4] Gray, S. B., Local Properties of Binary Images in Two Dimensions, IEEE Trans. Computers, no. 5, pp , May [5] Pratt, W. K., Digital Image Processing. John Wiley & Sons., [6] Samet, H. and Tamminen, H., Computing Geometric Properties of Images Represented by Linear Quadtrees, IEEE Trans. PAMI, vol. PAMI-7, no. 2, March [7] Kunt, M., Source Coding of X-Ray pictures, IEEE Trans. Biomedical Engineering, vol. BME-25, no. 2, March [8] Trier, O. D., Jain, A. K., and Taxt, T., Feature extraction methods for character recognition - a survey, Pattern Recognition, Vol. 29, pp , [9] Hu, M.K., Visual pattern recognition by moment invariants, IRE Trans. Information Theory 8, pp , Feb [10] Reiss, T.H., Recognizing planar objects using invariant image features, Lecture Notes in Computer Science, vol. 676, Springer Verlag, Berlin, [11] Kohavi, Z., Switching And Finite Automata Theory, McGraw Hill, New York, [12] Rosenfeld, A., Kak, A. C., Digital Picture Processing, Academic Press Inc., New York, [13] Zenzo, S. D., Cinque, L., and Levialdi, S., Run-Based Algorithms for Binary Image Analysis and Processing, IEEE Trans. PAMI, vol. PAMI-18, no. 1, January [14] Dey, S., Bhattacharya, B. B., Kundu, M. K., Acharya, T., A fast algorithm for computing the Euler number of an image and its VLSI implementation, Proc. 13th Intl. Conf. on VLSI Design, 2000, pp , Calcutta, India. [15] Bishnu, A., Bhattacharya, B. B., Kundu, M. K., Murthy, C. A., and Acharya, T., On-chip computation of Euler number of a binary image for efficient database search, Proc. Intl. Conf. on Image Processing(ICIP), Vol. III, pp , Greece, [1] Jain, A. K., Fundamentals of Digital Image Processing, Prentice Hall of India, [2] Dyer, C. R., Computing the Euler Number of an Image from its Quadtree, Computer Graphics Image Processing, vol. 13, no. 3, pp , July [3] Gonzalez, R.C., and Woods, R.E., Digital Image Processing, Addison-Wesley, Reading, Massachusetts, 1993.
4 Table 1. Computation of Euler vector Image name Original image Image corrupted by salt Image corrupted by JPEG compressed & pepper noise gaussian noise image africa.g army.g blaze.g castle.g cathed.g cattle.g chimp.g choper.g couple.g fish.g
5 Image name Original image Image corrupted by salt Image corrupted by JPEG compressed & pepper noise gaussian noise image goldfish.g hawk.g ice.g insect.g kid1.g kid2.g kid3.g leaf.g neweng.g photogra.g
6 Figure 2. Some Sample Images africa.g army.g blaze.g castle.g cathed.g cattle.g chimp.g choper.g couple.g fish.g golfish.g hawk.g ice.g insect.g kid1.g kid2.g kid3.g leaf.g neweng.g photogra.g
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
APPLYING COMPUTER VISION TECHNIQUES TO TOPOGRAPHIC OBJECTS
APPLYING COMPUTER VISION TECHNIQUES TO TOPOGRAPHIC OBJECTS Laura Keyes, Adam Winstanley Department of Computer Science National University of Ireland Maynooth Co. Kildare, Ireland [email protected], [email protected]
Efficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
Signature Segmentation from Machine Printed Documents using Conditional Random Field
2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL Garkal Bramhraj 1, palve Atul 2, Ghule Supriya 3, Misal sonali 4 1 Garkal Bramhraj mahadeo, 2 Palve Atule Vasant, 3 Ghule Supriya Shivram, 4 Misal Sonali Babasaheb,
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim
Character Image Patterns as Big Data
22 International Conference on Frontiers in Handwriting Recognition Character Image Patterns as Big Data Seiichi Uchida, Ryosuke Ishida, Akira Yoshida, Wenjie Cai, Yaokai Feng Kyushu University, Fukuoka,
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
Kriging Interpolation Filter to Reduce High Density Salt and Pepper Noise
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 3, No. 1, 8-14, 2013 Kriging Interpolation Filter to Reduce High Density Salt and Pepper Noise Firas Ajil Jassim
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN [email protected] Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
FCE: A Fast Content Expression for Server-based Computing
FCE: A Fast Content Expression for Server-based Computing Qiao Li Mentor Graphics Corporation 11 Ridder Park Drive San Jose, CA 95131, U.S.A. Email: qiao [email protected] Fei Li Department of Computer Science
Frsq: A Binary Image Coding Method
Frsq: A Binary Image Coding Method Peter L. Stanchev, William I. Grosky, John G. Geske Kettering University, Flint, MI 4854, {pstanche, jgeske}@kettering.edu University of Michigan-Dearborn, Dearborn,
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Image Normalization for Illumination Compensation in Facial Images
Image Normalization for Illumination Compensation in Facial Images by Martin D. Levine, Maulin R. Gandhi, Jisnu Bhattacharyya Department of Electrical & Computer Engineering & Center for Intelligent Machines
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS
ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS Dasaradha Ramaiah K. 1 and T. Venugopal 2 1 IT Department, BVRIT, Hyderabad, India 2 CSE Department, JNTUH,
Practical Tour of Visual tracking. David Fleet and Allan Jepson January, 2006
Practical Tour of Visual tracking David Fleet and Allan Jepson January, 2006 Designing a Visual Tracker: What is the state? pose and motion (position, velocity, acceleration, ) shape (size, deformation,
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer
Volume 3 Issue 10 October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Introduction
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wireless Hardware Control
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3129-3133 ISSN: 2249-6645 Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wireless Hardware Control Tarachand Saini,Savita Sivani Dept. of Software
An Approach for Utility Pole Recognition in Real Conditions
6th Pacific-Rim Symposium on Image and Video Technology 1st PSIVT Workshop on Quality Assessment and Control by Image and Video Analysis An Approach for Utility Pole Recognition in Real Conditions Barranco
Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature
3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun
A Method of Caption Detection in News Video
3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.
Determining optimal window size for texture feature extraction methods
IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow
, pp.233-237 http://dx.doi.org/10.14257/astl.2014.51.53 A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow Giwoo Kim 1, Hye-Youn Lim 1 and Dae-Seong Kang 1, 1 Department of electronices
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Lectures 6&7: Image Enhancement
Lectures 6&7: Image Enhancement Leena Ikonen Pattern Recognition (MVPR) Lappeenranta University of Technology (LUT) [email protected] http://www.it.lut.fi/ip/research/mvpr/ 1 Content Background Spatial
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 269 Class Project Report
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 69 Class Project Report Junhua Mao and Lunbo Xu University of California, Los Angeles [email protected] and lunbo
Information Hiding by Stochastic Diffusion and its Application to Printed Document Authentication
ISSC 2009, UCD, June 10-11th Information Hiding by Stochastic Diffusion and its Application to Printed Document Authentication SFI Stokes Professor of DSP Faculty of Engineering Dublin Institute of Technology
CS 534: Computer Vision 3D Model-based recognition
CS 534: Computer Vision 3D Model-based recognition Ahmed Elgammal Dept of Computer Science CS 534 3D Model-based Vision - 1 High Level Vision Object Recognition: What it means? Two main recognition tasks:!
COLOR-BASED PRINTED CIRCUIT BOARD SOLDER SEGMENTATION
COLOR-BASED PRINTED CIRCUIT BOARD SOLDER SEGMENTATION Tz-Sheng Peng ( 彭 志 昇 ), Chiou-Shann Fuh ( 傅 楸 善 ) Dept. of Computer Science and Information Engineering, National Taiwan University E-mail: [email protected]
Methodology for Emulating Self Organizing Maps for Visualization of Large Datasets
Methodology for Emulating Self Organizing Maps for Visualization of Large Datasets Macario O. Cordel II and Arnulfo P. Azcarraga College of Computer Studies *Corresponding Author: [email protected]
Research and Professional Activities. Dr. Mitra Basu
Research and Professional Activities Dr. Mitra Basu Personal Information: Address Computer Science Department Computer Science Department United States Naval Academy Johns Hopkins University Annapolis,
A New Two-Scan Algorithm for Labeling Connected Components in Binary Images
, July 4-6, 2012, London, U.K. A New Two-Scan Algorithm for Labeling Connected Components in Binary Images Lifeng He, Yuyan Chao, Kenji Suzuki Abstract This paper proposes a new two-scan algorithm for
Intensity transformations
Intensity transformations Stefano Ferrari Università degli Studi di Milano [email protected] Elaborazione delle immagini (Image processing I) academic year 2011 2012 Spatial domain The spatial domain
TouchPaper - An Augmented Reality Application with Cloud-Based Image Recognition Service
TouchPaper - An Augmented Reality Application with Cloud-Based Image Recognition Service Feng Tang, Daniel R. Tretter, Qian Lin HP Laboratories HPL-2012-131R1 Keyword(s): image recognition; cloud service;
Introduction to acoustic imaging
Introduction to acoustic imaging Contents 1 Propagation of acoustic waves 3 1.1 Wave types.......................................... 3 1.2 Mathematical formulation.................................. 4 1.3
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK J.Pradeep 1, E.Srinivasan 2 and S.Himavathi 3 1,2 Department of ECE, Pondicherry College Engineering,
A New Approach for Similar Images Using Game Theory
Applied Mathematical Sciences, Vol. 8, 2014, no. 163, 8099-8111 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.410790 A New Approach for Similar Images Using Game Theory O. Bencharef
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
A BRIEF STUDY OF VARIOUS NOISE MODEL AND FILTERING TECHNIQUES
Volume 4, No. 4, April 2013 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info A BRIEF STUDY OF VARIOUS NOISE MODEL AND FILTERING TECHNIQUES Priyanka Kamboj
Low-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Object Recognition and Template Matching
Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
Circle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
Object Tracking System Using Motion Detection
Object Tracking System Using Motion Detection Harsha K. Ingle*, Prof. Dr. D.S. Bormane** *Department of Electronics and Telecommunication, Pune University, Pune, India Email: [email protected] **Department
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Introduction. Chapter 1
1 Chapter 1 Introduction Robotics and automation have undergone an outstanding development in the manufacturing industry over the last decades owing to the increasing demand for higher levels of productivity
Building an Advanced Invariant Real-Time Human Tracking System
UDC 004.41 Building an Advanced Invariant Real-Time Human Tracking System Fayez Idris 1, Mazen Abu_Zaher 2, Rashad J. Rasras 3, and Ibrahiem M. M. El Emary 4 1 School of Informatics and Computing, German-Jordanian
Using quantum computing to realize the Fourier Transform in computer vision applications
Using quantum computing to realize the Fourier Transorm in computer vision applications Renato O. Violin and José H. Saito Computing Department Federal University o São Carlos {renato_violin, saito }@dc.uscar.br
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
Image Compression and Decompression using Adaptive Interpolation
Image Compression and Decompression using Adaptive Interpolation SUNILBHOOSHAN 1,SHIPRASHARMA 2 Jaypee University of Information Technology 1 Electronicsand Communication EngineeringDepartment 2 ComputerScience
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia [email protected]
Fast Matching of Binary Features
Fast Matching of Binary Features Marius Muja and David G. Lowe Laboratory for Computational Intelligence University of British Columbia, Vancouver, Canada {mariusm,lowe}@cs.ubc.ca Abstract There has been
Computer Vision for Quality Control in Latin American Food Industry, A Case Study
Computer Vision for Quality Control in Latin American Food Industry, A Case Study J.M. Aguilera A1, A. Cipriano A1, M. Eraña A2, I. Lillo A1, D. Mery A1, and A. Soto A1 e-mail: [jmaguile,aciprian,dmery,asoto,]@ing.puc.cl
Signature verification using Kolmogorov-Smirnov. statistic
Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,[email protected]
An Iterative Image Registration Technique with an Application to Stereo Vision
An Iterative Image Registration Technique with an Application to Stereo Vision Bruce D. Lucas Takeo Kanade Computer Science Department Carnegie-Mellon University Pittsburgh, Pennsylvania 15213 Abstract
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
Face Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
Accurate and robust image superresolution by neural processing of local image representations
Accurate and robust image superresolution by neural processing of local image representations Carlos Miravet 1,2 and Francisco B. Rodríguez 1 1 Grupo de Neurocomputación Biológica (GNB), Escuela Politécnica
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Less naive Bayes spam detection
Less naive Bayes spam detection Hongming Yang Eindhoven University of Technology Dept. EE, Rm PT 3.27, P.O.Box 53, 5600MB Eindhoven The Netherlands. E-mail:[email protected] also CoSiNe Connectivity Systems
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
Bildverarbeitung und Mustererkennung Image Processing and Pattern Recognition
Bildverarbeitung und Mustererkennung Image Processing and Pattern Recognition 1. Image Pre-Processing - Pixel Brightness Transformation - Geometric Transformation - Image Denoising 1 1. Image Pre-Processing
Component Ordering in Independent Component Analysis Based on Data Power
Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals
Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall
Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin
More Local Structure Information for Make-Model Recognition
More Local Structure Information for Make-Model Recognition David Anthony Torres Dept. of Computer Science The University of California at San Diego La Jolla, CA 9093 Abstract An object classification
Metrics on SO(3) and Inverse Kinematics
Mathematical Foundations of Computer Graphics and Vision Metrics on SO(3) and Inverse Kinematics Luca Ballan Institute of Visual Computing Optimization on Manifolds Descent approach d is a ascent direction
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
RUN-LENGTH ENCODING FOR VOLUMETRIC TEXTURE
RUN-LENGTH ENCODING FOR VOLUMETRIC TEXTURE Dong-Hui Xu, Arati S. Kurani, Jacob D. Furst, Daniela S. Raicu Intelligent Multimedia Processing Laboratory, School of Computer Science, Telecommunications, and
PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM
PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM Apurva Sinha 1, Mukesh kumar 2, A.K. Jaiswal 3, Rohini Saxena 4 Department of Electronics
A Comparison of Photometric Normalisation Algorithms for Face Verification
A Comparison of Photometric Normalisation Algorithms for Face Verification James Short, Josef Kittler and Kieron Messer Centre for Vision, Speech and Signal Processing University of Surrey Guildford, Surrey,
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
Tracking in flussi video 3D. Ing. Samuele Salti
Seminari XXIII ciclo Tracking in flussi video 3D Ing. Tutors: Prof. Tullio Salmon Cinotti Prof. Luigi Di Stefano The Tracking problem Detection Object model, Track initiation, Track termination, Tracking
