Статьи журнала - International Journal of Image, Graphics and Signal Processing

Все статьи: 1056

Comparing Nonsubsampled Wavelet, Contourlet and Shearlet Transforms for Ultrasound Image Despeckling

Comparing Nonsubsampled Wavelet, Contourlet and Shearlet Transforms for Ultrasound Image Despeckling

Sedigheh Ghofrani

Статья научная

Ultrasound images suffer of multiplicative noise named speckle. Bayesian shrinkage in transform domain is a well-known method based on finding threshold value to suppress the speckle noise. The main problem of applying Bayesian shrinkage is finding the optimum threshold value in appropriate transform domain. In this paper, we compare the performance of adaptive Bayesian thresholding when nonsubsampled Wavelet, Contourlet and Shearlet transforms are used. We processed two synthetic test images and three original ultrasound images as well to demonstrate the efficiency of the designed filters. In order to compare the performance of Bayesian shrinkage when employing the three mentioned transform domain, we used peak signal to noise ratio (PSNR), mean square error (MSE), and structural similarity (SSIM) as the full-reference (FR) objective criteria parameters and noise variance (NV), mean square difference (MSD), and equivalent number of looks (ENL) as the no-reference (NR) objective criteria parameters.

Бесплатно

Comparison based Analysis of Different FFT Architectures

Comparison based Analysis of Different FFT Architectures

Priyanka S. Pariyal, Dhara M. Koyani, Daizy M. Gandhi, Sunil F. Yadav, Dharam J. Shah, Ankit Adesara

Статья научная

A time-domain sequence is converted into an equivalent frequency-domain sequence using discrete Fourier transform. The reverse operation converts a frequency-domain sequence into an equivalent time-domain sequence using inverse discrete Fourier transform. Based on the discrete Fourier transform. Fast Fourier transform (FFT) is an effective algorithm with few computations. FFT is used in everything from broadband to 3G and Digital TV to radio LAN's. To improve its architecture different efficient algorithms are developed. This paper gives an overview of the work done by a different FFT processor previously. The comparison of different architecture is also discussed.

Бесплатно

Comparison of Circular and Linear Orthogonal Polarization Bases in Electromagnetic Field Parameters Measurement

Comparison of Circular and Linear Orthogonal Polarization Bases in Electromagnetic Field Parameters Measurement

Ludvig Ilnitsky, Olga Shcherbyna, Felix Yanovsky, Maksym Zaliskyi, Oleksii Holubnychyi, Olga Ivanets

Статья научная

This article considers the peculiarities of using circular orthogonal polarization basis for measuring the parameters of an electromagnetic wave. In particular, the angle of inclination of the major axis of the polarization ellipse and the ellipticity coefficient are among measuring parameters. The main expressions for calculation of field parameters in circular and linear orthogonal polarization basis are developed and analyzed. The advantages of using the ring as a measuring antenna in comparison with symmetrical vibrators of the turnstile antenna are substantiated. The expressions obtained in the article for calculating the measurement errors of polarization parameters in a linear orthogonal polarization basis illustrate the multifactorial dependence of the measurement accuracy on the angular and amplitude parameters. In contrast to the linear polarization basis, in case of circular basis, the inclination angle of the polarization ellipse axis can be found by direct measurements of the phase shift, and the accuracy of measuring the ellipticity coefficient is affected only by the error of measuring the ratio of voltage amplitudes, which are proportional to the modules of the field strength vectors of the left and right directions of the circular polarization rotation. This provides better potential accuracy of measurement for the electromagnetic wave parameters when using circular polarization antennas and, correspondingly, more reasonable analysis in the circular orthogonal polarization basis.

Бесплатно

Comparison of Mamdani Fuzzy Inference System for Multiple Membership Functions

Comparison of Mamdani Fuzzy Inference System for Multiple Membership Functions

Pushpa Mamoria, Deepa Raj

Статья научная

Contrast enhancement is an emerging method for image enhancement of specific application to analyze the images clearer for interpretation and analysis in the spatial domain. The goal of Contrast enhancement is to serve an input image so that resultant image is more suited to the particular application. Images with good steps of grays between black and white are commonly the best images for the aim of human perception, a novel approach is proposed in this paper based on fuzzy logic. Mamdani fuzzy inference system models are developed to enhance the contrast of images based on different membership functions (MFs).

Бесплатно

Comparison of Wireless MIMO System Under Alamouti's Scheme and Maximum Ratio Combining Technique

Comparison of Wireless MIMO System Under Alamouti's Scheme and Maximum Ratio Combining Technique

Apoorva Pandey, Rafik Ahmad, Devesh Pratap Singh

Статья научная

In wireless communication fading of channels is the serious cause of the received degraded signals. The effect of fading can be minimized by using various time and space domain techniques. However, space domain techniques are preferred over the others due to its advantages. In this paper, comparison of the wireless MIMO system under Almouti's and maximum ratio combining schemes is presented. Basic idea in these schemes is to transmit and receive more than one copy of the original signals. Using two transmitter antennas and one receiver antenna, the scheme provides the nearly same diversity order as the maximal-ratio receiver combining (MRRC) with one transmitter antenna, and two receiver antennas. Results for one transmitter and four receivers under MRRC is also presented and compared. Finally, results are presented while varying the average transmitted power.

Бесплатно

Comprehensive Study and Comparative Analysis of Different Types of Background Sub-traction Algorithms

Comprehensive Study and Comparative Analysis of Different Types of Background Sub-traction Algorithms

Priyank Shah, Hardik Modi

Статья научная

There are many methods proposed for Back-ground Subtraction algorithm in past years. Background subtraction algorithm is widely used for real time moving object detection in video surveillance system. In this paper we have studied and implemented different types of meth-ods used for segmentation in Background subtraction algo-rithm with static camera. This paper gives good under-standing about procedure to obtain foreground using exist-ing common methods of Background Subtraction, their complexity, utility and also provide basics which will useful to improve performance in the future . First, we have explained the basic steps and procedure used in vision based moving object detection. Then, we have debriefed the common methods of background subtraction like Sim-ple method, statistical methods like Mean and Median filter, Frame Differencing and W4 System method, Running Gaussian Average and Gaussian Mixture Model and last is Eigenbackground Model. After that we have implemented all the above techniques on MATLAB software and show some experimental results for the same and compare them in terms of speed and complexity criteria.

Бесплатно

Compressive Sensing Based Multiple Watermarking Technique for Biometric Template Protection

Compressive Sensing Based Multiple Watermarking Technique for Biometric Template Protection

Rohit M. Thanki, Komal R. Borisagar

Статья научная

Biometric authentication system is having several security issues. Two security issues are template protection at system database and at communication channel between system database and matcher subsystem of biometric system. In this paper, two level watermarking technique based on CS Theory framework in wavelet domain is proposed for security and authentication of biometric template at these two vulnerable points. In the proposed technique, generate sparse measurement information of fingerprint and iris biometric template using CS theory framework. This sparse measurement information is used as secure watermark information which is embedding into a face image of same individual for generation of multimodal biometric template. Sparse watermark information is computed using Discrete Wavelet transform (DWT) and random seed. The proposed watermarking technique not only provide protection to biometric templates, it also gives computational security against spoofing attack because of it is difficult for imposter to get three secure biometric template information where two encoded biometric template is embed in term of sparse measurement information into third biometric template. Similarity value between original watermark image and reconstructed watermark image is the measuring factor for identification and authentication. The experimental results show that the technique is robust against various attacks.

Бесплатно

Compressive Sensing based Image Reconstruction Using Generalized Adaptive OMP with Forward-Backward Movement

Compressive Sensing based Image Reconstruction Using Generalized Adaptive OMP with Forward-Backward Movement

Meenakshi, Sumit Budhiraja

Статья научная

Reconstruction of a sparse signal from fewer observations require compressive sensing based recovery algorithm for saving memory storage. Various sparse recovery techniques including l_1 minimization, greedy pursuit approaches and non-convex optimization requires sparsity to be known in advance. This article presents the generalized adaptive orthogonal matching pursuit with forward-backward movement under the cumulative coherence property; which removes the need of knowledge of sparsity prior to implementation. In this technique, the forward step increases the size of support set and backward step eliminates the misidentified elements. It selects multiple indices on the basis of maximum correlation by forward-backward movement. The size of backward step is kept smaller than the forward one. These forward-backward steps then iterate and increment through the algorithm adaptively and terminate with stopping condition to ensure the identification of significant components. Recovery performance of proposed algorithm is demonstrated via simulation results including reconstruction of sparse signals in noisy and noise free environment. The algorithm has major advantage that it does not require the knowledge of sparsity in advance in contrast to the earlier reconstruction techniques. The evaluation and comparative analysis of result shows that algorithm leads to the increment in recovery performance and efficiency considerably.

Бесплатно

Computer A ided Detection of Tumours in Mammograms

Computer A ided Detection of Tumours in Mammograms

R.Ramani, N.Suthanthira Vanitha

Статья научная

Mammography is a special CT scan technique, which uses X-rays and high-resolution film to detect breast tumors efficiently. Mammography is used only in breast tumor detection, and images help physicians to detect diseases due to cells normal growth. Mammography is an effective imaging modality for early breast cancer abnormalities detection. Computer aided diagnosis helps the radiologists to detect abnormalities earlier than traditional procedures. In this paper, an automated mammogram classification method is presented. Symlet, singular value decomposition and weighted histograms are used for feature extraction in mammograms. The extracted features are classified using naïve bayes, random forest and neural network algorithms.

Бесплатно

Contact distribution function based clustering technique with self-organizing maps

Contact distribution function based clustering technique with self-organizing maps

G. Chamundeswari, G. P. S. Varma, Ch. Satyanarayana

Статья научная

Currently clustering techniques play a vital role in object recognition process. The clustering techniques are found to be efficient with neural networks. So, the present paper proposed a novel method for clustering the input objects with Self-Organizing Map (SOM). The proposed method considers the input object as a random closed set. The random set can be efficiently described with various features viz., volume fractions, co-variance and contact distributions etc. In the proposed method, the input object is described efficiently with spherical contact distribution. The proposed method is experimented with the leaf data set with 795 images. The performance of the proposed method is evaluated with various topologies of SOM and is measured with four measures viz., FNR, FPR, TPR and TNR. The results indicate the efficiency of the proposed method.

Бесплатно

Content based image retrieval using multi motif co-occurrence matrix

Content based image retrieval using multi motif co-occurrence matrix

A.Obulesu, V. Vijay Kumar, L. Sumalatha

Статья научная

In this paper, two extended versions of motif co-occurrence matrices (MCM) are derived and concatenated for efficient content-based image retrieval (CBIR). This paper divides the image into 2 x 2 grids. Each 2 x 2 grid is replaced with two different Peano scan motif (PSM) indexes, one is initiated from top left most pixel and the other is initiated from bottom right most pixel. This transforms the entire image into two different images and co-occurrence matrices are derived on these two transformed images: the first one is named as “motif co-occurrence matrix initiated from top left most pixel (MCMTL)” and second one is named as “motif co-occurrence matrix initiated from bottom right most pixel (MCMBR)”. The proposed method concatenates the feature vectors of MCMTL and MCMBR and derives multi motif co-occurrence matrix (MMCM) features. This paper carried out investigation on image databases i.e. Corel-1k, Corel-10k, MIT-VisTex, Brodtaz, and CMU-PIE and the results are compared with other well-known CBIR methods. The results indicate the efficacy of the proposed MMCM than the other methods and especially on MCM [19] method.

Бесплатно

Content-based Search for Image Retrieval

Content-based Search for Image Retrieval

Mohamed M. Fouad

Статья научная

In this paper, a content-based image retrieval approach is presented for effective searching. The proposed approach uses two or more types of query for accessing images, textual annotation associated with images and visual appearance, such as colour, texture and positional features of objects in sample images. One can first place a keyword-based query, and then the desired images are retrieved by visual content-based query. The proposed retrieval approach shows clear improvements over competing approaches in terms of retrieval accuracy and visual inspection using Corel gallery and WWW images.

Бесплатно

Contour Based Retrieval for Plant Species

Contour Based Retrieval for Plant Species

Komal Asrani, Renu Jain

Статья научная

Recognizing a plant in any huge vegetation is a tedious work for us. We recognize a plant on the basis of its size, leaves, flowers, fruits, etc. Leaf is a part of the plant which can be found on plants almost in all seasons and most of the time we have to recognize plants on the basis of its leaf. But when dealing with leaf of plant, it is important to consider the finer details of the contour representing the shape of the leaf. We are trying to build a system which has a database of leaves of different plants and given a leaf, we find out the plant to which it may belong. In this paper, we present the results of tangential angle approach used for retrieval. A database of around one thousand leaves of different plants has been created. Each leaf image is preprocessed to extract its boundary. Then tangential angle approach is applied which captures the angular details of the boundary of shape. We have done the testing for around 1000 leaves and on the basis of that recall, precision and error rate have been calculated to measure the effectiveness of the proposed method.

Бесплатно

Contrast Enhancement of Images through Skewness and Mode Based Bi-Histogram Equalization

Contrast Enhancement of Images through Skewness and Mode Based Bi-Histogram Equalization

Kuldip Acharya, Dibyendu Ghoshal

Статья научная

In this paper, skewness and mode-based histogram equalization algorithm have been proposed for contrast enhancement of digital images. The present method gives a novel idea for histogram clipping and histogram bifurcation. The prior is done with the skewness value and the latter is done with help of mode values of the intensity level random data set. The pixel intensity levels are random and thus a stochastic approach has been used and found to yield improved figure of merits. The image histogram has been clipped with the help of a pre-assigned threshold value computed from skewness value to restrict the rate of over enhancement. The clipped histogram is subdivided into two parts, using the histogram subdivision limit which is calculated on the basis of the mode value of the image. Histogram of individual sub-image is equalized independently and then integrated to form the final enhanced image. The simulation results have shown that the proposed skewness and mode based bi-histogram equalization algorithm enhances the contrast of the image in a better manner compared with the other histogram equalization methods in terms of FSIM, PSIM, SFF, VSI, HaarPSI, and GMSD.

Бесплатно

Contribution to the Fusion of Biometric Modalities by the Choquet Integral

Contribution to the Fusion of Biometric Modalities by the Choquet Integral

Anouar Ben Khalifa, Najoua Essoukri BenAmara

Статья научная

In multimodal biometrics, modalities can be robust against the authentication of certain people and weak for others. The conventional fusion techniques such as the Product, Mean, AND, OR and the Majority Voting do not take into account this kind of behaviour. In this paper, we propose a new approach to fusion procedures in the context of biometric authentication. The proposed method is based on the exploration of the Choquet integral that takes into account the interactions between the terms and people through fuzzy measures. The fuzzy measures, the ones we have proposed, are based on the number of confusion, the entropy and the uncertainty function. The results have been validated in two databases: the first one is virtual, which is based on synthetic scores and the second one on the biometric modalities which are: face, off-line handwriting and off-line signature. The achieved results demonstrate the robustness of our approaches and their adaptability.

Бесплатно

Convolution Based Technique for Indic Script Identification from Handwritten Document Images

Convolution Based Technique for Indic Script Identification from Handwritten Document Images

Sk Md Obaidullah, Nibaran Das, Kaushik Roy

Статья научная

Determination of script type of document image is a complex real life problem for a multi-script country like India, where 23 official languages (including English) are present and 13 different scripts are used to write them. Including English and Roman those count become 23 and 13 respectively. The problem becomes more challenging when handwritten documents are considered. In this paper an approach for identifying the script type of handwritten document images written by any one of the Bangla, Devnagari, Roman and Urdu script is proposed. Two convolution based techniques, namely Gabor filter and Morphological reconstruction are combined and a feature vector of 20 dimensions is constructed. Due to unavailability of a standard data set, a corpus of 157 document images with an almost equal ratio of four types of script is prepared. During classification the dataset is divided into 2:1 ratio. An average identification accuracy rate of 94.4% is obtained on the test set. The average Bi-script and Tri-script identification accuracy rate was found to be 98.2% and 97.5% respectively. Statistical performance analysis is done using different well known classifiers.

Бесплатно

Convolutional Neural Network (CNN-SA) based Selective Amplification Model to Enhance Image Quality for Efficient Fire Detection

Convolutional Neural Network (CNN-SA) based Selective Amplification Model to Enhance Image Quality for Efficient Fire Detection

Sagnik Sarkar, Aditya Sunil Menon, Gopalakrishnan T, Anil Kumar Kakelli

Статья научная

Fires spread quickly and are extremely difficult to contain, and cause a great deal of damage to people and property. Current domestic systems for detecting outbreaks of fire, such as smoke detectors, are prone to reliability issues and will benefit greatly from having a secondary system in place to confirm the presence of a fire in the premises. In this paper, we have proposed a novel image pre-processing algorithm known as the Selective Amplification. This technique enhances images that are to be used in Convolutional Neural Networks, which are then trained on pre-processed images to detect fires with high accuracy. The efficacy of the proposed technique is verified by training two identical Convolutional Neural Network models on the same dataset of images. We train the proposed model on a version of the dataset that uses Selective Amplification for data pre-processing. The proposed model then demonstrates an improvement in the accuracy of the detection of fire in real-time over by 12.85%, compared to an identical model trained on the dataset without any pre-processing performed beforehand.

Бесплатно

Convolutional Neural Network based Handwritten Bengali and Bengali-English Mixed Numeral Recognition

Convolutional Neural Network based Handwritten Bengali and Bengali-English Mixed Numeral Recognition

M. A. H. Akhand, Mahtab Ahmed, M. M. Hafizur Rahman

Статья научная

Recognition of handwritten numerals has gained much interest in recent years due to its various potential applications. Bengali is the fifth ranked among the spoken languages of the world. However, due to inherent difficulties of Bengali numeral recognition, a very few study on handwritten Bengali numeral recognition is found with respect to other major languages. The existing Bengali numeral recognition methods used distinct feature extraction techniques and various classification tools. Recently, convolutional neural network (CNN) is found efficient for image classification with its distinct features. In this paper, we have investigated a CNN based Bengali handwritten numeral recognition scheme. Since English numerals are frequently used with Bengali numerals, handwritten Bengali-English mixed numerals are also investigated in this study. The proposed scheme uses moderate pre-processing technique to generate patterns from images of handwritten numerals and then employs CNN to classify individual numerals. It does not employ any feature extraction method like other related works. The proposed method showed satisfactory recognition accuracy on the benchmark data set and outperformed other prominent existing methods for both Bengali and Bengali-English mixed cases.

Бесплатно

Copy Move Forgery Detection in Contrast Variant Environment using Binary DCT Vectors

Copy Move Forgery Detection in Contrast Variant Environment using Binary DCT Vectors

Sunil Kumar, J. V. Desai, Shaktidev Mukherjee

Статья научная

Copy move forgery detection is a very popular research area and a lot of methods have been suggested by researchers. However, every method has its own merits and weaknesses and hence, new techniques are being continuously devised and analyzed. There are many post processing operations used by the manipulators to obstruct the forgery detection techniques. One such operation is changing the contrast of the whole image or copy moved regions, which many existing methods fail to address. A novel method using binary discrete cosine transform vectors is proposed to detect copy move forgery in the presence of contrast changes. The image is divided into overlapping blocks and DCT coefficients are calculated for these blocks. Feature vectors are created from these blocks using signs of the DCT coefficients. Coefficient of correlation is used to match resulting binary vectors. The experiments show that the proposed method is able to detect copy move forgery in presence of contrast changes. The proposed method is also invariant to other post processing operations like Gaussian noise, JPEG compression and little rotation and scaling.

Бесплатно

Copy-Move Forgery Detection and Localization Framework for Images Using Stationary Wavelet Transform and Hybrid Dilated Adaptive VGG16 with Optimization Strategy

Copy-Move Forgery Detection and Localization Framework for Images Using Stationary Wavelet Transform and Hybrid Dilated Adaptive VGG16 with Optimization Strategy

Prabhu Bevinamarad, Prakash Unki, Padmaraj Nidagundi

Статья научная

Due to the availability of low-cost electronic devices and advanced image editing tools, changing the semantic meaning of a particular image has become straightforward by employing various image manipulation techniques like image copy-move, image splicing and removal operations. The tampered images with this sophisticated software are rich in visualization, making the modifications invisible to the naked eye. Detecting these image alterations is laborious, time-consuming, and often yields inappropriate results. The current techniques use conventional square, slide regular, and artifacts procedures to identify image deviations to combat image forgery practices. Still, these techniques exhibit problems related to generalization, training and testing, and model complexity. So, in this paper, a novel image forgery detection and localization framework is implemented using stationary wavelet transform (SWT), and a Hybrid Dilated Adaptive VGG16 model with optimization is introduced to classify forgery images and localize the forgery regions present in an image. Initially, the proposed framework processes the input image with SWT to decompose an image into different subband and further divide it into patches. After that, the hybrid dilated adaptive VGG16 Network (HDA-VGG16Net) is built to extract the deep image features from the patches. Later, the Hybridized Tuna Swarm with Bald Eagle Search Optimization (HTS-BESO) technique is applied to optimize the VGG16 parameters. Finally, feature matching is formed using multi-similarity searching to recognize whether the input image is forged or original by locating forgery regions. The evaluation results are compared with existing forgery detection approaches to ensure the efficiency of the developed model by considering multiple performance measures.

Бесплатно

Журнал