{"title":"A Novel Bilingual OCR for Printed Malayalam-English Text Based on Gabor Features and Dominant Singular Values","authors":"B. Philip, Sudhaker Samuel","doi":"10.1109/ICDIP.2009.50","DOIUrl":"https://doi.org/10.1109/ICDIP.2009.50","url":null,"abstract":"In this paper a Bilingual Character Recognition System is proposed for the characterization and classification of printed Malayalam-English characters. Indian scripts in general are rich in patterns and variations. Gabor features are extracted after the word level segmentation to identify the script and recognition is based on characterization using Dominant singular values. A recognition rate of 96.5% was achieved for the two–stage classification approach.","PeriodicalId":206267,"journal":{"name":"2009 International Conference on Digital Image Processing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123657757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medical Image Segmentation by Using Reinforcement Learning Agent","authors":"M. Chitsaz, Woo Chaw Seng","doi":"10.1109/ICDIP.2009.14","DOIUrl":"https://doi.org/10.1109/ICDIP.2009.14","url":null,"abstract":"Image segmentation still requires improvements although there have been research work since the last few decades. This is due to some factors. Firstly, most image segmentation solution is problem-based. Secondly, medical image segmentation methods generally have restrictions because medical images have very similar gray level and texture among the interested objects. The goal of this work is to design a framework to extract simultaneously several objects of interest from Computed Tomography (CT) images. Our method does not need a large training set or priori knowledge. The learning phase is based on reinforcement learning (RL). The input image is divided into several sub-images, and each RL agent works on it to find the suitable value for each object in the image. Each state in the environment has associated defined actions, and a reward function computes reward for each action of the RL agent. Finally the valuable information is stored in a Q-Matrix, and the final result can be applied in segmentation of new similar images. The experimental results for cranial CT images demonstrated segmentation accuracy above 93%.","PeriodicalId":206267,"journal":{"name":"2009 International Conference on Digital Image Processing","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124459623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature-Based Steganalysis for JPEG Images","authors":"Zhuo Li, Kuijun Lu, Xian-Ting Zeng, Xuezeng Pan","doi":"10.1109/ICDIP.2009.17","DOIUrl":"https://doi.org/10.1109/ICDIP.2009.17","url":null,"abstract":"The goal of blind steganalysis is to detect the presence of hidden data and to eventually extract them from the stego images generated by various data hiding schemes. In this paper, we construct a new blind classifier capable of detecting several steganographies for JPEG images. Thirteen statistics are collected in the DCT domain and spatial domain. By using the characteristic function and the center of mass (COM) for each statistic, we calculate an 82-dimensional feature vector for each image. Support Vector Function (SVM) is utilized to construct the blind classifier. Experimental results show that the proposed steganalytic method provides significant performance on various types of steganographies, such as Model-based steganography MB1[17]&MB2[18], non-blind spread spectrum data hiding method Cox[16], and five popular data hiding schemes—F5[11], JSteg[12], Jphide&Seek[13], Outguess[14] and Steghide[15].","PeriodicalId":206267,"journal":{"name":"2009 International Conference on Digital Image Processing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117121991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The New Method for Better Processing of Comet's Tail's Image","authors":"Ali Pedram, Amir Reza Pedram","doi":"10.1109/ICDIP.2009.72","DOIUrl":"https://doi.org/10.1109/ICDIP.2009.72","url":null,"abstract":"Taking picture of comet’s tail is one of the major problems in the science of astronomy, such a problem is mainly caused by the relativity of the comet’s tail lighting to its core. This cases resembles the artificial eclipse of the sun in astronomy, we can enhance the tail lighting about 26% by using. In this article we study on this phenomenon and show new methods for better photographing comet’s tail.","PeriodicalId":206267,"journal":{"name":"2009 International Conference on Digital Image Processing","volume":"390 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126742427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D Scene Reconstruction Based on Uncalibrated Image Sequences","authors":"Y. Wan, Z. Miao","doi":"10.1109/ICDIP.2009.60","DOIUrl":"https://doi.org/10.1109/ICDIP.2009.60","url":null,"abstract":"3D scene reconstruction is an important technique in the computer vision field. Our system can give the user a platform to reconstruct a 3D model of scene from a set of uncalibrated images which are gained by a commonly used camera. There are many key techniques in 3D reconstruction from uncalibrated image sequences, including feature matching, fundamental matrix estimation, projective reconstruction, camera self-calibration, dense stereo matching and Euclidean reconstruction. The paper is focused on above associated issues and improved some key algorithms. The effectiveness of our algorithms is evaluated in the experiments with many real image sequences.","PeriodicalId":206267,"journal":{"name":"2009 International Conference on Digital Image Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127471853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Image Watermarking Algorithm Resistant to Copy Attack","authors":"Kuang Hang","doi":"10.1109/ICDIP.2009.93","DOIUrl":"https://doi.org/10.1109/ICDIP.2009.93","url":null,"abstract":"Combined with one-way Hash function, the parity of block DCT coefficients and JPEG quantization technology, etc, this paper proposes a new algorithm: image watermarking algorithm resistant to copy attack. This algorithm uses PN sequence encryption to ensure the security of watermark and blind extraction when recovering watermark, some common attack experiments of image processing verify the performance of watermark generated through this algorithm. Compared with those algorithms which need to use original images to recover data, this algorithm is more practical and it has very good robustness and transparency.","PeriodicalId":206267,"journal":{"name":"2009 International Conference on Digital Image Processing","volume":"436 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133500257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Iris-Based Personal Identification Using Maximum Rectangular Region Detection","authors":"Serestina Viriri, J. Tapamo","doi":"10.1109/ICDIP.2009.88","DOIUrl":"https://doi.org/10.1109/ICDIP.2009.88","url":null,"abstract":"Iris recognition is proving to be one of the most reliable biometric traits for personal identification. In fact, iris patterns have stable, invariant and distinctive features for personal identification. In this paper, we propose a new algorithm that detects the largest non-occluded rectangular part of the iris as region of interest (ROI). Thereafter, a cumulative-sum-based grey change analysis algorithm is applied to the ROI to extract features for recognition. This method could possibly be utilized for partial iris recognition since it relaxes the requirement of using the whole part of the iris to produce an iris template. Preliminary experimental results carried on a CASIA iris database, show that the approach is promisingly effective and efficient.","PeriodicalId":206267,"journal":{"name":"2009 International Conference on Digital Image Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blind Image Adaptive Watermarking Scheme for Audio Using Wavelet Transform","authors":"R. Khan, A. Ghafoor, N. I. Rao","doi":"10.1109/ICDIP.2009.47","DOIUrl":"https://doi.org/10.1109/ICDIP.2009.47","url":null,"abstract":"In this paper, we present a novel algorithm for robust audio watermarking in image using wavelet transform based on an image texture. The algorithm is based on decomposition of images using Daubechies wavelet basis. The technique proposed in this paper resolves the problem of severe distortion caused by watermarking audio in an image by developing a scaling function that achieves maximum robustness and transparency prior to its embedding. The property of texture is used as a criterion to identify the target area for embedding the watermark. The security of the algorithm is enhanced by performing a random permutation of the watermark. The random arrangement of the indices serves as a secret key. This technique is a blind watermarking scheme and the extraction procedure can be performed without the original host image.The experimental results demonstrate that watermark is imperceptible and prevents audio file from audible distortion.","PeriodicalId":206267,"journal":{"name":"2009 International Conference on Digital Image Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123473590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study of Discrete Cosine Transformation, Haar Transformation, Simultaneous Encryption and Compression Techniques","authors":"J. Bhattacharjee","doi":"10.1109/ICDIP.2009.29","DOIUrl":"https://doi.org/10.1109/ICDIP.2009.29","url":null,"abstract":"This paper addresses the area of data compression, as it is applicable to image processing. An analysis of Discrete Cosine Transformation, Wavelet Transformation (Haar Transformation) and Simultaneous Encryption and Compression are made. These three image compression strategies are examined for their relative effectiveness. Finally a performance comparison is made between these techniques (on variety of Standard Test Images considering parameters such as data reduction ratios).","PeriodicalId":206267,"journal":{"name":"2009 International Conference on Digital Image Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122365251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Image Fusion Method Using Curvelet Transform Based on Linear Dependency Test","authors":"A. Mahyari, M. Yazdi","doi":"10.1109/ICDIP.2009.67","DOIUrl":"https://doi.org/10.1109/ICDIP.2009.67","url":null,"abstract":"Because of the benefits of image fusion, although higher resolution remote sensing data are available now, image fusion is still a popular method for better interpreting image data. This paper focuses on a novel region-based image fusion method which facilitates increased flexibility with the definition of a variety of fusion rules. To do that, we use the curvelet transform to merge the details of images. Also, we introduce a fusion rule decision based on the linear algebra that helps to do a better fusion of detail coefficients of the curvelet transform. The experimental results show improvement of the proposed method compared with the well-known methods.","PeriodicalId":206267,"journal":{"name":"2009 International Conference on Digital Image Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121250088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}