ICTACT Journal on Image and Video Processing最新文献

筛选
英文 中文
DIMENSIONALITY REDUCTION BASED CLASSIFICATION USING GENERATIVE ADVERSARIAL NETWORKS DATASET GENERATION 基于降维的生成对抗性网络分类数据集生成
ICTACT Journal on Image and Video Processing Pub Date : 2022-08-01 DOI: 10.21917/ijivp.2022.0396
Narendra Gopal, Sivakumar D
{"title":"DIMENSIONALITY REDUCTION BASED CLASSIFICATION USING GENERATIVE ADVERSARIAL NETWORKS DATASET GENERATION","authors":"Narendra Gopal, Sivakumar D","doi":"10.21917/ijivp.2022.0396","DOIUrl":"https://doi.org/10.21917/ijivp.2022.0396","url":null,"abstract":"The term data augmentation refers to an approach that can be used to prevent overfitting in the training dataset, which is where the issue first manifests itself. This is based on the assumption that extra datasets can be improved by include new information that is of use. It is feasible to create an artificially larger training dataset by utilizing methods such as data warping and oversampling. This will allow for the creation of more accurate models. This idea is demonstrated through the application of a variety of different methods, some of which include neural style transfer, adversarial training, and erasure by random erasure, amongst others. By utilizing oversampling augmentations, it is feasible to create synthetic instances that can be incorporated into the training data. This is made possible by the generation of synthetic instances. There are numerous illustrations of this, including image merging, feature space enhancements, and generative adversarial networks, to name a few (GANs). In this paper, we aim to provide evidence that a Generative Adversarial Network can be used to convert regular images into Hyper Spectral Images (HSI). The purpose of the model is to generate data by including a certain amount of unpredictable noise.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49020193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLASSIFICATION OF BRAIN TUMOR USING BEES SWARM OPTIMISATION 基于蜂群优化的脑肿瘤分类
ICTACT Journal on Image and Video Processing Pub Date : 2019-08-01 DOI: 10.21917/ijivp.2019.0287
M. Ramkumar, M. Babu, R. Lakshminarayanan
{"title":"CLASSIFICATION OF BRAIN TUMOR USING BEES SWARM OPTIMISATION","authors":"M. Ramkumar, M. Babu, R. Lakshminarayanan","doi":"10.21917/ijivp.2019.0287","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0287","url":null,"abstract":"Nowadays, processing the medical image is a most significant diagnostic process. Usually RMI is used to detect the presence of and type of tumor. The following process is very complicated in the brain tumor classification. The treatment of medical images, such as image segmentation, image extraction, and image classification, takes various steps. Various types of properties such as intensity, forms and texture-based features are extracted from a segmented MRI image. The feature selection approach is employed to select a small subset of MRI image features that minimize redundancy and maximize target-related pertinence. This article uses the Bees Swarm Optimization (BSO) for the selection and the Neural Network Classifier to classify the type of tumor in present brain MRI images, and then takes online MRI images which contain brain tumor, then a machine-learning model.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45465888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ADVANCED COLOR COVERT IMAGE SHARING USING ARNOLD CAT MAP AND VISUAL CRYPTOGRAPHY 先进的彩色隐蔽图像共享使用阿诺德猫地图和视觉密码学
ICTACT Journal on Image and Video Processing Pub Date : 2019-08-01 DOI: 10.21917/ijivp.2019.0288
B. Sapna, K. Sudha
{"title":"ADVANCED COLOR COVERT IMAGE SHARING USING ARNOLD CAT MAP AND VISUAL CRYPTOGRAPHY","authors":"B. Sapna, K. Sudha","doi":"10.21917/ijivp.2019.0288","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0288","url":null,"abstract":"The demand for effective information security schemes is increasing day by day with the continual growth of the internet. Visual cryptography (VC) is a very important secret sharing scheme. The essential step behind this secret sharing scheme is to convert the color covert image into multiple indecipherable image shares so it cannot reveal the data within the color covert image unless combined along by some mathematical calculation. This paper proposes an advanced color covert image-sharing scheme using Arnold cat map (ACM) and VC. The random matrix-encoding scheme encodes the color covert image into an image matrix. ACM algorithm disrupts the high correlation among the pixels of the image matrix to generate an encrypted image. The generation of shares from this encrypted image is by VC that uses pixel reversal and random matrix generator. The shares one by one does not provide any information concerning the color covert image however put together they offer back the encrypted image. The projected paradigm offers 3 levels of security and through decipherment gives back the covert image without loss of information. Related examples and experimental results reveal the effectiveness of this scheme.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42023624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A SPATIAL DOMAIN BASED SECURE AND ROBUST VIDEO WATERMARKING TECHNIQUE USING MODIFIED LSB AND SECRET IMAGE SHARING 基于改进LSB和秘密图像共享的空间域安全鲁棒视频水印技术
ICTACT Journal on Image and Video Processing Pub Date : 2019-08-01 DOI: 10.21917/ijivp.2019.0293
V. Sharma, M. Gangarde, Shruti Oza
{"title":"A SPATIAL DOMAIN BASED SECURE AND ROBUST VIDEO WATERMARKING TECHNIQUE USING MODIFIED LSB AND SECRET IMAGE SHARING","authors":"V. Sharma, M. Gangarde, Shruti Oza","doi":"10.21917/ijivp.2019.0293","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0293","url":null,"abstract":"This paper proposes a spatial domain based video watermarking scheme to improve security of the video data using a combination of modified LSB watermarking technique of spatial domain and a (n, n) secret image sharing scheme. In this scheme the secret image sharing scheme is applied during transmission right after the embedding of the watermark in the video frame to overcome the drawback of the single LSB technique. This combination ensures high security and robustness as the watermarked image is being distributed into 3 meaningless shares during transmission thus making it imperceptible to the attacker. This dual scheme improves the extraction capability of the secret message and enhances the information embedding capacity. The average PSNR obtained was 55dB which proves that the quality of reconstruction is high and higher than most of the existing watermarking techniques in similar domain.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45566262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SMART GESTURE USING REAL TIME OBJECT TRACKING 使用实时对象跟踪的智能手势
ICTACT Journal on Image and Video Processing Pub Date : 2019-08-01 DOI: 10.21917/ijivp.2019.0290
S. Bhat, N. Lavanya, M. Anusuya
{"title":"SMART GESTURE USING REAL TIME OBJECT TRACKING","authors":"S. Bhat, N. Lavanya, M. Anusuya","doi":"10.21917/ijivp.2019.0290","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0290","url":null,"abstract":"Gesture can be used to interact with the computer without any physical contact. The use of keyboard and mouse can be minimized. Gesture can be of various types. One such type is movement of hand in a particular posture. To detect these type of gestures first it must be verified that the hand is present in frame and is present in the required posture. The first one is achieved by creating a mask of the frame considering the skin color range in the HSV color space. The later part involves shape matching with some template shape. The shape matching involves computing of central moments between the mask and the template shape. The hand posture defines the start and end of gesture. All the movement of hand between start and end of gesture is tracked and gesture is recognized from the tracked data. For the purpose of recognition, Convolution Neural Network is used. An application is built on recognition. Once a gesture is recognized an event will be triggered.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43484965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURE TRANSMISSION OF DATA USING IMAGE STEGANOGRAPHY 使用图像隐写术安全传输数据
ICTACT Journal on Image and Video Processing Pub Date : 2019-08-01 DOI: 10.21917/ijivp.2019.0291
Sourabh Chandra, Smita Paira
{"title":"SECURE TRANSMISSION OF DATA USING IMAGE STEGANOGRAPHY","authors":"Sourabh Chandra, Smita Paira","doi":"10.21917/ijivp.2019.0291","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0291","url":null,"abstract":"Data is one of the most relevant and important term from the ancient Greek age to modern science and business. The amount of data and use of data transformation for organizational work is increasing. So, for the sake of security and to avoid data loss and unauthorized access of data we have designed an image Steganographic algorithm implementing both Cryptography and Steganography. This algorithm imposed a cipher text within a cover image to conceal the existence of the cipher text and the stego-image is transferred from sender to intended receiver by invoking a distributed connection among them to achieve the data authenticity.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47197528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A NOVEL SEGMENTATION AND CLASSIFICATION TECHNIQUES FOR MRI BRAIN TUMOR IMAGES 一种新的mri脑肿瘤图像分割与分类技术
ICTACT Journal on Image and Video Processing Pub Date : 2019-08-01 DOI: 10.21917/ijivp.2019.0289
M. Abinaya, S. Padma
{"title":"A NOVEL SEGMENTATION AND CLASSIFICATION TECHNIQUES FOR MRI BRAIN TUMOR IMAGES","authors":"M. Abinaya, S. Padma","doi":"10.21917/ijivp.2019.0289","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0289","url":null,"abstract":"Medical image process is that the most difficult and rising field these days. To solve various problems in medical imaging such as medical image segmentation, object extraction and image classification etc. This work presents a performance of the rough set based approaches. The detection and identification of brain tumour from MRI is crucial to decrease the speed of casualties. Brain tumor is tough to cure, as a result of the brain feature terribly complicated structure and also the tissues are interconnected with one another during a sophisticated manner. The proposed method uses a novel discriminative framework for multilabel automated brain tumor segmentation. The method selects the most relevant features and segments edema and tumor using a classification algorithm based on Multiple Kernel Learning (MKL). Feature selection and dictionary learning in image segmentation are usually combined with RUSBOOST classifier for identifying the tumor. The RF classifier has increased the classification accuracy as evident by quantitative results of our proposed method which are comparable or higher than the state of the art.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47599284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
STREETLIGHT OBJECTS RECOGNITION BY REGION AND HISTOGRAM FEATURES IN AN AUTONOMOUS VEHICLE SYSTEM 自动驾驶汽车系统中基于区域和直方图特征的路灯目标识别
ICTACT Journal on Image and Video Processing Pub Date : 2019-08-01 DOI: 10.21917/ijivp.2019.0292
Martins E. Irhebhude, M. Shabi, A. Kolawole
{"title":"STREETLIGHT OBJECTS RECOGNITION BY REGION AND HISTOGRAM FEATURES IN AN AUTONOMOUS VEHICLE SYSTEM","authors":"Martins E. Irhebhude, M. Shabi, A. Kolawole","doi":"10.21917/ijivp.2019.0292","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0292","url":null,"abstract":"In this paper Streetlight object identification is addressed using the notion of image processing. An approach based on Image Processing Techniques is proposed for selection and processing of features from the images. Histogram and Region was applied on the extracted images. Histogram and Region features were then extracted and employed to train the Support Vector Machine (SVM) classifier for streetlight recognition. Experimental results shows 99.1%, 84% and 100% for histogram, region features and combination of both respectively. Experimental results have proved that the proposed method is robust, accurate, and powerful in object recognition.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42301962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DETECTION OF SEPTORIA SPOT ON BLUEBERRY LEAF IMAGES USING SVM CLASSIFIER 用SVM分类器检测蓝莓叶片图像中的红斑
ICTACT Journal on Image and Video Processing Pub Date : 2019-05-01 DOI: 10.21917/ijivp.2019.0286
M. Latha, S. Jaya
{"title":"DETECTION OF SEPTORIA SPOT ON BLUEBERRY LEAF IMAGES USING SVM CLASSIFIER","authors":"M. Latha, S. Jaya","doi":"10.21917/ijivp.2019.0286","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0286","url":null,"abstract":"Identification and classification of the plant leaf is efficient way to preventing loss occurred in agricultural field. The Septoria leaf spot is mainly affect the leaves which caused by a fungus, flu, bacteria. The Production of blueberry fruit is decreasing due to the disease affected on its stem and leaf. Small brown spots are frequently visible on blueberry leaves at specific period in the year. The spots, generally surrounded by bright yellow halos, start on the lower leaves and slowly appear on upper leaves over time. Image processing technology has been proved to be an efficient analysis to identify and detect the disease on a leaf. This proposed paper intends to focus to detect and classify a Septoria leaf spot on blueberry using Image Processing techniques such as, k-means clustering (k-nearest neighbor) for Segmentation, Gray-Level Co-occurrence Matrix for feature extraction and Support Vector Machine classifier to detect the leaf stage whether it is affected by Septoria spot or not. Totally 13 features have been extracted from each Blueberry leaf images where dataset of 40 images were taken for training and testing process partially and obtained the accuracy level was 96.77% using F-measure.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49076665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QUALITATIVE ANALYSIS OF VARIOUS EDGE DETECTION TECHNIQUES APPLIED ON CERVICAL HERNIATED SPINE IMAGES 各种边缘检测技术应用于颈椎突出症图像的定性分析
ICTACT Journal on Image and Video Processing Pub Date : 2019-05-01 DOI: 10.21917/ijivp.2019.0282
C. Malarvizhi, P. Balamurugan
{"title":"QUALITATIVE ANALYSIS OF VARIOUS EDGE DETECTION TECHNIQUES APPLIED ON CERVICAL HERNIATED SPINE IMAGES","authors":"C. Malarvizhi, P. Balamurugan","doi":"10.21917/ijivp.2019.0282","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0282","url":null,"abstract":"","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42621674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信