ICTACT Journal on Image and Video Processing最新文献

筛选
英文 中文
PLANT RECOGNITION SYSTEM USING LEAF SHAPE FEATURES AND MINIMUM EUCLIDEAN DISTANCE 基于叶型特征和最小欧氏距离的植物识别系统
ICTACT Journal on Image and Video Processing Pub Date : 2018-11-01 DOI: 10.21917/ijivp.2018.0272
Farhana Haque, Safwana Haque
{"title":"PLANT RECOGNITION SYSTEM USING LEAF SHAPE FEATURES AND MINIMUM EUCLIDEAN DISTANCE","authors":"Farhana Haque, Safwana Haque","doi":"10.21917/ijivp.2018.0272","DOIUrl":"https://doi.org/10.21917/ijivp.2018.0272","url":null,"abstract":"The study presents a plant recognition system that uses image and data processing techniques for recognition. A lot of research has been going on to identify plants by their leaves and one of the features that is used is the shape of the leaf but the accuracy is not high and therefore other features should also be considered to increase the accuracy. This system designed has three main steps which are image pre-processing, feature extraction and matching. Image pre-processing performs basic operations on the leaf image for segmentation which helps in making feature extraction easy. Seven (7) leaf features derived from geometric parameters of leaf shape were extracted from the pre-processed image and the simple principle of minimum Euclidean distance was used for finding the closest match to the input leaf image. The system used 10 species of leaves with a total of 50 leaf images from the flavia dataset for testing and obtained an accuracy above 90%. The algorithm is accurate and is easy to implement. However, it is slow and not tested on a large dataset. It is hoped that this proposed system will be exploited further and the speed will be improved and will also be able to give more information on the plant.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47042651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
BREAST CANCER GRADING OF H&E STAINED HISTOPATHOLOGY IMAGES h&e染色组织病理学图像的乳腺癌分级
ICTACT Journal on Image and Video Processing Pub Date : 2018-08-01 DOI: 10.21917/ijivp.2018.0257
V. Mane, Nikhil Tagalpallewar
{"title":"BREAST CANCER GRADING OF H&E STAINED HISTOPATHOLOGY IMAGES","authors":"V. Mane, Nikhil Tagalpallewar","doi":"10.21917/ijivp.2018.0257","DOIUrl":"https://doi.org/10.21917/ijivp.2018.0257","url":null,"abstract":"Breast cancer is the common existing form of cancers amongst women. The automatic image analysis methods have an enormous potential to decrease the workload in a pathology laboratory. The grading of breast cancer histopathology images is used to find the level of breast cancer. The automatic grading of breast cancer histopathology images is a challenging task. In this paper a system for automatic detection of breast cancer grading of H&E stained histopathological images is presented. An image processing techniques such as preprocessing, segmentation, feature extraction and classification are used in this system. The segmentation of nuclei in H&E stained image is performed using color thresholding and maximum entropy thresholding. The features are computed according to Bloom Richardson grading criteria. The decision tree classifier is used to classify input image into three group i.e., low grade, intermediate grade and high grade.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48491555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPROVED FINGERPRINT COMPRESSION TECHNIQUE WITH DECIMATED MULTI-WAVELET COEFFICIENTS FOR LOW BIT RATES 改进的指纹压缩技术与抽取多小波系数为低比特率
ICTACT Journal on Image and Video Processing Pub Date : 2018-08-01 DOI: 10.21917/IJIVP.2018.0253
N. R. Rema, P. Mythili
{"title":"IMPROVED FINGERPRINT COMPRESSION TECHNIQUE WITH DECIMATED MULTI-WAVELET COEFFICIENTS FOR LOW BIT RATES","authors":"N. R. Rema, P. Mythili","doi":"10.21917/IJIVP.2018.0253","DOIUrl":"https://doi.org/10.21917/IJIVP.2018.0253","url":null,"abstract":"In this paper, a multi-wavelet transform with decimated frequency bands is proposed to be used in the Set Partitioning in Hierarchical Trees (SPIHT) algorithm to improve fingerprint image compression. Either shuffled or unshuffled multi-wavelets can be used for SPIHT algorithm. In both the cases, the quality of the compressed images at lower bit rates either remained the same or slightly improved compared to wavelets. To improve the performance at lower bit rates, a method which utilizes the decimated version of multi-wavelet for the initialization of lists in SPIHT algorithm is used. The multi-wavelet used for the proposed work is SA4 (Symmetric-Antisymmetric). The algorithm was tested and verified using NIST, Shivang Patel, NITGEN and other databases. An overall improvement in performance particularly at lower bit rates (0.01 to 0.09) compared to a multi-wavelet without decimation was obtained using this method. The improvement was 0.798dB, 0.857dB and 0.859dB for the images in NITGEN database for a multi-wavelet decimated by 2, 4 and 8 respectively. Similar performances were observed for other databases. It was further observed that the PSNR was highest when the multi-wavelet was decimated by a factor of 4.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45640862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AUTOMATED BRAIN TUMOR SEGMENTATION IN MR IMAGES USING A HIDDEN MARKOV CLASSIFIER FRAMEWORK TRAINED BY SVD-DERIVED FEATURES 使用由奇异值衍生特征训练的隐马尔可夫分类器框架在Mr图像中自动分割脑肿瘤
ICTACT Journal on Image and Video Processing Pub Date : 2018-08-01 DOI: 10.21917/IJIVP.2018.0260
Fazel Mirzaei, Mohammad Reza Parishan, Mohammadjavad Faridafshin, R. Faghihi, S. Sina
{"title":"AUTOMATED BRAIN TUMOR SEGMENTATION IN MR IMAGES USING A HIDDEN MARKOV CLASSIFIER FRAMEWORK TRAINED BY SVD-DERIVED FEATURES","authors":"Fazel Mirzaei, Mohammad Reza Parishan, Mohammadjavad Faridafshin, R. Faghihi, S. Sina","doi":"10.21917/IJIVP.2018.0260","DOIUrl":"https://doi.org/10.21917/IJIVP.2018.0260","url":null,"abstract":"Interpreting brain MR images are becoming automated, to such extent that in some cases “all” the diagnostic procedure is done by computers. Therefore, diagnosing the patients is done by a comparably higher accuracy. Computer models that have been trained by a priori knowledge act as the decision makers. They make decisions about each new image, based on the training data fed to them previously. In case of cancerous images, the model picks that image up, and isolates the malignant tissue in the image as neatly as possible. In this paper we have developed an unsupervised learning system for automatic tumor segmentation and detection that can be applied to low contrast images.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47072771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IMPROVEMENT IN DETECTION ACCURACY OF DIGITAL MAMMOGRAM USING POINT TRANSFORM AND DATA MINING TECHNIQUE 利用点变换和数据挖掘技术提高数字乳房x光片的检测精度
ICTACT Journal on Image and Video Processing Pub Date : 2018-08-01 DOI: 10.21917/ijivp.2018.0259
S. P. Meharunnisa, M. Ravishankar, K. Suresh
{"title":"IMPROVEMENT IN DETECTION ACCURACY OF DIGITAL MAMMOGRAM USING POINT TRANSFORM AND DATA MINING TECHNIQUE","authors":"S. P. Meharunnisa, M. Ravishankar, K. Suresh","doi":"10.21917/ijivp.2018.0259","DOIUrl":"https://doi.org/10.21917/ijivp.2018.0259","url":null,"abstract":"Cancer is one of the dangerous diseases faced by humans. Every one out of 100 women is facing breast cancer. So, to overcome this huge ratio many researches are being carried out. Prevention is better than cure; this paper presents one such attempt of detecting breast cancer in the early stages. In proposed method exponential point transform is carried out for image enhancement and in preprocessing stage pectoral mass is removed from the mammogram image. As the next step we apply K-means algorithm and morphological processing to identify the infected region and removal of unwanted region. Finally, Decision Tree Data mining technique is used for classifying features to detect presence of tumor. Hence by this approach we get more accurate results. The experimental results gave an accuracy of 97.03 %. Decision tree support vector machine classifier (SVM), linear quadratic discriminant analysis classifier","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44175328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A ROBUST NON-BLIND HYBRID COLOR IMAGE WATERMARKING WITH ARNOLD TRANSFORM 基于Arnold变换的鲁棒非盲混合彩色图像水印
ICTACT Journal on Image and Video Processing Pub Date : 2018-08-01 DOI: 10.21917/ijivp.2018.0255
M. Pandey, G. Parmar, Rajeev Gupta
{"title":"A ROBUST NON-BLIND HYBRID COLOR IMAGE WATERMARKING WITH ARNOLD TRANSFORM","authors":"M. Pandey, G. Parmar, Rajeev Gupta","doi":"10.21917/ijivp.2018.0255","DOIUrl":"https://doi.org/10.21917/ijivp.2018.0255","url":null,"abstract":"Due to development of the internet technologies and other services, requirement of rightful ownership and copyright is highly required. Hence to protect the copyrighted data from unauthorized user, a robust non-blind hybrid color image watermarking scheme is presented. In this proposed scheme, we use color watermark instead of gray watermark which is generally used in most of the existing digital image watermarking techniques. YCbCr color space used to separate the R, G and B channel of images. Y channel of color watermark is embedded into corresponding Y channel of cover image using proposed scheme. Arnold transform are used to scramble the watermark image before embedding process in order to provide more security. The singular value of bands is going to embed with singular values of watermark by making use of variable scaling factor (α). As original image is required at the time of extraction of watermark hence propose scheme belong to non-blind technique group. The two-fidelity parameter namely Peak signal to noise ratio (PSNR) and structural similarity (SSIM) index are used to measure the imperceptibility whereas similarity between original and extracted watermark is measured by using normalized correlation coefficient (NCC). We also compared the results of proposed scheme with other existing watermarking schemes. The experimental results prove effectiveness of the proposed image watermarking scheme in term of robustness and imperceptibility.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45040591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AN IMPROVED SURVEILLANCE SYSTEM ARCHITECTURE BASED ON FLAME DETECTION IN CCTVS 一种改进的cctv中基于火焰检测的监控系统结构
ICTACT Journal on Image and Video Processing Pub Date : 2018-08-01 DOI: 10.21917/ijivp.2018.0262
Chang Yong Ri, JinHyok Ju, HakSong Ri, KyongChol Rim
{"title":"AN IMPROVED SURVEILLANCE SYSTEM ARCHITECTURE BASED ON FLAME DETECTION IN CCTVS","authors":"Chang Yong Ri, JinHyok Ju, HakSong Ri, KyongChol Rim","doi":"10.21917/ijivp.2018.0262","DOIUrl":"https://doi.org/10.21917/ijivp.2018.0262","url":null,"abstract":"CCTV is an important part of the surveillance systems. While a person observes the screens with the naked eye in existing CCTV monitoring systems, it is possible that the flame and events are not detected opportunely due to eye fatigue and human carelessness. In this paper, we propose a real-time flame detection method and design architecture of surveillance system to achieve early fire detection. When flame is detected, this system displays the video sequence from the corresponding camera channel on the whole screen with the alarm signal.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46928076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
USAGE OF BIOINFORMATIC DATA FOR REMOTE AUTHENTICATION IN WIRELESS NETWORKS 生物信息学数据在无线网络远程认证中的应用
ICTACT Journal on Image and Video Processing Pub Date : 2018-08-01 DOI: 10.21917/ijivp.2018.0258
R. Priscilla, M. Karthi
{"title":"USAGE OF BIOINFORMATIC DATA FOR REMOTE AUTHENTICATION IN WIRELESS NETWORKS","authors":"R. Priscilla, M. Karthi","doi":"10.21917/ijivp.2018.0258","DOIUrl":"https://doi.org/10.21917/ijivp.2018.0258","url":null,"abstract":"Authentication is the step to approve the correctness of an attribute of a individual or entity group. Sensitive information might help in making the authentication. Regularly this encrypted information is processed via wireless network and which need remote authentication for information access process. In the proposed work, a robust authentication technique is performed, which is based on segmentation, symmetric encryption and data hiding. If a user wants to be remotely authenticated, initially user has to select a video. The user’s biometric signal is encrypted using a symmetric encryption method. After encrypted information is vectorized the information hiding process is accomplish using Qualified Significant Wavelet Trees (QSWTs). QSWT is effectively achieve the invisibility and resistance during attacks and stability in data hidden process. Also, the Inverse Discrete Wavelet Transform (IDWT) is applied to extract the hiding data from the stego-object subsequently an appropriate decryption process to recover the biometric image. Experimental results are stated that the proposed method would turnout security virtue and robustness. Triple DES technique is used in the proposed work. This is the technique that is used to encrypt the biometric data into a scrambled format which is difficult to understand by the attackers. It is a very useful and efficient method of encryption because of its tendency to use less data for performing its services.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42838261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMPRESSIVE SENSING APPROACH TO HYPERSPECTRAL IMAGE COMPRESSION 高光谱图像压缩的压缩感知方法
ICTACT Journal on Image and Video Processing Pub Date : 2018-08-01 DOI: 10.21917/ijivp.2018.0261
K. Gunasheela, H. S. Prasantha
{"title":"COMPRESSIVE SENSING APPROACH TO HYPERSPECTRAL IMAGE COMPRESSION","authors":"K. Gunasheela, H. S. Prasantha","doi":"10.21917/ijivp.2018.0261","DOIUrl":"https://doi.org/10.21917/ijivp.2018.0261","url":null,"abstract":"Hyperspectral image (HSI) processing is one of the key processes in satellite imaging applications. Hyperspectral imaging spectrometers collect huge volumes of data since the image is captured across different wavelength bands in the electromagnetic spectrum. As a result, compression of hyperspectral images is one of the active area in research community from many years. The research work proposes a new compressive sensing based approach for the compression of hyperspectral images called SHSIR (Sparsification of hyperspectral image and reconstruction). The algorithm computes the coefficients of fractional abundance map in matrix setup, which is used to reconstruct the hyperspectral image. To optimize the problem with non-smooth term existence along with large dimensionality, Bregman iterations method of multipliers is used, which converts the difficult optimization problem into simpler cyclic sequence problem. Experimental result demonstrates the supremacy of the proposed method over other existing techniques.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42469781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERFORMANCE ANALYSIS OF AUDIO AND VIDEO SYNCHRONIZATION USING SPREADED CODE DELAY MEASUREMENT TECHNIQUE 基于扩展码延迟测量技术的音视频同步性能分析
ICTACT Journal on Image and Video Processing Pub Date : 2018-08-01 DOI: 10.35444/ijana.2018.10019
A. Thenmozhi, P.Kannan
{"title":"PERFORMANCE ANALYSIS OF AUDIO AND VIDEO SYNCHRONIZATION USING SPREADED CODE DELAY MEASUREMENT TECHNIQUE","authors":"A. Thenmozhi, P.Kannan","doi":"10.35444/ijana.2018.10019","DOIUrl":"https://doi.org/10.35444/ijana.2018.10019","url":null,"abstract":"The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The synchronization loss between audio and video causes viewers not to enjoy the program and decreases the effectiveness of the programs. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audiovideo synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using Matlab simulation tools and Simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42869262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信