{"title":"A video directional weighted median filter with adaptive threshold and colour correction","authors":"Verma Bhupender, R. Pandey","doi":"10.1109/ISSP.2013.6526877","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526877","url":null,"abstract":"This paper presents a video directional weighted median filter with suitable colour correction to remove random valued impulse noise from colour video sequences. The switching median technique is utilized to protect noise free pixels from filtering so as to avoid blurring of frames. The threshold used for identifying isolated noisy pixels is made adaptive based on the local statistics of the current pixel component. The restoration of noisy pixels is done by utilizing the brightness and colour information obtained from directional weighted median filter and vector directional filter, respectively. Local statistics for video filtering involves a three dimensional sliding window for estimation of characteristics of current pixel. This three dimensional sliding window provides spatial as well as temporal information about the neighbourhood for independent restoration of frame under consideration but decision for filtering is made only on the basis of information obtained from current frame only because of the fact that the consecutive frames may also have special characteristics. Only noise free pixels of three dimensional sliding window, are used for restoration of frame under consideration. Simulation results show that the proposed filter yields superior performance in comparison to other filtering methods available in literature.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Watermarking with copyright authentication for image communication","authors":"K. Raval, S. Zafar","doi":"10.1109/ISSP.2013.6526885","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526885","url":null,"abstract":"The advancing world of digital multimedia communication is faces problems related to security and authenticity of digital data. In the context of multimedia communication, digital images and videos have numerous applications in entertainment world like TV channel broadcasting. Digital Watermarking algorithms used to protect the copyright of digital images and to verify multimedia data security. Most watermarking algorithms transform the host image and embedding of the watermark information by robust way. Uncompressed digital images need a lot storage capacity and bandwidth so efficient image transmission need image compression. The solution is becoming more complex with the growth of data. We propose Digital Watermarking by proposed transform Algorithm based on DCT-DWT watermarking. By this method we can do secure image transmission.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132980637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Language identification system using MFCC and prosodic features","authors":"U. Bhattacharjee, K. Sarmah","doi":"10.1109/ISSP.2013.6526901","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526901","url":null,"abstract":"This paper report the experiments carried out on a recently collected multilingual speech database namely Arunachali Language Speech Database (ALS-DB) to identify the spoken language of the speaker. The speech database consists of speech data recorded from 200 speakers with Arunachali languages of North-East India as mother tongue. The speech data is collected in three different languages English, Hindi and a local language which belongs to any one of the four major languages of Arunachal Pradesh: Adi, Nyishi, Galo and Apatani. The collected database is evaluated with Gaussian mixture model (GMM) based language identification system with MFCC and MFCC with Prosodic features as feature vector. The initial study explores the fact that performance of a baseline GMM-MFCC based language identification system improves considerably when the prosodic features are considered as additional features with MFCC. It has been observed that when prosodic features are combined with MFCC features, performance of the system improved by nearly 11% over the baseline performance.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114529704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creation of secure cloud environment using RC6","authors":"N. Chandel, S. Mishra, N. Gupta, Amit Sinhal","doi":"10.1109/ISSP.2013.6526926","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526926","url":null,"abstract":"With the arrival of cloud computing technology utilization of resources is increases multifold, and also increases security issues in different cloud environment. This paper presents a new scheme for secure cloud creation using RC6 encryption algorithm for securing the cloud environment. The results show the performance of proposed technique in public and private cloud.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"618 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing boundary maps for image segmentation","authors":"Hasnain Vohra, Hetal Patel","doi":"10.1109/ISSP.2013.6526897","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526897","url":null,"abstract":"We propose an algorithm for image segmentation using the output of any boundary detector. Our algorithm constructs closed regions from the brittle boundaries of boundary maps which are usually obtained when boundary detectors are used for natural images. The proposed algorithm works on a bottom-up process which analyzes neighbourhoods of boundary points to detect discontinuities and connects them. We call this process optimization of boundary maps which is followed by dilation of boundaries and the watershed transform to obtain image segments. The segmentation results can be controlled with user-tuned parameters.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123505275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Iqbal Quraishi, M. De, K. G. Dhal, S. Mondal, G. Das
{"title":"A novel hybrid approach to restore historical degraded documents","authors":"Md. Iqbal Quraishi, M. De, K. G. Dhal, S. Mondal, G. Das","doi":"10.1109/ISSP.2013.6526899","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526899","url":null,"abstract":"Old degraded historical documents carry various important information regarding our culture, economics etc. proper restoration of these documents is very necessary. After digitization of these documents there remain noises and other low resolution components. These affect the overall visual appearance of the documents. In this paper a novel approach is proposed to enhance ancient historical documents. To enhance these digital format documents a two way approach is considered. At first Particle Swarm Optimization (PSO) and bilateral filter is applied. At second level Non-Linear Enhancement with bilateral filter is applied. Both the approaches are then tested visually and quantitively to show the effectiveness of the approach.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120880085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparing the application of classification and association rule mining techniques of data mining in an Indian university to uncover hidden patterns","authors":"S. Pandya, P. Virparia","doi":"10.1109/ISSP.2013.6526935","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526935","url":null,"abstract":"The Untouched data of the University can be used to achieve the competitive advantage by having data analysis using Data Mining Techniques. Comparing Application of Classification and Association Rule Mining Techniques to identify fitness of the technique in education domain is an attempt towards uncovering hidden patterns in an Indian University. By experimental results authors have found the Classification comparatively brings more clear and straight pictures of hidden patterns subject to the dataset chosen.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128462774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Dinesh, P. Kishore, B. Vivekanandan, S. Moorthi
{"title":"RFID based navigation system for unmanned material handling vehicles using FPGA","authors":"P. Dinesh, P. Kishore, B. Vivekanandan, S. Moorthi","doi":"10.1109/ISSP.2013.6526922","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526922","url":null,"abstract":"The paper reports a navigation system which uses passive RFID tags for localization. The entire terrain is mapped into a grid of nodes each containing a tag that refers to a specific location on the terrain which is sensed by the vehicle using the onboard compatible RFID reader. These tags provide the vehicle with the sense of its position and orientation on the terrain. The system uses Flood fill algorithm to generate the shortest path to the destination while also maneuvering the obstacles. During the course of traversing the path, on reading each tag, the system ensures that the location read from tag is consistent with the generated route. On the event of any mismatch, a new path to the destination is generated, empowering the system with error detection and correction capabilities. The system uses FPGA as the processing unit on account of its flexibility and high parallel processing capabilities.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129735094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An OCR for separation and identification of mixed English — Gujarati digits using kNN classifier","authors":"S. Chaudhari, R. Gulati","doi":"10.1109/ISSP.2013.6526900","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526900","url":null,"abstract":"This paper addresses the script identification problem of bilingual printed document images. We propose an OCR system that separates and identify mixed English-Gujarati digits. Here, first the system is trained with standard data samples. Then for testing, data samples are collected from different sources of paper like, news paper, book, magazine, etc. Random sized pre-processed image is normalized to uniform sized image. A statistical approach is used for feature extraction. For classification kNN classifier is used. The model gives average accuracy of 99.26% for Gujarati digits, 99.20% for English digits, and overall accuracy 99.23%.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal path selection in short range wireless communication","authors":"C. K. Krunal, R. Dhaval, R. Yogesh","doi":"10.1109/ISSP.2013.6526912","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526912","url":null,"abstract":"The mobile ad-hoc network study is based on simulations as well as the fundamental necessary simplified assumption of physical reality. Testing the simulation for various protocols in a practical environment shows how theories can be authenticated in practice. Our approach is to build a model that can be used to simulate and test the path selection from plentiful paths available from source to the destination. We are interested in optimal path selection and analysis in Bluetooth scatter net routing with respect to some key parameter. The key parameter includes the number of intermediate hops. We want to determine whether and how paths are selected and what changes take place with the mobility of the nodes. Our approach is to list out the available path between source and destination by indicating the number of intermediate hops. Based on that user can select the shortest path from the proposed network. Finally in this paper, To make the scatter net structure more suitable to serve in mobile ad hoc networks our model shows our approach of selecting the optimal path proves better in terms of data delivery from a given sender to receiver.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"47 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132629417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}