SlideShare a Scribd company logo
1 of 4
Download to read offline
Faculty of Electronics Engineering (ECE),UNSIET, VBSPU
PROJECT ROGRESS REVISED REPORT- I
PROJECTTITLE: Color Detection & Segmentation based Invisible Cloak
AREAOF WORK:Digital Image Processing
TYPE OF MODEL:Software [Python 3.11 (64bit)]
❖ MODULES USED IN PYTHON: Open CV, NumPy, PIL, Socket, Tkinter
PROJECTAIM & OBJECTIVES:
AIM: This project aims to creates a magical experience by using an Image Processing
technique called Color Detection & Segmentation resulting in false sense of Invisibility in the
frame.
PROJECT OBJECTIVES: The main objective of the invisibility cloak project is to develop
a cloak or material that can render objects invisible to the human eye.
Objective#1: Initializing, Capturing & storing the background frame through a digital camera.
Objective#2: Detect the cloth using Color Detection by choosing appropriate HSV color space.
Objective#3: Segment out the colored cloth by generating a mask.
Objective#4: Applying Mask on frame & Combine mask frames together.
PROPOSED DESIGN METHODOLOGY: Overall, the Proposed Design
methodology involves capturing images, processing them using Image Processing operations
and testing the Invisibility Cloak in real-time using digital web camera. Proposed Design is
depicted in the Fig.1.
PROGRESS IN WORK: During this course of time Objective#1, Objective# 2 and
Objective#3 are completed & Objective#4 is under progress as detailed below,
Faculty of Electronics Engineering (ECE),UNSIET, VBSPU
a) We need to capture the background image of the scene without the object you want to hide.
This can be done using a camera or by selecting an image of the background.
b) Using OpenCV, generate a mask that will separate the object from the background. This
can be done by applying image thresholding, (segmentation) that will allow you to isolate
the object.
c) Once we have generated a mask, you can apply image processing techniques to the object
such as morphological transformations. This will make the object appear invisible.
d) Once the processing is complete, test the invisibility cloak in real-time. This can be done
using a webcam.
e) Redefine the Design:Make any necessary modifications to the design to improve its
overall performance, such as implementing on GUI for smooth interface.
PROPOSED DESIGN EVALUATION METRICS
we can utilize several evaluation metrics to
measure the quality of our color detection and
segmentation techniques. We will evaluate
Accuracy & Precision for our proposed model.
Accuracy is a widely used evaluation metric,
especially in classification tasks, to assess the
overall performance of a model or system. To
measure accuracy, you compare the number of
correct predictions made by your system to the
total number of predictions made. Here's the
formula for calculating accuracy:
Accuracy = (Number of Correct Predictions) /
(Total Number of Predictions)
Precision measures the proportion of correctly
detected colors among all detected colors,
indicating how precise our system is in identifying
the person and background colors. Calculate the
true positives (TP), which are the colors correctly
detected as belonging to the person's clothing &
calculate the false positives (FP), which are the
colors incorrectly detected as belonging to the
person's clothing.
Precision = TP / (TP + FP)
Segment out the defined
colored part bygenerating
mask & applying it on frame
Capture & Storebackground
frame using Image Acquisition
by Store a single frame before
startingthe infinite loop.
Generatethe finaloutput to
create a magical effect by
combining frames together, &
remove the unnecessarynoise
from masks.
Detect the definedcolor using
color detection & segmentation
algorithm
Using HSV Model
Faculty of Electronics Engineering (ECE),UNSIET, VBSPU
COMPARATIVE ANALYSIS
FUNCTIONALITYOF THE SYSTEM
Correct Predictions Total Processed Frame Accuracy Precision
85 100 0.85 0.83
98 100 0.98 0.96
89 100 0.89 0.86
93 100 0.93 0.91
81 100 0.81 0.82
93 100 0.93 0.92
Choose Webcam:
Stream Web Cam:
If you want to connect with System Webcam (Inbuilt or Connected Directly To
System)
0 for your inbuilt webcam in system and goes like 1,2,3.... according to webcam
connected.
1 for webcam connected externally to your system.
To connect to CCTV, Android Camera or to any other camera having IP Address
IP Address: IP Address of Your Camera (Example: 192.168.43.1)
Port: Port of Connection (Example: 1111)
Refresh: To Refresh the page to show valid options (always refresh when you change the
source)
Connect: To Connect to Camera
Change
Background:
Show
Background:
To Change The background (This Background is used to create the invisibility)
To Show Current using Background
Calibrate To Set HSV Values
(Keep in Mind: The White Part In calibrating window will become invisible)
Start Magic: To Start the Magic (That Make You Invisible)
Stop Magic: To Stop Magic
Disconnect
Exit:
To Disconnect from current Source
To Exit the Program
Faculty of Electronics Engineering (ECE),UNSIET, VBSPU
EVALUATION REMARKS BYPROJECTCOORDINATOR(S):
PROJECTREPORTED:
NAME & SIGNATURE OF TEAM MEMBERS:
Aviral Chaurasia (195209)
Ayush Singh (195206)
Prashant Rai(195231)
(APPROVED/NOT-APPROVED)
______________________________
NAME & SIGNATURE OF PROJECT SUPERVISOR (With Date)
Mr. PC Yadav
(Assistant Professor)
Department of Electronics Engineering, UNSIET, VBSPU.
100%

More Related Content

Similar to Color Detection & Segmentation based Invisible Cloak

HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVMHANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVMsipij
 
Handwritten Digit Recognition System based on CNN and SVM
Handwritten Digit Recognition System based on CNN and SVMHandwritten Digit Recognition System based on CNN and SVM
Handwritten Digit Recognition System based on CNN and SVMsipij
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxAROCKIAJAYAIECW
 
Color Detection & Segmentation based Invisible Claok
Color Detection & Segmentation based Invisible ClaokColor Detection & Segmentation based Invisible Claok
Color Detection & Segmentation based Invisible ClaokAviral Chaurasia
 
Real-Time Color Detection Using Python and OpenCV
Real-Time Color Detection Using Python and OpenCVReal-Time Color Detection Using Python and OpenCV
Real-Time Color Detection Using Python and OpenCVIRJET Journal
 
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsPetteriTeikariPhD
 
ppt 20BET1024.pptx
ppt 20BET1024.pptxppt 20BET1024.pptx
ppt 20BET1024.pptxManeetBali
 
Smart Face Recognition System Analysis
Smart Face Recognition System AnalysisSmart Face Recognition System Analysis
Smart Face Recognition System AnalysisVishal Aditya
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Vidyut Singhania
 
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine LearningMakine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine LearningAli Alkan
 
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...csandit
 
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...cscpconf
 
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNNAutomatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNNZihao(Gerald) Zhang
 
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGESA DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGESPNandaSai
 
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...Antoinette Williams
 
IRJET- Art Authentication System using Deep Neural Networks
IRJET- Art Authentication System using Deep Neural NetworksIRJET- Art Authentication System using Deep Neural Networks
IRJET- Art Authentication System using Deep Neural NetworksIRJET Journal
 
Sign Detection from Hearing Impaired
Sign Detection from Hearing ImpairedSign Detection from Hearing Impaired
Sign Detection from Hearing ImpairedIRJET Journal
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
 

Similar to Color Detection & Segmentation based Invisible Cloak (20)

HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVMHANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
 
Handwritten Digit Recognition System based on CNN and SVM
Handwritten Digit Recognition System based on CNN and SVMHandwritten Digit Recognition System based on CNN and SVM
Handwritten Digit Recognition System based on CNN and SVM
 
slide-171212080528.pptx
slide-171212080528.pptxslide-171212080528.pptx
slide-171212080528.pptx
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
 
Color Detection & Segmentation based Invisible Claok
Color Detection & Segmentation based Invisible ClaokColor Detection & Segmentation based Invisible Claok
Color Detection & Segmentation based Invisible Claok
 
Real-Time Color Detection Using Python and OpenCV
Real-Time Color Detection Using Python and OpenCVReal-Time Color Detection Using Python and OpenCV
Real-Time Color Detection Using Python and OpenCV
 
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problems
 
ppt 20BET1024.pptx
ppt 20BET1024.pptxppt 20BET1024.pptx
ppt 20BET1024.pptx
 
Smart Face Recognition System Analysis
Smart Face Recognition System AnalysisSmart Face Recognition System Analysis
Smart Face Recognition System Analysis
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition
 
Python Project.pptx
Python Project.pptxPython Project.pptx
Python Project.pptx
 
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine LearningMakine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
 
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
 
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
 
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNNAutomatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
 
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGESA DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
 
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
 
IRJET- Art Authentication System using Deep Neural Networks
IRJET- Art Authentication System using Deep Neural NetworksIRJET- Art Authentication System using Deep Neural Networks
IRJET- Art Authentication System using Deep Neural Networks
 
Sign Detection from Hearing Impaired
Sign Detection from Hearing ImpairedSign Detection from Hearing Impaired
Sign Detection from Hearing Impaired
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 

More from Aviral Chaurasia

More from Aviral Chaurasia (8)

minor.pptx
minor.pptxminor.pptx
minor.pptx
 
13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt
 
13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt
 
arun paper.pptx
arun paper.pptxarun paper.pptx
arun paper.pptx
 
B-Tech Project.pptx
B-Tech Project.pptxB-Tech Project.pptx
B-Tech Project.pptx
 
Lung Tumour Detection using Image Processing
 Lung Tumour Detection using Image Processing Lung Tumour Detection using Image Processing
Lung Tumour Detection using Image Processing
 
Draw in Air | Open CV Project
Draw in Air | Open CV ProjectDraw in Air | Open CV Project
Draw in Air | Open CV Project
 
Lung Tumour Detection using Image Processing
Lung Tumour Detection using Image Processing Lung Tumour Detection using Image Processing
Lung Tumour Detection using Image Processing
 

Recently uploaded

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

Color Detection & Segmentation based Invisible Cloak

  • 1. Faculty of Electronics Engineering (ECE),UNSIET, VBSPU PROJECT ROGRESS REVISED REPORT- I PROJECTTITLE: Color Detection & Segmentation based Invisible Cloak AREAOF WORK:Digital Image Processing TYPE OF MODEL:Software [Python 3.11 (64bit)] ❖ MODULES USED IN PYTHON: Open CV, NumPy, PIL, Socket, Tkinter PROJECTAIM & OBJECTIVES: AIM: This project aims to creates a magical experience by using an Image Processing technique called Color Detection & Segmentation resulting in false sense of Invisibility in the frame. PROJECT OBJECTIVES: The main objective of the invisibility cloak project is to develop a cloak or material that can render objects invisible to the human eye. Objective#1: Initializing, Capturing & storing the background frame through a digital camera. Objective#2: Detect the cloth using Color Detection by choosing appropriate HSV color space. Objective#3: Segment out the colored cloth by generating a mask. Objective#4: Applying Mask on frame & Combine mask frames together. PROPOSED DESIGN METHODOLOGY: Overall, the Proposed Design methodology involves capturing images, processing them using Image Processing operations and testing the Invisibility Cloak in real-time using digital web camera. Proposed Design is depicted in the Fig.1. PROGRESS IN WORK: During this course of time Objective#1, Objective# 2 and Objective#3 are completed & Objective#4 is under progress as detailed below,
  • 2. Faculty of Electronics Engineering (ECE),UNSIET, VBSPU a) We need to capture the background image of the scene without the object you want to hide. This can be done using a camera or by selecting an image of the background. b) Using OpenCV, generate a mask that will separate the object from the background. This can be done by applying image thresholding, (segmentation) that will allow you to isolate the object. c) Once we have generated a mask, you can apply image processing techniques to the object such as morphological transformations. This will make the object appear invisible. d) Once the processing is complete, test the invisibility cloak in real-time. This can be done using a webcam. e) Redefine the Design:Make any necessary modifications to the design to improve its overall performance, such as implementing on GUI for smooth interface. PROPOSED DESIGN EVALUATION METRICS we can utilize several evaluation metrics to measure the quality of our color detection and segmentation techniques. We will evaluate Accuracy & Precision for our proposed model. Accuracy is a widely used evaluation metric, especially in classification tasks, to assess the overall performance of a model or system. To measure accuracy, you compare the number of correct predictions made by your system to the total number of predictions made. Here's the formula for calculating accuracy: Accuracy = (Number of Correct Predictions) / (Total Number of Predictions) Precision measures the proportion of correctly detected colors among all detected colors, indicating how precise our system is in identifying the person and background colors. Calculate the true positives (TP), which are the colors correctly detected as belonging to the person's clothing & calculate the false positives (FP), which are the colors incorrectly detected as belonging to the person's clothing. Precision = TP / (TP + FP) Segment out the defined colored part bygenerating mask & applying it on frame Capture & Storebackground frame using Image Acquisition by Store a single frame before startingthe infinite loop. Generatethe finaloutput to create a magical effect by combining frames together, & remove the unnecessarynoise from masks. Detect the definedcolor using color detection & segmentation algorithm Using HSV Model
  • 3. Faculty of Electronics Engineering (ECE),UNSIET, VBSPU COMPARATIVE ANALYSIS FUNCTIONALITYOF THE SYSTEM Correct Predictions Total Processed Frame Accuracy Precision 85 100 0.85 0.83 98 100 0.98 0.96 89 100 0.89 0.86 93 100 0.93 0.91 81 100 0.81 0.82 93 100 0.93 0.92 Choose Webcam: Stream Web Cam: If you want to connect with System Webcam (Inbuilt or Connected Directly To System) 0 for your inbuilt webcam in system and goes like 1,2,3.... according to webcam connected. 1 for webcam connected externally to your system. To connect to CCTV, Android Camera or to any other camera having IP Address IP Address: IP Address of Your Camera (Example: 192.168.43.1) Port: Port of Connection (Example: 1111) Refresh: To Refresh the page to show valid options (always refresh when you change the source) Connect: To Connect to Camera Change Background: Show Background: To Change The background (This Background is used to create the invisibility) To Show Current using Background Calibrate To Set HSV Values (Keep in Mind: The White Part In calibrating window will become invisible) Start Magic: To Start the Magic (That Make You Invisible) Stop Magic: To Stop Magic Disconnect Exit: To Disconnect from current Source To Exit the Program
  • 4. Faculty of Electronics Engineering (ECE),UNSIET, VBSPU EVALUATION REMARKS BYPROJECTCOORDINATOR(S): PROJECTREPORTED: NAME & SIGNATURE OF TEAM MEMBERS: Aviral Chaurasia (195209) Ayush Singh (195206) Prashant Rai(195231) (APPROVED/NOT-APPROVED) ______________________________ NAME & SIGNATURE OF PROJECT SUPERVISOR (With Date) Mr. PC Yadav (Assistant Professor) Department of Electronics Engineering, UNSIET, VBSPU. 100%