SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
DOI : 10.5121/ijcga.2014.4202 9
PERFORMANCE ANALYSIS OF CHAIN CODE
DESCRIPTOR FOR HAND SHAPE CLASSIFICATION
Kshama Fating1
and Archana Ghotkar2
1,2
Department of Computer Engineering, Pune Institute of Computer Technology,
Pune, India
ABSTRACT
Feature Extraction is an important task for any Image processing application. The visual properties of any
image are its shape, texture and colour. Out of these shape description plays important role in any image
classification. The shape description method classified into two types, contour base and region based. The
contour base method concentrated on the shape boundary line and the region based method considers
whole area. In this paper, contour based, the chain code description method was experimented for different
hand shape.
The chain code descriptor of various hand shapes was calculated and tested with different classifier such
as k-nearest- neighbour (k-NN), Support vector machine (SVM) and Naive Bayes. Principal component
analysis (PCA) was applied after the chain code description. The performance of SVM was found better
than k-NN and Naive Bayes with recognition rate 93%.
KEYWORDS
Feature extraction, Chain code, k-NN, SVM, Naive Bayes
1. INTRODUCTION
With the development of information technology, the use of human-computer interaction (HCI)
based application increased. There are many applications of HCI such as control mechanical
system, computer game, interacting with visualization system. These applications use interface
based on visual input. Advantage of visual input is, it is possible to communicate any device
without any physical contact. There are many visual inputs are use for HCI application such as
facial expression, speech command, hand shape. We have used hand shape for classification
which can be used in any HCI application. With different modalities such as lips, eye movement,
facial expression, speech command, hand shape is good in noisy environment.
An image important features are shape, colour and texture. Shape is an important feature of an
object. It contains more facts about an object than other features, such as colour. The shape can be
described into two different methods. The first method uses boundary features and the other
method uses region features to describe the shape. Boundary features are extracted from the
boundary of the shape like perimeter and corners, while regional features are extracted from the
region occupied by the shape such as the area [1]. Boundary features can be found by applying
contour detection techniques. Contour detection has played important role in recognizing the
shape of any object. In order to classify any shape, the shape has to describe by certain method.
We have used, contour based, chain code description method for hand shape classification. This
paper focuses on representation of a shape using chain code and classified shape based on their
chain code.
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
10
2. RELATED WORK
The chain code descriptor used by many authors for various applications. The survey of shape
representation techniques, chain code with the application and dataset are presented in Table 1.
Table 1.Survey on Chain code techniques for representation and recognition of shape
Application Dataset Descriptor use Reference Number
To detect object in an
image and video
Static images and
Real time video
Freeman chain
code
[2]
Recognition of irregular
object
Alphabets from A
to Z and irregular
shapes
Chain code
histogram
[3]
Represent and
recognition of shape for
children education.
Basic Shapes-
Rectangle, Square,
Circle etc.
Freeman chain
code
[4]
To recognize digit Digits from 0-9 Freeman chain
code
[5]
To represent shapes
composed of triangular,
rectangular, and
hexagonal cells
Thinned binary
images, namely
cube, stair, and
rectangle.
Vertex Chain Code. [6]
Recognition of Objects. Binary images of
tree leaves and
airplanes images
Vertex Chain Code. [7]
3. DATA SET
We have used total 300 images, 200 images for training and 100 images for classification. Figure
1 shows the dataset used for training and classification. The training dataset contains hand shapes
with classification labels.
Class 1 Class 2 Class 3 Class 4 Class 5
Figure 1. Sample Shapes
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
11
4. METHODOLOGY
The goals of this paper are threefold: first, it described the shape using chain code descriptor;
second, reduce dimensions of training and testing data with principal component analysis and
third, classifies shape in giving classes using the classifiers. Five classes of hand shape were
considered with a raised finger. Figure 2 shows the proposed model for shape representation and
classification.
Figure 2. Classification Process
4.1. Pre-processing
In pre-processing, image is segmented with threshold 80. After segmentation, contour was found.
We have used the polygon approximation, to approximate polygonal curves with the specified
precision. Figure 3 shows, pre-processing of input image for classification.
(a) (b) (c)
Figure 3. (a)Original Image (b) segmented image (c) polygon approximation
4.2. Chain Code
The shape can be well represented by boundary. Chain code provides a storage efficient
representation for boundary of an object [8]. There are three techniques of chain code descriptor
to represent the shape.
4.2.1. Freeman Chain Code
Chain code represents an object boundary by a connected sequence of straight line segments of
specified length and direction. This straight line segment is a sequence of integer.
Let sequence of integer X={x0, x2... xn-1}
x0 and xn-1 are called start and terminate point
Having Each from the set {0,1……n-1)
For 8 directional chain code n=8
For 4 directional chain code n=4
For i=1… N
N is total number of integer
Hand Shape Chain codePre-processing
PCAClassifier
Training
Dataset
Class Label
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
12
Figure 4. 4 and 8 directional chain code
Figure 4 shows, 4 and 8 directional chain code to find the direction code. To find the chain
code, first object need to be scanned from left to right. After finding the starting point of an object
boundary is traverse till end pixel. Direction code is identified and store into array or list.
A B
D C
Figure 5. Original object
For the original object shown in Figure 5, the starting point is at the A. The 4 directional chain
code of the object is 0321 and 8 directional chain code of the object is 0642. Starting point of an
object defines the chain code. If we change the scale or rotation affects the chain code. Hence the
chain code should be normalized. Basic chain code is only translation invariant, for rotationally
invariant differential chain code is used. Scale invariance obtains by changing the size of
sampling grid.
Differential chain code:
Differential chain code is obtained from first difference of chain code. The first difference of
chain code is obtained by taking two numbers of chain code and calculating the number of
transitions required to reach second number from the first number in counter clockwise direction
[1]. The first difference is rotational invariant. The shape number is obtained after normalization
of differential chain code. For minimum magnitude of shape number normalization use.
Normalization: For normalization treats a chain code as a circular sequence and redefine the
starting point so that the resulting sequence of numbers contain a minimum integer.
Steps for Normalization:
1. Find chain code of object
2. Redefine the starting point-take last number at first position
3. Find first difference of chain code
4. Find the shape Number
A shape shown in Figure 5, using eight direction chain code.
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
13
Chain code of shape: 0 6 4 2
Redefine starting point: 2 0 6 4 2
Find first difference : 2-0, 0-6, 6-4, 4-2
6 6 6 6
Shape Number : 66666
A
Figure 6. Rotation of original object
Figure 6 is shown; the original object is rotated in the right direction. Differential chain code is
rotational invariant so; shape number of rotated object is same as the original object.
Chain code of rotated object: 7531
Redefine starting point: 17531
Find first difference : 1-7,7-5,5-3,3-1
6 6 6 6
Shape Number : 66666
Shape number of the original object is same as rotated object. So to get rotational invariant
differential chain code was used.
Resampling chain code:
Chain code is sensitive to noise. This problem is solved by resembling the boundary by selecting
larger grid spacing. Scale invariance obtains by changing the size of sampling grid.
Figure 7. Original Image Points Figure 8. Result of Resampling
Figure 7 [9] shows original image points. Figure 8 shows resampling of original image points
which contains less noise than the original image. Using resampling we can achieve scale
invariant in case of freeman chain code.
In Freeman chain code method the object can be reconstructed from its chain code representation.
B
C
D
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
14
4.2.2. Vertex Chain code
Vertex chain code improves the chain code efficiency. The Vertex chain code is based on the
numbers of cell vertices which are in touch with the bounding contour of the shape [10]. In the
vertex chain code only three elements use to represent the shape 1, 2 and 3. Figure 9 shows,
vertex chain code to identify the elements for shape representation.
Figure 9. Vertex Chain Code
If two vertices touch then
Element=1
If three vertices touch then
Element=2
If four vertices touch then
Element=3
4.2.3. Chain code Histogram
The chain code histogram (CCH) is meant to group together objects that look similar to a human
observer. CCH has made by counting the number of each kind of steps in Freeman chain code
representation of the contour.
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
0 1 2 3 4 5 6 7 8
(a) (b)
Figure 10. (a) Freeman Chain code: 076666553321212 (b) Chain code Histogram
Figure 10 [9] shows freeman chain code and its histogram.
In this paper freeman chain code descriptor was used because it is translation, rotation, scale
invariant and its simplicity.
4.3. Feature Reduction and Classification
Dimension reduction is the second step of the proposed model. We have used PCA for dimension
reduction, which gives features vector for classification.
1 2
3
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
15
A third step of proposed model is classification where test data compared with training dataset.
There are several methods have been proposed for object recognition and classification. Manuele
Bicego and Vittorio Murino used Hidden Markova model for classification [11]. This is sensitive
to noise and cannot recognize the object with holes. Serge Belongie, Jetendra Malik and Jan
Puzicha used shape contexts for object recognition [12]. Haibin Ling and David Jacobs designed
classification method based on inner distance [13]. Thiago R. Trigo and Sergio Roberto M.
Pellegrino proposed classification system using the geometric shape descriptors for hand gesture
classification [14]. We have used k-NN and SVM and Naive Bayes classifiers for classification.
4.3.1. k-Nearest Neighbour
This is simple discriminative classifier. Training data are stored with labels. Thereafter a test data
was classified according to the majority vote of its k-Nearest other data points. Here nearness is
check according to Euclidean distance and the value of k is 5. Classification results using k-NN
are given in Figure 11.
Figure 11. Classification Results of k-NN classifier
4.3.2.Support Vector Machine
Support vector machine is a discriminative classifier formally defined by the separating
hyperplan. SVM uses the trained data to define the hyperplane which classify the input test data
[15]. SVM classifies linearly separable data which contain two classes as well as non linear data
which contains multiple classes. Classification results using SVM are given in Figure 12.
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
16
Figure 12. Classification Results of SVM classifier
4.3.3. Naive Bayes
The Bayesian classification represents a supervised learning method as well as statistical
classification method. It is based on Bayesian theorem. It is particularly suited for large
dimensional data [15].
Let given features are X1, X2... Xn, Predict the label Y
X1,…..,Xn  {0,1} (Black vs. White pixels)
Y  {1, 2, 3, 4, 5}
Use Bayes rule:
=
During testing, posterior probability of all classes is calculated, and prediction of class based on
which one is greater. Classification results using Naive Bayes are given in Figure 13.
Likelihood
Prior Probability
d
Normalization Constant
d
Posterior Probability
d
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
17
Figure 13. Classification Results of Naïve Bayes classifier
5. EXPERIMENT RESULTS
Input Shape Preprocessing Chain code Classification
Figure 14. Classification of Input shape
Figure 14 shows classification process of input hand shape. In pre-processing colour image
converted into binary and shape is represented by chain code. In Classification, chain code was
tested with three classifiers which result into class label.
Table 2. Classification Results
Hand Images Total Test
Images
k-NN
%
SVM
%
Naive Bayes
%
20 100 95 60
20 75 95 95
20 80 80 70
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
18
20 85 95 90
20 100 100 100
Average 100 88 93 83
Figure 15. Classification Results
6. CONCLUSION
Here performance analysis of chain code descriptor with various classifiers is presented. We have
tested 100 hand shapes with k-NN, SVM and Naive Bayes classifiers. Experimental results are
given in the Table 2 shows performance of classifier with chain code. Figure 15 shows details of
classification results. Classification of chain code with k- nearest-neighbour was 88%, with
support vector machine was 93% and with Naive Bays was 83%. Experimental results show that
chain code gives better performance with SVM classifier. For more training dataset performance
of classifiers can surely increase. Here classes are chosen which will be useful for any HCI
application.
REFERENCES
[1] S.Sridhar,(2012) “Digital Image Processing”, Oxford University Press.
[2] R.S.Vaddi1, L. N.P.Boggavarapu1, H. D.Vankayalapati, K. R. Anne,(2011) “Contour detection using
freeman chain code and approximation methods for real time object detection”, AJCSIT.
[3] Jukka Iivarinen , Ari Visa,(1996) “Shape Recognition of Irregular Objects”, Proc. SPIE 2904.
[4] Dr. Azzam Talal Sleit, Rahmeh Omar Jabay, (2006) “A Chain Code Approach for Recognizing Basic
Shapes”, CSIT.
[5] Pulipati Annapurna, Sriraman Kothuri, Srikanth Lukka, (2013) “Digit Recognition Using Freeman
Chain Code”,JAIEM.
International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014
19
[6] Lili Ayu Wulandhari,Habibolah Haron,Ariffin Mohammad,(2008)“The Mapping Algorithm of
Rrectangular Vertex Chain Code from Thinned Binary Image”, International Conference on
Engineering Optimization.
[7] Abdel-Badeeh M. Salem, Adel A. Sewisy, Usama A. Elyan,(2005) “A Vertex Chain Code Approach
for Image Recognition”, ICGST-GVIP Journal, Volume 5, Issue3.
[8] Yang Mingqiang, Kpalma Kidiyo, Ronsin Joseph,(2008) “ A survey of shape feature extraction
techniques”, Pattern Recognition, Peng-Yeng Yin (Ed.)43-90.
[9] Rafael C. Gonzalez,Richard E.Woods,(1998) “Digital Image Processing”, Addison Wesley.
[10]Bribiesca E,(1999) “A New Chain Code. Pattern Recognition”, Vol. 32, issue 2, 235-25.
[11]Manuele Bicego, Vittorio Murino,(2004) “Investigating Hidden Markov Models’ Capabilities in 2D
Shape Classification”,IEEE Transaction on Pattern Analysis and Machine Intelligence,Vol.26, NO.2.
[12]Serge Belongie, Jetendra Malik and Jan Puzicha,(2002) “Shape matching and Object recognition using
Shape Context”, IEEE Transaction on Pattern Analysis and Machine Intelligence,Vol. 24.
[13]Haibin Ling and David Jacobs, (2007) “Shape Classification Using the Inner- Distance”, IEEE
Transaction on Pattern Analysis and Machine Intelligence, Vol. 29, issue 2.
[14]Thiago R. Trigo and Sergio Roberto M. Pellegrino,(2010) “An Analysis of Features for Hand Gesture
Classification”, IWSSIP - 17th International Conference on Systems, Signals and Image Processing.
[15]V. C. Chen, (2004) “Evolution of Bayes, I CA, PCA and SVM Methods for classification”, RTO-MP-
SET-080.
Authors
Kshama Fating has received B.E. degree in Computer Engineering in 2003.She
is currently pursuing M.E. degree at Pune Institute of Computer Technology in
Pune University, INDIA.
Archana Ghotkar has received B.E degree in Computer Science and
Engineering in 1998 and M.E degree in Computer Engineering in 2000. She is
currently pursuing Ph.D in Computer Engineering at university of Pune. She has
been an associate professor at Pune Institute of Computer Technology in Pune
University, INDIA since 2010. Her main research interest includes computer
vision, pattern recognition and human computer interaction. She is a
member of ISTE and CSI.
.

More Related Content

What's hot

Edge Detection using Hough Transform
Edge Detection using Hough TransformEdge Detection using Hough Transform
Edge Detection using Hough TransformMrunal Selokar
 
CS 354 Bezier Curves
CS 354 Bezier Curves CS 354 Bezier Curves
CS 354 Bezier Curves Mark Kilgard
 
Hough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamHough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamNazmul Islam
 
Image representation
Image representationImage representation
Image representationRahul Dadwal
 
Unit 3 visual realism
Unit 3 visual realismUnit 3 visual realism
Unit 3 visual realismJavith Saleem
 
visual realism in geometric modeling
visual realism in geometric modelingvisual realism in geometric modeling
visual realism in geometric modelingsabiha khathun
 
Bt9301, computer graphics
Bt9301, computer graphicsBt9301, computer graphics
Bt9301, computer graphicssmumbahelp
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and ExtactionAli A Jalil
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeIJERA Editor
 
Practical Digital Image Processing 5
Practical Digital Image Processing 5Practical Digital Image Processing 5
Practical Digital Image Processing 5Aly Abdelkareem
 
visual realism Unit iii
 visual realism Unit iii visual realism Unit iii
visual realism Unit iiiArun Prakash
 
Bt9301, computer graphics
Bt9301, computer graphicsBt9301, computer graphics
Bt9301, computer graphicssmumbahelp
 
Visual realism -HIDDEN REMOVAL METHODS
Visual realism -HIDDEN REMOVAL METHODSVisual realism -HIDDEN REMOVAL METHODS
Visual realism -HIDDEN REMOVAL METHODSviswaaswaran
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2Aly Abdelkareem
 
Chapter 9 morphological image processing
Chapter 9 morphological image processingChapter 9 morphological image processing
Chapter 9 morphological image processingasodariyabhavesh
 
Dilation and erosion
Dilation and erosionDilation and erosion
Dilation and erosionAswin Pv
 
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...iosrjce
 

What's hot (20)

Edge Detection using Hough Transform
Edge Detection using Hough TransformEdge Detection using Hough Transform
Edge Detection using Hough Transform
 
CS 354 Bezier Curves
CS 354 Bezier Curves CS 354 Bezier Curves
CS 354 Bezier Curves
 
Hough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamHough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul Islam
 
Image representation
Image representationImage representation
Image representation
 
Unit 3 visual realism
Unit 3 visual realismUnit 3 visual realism
Unit 3 visual realism
 
visual realism in geometric modeling
visual realism in geometric modelingvisual realism in geometric modeling
visual realism in geometric modeling
 
Bt9301, computer graphics
Bt9301, computer graphicsBt9301, computer graphics
Bt9301, computer graphics
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and Extaction
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of Cheque
 
JDK and AWT
JDK and AWTJDK and AWT
JDK and AWT
 
Hit and-miss transform
Hit and-miss transformHit and-miss transform
Hit and-miss transform
 
Practical Digital Image Processing 5
Practical Digital Image Processing 5Practical Digital Image Processing 5
Practical Digital Image Processing 5
 
visual realism Unit iii
 visual realism Unit iii visual realism Unit iii
visual realism Unit iii
 
Bt9301, computer graphics
Bt9301, computer graphicsBt9301, computer graphics
Bt9301, computer graphics
 
Visual realism -HIDDEN REMOVAL METHODS
Visual realism -HIDDEN REMOVAL METHODSVisual realism -HIDDEN REMOVAL METHODS
Visual realism -HIDDEN REMOVAL METHODS
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2
 
Chapter 9 morphological image processing
Chapter 9 morphological image processingChapter 9 morphological image processing
Chapter 9 morphological image processing
 
Sbmp 4203 linear programming
Sbmp 4203 linear programmingSbmp 4203 linear programming
Sbmp 4203 linear programming
 
Dilation and erosion
Dilation and erosionDilation and erosion
Dilation and erosion
 
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
 

Similar to Performance analysis of chain code descriptor for hand shape classification

Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Classifier fusion method to recognize
Classifier fusion method to recognizeClassifier fusion method to recognize
Classifier fusion method to recognizeIJCI JOURNAL
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionIOSR Journals
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodIOSR Journals
 
A Case Study : Circle Detection Using Circular Hough Transform
A Case Study : Circle Detection Using Circular Hough TransformA Case Study : Circle Detection Using Circular Hough Transform
A Case Study : Circle Detection Using Circular Hough TransformIJSRED
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle usingijfcstjournal
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiDr. Vinayak Bharadi
 
Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...
Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...
Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...sipij
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130IJRAT
 
Optical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrOptical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrcsandit
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestIJERA Editor
 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestYoussef Rachidi
 
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING cscpconf
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingcsandit
 
IRJET- Shape based Image Classification using Geometric ­–Properties
IRJET-  	  Shape based Image Classification using Geometric ­–PropertiesIRJET-  	  Shape based Image Classification using Geometric ­–Properties
IRJET- Shape based Image Classification using Geometric ­–PropertiesIRJET Journal
 
A New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionA New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionIJECEIAES
 

Similar to Performance analysis of chain code descriptor for hand shape classification (20)

Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Classifier fusion method to recognize
Classifier fusion method to recognizeClassifier fusion method to recognize
Classifier fusion method to recognize
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
 
R04603104107
R04603104107R04603104107
R04603104107
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection Method
 
A Case Study : Circle Detection Using Circular Hough Transform
A Case Study : Circle Detection Using Circular Hough TransformA Case Study : Circle Detection Using Circular Hough Transform
A Case Study : Circle Detection Using Circular Hough Transform
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle using
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertati
 
E017443136
E017443136E017443136
E017443136
 
Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...
Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...
Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 
Optical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrOptical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocr
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random Forest
 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forest
 
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matching
 
Ijetcas14 399
Ijetcas14 399Ijetcas14 399
Ijetcas14 399
 
IRJET- Shape based Image Classification using Geometric ­–Properties
IRJET-  	  Shape based Image Classification using Geometric ­–PropertiesIRJET-  	  Shape based Image Classification using Geometric ­–Properties
IRJET- Shape based Image Classification using Geometric ­–Properties
 
A New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionA New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and Recognition
 
Isolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code FeaturesIsolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code Features
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Performance analysis of chain code descriptor for hand shape classification

  • 1. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 DOI : 10.5121/ijcga.2014.4202 9 PERFORMANCE ANALYSIS OF CHAIN CODE DESCRIPTOR FOR HAND SHAPE CLASSIFICATION Kshama Fating1 and Archana Ghotkar2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology, Pune, India ABSTRACT Feature Extraction is an important task for any Image processing application. The visual properties of any image are its shape, texture and colour. Out of these shape description plays important role in any image classification. The shape description method classified into two types, contour base and region based. The contour base method concentrated on the shape boundary line and the region based method considers whole area. In this paper, contour based, the chain code description method was experimented for different hand shape. The chain code descriptor of various hand shapes was calculated and tested with different classifier such as k-nearest- neighbour (k-NN), Support vector machine (SVM) and Naive Bayes. Principal component analysis (PCA) was applied after the chain code description. The performance of SVM was found better than k-NN and Naive Bayes with recognition rate 93%. KEYWORDS Feature extraction, Chain code, k-NN, SVM, Naive Bayes 1. INTRODUCTION With the development of information technology, the use of human-computer interaction (HCI) based application increased. There are many applications of HCI such as control mechanical system, computer game, interacting with visualization system. These applications use interface based on visual input. Advantage of visual input is, it is possible to communicate any device without any physical contact. There are many visual inputs are use for HCI application such as facial expression, speech command, hand shape. We have used hand shape for classification which can be used in any HCI application. With different modalities such as lips, eye movement, facial expression, speech command, hand shape is good in noisy environment. An image important features are shape, colour and texture. Shape is an important feature of an object. It contains more facts about an object than other features, such as colour. The shape can be described into two different methods. The first method uses boundary features and the other method uses region features to describe the shape. Boundary features are extracted from the boundary of the shape like perimeter and corners, while regional features are extracted from the region occupied by the shape such as the area [1]. Boundary features can be found by applying contour detection techniques. Contour detection has played important role in recognizing the shape of any object. In order to classify any shape, the shape has to describe by certain method. We have used, contour based, chain code description method for hand shape classification. This paper focuses on representation of a shape using chain code and classified shape based on their chain code.
  • 2. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 10 2. RELATED WORK The chain code descriptor used by many authors for various applications. The survey of shape representation techniques, chain code with the application and dataset are presented in Table 1. Table 1.Survey on Chain code techniques for representation and recognition of shape Application Dataset Descriptor use Reference Number To detect object in an image and video Static images and Real time video Freeman chain code [2] Recognition of irregular object Alphabets from A to Z and irregular shapes Chain code histogram [3] Represent and recognition of shape for children education. Basic Shapes- Rectangle, Square, Circle etc. Freeman chain code [4] To recognize digit Digits from 0-9 Freeman chain code [5] To represent shapes composed of triangular, rectangular, and hexagonal cells Thinned binary images, namely cube, stair, and rectangle. Vertex Chain Code. [6] Recognition of Objects. Binary images of tree leaves and airplanes images Vertex Chain Code. [7] 3. DATA SET We have used total 300 images, 200 images for training and 100 images for classification. Figure 1 shows the dataset used for training and classification. The training dataset contains hand shapes with classification labels. Class 1 Class 2 Class 3 Class 4 Class 5 Figure 1. Sample Shapes
  • 3. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 11 4. METHODOLOGY The goals of this paper are threefold: first, it described the shape using chain code descriptor; second, reduce dimensions of training and testing data with principal component analysis and third, classifies shape in giving classes using the classifiers. Five classes of hand shape were considered with a raised finger. Figure 2 shows the proposed model for shape representation and classification. Figure 2. Classification Process 4.1. Pre-processing In pre-processing, image is segmented with threshold 80. After segmentation, contour was found. We have used the polygon approximation, to approximate polygonal curves with the specified precision. Figure 3 shows, pre-processing of input image for classification. (a) (b) (c) Figure 3. (a)Original Image (b) segmented image (c) polygon approximation 4.2. Chain Code The shape can be well represented by boundary. Chain code provides a storage efficient representation for boundary of an object [8]. There are three techniques of chain code descriptor to represent the shape. 4.2.1. Freeman Chain Code Chain code represents an object boundary by a connected sequence of straight line segments of specified length and direction. This straight line segment is a sequence of integer. Let sequence of integer X={x0, x2... xn-1} x0 and xn-1 are called start and terminate point Having Each from the set {0,1……n-1) For 8 directional chain code n=8 For 4 directional chain code n=4 For i=1… N N is total number of integer Hand Shape Chain codePre-processing PCAClassifier Training Dataset Class Label
  • 4. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 12 Figure 4. 4 and 8 directional chain code Figure 4 shows, 4 and 8 directional chain code to find the direction code. To find the chain code, first object need to be scanned from left to right. After finding the starting point of an object boundary is traverse till end pixel. Direction code is identified and store into array or list. A B D C Figure 5. Original object For the original object shown in Figure 5, the starting point is at the A. The 4 directional chain code of the object is 0321 and 8 directional chain code of the object is 0642. Starting point of an object defines the chain code. If we change the scale or rotation affects the chain code. Hence the chain code should be normalized. Basic chain code is only translation invariant, for rotationally invariant differential chain code is used. Scale invariance obtains by changing the size of sampling grid. Differential chain code: Differential chain code is obtained from first difference of chain code. The first difference of chain code is obtained by taking two numbers of chain code and calculating the number of transitions required to reach second number from the first number in counter clockwise direction [1]. The first difference is rotational invariant. The shape number is obtained after normalization of differential chain code. For minimum magnitude of shape number normalization use. Normalization: For normalization treats a chain code as a circular sequence and redefine the starting point so that the resulting sequence of numbers contain a minimum integer. Steps for Normalization: 1. Find chain code of object 2. Redefine the starting point-take last number at first position 3. Find first difference of chain code 4. Find the shape Number A shape shown in Figure 5, using eight direction chain code.
  • 5. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 13 Chain code of shape: 0 6 4 2 Redefine starting point: 2 0 6 4 2 Find first difference : 2-0, 0-6, 6-4, 4-2 6 6 6 6 Shape Number : 66666 A Figure 6. Rotation of original object Figure 6 is shown; the original object is rotated in the right direction. Differential chain code is rotational invariant so; shape number of rotated object is same as the original object. Chain code of rotated object: 7531 Redefine starting point: 17531 Find first difference : 1-7,7-5,5-3,3-1 6 6 6 6 Shape Number : 66666 Shape number of the original object is same as rotated object. So to get rotational invariant differential chain code was used. Resampling chain code: Chain code is sensitive to noise. This problem is solved by resembling the boundary by selecting larger grid spacing. Scale invariance obtains by changing the size of sampling grid. Figure 7. Original Image Points Figure 8. Result of Resampling Figure 7 [9] shows original image points. Figure 8 shows resampling of original image points which contains less noise than the original image. Using resampling we can achieve scale invariant in case of freeman chain code. In Freeman chain code method the object can be reconstructed from its chain code representation. B C D
  • 6. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 14 4.2.2. Vertex Chain code Vertex chain code improves the chain code efficiency. The Vertex chain code is based on the numbers of cell vertices which are in touch with the bounding contour of the shape [10]. In the vertex chain code only three elements use to represent the shape 1, 2 and 3. Figure 9 shows, vertex chain code to identify the elements for shape representation. Figure 9. Vertex Chain Code If two vertices touch then Element=1 If three vertices touch then Element=2 If four vertices touch then Element=3 4.2.3. Chain code Histogram The chain code histogram (CCH) is meant to group together objects that look similar to a human observer. CCH has made by counting the number of each kind of steps in Freeman chain code representation of the contour. 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 0 1 2 3 4 5 6 7 8 (a) (b) Figure 10. (a) Freeman Chain code: 076666553321212 (b) Chain code Histogram Figure 10 [9] shows freeman chain code and its histogram. In this paper freeman chain code descriptor was used because it is translation, rotation, scale invariant and its simplicity. 4.3. Feature Reduction and Classification Dimension reduction is the second step of the proposed model. We have used PCA for dimension reduction, which gives features vector for classification. 1 2 3
  • 7. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 15 A third step of proposed model is classification where test data compared with training dataset. There are several methods have been proposed for object recognition and classification. Manuele Bicego and Vittorio Murino used Hidden Markova model for classification [11]. This is sensitive to noise and cannot recognize the object with holes. Serge Belongie, Jetendra Malik and Jan Puzicha used shape contexts for object recognition [12]. Haibin Ling and David Jacobs designed classification method based on inner distance [13]. Thiago R. Trigo and Sergio Roberto M. Pellegrino proposed classification system using the geometric shape descriptors for hand gesture classification [14]. We have used k-NN and SVM and Naive Bayes classifiers for classification. 4.3.1. k-Nearest Neighbour This is simple discriminative classifier. Training data are stored with labels. Thereafter a test data was classified according to the majority vote of its k-Nearest other data points. Here nearness is check according to Euclidean distance and the value of k is 5. Classification results using k-NN are given in Figure 11. Figure 11. Classification Results of k-NN classifier 4.3.2.Support Vector Machine Support vector machine is a discriminative classifier formally defined by the separating hyperplan. SVM uses the trained data to define the hyperplane which classify the input test data [15]. SVM classifies linearly separable data which contain two classes as well as non linear data which contains multiple classes. Classification results using SVM are given in Figure 12.
  • 8. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 16 Figure 12. Classification Results of SVM classifier 4.3.3. Naive Bayes The Bayesian classification represents a supervised learning method as well as statistical classification method. It is based on Bayesian theorem. It is particularly suited for large dimensional data [15]. Let given features are X1, X2... Xn, Predict the label Y X1,…..,Xn  {0,1} (Black vs. White pixels) Y  {1, 2, 3, 4, 5} Use Bayes rule: = During testing, posterior probability of all classes is calculated, and prediction of class based on which one is greater. Classification results using Naive Bayes are given in Figure 13. Likelihood Prior Probability d Normalization Constant d Posterior Probability d
  • 9. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 17 Figure 13. Classification Results of Naïve Bayes classifier 5. EXPERIMENT RESULTS Input Shape Preprocessing Chain code Classification Figure 14. Classification of Input shape Figure 14 shows classification process of input hand shape. In pre-processing colour image converted into binary and shape is represented by chain code. In Classification, chain code was tested with three classifiers which result into class label. Table 2. Classification Results Hand Images Total Test Images k-NN % SVM % Naive Bayes % 20 100 95 60 20 75 95 95 20 80 80 70
  • 10. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 18 20 85 95 90 20 100 100 100 Average 100 88 93 83 Figure 15. Classification Results 6. CONCLUSION Here performance analysis of chain code descriptor with various classifiers is presented. We have tested 100 hand shapes with k-NN, SVM and Naive Bayes classifiers. Experimental results are given in the Table 2 shows performance of classifier with chain code. Figure 15 shows details of classification results. Classification of chain code with k- nearest-neighbour was 88%, with support vector machine was 93% and with Naive Bays was 83%. Experimental results show that chain code gives better performance with SVM classifier. For more training dataset performance of classifiers can surely increase. Here classes are chosen which will be useful for any HCI application. REFERENCES [1] S.Sridhar,(2012) “Digital Image Processing”, Oxford University Press. [2] R.S.Vaddi1, L. N.P.Boggavarapu1, H. D.Vankayalapati, K. R. Anne,(2011) “Contour detection using freeman chain code and approximation methods for real time object detection”, AJCSIT. [3] Jukka Iivarinen , Ari Visa,(1996) “Shape Recognition of Irregular Objects”, Proc. SPIE 2904. [4] Dr. Azzam Talal Sleit, Rahmeh Omar Jabay, (2006) “A Chain Code Approach for Recognizing Basic Shapes”, CSIT. [5] Pulipati Annapurna, Sriraman Kothuri, Srikanth Lukka, (2013) “Digit Recognition Using Freeman Chain Code”,JAIEM.
  • 11. International Journal of Computer Graphics & Animation (IJCGA) Vol.4, No.2, April 2014 19 [6] Lili Ayu Wulandhari,Habibolah Haron,Ariffin Mohammad,(2008)“The Mapping Algorithm of Rrectangular Vertex Chain Code from Thinned Binary Image”, International Conference on Engineering Optimization. [7] Abdel-Badeeh M. Salem, Adel A. Sewisy, Usama A. Elyan,(2005) “A Vertex Chain Code Approach for Image Recognition”, ICGST-GVIP Journal, Volume 5, Issue3. [8] Yang Mingqiang, Kpalma Kidiyo, Ronsin Joseph,(2008) “ A survey of shape feature extraction techniques”, Pattern Recognition, Peng-Yeng Yin (Ed.)43-90. [9] Rafael C. Gonzalez,Richard E.Woods,(1998) “Digital Image Processing”, Addison Wesley. [10]Bribiesca E,(1999) “A New Chain Code. Pattern Recognition”, Vol. 32, issue 2, 235-25. [11]Manuele Bicego, Vittorio Murino,(2004) “Investigating Hidden Markov Models’ Capabilities in 2D Shape Classification”,IEEE Transaction on Pattern Analysis and Machine Intelligence,Vol.26, NO.2. [12]Serge Belongie, Jetendra Malik and Jan Puzicha,(2002) “Shape matching and Object recognition using Shape Context”, IEEE Transaction on Pattern Analysis and Machine Intelligence,Vol. 24. [13]Haibin Ling and David Jacobs, (2007) “Shape Classification Using the Inner- Distance”, IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 29, issue 2. [14]Thiago R. Trigo and Sergio Roberto M. Pellegrino,(2010) “An Analysis of Features for Hand Gesture Classification”, IWSSIP - 17th International Conference on Systems, Signals and Image Processing. [15]V. C. Chen, (2004) “Evolution of Bayes, I CA, PCA and SVM Methods for classification”, RTO-MP- SET-080. Authors Kshama Fating has received B.E. degree in Computer Engineering in 2003.She is currently pursuing M.E. degree at Pune Institute of Computer Technology in Pune University, INDIA. Archana Ghotkar has received B.E degree in Computer Science and Engineering in 1998 and M.E degree in Computer Engineering in 2000. She is currently pursuing Ph.D in Computer Engineering at university of Pune. She has been an associate professor at Pune Institute of Computer Technology in Pune University, INDIA since 2010. Her main research interest includes computer vision, pattern recognition and human computer interaction. She is a member of ISTE and CSI. .