SlideShare a Scribd company logo
1 of 7
Download to read offline
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
50
Selection of Feature Regions Set for Digital Image
Using Optimization Algorithm
Alpana A. Borse1
, Snehal M. Kamlapur2
1
PG Student, KKWIEER,Nasik, India
2
Associate Professor, KKWIEER,Nasik, India
Email:alpana.borse@gmail.com, snehal_kamalapur@yahoo.com
Abstract- A feature based “Selection of feature region set
for digital image using Optimization Algorithm” is
proposed here. The work is based on simulated attacking
and optimization solving procedure. Image
transformation techniques are used to extract local
features. Simulated attacking procedure is performed to
evaluate the robustness of every candidate feature region.
According to the evaluation results, a track-with-pruning
procedure I adopted to search a minimal primary feature
set which may resists the most predefined attacks. In
order to enhance its resistance capability against
undefined attacks, primary feature set is then extended by
adding some auxiliary feature regions in it. This work is
formulated as a multidimensional knapsack problem and
solved by optimization algorithms such as Genetic
Algorithm, Particle Swarm Optimization and Simulated
Annealing.
Keywords - Feature, optimization, robust, simulated
attacks
I. INTRODUCTION
With the rapid development of internet, manipulation of
data becomes easier. Application uses digital data
including electronic advertising, real-time video and
audio delivery, digital repositories and libraries, and Web
publishing. This ease of access to digital data brings with
itself the problem of copyright protection. It has been
recognized that current copyright laws are not enough for
dealing with digital data. This has led to an interest
towards developing new copy prevention and protection
mechanisms. Thus, increasing interest is based on robust
regions set, using such robust regions one could keep
their information secure. The existing methods do not
imply higher robustness and may degrade the quality of
the digital image against unknown attacks as
characteristics of unknown attacks vary with known
attacks. Thus, the difficulty is to obtain or select most
robust feature region set for information hiding. The
effectiveness of a digital image is indicated by the
robustness of regions against various attacks. The robust
regions are mainly used to sign copyright information of
the digital work as robust regions can resist information
after various kinds of attacks such as signal processing or
geometric distortions.
Thus it is necessary to work on following issues,
 Finding the most robust region set of a digital
image against various kinds of attacks for hiding
information,
 developing a faster robustness measurement
 improving image quality
So feature region set selection method based on
optimization approaches, by which selection of the most
robust regions without violating the image quality is
proposed here.
II. SYSTEM ARCHITECTURE
The system architecture is as in “Figure 1”. There are two
operational stages as Primary feature set searching stage
and feature set extension stage respectively.
2.1 Primary Stage ( Searching Stage)
The aim is to obtain primary feature region set.
a. Extract features
To extract local features, feature detectors are used.
Feature detectors perform specific transformations on
digital images to extract their local features, ranging from
a point to an object, and have been adopted in many
applications such as object recognition, database
retrieval, and motion tracking. Most features of an image
can be preserved after it suffers a distortion such as
scaling, rotation, or illumination changes. Therefore,
several feature-based methods have been developed by
exploiting the robustness of feature regions against
various attacks.
Normally, feature selection according to a single
criterion like corner response or the number of
neighbouring feature points to obtain regions. Various
corner detectors can be used to detect corners. Here,
Harris – Laplace corner detector is used to obtain
regions. “Figure 2” shows the regions detected by Harris
– Laplace corner detector.
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
Figure 1: System Architecture
b. Simulated attacking and selection of non
overlapping region set
Since the magnitude of the region gets modified after
attacks on region, it is preferred to select nonoverlapping
regions to avoid major degradation of image quality.It is
hard to accurately identify the robustness of all regions
by a single criterion like the corner response. Therefore,
this stage is based on simulated attacking. It would be
helpful to find out the most robust regions if there is prior
knowledge of each region’s attack resistance
capability.Moreover, a feature region may have different
degrees of robustness against different attacks [4], [8].
Regions obtained in “Figure 2” are survived with
different predefined attacks. A few representative attacks
are applied to the feature regions for evaluating their
robustness in the simulated attacking phase. The attack
resistance analysis phase is implemented by a two-step
procedure. The original feature regions are first checked
if they can be re-detected in the attacked image. The
redetected region is examines the consistency (bit error)
between itself after attacks. Using dr,a to indicate whether
the region can resist the predefined attack or not, it is
defined as
Figure 2: Regions detected by Harris-Laplacian
Corner detector
dr, a =
1 BER(W,Wr) ≤ T
0 otherwise
………..
(1)
Where,
BER (I, Ia) denotes the bit error between
original image I and image Ia
after different attacks on it
T a predefined bit error
threshold
In the final phase, the most robust and smallest set of
nonoverlapping feature regions is selected according to
the result of attack resistance analysis. This work is
formulated as follows:
R∗
= arg Rp ∑ min ;
rk, rj ∈ Rp, k≠j --> rk∩ rj = Ø ……….(2)
Where,
Rp is the set of selected feature regions in
which any two regions rk and rj are not
overlapped, and
The value of for a predefined attack is determined by
=
………… (3)
Where,
R the Rp satisfying with the maximum
Value of ai
The selection would be such that, by the involvement of
such region’s series, all predefined attacks on this series
can be resisted As a result, a region set would be better in
robustness when its regions can be complementary in
attack resistance as many as possible. These results are
obtained with the help of track with pruning algorithm.
A track with pruning Algorithm
Step 1: Initialize associated parameters and set the size of inspected feature region sets as NULL.
Step 2: Check if the termination condition is satisfied.
Step 3: while it cannot resist more attacks
The candidate Set is included in the pruned set
by adding more feature regions.
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
52
Step 4: Otherwise
Update the primary feature region set with a candidate feature region set if the latter can resist more attacks
than the former.
Step 5: Stop.
In practice, the aggregate attack resistance capability of
all selected nonoverlapping regions is more convincing,
and it could be regarded as the overall robustness of a
digital image.Sometimes this set may fail to resist some
non predefined attacks, hence we need to add some
auxiliary regions selected from those residual feature
regions to enhance the robustness of image against
undefined attacks under preserving its visual quality.
Since the characteristics of undefined attacks are of wide
variety and are difficult to model, we therefore adopt a
multi-criteria optimization strategy [15], [16] for the
selection of auxiliary feature regions. This phenomena of
feature region selection method based on multi-criteria
optimization strategy is described in stage 2.
2.2 Extended Stage (Optimization Stage)
Neither corner response nor the number of its
neighbouring feature points, however, can guarantee the
selection of nonoverlapping regions with the maximum
robustness to various attacks, because higher corner
response and a large number of its neighbouring feature
points do not always imply higher robustness of itself.
Moreover, a feature region may have different degrees of
robustness against different attacks [3], [5]. A feature
region selection is optimized by optimization to obtain
robust regions against unknown attacks occurs, as, a
feature region may have different degrees of robustness
against different kinds of attacks. To optimize the regions
following optimization algorithms are used–
 Genetic Algorithm (GA) [7], [8], [9]
 Particle Swarm Optimization (PSO) [6], [9]
and
 Simulated Annealing (SA) [11]
An optimal feature region set is chosen to resist the
predefined attacks. But this set may fail to resist some
non predefined attacks, we need to add some auxiliary
regions selected from those residual feature regions to
enhance the robustness of image against undefined
attacks under preserving its visual quality. Since the
characteristics of undefined attacks are of wide variety
and are difficult to model, we therefore adopt a multi-
criteria optimization strategy for the selection of auxiliary
feature regions. First, the assumption that the feature
regions which survive more types of predefined attacks
are more likely to resist undefined attacks is applied. The
symbol is defined to indicate the overall resistance
degree of the region against all predefined attacks, and it
is determined by
= (dr1, a1 + dr1, a2 + ………..+ drn, aNa) =
…………. (4)
Where,
dri, ai ε {0, 1} indicates if the region can resist the
ith
predefined attack ai and
Na the total number of predefined attacks.
The resistance of a region against a predefined attack is
regarded as a possible characteristic of the region. The
symbol ga
r is the summary representation of Na
characteristics of a region. Other two generic
characteristics of feature regions, the corner response and
the integration scale are referred, since we cannot
exclude the possibility that there are undefined attacks
with the characteristics never occurred in the predefined
attacks. The parameter which denotes the limitation of
quality degradation of an image after being attacked
considered as peak signal-to-noise ratio (PSNR) value
between a cover image and attacked image. Therefore,
the work of the extension stage can be formulated as an
optimization problem formulated as Multi Dimensional
knapsack problem (MDKP) with multiple constraints as
follows,
Maximize ( + + )
| ∗|
Srj …………. (5)
Subject to
| ∗|
. Srj ≤ Qc
, < 1 = 1,2,3,… , | ∗
|
| ∗|
……....… (6)
Where,
∗
The number of feature regions except those
in the primary feature region set as well as
the regions overlapped with them and
is defined as,
=
1 if the reggion ri is selected
0 otherwise
...…
(7)
The value of indicates whether the two regions are
overlapped and is defined as
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
53
= 1 ri ∩ rj ≠ Ǿ
0 otherwise
……… (8)
The optimization problem formulated by 5 and 6 can be
formulated as MDKP that is a knapsack problem with a
collection of different constraints.
A heuristic search procedure is adopted to solve this
MDKP for determining the best choice of auxiliary
feature regions.
Hence, to solve this MDKP for determining the best
choice of auxiliary feature regions and best choice of
optimization algorithm we have used some optimization
approaches such as GA, PSO, and SA.
III. THE ALGORITHMIC FRAMEWORK OF GA, PSO AND SA
i) Genetic Algorithm (GA)
Generate initial population
Do
Calculate the fitness of each member
// simulate another generation
Do
Select parents from current population
Perform crossover add offspring to the
new population
while new population is not full
Merge new population into the current population
Mutate current population while not converged
ii) Particle Swarm Optimization (PSO)
Randomly generate an initial population
Repeat
for i = 1 to population_size
do
if f( Xi) < f( Pi) then
Pi=Xi
Pg = min (Pneighbours);
for d =1 to dimensions
do
velocity_update();
position_update();
end
end
until termination criterion is met.
iii. Simulated Annealing (SA)
Function SIMULATED-ANNEALING(Problem, Schedule) returns a solution state
Current = MAKE- REGION (INITIAL-SOLUTION [Problem])
For t = 1 to N do
T = Schedule[t] // Index
If T = 0 then return Current
Next = a randomly selected successor of Current
Cost = VALUE[Next] – VALUE[Current]
if Cost > 0 then Current = Next
else Current = Next only with probability exp(-Cost /T)
End
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
54
Comparing results of these different optimization
techniques on feature region set, it determines the best
choice of optimization techniques for selecting most
robust region set under the constraint of preserving image
quality and extracting feature regions in less amount of
time.
IV. EXPERIMENTALRESULTS
System is implemented using Matlab. Results are
obtained for test images. The systems implement Harris-
Laplacian based robust region set selection. The corner
response values are used to remove overlapping feature
regions. TABLE 1 illustrates the comparisons, based on
the criterion of detection ratio, defined as the ratio of the
number successfully detected regions with respect to
total number of regions in an image.
TABLE I
TABLE II and TABLE III gives results for regions, RN. Where RN  Region Number {3, 5, 6, 7, 8}
TABLE II
TABLE III
As illustrated in TABLE II and III, this system enhances the robustness of the system of feature based methods against
attacks.
.
“Figure 3” and “Figure 4” shows results of the proposed system.
Image
Jpeg 50 Jpeg 60 Rotate 15 Rotate 30 Median Gnoises
LE
4/5 4/5 5/5 4/5 3/5 5/5
BA 3/6 5/6 6/6 4/6 6/6 6/6
FR 2/4 2/4 ¾ 1/4 1/4 4/4
RN JPEG 50
JPEG
60
Rotate 15 Rotate30 Median Filter Gnoises
3 1 1 1 1 1 1
5 0 0 1 1 0 1
6 1 1 1 0 0 1
7 1 1 1 1 1 1
8 1 1 1 1 1 1
RN Corner Response Attack Resistance Capability
3
49.2244
3
5
36.6759
3
6
38.1657
3
7
45.9059
3
8
44.7766
3
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
V. CONCLUSIONS
The aim behind “Selection of feature region set for
digital image using Optimization Algorithm” is implying
higher robustness of the digital image. This system is
mainly based on simulated attacking and optimization
solving procedure, for obtaining robust region set. It uses
integration scale, corner response and attack’s resistance
capability as performance parameters. Optimization
algorithms such as Genetic Algorithm, Particle Swarm
Optimization and Simulated Annealing to optimize
the regions are used. The results generated after
comparing different optimization techniques, determines
the best technique for selection of most robust region set
under the constraints of preserving image quality and
extracting feature region set in less amount of time. Thus,
optimization based methods significantly improves the
robustness of a digital image. Hence, this system is
suitable for applications in which robustness of a digital
image is primary key, such as, hiding information or
prevention and protection of digital contents.
TABLE IV illustrates the comparison of an optimization algorithm to optimized regions
TABLE IV
SN Terms GA PSO SA
1 Number of Lines More Few Few
2 Memory More Less Less
3 Time Less More More
4 Tuning of parameters Difficult Easiest Easiest
5 Structure Complex Simple Simple
6 Implementation Difficult Easy Easy
Following figure shows regions after attacked on region.
‘a’ ‘b’ ‘c’ ‘d’ ‘e’
Figure 3: Attacked region
Where,
a : original region
b : attacked region after – JPEG Attack
c : attacked region after – ROTATE Attack
d : attacked region after – Gnoises Attack
e : attacked region after – Median Filter Attack
Following images gives results of this system
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
56
‘a’
‘b’ ‘c’ ‘d’
‘e’ ‘f’ ‘g’
Figure 4: Results of “Selection of feature region set for digital image using Optimization Algorithm”
Where,
a: Original Image of Lina
b: Image after applied Harris Laplace Corner
c: Image before applying TWPA algorithm
d: Image after applying TWPA algorithm
e: Image obtained after applying GA
f: Image obtained after applying PSO
g: Image obtained after applying SA Detector
Results:
Number of Regions for optimization {7, 3, 5, 6, 8}
Fig. ‘d’: Number of Regions obtained after GA {8,
3, 5}
Fig. ‘e’: Number of Regions obtained after PSO {8,
3, 7}
Fig. ‘f’: Number of Regions obtained after SA{8,
3}
REFERENCES
[1] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Kuo , “On the
Selection Optimal Feature Region Set for Robust Digital Image
Watermarking”, in IEEE TRANSACTIONS ON IMAGE
PROCESSING, VOL. 20, NO. 3, MARCH 2011
[2] J. S. Tsai, W. B. Huang, C. L. Chen, and Y. H. Kuo, “A feature-
based digital image watermarking for copyright protection and
content authentication, "in Proc. IEEE Int. Conf. Image Process.,
Sep. 200, vol.5, pp. 469–472.
[3] D. G. Lowe, “Distinctive image features from scale-invariant
keypoints,” Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, Nov.
2004.
[4] C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Mark Liao, “Cocktail
watermarking for digital image protection,” IEEE Trans.
Multimedia, vol. 2, no. 4, pp. 209–224, Dec. 2000.
[5] J. S. Seo and C. D. Yoo, “Image watermarking based on invariant
regions of scale-space representation,”
[6] IEEE Trans. Signal Process., vol. 54, no. 4, pp. 1037–1049, Apr.
2006.
[7] Konstantinos E. Parsopoulos, Michael N. Vrahatis, “ Particle
Swarm Optimization for Constrained optimization Algorithms”
research centre (UPAIRC), GR -26110, Patras, Greece
[8] Riccardo Poli, William B. Langdon and Nicholas F. McPhee “A
Field Guide to Genetic Programming” University of Essex – UK
rpoli@essex.ac.uk
[9] Golderberg, David E., Genetic Algorithms: in Search, Optimization
& Machine Learning, Addison-Wesley Publishing Company, Inc.,
New York, 1989.
[10] Sadiq M. Sait and Habib Youssef, Iterative Computer Algorithms
with Application to Engineering: Solving Combinatorial
Optimization Problems, IEEE Computer Society, LA, 1999.
[11] George S. Tarasenko, Stochastic Optimization in the Soviet Union
Random Search Algorithms, Delphic Associates, Inc., VA, 1985.
[12] Duc Truong Pham and Dervis Karaboga, Intelligent Algorithms,
tabu search, simulated annealing and neural networks, Springer,
New York, 1998.

More Related Content

What's hot

IRJET- A Non Uniformity Process using High Picture Range Quality
IRJET-  	  A Non Uniformity Process using High Picture Range QualityIRJET-  	  A Non Uniformity Process using High Picture Range Quality
IRJET- A Non Uniformity Process using High Picture Range QualityIRJET Journal
 
Neural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlcNeural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlceSAT Publishing House
 
Estimation of impervious surface based on integrated analysis of classificati...
Estimation of impervious surface based on integrated analysis of classificati...Estimation of impervious surface based on integrated analysis of classificati...
Estimation of impervious surface based on integrated analysis of classificati...grssieee
 
A Moving Target Detection Algorithm Based on Dynamic Background
A Moving Target Detection Algorithm Based on Dynamic BackgroundA Moving Target Detection Algorithm Based on Dynamic Background
A Moving Target Detection Algorithm Based on Dynamic BackgroundChittipolu Praveen
 
An Inclusive Analysis on Various Image Enhancement Techniques
An Inclusive Analysis on Various Image Enhancement TechniquesAn Inclusive Analysis on Various Image Enhancement Techniques
An Inclusive Analysis on Various Image Enhancement TechniquesIJMER
 
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...IRJET Journal
 
Multifocus_IRANIANCEE.2014.6999819
Multifocus_IRANIANCEE.2014.6999819Multifocus_IRANIANCEE.2014.6999819
Multifocus_IRANIANCEE.2014.6999819Iman Roosta
 
Chapter 3 image enhancement (spatial domain)
Chapter 3 image enhancement (spatial domain)Chapter 3 image enhancement (spatial domain)
Chapter 3 image enhancement (spatial domain)asodariyabhavesh
 
Median based parallel steering kernel regression for image reconstruction
Median based parallel steering kernel regression for image reconstructionMedian based parallel steering kernel regression for image reconstruction
Median based parallel steering kernel regression for image reconstructioncsandit
 
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTION
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTIONMEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTION
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTIONcsandit
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
 
survey on Scene Detection Techniques on video
survey on Scene Detection Techniques on videosurvey on Scene Detection Techniques on video
survey on Scene Detection Techniques on videoChandra Shekhar Mithlesh
 
Image enhancement ppt nal2
Image enhancement ppt nal2Image enhancement ppt nal2
Image enhancement ppt nal2Surabhi Ks
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationHabibur Rahman
 
various methods for image segmentation
various methods for image segmentationvarious methods for image segmentation
various methods for image segmentationRaveesh Methi
 
Analysis of Various Single Frame Super Resolution Techniques for better PSNR
Analysis of Various Single Frame Super Resolution Techniques for better PSNRAnalysis of Various Single Frame Super Resolution Techniques for better PSNR
Analysis of Various Single Frame Super Resolution Techniques for better PSNRIRJET Journal
 

What's hot (20)

IRJET- A Non Uniformity Process using High Picture Range Quality
IRJET-  	  A Non Uniformity Process using High Picture Range QualityIRJET-  	  A Non Uniformity Process using High Picture Range Quality
IRJET- A Non Uniformity Process using High Picture Range Quality
 
Neural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlcNeural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlc
 
Estimation of impervious surface based on integrated analysis of classificati...
Estimation of impervious surface based on integrated analysis of classificati...Estimation of impervious surface based on integrated analysis of classificati...
Estimation of impervious surface based on integrated analysis of classificati...
 
A Moving Target Detection Algorithm Based on Dynamic Background
A Moving Target Detection Algorithm Based on Dynamic BackgroundA Moving Target Detection Algorithm Based on Dynamic Background
A Moving Target Detection Algorithm Based on Dynamic Background
 
An Inclusive Analysis on Various Image Enhancement Techniques
An Inclusive Analysis on Various Image Enhancement TechniquesAn Inclusive Analysis on Various Image Enhancement Techniques
An Inclusive Analysis on Various Image Enhancement Techniques
 
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...
 
Background subtraction
Background subtractionBackground subtraction
Background subtraction
 
Multifocus_IRANIANCEE.2014.6999819
Multifocus_IRANIANCEE.2014.6999819Multifocus_IRANIANCEE.2014.6999819
Multifocus_IRANIANCEE.2014.6999819
 
Background subtraction
Background subtractionBackground subtraction
Background subtraction
 
Chapter 3 image enhancement (spatial domain)
Chapter 3 image enhancement (spatial domain)Chapter 3 image enhancement (spatial domain)
Chapter 3 image enhancement (spatial domain)
 
Median based parallel steering kernel regression for image reconstruction
Median based parallel steering kernel regression for image reconstructionMedian based parallel steering kernel regression for image reconstruction
Median based parallel steering kernel regression for image reconstruction
 
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTION
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTIONMEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTION
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTION
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
survey on Scene Detection Techniques on video
survey on Scene Detection Techniques on videosurvey on Scene Detection Techniques on video
survey on Scene Detection Techniques on video
 
Image enhancement ppt nal2
Image enhancement ppt nal2Image enhancement ppt nal2
Image enhancement ppt nal2
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentation
 
various methods for image segmentation
various methods for image segmentationvarious methods for image segmentation
various methods for image segmentation
 
Analysis of Various Single Frame Super Resolution Techniques for better PSNR
Analysis of Various Single Frame Super Resolution Techniques for better PSNRAnalysis of Various Single Frame Super Resolution Techniques for better PSNR
Analysis of Various Single Frame Super Resolution Techniques for better PSNR
 

Similar to Selection of Feature Regions Set for Digital Image Using Optimization Algorithm

IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET Journal
 
IRJET- Image Registration in GIS: A Survey
IRJET-  	  Image Registration in GIS: A SurveyIRJET-  	  Image Registration in GIS: A Survey
IRJET- Image Registration in GIS: A SurveyIRJET Journal
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET Journal
 
Text Detection and Recognition in Natural Images
Text Detection and Recognition in Natural ImagesText Detection and Recognition in Natural Images
Text Detection and Recognition in Natural ImagesIRJET Journal
 
final_year_project
final_year_projectfinal_year_project
final_year_projectMALLIKA H.M
 
An fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimumAn fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimumAlexander Decker
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET Journal
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysisvivatechijri
 
IRJET- Mango Classification using Convolutional Neural Networks
IRJET- Mango Classification using Convolutional Neural NetworksIRJET- Mango Classification using Convolutional Neural Networks
IRJET- Mango Classification using Convolutional Neural NetworksIRJET Journal
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET Journal
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIOSR Journals
 
Deceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic SignsDeceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic SignsLeonardoSalvucci1
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueIRJET Journal
 
IRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A ReviewIRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A ReviewIRJET Journal
 
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET Journal
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET Journal
 
ICIF19_Garg_job_talk_portfolio_modification.pdf
ICIF19_Garg_job_talk_portfolio_modification.pdfICIF19_Garg_job_talk_portfolio_modification.pdf
ICIF19_Garg_job_talk_portfolio_modification.pdfVarun Garg
 
Brain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineBrain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineIRJET Journal
 
Classification of Images Using CNN Model and its Variants
Classification of Images Using CNN Model and its VariantsClassification of Images Using CNN Model and its Variants
Classification of Images Using CNN Model and its VariantsIRJET Journal
 

Similar to Selection of Feature Regions Set for Digital Image Using Optimization Algorithm (20)

IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
 
IRJET- Image Registration in GIS: A Survey
IRJET-  	  Image Registration in GIS: A SurveyIRJET-  	  Image Registration in GIS: A Survey
IRJET- Image Registration in GIS: A Survey
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
 
Text Detection and Recognition in Natural Images
Text Detection and Recognition in Natural ImagesText Detection and Recognition in Natural Images
Text Detection and Recognition in Natural Images
 
final_year_project
final_year_projectfinal_year_project
final_year_project
 
An fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimumAn fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimum
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysis
 
IRJET- Mango Classification using Convolutional Neural Networks
IRJET- Mango Classification using Convolutional Neural NetworksIRJET- Mango Classification using Convolutional Neural Networks
IRJET- Mango Classification using Convolutional Neural Networks
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep Learning
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
 
Deceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic SignsDeceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic Signs
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
 
IRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A ReviewIRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A Review
 
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android App
 
ICIF19_Garg_job_talk_portfolio_modification.pdf
ICIF19_Garg_job_talk_portfolio_modification.pdfICIF19_Garg_job_talk_portfolio_modification.pdf
ICIF19_Garg_job_talk_portfolio_modification.pdf
 
Brain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineBrain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector Machine
 
Classification of Images Using CNN Model and its Variants
Classification of Images Using CNN Model and its VariantsClassification of Images Using CNN Model and its Variants
Classification of Images Using CNN Model and its Variants
 

More from ijdmtaiir

A review on data mining techniques for Digital Mammographic Analysis
A review on data mining techniques for Digital Mammographic AnalysisA review on data mining techniques for Digital Mammographic Analysis
A review on data mining techniques for Digital Mammographic Analysisijdmtaiir
 
Comparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face RecognitionComparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face Recognitionijdmtaiir
 
A Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data MiningA Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data Miningijdmtaiir
 
Analysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data MiningAnalysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data Miningijdmtaiir
 
Performance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User ProfilingPerformance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User Profilingijdmtaiir
 
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...ijdmtaiir
 
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...ijdmtaiir
 
An Analysis of Data Mining Applications for Fraud Detection in Securities Market
An Analysis of Data Mining Applications for Fraud Detection in Securities MarketAn Analysis of Data Mining Applications for Fraud Detection in Securities Market
An Analysis of Data Mining Applications for Fraud Detection in Securities Marketijdmtaiir
 
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...ijdmtaiir
 
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...ijdmtaiir
 
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...ijdmtaiir
 
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM MethodsA Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM Methodsijdmtaiir
 
Certain Investigation on Dynamic Clustering in Dynamic Datamining
Certain Investigation on Dynamic Clustering in Dynamic DataminingCertain Investigation on Dynamic Clustering in Dynamic Datamining
Certain Investigation on Dynamic Clustering in Dynamic Dataminingijdmtaiir
 
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...ijdmtaiir
 
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...ijdmtaiir
 
An Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
An Approach for the Detection of Vascular Abnormalities in Diabetic RetinopathyAn Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
An Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathyijdmtaiir
 
Improve the Performance of Clustering Using Combination of Multiple Clusterin...
Improve the Performance of Clustering Using Combination of Multiple Clusterin...Improve the Performance of Clustering Using Combination of Multiple Clusterin...
Improve the Performance of Clustering Using Combination of Multiple Clusterin...ijdmtaiir
 
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...ijdmtaiir
 
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)ijdmtaiir
 
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)ijdmtaiir
 

More from ijdmtaiir (20)

A review on data mining techniques for Digital Mammographic Analysis
A review on data mining techniques for Digital Mammographic AnalysisA review on data mining techniques for Digital Mammographic Analysis
A review on data mining techniques for Digital Mammographic Analysis
 
Comparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face RecognitionComparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face Recognition
 
A Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data MiningA Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data Mining
 
Analysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data MiningAnalysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data Mining
 
Performance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User ProfilingPerformance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User Profiling
 
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
 
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
 
An Analysis of Data Mining Applications for Fraud Detection in Securities Market
An Analysis of Data Mining Applications for Fraud Detection in Securities MarketAn Analysis of Data Mining Applications for Fraud Detection in Securities Market
An Analysis of Data Mining Applications for Fraud Detection in Securities Market
 
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
 
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
 
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
 
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM MethodsA Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
 
Certain Investigation on Dynamic Clustering in Dynamic Datamining
Certain Investigation on Dynamic Clustering in Dynamic DataminingCertain Investigation on Dynamic Clustering in Dynamic Datamining
Certain Investigation on Dynamic Clustering in Dynamic Datamining
 
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
 
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
 
An Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
An Approach for the Detection of Vascular Abnormalities in Diabetic RetinopathyAn Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
An Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
 
Improve the Performance of Clustering Using Combination of Multiple Clusterin...
Improve the Performance of Clustering Using Combination of Multiple Clusterin...Improve the Performance of Clustering Using Combination of Multiple Clusterin...
Improve the Performance of Clustering Using Combination of Multiple Clusterin...
 
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
 
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
 
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 

Recently uploaded (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Selection of Feature Regions Set for Digital Image Using Optimization Algorithm

  • 1. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 50 Selection of Feature Regions Set for Digital Image Using Optimization Algorithm Alpana A. Borse1 , Snehal M. Kamlapur2 1 PG Student, KKWIEER,Nasik, India 2 Associate Professor, KKWIEER,Nasik, India Email:alpana.borse@gmail.com, snehal_kamalapur@yahoo.com Abstract- A feature based “Selection of feature region set for digital image using Optimization Algorithm” is proposed here. The work is based on simulated attacking and optimization solving procedure. Image transformation techniques are used to extract local features. Simulated attacking procedure is performed to evaluate the robustness of every candidate feature region. According to the evaluation results, a track-with-pruning procedure I adopted to search a minimal primary feature set which may resists the most predefined attacks. In order to enhance its resistance capability against undefined attacks, primary feature set is then extended by adding some auxiliary feature regions in it. This work is formulated as a multidimensional knapsack problem and solved by optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization and Simulated Annealing. Keywords - Feature, optimization, robust, simulated attacks I. INTRODUCTION With the rapid development of internet, manipulation of data becomes easier. Application uses digital data including electronic advertising, real-time video and audio delivery, digital repositories and libraries, and Web publishing. This ease of access to digital data brings with itself the problem of copyright protection. It has been recognized that current copyright laws are not enough for dealing with digital data. This has led to an interest towards developing new copy prevention and protection mechanisms. Thus, increasing interest is based on robust regions set, using such robust regions one could keep their information secure. The existing methods do not imply higher robustness and may degrade the quality of the digital image against unknown attacks as characteristics of unknown attacks vary with known attacks. Thus, the difficulty is to obtain or select most robust feature region set for information hiding. The effectiveness of a digital image is indicated by the robustness of regions against various attacks. The robust regions are mainly used to sign copyright information of the digital work as robust regions can resist information after various kinds of attacks such as signal processing or geometric distortions. Thus it is necessary to work on following issues,  Finding the most robust region set of a digital image against various kinds of attacks for hiding information,  developing a faster robustness measurement  improving image quality So feature region set selection method based on optimization approaches, by which selection of the most robust regions without violating the image quality is proposed here. II. SYSTEM ARCHITECTURE The system architecture is as in “Figure 1”. There are two operational stages as Primary feature set searching stage and feature set extension stage respectively. 2.1 Primary Stage ( Searching Stage) The aim is to obtain primary feature region set. a. Extract features To extract local features, feature detectors are used. Feature detectors perform specific transformations on digital images to extract their local features, ranging from a point to an object, and have been adopted in many applications such as object recognition, database retrieval, and motion tracking. Most features of an image can be preserved after it suffers a distortion such as scaling, rotation, or illumination changes. Therefore, several feature-based methods have been developed by exploiting the robustness of feature regions against various attacks. Normally, feature selection according to a single criterion like corner response or the number of neighbouring feature points to obtain regions. Various corner detectors can be used to detect corners. Here, Harris – Laplace corner detector is used to obtain regions. “Figure 2” shows the regions detected by Harris – Laplace corner detector.
  • 2. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 Figure 1: System Architecture b. Simulated attacking and selection of non overlapping region set Since the magnitude of the region gets modified after attacks on region, it is preferred to select nonoverlapping regions to avoid major degradation of image quality.It is hard to accurately identify the robustness of all regions by a single criterion like the corner response. Therefore, this stage is based on simulated attacking. It would be helpful to find out the most robust regions if there is prior knowledge of each region’s attack resistance capability.Moreover, a feature region may have different degrees of robustness against different attacks [4], [8]. Regions obtained in “Figure 2” are survived with different predefined attacks. A few representative attacks are applied to the feature regions for evaluating their robustness in the simulated attacking phase. The attack resistance analysis phase is implemented by a two-step procedure. The original feature regions are first checked if they can be re-detected in the attacked image. The redetected region is examines the consistency (bit error) between itself after attacks. Using dr,a to indicate whether the region can resist the predefined attack or not, it is defined as Figure 2: Regions detected by Harris-Laplacian Corner detector dr, a = 1 BER(W,Wr) ≤ T 0 otherwise ……….. (1) Where, BER (I, Ia) denotes the bit error between original image I and image Ia after different attacks on it T a predefined bit error threshold In the final phase, the most robust and smallest set of nonoverlapping feature regions is selected according to the result of attack resistance analysis. This work is formulated as follows: R∗ = arg Rp ∑ min ; rk, rj ∈ Rp, k≠j --> rk∩ rj = Ø ……….(2) Where, Rp is the set of selected feature regions in which any two regions rk and rj are not overlapped, and The value of for a predefined attack is determined by = ………… (3) Where, R the Rp satisfying with the maximum Value of ai The selection would be such that, by the involvement of such region’s series, all predefined attacks on this series can be resisted As a result, a region set would be better in robustness when its regions can be complementary in attack resistance as many as possible. These results are obtained with the help of track with pruning algorithm. A track with pruning Algorithm Step 1: Initialize associated parameters and set the size of inspected feature region sets as NULL. Step 2: Check if the termination condition is satisfied. Step 3: while it cannot resist more attacks The candidate Set is included in the pruned set by adding more feature regions.
  • 3. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 52 Step 4: Otherwise Update the primary feature region set with a candidate feature region set if the latter can resist more attacks than the former. Step 5: Stop. In practice, the aggregate attack resistance capability of all selected nonoverlapping regions is more convincing, and it could be regarded as the overall robustness of a digital image.Sometimes this set may fail to resist some non predefined attacks, hence we need to add some auxiliary regions selected from those residual feature regions to enhance the robustness of image against undefined attacks under preserving its visual quality. Since the characteristics of undefined attacks are of wide variety and are difficult to model, we therefore adopt a multi-criteria optimization strategy [15], [16] for the selection of auxiliary feature regions. This phenomena of feature region selection method based on multi-criteria optimization strategy is described in stage 2. 2.2 Extended Stage (Optimization Stage) Neither corner response nor the number of its neighbouring feature points, however, can guarantee the selection of nonoverlapping regions with the maximum robustness to various attacks, because higher corner response and a large number of its neighbouring feature points do not always imply higher robustness of itself. Moreover, a feature region may have different degrees of robustness against different attacks [3], [5]. A feature region selection is optimized by optimization to obtain robust regions against unknown attacks occurs, as, a feature region may have different degrees of robustness against different kinds of attacks. To optimize the regions following optimization algorithms are used–  Genetic Algorithm (GA) [7], [8], [9]  Particle Swarm Optimization (PSO) [6], [9] and  Simulated Annealing (SA) [11] An optimal feature region set is chosen to resist the predefined attacks. But this set may fail to resist some non predefined attacks, we need to add some auxiliary regions selected from those residual feature regions to enhance the robustness of image against undefined attacks under preserving its visual quality. Since the characteristics of undefined attacks are of wide variety and are difficult to model, we therefore adopt a multi- criteria optimization strategy for the selection of auxiliary feature regions. First, the assumption that the feature regions which survive more types of predefined attacks are more likely to resist undefined attacks is applied. The symbol is defined to indicate the overall resistance degree of the region against all predefined attacks, and it is determined by = (dr1, a1 + dr1, a2 + ………..+ drn, aNa) = …………. (4) Where, dri, ai ε {0, 1} indicates if the region can resist the ith predefined attack ai and Na the total number of predefined attacks. The resistance of a region against a predefined attack is regarded as a possible characteristic of the region. The symbol ga r is the summary representation of Na characteristics of a region. Other two generic characteristics of feature regions, the corner response and the integration scale are referred, since we cannot exclude the possibility that there are undefined attacks with the characteristics never occurred in the predefined attacks. The parameter which denotes the limitation of quality degradation of an image after being attacked considered as peak signal-to-noise ratio (PSNR) value between a cover image and attacked image. Therefore, the work of the extension stage can be formulated as an optimization problem formulated as Multi Dimensional knapsack problem (MDKP) with multiple constraints as follows, Maximize ( + + ) | ∗| Srj …………. (5) Subject to | ∗| . Srj ≤ Qc , < 1 = 1,2,3,… , | ∗ | | ∗| ……....… (6) Where, ∗ The number of feature regions except those in the primary feature region set as well as the regions overlapped with them and is defined as, = 1 if the reggion ri is selected 0 otherwise ...… (7) The value of indicates whether the two regions are overlapped and is defined as
  • 4. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 53 = 1 ri ∩ rj ≠ Ǿ 0 otherwise ……… (8) The optimization problem formulated by 5 and 6 can be formulated as MDKP that is a knapsack problem with a collection of different constraints. A heuristic search procedure is adopted to solve this MDKP for determining the best choice of auxiliary feature regions. Hence, to solve this MDKP for determining the best choice of auxiliary feature regions and best choice of optimization algorithm we have used some optimization approaches such as GA, PSO, and SA. III. THE ALGORITHMIC FRAMEWORK OF GA, PSO AND SA i) Genetic Algorithm (GA) Generate initial population Do Calculate the fitness of each member // simulate another generation Do Select parents from current population Perform crossover add offspring to the new population while new population is not full Merge new population into the current population Mutate current population while not converged ii) Particle Swarm Optimization (PSO) Randomly generate an initial population Repeat for i = 1 to population_size do if f( Xi) < f( Pi) then Pi=Xi Pg = min (Pneighbours); for d =1 to dimensions do velocity_update(); position_update(); end end until termination criterion is met. iii. Simulated Annealing (SA) Function SIMULATED-ANNEALING(Problem, Schedule) returns a solution state Current = MAKE- REGION (INITIAL-SOLUTION [Problem]) For t = 1 to N do T = Schedule[t] // Index If T = 0 then return Current Next = a randomly selected successor of Current Cost = VALUE[Next] – VALUE[Current] if Cost > 0 then Current = Next else Current = Next only with probability exp(-Cost /T) End
  • 5. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 54 Comparing results of these different optimization techniques on feature region set, it determines the best choice of optimization techniques for selecting most robust region set under the constraint of preserving image quality and extracting feature regions in less amount of time. IV. EXPERIMENTALRESULTS System is implemented using Matlab. Results are obtained for test images. The systems implement Harris- Laplacian based robust region set selection. The corner response values are used to remove overlapping feature regions. TABLE 1 illustrates the comparisons, based on the criterion of detection ratio, defined as the ratio of the number successfully detected regions with respect to total number of regions in an image. TABLE I TABLE II and TABLE III gives results for regions, RN. Where RN  Region Number {3, 5, 6, 7, 8} TABLE II TABLE III As illustrated in TABLE II and III, this system enhances the robustness of the system of feature based methods against attacks. . “Figure 3” and “Figure 4” shows results of the proposed system. Image Jpeg 50 Jpeg 60 Rotate 15 Rotate 30 Median Gnoises LE 4/5 4/5 5/5 4/5 3/5 5/5 BA 3/6 5/6 6/6 4/6 6/6 6/6 FR 2/4 2/4 ¾ 1/4 1/4 4/4 RN JPEG 50 JPEG 60 Rotate 15 Rotate30 Median Filter Gnoises 3 1 1 1 1 1 1 5 0 0 1 1 0 1 6 1 1 1 0 0 1 7 1 1 1 1 1 1 8 1 1 1 1 1 1 RN Corner Response Attack Resistance Capability 3 49.2244 3 5 36.6759 3 6 38.1657 3 7 45.9059 3 8 44.7766 3
  • 6. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 V. CONCLUSIONS The aim behind “Selection of feature region set for digital image using Optimization Algorithm” is implying higher robustness of the digital image. This system is mainly based on simulated attacking and optimization solving procedure, for obtaining robust region set. It uses integration scale, corner response and attack’s resistance capability as performance parameters. Optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization and Simulated Annealing to optimize the regions are used. The results generated after comparing different optimization techniques, determines the best technique for selection of most robust region set under the constraints of preserving image quality and extracting feature region set in less amount of time. Thus, optimization based methods significantly improves the robustness of a digital image. Hence, this system is suitable for applications in which robustness of a digital image is primary key, such as, hiding information or prevention and protection of digital contents. TABLE IV illustrates the comparison of an optimization algorithm to optimized regions TABLE IV SN Terms GA PSO SA 1 Number of Lines More Few Few 2 Memory More Less Less 3 Time Less More More 4 Tuning of parameters Difficult Easiest Easiest 5 Structure Complex Simple Simple 6 Implementation Difficult Easy Easy Following figure shows regions after attacked on region. ‘a’ ‘b’ ‘c’ ‘d’ ‘e’ Figure 3: Attacked region Where, a : original region b : attacked region after – JPEG Attack c : attacked region after – ROTATE Attack d : attacked region after – Gnoises Attack e : attacked region after – Median Filter Attack Following images gives results of this system
  • 7. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 56 ‘a’ ‘b’ ‘c’ ‘d’ ‘e’ ‘f’ ‘g’ Figure 4: Results of “Selection of feature region set for digital image using Optimization Algorithm” Where, a: Original Image of Lina b: Image after applied Harris Laplace Corner c: Image before applying TWPA algorithm d: Image after applying TWPA algorithm e: Image obtained after applying GA f: Image obtained after applying PSO g: Image obtained after applying SA Detector Results: Number of Regions for optimization {7, 3, 5, 6, 8} Fig. ‘d’: Number of Regions obtained after GA {8, 3, 5} Fig. ‘e’: Number of Regions obtained after PSO {8, 3, 7} Fig. ‘f’: Number of Regions obtained after SA{8, 3} REFERENCES [1] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Kuo , “On the Selection Optimal Feature Region Set for Robust Digital Image Watermarking”, in IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011 [2] J. S. Tsai, W. B. Huang, C. L. Chen, and Y. H. Kuo, “A feature- based digital image watermarking for copyright protection and content authentication, "in Proc. IEEE Int. Conf. Image Process., Sep. 200, vol.5, pp. 469–472. [3] D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, Nov. 2004. [4] C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Mark Liao, “Cocktail watermarking for digital image protection,” IEEE Trans. Multimedia, vol. 2, no. 4, pp. 209–224, Dec. 2000. [5] J. S. Seo and C. D. Yoo, “Image watermarking based on invariant regions of scale-space representation,” [6] IEEE Trans. Signal Process., vol. 54, no. 4, pp. 1037–1049, Apr. 2006. [7] Konstantinos E. Parsopoulos, Michael N. Vrahatis, “ Particle Swarm Optimization for Constrained optimization Algorithms” research centre (UPAIRC), GR -26110, Patras, Greece [8] Riccardo Poli, William B. Langdon and Nicholas F. McPhee “A Field Guide to Genetic Programming” University of Essex – UK rpoli@essex.ac.uk [9] Golderberg, David E., Genetic Algorithms: in Search, Optimization & Machine Learning, Addison-Wesley Publishing Company, Inc., New York, 1989. [10] Sadiq M. Sait and Habib Youssef, Iterative Computer Algorithms with Application to Engineering: Solving Combinatorial Optimization Problems, IEEE Computer Society, LA, 1999. [11] George S. Tarasenko, Stochastic Optimization in the Soviet Union Random Search Algorithms, Delphic Associates, Inc., VA, 1985. [12] Duc Truong Pham and Dervis Karaboga, Intelligent Algorithms, tabu search, simulated annealing and neural networks, Springer, New York, 1998.