SlideShare a Scribd company logo
1 of 4
Download to read offline
Nikesh T. Gadare et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 2), February 2014, pp.07-10

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Image Enhancement and Background Detection Using
Morphological Transformation
Nikesh T. Gadare*, Dr. S. A. Ladhake**
* PG Student [Digital Electronics], Dept. of ECE, Sipna College of Engineering, Amravati, Maharashtra, India.
** Principal, Sipna College of Engineering & Technology, Amravati, Maharashtra, India

ABSTRACT
This paper deals with enhancement of images and background detection using Mathematical Morphological
[MM] theory on dark images. Due to poor lightening the background of the image is not clear. This image can be
enhanced by lightening the back ground with various morphological operations. Basically, Weber’s Law
Operator is used to analyze dark images which are carried out by two methods such as Image background
detection by block analysis while second operator utilize opening by reconstruction to define multi background
notion. Some Morphological operations such as (Erosion, Dilation, Compound operation such as Opening by
reconstruction, Erosion-Dilation method) and Block Analysis is used to detect the background of images.
Analysis of above mention methods illustrated through the processing of images with different dark background
images.
Keywords - Block Analysis, Erosion-dilation method, Opening by reconstruction, Opening operation, Weber’s
law notion.

I.

INTRODUCTION

In this Paper the concept is to detect the
background in images in poor lighting. Various
Mathematical Morphology [MM] is used to enhance
digital images with poor lighting condition.
Mathematical morphology approach is based on set
theoretic concepts of shape. In morphology, Objects
present in an image are treated as sets. There are
standard techniques like histogram equalization
histogram stretching for improving the poor contrast
of the degraded image. In the First method the
background images in poor lighting of grey level
images can identified by the use of morphological
operators. Lately image enhancement has been
carried out by the application based on Weber’s Law
[2]. Later on erosion, dilation, Opening (erosion
followed by dilation), closing (dilation followed by
erosion) and opening by reconstruction method is
followed. In this paper, firstly we give introduction
about various morphological operators and then we
apply them on a bad light image and extract the
background of that image and then improve contrast
of that image.[3]
1.1Morphology
Morphology is a technique of image
processing based on shapes. The value of each pixel
in the output image is based on a comparison of the
corresponding pixel in the input image with its
neighbours. By choosing the size and shape of the
neighbourhood, can construct a morphological
www.ijera.com

operation that is sensitive to specific shapes in the
input image. Mathematical morphology is a settheoretical approach to multi-dimensional digital
signal or image analysis, based on shape. It is a
theory and technique for the analysis and processing
of geometrical structures, based on set theory, lattice
theory, topology, and random functions. It is most
commonly applied to digital images, but it can be
employed as well on graphs, surface meshes, solids,
and many other spatial structures. It is also the
foundation of morphological image processing,
which consists of a set of operators that transform
images according to the above characterizations.
Mathematical morphology was originally developed
for binary images, and was later extended to scale
functions and images. The subsequent generalization
to complete lattices is widely accepted today as MM's
theoretical foundation.

II.

PROPOSED WORK

In this proposed work, background of the Image
compute through two approximations using Matlab.
The first approximations is block analysis, while the
second proposal, is morphological operations.
2.1Background Detection by Block Analysis:
In this analysis, first of all we will read an
image as input image with poor lighting condition
having dimension (N X N) and divide it into several
blocks (say ‘n’ block length)and from each block we

7|P age
Nikesh T. Gadare et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 2), February 2014, pp.07-10
will determine the background and apply the weber’s
law and thereby we obtain an enhanced image

fig. 2.1.1 Block diagram of Background Detection
by Block Analysis
For each analyzed block, maximum (Mi)
and minimum (mi) values are used to determine the
background criteria Ti in the following way:

www.ijera.com

Now an image is formed by applying the above
equation. Now consider a pixel in this image and the
corresponding pixel in original image. Combine them
using Weber’s law which can be stated as follows.
Thus an enhanced image is formed.
Weber’s Law:
Weber’s law defines contrast and introduces
the concept of Just-Noticeable difference [JND].
Weber’s law are more sensitive to light intensity
changes in low light levels than in strong ones. The
contrast sensitivity is approximately independent of
the background luminance. Relative changes in
luminance are important. Weber’s law tends to break
down for very dark and very bright luminance
levels[13]. In psycho-visual studies, the contrast C of
an object with luminance Lmax against its
surrounding luminance Lmin is defined as
follows[2][4].

Fig. 2.1.2. Background detection by Block Analys
Background image =
Fig.2.1.3 Weber’s law Analysis
Once τi is calculated, this value is used to select the
background parameter associated with the analyzed
block. As follows, an expression to enhance the
contrast is proposed:

Note that the background parameter depends
on the Ti value. If f<= τi (dark region), the
background parameter takes the value of the
maximum intensity(Mi) within the analyzed block,
and the minimum intensity(mi) value otherwise.
Also, the unit was added to the logarithm function in
above equation to avoid indetermination. On the
other hand, since grey level images are used in this
work, the constant Ki in above equation is obtained
as follows:

On the other hand, Mi. and mi values are
used as background parameters to improve the
contrast depending on the Ti value, due to the
background is different for clear and dark regions.
www.ijera.com

If L=Lmin and
as follows

so it can be written

In the above Equation
indicates that
is proportional to C. Therefore, Weber’s
law can be expressed as
Where k and b are constants, b being the
background. In this case, an approximation to
Weber’s law is considered by taking the luminance L
as the grey level intensity of a function (image); in
this way, above expression is written as follows
2.2 Background detection using morphological
operators:

fig. 2.2.1 Block diagram of Background Detection
by Erosion & Dilation
8|P age
Nikesh T. Gadare et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 2), February 2014, pp.07-10
Morphological operations:
In a morphological operation, the value of
each pixel in the output image is based on a
comparison of the corresponding pixel in the input
image with its neighbors. By choosing the size and
shape of the neighborhood, you can construct a
morphological operation that is sensitive to specific
shapes in the input image. Dilation and erosion are
two fundamental morphological operations. Dilation
adds pixels to the boundaries of objects in an image,
while erosion removes pixels on object boundaries.
The number of pixels added or removed from the
objects in an image depends on the size and shape of
the structuring element used to process the image.
Erosion and Dilation can also be interpreted in terms
of whether a structuring element (SE) hits or fits an
image (region) as follows
For Dilation, The resulting image g(x, y), given an
input image f(x, y) and a SE will be
For all x and y,
For Erosion, The resulting image g(x, y), given an
input image f(x, y) and a SE will be
For all x and y,
Morphological Operation

Fig.2.2.2(a) Original Image, Fig (b) Erosion
Operation on Image (a). Fig(c) Dilation on image
(b).

III.

IMAGE BACKGROUND
DETERMINATION USING THE
OPENING BY RECONSTRUCTION
Opening by reconstruction is used to define
multi background notion. Opening by reconstruction
requires removing pixels of the foreground from an
image by specified structuring element. It illustrates
through morphological transformations which
generate new contours when the structuring element
is increased and not necessarily need to apply block
analysis and morphological erosion and dilation.
When morphological erosion or dilation are used
with large sizes of to reveal the background,
inappropriate values may be obtained. However, in
MM, there is other class of transformations that
allows the filtering of the image without generating
new components; these transformations are called
transformations by reconstruction. In our case, the
www.ijera.com

www.ijera.com

opening by reconstruction is our choice because
touches the regional minima and merges regional
maxima. This characteristic allows the modification
of the altitude of regional maxima when the size of
the structuring element increases. This effect can be
used to detect the background criteria τ(x) i.e.,
When considering the opening by reconstruction to
detect the background, one further operation is
necessary to detect the local information given by
the original function (image extremes are contained
in the opening by reconstruction because of its
behavior). The morphological transformation
proposed for this task is the erosion size , µ=1i.e.
Given that the morphological erosion tends
to generate new information when the structuring
element is enlarged, in this study, the image
background was computed by using only the
morphological erosion size 1.
Structuring Elements:
The structuring element
is the basic
neighborhood
structure
associated
with
morphological image operation. It is usually
represented as a small matrix, whose shape and size
impact the result of applying a certain morphological
operator to an image.
An essential part of the
dilation and erosion operations is the structuring
element used to probe the input image. A structuring
element is a matrix consisting of only 0's and 1's that
can have any arbitrary shape and size. The pixels
with values of 1 define the neighborhood.Twodimensional, or flat, structuring elements are
typically much smaller than the image being
processed. The center pixel of the structuring
element, called the origin, identifies the pixel of
interest -- the pixel being processed. The pixels in the
structuring element containing 1's define the
neighborhood of the structuring element. These
pixels are also considered in dilation or erosion
processing.
Three-dimensional, or non-flat,
structuring elements use 0's and 1's to define the
extent of the structuring element in the x- and yplanes and add height values to define the third
dimension.
Origin of a Structuring Element:
The morphological functions use this code
to get the coordinates of the origin of structuring
elements of any size and dimension. If μ=3 then
structuring element is considered as strel=2μ +1.

9|P age
Nikesh T. Gadare et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 2), February 2014, pp.07-10
IV.

FLOW CHART
Start

Image Acquisition

[3]

Color space Conversion
[4]
Weber’s Law Notion
Operator
Image Enhancement

Plot & Analysis of Intensity
vs. Frequency Graph

[5]

[6]

Finish

[7]

V.

CONCLUSION

In this paper, Various methodologies is used
to detect background image with poor lighting
condition and to enhance the contrast in grey level
images with bad lighting based on Weber’s law
notion. Initially, Image enhancement is carried out by
simply block analysis later on , we give introduction
about basic concepts used in this Mathematical
methodology like Morphological operators (Dilation,
Erosion, Opening, and Closing ), contrast
enhancement operators. Then we provide various
steps to perform the methodology. Finally Opening
by reconstruction is used to analyze multi
background definition of images.
VI.
ACKNOWLEDGEMENTS
We would like to acknowledge the Faculties
of Electronics & Telecommunication Department,
Sipna College of Engineering and Technology,
Amravati for their support. I, Nikesh T. Gadare
specially want to thank my guide Dr. S.A. Ladhake
and Prof. P.D. Gawande for their guidance and
constant encouragement towards the work.

REFERENCES
Journal Papers:
[1]
Susanta
Mukhopadhyay,
Bhabatosh
Chanda,” A multiscale morphological
approach to local contrast enhancement
Signal Processing 80 (2000) 685}696”
[2]
Angélica R. Jiménez-Sánchez, Jorge D.
Mendiola-Santibañez, Iván R. TerolVillalobos, Gilberto Herrera-Ruíz, Damián
www.ijera.com

[8]

[9]

www.ijera.com

Vargas-Vázquez, Juan J. García-Escalante,
and Alberto Lara-Guevara, “Morphological
Background Detection and enhancement of
Images with Poor Lighting” IEEE Trans.
Image Process. 18(3), pp. 613-623 (2009)
Divya Madan,x` Susheel Kumar,“A New
Approach for Improvement of Dark Images”
, IJEEMF, Vol. 02, Issue 01, July 2012
ISSN: 2278-3989.
K.Narasimhan, C.R.Sudarsan, Nagarajan
Raju‖ “A Comparision of contrst
Enhancement
Techniques
in
poor
illuminated gray level and color images‖”,
in IJCA ,vol.24.no.2 , 2011.
K.Sreedhar and B.Panlal , Enhancement of
images using morphological transformation‖
.IJCS&IT, vol. 4, no. 1, 2012.
Priyanka*
Manoj
Arora**
“A
MORPHOLOGICAL OPERATOR BASED
APPROACH TO DETECT BACKGROUND
FROM DARKEN IMAGES” Vol. 1 | No. 1 |
July 2012 ISSN: 2278-6244
Vaishnavi* Dr. P. Eswaran “ Improved
Colour Image Enhancement Scheme using
Mathematical Morphology “,Volume 3,
Issue 4, April 2013 IJARCSSE.
V.
Karthikeyan*1,V.J.Vijayalakshmi*2,
P.Jeyakumar*3 A Novel Approach For The
Enrichment Of Digital Images Using
Morphological Operators International
Journal of Engineering Trends and
Technology- Volume4Issue3- 2013 ISSN:
2231-5381
Dharamvir, Morphological Detection in
Images International Conference on Current
Trends in Advanced Computing “ICCTAC2013”

Books:
[1]
A. K. Jain, Fundamentals of Digital Images
Processing. Englewood Cliffs, 1989.
[2]
C. R. González and E.Woods, Digital Image
Processing. Englewood Cliffs.
[3]
P. Soille, Morphological Image Analysis:
Principle and Applications. New York:
Springer-verlag 2003.
[4]
OGE MARQUES, ”Practical Image and
Video Processing using MATLAB” Wiley
Publication IEEE ISBN 978-0-470-048153(hard back)
[5]
C. A. Bouman: Digital Image Processing January 29, 2013.

10 | P a g e

More Related Content

What's hot

COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATIONCOLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATIONIAEME Publication
 
A study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithmsA study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithmsManje Gowda
 
Features for Cross Spectral Image Matching: A Survey
Features for Cross Spectral Image Matching: A SurveyFeatures for Cross Spectral Image Matching: A Survey
Features for Cross Spectral Image Matching: A SurveyjournalBEEI
 
A Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray ImagesA Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray ImagesIJERA Editor
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...IJECEIAES
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...eSAT Publishing House
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...eSAT Journals
 
Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...
Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...
Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...IOSR Journals
 
A New Method for Indoor-outdoor Image Classification Using Color Correlated T...
A New Method for Indoor-outdoor Image Classification Using Color Correlated T...A New Method for Indoor-outdoor Image Classification Using Color Correlated T...
A New Method for Indoor-outdoor Image Classification Using Color Correlated T...CSCJournals
 
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...IJMER
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital imagesRupesh Ambatwad
 
Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object trackingPriyanka Goswami
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...CSCJournals
 
Object based image enhancement
Object based image enhancementObject based image enhancement
Object based image enhancementijait
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forprjpublications
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...CSCJournals
 

What's hot (20)

COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATIONCOLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
 
A study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithmsA study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithms
 
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
 
Features for Cross Spectral Image Matching: A Survey
Features for Cross Spectral Image Matching: A SurveyFeatures for Cross Spectral Image Matching: A Survey
Features for Cross Spectral Image Matching: A Survey
 
A Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray ImagesA Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray Images
 
F045033337
F045033337F045033337
F045033337
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...
Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...
Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...
 
A New Method for Indoor-outdoor Image Classification Using Color Correlated T...
A New Method for Indoor-outdoor Image Classification Using Color Correlated T...A New Method for Indoor-outdoor Image Classification Using Color Correlated T...
A New Method for Indoor-outdoor Image Classification Using Color Correlated T...
 
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital images
 
Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object tracking
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
 
Object based image enhancement
Object based image enhancementObject based image enhancement
Object based image enhancement
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
N42018588
N42018588N42018588
N42018588
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 

Viewers also liked (20)

Ay4103315317
Ay4103315317Ay4103315317
Ay4103315317
 
R4103111114
R4103111114R4103111114
R4103111114
 
D41032632
D41032632D41032632
D41032632
 
At4103280291
At4103280291At4103280291
At4103280291
 
E41033336
E41033336E41033336
E41033336
 
Ai4103203205
Ai4103203205Ai4103203205
Ai4103203205
 
Bi4103375380
Bi4103375380Bi4103375380
Bi4103375380
 
Ap4103260265
Ap4103260265Ap4103260265
Ap4103260265
 
I41035057
I41035057I41035057
I41035057
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
 
Hx3513811385
Hx3513811385Hx3513811385
Hx3513811385
 
ATresume analyst
ATresume analystATresume analyst
ATresume analyst
 
Davidbrenda
DavidbrendaDavidbrenda
Davidbrenda
 
4GoodLife
4GoodLife4GoodLife
4GoodLife
 
Paseo virtual
Paseo virtualPaseo virtual
Paseo virtual
 
Expos7
Expos7Expos7
Expos7
 
Ta2011 liturgia de-lancamento
Ta2011 liturgia de-lancamentoTa2011 liturgia de-lancamento
Ta2011 liturgia de-lancamento
 
4 album de fotografias va
4 album de fotografias va4 album de fotografias va
4 album de fotografias va
 
Gabriel García Márquez
Gabriel García MárquezGabriel García Márquez
Gabriel García Márquez
 
Tutorial descarga de video
Tutorial descarga de videoTutorial descarga de video
Tutorial descarga de video
 

Similar to B42020710

V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
 
Content based image retrieval (cbir) using
Content based image retrieval (cbir) usingContent based image retrieval (cbir) using
Content based image retrieval (cbir) usingijcsity
 
Application of Image Retrieval Techniques to Understand Evolving Weather
Application of Image Retrieval Techniques to Understand Evolving WeatherApplication of Image Retrieval Techniques to Understand Evolving Weather
Application of Image Retrieval Techniques to Understand Evolving Weatherijsrd.com
 
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...cscpconf
 
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...CSCJournals
 
A03501001006
A03501001006A03501001006
A03501001006theijes
 
An Improved Way of Segmentation and Classification of Remote Sensing Images U...
An Improved Way of Segmentation and Classification of Remote Sensing Images U...An Improved Way of Segmentation and Classification of Remote Sensing Images U...
An Improved Way of Segmentation and Classification of Remote Sensing Images U...ijsrd.com
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposureiosrjce
 
Paper id 27201451
Paper id 27201451Paper id 27201451
Paper id 27201451IJRAT
 
IRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A ReviewIRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A ReviewIRJET Journal
 
Feature extraction based retrieval of
Feature extraction based retrieval ofFeature extraction based retrieval of
Feature extraction based retrieval ofijcsity
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...ijcsa
 

Similar to B42020710 (20)

V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
I010135760
I010135760I010135760
I010135760
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
Content based image retrieval (cbir) using
Content based image retrieval (cbir) usingContent based image retrieval (cbir) using
Content based image retrieval (cbir) using
 
Application of Image Retrieval Techniques to Understand Evolving Weather
Application of Image Retrieval Techniques to Understand Evolving WeatherApplication of Image Retrieval Techniques to Understand Evolving Weather
Application of Image Retrieval Techniques to Understand Evolving Weather
 
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
 
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
 
Ed34785790
Ed34785790Ed34785790
Ed34785790
 
A03501001006
A03501001006A03501001006
A03501001006
 
An Improved Way of Segmentation and Classification of Remote Sensing Images U...
An Improved Way of Segmentation and Classification of Remote Sensing Images U...An Improved Way of Segmentation and Classification of Remote Sensing Images U...
An Improved Way of Segmentation and Classification of Remote Sensing Images U...
 
Ijetcas14 372
Ijetcas14 372Ijetcas14 372
Ijetcas14 372
 
J017426467
J017426467J017426467
J017426467
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 
I010634450
I010634450I010634450
I010634450
 
IJET-V2I6P17
IJET-V2I6P17IJET-V2I6P17
IJET-V2I6P17
 
Paper id 27201451
Paper id 27201451Paper id 27201451
Paper id 27201451
 
Morpho
MorphoMorpho
Morpho
 
IRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A ReviewIRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A Review
 
Feature extraction based retrieval of
Feature extraction based retrieval ofFeature extraction based retrieval of
Feature extraction based retrieval of
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

B42020710

  • 1. Nikesh T. Gadare et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 2), February 2014, pp.07-10 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Image Enhancement and Background Detection Using Morphological Transformation Nikesh T. Gadare*, Dr. S. A. Ladhake** * PG Student [Digital Electronics], Dept. of ECE, Sipna College of Engineering, Amravati, Maharashtra, India. ** Principal, Sipna College of Engineering & Technology, Amravati, Maharashtra, India ABSTRACT This paper deals with enhancement of images and background detection using Mathematical Morphological [MM] theory on dark images. Due to poor lightening the background of the image is not clear. This image can be enhanced by lightening the back ground with various morphological operations. Basically, Weber’s Law Operator is used to analyze dark images which are carried out by two methods such as Image background detection by block analysis while second operator utilize opening by reconstruction to define multi background notion. Some Morphological operations such as (Erosion, Dilation, Compound operation such as Opening by reconstruction, Erosion-Dilation method) and Block Analysis is used to detect the background of images. Analysis of above mention methods illustrated through the processing of images with different dark background images. Keywords - Block Analysis, Erosion-dilation method, Opening by reconstruction, Opening operation, Weber’s law notion. I. INTRODUCTION In this Paper the concept is to detect the background in images in poor lighting. Various Mathematical Morphology [MM] is used to enhance digital images with poor lighting condition. Mathematical morphology approach is based on set theoretic concepts of shape. In morphology, Objects present in an image are treated as sets. There are standard techniques like histogram equalization histogram stretching for improving the poor contrast of the degraded image. In the First method the background images in poor lighting of grey level images can identified by the use of morphological operators. Lately image enhancement has been carried out by the application based on Weber’s Law [2]. Later on erosion, dilation, Opening (erosion followed by dilation), closing (dilation followed by erosion) and opening by reconstruction method is followed. In this paper, firstly we give introduction about various morphological operators and then we apply them on a bad light image and extract the background of that image and then improve contrast of that image.[3] 1.1Morphology Morphology is a technique of image processing based on shapes. The value of each pixel in the output image is based on a comparison of the corresponding pixel in the input image with its neighbours. By choosing the size and shape of the neighbourhood, can construct a morphological www.ijera.com operation that is sensitive to specific shapes in the input image. Mathematical morphology is a settheoretical approach to multi-dimensional digital signal or image analysis, based on shape. It is a theory and technique for the analysis and processing of geometrical structures, based on set theory, lattice theory, topology, and random functions. It is most commonly applied to digital images, but it can be employed as well on graphs, surface meshes, solids, and many other spatial structures. It is also the foundation of morphological image processing, which consists of a set of operators that transform images according to the above characterizations. Mathematical morphology was originally developed for binary images, and was later extended to scale functions and images. The subsequent generalization to complete lattices is widely accepted today as MM's theoretical foundation. II. PROPOSED WORK In this proposed work, background of the Image compute through two approximations using Matlab. The first approximations is block analysis, while the second proposal, is morphological operations. 2.1Background Detection by Block Analysis: In this analysis, first of all we will read an image as input image with poor lighting condition having dimension (N X N) and divide it into several blocks (say ‘n’ block length)and from each block we 7|P age
  • 2. Nikesh T. Gadare et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 2), February 2014, pp.07-10 will determine the background and apply the weber’s law and thereby we obtain an enhanced image fig. 2.1.1 Block diagram of Background Detection by Block Analysis For each analyzed block, maximum (Mi) and minimum (mi) values are used to determine the background criteria Ti in the following way: www.ijera.com Now an image is formed by applying the above equation. Now consider a pixel in this image and the corresponding pixel in original image. Combine them using Weber’s law which can be stated as follows. Thus an enhanced image is formed. Weber’s Law: Weber’s law defines contrast and introduces the concept of Just-Noticeable difference [JND]. Weber’s law are more sensitive to light intensity changes in low light levels than in strong ones. The contrast sensitivity is approximately independent of the background luminance. Relative changes in luminance are important. Weber’s law tends to break down for very dark and very bright luminance levels[13]. In psycho-visual studies, the contrast C of an object with luminance Lmax against its surrounding luminance Lmin is defined as follows[2][4]. Fig. 2.1.2. Background detection by Block Analys Background image = Fig.2.1.3 Weber’s law Analysis Once τi is calculated, this value is used to select the background parameter associated with the analyzed block. As follows, an expression to enhance the contrast is proposed: Note that the background parameter depends on the Ti value. If f<= τi (dark region), the background parameter takes the value of the maximum intensity(Mi) within the analyzed block, and the minimum intensity(mi) value otherwise. Also, the unit was added to the logarithm function in above equation to avoid indetermination. On the other hand, since grey level images are used in this work, the constant Ki in above equation is obtained as follows: On the other hand, Mi. and mi values are used as background parameters to improve the contrast depending on the Ti value, due to the background is different for clear and dark regions. www.ijera.com If L=Lmin and as follows so it can be written In the above Equation indicates that is proportional to C. Therefore, Weber’s law can be expressed as Where k and b are constants, b being the background. In this case, an approximation to Weber’s law is considered by taking the luminance L as the grey level intensity of a function (image); in this way, above expression is written as follows 2.2 Background detection using morphological operators: fig. 2.2.1 Block diagram of Background Detection by Erosion & Dilation 8|P age
  • 3. Nikesh T. Gadare et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 2), February 2014, pp.07-10 Morphological operations: In a morphological operation, the value of each pixel in the output image is based on a comparison of the corresponding pixel in the input image with its neighbors. By choosing the size and shape of the neighborhood, you can construct a morphological operation that is sensitive to specific shapes in the input image. Dilation and erosion are two fundamental morphological operations. Dilation adds pixels to the boundaries of objects in an image, while erosion removes pixels on object boundaries. The number of pixels added or removed from the objects in an image depends on the size and shape of the structuring element used to process the image. Erosion and Dilation can also be interpreted in terms of whether a structuring element (SE) hits or fits an image (region) as follows For Dilation, The resulting image g(x, y), given an input image f(x, y) and a SE will be For all x and y, For Erosion, The resulting image g(x, y), given an input image f(x, y) and a SE will be For all x and y, Morphological Operation Fig.2.2.2(a) Original Image, Fig (b) Erosion Operation on Image (a). Fig(c) Dilation on image (b). III. IMAGE BACKGROUND DETERMINATION USING THE OPENING BY RECONSTRUCTION Opening by reconstruction is used to define multi background notion. Opening by reconstruction requires removing pixels of the foreground from an image by specified structuring element. It illustrates through morphological transformations which generate new contours when the structuring element is increased and not necessarily need to apply block analysis and morphological erosion and dilation. When morphological erosion or dilation are used with large sizes of to reveal the background, inappropriate values may be obtained. However, in MM, there is other class of transformations that allows the filtering of the image without generating new components; these transformations are called transformations by reconstruction. In our case, the www.ijera.com www.ijera.com opening by reconstruction is our choice because touches the regional minima and merges regional maxima. This characteristic allows the modification of the altitude of regional maxima when the size of the structuring element increases. This effect can be used to detect the background criteria τ(x) i.e., When considering the opening by reconstruction to detect the background, one further operation is necessary to detect the local information given by the original function (image extremes are contained in the opening by reconstruction because of its behavior). The morphological transformation proposed for this task is the erosion size , µ=1i.e. Given that the morphological erosion tends to generate new information when the structuring element is enlarged, in this study, the image background was computed by using only the morphological erosion size 1. Structuring Elements: The structuring element is the basic neighborhood structure associated with morphological image operation. It is usually represented as a small matrix, whose shape and size impact the result of applying a certain morphological operator to an image. An essential part of the dilation and erosion operations is the structuring element used to probe the input image. A structuring element is a matrix consisting of only 0's and 1's that can have any arbitrary shape and size. The pixels with values of 1 define the neighborhood.Twodimensional, or flat, structuring elements are typically much smaller than the image being processed. The center pixel of the structuring element, called the origin, identifies the pixel of interest -- the pixel being processed. The pixels in the structuring element containing 1's define the neighborhood of the structuring element. These pixels are also considered in dilation or erosion processing. Three-dimensional, or non-flat, structuring elements use 0's and 1's to define the extent of the structuring element in the x- and yplanes and add height values to define the third dimension. Origin of a Structuring Element: The morphological functions use this code to get the coordinates of the origin of structuring elements of any size and dimension. If μ=3 then structuring element is considered as strel=2μ +1. 9|P age
  • 4. Nikesh T. Gadare et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 2), February 2014, pp.07-10 IV. FLOW CHART Start Image Acquisition [3] Color space Conversion [4] Weber’s Law Notion Operator Image Enhancement Plot & Analysis of Intensity vs. Frequency Graph [5] [6] Finish [7] V. CONCLUSION In this paper, Various methodologies is used to detect background image with poor lighting condition and to enhance the contrast in grey level images with bad lighting based on Weber’s law notion. Initially, Image enhancement is carried out by simply block analysis later on , we give introduction about basic concepts used in this Mathematical methodology like Morphological operators (Dilation, Erosion, Opening, and Closing ), contrast enhancement operators. Then we provide various steps to perform the methodology. Finally Opening by reconstruction is used to analyze multi background definition of images. VI. ACKNOWLEDGEMENTS We would like to acknowledge the Faculties of Electronics & Telecommunication Department, Sipna College of Engineering and Technology, Amravati for their support. I, Nikesh T. Gadare specially want to thank my guide Dr. S.A. Ladhake and Prof. P.D. Gawande for their guidance and constant encouragement towards the work. REFERENCES Journal Papers: [1] Susanta Mukhopadhyay, Bhabatosh Chanda,” A multiscale morphological approach to local contrast enhancement Signal Processing 80 (2000) 685}696” [2] Angélica R. Jiménez-Sánchez, Jorge D. Mendiola-Santibañez, Iván R. TerolVillalobos, Gilberto Herrera-Ruíz, Damián www.ijera.com [8] [9] www.ijera.com Vargas-Vázquez, Juan J. García-Escalante, and Alberto Lara-Guevara, “Morphological Background Detection and enhancement of Images with Poor Lighting” IEEE Trans. Image Process. 18(3), pp. 613-623 (2009) Divya Madan,x` Susheel Kumar,“A New Approach for Improvement of Dark Images” , IJEEMF, Vol. 02, Issue 01, July 2012 ISSN: 2278-3989. K.Narasimhan, C.R.Sudarsan, Nagarajan Raju‖ “A Comparision of contrst Enhancement Techniques in poor illuminated gray level and color images‖”, in IJCA ,vol.24.no.2 , 2011. K.Sreedhar and B.Panlal , Enhancement of images using morphological transformation‖ .IJCS&IT, vol. 4, no. 1, 2012. Priyanka* Manoj Arora** “A MORPHOLOGICAL OPERATOR BASED APPROACH TO DETECT BACKGROUND FROM DARKEN IMAGES” Vol. 1 | No. 1 | July 2012 ISSN: 2278-6244 Vaishnavi* Dr. P. Eswaran “ Improved Colour Image Enhancement Scheme using Mathematical Morphology “,Volume 3, Issue 4, April 2013 IJARCSSE. V. Karthikeyan*1,V.J.Vijayalakshmi*2, P.Jeyakumar*3 A Novel Approach For The Enrichment Of Digital Images Using Morphological Operators International Journal of Engineering Trends and Technology- Volume4Issue3- 2013 ISSN: 2231-5381 Dharamvir, Morphological Detection in Images International Conference on Current Trends in Advanced Computing “ICCTAC2013” Books: [1] A. K. Jain, Fundamentals of Digital Images Processing. Englewood Cliffs, 1989. [2] C. R. González and E.Woods, Digital Image Processing. Englewood Cliffs. [3] P. Soille, Morphological Image Analysis: Principle and Applications. New York: Springer-verlag 2003. [4] OGE MARQUES, ”Practical Image and Video Processing using MATLAB” Wiley Publication IEEE ISBN 978-0-470-048153(hard back) [5] C. A. Bouman: Digital Image Processing January 29, 2013. 10 | P a g e