SlideShare a Scribd company logo
1 of 12
Download to read offline
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
DOI:10.5121/ijitca.2013.3402 21
INTRODUCING THE CONCEPT OF BACK-
INKING AS AN EFFICIENT MODEL FOR
DOCUMENT RETRIEVAL
( IMAGE RECONSTRUCTION )
Mohammad A. ALGhalayini
Computer and Information Unit Director
Vice Rectorate for Graduate Studies and Scientific Research
King Saud University, Riyadh, Saudi Arabia
ABSTRACT
Today, many institutions and organizations are facing serious problem due to the tremendously increasing
size of documents, and this problem is further triggering the storage and retrieval problems due to the
continuously growing space and efficiency requirements. This increase in the size and number of
documents is becoming a complex problem in most offices. Therefore, there is a demand to address this
challenging problem. This can be met by developing a technique to enable specialized document imaging
people to use when there is a need for storing documents images. Thus, there is a need for an efficient
retrieval technique for this type of information retrieval (IR) systems.
In this paper, we present an efficient retrieval technique for electronic documents. TheBack-Inking concept
is proposed as an efficient technique for certain image formats. The use of this approach is a continuation
of the SIPA [32]approach which was presented in an earlier paper as an efficient method for document
storage,and as a result makes the image retrieval relatively efficient.
KEYWORDS
Information Pixels, Document Retrieval, Document Segmentation, Image Formats, Back-Inking
1. INTRODUCTION
By using SIPA technique, we learned how we can store the addresses of information pixels and
how it helps in minimizing the storage size of the image components. We also analyzed the time
consumed to convert an image from its respective format into an array of addresses.
There is a practical significance of this analysis. By converting an image into our format, we are
saving the image not as an array with pixel intensity values but as an array with the addresses of
information pixels. The time taken to convert the image into such an array is in reality the time
taken to save the image in our format. Analogously, if retrieving the image saved in our format is
the purpose, in reality we will be converting the array of addresses of information pixels into an
image. The time taken to open the image saved in our format must be equivalent to converting the
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
22
array into an image. In this research paper, we retrieve the image from the array of addresses by
applying a technique that we shall call "Back-Inking".
2. BACK-INKING ALGORITHM
As the name implies, in this technique, we work backwards and replace an information pixel to
where the address in the array points to. The addresses of information pixels are stored in the
array. Every row in the array is made up of 2 elements. The first element is a pointer that points to
the row and the second element is a pointer that points to a column. Together, they work as a 2-
dimansional pointer pointing to the original location of the information pixel in an image.
The algorithm places a black pixel at the address pointed by the array and the remaining pixels
are white.
The Back-Inking Algorithm does the following:
• An array of size (mX n) is formed with all values in it being 256. This represents an image
with all pixels white. Let us call it image R. Here m and n are the corresponding numbers
of rows and columns( the coordinates ) in the original image.
• The algorithm reads the first row in the array of addresses.It contains 2 elements.
• It points to the row in image R correspondingto the first element among the 2 values read.
• It then points to the column in image R corresponding to the second element among the 2
values read.
• This pixel formed by the row-column intersection of addresses is replaced with the value
0.
• The algorithm next reads the second row in the array of addresses and points to the pixel
corresponding to that address in image R. This pixel value is replaced by 0.
• The process repeats till the algorithm reads all rows in the array of addresses and replaces
the pixels in image R corresponding to those addresses by 0.
Example: Let us simulate this algorithm for a BMP image with 150 pixels per inch.
Step 1: Create an array of size (1327 X 1004) with each value in it being 256. This image is called
R.
This represents an image with intensity 256 all through. Hence the image is white. This is an
initialization process. We replace white pixels with black ones according to the address stored in
the array.
Step 2: The first element in the array of addresses corresponding to this image is read.
We have seen in previous research paper [32] that the array of addresses that corresponds to a
BMP image of 150 pixels per inch has a size of (43266 X 2). Let us call this array Array1. The
first row of the array gets read, that is, Array1(1,1) and Array1(1,2).
Array1 (1,1)=1; Array (1,2)=241;
Step 3: The algorithm points to the first row in image R.
This is because it points to the row in image R corresponding to the first element read, that is,
Array1 (1,1)=1.
Step 4: It then points to the 241st
column in image R.
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
23
This is because it points to the column in image R corresponding to the second element read, that
is,
Array1 (1,2)=241.
Step 5: The pixel formed by the row-column intersection in step 3 and in step 4 is replaced by a 0.
Intensity 0 corresponds to black. We have now replaced a black pixel at location (1,241).
Step 6: The same process repeats for each row of Array1 and hence all addresses present in
Array1 are replaced by a 0 in image R, that is, a black pixel in image R. We shall call this the
"Back-Inking Process".
3. MATLAB SIMULATION OF BACK-INKING ALGORITHM
Previously, we have used MATLAB to store the image in the form of an array of addresses. We
will now simulate the conversion of array of addresses into an image in MATLAB.A snippet of
the code that is used for reconstruction of the image is shown below.
% Start counter to keep a tab of the time
tic;
% Reconstructed array
Rearray=uint8(255*ones(m,n));
for l=1:lgth
rearray(Array(l,1),Array(l,2))=0;
end
figure(2)
imshow(rearray)
% End of time counter
toc;
1. Here tic and toc commands are used to keep a tab of the time. They return the time taken
to convert the array of addresses into an image.
2. Rearray=uint8(255*ones(m,n));
We initialize the reconstructed image (calledrearray) with all intensity values 255.
Here
m- Number of rows in the image;
n- Number of columns in the image;
ones (m,n) will create an array of size (m X n) with all values in it being 1.
255*ones(m,n) will multiply each value in the array ones (m,n) by 255. Hence each value in the
array is now initialized to 255.
uint 8 is a function used to convert numbers from any data type to the type- uint8. This is because
images are supposed to be in the form uint8 in MATLAB. uint8 has a range (0 – 255) which
matches the intensity range in 8-bit grayscale images.
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
24
1. for l=1:lgth
rearray(Array(l,1),Array(l,2))=0;
end
This part of the program is used to replace each pixel in the image rearraywith an intensity value
0. The address of the pixel is pointed by the array of addresses (called Array).
Here lgth= number of rows in the array.
The for loop:
for l=1:lgth
………
End
executes the statement within the loop #lgth number of times and in each iteration, the value of l
is incremented by 1. The start value of l is 1 and its stop value is #lgth.
The statement within the for loop is:
Rearray(Array(l,1),Array(l,2))=0
As explained in the example above, the initial value in the for loop is Array(1,1)=1 and
Array(1,2)=241.
Here, rearray(Array(l,1),Array(l,2)), i.e., rearray(1,241)=0;
For each iteration in the for loop, successive values of addresses stored in Array are read and the
corresponding values in rearray are replaced by 0. Since the for loop ends at l=lgth, the last
iteration is executed till the last element in Array is read and a 0 is replaced in its corresponding
location in the image.
2. Imshow(rearray) is used to display the reconstructed image.
The same snippet of code can be used for all image formats with different dpi and for both full
body segments of the scanned document image and the whole A4 scanned document image types.
For the same dpi, since the size of the full body image is smaller than that of an A4 size image;
the number of information pixels in a full body image is lesser, the size of its corresponding array
of addresses is smaller and hence it will take lesser time to be reconstructed into an image when
compared to its A4 counterpart.
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
25
Table ( 1 ) below shows the reconstruction time and the average viewable mark of the reconstructed images
for different resolutions of the Whole KSU Document images.
No
IMAGE
FORMAT
( TYPE )
IMAGE
RESOLUTION
( DPI )
IMAGE
RECONTRUCTION
TIME ( Seconds )
IMAGE
EVALUATION
POINTS ( 10 )
1
GIF
75 1.8223 6.2
2 100 1.6245 6.9
3 150 7.8764 8.9
4 200 23.4180 9.7
5
BMP
75 0.8154 7.8
6 100 1.7831 8.6
7 150 8.4214 9.2
8 200 24.2599 9.6
9
JPG
75 1.4210 5.9
10 100 3.6006 7.1
11 150 14.6970 8.6
12 200 59.8907 9.1
13
TIF
75 0.7510 6.3
14 100 1.5989 7.9
15 150 7.7328 8.9
16 200 19.2055 9.6
Table ( 1 )
4 . MATLAB CODES AND RECONSTRUCTED IMAGES
Now we are ready to see the MATLAB codes and reconstructed images for the examined image
types for different image resolutions for both the whole KSU A4 document and for the Full Body
Segment images.
The code below is the code for reconstructing ( Back-Inking ) the whole A4 Document ( .gif )
format image scanned with ( 150 ) dpi.
clear all; close all; clc;
tic;
RGBimage = imread( 'C:UsersALGhalayini_rn a4sizegiffull page 256 colors 8bit 150.gif ,
'gif' );
GRAYimage = RGBimage;
figure ( 1 ) ;
imshow ( GRAYimage ) ;
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
26
m = length ( GRAYimage ) ;
n = length ( GRAYimage ( 1 , : ) ) ;
total_pixels = m * n;
k = 1;
fori = 1 : m
for j = 1 : n
ifGRAYimage ( i , j ) < 128
Array1 ( 1 , k ) = i; Array2 ( 1 , k ) = j;
k = k + 1;
end
end
end
Array = [Array1' Array2'];
Toc
Table ( 2 ) below shows the reconstruction time and the average viewable mark of the reconstructed images
for different resolutions of the Full Body Segment Images.
No
IMAGE
FORMAT
( TYPE )
IMAGE
RESOLUTION
( DPI )
IMAGE
RECONTRUCTION
TIME ( Seconds )
IMAGE
EVALUATION
POINTS ( 10 )
1
GIF
75 0.6415 5.1
2 100 1.4724 6.8
3 150 6.1677 9.0
4 200 12.8715 9.7
5
BMP
75 0.7326 4.1
6 100 1.4580 5.9
7 150 6.1659 8.1
8 200 12.6825 9.1
9
JPG
75 0.7860 6.4
10 100 1.7775 7.1
11 150 6.8940 8.9
12 200 12.8280 9.8
13
TIF
75 0.6282 6.3
14 100 1.4001 7.1
15 150 6.1385 8.5
16 200 12.9299 9.2
Table ( 2 )
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
27
Figure ( 1 ) below shows the reconstructed Image after applying the Back-Inking Method the whole A4
Document ( .gif ) format image scanned with (150) dpi
Figure ( 1 )
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
28
The code below is the code for reconstructing ( Back-Inking ) the Full Body ( .tif ) format
image scanned with ( 150 ) dpi.
clear all; close all; clc;
tic;
RGBimage = imread( 'C:UsersALGhalayini_rn Fulltiffull page 256 colors 8bit 150.tif' , 'tif' ) ;
GRAYimage= rgb2gray ( RGBimage ) ;
figure ( 1 ) ;
imshow ( GRAYimage ( 454 : 1459 , 118 : 1122 ) );
m = length ( GRAYimage ) ;
n = length ( GRAYimage ( 1 , : ) ) ;
total_pixels = m * n;
k = 1;
fori = 454 : 1459
for j = 118 : 1122
ifGRAYimage ( i , j ) < 128
Array1 ( 1 , k ) = i; Array2 ( 1 , k ) = j;
k = k + 1;
end
end
end
Array = [Array1' Array2'];
Toc
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
29
Figure ( 2 ) below shows the reconstructed Image after applying the Back-Inking Method the Full Body
Segment ( .tif ) format image scanned with ( 150 ) dpi
Figure ( 2 )
5. CONCLUSION
Our goal in this research paper was to introduce the concept of Back-Inking which is the
procedure to retrieve the stored addresses of the Information pixels from the array and plot black
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
30
pixels back into the white page to reconstruct the whole image back, then display it to the user in
a relatively short time.
We observe that the reconstructed images for all formats are better in quality, in that, as the dpi
increases, the sharpness of the image increases. But as the dpi increases the time to reconstruct
the image also increases.Through applying this method, we came up with the following
conclusions:
• The time taken to retrieve an image in a specific format with lesser dpi is less than the
time taken to retrieve an image in the same format with larger dpi. Hence, this is a
time/complexity-quality tradeoff.
• Full body images of a specific format and dpi take lesser time to be executed than its A4
size image counterpart.
• Consideringthe above 2 factors, the complexity and time of image retrieval increases as
we move from 75 to 200 dpi. It takes lesser time to retrieve a full body segment scanned
image than an A4 scanned image. We can therefore conclude that using 150 dpi full body
segment scanned images produces an optimum result because :
• Retrieval of images with 150 dpi do not take as much time as images with 200 dpi;
• Retrieval of an image with 150 dpi is not as complex as an image with 200 dpi because
the number of information pixels are lesser in images with 150 dpi and hence lesser the
size of the array of addresses.
• The quality of images is certainly better than images with 75,100
References
[1] O. Lezoray and H. Cardot, “Cooperation of color classification schemes and color watershed: a study
for microscopic images,” IEEE Trans. on Image Processing, no. 7, vol. 11, 2002.
[2] D. Comaniciu, “Image segmentation using clustering with saddle point detection,” IEEE Int. Conf.
Image Processing (ICIP'02), Rochester, NY, Vol. 3, 297-300, 2002
[3] G. Herman, and B. Carvalho, “Multiseeded segmentation using fuzzy connectedness,” IEEE Tans. On
Pattern Analysis and Machine Intelligence, no. 5, vol. 23, May 2001.
[4] R. Nock, F. Nielsen, “Semi-supervised statistical region refinement for color image segmentation,”
Pattern Recognition no. 6 vol. 38 pp. 835-846, 2005.
[5] T. Lee, and M. Lewicki, “Unsupervised classification, segmentation, and enhancement using, ICA
mixture model,” IEEE Trans. Image Proc. No. 3 vol 11 pp. 270-279, 2002.
[6] H. Shah-Hosseini and R. Safabakhsh, “Automatic multilevel thresholding for image segmentation by
growing time adaptive self-organizing map,” IEEE Tans. On Pattern Analysis and Machine
Intelligence, no. 10, vol. 24, 2002.
[7] T. HORIUCHI, “Grayscale image segmentation using color space,” IEICE Transactions on
Information and Systems, E89-D(3) pp. 1231-1237, 2006.
[8] T. Horiuchi and S. Hirano, "Colorization algorithm for grayscale image by propagating seed pixels,"
Proc. IEEE ICIP 2003, pp.457–460, 2003.
[9] Y. Deng, and B. Manjunath, “Unsupervised segmentation of color-texture regions in image and
video,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no. 3, vol, 23, pp. 800-810, 2001.
[10] Z. Tu, and S. Zhu, “Image segmentation by data-driven markov chain montecarlo,” IEEE Tans. On
Pattern Analysis and Machine Intelligence, no 5, vol. 24, pp. 657-673, 2002.
[11] J. Rushing, H. Ranganth, T. Hinke, and S. Graves, “Image Segmentation using association rule
features,” IEEE Trans. on Image Processing, no. 5, vol. 11, 2002.
[12] M. Ozden, E. Polat, “A color image segmentation approach for content-based image retrieval,”
Pattern Recognition,vol. 40 , issue 4, pp. 1318-1325, 2007.
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
31
[13] S. Panda, P. Nanda, and P Mohapatra, “Multiresolution Approach for Color Image Segmentation
using MRF Model,” Proceedings of the National Conference on Smart Communication Technologies
and Industrial Informatics, SCTII, 03-04 pp. 34-42, Rourkela, Feb 2007.
[14] S. Kang, S. Park, Y. Shin, H. Yoo, and D. Jang, “Image segmentation using statistical approach via
perception-based color Information,” International Journal of Computer Science and Network
Security, no. 4, vol. 8 No.4, April 2008.
[15] Bocij, P. et al., Business information systems: Technology, development and management. (London:
Financial Times Management, 1999).
[16] Richard Casey, " Document Image Analysis", available
athttp://cslu.cse.ogi.edu/HLTsurvey/ch2node4.html
[17] H Bunke And P S P Wang, "Handbook Of Character Recognition And Document ImageAnalysis",
available at:http://www.worldscibooks.com/compsci/2757.html
[18] M Simone, " Document Image Analysis And Recognition" , available at
:http://www.dsi.unifi.it/~simone/DIAR/
[19] "Document Image Analysis",availableat:http://elib.cs.berkeley.edu/dia.html
[20] Richard Casey, " Document Image Analysis", available
at:http://cslu.cse.ogi.edu/HLTsurvey/ch2node4.html
[21] H Bunke And P S P Wang, "Handbook Of Character Recognition And Document Image Analysis",
available at :http://www.worldscibooks.com/compsci/2757.html
[22] M Simone, " Document Image Analysis And Recognition" http://www.dsi.unifi.it/~simone/DIAR/
[23] "Basic Images Processing" : "Some general commands related to handling Matlab graphics and
printing" "Simple image processing operations that you can do with Matlab" available at:
http://noodle.med.yale.edu/~papad/ta/handouts/matlab_image.html
[24] "Document Image Analysis" availableat :http://elib.cs.berkeley.edu/dia.html
[25] "Getting Started with MATLAB" available at
:http://www.stewart.cs.sdsu.edu/cs205/module7/getting6.html
[26] "Matlab Image Processing Toolbox" available at
:http://homepages.inf.ed.ac.uk/rbf/HIPR2/impmatl.htm
[27] Matlab Resources" available at :http://www.cse.uiuc.edu/heath/scicomp/matlab.htm
[28] "Read and Display an Image" available at
:http://www.mathworks.com/access/helpdesk/help/toolbox/images/getting8.html
[29] "Reading and displaying images" matlab toutorial",03/25/2005, available at
:http://ai.ucsd.edu/Tutorial/matlab.html#images
[30] ALGhalayini M., Shah A., "Introducing The ( POSSDI ) Process : The Process of Optimizing the
Selection of The Scanned Document Images". International Joint Conferences on Computer,
Information, Systems Sciences, and Engineering (CISSE 06) December 4 - 14, 2006.
[31] Mohammad A. ALGhalayini and ELQasemALNemah, “An Efficient Storage and Retrieval
Technique for Documents Using Symantec Document Segmentation (SDS) Approach”; CISSE 2007,
The Third International Joint Conferenceson Computer, Information, and Systems Sciences, and
Engineering (CISSE 07).
[32] Mohammad A. ALGhalayini “Introducing The Concept Of Information Pixels and the SIPA ( Storing
Information Pixels Addresses ) Method As a Model for Document Storage”; CISSE 2011, The
Seventh International Joint Conferenceson Computer, Information, and Systems Sciences, and
Engineering (CISSE 11).
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
32
AUTHOR
Mohammad A. ALGhalayini, Bs.C. in Computer Science and Mathematics, Iowa, USA.
1987. Ms.C. in Computer Science, Alabama, USA. 1999. Ph.D. in Information
Management Systems, London, UK. 2010.The author lectured at the College of
Information & Computer Sciences of King Saud University, KSA for more than 14 years.
Specialized in document management and databases, the author developed several
imaging database systems for various KSU offices and departments, currently working as an academic
researcherand supervisor of computer and Information unit at the KSU Vice Rectorate of Graduate Studies
and scientific Research.

More Related Content

What's hot

"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”Er. Arpit Sharma
 
Design of Low Power Vedic Multiplier Based on Reversible Logic
Design of Low Power Vedic Multiplier Based on Reversible LogicDesign of Low Power Vedic Multiplier Based on Reversible Logic
Design of Low Power Vedic Multiplier Based on Reversible LogicIJERA Editor
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIMETHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIijcsit
 
IRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET Journal
 
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...VIT-AP University
 
Feed forward neural network for sine
Feed forward neural network for sineFeed forward neural network for sine
Feed forward neural network for sineijcsa
 
Principal component analysis and lda
Principal component analysis and ldaPrincipal component analysis and lda
Principal component analysis and ldaSuresh Pokharel
 
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
 Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul... Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...ijsrd.com
 
Fpga implementation of vedic multiplier
Fpga implementation of vedic multiplierFpga implementation of vedic multiplier
Fpga implementation of vedic multiplierIAEME Publication
 
Images in matlab
Images in matlabImages in matlab
Images in matlabAli Alvi
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm foreSAT Publishing House
 
5/3 Lifting Scheme Approach for Image Interpolation
5/3 Lifting Scheme Approach for Image Interpolation5/3 Lifting Scheme Approach for Image Interpolation
5/3 Lifting Scheme Approach for Image InterpolationIOSRJECE
 
Dimensionality reduction
Dimensionality reductionDimensionality reduction
Dimensionality reductionShatakirti Er
 
An Introduction Linear Algebra for Neural Networks and Deep learning
An Introduction Linear Algebra for Neural Networks and Deep learningAn Introduction Linear Algebra for Neural Networks and Deep learning
An Introduction Linear Algebra for Neural Networks and Deep learningChetan Khatri
 

What's hot (17)

"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
 
Design of Low Power Vedic Multiplier Based on Reversible Logic
Design of Low Power Vedic Multiplier Based on Reversible LogicDesign of Low Power Vedic Multiplier Based on Reversible Logic
Design of Low Power Vedic Multiplier Based on Reversible Logic
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIMETHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
 
IRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo Camera
 
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
 
Feed forward neural network for sine
Feed forward neural network for sineFeed forward neural network for sine
Feed forward neural network for sine
 
Principal component analysis and lda
Principal component analysis and ldaPrincipal component analysis and lda
Principal component analysis and lda
 
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
 Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul... Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
 
Fpga implementation of vedic multiplier
Fpga implementation of vedic multiplierFpga implementation of vedic multiplier
Fpga implementation of vedic multiplier
 
Matlab Working With Images
Matlab Working With ImagesMatlab Working With Images
Matlab Working With Images
 
Images in matlab
Images in matlabImages in matlab
Images in matlab
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm for
 
5/3 Lifting Scheme Approach for Image Interpolation
5/3 Lifting Scheme Approach for Image Interpolation5/3 Lifting Scheme Approach for Image Interpolation
5/3 Lifting Scheme Approach for Image Interpolation
 
Pca ankita dubey
Pca ankita dubeyPca ankita dubey
Pca ankita dubey
 
Dimensionality reduction
Dimensionality reductionDimensionality reduction
Dimensionality reduction
 
An Introduction Linear Algebra for Neural Networks and Deep learning
An Introduction Linear Algebra for Neural Networks and Deep learningAn Introduction Linear Algebra for Neural Networks and Deep learning
An Introduction Linear Algebra for Neural Networks and Deep learning
 

Similar to INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATION PIXELS ADDRESSES) METHOD AS AN EFFICIENT MODEL FOR DOCUMENT STORAGE

A comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrievalA comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrievalcsandit
 
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALA COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALcscpconf
 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devicescsandit
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Simple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionSimple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionAnish Patel
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...IJERA Editor
 
A Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrievalA Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrievalIOSR Journals
 
ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013Ashish Gupta
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
 
0 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-50 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-5Alexander Decker
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014ijcsbi
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based patternijcsit
 
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...IRJET Journal
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
A Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval SystemA Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval SystemIOSR Journals
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...IJERA Editor
 

Similar to INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATION PIXELS ADDRESSES) METHOD AS AN EFFICIENT MODEL FOR DOCUMENT STORAGE (20)

A comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrievalA comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrieval
 
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALA COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devices
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Simple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionSimple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer Vision
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
 
mini prjt
mini prjtmini prjt
mini prjt
 
A Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrievalA Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrieval
 
ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013
 
I010135760
I010135760I010135760
I010135760
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
0 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-50 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-5
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based pattern
 
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
A Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval SystemA Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval System
 
N018219199
N018219199N018219199
N018219199
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
 

More from IJITCA Journal

The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
2 nd International Conference on Soft Computing, Data mining and Data Scienc...
2 nd International Conference on Soft Computing, Data mining and Data  Scienc...2 nd International Conference on Soft Computing, Data mining and Data  Scienc...
2 nd International Conference on Soft Computing, Data mining and Data Scienc...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)IJITCA Journal
 

More from IJITCA Journal (20)

The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
2 nd International Conference on Soft Computing, Data mining and Data Scienc...
2 nd International Conference on Soft Computing, Data mining and Data  Scienc...2 nd International Conference on Soft Computing, Data mining and Data  Scienc...
2 nd International Conference on Soft Computing, Data mining and Data Scienc...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATION PIXELS ADDRESSES) METHOD AS AN EFFICIENT MODEL FOR DOCUMENT STORAGE

  • 1. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 DOI:10.5121/ijitca.2013.3402 21 INTRODUCING THE CONCEPT OF BACK- INKING AS AN EFFICIENT MODEL FOR DOCUMENT RETRIEVAL ( IMAGE RECONSTRUCTION ) Mohammad A. ALGhalayini Computer and Information Unit Director Vice Rectorate for Graduate Studies and Scientific Research King Saud University, Riyadh, Saudi Arabia ABSTRACT Today, many institutions and organizations are facing serious problem due to the tremendously increasing size of documents, and this problem is further triggering the storage and retrieval problems due to the continuously growing space and efficiency requirements. This increase in the size and number of documents is becoming a complex problem in most offices. Therefore, there is a demand to address this challenging problem. This can be met by developing a technique to enable specialized document imaging people to use when there is a need for storing documents images. Thus, there is a need for an efficient retrieval technique for this type of information retrieval (IR) systems. In this paper, we present an efficient retrieval technique for electronic documents. TheBack-Inking concept is proposed as an efficient technique for certain image formats. The use of this approach is a continuation of the SIPA [32]approach which was presented in an earlier paper as an efficient method for document storage,and as a result makes the image retrieval relatively efficient. KEYWORDS Information Pixels, Document Retrieval, Document Segmentation, Image Formats, Back-Inking 1. INTRODUCTION By using SIPA technique, we learned how we can store the addresses of information pixels and how it helps in minimizing the storage size of the image components. We also analyzed the time consumed to convert an image from its respective format into an array of addresses. There is a practical significance of this analysis. By converting an image into our format, we are saving the image not as an array with pixel intensity values but as an array with the addresses of information pixels. The time taken to convert the image into such an array is in reality the time taken to save the image in our format. Analogously, if retrieving the image saved in our format is the purpose, in reality we will be converting the array of addresses of information pixels into an image. The time taken to open the image saved in our format must be equivalent to converting the
  • 2. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 22 array into an image. In this research paper, we retrieve the image from the array of addresses by applying a technique that we shall call "Back-Inking". 2. BACK-INKING ALGORITHM As the name implies, in this technique, we work backwards and replace an information pixel to where the address in the array points to. The addresses of information pixels are stored in the array. Every row in the array is made up of 2 elements. The first element is a pointer that points to the row and the second element is a pointer that points to a column. Together, they work as a 2- dimansional pointer pointing to the original location of the information pixel in an image. The algorithm places a black pixel at the address pointed by the array and the remaining pixels are white. The Back-Inking Algorithm does the following: • An array of size (mX n) is formed with all values in it being 256. This represents an image with all pixels white. Let us call it image R. Here m and n are the corresponding numbers of rows and columns( the coordinates ) in the original image. • The algorithm reads the first row in the array of addresses.It contains 2 elements. • It points to the row in image R correspondingto the first element among the 2 values read. • It then points to the column in image R corresponding to the second element among the 2 values read. • This pixel formed by the row-column intersection of addresses is replaced with the value 0. • The algorithm next reads the second row in the array of addresses and points to the pixel corresponding to that address in image R. This pixel value is replaced by 0. • The process repeats till the algorithm reads all rows in the array of addresses and replaces the pixels in image R corresponding to those addresses by 0. Example: Let us simulate this algorithm for a BMP image with 150 pixels per inch. Step 1: Create an array of size (1327 X 1004) with each value in it being 256. This image is called R. This represents an image with intensity 256 all through. Hence the image is white. This is an initialization process. We replace white pixels with black ones according to the address stored in the array. Step 2: The first element in the array of addresses corresponding to this image is read. We have seen in previous research paper [32] that the array of addresses that corresponds to a BMP image of 150 pixels per inch has a size of (43266 X 2). Let us call this array Array1. The first row of the array gets read, that is, Array1(1,1) and Array1(1,2). Array1 (1,1)=1; Array (1,2)=241; Step 3: The algorithm points to the first row in image R. This is because it points to the row in image R corresponding to the first element read, that is, Array1 (1,1)=1. Step 4: It then points to the 241st column in image R.
  • 3. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 23 This is because it points to the column in image R corresponding to the second element read, that is, Array1 (1,2)=241. Step 5: The pixel formed by the row-column intersection in step 3 and in step 4 is replaced by a 0. Intensity 0 corresponds to black. We have now replaced a black pixel at location (1,241). Step 6: The same process repeats for each row of Array1 and hence all addresses present in Array1 are replaced by a 0 in image R, that is, a black pixel in image R. We shall call this the "Back-Inking Process". 3. MATLAB SIMULATION OF BACK-INKING ALGORITHM Previously, we have used MATLAB to store the image in the form of an array of addresses. We will now simulate the conversion of array of addresses into an image in MATLAB.A snippet of the code that is used for reconstruction of the image is shown below. % Start counter to keep a tab of the time tic; % Reconstructed array Rearray=uint8(255*ones(m,n)); for l=1:lgth rearray(Array(l,1),Array(l,2))=0; end figure(2) imshow(rearray) % End of time counter toc; 1. Here tic and toc commands are used to keep a tab of the time. They return the time taken to convert the array of addresses into an image. 2. Rearray=uint8(255*ones(m,n)); We initialize the reconstructed image (calledrearray) with all intensity values 255. Here m- Number of rows in the image; n- Number of columns in the image; ones (m,n) will create an array of size (m X n) with all values in it being 1. 255*ones(m,n) will multiply each value in the array ones (m,n) by 255. Hence each value in the array is now initialized to 255. uint 8 is a function used to convert numbers from any data type to the type- uint8. This is because images are supposed to be in the form uint8 in MATLAB. uint8 has a range (0 – 255) which matches the intensity range in 8-bit grayscale images.
  • 4. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 24 1. for l=1:lgth rearray(Array(l,1),Array(l,2))=0; end This part of the program is used to replace each pixel in the image rearraywith an intensity value 0. The address of the pixel is pointed by the array of addresses (called Array). Here lgth= number of rows in the array. The for loop: for l=1:lgth ……… End executes the statement within the loop #lgth number of times and in each iteration, the value of l is incremented by 1. The start value of l is 1 and its stop value is #lgth. The statement within the for loop is: Rearray(Array(l,1),Array(l,2))=0 As explained in the example above, the initial value in the for loop is Array(1,1)=1 and Array(1,2)=241. Here, rearray(Array(l,1),Array(l,2)), i.e., rearray(1,241)=0; For each iteration in the for loop, successive values of addresses stored in Array are read and the corresponding values in rearray are replaced by 0. Since the for loop ends at l=lgth, the last iteration is executed till the last element in Array is read and a 0 is replaced in its corresponding location in the image. 2. Imshow(rearray) is used to display the reconstructed image. The same snippet of code can be used for all image formats with different dpi and for both full body segments of the scanned document image and the whole A4 scanned document image types. For the same dpi, since the size of the full body image is smaller than that of an A4 size image; the number of information pixels in a full body image is lesser, the size of its corresponding array of addresses is smaller and hence it will take lesser time to be reconstructed into an image when compared to its A4 counterpart.
  • 5. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 25 Table ( 1 ) below shows the reconstruction time and the average viewable mark of the reconstructed images for different resolutions of the Whole KSU Document images. No IMAGE FORMAT ( TYPE ) IMAGE RESOLUTION ( DPI ) IMAGE RECONTRUCTION TIME ( Seconds ) IMAGE EVALUATION POINTS ( 10 ) 1 GIF 75 1.8223 6.2 2 100 1.6245 6.9 3 150 7.8764 8.9 4 200 23.4180 9.7 5 BMP 75 0.8154 7.8 6 100 1.7831 8.6 7 150 8.4214 9.2 8 200 24.2599 9.6 9 JPG 75 1.4210 5.9 10 100 3.6006 7.1 11 150 14.6970 8.6 12 200 59.8907 9.1 13 TIF 75 0.7510 6.3 14 100 1.5989 7.9 15 150 7.7328 8.9 16 200 19.2055 9.6 Table ( 1 ) 4 . MATLAB CODES AND RECONSTRUCTED IMAGES Now we are ready to see the MATLAB codes and reconstructed images for the examined image types for different image resolutions for both the whole KSU A4 document and for the Full Body Segment images. The code below is the code for reconstructing ( Back-Inking ) the whole A4 Document ( .gif ) format image scanned with ( 150 ) dpi. clear all; close all; clc; tic; RGBimage = imread( 'C:UsersALGhalayini_rn a4sizegiffull page 256 colors 8bit 150.gif , 'gif' ); GRAYimage = RGBimage; figure ( 1 ) ; imshow ( GRAYimage ) ;
  • 6. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 26 m = length ( GRAYimage ) ; n = length ( GRAYimage ( 1 , : ) ) ; total_pixels = m * n; k = 1; fori = 1 : m for j = 1 : n ifGRAYimage ( i , j ) < 128 Array1 ( 1 , k ) = i; Array2 ( 1 , k ) = j; k = k + 1; end end end Array = [Array1' Array2']; Toc Table ( 2 ) below shows the reconstruction time and the average viewable mark of the reconstructed images for different resolutions of the Full Body Segment Images. No IMAGE FORMAT ( TYPE ) IMAGE RESOLUTION ( DPI ) IMAGE RECONTRUCTION TIME ( Seconds ) IMAGE EVALUATION POINTS ( 10 ) 1 GIF 75 0.6415 5.1 2 100 1.4724 6.8 3 150 6.1677 9.0 4 200 12.8715 9.7 5 BMP 75 0.7326 4.1 6 100 1.4580 5.9 7 150 6.1659 8.1 8 200 12.6825 9.1 9 JPG 75 0.7860 6.4 10 100 1.7775 7.1 11 150 6.8940 8.9 12 200 12.8280 9.8 13 TIF 75 0.6282 6.3 14 100 1.4001 7.1 15 150 6.1385 8.5 16 200 12.9299 9.2 Table ( 2 )
  • 7. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 27 Figure ( 1 ) below shows the reconstructed Image after applying the Back-Inking Method the whole A4 Document ( .gif ) format image scanned with (150) dpi Figure ( 1 )
  • 8. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 28 The code below is the code for reconstructing ( Back-Inking ) the Full Body ( .tif ) format image scanned with ( 150 ) dpi. clear all; close all; clc; tic; RGBimage = imread( 'C:UsersALGhalayini_rn Fulltiffull page 256 colors 8bit 150.tif' , 'tif' ) ; GRAYimage= rgb2gray ( RGBimage ) ; figure ( 1 ) ; imshow ( GRAYimage ( 454 : 1459 , 118 : 1122 ) ); m = length ( GRAYimage ) ; n = length ( GRAYimage ( 1 , : ) ) ; total_pixels = m * n; k = 1; fori = 454 : 1459 for j = 118 : 1122 ifGRAYimage ( i , j ) < 128 Array1 ( 1 , k ) = i; Array2 ( 1 , k ) = j; k = k + 1; end end end Array = [Array1' Array2']; Toc
  • 9. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 29 Figure ( 2 ) below shows the reconstructed Image after applying the Back-Inking Method the Full Body Segment ( .tif ) format image scanned with ( 150 ) dpi Figure ( 2 ) 5. CONCLUSION Our goal in this research paper was to introduce the concept of Back-Inking which is the procedure to retrieve the stored addresses of the Information pixels from the array and plot black
  • 10. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 30 pixels back into the white page to reconstruct the whole image back, then display it to the user in a relatively short time. We observe that the reconstructed images for all formats are better in quality, in that, as the dpi increases, the sharpness of the image increases. But as the dpi increases the time to reconstruct the image also increases.Through applying this method, we came up with the following conclusions: • The time taken to retrieve an image in a specific format with lesser dpi is less than the time taken to retrieve an image in the same format with larger dpi. Hence, this is a time/complexity-quality tradeoff. • Full body images of a specific format and dpi take lesser time to be executed than its A4 size image counterpart. • Consideringthe above 2 factors, the complexity and time of image retrieval increases as we move from 75 to 200 dpi. It takes lesser time to retrieve a full body segment scanned image than an A4 scanned image. We can therefore conclude that using 150 dpi full body segment scanned images produces an optimum result because : • Retrieval of images with 150 dpi do not take as much time as images with 200 dpi; • Retrieval of an image with 150 dpi is not as complex as an image with 200 dpi because the number of information pixels are lesser in images with 150 dpi and hence lesser the size of the array of addresses. • The quality of images is certainly better than images with 75,100 References [1] O. Lezoray and H. Cardot, “Cooperation of color classification schemes and color watershed: a study for microscopic images,” IEEE Trans. on Image Processing, no. 7, vol. 11, 2002. [2] D. Comaniciu, “Image segmentation using clustering with saddle point detection,” IEEE Int. Conf. Image Processing (ICIP'02), Rochester, NY, Vol. 3, 297-300, 2002 [3] G. Herman, and B. Carvalho, “Multiseeded segmentation using fuzzy connectedness,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no. 5, vol. 23, May 2001. [4] R. Nock, F. Nielsen, “Semi-supervised statistical region refinement for color image segmentation,” Pattern Recognition no. 6 vol. 38 pp. 835-846, 2005. [5] T. Lee, and M. Lewicki, “Unsupervised classification, segmentation, and enhancement using, ICA mixture model,” IEEE Trans. Image Proc. No. 3 vol 11 pp. 270-279, 2002. [6] H. Shah-Hosseini and R. Safabakhsh, “Automatic multilevel thresholding for image segmentation by growing time adaptive self-organizing map,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no. 10, vol. 24, 2002. [7] T. HORIUCHI, “Grayscale image segmentation using color space,” IEICE Transactions on Information and Systems, E89-D(3) pp. 1231-1237, 2006. [8] T. Horiuchi and S. Hirano, "Colorization algorithm for grayscale image by propagating seed pixels," Proc. IEEE ICIP 2003, pp.457–460, 2003. [9] Y. Deng, and B. Manjunath, “Unsupervised segmentation of color-texture regions in image and video,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no. 3, vol, 23, pp. 800-810, 2001. [10] Z. Tu, and S. Zhu, “Image segmentation by data-driven markov chain montecarlo,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no 5, vol. 24, pp. 657-673, 2002. [11] J. Rushing, H. Ranganth, T. Hinke, and S. Graves, “Image Segmentation using association rule features,” IEEE Trans. on Image Processing, no. 5, vol. 11, 2002. [12] M. Ozden, E. Polat, “A color image segmentation approach for content-based image retrieval,” Pattern Recognition,vol. 40 , issue 4, pp. 1318-1325, 2007.
  • 11. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 31 [13] S. Panda, P. Nanda, and P Mohapatra, “Multiresolution Approach for Color Image Segmentation using MRF Model,” Proceedings of the National Conference on Smart Communication Technologies and Industrial Informatics, SCTII, 03-04 pp. 34-42, Rourkela, Feb 2007. [14] S. Kang, S. Park, Y. Shin, H. Yoo, and D. Jang, “Image segmentation using statistical approach via perception-based color Information,” International Journal of Computer Science and Network Security, no. 4, vol. 8 No.4, April 2008. [15] Bocij, P. et al., Business information systems: Technology, development and management. (London: Financial Times Management, 1999). [16] Richard Casey, " Document Image Analysis", available athttp://cslu.cse.ogi.edu/HLTsurvey/ch2node4.html [17] H Bunke And P S P Wang, "Handbook Of Character Recognition And Document ImageAnalysis", available at:http://www.worldscibooks.com/compsci/2757.html [18] M Simone, " Document Image Analysis And Recognition" , available at :http://www.dsi.unifi.it/~simone/DIAR/ [19] "Document Image Analysis",availableat:http://elib.cs.berkeley.edu/dia.html [20] Richard Casey, " Document Image Analysis", available at:http://cslu.cse.ogi.edu/HLTsurvey/ch2node4.html [21] H Bunke And P S P Wang, "Handbook Of Character Recognition And Document Image Analysis", available at :http://www.worldscibooks.com/compsci/2757.html [22] M Simone, " Document Image Analysis And Recognition" http://www.dsi.unifi.it/~simone/DIAR/ [23] "Basic Images Processing" : "Some general commands related to handling Matlab graphics and printing" "Simple image processing operations that you can do with Matlab" available at: http://noodle.med.yale.edu/~papad/ta/handouts/matlab_image.html [24] "Document Image Analysis" availableat :http://elib.cs.berkeley.edu/dia.html [25] "Getting Started with MATLAB" available at :http://www.stewart.cs.sdsu.edu/cs205/module7/getting6.html [26] "Matlab Image Processing Toolbox" available at :http://homepages.inf.ed.ac.uk/rbf/HIPR2/impmatl.htm [27] Matlab Resources" available at :http://www.cse.uiuc.edu/heath/scicomp/matlab.htm [28] "Read and Display an Image" available at :http://www.mathworks.com/access/helpdesk/help/toolbox/images/getting8.html [29] "Reading and displaying images" matlab toutorial",03/25/2005, available at :http://ai.ucsd.edu/Tutorial/matlab.html#images [30] ALGhalayini M., Shah A., "Introducing The ( POSSDI ) Process : The Process of Optimizing the Selection of The Scanned Document Images". International Joint Conferences on Computer, Information, Systems Sciences, and Engineering (CISSE 06) December 4 - 14, 2006. [31] Mohammad A. ALGhalayini and ELQasemALNemah, “An Efficient Storage and Retrieval Technique for Documents Using Symantec Document Segmentation (SDS) Approach”; CISSE 2007, The Third International Joint Conferenceson Computer, Information, and Systems Sciences, and Engineering (CISSE 07). [32] Mohammad A. ALGhalayini “Introducing The Concept Of Information Pixels and the SIPA ( Storing Information Pixels Addresses ) Method As a Model for Document Storage”; CISSE 2011, The Seventh International Joint Conferenceson Computer, Information, and Systems Sciences, and Engineering (CISSE 11).
  • 12. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 32 AUTHOR Mohammad A. ALGhalayini, Bs.C. in Computer Science and Mathematics, Iowa, USA. 1987. Ms.C. in Computer Science, Alabama, USA. 1999. Ph.D. in Information Management Systems, London, UK. 2010.The author lectured at the College of Information & Computer Sciences of King Saud University, KSA for more than 14 years. Specialized in document management and databases, the author developed several imaging database systems for various KSU offices and departments, currently working as an academic researcherand supervisor of computer and Information unit at the KSU Vice Rectorate of Graduate Studies and scientific Research.