SlideShare a Scribd company logo
1 of 25
1.
2.
3.
4.
5.

6.
7.
8.

INTRODUCTION
BITMAP
DISCRETE COSINE TRANSFORMATION
ENERGY COMPACTION
CHARACTERSTICS EQUATIONS
EIGEN VALUE & EIGEN VECTOR
LEAST MEANS SQURE EQUATION
CONCLSION




The aim of this paper is to recognize a query
image from a database of images. This process
involves finding the principal component of the
image, which distinguishes it from the other
images. Principal Component Analysis (PCA) is a
classical statistical method and is widely used in
data analysis. The main use of PCA is to reduce
the dimensionality.PCS Is used for recognize the
image by extracting the principle components.
From Bitmap file format it is easy to extracting
the image attributes. Discrete Cosine Fourier
transformation is used for reduce the size of the
data.






Bitmaps are a standard devised jointly by
Microsoft and IBM for storing images on IBM
compatible PC’s running the Windows
software.
A bitmap is logically divided into two basic
portions, the header section and the data
section. The size of the header is 54 bytes.
The information regarding image attributes
such as the image resolution, height, width,
and the number of bits per pixel he header.


Bitmaps are simple to store and the format is
easy to understand. This makes the extraction
and eventually the manipulation of the data
easy.







Several algorithms may be used for the
recognition
process.
Some
of
them
are
Multidimensional
Scaling,
Singular
Value
Decomposition (SVD) and Factor analysis (FA).
MDS provides a visual representation of the
patterns of proximities in the data set. It is
applied on a matrix containing distance measures
between the variables of the data set.
SVD can be applied only to singular matrices. It
attempts to represent a singular matrix.
Factor analysis aims to highlight the variances
amongst a large number of observable data
through a set of unobservable data called factors.
FA can be approached in two ways. They are
a) Principal Component Analysis
b) Common Factor Analysis.






Common factor analysis(CFA) considers the
common variances of the variables concerned. It
results in a testable model that explains
intercorrelations amongst the variables.
Principal Component Analysis (PCA) considers
the total variance of the data set. Hence given an
image input, PCA would summarize the total
variance in image values.
Advantage of PCA is It can accept both
subjective and objective attributes and always
results in a unique solution.







Transform coding constitutes an integral component
of
contemporary
image/video
processing
applications.
Some properties of the DCT, which are of particular
value to image processing applications:
De correlation: The principle advantage of image
transformation is the removal of redundancy
between neighbouring pixels. This property helps us
to
manipulate
the
uncorrelated
transform
coefficients as they can be operated upon
independently.
Energy Compaction: This property can be
explained by using a few examples given below with
figs..






The example comprises of four broad image
classes. Figure (a) and (b) contain large areas of
slowly varying intensities. These images can be
classified as low frequency images with low spatial
details.
Figure (c) contains a number of edges (i.e., sharp
intensity variations) and therefore can be
classified as a high frequency image with low
spatial content.
Figure (d) However, the image data exhibits high
correlation, which is exploited by the DCT
algorithm to provide good energy compaction






The general equation for a 2D (N by M image) DCT is
defined by the following equation:

The good performance shown by 2D DCT with PCA
method is direct result of coupling 2D DCT coefficients
with PCA method. It mainly benefits from using 2D
discrete cosine transform to eliminate the correlation
between rows and columns and get energy
concentrated at the same
time.




Covariance is a property that gives us the
amount of variation of two dimensions from
their mean with respect to each other. This
property is used on the DCT-matrix so that a
form of distance measure is performed on the
image pixel values thus providing their relative
intensity measures.
The covariance of two variants Xi And Xj and
provides a measure of how strongly correlated
these variables are, and the derived quantity.


where σi , σj are the standard deviations, is
called statistical Correlation of xi and xj . The
covariance is symmetric since
cov (x, y)
= cov ( y, x) Covariance is performed on the
extracted 3*3 DCT matrix and covariance
matrix is calculated using the following
formulae Given n sets of variants denoted
{x1},.....,{xn}, the first-order covariance
matrix is defined by


Where µi is the mean.Higher order matrices are
given by

An individual matrix element vij = cov(xi, xj) is
called the covariance of xi and xj .


Then a characteristic equation is generated
from the covariance matrix. This characteristic
equation is a cubic root equation and the
maximum root is found out using Cardan’s
method. The maximum root is the eigen value
i.e. the principal component of the data set
which uniquely identifies the image.




From a symmetric matrix such as the covariance
matrix, we can calculate an orthogonal basis by
finding its eigen values and eigen vectors. The
eigenvectors ei and the corresponding eigen
values λi are the solutions of the equation

For simplicity we assume that the eigen values i
are distinct. These values can be found, for
example, by finding the solutions of the
characteristic equation







where the I is the identity matrix having the same
order than Cx and the |.| denotes the determinant
of the matrix. We are here faced with contradictory
goals:
1. On one hand, we should simplify the problem by
reducing the dimension of the representation.
2. On the other hand we want to preserve as much
as possible of the original information content.
PCA offers a convenient way to control the trade off
between loosing information and simplifying the
problem at hand.








The database of images is a collection of the Eigen
vectors of the different images that correspond to
the maximum Eigen value.
The Eigen vectors play an important role in the
image recognition process. We need to define
stepwise rules that need to be executed to achieve
image recognition.
There are basically two kinds of environments
classified based on the adaptation nature. They are
described below:
1. Static Environment : The system is said to be
static in nature if there is a negative output for a
new image given as a input. The system responds
negatively even when a existing image in the
database is rotated or translated or is subjected to
changes in contrast, brightness, scaling factors etc.




2. Dynamic Environment: The system is said
to be dynamic in nature if there exists a
learning process if any image is fed for the
recognition process.
Least Mean Square Algorithm:
Generally, LMS algorithm is implemented using
the instantaneous values for the input function.
The name itself defines the rough formula, as
LMS is a least value of the squares of the
means calculated with respect to a maximum
Eigen value calculated for a particular Eigen
space. The major property of LMS algorithm is
that it operates linearly.




Advantages of LMS algorithm: The
reasons of adopting LMS in our paper are
due
to
its
properties
like
Model
independence, Robustness, Optimality in
results and Simplicity.
LMS formula: After we defined a
general formula, as we adopted a
statistical and matrices concepts, we
necessarily define a specific formula as
follows:
ALGORITHM
1. Give the query image as the input.
2. Convert the input from BMP to data file.
3. Perform Discrete Cosine Transform on the
dataset.
4. Extract 3X3 matrix based on subjective analysis.
5. Perform covariance on the 3X3 matrix.
6.Generate characteristic equation from the
covariance matrix and solve for maximum Eigen
value.
7. Perform comparison of Eigen values by Least
Mean Square Algorithm (LMS).
8 If LMS=0, recognize and display image; else no
 match found.





INFERENCES
For a static environment, the algorithm gives a
maximum robustness because we applied
matrices and statistics that are constant with
respect to time. Unless we subject the image to
rotation or translation or scaling factors, the
LMS will be effective.
The sensitivity (S) of the LMS algorithm is
calculated on the basis of a Condition Number
(CN). CN is defined as the ratio of maximum
Eigen value to the minimum Eigen value.






This
paper
finds
immense
applications
pertaining to security aspects in government
agencies and public places with economical
software implementation. Though such a
system may prove to be an asset for security
purposes it fails when the application involves
the classification and categorization of images
based on their content.
Secondly, an image whose brightness or
contrast has been changed from the original,
though present in the database will not be
recognized by the system.
The use of bitmapped images results in the
occupation of a significant amount of memory.
Image recogonization

More Related Content

What's hot

SupportVectorRegression
SupportVectorRegressionSupportVectorRegression
SupportVectorRegression
Daniel K
 
directed-research-report
directed-research-reportdirected-research-report
directed-research-report
Ryen Krusinga
 
Numerical Solutions of Burgers' Equation Project Report
Numerical Solutions of Burgers' Equation Project ReportNumerical Solutions of Burgers' Equation Project Report
Numerical Solutions of Burgers' Equation Project Report
Shikhar Agarwal
 

What's hot (20)

A Correlative Information-Theoretic Measure for Image Similarity
A Correlative Information-Theoretic Measure for Image SimilarityA Correlative Information-Theoretic Measure for Image Similarity
A Correlative Information-Theoretic Measure for Image Similarity
 
Fuzzy c means manual work
Fuzzy c means manual workFuzzy c means manual work
Fuzzy c means manual work
 
Dt31811815
Dt31811815Dt31811815
Dt31811815
 
Cs6402 design and analysis of algorithms may june 2016 answer key
Cs6402 design and analysis of algorithms may june 2016 answer keyCs6402 design and analysis of algorithms may june 2016 answer key
Cs6402 design and analysis of algorithms may june 2016 answer key
 
Independent Component Analysis
Independent Component Analysis Independent Component Analysis
Independent Component Analysis
 
Computer algebra-system-maple
Computer algebra-system-mapleComputer algebra-system-maple
Computer algebra-system-maple
 
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
 
Numerical approach of riemann-liouville fractional derivative operator
Numerical approach of riemann-liouville fractional derivative operatorNumerical approach of riemann-liouville fractional derivative operator
Numerical approach of riemann-liouville fractional derivative operator
 
Maple
MapleMaple
Maple
 
SupportVectorRegression
SupportVectorRegressionSupportVectorRegression
SupportVectorRegression
 
Computer Science Assignment Help
Computer Science Assignment Help Computer Science Assignment Help
Computer Science Assignment Help
 
directed-research-report
directed-research-reportdirected-research-report
directed-research-report
 
Tracking Faces using Active Appearance Models
Tracking Faces using Active Appearance ModelsTracking Faces using Active Appearance Models
Tracking Faces using Active Appearance Models
 
algorithm Unit 3
algorithm Unit 3algorithm Unit 3
algorithm Unit 3
 
Principal component analysis and lda
Principal component analysis and ldaPrincipal component analysis and lda
Principal component analysis and lda
 
Numerical Solutions of Burgers' Equation Project Report
Numerical Solutions of Burgers' Equation Project ReportNumerical Solutions of Burgers' Equation Project Report
Numerical Solutions of Burgers' Equation Project Report
 
Principal Component Analysis For Novelty Detection
Principal Component Analysis For Novelty DetectionPrincipal Component Analysis For Novelty Detection
Principal Component Analysis For Novelty Detection
 
Independent component analysis
Independent component analysisIndependent component analysis
Independent component analysis
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
 
Implementing Minimum Error Rate Classifier
Implementing Minimum Error Rate ClassifierImplementing Minimum Error Rate Classifier
Implementing Minimum Error Rate Classifier
 

Viewers also liked

face recognition using Principle Componet Analysis
face recognition using Principle Componet Analysisface recognition using Principle Componet Analysis
face recognition using Principle Componet Analysis
Abhilash Kotawar
 
Project application of derivatives ppt.docx
Project application of derivatives ppt.docxProject application of derivatives ppt.docx
Project application of derivatives ppt.docx
TaraRocheleDaugherty
 
Solution to linear equhgations
Solution to linear equhgationsSolution to linear equhgations
Solution to linear equhgations
Robin Singh
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
laknatha
 
Calculus in real life
Calculus in real lifeCalculus in real life
Calculus in real life
Samiul Ehsan
 

Viewers also liked (15)

Face recogntion
Face recogntionFace recogntion
Face recogntion
 
face recognition using Principle Componet Analysis
face recognition using Principle Componet Analysisface recognition using Principle Componet Analysis
face recognition using Principle Componet Analysis
 
BBMP1103 - Sept 2011 exam workshop - part 7
BBMP1103 - Sept 2011 exam workshop - part 7BBMP1103 - Sept 2011 exam workshop - part 7
BBMP1103 - Sept 2011 exam workshop - part 7
 
Spectral clustering
Spectral clusteringSpectral clustering
Spectral clustering
 
Term11566
Term11566Term11566
Term11566
 
Eigen values and eigen vector ppt
Eigen values and eigen vector pptEigen values and eigen vector ppt
Eigen values and eigen vector ppt
 
Maths
MathsMaths
Maths
 
Eigen value , eigen vectors, caley hamilton theorem
Eigen value , eigen vectors, caley hamilton theoremEigen value , eigen vectors, caley hamilton theorem
Eigen value , eigen vectors, caley hamilton theorem
 
Project application of derivatives ppt.docx
Project application of derivatives ppt.docxProject application of derivatives ppt.docx
Project application of derivatives ppt.docx
 
Solution to linear equhgations
Solution to linear equhgationsSolution to linear equhgations
Solution to linear equhgations
 
Application of differentiation
Application of differentiationApplication of differentiation
Application of differentiation
 
Application of calculus in real life.
Application of calculus in real life.Application of calculus in real life.
Application of calculus in real life.
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Calculus in real life
Calculus in real lifeCalculus in real life
Calculus in real life
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to Image recogonization

A Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCAA Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCA
Editor Jacotech
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression
Alexander Decker
 

Similar to Image recogonization (20)

Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
 
Pca analysis
Pca analysisPca analysis
Pca analysis
 
Segmentation of Images by using Fuzzy k-means clustering with ACO
Segmentation of Images by using Fuzzy k-means clustering with ACOSegmentation of Images by using Fuzzy k-means clustering with ACO
Segmentation of Images by using Fuzzy k-means clustering with ACO
 
ClusterPaperDaggett
ClusterPaperDaggettClusterPaperDaggett
ClusterPaperDaggett
 
557 480-486
557 480-486557 480-486
557 480-486
 
IRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo Camera
 
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGEAPPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
 
IRJET- Proposed System for Animal Recognition using Image Processing
IRJET-  	  Proposed System for Animal Recognition using Image ProcessingIRJET-  	  Proposed System for Animal Recognition using Image Processing
IRJET- Proposed System for Animal Recognition using Image Processing
 
WEB IMAGE RETRIEVAL USING CLUSTERING APPROACHES
WEB IMAGE RETRIEVAL USING CLUSTERING APPROACHESWEB IMAGE RETRIEVAL USING CLUSTERING APPROACHES
WEB IMAGE RETRIEVAL USING CLUSTERING APPROACHES
 
H010315356
H010315356H010315356
H010315356
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session Key
 
Algorithm for Lossy Image Compression using FPGA
Algorithm for Lossy Image Compression using FPGAAlgorithm for Lossy Image Compression using FPGA
Algorithm for Lossy Image Compression using FPGA
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
1376846406 14447221
1376846406  144472211376846406  14447221
1376846406 14447221
 
A Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCAA Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCA
 
Y34147151
Y34147151Y34147151
Y34147151
 
IJET-V2I6P17
IJET-V2I6P17IJET-V2I6P17
IJET-V2I6P17
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Proposed algorithm for image classification using regression-based pre-proces...
Proposed algorithm for image classification using regression-based pre-proces...Proposed algorithm for image classification using regression-based pre-proces...
Proposed algorithm for image classification using regression-based pre-proces...
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression
 

More from SANTOSH RATH

Lesson plan proforma database management system
Lesson plan proforma database management systemLesson plan proforma database management system
Lesson plan proforma database management system
SANTOSH RATH
 
Expected questions tc
Expected questions tcExpected questions tc
Expected questions tc
SANTOSH RATH
 
Expected questions tc
Expected questions tcExpected questions tc
Expected questions tc
SANTOSH RATH
 
Module wise format oops questions
Module wise format oops questionsModule wise format oops questions
Module wise format oops questions
SANTOSH RATH
 
( Becs 2208 ) database management system
( Becs 2208 ) database management system( Becs 2208 ) database management system
( Becs 2208 ) database management system
SANTOSH RATH
 
Expected Questions TC
Expected Questions TCExpected Questions TC
Expected Questions TC
SANTOSH RATH
 
Expected questions tc
Expected questions tcExpected questions tc
Expected questions tc
SANTOSH RATH
 
Expected questions for dbms
Expected questions for dbmsExpected questions for dbms
Expected questions for dbms
SANTOSH RATH
 
Expected questions for dbms
Expected questions for dbmsExpected questions for dbms
Expected questions for dbms
SANTOSH RATH
 
Oops model question
Oops model questionOops model question
Oops model question
SANTOSH RATH
 
System programming note
System programming noteSystem programming note
System programming note
SANTOSH RATH
 
Operating system notes
Operating system notesOperating system notes
Operating system notes
SANTOSH RATH
 

More from SANTOSH RATH (20)

Lesson plan proforma database management system
Lesson plan proforma database management systemLesson plan proforma database management system
Lesson plan proforma database management system
 
Lesson plan proforma progrmming in c
Lesson plan proforma progrmming in cLesson plan proforma progrmming in c
Lesson plan proforma progrmming in c
 
Expected questions tc
Expected questions tcExpected questions tc
Expected questions tc
 
Expected questions tc
Expected questions tcExpected questions tc
Expected questions tc
 
Module wise format oops questions
Module wise format oops questionsModule wise format oops questions
Module wise format oops questions
 
2011dbms
2011dbms2011dbms
2011dbms
 
2006dbms
2006dbms2006dbms
2006dbms
 
( Becs 2208 ) database management system
( Becs 2208 ) database management system( Becs 2208 ) database management system
( Becs 2208 ) database management system
 
Rdbms2010
Rdbms2010Rdbms2010
Rdbms2010
 
Expected Questions TC
Expected Questions TCExpected Questions TC
Expected Questions TC
 
Expected questions tc
Expected questions tcExpected questions tc
Expected questions tc
 
Expected questions for dbms
Expected questions for dbmsExpected questions for dbms
Expected questions for dbms
 
Expected questions for dbms
Expected questions for dbmsExpected questions for dbms
Expected questions for dbms
 
Oops model question
Oops model questionOops model question
Oops model question
 
System programming note
System programming noteSystem programming note
System programming note
 
Operating system notes
Operating system notesOperating system notes
Operating system notes
 
Os notes
Os notesOs notes
Os notes
 
OS ASSIGNMENT 2
OS ASSIGNMENT 2OS ASSIGNMENT 2
OS ASSIGNMENT 2
 
OS ASSIGNMENT-1
OS ASSIGNMENT-1OS ASSIGNMENT-1
OS ASSIGNMENT-1
 
OS ASSIGNMENT 3
OS ASSIGNMENT 3OS ASSIGNMENT 3
OS ASSIGNMENT 3
 

Recently uploaded

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

Image recogonization

  • 1.
  • 2. 1. 2. 3. 4. 5. 6. 7. 8. INTRODUCTION BITMAP DISCRETE COSINE TRANSFORMATION ENERGY COMPACTION CHARACTERSTICS EQUATIONS EIGEN VALUE & EIGEN VECTOR LEAST MEANS SQURE EQUATION CONCLSION
  • 3.   The aim of this paper is to recognize a query image from a database of images. This process involves finding the principal component of the image, which distinguishes it from the other images. Principal Component Analysis (PCA) is a classical statistical method and is widely used in data analysis. The main use of PCA is to reduce the dimensionality.PCS Is used for recognize the image by extracting the principle components. From Bitmap file format it is easy to extracting the image attributes. Discrete Cosine Fourier transformation is used for reduce the size of the data.
  • 4.    Bitmaps are a standard devised jointly by Microsoft and IBM for storing images on IBM compatible PC’s running the Windows software. A bitmap is logically divided into two basic portions, the header section and the data section. The size of the header is 54 bytes. The information regarding image attributes such as the image resolution, height, width, and the number of bits per pixel he header.
  • 5.  Bitmaps are simple to store and the format is easy to understand. This makes the extraction and eventually the manipulation of the data easy.
  • 6.     Several algorithms may be used for the recognition process. Some of them are Multidimensional Scaling, Singular Value Decomposition (SVD) and Factor analysis (FA). MDS provides a visual representation of the patterns of proximities in the data set. It is applied on a matrix containing distance measures between the variables of the data set. SVD can be applied only to singular matrices. It attempts to represent a singular matrix. Factor analysis aims to highlight the variances amongst a large number of observable data through a set of unobservable data called factors. FA can be approached in two ways. They are a) Principal Component Analysis b) Common Factor Analysis.
  • 7.    Common factor analysis(CFA) considers the common variances of the variables concerned. It results in a testable model that explains intercorrelations amongst the variables. Principal Component Analysis (PCA) considers the total variance of the data set. Hence given an image input, PCA would summarize the total variance in image values. Advantage of PCA is It can accept both subjective and objective attributes and always results in a unique solution.
  • 8.     Transform coding constitutes an integral component of contemporary image/video processing applications. Some properties of the DCT, which are of particular value to image processing applications: De correlation: The principle advantage of image transformation is the removal of redundancy between neighbouring pixels. This property helps us to manipulate the uncorrelated transform coefficients as they can be operated upon independently. Energy Compaction: This property can be explained by using a few examples given below with figs..
  • 9.
  • 10.    The example comprises of four broad image classes. Figure (a) and (b) contain large areas of slowly varying intensities. These images can be classified as low frequency images with low spatial details. Figure (c) contains a number of edges (i.e., sharp intensity variations) and therefore can be classified as a high frequency image with low spatial content. Figure (d) However, the image data exhibits high correlation, which is exploited by the DCT algorithm to provide good energy compaction
  • 11.    The general equation for a 2D (N by M image) DCT is defined by the following equation: The good performance shown by 2D DCT with PCA method is direct result of coupling 2D DCT coefficients with PCA method. It mainly benefits from using 2D discrete cosine transform to eliminate the correlation between rows and columns and get energy concentrated at the same time.
  • 12.   Covariance is a property that gives us the amount of variation of two dimensions from their mean with respect to each other. This property is used on the DCT-matrix so that a form of distance measure is performed on the image pixel values thus providing their relative intensity measures. The covariance of two variants Xi And Xj and provides a measure of how strongly correlated these variables are, and the derived quantity.
  • 13.  where σi , σj are the standard deviations, is called statistical Correlation of xi and xj . The covariance is symmetric since cov (x, y) = cov ( y, x) Covariance is performed on the extracted 3*3 DCT matrix and covariance matrix is calculated using the following formulae Given n sets of variants denoted {x1},.....,{xn}, the first-order covariance matrix is defined by
  • 14.  Where µi is the mean.Higher order matrices are given by An individual matrix element vij = cov(xi, xj) is called the covariance of xi and xj .
  • 15.  Then a characteristic equation is generated from the covariance matrix. This characteristic equation is a cubic root equation and the maximum root is found out using Cardan’s method. The maximum root is the eigen value i.e. the principal component of the data set which uniquely identifies the image.
  • 16.   From a symmetric matrix such as the covariance matrix, we can calculate an orthogonal basis by finding its eigen values and eigen vectors. The eigenvectors ei and the corresponding eigen values λi are the solutions of the equation For simplicity we assume that the eigen values i are distinct. These values can be found, for example, by finding the solutions of the characteristic equation
  • 17.     where the I is the identity matrix having the same order than Cx and the |.| denotes the determinant of the matrix. We are here faced with contradictory goals: 1. On one hand, we should simplify the problem by reducing the dimension of the representation. 2. On the other hand we want to preserve as much as possible of the original information content. PCA offers a convenient way to control the trade off between loosing information and simplifying the problem at hand.
  • 18.     The database of images is a collection of the Eigen vectors of the different images that correspond to the maximum Eigen value. The Eigen vectors play an important role in the image recognition process. We need to define stepwise rules that need to be executed to achieve image recognition. There are basically two kinds of environments classified based on the adaptation nature. They are described below: 1. Static Environment : The system is said to be static in nature if there is a negative output for a new image given as a input. The system responds negatively even when a existing image in the database is rotated or translated or is subjected to changes in contrast, brightness, scaling factors etc.
  • 19.   2. Dynamic Environment: The system is said to be dynamic in nature if there exists a learning process if any image is fed for the recognition process. Least Mean Square Algorithm: Generally, LMS algorithm is implemented using the instantaneous values for the input function. The name itself defines the rough formula, as LMS is a least value of the squares of the means calculated with respect to a maximum Eigen value calculated for a particular Eigen space. The major property of LMS algorithm is that it operates linearly.
  • 20.   Advantages of LMS algorithm: The reasons of adopting LMS in our paper are due to its properties like Model independence, Robustness, Optimality in results and Simplicity. LMS formula: After we defined a general formula, as we adopted a statistical and matrices concepts, we necessarily define a specific formula as follows:
  • 21.
  • 22. ALGORITHM 1. Give the query image as the input. 2. Convert the input from BMP to data file. 3. Perform Discrete Cosine Transform on the dataset. 4. Extract 3X3 matrix based on subjective analysis. 5. Perform covariance on the 3X3 matrix. 6.Generate characteristic equation from the covariance matrix and solve for maximum Eigen value. 7. Perform comparison of Eigen values by Least Mean Square Algorithm (LMS). 8 If LMS=0, recognize and display image; else no  match found.
  • 23.    INFERENCES For a static environment, the algorithm gives a maximum robustness because we applied matrices and statistics that are constant with respect to time. Unless we subject the image to rotation or translation or scaling factors, the LMS will be effective. The sensitivity (S) of the LMS algorithm is calculated on the basis of a Condition Number (CN). CN is defined as the ratio of maximum Eigen value to the minimum Eigen value.
  • 24.    This paper finds immense applications pertaining to security aspects in government agencies and public places with economical software implementation. Though such a system may prove to be an asset for security purposes it fails when the application involves the classification and categorization of images based on their content. Secondly, an image whose brightness or contrast has been changed from the original, though present in the database will not be recognized by the system. The use of bitmapped images results in the occupation of a significant amount of memory.