This document presents a method for enhancing latent fingerprint images acquired using optical coherence tomography (OCT). OCT produces 3D volume data of fingerprints that is processed into 2D images, but these images suffer from speckle noise. The paper proposes using a wavelet transform algorithm based on phase preservation to denoise the images. Experimental results on fingerprints collected from 20 individuals show that applying the denoising algorithm improves feature extraction accuracy compared to non-denoised images, with a lower equal error rate and false match rate. This demonstrates that the denoising method enhances fingerprint image quality and improves the performance of fingerprint recognition.
Analysis and Detection of Image Forgery Methodologiesijsrd.com
"Forgery" is a subjective word. An image can become a forgery based upon the context in which it is used. An image altered for fun or someone who has taken a bad photo, but has been altered to improve its appearance cannot be considered a forgery even though it has been altered from its original capture. The other side of forgery are those who perpetuate a forgery for gain and prestige. They create an image in which to dupe the recipient into believing the image is real and from this they are able to gain payment and fame. Detecting these types of forgeries has become serious problem at present. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. Now these marks of tampering can be done by various operations such as rotation, scaling, JPEG compression, Gaussian noise etc. called as attacks. There are various methods proposed in this field in recent years to detect above mentioned attacks. This paper provides a detailed analysis of different approaches and methodologies used to detect image forgery. It is also analysed that block-based features methods are robust to Gaussian noise and JPEG compression and the key point-based feature methods are robust to rotation and scaling.
Detection of hard exudates using simulated annealing based thresholding mecha...csandit
Diabetic retinopathy is a disease commonly found in case of diabetes mellitus patients. It causes
severe damage to retina and may lead to complete or partial visual loss. In case of diabetic
retinopathy retinal blood vessel gets damaged and protein and fat based particles gets leaked
out of the damaged blood vessels and are deposited in the intra-retinal space. They are
normally seen as whitish marks of various shape and are called as exudates. Exudates are
primary indication of diabetic retinopathy. As changes occurs due to the disease is irreversible
in nature, the disease must be detected in early stages to prevent visual loss. But detection of
exudates in early stages of the disease is extremely difficult only by visual inspection because of
small diameter of human eye. But an efficient automated computerized system can have the
ability to detect the disease in very early stage. In this paper we have proposed one such
method.
Removal of Gaussian noise on the image edges using the Prewitt operator and t...IOSR Journals
Abstract: Image edge detection algorithm is applied on images to remove Gaussian noise that is present in the
image during capturing or transmission using a method which combines Prewitt operator and threshold
function technique to do edge detection on the image. This method is better than a method which combines
Prewitt operator and mean filtering. In this paper, firstly use mean filtering to remove initially Gaussian noise,
then use Prewitt operator to do edge detection on the image, and finally applied a threshold function technique
with Prewitt operator.
Keywords: Gaussian noise, Prewitt operator, edge detection, threshold function
Human action recognition with kinect using a joint motion descriptorSoma Boubou
- We proposed a novel descriptor for motion of skeleton joints.
- Proposed descriptor proved to outperform the state-of-the-art descriptors such as HON4D and the one proposed by Chen et al 2013.
- Our proposed approached proved to be effective for periodic actions (e.g., Waving, Walking, Jogging, Side-Boxing, etc).
- Grouping was effective for actions with unique joints trajectories (e.g., Tennis serving, Side kicking , etc).
- Grouping joints into eight groups is always effective with actions of MSR3D dataset.
Introduction to digital image processing, image processing, digital image, analog image, formation of digital image, level of digital image processing, components of a digital image processing system, advantages of digital image processing, limitations of digital image processing, fields of digital image processing, ultrasound imaging, x-ray imaging, SEM, PET, TEM
Robust Digital Image-Adaptive Watermarking Using BSS BasedCSCJournals
In a digital watermarking scheme, it is not convenient to carry the original image all the time in order to detect the owner's signature from the watermarked image. Moreover, for those applications that require different watermark for different copies, it is preferred to utilize some kind of watermark-independent algorithm for extraction process i.e. dewatermarking. Watermark embedding is performed in the blue channel, as it is less sensitive to human visual system .This paper proposes a new color image watermarking method ,which adopts Blind Source Separation (BSS) technique for watermark extraction. Single level Discrete Wavelet Transform(DWT) is used for embedding . The novelty of our scheme lies in determining the mixing matrix for BSS model during embedding. The determination of mixing matrix using Quasi-Newton’s (BFGS) technique is based on texture analysis which uses energy as metric. This makes our method image adaptive to embed the watermark into original image so as not to bring about a perceptible change in the marked image. BSS based on Joint diagonalization of the time delayed covariance matrices algorithm is used for the extraction of watermark. The proposed method, undergoing different experiments, has shown its robustness against many attacks including rotation ,low pass filtering, salt n pepper noise addition and compression. The robustness evaluation is also carried out with respect to the spatial domain embedding.
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...ijtsrd
Presently present TAM FD, a novel expansion of tricolor constriction model custom fitted for the difficult issue of shadow identification in pictures. Past strategies for shadow discovery center on learning the neighborhood appearance of shadow areas, while utilizing restricted nearby setting thinking as pairwise possibilities in a Conditional Random Field. Interestingly, the proposed methodology can display more elevated amount connections and worldwide scene attributes. We train a shadow locator that relates to the generator of a restrictive TAM, and expand its shadow precision by consolidating the run of the mill TAM misfortune with an information misfortune term utilizing highlight descriptor. Shadows happen when articles impede direct light from a wellspring of enlightenment, which is generally the sun. As indicated by the rule of arrangement, shadows can be separated into cast shadow and self shadow. Cast shadow is planned by the projection of articles toward the light source self shadow alludes to the piece of the item that isnt enlightened. For a cast shadow, the piece of it where direct light is totally hindered by an article is named the umbra, while the part where direct light is mostly blocked is named the obscuration. On account of the presence of an obscuration, there wont be an unequivocal limit among shadowed and non shadowed regions the shadows cause incomplete or all out loss of radiometric data in the influenced zones, and therefore, they make errands like picture elucidation, object identification and acknowledgment, and change recognition progressively troublesome or even inconceivable. SDI record improves by 1.76 . Shading segment record for safeguard shading difference during evacuation of shadow procedure is improved by 9.75 . Standardize immersion esteem discovery file NSVDI is improve by 1.89 for distinguish shadow pixel. Rakesh Dangi | Anjana Nigam ""Shadow Detection and Removal using Tricolor Attenuation Model Based on Feature Descriptor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25127.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25127/shadow-detection-and-removal-using-tricolor-attenuation-model-based-on-feature-descriptor/rakesh-dangi
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
In this work, we deal with contactless fingerprint biometrics. More specifically, we are interested in solving the problem of registration by taking into consideration some constraints such as finger rotation and translation. In the proposed method, the registration requires: (1) a segmentation technique to extract streaks, (2) a skeletonization technique to extract the center line streaks and (3) and landmarks extraction technique. The correspondence between the sets of control points, is obtained by calculating the descriptor vector of Zernike moments on a window of size RxR centered at each point. Comparison of correlation coefficients between the descriptor vectors of Zernike moments helps define the corresponding points. The estimation of parameters of the existing deformation between images is performed using RANSAC algorithm (Random SAmple Consensus) that suppresses wrong matches. Finally, performance evaluation is achieved on a set of fingerprint images where promising results are reported.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Interactive full body motion capture using infrared sensor networkijcga
Traditional motion capture (mocap) has been
well
-
stud
ied in visual science for
the last decades
. However
the fie
ld is mostly about capturing
precise animation to be used in
specific
application
s
after
intensive
post
processing such as studying biomechanics or rigging models in movies. These data set
s are normally
captured in complex laboratory environments with
sophisticated
equipment thus making motion capture a
field that is mostly exclusive to professional animators.
In
addition
, obtrusive sensors must be attached to
actors and calibrated within t
he capturing system, resulting in limited and unnatural motion.
In recent year
the rise of computer vision and interactive entertainment opened the gate for a different type of motion
capture which focuses on producing
optical
marker
less
or mechanical sens
orless
motion capture.
Furtherm
ore a wide array of low
-
cost
device are released that are easy to use
for less mission critical
applications
.
This paper
describe
s
a new technique of using multiple infrared devices to process data from
multiple infrared sensors to enhance the flexibility and accuracy of the markerless mocap
using commodity
devices such as Kinect
. The method involves analyzing each individual sensor
data, decompose and rebuild
them into a uniformed skeleton across all sensors. We then assign criteria to define the confidence level of
captured signal from
sensor. Each sensor operates on its own process and communicates through MPI.
Our method emphasize
s on the need of minimum calculation overhead for better real time performance
while being able to maintain good scalability
Performance Analysis of CRT for Image Encryption ijcisjournal
With the fast advancements of information technology, the security of image data transmitted or stored over
internet is become very difficult. To hide the details, an effective method is encryption, so that only
authorized persons can decrypt the image with the keys available. Since the default features of digital
image such as high capacity data, large redundancy and large similarities among pixels, the conventional
encryption algorithms such as AES, , DES, 3DES, and Blow Fish, are not applicable for real time image
encryption. This paper presents the performance of CRT for image encryption to secure storage and
transmission of image over internet.
Interactive Full-Body Motion Capture Using Infrared Sensor Network ijcga
Traditional motion capture (mocap) has been well-studied in visual science for the last decades. However the field is mostly about capturing precise animation to be used in specific applications after intensive post processing such as studying biomechanics or rigging models in movies. These data sets are normally captured in complex laboratory environments with sophisticated equipment thus making motion capture a
field that is mostly exclusive to professional animators. In addition, obtrusive sensors must be attached to actors and calibrated within the capturing system, resulting in limited and unnatural motion. In recent year the rise of computer vision and interactive entertainment opened the gate for a different type of motion capture which focuses on producing optical markerless or mechanical sensorless motion capture. Furthermore a wide array of low-cost device are released that are easy to use for less mission critical applications. This paper describes a new technique of using multiple infrared devices to process data from multiple infrared sensors to enhance the flexibility and accuracy of the markerless mocap using commodity
devices such as Kinect. The method involves analyzing each individual sensor data, decompose and rebuild
them into a uniformed skeleton across all sensors. We then assign criteria to define the confidence level of
captured signal from sensor. Each sensor operates on its own process and communicates through MPI.
Our method emphasizes on the need of minimum calculation overhead for better real time performance
while being able to maintain good scalability.
Analysis and Detection of Image Forgery Methodologiesijsrd.com
"Forgery" is a subjective word. An image can become a forgery based upon the context in which it is used. An image altered for fun or someone who has taken a bad photo, but has been altered to improve its appearance cannot be considered a forgery even though it has been altered from its original capture. The other side of forgery are those who perpetuate a forgery for gain and prestige. They create an image in which to dupe the recipient into believing the image is real and from this they are able to gain payment and fame. Detecting these types of forgeries has become serious problem at present. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. Now these marks of tampering can be done by various operations such as rotation, scaling, JPEG compression, Gaussian noise etc. called as attacks. There are various methods proposed in this field in recent years to detect above mentioned attacks. This paper provides a detailed analysis of different approaches and methodologies used to detect image forgery. It is also analysed that block-based features methods are robust to Gaussian noise and JPEG compression and the key point-based feature methods are robust to rotation and scaling.
Detection of hard exudates using simulated annealing based thresholding mecha...csandit
Diabetic retinopathy is a disease commonly found in case of diabetes mellitus patients. It causes
severe damage to retina and may lead to complete or partial visual loss. In case of diabetic
retinopathy retinal blood vessel gets damaged and protein and fat based particles gets leaked
out of the damaged blood vessels and are deposited in the intra-retinal space. They are
normally seen as whitish marks of various shape and are called as exudates. Exudates are
primary indication of diabetic retinopathy. As changes occurs due to the disease is irreversible
in nature, the disease must be detected in early stages to prevent visual loss. But detection of
exudates in early stages of the disease is extremely difficult only by visual inspection because of
small diameter of human eye. But an efficient automated computerized system can have the
ability to detect the disease in very early stage. In this paper we have proposed one such
method.
Removal of Gaussian noise on the image edges using the Prewitt operator and t...IOSR Journals
Abstract: Image edge detection algorithm is applied on images to remove Gaussian noise that is present in the
image during capturing or transmission using a method which combines Prewitt operator and threshold
function technique to do edge detection on the image. This method is better than a method which combines
Prewitt operator and mean filtering. In this paper, firstly use mean filtering to remove initially Gaussian noise,
then use Prewitt operator to do edge detection on the image, and finally applied a threshold function technique
with Prewitt operator.
Keywords: Gaussian noise, Prewitt operator, edge detection, threshold function
Human action recognition with kinect using a joint motion descriptorSoma Boubou
- We proposed a novel descriptor for motion of skeleton joints.
- Proposed descriptor proved to outperform the state-of-the-art descriptors such as HON4D and the one proposed by Chen et al 2013.
- Our proposed approached proved to be effective for periodic actions (e.g., Waving, Walking, Jogging, Side-Boxing, etc).
- Grouping was effective for actions with unique joints trajectories (e.g., Tennis serving, Side kicking , etc).
- Grouping joints into eight groups is always effective with actions of MSR3D dataset.
Introduction to digital image processing, image processing, digital image, analog image, formation of digital image, level of digital image processing, components of a digital image processing system, advantages of digital image processing, limitations of digital image processing, fields of digital image processing, ultrasound imaging, x-ray imaging, SEM, PET, TEM
Robust Digital Image-Adaptive Watermarking Using BSS BasedCSCJournals
In a digital watermarking scheme, it is not convenient to carry the original image all the time in order to detect the owner's signature from the watermarked image. Moreover, for those applications that require different watermark for different copies, it is preferred to utilize some kind of watermark-independent algorithm for extraction process i.e. dewatermarking. Watermark embedding is performed in the blue channel, as it is less sensitive to human visual system .This paper proposes a new color image watermarking method ,which adopts Blind Source Separation (BSS) technique for watermark extraction. Single level Discrete Wavelet Transform(DWT) is used for embedding . The novelty of our scheme lies in determining the mixing matrix for BSS model during embedding. The determination of mixing matrix using Quasi-Newton’s (BFGS) technique is based on texture analysis which uses energy as metric. This makes our method image adaptive to embed the watermark into original image so as not to bring about a perceptible change in the marked image. BSS based on Joint diagonalization of the time delayed covariance matrices algorithm is used for the extraction of watermark. The proposed method, undergoing different experiments, has shown its robustness against many attacks including rotation ,low pass filtering, salt n pepper noise addition and compression. The robustness evaluation is also carried out with respect to the spatial domain embedding.
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...ijtsrd
Presently present TAM FD, a novel expansion of tricolor constriction model custom fitted for the difficult issue of shadow identification in pictures. Past strategies for shadow discovery center on learning the neighborhood appearance of shadow areas, while utilizing restricted nearby setting thinking as pairwise possibilities in a Conditional Random Field. Interestingly, the proposed methodology can display more elevated amount connections and worldwide scene attributes. We train a shadow locator that relates to the generator of a restrictive TAM, and expand its shadow precision by consolidating the run of the mill TAM misfortune with an information misfortune term utilizing highlight descriptor. Shadows happen when articles impede direct light from a wellspring of enlightenment, which is generally the sun. As indicated by the rule of arrangement, shadows can be separated into cast shadow and self shadow. Cast shadow is planned by the projection of articles toward the light source self shadow alludes to the piece of the item that isnt enlightened. For a cast shadow, the piece of it where direct light is totally hindered by an article is named the umbra, while the part where direct light is mostly blocked is named the obscuration. On account of the presence of an obscuration, there wont be an unequivocal limit among shadowed and non shadowed regions the shadows cause incomplete or all out loss of radiometric data in the influenced zones, and therefore, they make errands like picture elucidation, object identification and acknowledgment, and change recognition progressively troublesome or even inconceivable. SDI record improves by 1.76 . Shading segment record for safeguard shading difference during evacuation of shadow procedure is improved by 9.75 . Standardize immersion esteem discovery file NSVDI is improve by 1.89 for distinguish shadow pixel. Rakesh Dangi | Anjana Nigam ""Shadow Detection and Removal using Tricolor Attenuation Model Based on Feature Descriptor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25127.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25127/shadow-detection-and-removal-using-tricolor-attenuation-model-based-on-feature-descriptor/rakesh-dangi
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
In this work, we deal with contactless fingerprint biometrics. More specifically, we are interested in solving the problem of registration by taking into consideration some constraints such as finger rotation and translation. In the proposed method, the registration requires: (1) a segmentation technique to extract streaks, (2) a skeletonization technique to extract the center line streaks and (3) and landmarks extraction technique. The correspondence between the sets of control points, is obtained by calculating the descriptor vector of Zernike moments on a window of size RxR centered at each point. Comparison of correlation coefficients between the descriptor vectors of Zernike moments helps define the corresponding points. The estimation of parameters of the existing deformation between images is performed using RANSAC algorithm (Random SAmple Consensus) that suppresses wrong matches. Finally, performance evaluation is achieved on a set of fingerprint images where promising results are reported.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Interactive full body motion capture using infrared sensor networkijcga
Traditional motion capture (mocap) has been
well
-
stud
ied in visual science for
the last decades
. However
the fie
ld is mostly about capturing
precise animation to be used in
specific
application
s
after
intensive
post
processing such as studying biomechanics or rigging models in movies. These data set
s are normally
captured in complex laboratory environments with
sophisticated
equipment thus making motion capture a
field that is mostly exclusive to professional animators.
In
addition
, obtrusive sensors must be attached to
actors and calibrated within t
he capturing system, resulting in limited and unnatural motion.
In recent year
the rise of computer vision and interactive entertainment opened the gate for a different type of motion
capture which focuses on producing
optical
marker
less
or mechanical sens
orless
motion capture.
Furtherm
ore a wide array of low
-
cost
device are released that are easy to use
for less mission critical
applications
.
This paper
describe
s
a new technique of using multiple infrared devices to process data from
multiple infrared sensors to enhance the flexibility and accuracy of the markerless mocap
using commodity
devices such as Kinect
. The method involves analyzing each individual sensor
data, decompose and rebuild
them into a uniformed skeleton across all sensors. We then assign criteria to define the confidence level of
captured signal from
sensor. Each sensor operates on its own process and communicates through MPI.
Our method emphasize
s on the need of minimum calculation overhead for better real time performance
while being able to maintain good scalability
Performance Analysis of CRT for Image Encryption ijcisjournal
With the fast advancements of information technology, the security of image data transmitted or stored over
internet is become very difficult. To hide the details, an effective method is encryption, so that only
authorized persons can decrypt the image with the keys available. Since the default features of digital
image such as high capacity data, large redundancy and large similarities among pixels, the conventional
encryption algorithms such as AES, , DES, 3DES, and Blow Fish, are not applicable for real time image
encryption. This paper presents the performance of CRT for image encryption to secure storage and
transmission of image over internet.
Interactive Full-Body Motion Capture Using Infrared Sensor Network ijcga
Traditional motion capture (mocap) has been well-studied in visual science for the last decades. However the field is mostly about capturing precise animation to be used in specific applications after intensive post processing such as studying biomechanics or rigging models in movies. These data sets are normally captured in complex laboratory environments with sophisticated equipment thus making motion capture a
field that is mostly exclusive to professional animators. In addition, obtrusive sensors must be attached to actors and calibrated within the capturing system, resulting in limited and unnatural motion. In recent year the rise of computer vision and interactive entertainment opened the gate for a different type of motion capture which focuses on producing optical markerless or mechanical sensorless motion capture. Furthermore a wide array of low-cost device are released that are easy to use for less mission critical applications. This paper describes a new technique of using multiple infrared devices to process data from multiple infrared sensors to enhance the flexibility and accuracy of the markerless mocap using commodity
devices such as Kinect. The method involves analyzing each individual sensor data, decompose and rebuild
them into a uniformed skeleton across all sensors. We then assign criteria to define the confidence level of
captured signal from sensor. Each sensor operates on its own process and communicates through MPI.
Our method emphasizes on the need of minimum calculation overhead for better real time performance
while being able to maintain good scalability.
COMPUTING THE GROWTH RATE OF STEM CELLS USING DIGITAL IMAGE PROCESSING Pratyusha Mahavadi
The aim is to compute the growth rate of stem cells by using segmentation, feature extraction and pattern recognition which are the fundamental methods of digital image processing. DRLSE algorithm is applied for segmenting images. The DRLSE algorithm is an amalgamation of Canny Edge Detector algorithm and DRLSE method, which uses the four well potential function. Features are extracted from segmented images using GLCM method and finally Support Vector Machine (SVM) is used for pattern recognition and classification of stem cells.
AN AUTOMATIC SCREENING METHOD TO DETECT OPTIC DISC IN THE RETINAijait
The location of Optic Disc (OD) is of critical importance in retinal image analysis. This research paper carries out a new automated methodology to detect the optic disc (OD) in retinal images. OD detection helps the ophthalmologists to find whether the patient is affected by diabetic retinopathy or not. The proposed technique is to use line operator which gives higher percentage of detection than the already existing methods. The purpose of this project is to automatically detect the position of the OD in digital retinal fundus images. The method starts with converting the RGB image input into its LAB component. This image is smoothed using bilateral smoothing filter. Further, filtering is carried out using line operator. After which gray orientation and binary map orientation is carried out and then with the use of the resulting maximum image variation the area of the presence of the OD is found. The portions other
than OD are blurred using 2D circular convolution. On applying mathematical steps like peak classification, concentric circles design and image difference calculation, OD is detected. The proposed method was evaluated using a subset of the STARE project’s dataset and the success percentage was found
to be 96%.
Construction of sine and cosine hologram of brain tumor imageeSAT Journals
Abstract Optical Scanning Holography is a technique in which an image is scanned by Time Dependent Fresnel Zone Plate and its intensity information is encoded into a two dimensional hologram. This technique not only records amplitude but also the phase of the object in case of various applications such as optical remote sensing, 3D encoding and decoding, 3D TV system. Optical scanning holography is an electronic process which is flexible, programmable and also has the capability of parallel processing. It has become a powerful technique over digital holography technique as it provides a very high processing speed, good quality color appearance, better sharpness and high resolution. An optical Fourier transform technique is used for its processing. Optical scanning holography is a real time system which involves the principle of optical heterodyne scanning. This paper proposes the construction of sine and cosine hologram of biomedical image such as brain tumor by using optical scanning setup. The holograms generated by this approach will be used for detection of tumor cells when these holograms are processed further in the reconstruction stage which will visualize more information of such a malignant cells. In the present work the construction stage of the hologram with optical set up has been accomplished and the simulation results of the hologram are observed by using MATLAB tool. Key Words: — Holography, Heterodyne scanning, Fourier transform, Fresnel Zone Plate, Optical setup
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Binary operation based hard exudate detection and fuzzy based classification ...IJECEIAES
Diabetic retinopathy (DR) is one of the most considerable reasons for visual impairment. The main objective of this paper is to automatically detect and recognize DR lesions like hard exudates, as it helps in diagnosing and screening of the disease. Here, binary operation based image processing for detecting lesions and fuzzy logic based extraction of hard exudates on diabetic retinal images are discused. In the initial stage, the binary operations are used to identify the exudates. Similarly, the RGB channel space of the DR image is used to create fuzzy sets and membership functions for extracting the exudates. The membership directives obtained from the fuzzy rule set are used to detect the grade of exudates. In order to evaluate the proposed approach, experiment tests are carriedout on various set of images and the results are verified. From the experiment results, the sensitivity obtained is 98.10%, specificity is 96.96% and accuracy is 98.2%. These results suggest that the proposed method could be a diagnostic aid for ophthalmologists in the screening for DR.
Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...TELKOMNIKA JOURNAL
In this paper, an automatic estimation of additive white Gaussian noise technique is proposed. This technique is built according to the local statistics of Gaussian noise. In the field of digital signal processing, estimation of the noise is considered as pivotal process that many signal processing tasks relies on. The main aim of this paper is to design a patch-based estimation technique in order to estimate the noise level in natural images and use it in blind image removal technique. The estimation processes is utilized selected patches which is most contaminated sub-pixels in the tested images sing principal component analysis (PCA). The performance of the suggested noise level estimation technique is shown its superior to state of the art noise estimation and noise removal algorithms, the proposed algorithm produces the best performance in most cases compared with the investigated techniques in terms of PSNR, IQI and the visual perception.
Stereo Vision Human Motion Detection and Tracking in Uncontrolled EnvironmentTELKOMNIKA JOURNAL
Stereo vision in detecting human motion is an emerging research for automation, robotics, and sports science field due to the advancement of imaging sensors and information technology. The difficulty of human motion detection and tracking is relatively complex when it is applied to uncontrolled environment. In this paper, a hybrid filter approach is proposed to detect human motion in the stereo vision. The hybrid filter approach integrates Gaussian filter and median filter to reduce the coverage of shadow and sudden change of illumination. In addition, sequential thinning and thickening morphological method is used to construct the skeleton model. The proposed hybrid approach is compared with the normalized filter. As a result, the proposed approach produces better skeleton model with less influential effect on shadow and illumination. The output results of the proposed approach can show up to 86% of average accuracy matched with skeleton model. In addition, obtains approximately 94% of sensitivity measurement in the stereo vision. The proposed approach using hybrid filter and sequential morphology could improve the performance of the detection in the uncontrolled environment.
Fingerprints are imprints formed by friction
ridges of the skin and thumbs. They have long been used for
identification because of their immutability and individuality.
Immutability refers to the permanent and unchanging character
of the pattern on each finger. Individuality refers to the
uniqueness of ridge details across individuals; the probability
that two fingerprints are alike is about 1 in 1.9x1015. In despite of
this improvement which is adopted by the Federal Bureau of
Investigation (FBI), the fact still is “The larger the fingerprint
files became, the harder it was to identify somebody from their
fingerprints alone. Moreover, the fingerprint requires one of the
largest data templates in the biometric field”. The finger data
template can range anywhere from several hundred bytes to over
1,000 bytes depending upon the level of security that is required
and the method that is used to scan one's fingerprint. For these
reasons this work is motivated to present another way to tackle
the problem that is relies on the properties of Vector
Quantization coding algorithm.
This paper presents a simple technique to perform inverse halftoning using the deep learning framework. The proposed method inherits the usability and superiority of deep residual learning to reconstruct the halftone image into the continuous-tone representation. It involves a series of convolution operations and activation function in forms of residual block elements. We investigate the usage of pre-activation function and standard activation function in each residual block. The experimental section validates the proposed method ability to effectively reconstruct the halftone image. This section also exhibits the proposed method superiority in the inverse halftoning task compared to that of the handcrafted feature schemes and former deep learning approaches. The proposed method achieves 30.37 dB and 0.9481 on the average peak signal-to-noise ratio (PSNR) and structural similarity index (SSIM) scores, respectively. It gives the improvements around 1.67 dB and 0.0481 for those values compared to the most competing scheme.
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...sipij
OCT is a recently developed optical interferometric
technique for non-invasive diagnostic medical imag
ing
in vivo; the most sensitive optical imaging modalit
y.OCT finds its application in ophthalmology, blood
flow
estimation and cancer diagnosis along with many non
biomedical applications. The main advantage of
OCT is its high resolution which is in
μ
m range and depth of penetration in mm range. Unlik
e other
techniques like X rays and CT scan, OCT does not co
mprise any x ray source and therefore no radiations
are involved. This research work discusses the basi
cs of spectral domain OCT (SD-OCT), experimental
setup, data acquisition and signal processing invol
ved in OCT systems. Simulation of OCT involving
modelling and signal processing, carried out on Lab
VIEW platform has been discussed. Using the
experimental setup, some of the non biomedical samp
les have been scanned. The signal processing and
image processing of the scanned data was carried ou
t in MATLAB and Lab VIEW, some of the results thus
obtained have been discussed in the end
ABSTRACT : A hardware/software (HW/SW) co-design approach developing a contact lenses try-on system via the use of the Field Programmable Gate Array (FPGA) [1] is proposed in this paper. To achieve an interactive user-friendly environment, the menu of contact lenses and the result that shows how it looks when wearing the contact lens are displayed on the LCD touch panel directly. After capturing the user’s image via CMOS sensors, image processing is employed to determine user’s irises from the image. A particle filter algorithm is then introduced to track the irises so that the contact lenses chosen by the user can be overlapped on the image to provide a natural examination of the effect of the contact lenses try-on system. Experimental results show good performances of the proposed system. Keywords: FPGA, Eye Tracking, Particle Filter, Nios II, Image Processing
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input (MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
3D reconstruction is a technique used in computer vision which has a wide range of applications in areas like object recognition, city modelling, virtual reality, physical simulations, video games and special effects. Previously, to perform a 3D reconstruction, specialized hardwares were required. Such systems were often very expensive and was only available for industrial or research purpose. With the rise of the availability of high-quality low cost 3D sensors, it is now possible to design inexpensive complete 3D scanning systems. The objective of this work was to design an acquisition and processing system that can perform 3D scanning and reconstruction of objects seamlessly. In addition, the goal of this work also included making the 3D scanning process fully automated by building and integrating a turntable alongside the software. This means the user can perform a full 3D scan only by a press of a few buttons from our dedicated graphical user interface. Three main steps were followed to go from acquisition of point clouds to the finished reconstructed 3D model. First, our system acquires point cloud data of a person/object using inexpensive camera sensor. Second, align and convert the acquired point cloud data into a watertight mesh of good quality. Third, export the reconstructed model to a 3D printer to obtain a proper 3D print of the model.
3D reconstruction is a technique used in computer vision which has a wide range of applications in areas like object recognition, city modelling, virtual reality, physical simulations, video games and special effects. Previously, to perform a 3D reconstruction, specialized hardwares were required. Such systems were often very expensive and was only available for industrial or research purpose. With the rise of the availability of high-quality low cost 3D sensors, it is now possible to design inexpensive complete 3D scanning systems. The objective of this work was to design an acquisition and processing system that can perform 3D scanning and reconstruction of objects seamlessly. In addition, the goal of this work also included making the 3D scanning process fully automated by building and integrating a turntable alongside the software. This means the user can perform a full 3D scan only by a press of a few buttons from our dedicated graphical user interface. Three main steps were followed to go from acquisition of point clouds to the finished reconstructed 3D model. First, our system acquires point cloud data of a person/object using inexpensive camera sensor. Second, align and convert the acquired point cloud data into a watertight mesh of good quality. Third, export the reconstructed model to a 3D printer to obtain a proper 3D print of the model.
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...ijcsit
3D reconstruction is a technique used in computer vision which has a wide range of applications in
areas like object recognition, city modelling, virtual reality, physical simulations, video games and
special effects. Previously, to perform a 3D reconstruction, specialized hardwares were required.
Such systems were often very expensive and was only available for industrial or research purpose.
With the rise of the availability of high-quality low cost 3D sensors, it is now possible to design
inexpensive complete 3D scanning systems. The objective of this work was to design an acquisition and
processing system that can perform 3D scanning and reconstruction of objects seamlessly. In addition,
the goal of this work also included making the 3D scanning process fully automated by building and
integrating a turntable alongside the software. This means the user can perform a full 3D scan only by
a press of a few buttons from our dedicated graphical user interface. Three main steps were followed
to go from acquisition of point clouds to the finished reconstructed 3D model. First, our system
acquires point cloud data of a person/object using inexpensive camera sensor. Second, align and
convert the acquired point cloud data into a watertight mesh of good quality. Third, export the
reconstructed model to a 3D printer to obtain a proper 3D print of the model.