The document summarizes an adaptive compressed image hashing method using modified Center Symmetric Local Binary Pattern (CSLBP) and color weight factors derived from the L*a*b* color space. The proposed method extracts texture features using modified CSLBP on the luminance channel of the L*a*b* color space. Color weight factors are then used adaptively, applying averaging for smooth regions and differencing for non-smooth regions, to enhance the discrimination capability of the generated hash. Experimental results using benchmarks like normalized hamming distance and ROC characteristics demonstrate the method can successfully differentiate between content-changing and content-preserving modifications of color images.
Image hashing is an efficient way to handle digital data authentication problem. Image hashing represents quality summarization of image features in compact manner. In this paper, the modified center symmetric local binary pattern (CSLBP) image hashing algorithm is proposed. Unlike CSLBP 16 bin histogram, Modified CSLBP generates 8 bin histogram without compromise on quality to generate compact hash. It has been found that, uniform quantization on a histogram with more bin results in more precision loss. To overcome quantization loss, modified CSLBP generates the two histogram of a four bin. Uniform quantization on a 4 bin histogram results in less precision loss than a 16 bin histogram. The first generated histogram represents the nearest neighbours and second one is for the diagonal neighbours. To enhance quality in terms of discrimination power, different weight factor are used during histogram generation. For the nearest and the diagonal neighbours, two local weight factors are used. One is the Standard Deviation (SD) and other is the Laplacian of Gaussian (LoG). Standard deviation represents a spread of data which captures local variation from mean. LoG is a second order derivative edge detection operator which detects edges well in presence of noise. The proposed algorithm is resilient to the various kinds of attacks. The proposed method is tested on database having malicious and non-malicious images using benchmark like NHD and ROC which confirms theoretical analysis. The experimental results shows good performance of the proposed method for various attacks despite the short hash length.
The document presents a method for detecting copy-move forgery in digital images using center-symmetric local binary pattern (CS-LBP). The key steps are:
1. The input image is converted to grayscale and divided into overlapping blocks.
2. CS-LBP features are extracted from each block to represent textures while being invariant to illumination and rotation. This reduces the feature dimensions compared to local binary pattern (LBP).
3. The distances between feature vectors are calculated and sorted lexicographically to group similar blocks together. Distances below a threshold indicate copied regions.
4. Post-processing with morphological operations fills holes and removes outliers to generate a mask of the forged regions.
The
Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...IOSR Journals
Abstract: For enhancing an image various enhancement schemes are used which includes gray scale manipulation, filtering and Histogram Equalization, Where Histogram equalization is one of the well known image enhancement technique. It became a popular technique for contrast enhancement because it is simple and effective. The basic idea of Histogram Equalization method is to remap the gray levels of an image. Here using morphological segmentation we can get the segmented image. Morphological reconstruction is used to segment the image. Comparative analysis of different enhancement and segmentation will be carried out. This comparison will be done on the basis of subjective and objective parameters. Subjective parameter is visual quality and objective parameters are Area, Perimeter, Min and Max intensity, Avg Voxel Intensity, Std Dev of Intensity, Eccentricity, Coefficient of skewness, Coefficient of Kurtosis, Median intensity, Mode intensity. Keywords: Histogram Equalization, Segmentation, Morphological Reconstruction .
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...CSCJournals
Salient points are locations in an image where there is a significant variation with respect to a chosen image feature. Since the set of salient points in an image capture important local characteristics of that image, they can form the basis of a good image representation for content-based image retrieval (CBIR). Salient features are generally determined from the local differential structure of images. They focus on the shape saliency of the local neighborhood. Most of these detectors are luminance based which have the disadvantage that the distinctiveness of the local color information is completely ignored in determining salient image features. To fully exploit the possibilities of salient point detection in color images, color distinctiveness should be taken into account in addition to shape distinctiveness. This paper presents a method for salient points determination based on color saliency. The color and texture information around these points of interest serve as the local descriptors of the image. In addition, the shape information is captured in terms of edge images computed using Gradient Vector Flow fields. Invariant moments are then used to record the shape features. The combination of the local color, texture and the global shape features provides a robust feature set for image retrieval. The experimental results demonstrate the efficacy of the method.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
The development of multimedia system technology in Content based Image Retrieval (CBIR) System is
one in every of the outstanding area to retrieve the images from an oversized collection of database. The feature
vectors of the query image are compared with feature vectors of the database images to get matching images.It is
much observed that anyone algorithm isn't beneficial in extracting all differing kinds of natural images. Thus an
intensive analysis of certain color, texture and shape extraction techniques are allotted to spot an efficient CBIR
technique that suits for a selected sort of images. The Extraction of an image includes feature description and
feature extraction. During this paper, we tend to projected Color Layout Descriptor (CLD), grey Level Co-
Occurrences Matrix (GLCM), Marker-Controlled Watershed Segmentation feature extraction technique that
extract the matching image based on the similarity of Color, Texture and shape within the database. For
performance analysis, the image retrieval timing results of the projected technique is calculated and compared
with every of the individual feature.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION sipij
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed. The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT. The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigenlips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips
reading modeled , which wasn’t illustrate the superior performance of the method.
CONTRAST ENHANCEMENT TECHNIQUES USING HISTOGRAM EQUALIZATION METHODS ON COLOR...IJCSEA Journal
Histogram equalization (HE) is a simple and widely used image contrast enhancement technique. The basic disadvantage of HE is it changes the brightness of the image. In order to overcome this drawback, various HE methods have been proposed. These methods preserves the brightness on the output image but, does not have a natural look. In order to overcome this problem the, present paper uses Multi-HE methods, which decompose the image into several sub images, and classical HE method is applied to each sub image. The algorithm is applied on various images and has been analysed using both objective and subjective assessment.
Image hashing is an efficient way to handle digital data authentication problem. Image hashing represents quality summarization of image features in compact manner. In this paper, the modified center symmetric local binary pattern (CSLBP) image hashing algorithm is proposed. Unlike CSLBP 16 bin histogram, Modified CSLBP generates 8 bin histogram without compromise on quality to generate compact hash. It has been found that, uniform quantization on a histogram with more bin results in more precision loss. To overcome quantization loss, modified CSLBP generates the two histogram of a four bin. Uniform quantization on a 4 bin histogram results in less precision loss than a 16 bin histogram. The first generated histogram represents the nearest neighbours and second one is for the diagonal neighbours. To enhance quality in terms of discrimination power, different weight factor are used during histogram generation. For the nearest and the diagonal neighbours, two local weight factors are used. One is the Standard Deviation (SD) and other is the Laplacian of Gaussian (LoG). Standard deviation represents a spread of data which captures local variation from mean. LoG is a second order derivative edge detection operator which detects edges well in presence of noise. The proposed algorithm is resilient to the various kinds of attacks. The proposed method is tested on database having malicious and non-malicious images using benchmark like NHD and ROC which confirms theoretical analysis. The experimental results shows good performance of the proposed method for various attacks despite the short hash length.
The document presents a method for detecting copy-move forgery in digital images using center-symmetric local binary pattern (CS-LBP). The key steps are:
1. The input image is converted to grayscale and divided into overlapping blocks.
2. CS-LBP features are extracted from each block to represent textures while being invariant to illumination and rotation. This reduces the feature dimensions compared to local binary pattern (LBP).
3. The distances between feature vectors are calculated and sorted lexicographically to group similar blocks together. Distances below a threshold indicate copied regions.
4. Post-processing with morphological operations fills holes and removes outliers to generate a mask of the forged regions.
The
Feature Extraction of an Image by Using Adaptive Filtering and Morpological S...IOSR Journals
Abstract: For enhancing an image various enhancement schemes are used which includes gray scale manipulation, filtering and Histogram Equalization, Where Histogram equalization is one of the well known image enhancement technique. It became a popular technique for contrast enhancement because it is simple and effective. The basic idea of Histogram Equalization method is to remap the gray levels of an image. Here using morphological segmentation we can get the segmented image. Morphological reconstruction is used to segment the image. Comparative analysis of different enhancement and segmentation will be carried out. This comparison will be done on the basis of subjective and objective parameters. Subjective parameter is visual quality and objective parameters are Area, Perimeter, Min and Max intensity, Avg Voxel Intensity, Std Dev of Intensity, Eccentricity, Coefficient of skewness, Coefficient of Kurtosis, Median intensity, Mode intensity. Keywords: Histogram Equalization, Segmentation, Morphological Reconstruction .
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...CSCJournals
Salient points are locations in an image where there is a significant variation with respect to a chosen image feature. Since the set of salient points in an image capture important local characteristics of that image, they can form the basis of a good image representation for content-based image retrieval (CBIR). Salient features are generally determined from the local differential structure of images. They focus on the shape saliency of the local neighborhood. Most of these detectors are luminance based which have the disadvantage that the distinctiveness of the local color information is completely ignored in determining salient image features. To fully exploit the possibilities of salient point detection in color images, color distinctiveness should be taken into account in addition to shape distinctiveness. This paper presents a method for salient points determination based on color saliency. The color and texture information around these points of interest serve as the local descriptors of the image. In addition, the shape information is captured in terms of edge images computed using Gradient Vector Flow fields. Invariant moments are then used to record the shape features. The combination of the local color, texture and the global shape features provides a robust feature set for image retrieval. The experimental results demonstrate the efficacy of the method.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
The development of multimedia system technology in Content based Image Retrieval (CBIR) System is
one in every of the outstanding area to retrieve the images from an oversized collection of database. The feature
vectors of the query image are compared with feature vectors of the database images to get matching images.It is
much observed that anyone algorithm isn't beneficial in extracting all differing kinds of natural images. Thus an
intensive analysis of certain color, texture and shape extraction techniques are allotted to spot an efficient CBIR
technique that suits for a selected sort of images. The Extraction of an image includes feature description and
feature extraction. During this paper, we tend to projected Color Layout Descriptor (CLD), grey Level Co-
Occurrences Matrix (GLCM), Marker-Controlled Watershed Segmentation feature extraction technique that
extract the matching image based on the similarity of Color, Texture and shape within the database. For
performance analysis, the image retrieval timing results of the projected technique is calculated and compared
with every of the individual feature.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION sipij
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed. The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT. The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigenlips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips
reading modeled , which wasn’t illustrate the superior performance of the method.
CONTRAST ENHANCEMENT TECHNIQUES USING HISTOGRAM EQUALIZATION METHODS ON COLOR...IJCSEA Journal
Histogram equalization (HE) is a simple and widely used image contrast enhancement technique. The basic disadvantage of HE is it changes the brightness of the image. In order to overcome this drawback, various HE methods have been proposed. These methods preserves the brightness on the output image but, does not have a natural look. In order to overcome this problem the, present paper uses Multi-HE methods, which decompose the image into several sub images, and classical HE method is applied to each sub image. The algorithm is applied on various images and has been analysed using both objective and subjective assessment.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
This document summarizes image indexing and its features. It discusses that image indexing is used to retrieve similar images from a database based on extracted features like color, shape, and texture. Color features can be represented by models like RGB, HSV, and color histograms. Shape features include global properties like roundness and local features like edge segments. Texture is described using statistical, structural, and spectral approaches. Texture feature extraction methods discussed include standard wavelets, Gabor wavelets, and extracting features like entropy and standard deviation. The paper provides an overview of the different features used for image indexing and classification.
Information search using text and image queryeSAT Journals
Abstract An image retrieval and re-ranking system utilizing a visual re-ranking framework which is proposed in this paper the system retrieves a dataset from the World Wide Web based on textual query submitted by the user. These results are kept as data set for information retrieval. This dataset is then re-ranked using a visual query (multiple images selected by user from the dataset) which conveys user’s intention semantically. Visual descriptors (MPEG-7) which describe image with respect to low-level feature like color, texture, etc are used for calculating distances. These distances are a measure of similarity between query images and members of the dataset. Our proposed system has been assessed on different types of queries such as apples, Console, Paris, etc. It shows significant improvement on initial text-based search results.This system is well suitable for online shopping application. Index Terms: MPEG-7, Color Layout Descriptor (CLD), Edge Histogram Descriptor (EHD), image retrieval and re-ranking system
Abstract Image Segmentation plays a vital role in image processing. The research in this area is still relevant due to its wide applications. Image segmentation is a process of assigning a label to every pixel in an image such that pixels with same label share certain visual characteristics. Sometimes it becomes necessary to calculate the total number of colors from the given RGB image to quantize the image, to detect cancer and brain tumour. The goal of this paper is to provide the best algorithm for image segmentation. Keywords: Image segmentation, RGB
This document summarizes a research paper that proposes an image retrieval and re-ranking system using both text and visual queries. The system first retrieves images from the web based on a textual query submitted by the user. The user can then select multiple example images from the results to better convey their intent. The system calculates visual similarities between the example images and results based on MPEG-7 descriptors like color and texture. Distances are combined to re-rank the initial text-based search results, aiming to improve relevance by incorporating the visual query. The system is evaluated on queries like "apples", "Paris" and "Console" and shows better results than text-only searches according to the document.
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...cscpconf
In this paper a robust approach is proposed for content based image retrieval (CBIR) using texture analysis techniques. The proposed approach includes three main steps. In the first one, shape detection is done based on Top-Hat transform to detect and crop object part of the image. Second step is included a texture feature representation algorithm using color local binary patterns (CLBP) and local variance features. Finally, to retrieve mostly closing matching images to the query, log likelihood ratio is used. The performance of the proposed approach is evaluated using Corel and Simplicity image sets and it compared by some of other well-known approaches in terms of precision and recall which shows the superiority of the proposed approach. Low noise sensitivity, rotation invariant, shift invariant, gray scale invariant and low computational complexity are some of other advantages.
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Zahra Mansoori
This document presents a new approach for content-based image retrieval that combines color, texture, and a binary tree structure to describe images and their features. Color histograms in HSV color space and wavelet texture features are extracted as low-level features. A binary tree partitions each image into regions based on color and represents higher-level spatial relationships. The performance of the proposed system is evaluated on a subset of the COREL image database and compared to the SIMPLIcity image retrieval system. Experimental results show the proposed system has better retrieval performance than SIMPLIcity in some categories and comparable performance in others.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document describes an image fusion method using pyramidal decomposition. It proposes extracting fine details from input images using guided filtering and fusing the base layers of images across multiple exposures or focal points using a multiresolution pyramid approach. A weight map is generated considering exposure, contrast, and saturation to guide the fusion of base layers. The fused base layer is then combined with extracted fine details to produce a detail-enhanced fused image. The goal is to preserve details in both very dark and extremely bright regions of the input images. It is argued that this method can effectively fuse images from different exposures or focal points without introducing artifacts.
Automated Colorization of Grayscale Images Using Texture DescriptorsIDES Editor
The document proposes a novel automated process called ACTD for colorizing grayscale images using texture descriptors without human intervention. It analyzes sample color images to extract coherent texture regions, then uses Gabor filtering for texture-based segmentation. Texture descriptors and color information are computed and stored for each region. These are then used to colorize a new grayscale image based on texture matching. The method combines techniques such as Gabor filtering, fuzzy C-means clustering with a new "Gki factor" for noise tolerance, and content-based image retrieval of texture descriptors. Preliminary results found the approach viable but improvements were needed for scale and rotation invariance.
A New Method for Indoor-outdoor Image Classification Using Color Correlated T...CSCJournals
In this paper a new method for indoor-outdoor image classification is presented; where the concept of Color Correlated Temperature is used to extract distinguishing features between the two classes. In this process, using Hue color component, each image is segmented into different color channels and color correlated temperature is calculated for each channel. These values are then incorporated to build the image feature vector. Besides color temperature values, the feature vector also holds information about the color formation of the image. In the classification phase, KNN classifier is used to classify images as indoor or outdoor. Two different datasets are used for test purposes; a collection of images gathered from the internet and a second dataset built by frame extraction from different video sequences from one video capturing device. High classification rate, compared to other state of the art methods shows the ability of the proposed method for indoor-outdoor image classification.
This document reviews techniques for multi-image morphing. It discusses early cross-dissolve morphing methods and their limitations. Mesh warping and field morphing are introduced as improved techniques that use control points and line mappings to better align images during transition. The document also summarizes point distribution, critical point filters, and other common morphing methods. It concludes by noting that effective morphing requires mechanisms for feature specification, warp generation, and transition control.
Orientation Spectral Resolution Coding for Pattern RecognitionIOSRjournaljce
In the approach of pattern recognition, feature descriptions are of greater importance. Features are represented in spatial domain and transformed domain. Wherein, spatial domain features are of lower representation, transformed domains are finer and more informative. In the transformed domain representation, features are represented using spectral coding using advanced transformation technique such as wavelet transformation. However, the feature extraction approach considers the band coefficients; the orientation variation is not considered. In this paper towards inherent orientation variation among each spectral band is derived, and the approach of orientation filtration is made for effective feature representation. The obtained result illustrates an improvement in the recognition accuracy, in comparison to conventional retrieval system.
Performance on Image Segmentation Resulting In Canny and MoGIOSR Journals
The document discusses image segmentation techniques using the Canny edge detector and Mixture of Gaussians (MoG) classifier. It begins with an abstract discussing how images are analyzed using features like edges, color, texture, and shape. It then discusses the Canny edge detector, noting it was developed to detect a wide range of edges in a multi-stage algorithm. The document focuses on improving image classification accuracy by combining natural image statistics and scene semantics features in a MoG classifier with an integrated feature weighting model.
This document presents a method for interactive image segmentation using constrained active contours. It begins with an overview of existing interactive segmentation techniques, including boundary-based methods like active contours/snakes and region-based methods like random walks and graph cuts. The proposed method initializes a contour using region-based segmentation then refines it using a convex active contour model that incorporates both regional information from seed pixels and boundary smoothness. This allows the contour to globally evolve to object boundaries while handling topology changes.
This document summarizes an evaluation of texture feature extraction methods for content-based image retrieval, including co-occurrence matrices, Tamura features, and Gabor filters. The evaluation tested these methods on a Corel image collection using Manhattan distance as the similarity measure. Co-occurrence matrices performed best with homogeneity as the feature, while Gabor wavelets showed better performance for homogeneous textures of fixed sizes. Tamura features performed poorly with directionality. Overall, co-occurrence matrices provided the best results for general texture retrieval.
Review on Image Enhancement in Spatial Domainidescitation
With the proliferation in electronic imaging devices
like in mobiles, computer vision, medical field and space field;
image enhancement field has become the quite interesting
and important area of research. These imaging devices are
viewed under a diverse range of viewing conditions and a huge
loss in contrast under bright outdoor viewing conditions; thus
viewing condition parameters such as surround effects,
correlated color temperature and ambient lighting have
become of significant importance. Therefore, Principle
objective of Image enhancement is to adjust the quality of an
image for better human visual perception. Appropriate choice
of enhancement techniques is greatly influenced by the
imaging modality, task at hand and viewing conditions.
Basically, image enhancement techniques have been classified
into two broad categories: Spatial domain image enhancement
and Frequency domain image enhancement. This survey report
gives an overview of different methodologies have been used
for enhancement under the spatial domain category. It is noted
that in this field still more research is to be done.
MMFO: modified moth flame optimization algorithm for region based RGB color i...IJECEIAES
Region-based color image segmentation is elementary steps in image processing and computer vision. The region-based color image segmentation has faced the problem of multidimensionality. The color image is considered in five-dimensional problems, in which three dimensions in color (RGB) and two dimensions in geometry (luminosity layer and chromaticity layer). In this paper, L*a*b color space conversion has been used to reduce the one dimension and geometrically it converts in the array hence the further one dimension has been reduced. This paper introduced, an improved algorithm modified moth flame optimization (MMFO) algorithm for RGB color image segmentation which is based on bio-inspired techniques. The simulation results of MMFO for region based color image segmentation are performed better as compared to PSO and GA, in terms of computation times for all the images. The experiment results of this method gives clear segments based on the different color and the different number of clusters is used during the segmentation process.
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
This document proposes a method to detect digital image forgeries using local binary patterns (LBP) and histogram of oriented gradients (HOG). It extracts LBP features from the input image, then applies HOG to the LBP features. These combined features are classified using a support vector machine (SVM) as authentic or tampered. Testing on CASIA datasets achieved detection rates of 92.3% for CASIA-1 and 96.1% for CASIA-2, outperforming other existing methods. The method is effective at forgery detection while having reduced time complexity.
Survey on Local Color Image DescriptorsIRJET Journal
This document discusses local color image descriptors that can be extracted from images represented using Quaternionic representations. It provides an overview of several existing local descriptors that use Quaternionic representations, including QLRBP, QWLD, and QMCBP. QLRBP uses Clifford translation and local binary coding on the phase to generate descriptors from Quaternionically represented color images. QWLD integrates Quaternionic representation and Weber's law to develop robust descriptors. QMCBP uses Michelson contrast and Quaternionic representation to extract discriminative local features. The document evaluates these approaches on applications like person reidentification and face recognition, finding they outperform methods extracting descriptors from individual color channels.
Implementation of High Dimension Colour Transform in Domain of Image ProcessingIRJET Journal
This document discusses implementing a high-dimensional color transform method for salient region detection in images. It aims to extract salient regions by designing a saliency map using global and local image features. The creation of the saliency map involves mapping colors from RGB space to a high-dimensional color space to find an optimal linear combination of color coefficients. This allows composing an accurate saliency map. The performance is further improved by using relative location and color contrast between superpixels as features and resolving the saliency estimation from an initial trimap using a learning-based algorithm. The method is analyzed on a dataset of training images.
This document presents a probabilistic approach to rate control for optimal color image compression and video transmission. It summarizes a rate-distortion model for color image compression that was previously introduced. Based on this model, the document proposes an improved color image compression algorithm that uses the discrete cosine transform and models subband coefficients with a Laplacian distribution. It shows how the rate-distortion model can be used for rate control of compression, allowing target rates or bitrates to be achieved for still images and video sequences. Simulation results demonstrate that the new algorithm outperforms other available compression systems such as JPEG in terms of peak signal-to-noise ratio and a perceptual quality metric.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
This document summarizes image indexing and its features. It discusses that image indexing is used to retrieve similar images from a database based on extracted features like color, shape, and texture. Color features can be represented by models like RGB, HSV, and color histograms. Shape features include global properties like roundness and local features like edge segments. Texture is described using statistical, structural, and spectral approaches. Texture feature extraction methods discussed include standard wavelets, Gabor wavelets, and extracting features like entropy and standard deviation. The paper provides an overview of the different features used for image indexing and classification.
Information search using text and image queryeSAT Journals
Abstract An image retrieval and re-ranking system utilizing a visual re-ranking framework which is proposed in this paper the system retrieves a dataset from the World Wide Web based on textual query submitted by the user. These results are kept as data set for information retrieval. This dataset is then re-ranked using a visual query (multiple images selected by user from the dataset) which conveys user’s intention semantically. Visual descriptors (MPEG-7) which describe image with respect to low-level feature like color, texture, etc are used for calculating distances. These distances are a measure of similarity between query images and members of the dataset. Our proposed system has been assessed on different types of queries such as apples, Console, Paris, etc. It shows significant improvement on initial text-based search results.This system is well suitable for online shopping application. Index Terms: MPEG-7, Color Layout Descriptor (CLD), Edge Histogram Descriptor (EHD), image retrieval and re-ranking system
Abstract Image Segmentation plays a vital role in image processing. The research in this area is still relevant due to its wide applications. Image segmentation is a process of assigning a label to every pixel in an image such that pixels with same label share certain visual characteristics. Sometimes it becomes necessary to calculate the total number of colors from the given RGB image to quantize the image, to detect cancer and brain tumour. The goal of this paper is to provide the best algorithm for image segmentation. Keywords: Image segmentation, RGB
This document summarizes a research paper that proposes an image retrieval and re-ranking system using both text and visual queries. The system first retrieves images from the web based on a textual query submitted by the user. The user can then select multiple example images from the results to better convey their intent. The system calculates visual similarities between the example images and results based on MPEG-7 descriptors like color and texture. Distances are combined to re-rank the initial text-based search results, aiming to improve relevance by incorporating the visual query. The system is evaluated on queries like "apples", "Paris" and "Console" and shows better results than text-only searches according to the document.
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...cscpconf
In this paper a robust approach is proposed for content based image retrieval (CBIR) using texture analysis techniques. The proposed approach includes three main steps. In the first one, shape detection is done based on Top-Hat transform to detect and crop object part of the image. Second step is included a texture feature representation algorithm using color local binary patterns (CLBP) and local variance features. Finally, to retrieve mostly closing matching images to the query, log likelihood ratio is used. The performance of the proposed approach is evaluated using Corel and Simplicity image sets and it compared by some of other well-known approaches in terms of precision and recall which shows the superiority of the proposed approach. Low noise sensitivity, rotation invariant, shift invariant, gray scale invariant and low computational complexity are some of other advantages.
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Zahra Mansoori
This document presents a new approach for content-based image retrieval that combines color, texture, and a binary tree structure to describe images and their features. Color histograms in HSV color space and wavelet texture features are extracted as low-level features. A binary tree partitions each image into regions based on color and represents higher-level spatial relationships. The performance of the proposed system is evaluated on a subset of the COREL image database and compared to the SIMPLIcity image retrieval system. Experimental results show the proposed system has better retrieval performance than SIMPLIcity in some categories and comparable performance in others.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document describes an image fusion method using pyramidal decomposition. It proposes extracting fine details from input images using guided filtering and fusing the base layers of images across multiple exposures or focal points using a multiresolution pyramid approach. A weight map is generated considering exposure, contrast, and saturation to guide the fusion of base layers. The fused base layer is then combined with extracted fine details to produce a detail-enhanced fused image. The goal is to preserve details in both very dark and extremely bright regions of the input images. It is argued that this method can effectively fuse images from different exposures or focal points without introducing artifacts.
Automated Colorization of Grayscale Images Using Texture DescriptorsIDES Editor
The document proposes a novel automated process called ACTD for colorizing grayscale images using texture descriptors without human intervention. It analyzes sample color images to extract coherent texture regions, then uses Gabor filtering for texture-based segmentation. Texture descriptors and color information are computed and stored for each region. These are then used to colorize a new grayscale image based on texture matching. The method combines techniques such as Gabor filtering, fuzzy C-means clustering with a new "Gki factor" for noise tolerance, and content-based image retrieval of texture descriptors. Preliminary results found the approach viable but improvements were needed for scale and rotation invariance.
A New Method for Indoor-outdoor Image Classification Using Color Correlated T...CSCJournals
In this paper a new method for indoor-outdoor image classification is presented; where the concept of Color Correlated Temperature is used to extract distinguishing features between the two classes. In this process, using Hue color component, each image is segmented into different color channels and color correlated temperature is calculated for each channel. These values are then incorporated to build the image feature vector. Besides color temperature values, the feature vector also holds information about the color formation of the image. In the classification phase, KNN classifier is used to classify images as indoor or outdoor. Two different datasets are used for test purposes; a collection of images gathered from the internet and a second dataset built by frame extraction from different video sequences from one video capturing device. High classification rate, compared to other state of the art methods shows the ability of the proposed method for indoor-outdoor image classification.
This document reviews techniques for multi-image morphing. It discusses early cross-dissolve morphing methods and their limitations. Mesh warping and field morphing are introduced as improved techniques that use control points and line mappings to better align images during transition. The document also summarizes point distribution, critical point filters, and other common morphing methods. It concludes by noting that effective morphing requires mechanisms for feature specification, warp generation, and transition control.
Orientation Spectral Resolution Coding for Pattern RecognitionIOSRjournaljce
In the approach of pattern recognition, feature descriptions are of greater importance. Features are represented in spatial domain and transformed domain. Wherein, spatial domain features are of lower representation, transformed domains are finer and more informative. In the transformed domain representation, features are represented using spectral coding using advanced transformation technique such as wavelet transformation. However, the feature extraction approach considers the band coefficients; the orientation variation is not considered. In this paper towards inherent orientation variation among each spectral band is derived, and the approach of orientation filtration is made for effective feature representation. The obtained result illustrates an improvement in the recognition accuracy, in comparison to conventional retrieval system.
Performance on Image Segmentation Resulting In Canny and MoGIOSR Journals
The document discusses image segmentation techniques using the Canny edge detector and Mixture of Gaussians (MoG) classifier. It begins with an abstract discussing how images are analyzed using features like edges, color, texture, and shape. It then discusses the Canny edge detector, noting it was developed to detect a wide range of edges in a multi-stage algorithm. The document focuses on improving image classification accuracy by combining natural image statistics and scene semantics features in a MoG classifier with an integrated feature weighting model.
This document presents a method for interactive image segmentation using constrained active contours. It begins with an overview of existing interactive segmentation techniques, including boundary-based methods like active contours/snakes and region-based methods like random walks and graph cuts. The proposed method initializes a contour using region-based segmentation then refines it using a convex active contour model that incorporates both regional information from seed pixels and boundary smoothness. This allows the contour to globally evolve to object boundaries while handling topology changes.
This document summarizes an evaluation of texture feature extraction methods for content-based image retrieval, including co-occurrence matrices, Tamura features, and Gabor filters. The evaluation tested these methods on a Corel image collection using Manhattan distance as the similarity measure. Co-occurrence matrices performed best with homogeneity as the feature, while Gabor wavelets showed better performance for homogeneous textures of fixed sizes. Tamura features performed poorly with directionality. Overall, co-occurrence matrices provided the best results for general texture retrieval.
Review on Image Enhancement in Spatial Domainidescitation
With the proliferation in electronic imaging devices
like in mobiles, computer vision, medical field and space field;
image enhancement field has become the quite interesting
and important area of research. These imaging devices are
viewed under a diverse range of viewing conditions and a huge
loss in contrast under bright outdoor viewing conditions; thus
viewing condition parameters such as surround effects,
correlated color temperature and ambient lighting have
become of significant importance. Therefore, Principle
objective of Image enhancement is to adjust the quality of an
image for better human visual perception. Appropriate choice
of enhancement techniques is greatly influenced by the
imaging modality, task at hand and viewing conditions.
Basically, image enhancement techniques have been classified
into two broad categories: Spatial domain image enhancement
and Frequency domain image enhancement. This survey report
gives an overview of different methodologies have been used
for enhancement under the spatial domain category. It is noted
that in this field still more research is to be done.
MMFO: modified moth flame optimization algorithm for region based RGB color i...IJECEIAES
Region-based color image segmentation is elementary steps in image processing and computer vision. The region-based color image segmentation has faced the problem of multidimensionality. The color image is considered in five-dimensional problems, in which three dimensions in color (RGB) and two dimensions in geometry (luminosity layer and chromaticity layer). In this paper, L*a*b color space conversion has been used to reduce the one dimension and geometrically it converts in the array hence the further one dimension has been reduced. This paper introduced, an improved algorithm modified moth flame optimization (MMFO) algorithm for RGB color image segmentation which is based on bio-inspired techniques. The simulation results of MMFO for region based color image segmentation are performed better as compared to PSO and GA, in terms of computation times for all the images. The experiment results of this method gives clear segments based on the different color and the different number of clusters is used during the segmentation process.
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
This document proposes a method to detect digital image forgeries using local binary patterns (LBP) and histogram of oriented gradients (HOG). It extracts LBP features from the input image, then applies HOG to the LBP features. These combined features are classified using a support vector machine (SVM) as authentic or tampered. Testing on CASIA datasets achieved detection rates of 92.3% for CASIA-1 and 96.1% for CASIA-2, outperforming other existing methods. The method is effective at forgery detection while having reduced time complexity.
Survey on Local Color Image DescriptorsIRJET Journal
This document discusses local color image descriptors that can be extracted from images represented using Quaternionic representations. It provides an overview of several existing local descriptors that use Quaternionic representations, including QLRBP, QWLD, and QMCBP. QLRBP uses Clifford translation and local binary coding on the phase to generate descriptors from Quaternionically represented color images. QWLD integrates Quaternionic representation and Weber's law to develop robust descriptors. QMCBP uses Michelson contrast and Quaternionic representation to extract discriminative local features. The document evaluates these approaches on applications like person reidentification and face recognition, finding they outperform methods extracting descriptors from individual color channels.
Implementation of High Dimension Colour Transform in Domain of Image ProcessingIRJET Journal
This document discusses implementing a high-dimensional color transform method for salient region detection in images. It aims to extract salient regions by designing a saliency map using global and local image features. The creation of the saliency map involves mapping colors from RGB space to a high-dimensional color space to find an optimal linear combination of color coefficients. This allows composing an accurate saliency map. The performance is further improved by using relative location and color contrast between superpixels as features and resolving the saliency estimation from an initial trimap using a learning-based algorithm. The method is analyzed on a dataset of training images.
This document presents a probabilistic approach to rate control for optimal color image compression and video transmission. It summarizes a rate-distortion model for color image compression that was previously introduced. Based on this model, the document proposes an improved color image compression algorithm that uses the discrete cosine transform and models subband coefficients with a Laplacian distribution. It shows how the rate-distortion model can be used for rate control of compression, allowing target rates or bitrates to be achieved for still images and video sequences. Simulation results demonstrate that the new algorithm outperforms other available compression systems such as JPEG in terms of peak signal-to-noise ratio and a perceptual quality metric.
IRJET-A Review on Implementation of High Dimension Colour Transform in Domain...IRJET Journal
This document reviews algorithms for detecting salient regions in images using high dimensional color transforms. It summarizes several existing methods that use color contrast, frequency analysis, and superpixel segmentation. A key method discussed creates a saliency map by finding the optimal linear combination of color coefficients in a high dimensional color space. This allows more accurate detection of salient objects versus methods using only RGB color. The performance of this high dimensional color transform method is improved by also utilizing relative location and color contrast between superpixels as learned features.
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioCSCJournals
We intend to make a 3D model using a stereo pair of images by using a novel method of local matching in pixel domain for calculating horizontal disparities. We also find the occlusion ratio using the stereo pair followed by the use of The Edge Detection and Image SegmentatiON (EDISON) system, on one the images, which provides a complete toolbox for discontinuity preserving filtering, segmentation and edge detection. Instead of assigning a disparity value to each pixel, a disparity plane is assigned to each segment. We then warp the segment disparities to the original image to get our final 3D viewing Model.
IRJET- Content Based Image Retrieval (CBIR)IRJET Journal
This document describes a content-based image retrieval system that uses color features to retrieve similar images from a large database. It discusses using color descriptor features to extract feature vectors from images that can then be used to retrieve near matches based on similarity. Color features provide approximate matches more quickly than individual approaches. The system works by extracting visual features from both a query image and images in the database, then comparing the features to retrieve the most similar matches from the database. Color histograms and color moments are discussed as common color features used for this type of content-based image retrieval.
Zernike moment of invariants for effective image retrieval using gaussian fil...IAEME Publication
This document summarizes a research paper that proposes using Zernike moments and steerable Gaussian filters for effective image retrieval based on color, texture, and shape features. It describes extracting dominant colors from images using dynamic color quantization and clustering. Texture features are represented using steerable filter decomposition. Shape features are described using pseudo-Zernike moments. The proposed method combines these color, texture, and shape features to generate a robust feature set for image retrieval that provides better retrieval accuracy than other methods.
This document summarizes a research paper on color image segmentation using an improved region growing and k-means method. It begins with an abstract describing the use of enhanced watershed and region growing algorithms for image and color segmentation. It then reviews related work on image segmentation techniques. The document describes the traditional watershed and region growing techniques, and proposes a new algorithm using Ncut and k-means clustering. It presents results of applying the new method versus traditional watershed segmentation, showing lower Liu's F-factor values for the new method indicating better segmentation. The conclusion is that the new technique performs both image segmentation and color segmentation more efficiently than older methods.
Image Segmentation Using Pairwise Correlation ClusteringIJERA Editor
A pairwise hypergraph based image segmentation framework is formulated in a supervised manner for various images. The image segmentation is to infer the edge label over the pairwise hypergraph by maximizing the normalized cuts. Correlation clustering which is a graph partitioning algorithm, was shown to be effective in a number of applications such as identification, clustering of documents and image segmentation.The partitioning result is derived from a algorithm to partition a pairwise graph into disjoint groups of coherent nodes. In the pairwise correlation clustering, the pairwise graph which is used in the correlation clustering is generalized to a superpixel graph where a node corresponds to a superpixel and a link between adjacent superpixels corresponds to an edge. This pairwise correlation clustering also considers the feature vector which extracts several visual cues from a superpixel, including brightness, color, texture, and shape. Significant progress in clustering has been achieved by algorithms that are based on pairwise affinities between the datasets. The experimental results are shown by calculating the typical cut and inference in an undirected graphical model and datasets.
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...ijcsa
The document summarizes an enhanced edge adaptive steganography approach using a threshold value for region selection. It aims to improve the quality and modification rate of a stego image compared to Sobel and Canny edge detection techniques. The proposed approach uses a threshold value to select high frequency pixels from the cover image for data embedding using LSBMR. Experimental results on 100 images show about a 0.2-0.6% improvement in image quality measured by PSNR and a 4-10% improvement in modification rate measured by MSE compared to Sobel and Canny edge detection.
This document discusses techniques for image segmentation and edge detection. It proposes a generalized boundary detection method called Gb that combines low-level and mid-level image representations in a single eigenvalue problem to detect boundaries. Gb achieves state-of-the-art results at low computational cost. Soft segmentation is also introduced to improve boundary detection accuracy with minimal extra computation. Common methods for edge detection are described, including gradient-based, texture-based, and projection profile-based approaches. Improved Harris and corner detection algorithms are presented to more accurately detect edges and corners. The output of Gb using soft segmentations as input is shown to correlate well with occlusions and whole object boundaries while capturing general boundaries.
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposureiosrjce
This document discusses boundary detection techniques for images. It proposes a generalized boundary detection method (Gb) that combines low-level and mid-level image representations in a single eigenvalue problem to detect boundaries. Gb achieves state-of-the-art results at low computational cost. Soft segmentation and contour grouping methods are also introduced to further improve boundary detection accuracy with minimal extra computation. The document presents outputs of Gb on sample images and concludes that Gb effectively detects boundaries in a principled manner by jointly resolving constraints from multiple image interpretation layers in closed form.
A survey on feature descriptors for texture image classificationIRJET Journal
This document discusses various feature descriptors that can be used for texture image classification. It provides an overview of 8 different feature descriptors that have been proposed in recent research: local binary patterns (LBP), dominant local binary patterns (DLBP), completed local binary patterns (CLBP), Weber local descriptor (WLD), local binary count (LBC), discriminant face descriptor (DFD), local vector quantization pattern (LVQP), and dense micro-block difference (DMD). For each descriptor, it briefly explains the approach and compares the methods. The goal of the descriptors is to effectively capture textural features while addressing challenges like rotation, illumination changes, and noise.
IRJET- Brain Tumour Detection and ART Classification Technique in MR Brai...IRJET Journal
This document describes a proposed method for detecting and classifying brain tumors in MR brain images using robust principal component analysis (RPCA) and quad tree (QT) decomposition for image fusion. The method involves fusing T1 and T2 MRI images using RPCA and QT decomposition. The fused image is then segmented using level set segmentation. Features are extracted from the segmented image using complete local binary pattern (CLBP) and pyramid histogram of oriented gradients (PHOG) approaches. The features are then classified using an adaptive resonance theory (ART) classifier to classify the brain tumor as malignant or benign. The proposed method aims to efficiently fuse multi-modal MRI images for improved brain tumor detection and classification.
IRJET- A Review on Plant Disease Detection using Image ProcessingIRJET Journal
This document summarizes a research paper on detecting plant diseases from images using digital image processing techniques. The main steps discussed are: 1) Acquiring digital images of plant leaves, 2) Pre-processing the images by cropping, converting to grayscale, and enhancing, 3) Segmenting the images using k-means clustering to identify infected regions, 4) Extracting color, texture, and shape features from the segmented images, and 5) Classifying the images using a support vector machine to identify the type of disease. The proposed method was tested on images of citrus leaves to detect different diseases and future work aims to improve classification accuracy for other plant species.
Cartoon Based Image Retrieval : An Indexing Approachmlaij
This paper proposes a methodology for the content based image retrieval which is implemented on the
cartoon images. The similarities between a query cartoon character image and the images in database are
computed by the feature extraction using the fusion descriptors of SIFT (Scale Invariant Feature
Transforms) and HOG (Histogram of Gradient). Based on the similarities, the cartoon images same or
similar to query images are identified and retrieved. This method makes use of indexing technique for more
efficient and scalable retrieval of the cartoon character. The experiment results demonstrate that the
proposed method is efficient in retrieving the cartoon images from the large database.
This document presents a hybrid approach for color image segmentation that integrates color edge information and seeded region growing. It uses color edge detection in CIE L*a*b color space to select initial seed regions and guide region growth. Seeded region growing is performed based on color similarity between pixels. The edge map and region map are fused to produce homogeneous regions with closed boundaries. Small regions are then merged. The approach is tested on images from the Berkeley segmentation dataset and produces reasonably good segmentation results by combining color and edge information.
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGsipij
The document proposes a blind watermarking scheme for color images that embeds watermarks in the luminance component (Y) of the YCbCr color space. Edge detection using Sobel and Canny operators is applied to Y, Cb, and Cr to determine which component has the most edge information. The watermark is then embedded in the pixels of Y that have strong edges. Experimental results show the scheme is robust against Gaussian blurring and noise attacks, with normalized correlation between extracted and original watermarks remaining close to 1. The scheme effectively embeds a large number of watermark bits while maintaining imperceptibility and robustness against various image processing attacks.
The document presents a new approach called Linear Curvature Empirical Coding (LCEC) for image retrieval. LCEC aims to improve upon existing curvature-based coding approaches by linearly representing the curvature scale space plot and then applying empirical coding to select descriptive shape features. The linear representation considers variations across all smoothing factors rather than discarding information below a threshold. Empirical coding is used to select features based on variation density rather than just magnitudes. The results show LCEC performs better than previous methods for image retrieval.
Empirical Coding for Curvature Based Linear Representation in Image Retrieval...iosrjce
The document presents a new approach called Linear Curvature Empirical Coding (LCEC) for image retrieval. LCEC aims to improve upon existing curvature-based coding approaches by linearly representing the curvature scale space plot and then applying empirical coding to select descriptive shape features. The linear representation considers variations across all smoothing factors rather than discarding information below a threshold. Empirical coding is used to select features based on variation density rather than just magnitude. The results show LCEC performs better than previous methods for image retrieval.
Similar to Adaptive CSLBP compressed image hashing (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Adaptive CSLBP compressed image hashing (Varsha Patil)
2983
texture descriptor. Colour features are adaptively used based on local region analysis. Color feature is pixel
dependent while texture features are determined from set or pixels or neighbourhood. CIE L*a*b* color
space is selected for color features as this color model satisfy the perceptual uniformity property.
To determine smoothness of local region, Canny edge detector is used. For smooth region, colour averaging
is used which represents mean of neighbourhood. For edge dominant region, color differencing is used which
represents gradient of neighbourhood. Luminance (L) channel of the lab color space is essentially the gray
scale of original RGB image. Texture features is extracted using modified CSLBP on gray scale image
(Luminance channel).
As number of features increases, hashing algorithm becomes more robust and gives desirable
discrimination quality. However, with increase in features, size of hash also increases which is not
acceptable. To overcome this problem, color and texture features are not used separately but color feature is
superimposed on texture feature.
Various researchers studied image hashing in terms of quality feature extraction and their compact
representation. Pairing local and global features together is quite robust and popular approach for image
hashing as it identifies content change at local as well as at global level. Following represents various global
and local features pairs for content change location locally as well as globally. DWT-SVD and Saliency
object detection using spectral residual model; Projected Gradient Non-negative Matrix Factorization
(PGNMF), ring partition and saliency detection; Zernike moment and Salient point detection; Zernike
moment and Haralick local features; Zernike moments, MOD-LBP and Haralick texture features; Invariant
moments from Radon coefficients and statistical measures from Radon coefficients; DCT coefficients of
Watson's visual model and SIFT key points; Color vector angle and Salient edge points [5-12].
Transform is an very efficient way to separate out components from an image. These components
are sensitive to content change and robust to content preserving. These components can be easily represented
in hash form by applying simple operations. Fourier–Mellin transformed (FMT) image is converted into
polar co-ordinates. From polar co-ordinates, features are extracted and quantized to generate a binary
hash [13]. To improve the imperceptibility aspect in cryptography, combination of DCT and DWT
transformed is used and double protection on the digital message is achieved by OTP encryption [14]. To
provide protection from attacks, wavelet based Least Significant Bit Watermarking (WLSBWM) integrates
the alphabet pattern approach which generated the shuffled image and wavelet concept to reduce the
dimensionality of watermark [15]. Texture feature is extracted from Wave atom transform having
characteristics of sparser expansion. Gray code optimization and chaotic map quantization is performed [16].
Sub band images are generated by applying 2-level DWT on the input color image. LL2 sub-band image
arranged in concentric rings to extract features for hash creation [17]. Features such as Discrete Cosine
Transformation (DCT) and Gray Level Co-occurrence Matrix (GLCM) are extracted in circular rings to
generate rotation invariant hash [18].
For color image hashing approaches color represents important feature to detect changes. Perceptual
color difference is captured by color vector angle which is used to generate hash. Secondary image is
generated from color vector angle. Mean is calculated from non overlapping blocks of secondary image and
further compressed by DWT to generate compact hash [19]. From HSI plane, secondary HSI quantized
image is generated. 24 bin histogram is generated from quantized HSI histogram to represent hash.
This method considers purely global features and hence, performance is limited for various attacks [20].
From HSI and YCbCr colour space, block mean and variance are obtained. Euclidean distance is calculated
between block features and reference features and treated as a image hash [21]. Three histograms are
generated for an color image. Histogram captures specific distribution of pixel over the image which is
measured as four moment like mean, standard deviation, skewness and kurtosis to generate hash [22].
Local Binary Pattern (LBP) texture descriptor is popular because of its computational simplicity,
tolerance for illumination changes, rotation and scale invariance. However it generates histogram of 256 bin
which makes inappropriate choice an image hashing [23, 24]. Image hashing using Centre Symmetric Local
Binary Pattern (CSLBP) [25] is suitable option as it generates histogram of 16 bin. In CSLBP, to extract
texture, only sign difference of four cross symmetric pairs is taken. Davarzani et al. [26] used sign as well as
magnitude difference of four cross symmetric pairs. In this approach, authors generated four histogram for
each direction with magnitude as weight factor, which resulted in total histogram of 64 bin. The 64 bin
histogram violates compact length property of image hash as well as magnitude weight on each histogram did
not enhance discrimination capability. CSLBP histogram can be compressed by flipped difference
concept [27]. Compression of plain histogram gives poor discrimination results. To get desirable
discrimination of hashing, local weight factors are used during histogram correction. In our previous
approaches, various types of weight factors are used to enhance discrimination. In AQ-CSLBP [28],
instead of separate magnitude, the average of magnitude difference of four cross symmetric pairs is used as
weight factor. In SDQ-CSLBP [29], weight factor is standard deviation of four cross symmetric is used.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2982 - 2992
2984
Similar for CoCQ- CSLBP [30], correlation coefficient between reference local area and image local area
represents weight factor. Finally, in LoGQ-CSLBP [31], Laplacian of Gaussian (LoG) of local area which is
robust to noise is used as a weight factor. LBP can easily extended to color images. In Color LBP [32],
the operator is used on each color channel independently, and then for pairs of color channels in which center
pixel is taken from one channel and the neighbouring pixels from the other channel. Therefore by this method
total nine histogram are generated. Size of resultant descriptor is huge. However opposing pairs, such as R-G
and G-R are highly redundant, so either of them can be used in the analysis. This result in total six histograms
(R channel, G channel, B channel, RG channel, RB channel, GB channel). Generated feature vector is six
times larger than LBPs. For color images, various combinations of LBP are available like RGB-LBP,
nRGB-LBP, Transformed color LBP, Opponent LBP, nOpponent-LBP, Hue-LBP [33]. In Improved
Opponent Colour [34], intra and inter channel features are considered. In this method, thresholding is done
against the average value. In experimental result analysis section, we showed that, all these color LBP variant
approaches are not suitable for image hashing due its long length and poor discrimination power.
2. PROPOSED METHOD
In the proposed approach, the input RGB color image is converted to L*a*b* color space for color
features extraction. Luminance channel of Lab color space is used by CSLBP and Canny edge detector.
CSLBP extracts texture features and Canny edge detector detects presence of gradient information in local
region.
2.1. Pre-processing
Initially, the input RGB color image is converted to a fixed size by using bilinear interpolation.
Image resizing is necessary for experimental analysis and comparison with other methods. Also it is
necessary to ensure that, images with different resolutions will have similar hash code. To enhance
robustness against content preserving manipulations, input image is filtered by Gaussian filter. A 3×3
Gaussian filter mask is convolved over the entire image. By doing convolution operation, it reduces
disturbance caused by manipulations like noise, lossy compression.
2.2. Modified CSLBP
CSLBP considers only cross symmetric pairs which captures rotation invariant texture details and
also produces histogram with less no. of bin. CSLBP considers signed gray level di-erences of cross
symmetric pixel pairs multiplied by powers of two in a particular direction. For 3×3 local area, CSLBP value
for a pixel lies in the range from 0 to 15, which leads to 16 bin histogram at semi global level. CSLBP is
suitable choice for hashing for number of reasons. First it generates small histogram, captures improved
texture information, provides robustness on flat areas. Equations (1) and (2) represents CSLBP.
P/2 1 p
CSLBP (g ) s(g g )2c pP,R,T (P/2)p 0
(1)
p p (P/2)
p p (P/2)
1, (g g ) T
sign(g g )
0, otherwise
(2)
where, T: threshold; R: radius; P: no. of neighbours; gc: center pixel; gp: neighbours of centre pixel;
s(gp- gp+(P/2)): sign function of CSLBP; CSLBP: CSLBP texture extractor. Values of parameters are set as
T=0.1, P=8, R=1.
In modified CSLBP, we divided eight neighbours into two types, four immediate neighbours and
four diagonal neighbours. Immediate neighbours are at distance of 1 unit from centre pixel while diagonal
neighbours are at distance of (√2) unit. Signed differences of cross symmetric pairs is taken for four
immediate neighbours and for four diagonal neighbours separately as shown in Equations (3) and (4).
P/2 1 nM _CSLBP(g ) s(g g )2c pE p (P/2)even p 0
(3)
P/2 1 nM _CSLBP(g ) s(g g )2c pO p (P/2)odd p 1
(4)
4. Int J Elec & Comp Eng ISSN: 2088-8708
Adaptive CSLBP compressed image hashing (Varsha Patil)
2985
where ME-CSLBP is CSLBP for nearest neighbours; MO-CSLBP is CSLBP for diagonal neighbours; n is unit
increment operator; p is even increment operator for nearest neighbours and odd increment operator for
diagonal neighbours; P represents neighbours of center pixel; s(gp - gp+(P/2)) is sign function
In this proposed approach, like CSLBP, histogram is constructed by taking signed differences of
cross symmetric pairs. But unlike CSLBP, it generates 8 bin histogram without any quality reduction.
This gives 50% reduction in hash size with same discrimination capability that of 16 bin CSLBP. After M-
CSLBP calculation for all pixels in an image. Histogram is constructed at semi global level. For every block,
two histogram generated of four bin, one for immediate and other for diagonal neighbours. To further
enhance discrimination power, adaptive color weight factors from Lab color space is used.
2.3. Color weight factor
Color is the most dominant and distinguishing visual feature. Drawback of the RGB color space is
high correlation between planes. L*a*b* or Lab color space is a color-opponent space with dimensions L for
lightness and a and b for the color-opponent dimensions. Lab color space satisfies perceptual uniformity
property at local level. A perceptual uniform color space ensures that the difference between two colors
(as perceived by the human eye) is proportional to the Euclidian distance within the given color space.
As color weight factors are selected at local level, total advantage of perceptual uniformity property
is utilized.
For local region 3×3, Canny edge detector is applied to find edge details. Adaptive averaging and
difference weight factor is selected based on response of canny edge detectors for four neighbours.
For smooth region, color averaging weight factor is used while for non-smooth region color differencing
weight factor is used.
- For 4 nearest neighbours
Canny Edge Output = [CE0; CE4; CE2; CE6]
where CE represent Canny edge output either one or zero which shows region is either smooth or presence of
edge points. CE0, CE4, CE2 and CE6 represents nearest neighbours around a center pixel. For local region of
3×3 of LAB color image, neighbourhood is represented as below
Odd neighbours: [L0, A0, B0], [L2, A2, B2] , [L4, A4, B4], [L6, A6, B6]
Even neighbours: [L1, A1, B1], [L3, A3, B3], [L5, A5, B5], [L7, A7, B7]
- For smooth region
nearest avg avg avgAVG (L A B )
(5)
2 2 2 2
avg 0 2 4 6L (L L L L )/ 4
(6)
2 2 2 2
avg 0 2 4 6A (A A A A )/ 4
(7)
2 2 2 2
avg 0 2 4 6B (B B B B )/ 4
(8)
- For non-smooth region
nearest diff diff diffDiff (L A B )
(9)
diff 0 4 0 4 2 6 2 6L (L L )(L L ) (L L )(L L ) (10)
diff 0 4 0 4 2 6 2 6A (A A )(A A ) (A A )(A A ) (11)
diff 0 4 0 4 2 6 2 6B (B B )(B B ) (B B )(B B ) (12)
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2982 - 2992
2986
where Lavg, Aavg, Bavg are averages of even components of L, A and B color space respectively; Avgnearest is
summation of Lavg, Aavg, Bavg; Ldiff, Adiff, Bdiff are squared difference of cross symmetric pairs of even
components of L, A and B color space respectively; Diffnearest is summation of Ldiff, Adiff, Bdiff
- For 4 diagonal neighbours
Canny Edge Output = [CE1; CE3; CE5; CE7]
where CE represent Canny edge output either one or zero which shows region is either smooth or presence of
edge points. CE1, CE3, CE5 and CE7 represents diagonal neighbours around a center pixel.
- For smooth region
diagonal avg avg avgAVG (L A B )
(13)
2 2 2 2
avg 1 3 5 7L (L L L L )/ 4
(14)
2 2 2 2
avg 1 3 5 7A (A A A A )/ 4
(15)
2 2 2 2
avg 1 3 5 7B (B B B B )/ 4
(16)
- For non-smooth region
diagonal diff diff diffDiff (L A B )
(17)
diff 1 5 1 5 3 7 3 7L (L L )(L L ) (L L )(L L ) (18)
diff 1 5 1 5 3 7 3 7A (A A )(A A ) (A A )(A A ) (19)
diff 1 5 1 5 3 7 3 7B (B B )(B B ) (B B )(B B ) (20)
where Lavg, Aavg, Bavg are averages of odd components of L, A and B color space respectively; Avgnearest is
summation of Lavg, Aavg, Bavg; Ldiff, Adiff, Bdiff are squared difference of cross symmetric pairs of odd
components of L, A and B color space respectively; Diffnearest is summation of Ldiff, Adiff, Bdiff. AVGnearest,
AVGdiagonal, DIFFnearest and DIFFdiagonal are converted into weight as given in Table 1.
Table 1. Delta E values and their weight
Value Meaning Weight
0 - 1 A normally invisible difference 10
1 - 2 Very small difference, only obvious to a trained eye 20
2 - 3.5 Medium difference, also obvious to an untrained eye 30
3.5 - 5 An obvious difference 40
> 6 A very obvious difference 50
immediate diagonalA AVG AVG
(21)
immediate diagonalD DIFF DIFF
(22)
where A and D represents color weigh factors which acts as boosting agent during ME-CSLBP and MO-CSLBP
histogram construction for sub-block size B×B respectively. Final equation of ME-CSLBP and MO-CSLBP
histogram are as below.
6. Int J Elec & Comp Eng ISSN: 2088-8708
Adaptive CSLBP compressed image hashing (Varsha Patil)
2987
(23)
(24)
where B is size of the sub-block set to 32×32 and value of b varies from 0 to 3.
For each sub-block two histograms are constructed. Each histogram is quantized to generate binary
output. To generate final image binary hash, binary output of all histograms is concatenated.
3. EXPERIMENTAL RESULTS AND ANALYSIS
In this section, experimental results for the proposed method and its comparative methods are
presented. Sensitivity to content change and robustness to content preserving are checked with two
benchmarks, first is Normalized Hamming Distance (NHD) and other is Receiver operating characteristics
(ROC). NHD shows how much hash code of original and forged images are vary for malicious and non
malicious operations. However if normalized hamming distance is similar for both types of operations i.e.
malicious and non-malicious attacks, it indicates poor performance of the algorithm. Second benchmark is
ROC which indicates the discrimination power of hashing algorithm. TPR (True Positive Rate) should be
high for less FPR (False Positive Rate) for desirable discrimination. The original database contains 23 color
images taken from internet and Matlab standard directory. Image size taken as 256×256 for analysis purpose
with other methods. Variety types of attacks are applied on original image database to generate new database
which contain malicious as well as non malicious images based on intensity of attacks. Total 61 operations
are applied to generate 23×61=1403 images in which some are authentic images as content is preserved and
some are non-authentic as content is changed. Various attacks and their parameters are given in following
given in following Table 2. Table 2 also indicates symbolic names for various attacks for showing results in
simplified manner. Table 3 and Table 4 shows NHD and ROC observations for various attacks mentioned in
Table 2 for the proposed method.
Table 2. Various attacks, parameter, and their symbolic names
Operations Descriptions Parameters
Cropping (A) Ratio 1%, 3%, 5%, 7%, 9%
Salt & Pepper Noise (B) Noise Density 0.01, 0.02, 0.03, 0.05, 0.1
Gaussian Noise (C) Noise Variance 0.001, 0.005, 0.01, 0.02, 0.05
Scaling (D) Scaling factor 0.7, 0.8, 0.9, 1.1, 1.2, 0.01, 0.05, 0.10, 0.15, 0.20
Rotate (E) Rotation Angle 20
, 40
, 60
, 80
, 100
JPEG Compression (F) Quality Factor 10, 30, 50, 70, 90
Gamma Correction (G) Gamma value 0.75, 0.8, 0.9, 1.1, 1.25, 4.25, 4.50, 4.75, 5.00, 5.25
Increase Brightness (H) Range of adjustment [0.8 1],[0.6 1],[0.4 1],[0.2 1]
Decrease Brightness (I) Range of adjustment [0 0.6],[0 0.4],[0 0.2],[0 0.1]
Increase Contrast (J) Range of adjustment [0 0.8], [0 0.6], [0 0.4], [0 0.2]
Decrease Contrast (K) Range of adjustment [0.8 1], [0.6 1], [0.4 1], [0.2 1]
Table 3. NHD for adaptive CSLBP compressed image hashing
Attack
Adaptive CSLBP Compressed Color Image Hashing TNHD=0.10
Auth Non Auth
Cropping 0.10 0.21
Salt & Pepper Noise 0.07 0.17
Gaussian Noise 0.10 0.21
Scaling 0.05 0.24
Rotate 0.16 0.24
JPEG Compression 0.05 0.15
Gamma Correction 0.04 0.18
Increase Brightness 0.07 0.22
Decrease Brightness 0.04 0.11
Increase Contrast 0.09 0.23
Decrease Contrast 0.07 0.21
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2982 - 2992
2988
Observations: Table 3 results clearly shows that proposed method distinguished between content
preserving and content change for TNHD = 0.10. Only for rotation authentic images results are not satisfactory.
Also there is sufficient gap between minimum and maximum TNHD distance. Minimum is 0.04 and maximum
is 0.24. This difference is also indicates proposed method has distinguish power of separating authentic and
non-authentic images.
Table 4. TPR and FPR for adaptive CSLBP compressed color image hashing
Attack TPR FPR
Cropping 0.65 0.04
Salt & Pepper Noise 0.93 0.19
Gaussian Noise 0.67 0.00
Scaling 0.98 0.09
Rotate 0.26 0.07
JPEG Compression 1.00 0.26
Gamma Correction 1.00 0.11
Increase Brightness 0.78 0.04
Decrease Brightness 0.97 0.26
Increase Contrast 0.96 0.25
Decrease Contrast 0.91 0.13
Avg. Database 0.87 0.11
Observations: Table 4 shows results for average database is 87%. Figure 2 shows that proposed
method gives satisfactory results for almost all types of attacks.
In the following section, proposed method results are compared with other methods. Various types
of color LBP's are available which is considered here for comparative analysis. These methods are Color
LBP [32], variant of LBP's for color images like RGB-LBP, nRGB-LBP, Transformed color LBP, Opponent-
LBP, nOpponent-LBP, Hue-LBP [33]. All methods based on LBP's have large no. of histogram bin also
results shows that color LBP based methods have a very poor discrimination capability. Zhao et al. [20]
developed color image hashing based on color histogram generated from HSI quantized image. It purely
takes only color global feature. Size of image hash is small but discrimination power is very poor.
Zhou et al. [35] developed Spatial-Color Binary Patterns having histogram of 64 bin. Method is designed for
background subtraction. It's hash size is small compared to LBP based method however its discrimination
capability for authentication application is very poor. Color image hashing methods cannot rely only on color
factor, but also combinations of color and other features should be used.
Table 5 clearly shows that for methods number from 1 to 7, hash size is more and discrimination
power spans from very low to average. For method number 8 and 9, histogram bins are less than LBP based
method but discrimination power is very low and average respectively. However, for the proposed method
'Adaptive CSLBP Compressed Color Image Hashing', number of histogram bins are only 8 which results in
compact hash size of 512 bits. Discrimination power is also desirable for almost all types of attack.
Table 5. Comparison of existing color hashing techniques with
the proposed hashing method 'adaptive compressed CSLBP image hashing'
No
Color image hashing methods Histogram bin
Image hash size
(bits)
Discrimination
Power (%TPR)
Symbolic
Name
1. RGB LBP 768 49152 Low (58%) E1
2. nRGB LBP 768 49152 Very Low (47%)
3. Transformed Color LBP 768 49152 Low (58%)
4. Opponent LBP 768 49152 Low (53%) E2
5. nOpponent LBP 512 32768 Very Low (48%)
6. Hue LBP 256 16384 Very Low (33%)
7. Color LBP 1536 98304 Average (64%) E3
8. Color Histogram 24 276 Very Low (44%) E4
9. Spatial-Color Binary Pattern 64 4096 Average (69%) E5
10.
Adaptive Compressed CSLBP
Image Hashing
8 512 High (87%) P1
Methods 1, 4, 7, 8 and 9 are taken into consideration for comparative analysis with the proposed
method for various attacks. Symbolic names are given to them as E1, E2, E3, E4 and E5 respectively.
For the proposed method symbolic name is P. E stands for existing method while P stands for proposed
method. Following Figure 3 to Figure 14 shows ROC curves for various attacks for existing and proposed
methods on ROC benchmark.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2982 - 2992
2990
Figure 11. ROC: Decrease brightness Figure 12. ROC: Increase contrast
Figure 13. ROC: Decrease contrast Figure 14. TPR for existing and proposed methods
4. CONCLUSION
We have proposed novel image hashing scheme based on combination of texture, color and edge
features. As more features are added, hashing scheme becomes more robust at the cost of increased hash size.
To achieve compact hash as well as desirable discrimination capability, multiple features are used.
In the proposed method, color features are selected adaptively based on the response from edge feature.
Color features are not stored separately but super-imposed on texture features as a weight factor. Original
CSLBP histogram is compressed by generating two histogram based on location of neighbours and achieved
50% compression in histogram size without compromise on quality. Results of NHD and ROC shows that
proposed method gives satisfactory results for almost all types of attacks.
REFERENCES
[1] K. B. Adedeji and A. A. Ponnle, “Improved image encryption for real-time application over wireless
communication networks using hybrid cryptography technique,” Indonesian Journal of Electrical Engineering and
Informatics (IJEEI), vol/issue: 4(4), pp. 307-318, 2016.
[2] Sugianto, et al., “Comparison of secret splitting, secret sharing and recursive threshold visual cryptography for
security of handwritten images,” TELKOMNIKA Telecommunication Computing Electronics and Control,
vol/issue: 16(1), pp. 323-333, 2018.
[3] Z. Guojuan and L. Dianji, “An overview of digital watermarking in image forensics,” Computational Sciences and
Optimization, 2011. CSO 2011. International Conference IEEE, pp. 332-335, 2011.
[4] A. J. Fridrich, et al., “Detection of copy-move forgery in digital images,” Digital Forensic Research Workshop,
2003.
[5] R. K. Karsh, et al., “Robust image hashing through DWT-SVD and spectral residual method,” EURASIP Journal
on Image and Video Processing, vol. 2017, pp. 31, 2017.
[6] R. K. Karsh, et al., “Robust image hashing using ring partition-PGNMF and local features,” SpringerPlus Journal,
vol. 5, pp. 1995, 2016.
[7] Y. Zhao, et al., “Robust hashing for image authentication using Zernike moments and local features,” IEEE
Transactions on Information Forensics and Security, vol. 8, pp. 55-63, 2013.
[8] G. Soman, et al., “Block-based forgery detection using global and local features,” Soft Computing Systems, 2016.
Springer 2016. International Conference Springer, pp. 147-155, 2016.
[9] L. S. Sebastian, et al., “Image authentication by content preserving robust image hashing using local and global
features,” Elsevier Journal on Procedia Computer Science, vol. 46, pp. 1554-1560, 2015.
10. Int J Elec & Comp Eng ISSN: 2088-8708
Adaptive CSLBP compressed image hashing (Varsha Patil)
2991
[10] L. I. U. Yuling, et al., “Robust image hashing using radon transform and invariant features,” Radioengineering, vol.
25, 2016.
[11] X. Wang, et al., “A visual model-based perceptual image hash for content authentication,” IEEE transactions on
Information Forensics and Security, vol. 10, pp. 1336-1349, 2015.
[12] C. Qin, et al., “Perceptual hashing for color images based on hybrid extraction of structural features,” Elsevier
Journal on Signal Processing, vol. 142, pp. 194-205, 2018.
[13] A. Swaminathan, et al., “Robust and secure image hashing,” IEEE Transactions on Information Forensics and
Security, vol/issue: 1(2), pp. 215-230, 2006.
[14] W. S. Sari, et al., “Comparison of secret splitting, secret sharing and recursive threshold visual cryptography for
security of handwritten images,” TELKOMNIKA Telecommunication Computing Electronics adn Control,
vol/issue: 15(4), pp. 1987-1995, 2017.
[15] V. A. Kumar, et al., “A hybrid digital watermarking approach using wavelets and LSB,” International Journal of
Electrical and Computer Engineering (IJECE), vol/issue: 7(5), pp. 2483-2495, 2017.
[16] F. Liu, et al., “Wave atom transform generated strong image hashing scheme,” Optics Communications, vol/issue:
285(24), pp. 5008-5018, 2012.
[17] L. N. Vadlamudi, et al., “Robust image hashing technique for content authentication based on DWT,” Computer
Vision and Image Processing, 2017. Internaltional Conferene on Springer, pp. 181-191, 2017.
[18] A. Neelima and K. M. Singh, “A robust image hash function based on color and texture features of the image,”
Advanced Computing and Communication, 2015, ISACC 2015, International Symposium IEEE, pp. 238-243, 2015.
[19] Z. Tang, et al., “Robust image hashing via colour vector angles and discrete wavelet transform,” IET Image
Processing, vol. 8, 2014.
[20] Y. Zhao, et al., “Image hashing based on color histogram,” Journal of Information & Computational Science, vol.
9, 2012.
[21] Z. Tang, et al., “Robust image hash function using local color features,” EU-International Journal of Electronics
and Communications, vol. 67, 2013.
[22] S. Dattatherya, et al., “A generalized image authentication based on statistical moments of color histogram,”
International Journal on Recent Trends in Engineering & Technology, vol/issue: 8(1), pp. 40-46, 2013.
[23] T. Ojala, et al., “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,”
IEEE transactions on pattern analysis and machine intelligence, vol. 24, 2002.
[24] E. Prasetyo, et al., “Multi-class K-support vector nearest neighbour for mango leaf classification,” TELKOMNIKA
Telecommunication Computing Electronics adn Control, vol/issue: 16(4), 2018.
[25] J. Xiao and G. Wu, “A robust and compact descriptor based on center-symmetric LBP,” Image and Graphics,
2011, ICIG 2011, Sixth International Conference IEEE, pp. 388-393, 2011.
[26] R. Davarzani, et al., “Image authentication using LBP-based perceptual image hashing,” Journal of AI and Data
Minings, vol. 3, 2015.
[27] J. Baber, et al., “Q-CSLBP: compression of CSLBP descriptor,” Multimedia and Information Processing, 2012.
Pacific-Rim conference Springer, pp. 513-521, 2012.
[28] V. Patil and T. Sarode, “Image hashing using AQ-CSLBP with double bit quantization,” Optoelectronics and Image
Processing, 2016. ICOIP 2016. International Conference IEEE, pp. 30-34.
[29] V. Patil and T. Sarode, "Image hashing by SDQ-CSLBP,” in Advances in Computing,” Communications and
Informatics, 2016. ICACCI 2016. International Conference IEEE, pp. 2057-2063, 2016.
[30] V. Patil and T. Sarode, “Image hashing by CCQ-CSLBP,” Electrical and Computer Engineering, 2016. WIECON-
ECE 2016. International Conference IEEE, pp. 73-78, 2016.
[31] V. Patil and T. Sarode, “Image hashing by LoG-QCSLBP,” Communication and Information Processing, 2016.
Second International Conference ACM, pp. 124-128, 2016.
[32] T. Mäenpää and M. Pietikäinen, “Classification with color and texture: jointly or separately?” Pattern Recognition,
vol. 37, 2004.
[33] C. Zhu, et al., “Multi-scale color local binary patterns for visual object classes recognition,” Pattern Recognition,
2010. ICPR 2010. Twentieth International Conference IEEE, pp. 3065-3068, 2010.
[34] F. Bianconi, et al., “Improved opponent colour local binary patterns for colour texture classification,”
Computational Color Imaging, 2017, International Workshop Springer, pp. 272-281, 2017.
[35] W. Zhou, et al., “Dynamic background subtraction using spatial-color binary patterns,” Image and Graphics, 2011,
ICIG 2011. Sixth International Conference IEEE, pp. 314-319, 2011.
BIOGRAPHIES OF AUTHORS
Varsha Patil has received M.E. (Computer Engineering) degree from Mumbai University in
2007, pursuing Ph.D. from Mumbai University, INDIA. She has more than 12 years of
experience in teaching. Currently working as Assistant Professor in Computer Engineering
Department at South Indian Graduate School of Technology, Mumbai. She is Life member
(ISTE). Her areas of interest are Image Processing, Signal Processing and Data Mining,
Machine Learning.
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2982 - 2992
2992
Dr. Tanuja K. Sarode has received M.E. (Computer Engineering) degree from Mumbai
University in 2004, Ph.D. from Mukesh Patel School of Technology, Management and Engg.
SVKMs NMIMS University, Vile-Parle (W), Mumbai, INDIA in 2010. She has more than 17
years of experience in teaching. Currently working as Professor and Head in Dept. of Computer
Engineering at Thadomal Shahani Engineering College, Mumbai. She is Life member (ISTE)
and (IETE). Her areas of interest are Image Processing, Signal Processing and Computer
Graphics. She has 170 papers in International Conferences/journal to her credit.