Scanning baggage by x-ray and analysing such images have become important technique for detecting
illicit materials in the baggage at Airports. In order to provide adequate security, a reliable and fast
screening technique is needed for baggage examination.This paper aims at providing an automatic method
for detecting concealed weapons, typically a gun in the baggage by employing image segmentation method
to extract the objects of interest from the image followed by applying feature extraction methods namely
Shape context descriptor and Zernike moments. Finally the objects are classified using fuzzy KNN as illicit
or non-illicit object.
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
Fingerprint recognition is a promising factor for the Biometric Identification and authentication process.
Fingerprints are broadly used for personal identification due to its feasibility, distinctiveness, permanence,
accuracy and acceptability. This paper proposes a way to improve the Equal Error Rate (EER) in
fingerprint matching techniques in the domain of hybrid shape and orientation descriptor. This type of
fingerprint matching domain is popular due to capability of filtering false and strange minutiae pairings.
EER is calculated by using FMR and FNMR to check the performance of proposed technique.
Image registration is the fundamental task used to
match two or more partially overlapping images taken, for
example, at different times,from different sensors, or from
different viewpoints and stitch these images into one
panoramic image comprising the whole scene. It is
afundamental image processing technique and is very useful
in integrating information from different sensors, finding
changes in images taken at different times, inferring threedimensional
information from stereo images, and recognizing
model-based objects.
This paper overviews the theoretical aspects of an image
registration problem. The purpose of this paper is to present a
survey of image registration techniques. This technique of
image registration aligns two images geometrically. These two
images are reference image and sensed image. The ultimate
purpose of digital image filtering is to support the visual
identification of certain features expressed by characteristic
shapes and patterns. Numerous recipes, algorithms and ready
made programs exist nowadays that predominantly have in
common that users have to set certain parameters.
Particularly if processing is fast and shows results rather
immediately, the choice of parameters may be guided by
making the image ―looking nice‖. However, in practical
situations most users are not in a mood to ―play around‖
with a displayed image, particularly if they are in a stressy
situation as it may encountered in security applications. The
requirements for the application of digital image processing
under such circumstances will be discussed with an example
of automaticfiltering without manual parameter settings that
even entails the advantage of delivering unbiased results
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICESijcsit
Different methods have been experimented for processing and detecting forgery in digital images. Image forgery involves various activities like copy-move forgery, image slicing, retouching, morphing etc. In copy-move forgery a portion within the image is copied and pasted on another part of the same image,generally to conceal or enhance certain portions of the image. This paper proposes a copy-move forgery detection using local fractal dimension and structural similarity indices. The image is classified into different texture regions based on the local fractal dimension. Forgery checking is thus confined to be among the portions within a region. Structural similarity index measure is applied to each block pair in each region to localize the forged portion. Experimental results prove that this hybrid method can effectively detect such kind of image tampering with minimum false positives.
Object extraction using edge, motion and saliency information from videoseSAT Journals
Abstract Object detection is a process of finding the instances of object of a certain class which is useful in analysis of video or image. There are number of algorithms have been developed so far for object detection. Object detection has got significant role in variety of areas of computer vision like video surveillance, image retrieval`. In this paper presented an efficient algorithm for moving object extraction using edge, motion and saliency information from videos. Out methodology includes 4 stages: Frame generation, Pre-processing, Foreground generation and integration of cues. Foreground generation includes edge detection using sobel edge detection algorithm, motion detection using pixel-based absolute difference algorithm and motion saliency detection. Conditional Random Field (CRF) is applied for integration of cues and thus we get better spatial information of segmented object. Keywords: Object detection, Saliency information, Sobel edge detection, CRF.
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
HUMAN COMPUTER INTERACTION ALGORITHM BASED ON SCENE SITUATION AWARENESScsandit
Implicit interaction based on context information is widely used and studied in the virtual scene.In context based human computer interaction, the meaning of action A is well defined. For instance, the right wave is defined turning paper or PPT in context B, And it mean volume up in context C. However, Select object in a virtual scene with multiple objects, context information is not fit. In view of this situation, this paper proposes using the least squares fitting curve beam to
predict the user's trajectory, so as to determine what object the user’s wants to operate .And fitting the starting position of the straight line according to the change of the discrete table. And
using the bounding box size control the Z variable to move in an appropriate location. Experimental results show that the proposed in this paper based on bounding box size to control
the Z variables get a good effect; by fitting the trajectory of a human hand, to predict the object that the subjects would like to operate. The correct rate is 88.6%.
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
Fingerprint recognition is a promising factor for the Biometric Identification and authentication process.
Fingerprints are broadly used for personal identification due to its feasibility, distinctiveness, permanence,
accuracy and acceptability. This paper proposes a way to improve the Equal Error Rate (EER) in
fingerprint matching techniques in the domain of hybrid shape and orientation descriptor. This type of
fingerprint matching domain is popular due to capability of filtering false and strange minutiae pairings.
EER is calculated by using FMR and FNMR to check the performance of proposed technique.
Image registration is the fundamental task used to
match two or more partially overlapping images taken, for
example, at different times,from different sensors, or from
different viewpoints and stitch these images into one
panoramic image comprising the whole scene. It is
afundamental image processing technique and is very useful
in integrating information from different sensors, finding
changes in images taken at different times, inferring threedimensional
information from stereo images, and recognizing
model-based objects.
This paper overviews the theoretical aspects of an image
registration problem. The purpose of this paper is to present a
survey of image registration techniques. This technique of
image registration aligns two images geometrically. These two
images are reference image and sensed image. The ultimate
purpose of digital image filtering is to support the visual
identification of certain features expressed by characteristic
shapes and patterns. Numerous recipes, algorithms and ready
made programs exist nowadays that predominantly have in
common that users have to set certain parameters.
Particularly if processing is fast and shows results rather
immediately, the choice of parameters may be guided by
making the image ―looking nice‖. However, in practical
situations most users are not in a mood to ―play around‖
with a displayed image, particularly if they are in a stressy
situation as it may encountered in security applications. The
requirements for the application of digital image processing
under such circumstances will be discussed with an example
of automaticfiltering without manual parameter settings that
even entails the advantage of delivering unbiased results
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICESijcsit
Different methods have been experimented for processing and detecting forgery in digital images. Image forgery involves various activities like copy-move forgery, image slicing, retouching, morphing etc. In copy-move forgery a portion within the image is copied and pasted on another part of the same image,generally to conceal or enhance certain portions of the image. This paper proposes a copy-move forgery detection using local fractal dimension and structural similarity indices. The image is classified into different texture regions based on the local fractal dimension. Forgery checking is thus confined to be among the portions within a region. Structural similarity index measure is applied to each block pair in each region to localize the forged portion. Experimental results prove that this hybrid method can effectively detect such kind of image tampering with minimum false positives.
Object extraction using edge, motion and saliency information from videoseSAT Journals
Abstract Object detection is a process of finding the instances of object of a certain class which is useful in analysis of video or image. There are number of algorithms have been developed so far for object detection. Object detection has got significant role in variety of areas of computer vision like video surveillance, image retrieval`. In this paper presented an efficient algorithm for moving object extraction using edge, motion and saliency information from videos. Out methodology includes 4 stages: Frame generation, Pre-processing, Foreground generation and integration of cues. Foreground generation includes edge detection using sobel edge detection algorithm, motion detection using pixel-based absolute difference algorithm and motion saliency detection. Conditional Random Field (CRF) is applied for integration of cues and thus we get better spatial information of segmented object. Keywords: Object detection, Saliency information, Sobel edge detection, CRF.
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
HUMAN COMPUTER INTERACTION ALGORITHM BASED ON SCENE SITUATION AWARENESScsandit
Implicit interaction based on context information is widely used and studied in the virtual scene.In context based human computer interaction, the meaning of action A is well defined. For instance, the right wave is defined turning paper or PPT in context B, And it mean volume up in context C. However, Select object in a virtual scene with multiple objects, context information is not fit. In view of this situation, this paper proposes using the least squares fitting curve beam to
predict the user's trajectory, so as to determine what object the user’s wants to operate .And fitting the starting position of the straight line according to the change of the discrete table. And
using the bounding box size control the Z variable to move in an appropriate location. Experimental results show that the proposed in this paper based on bounding box size to control
the Z variables get a good effect; by fitting the trajectory of a human hand, to predict the object that the subjects would like to operate. The correct rate is 88.6%.
ABSTRACT Feature extraction plays a vital role in the analysis and interpretation of remotely sensed data. The two important components of Feature extraction are Image enhancement and information extraction. Image enhancement techniques help in improving the visibility of any portion or feature of the image. Information extraction techniques help in obtaining the statistical information about any particular feature or portion of the image. This presented work focuses on the various feature extraction techniques and area of optical character recognition is a particularly important in Image processing. Keywords— Image character recognition, Methods for Feature Extraction, Basic Gabor Filter, IDA, and PCA.
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGESIJCI JOURNAL
Template matching technique is useful for searching and finding the location of a template image (Small part of image) in the larger image. This technique is also used in Optical Character Recognition (OCR) tools and these tools are used for converting the scanned document images into normal text. Template matching technique is used to find and recognize the template image which is found in the given input image. In this research work, template matching technique is applied for scanned document images which contains characters (both uppercase and lowercase) and numerals. In order to perform the comparison of the template image with the input image we have used Performance Index method and it is compared with the normalized cross correlation and cross correlation methods. Different types of comparisons done in this work are, (i) comparing single character from a word, sentence and paragraph; (ii) comparing multiple characters (words) from a word, sentence and paragraph.
A NOVEL PROBABILISTIC BASED IMAGE SEGMENTATION MODEL FOR REALTIME HUMAN ACTIV...sipij
Automatic human activity detection is one of the difficult tasks in image segmentation application due to
variations in size, type, shape and location of objects. In the traditional probabilistic graphical
segmentation models, intra and inter region segments may affect the overall segmentation accuracy. Also,
both directed and undirected graphical models such as Markov model, conditional random field have
limitations towards the human activity prediction and heterogeneous relationships. In this paper, we have
studied and proposed a natural solution for automatic human activity segmentation using the enhanced
probabilistic chain graphical model. This system has three main phases, namely activity pre-processing,
iterative threshold based image enhancement and chain graph segmentation algorithm. Experimental
results show that proposed system efficiently detects the human activities at different levels of the action
datasets.
A novel predicate for active region merging in automatic image segmentationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Issues in Image Registration and Image similarity based on mutual informationDarshana Mistry
This is my 2nd Doctorate progresses committee presentation in image registration which is explained how do you find image similarity based on Entropy and mutual information
This paper introduces the implementation of fingerprint matching Minutiae Algorithm for Fingerprint
Matching. These algorithm increases the reliability accuracy of the fingerprint matching. The proposed method was
evaluated by means of experiment conducted on the FVC2002, FVC2004 database. Experimental results confirm
that the taking time of the fingerprint image matching is very less than the other methods. This algorithm is very
effective algorithm for the identification of fingerprint image.
Fingerprints are imprints formed by friction
ridges of the skin and thumbs. They have long been used for
identification because of their immutability and individuality.
Immutability refers to the permanent and unchanging character
of the pattern on each finger. Individuality refers to the
uniqueness of ridge details across individuals; the probability
that two fingerprints are alike is about 1 in 1.9x1015. In despite of
this improvement which is adopted by the Federal Bureau of
Investigation (FBI), the fact still is “The larger the fingerprint
files became, the harder it was to identify somebody from their
fingerprints alone. Moreover, the fingerprint requires one of the
largest data templates in the biometric field”. The finger data
template can range anywhere from several hundred bytes to over
1,000 bytes depending upon the level of security that is required
and the method that is used to scan one's fingerprint. For these
reasons this work is motivated to present another way to tackle
the problem that is relies on the properties of Vector
Quantization coding algorithm.
Face recognition using gaussian mixture model & artificial neural networkeSAT Journals
Abstract
Face recognition is a non-contact and friendly biometric identification technology. It has broad application prospects in the
military, public security and economic security. In this work, we also consider illumination variable database. The images have
taken from far distance and do not consider the close view face of the individual as in most of the face databases, clear face view
has been considered. In this first we located face as region of interest and then LBP and LPQ descriptors are used which is
illuminance invariant in nature. After this GMM has been used to reduce feature set by taking negative log-likelihood from each
LBP and LPQ descripted image histograms. After this ANN consumes stayed used for organization purposes. The investigational
consequencesshow excellent correctness rates in overall testing of input data.
Keywords: Illumination invariant, face recognition, LBP, LPQs,GMM,ANN
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Latent fingerprints lifted from crime scenes often contain overlapping prints, which are
difficult to separate and match by state-of-the-art fingerprint matchers. The methods that have been
proposed to separate overlapping fingerprints and successful matching previously suffer from limited
accuracy of the estimated orientation field. In this paper, the robustness of overlapping fingerprints
separation is increased, particularly for low quality images. This algorithm reconstructs the
orientation fields of component prints by modeling fingerprint orientation fields. To facilitate this,
orientation cues of component fingerprints are utilized, which are manually marked by fingerprint
examiners. The effectiveness of this model has been evaluated.
A comparative study on classification of image segmentation methods with a fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
National Flags Recognition Based on Principal Component Analysisijtsrd
Recognizing an unknown flag in a scene is challenging due to the diversity of the data and to the complexity of the identification process. And flags are associated with geographical regions, countries and nations. But flag identification of different countries is a challenging and difficult task. Recognition of an unknown flag image in a scene is challenging due to the diversity of the data and to the complexity of the identification process. The aim of the study is to propose a feature extraction based recognition system for Myanmar's national flag. Image features are acquired from the region and state of flags which are identified by using principal component analysis PCA . PCA is a statistical approach used for reducing the number of features in National flags recognition system. Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "National Flags Recognition Based on Principal Component Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26775.pdfPaper URL: https://www.ijtsrd.com/other-scientific-research-area/other/26775/national-flags-recognition-based-on-principal-component-analysis/soe-moe-myint
Enhancing the Design pattern Framework of Robots Object Selection Mechanism -...INFOGAIN PUBLICATION
In order to enable a computer to construct and display a three-dimensional array, solid objects from a single two-dimensional photograph, the rules and assumptions of depth perception have been carefully analyzed and mechanized. It is assumed that a photograph is a perspective projection of a set of objects which can be constructed from transformations of known three-dimensional models, and that the objects are supported by other visible objects or by a ground plane. These assumptions enable a computer to obtain a reasonable, three-dimensional description from the edge information in a photograph by means of a topological, mathematical process. A computer program has been written which can process a photograph into a line drawing .transform the line drawing into a three-dimensional representation and, finally, display the three-dimensional structure with all the hidden lines removed, from any point of view. The 2-D to 3-D construction and 3-D to 2-D display processes are sufficiently general to handle most collections of planar-surfaced objects and provide a valuable starting point for future investigation of computer-aided three-dimensional systems.
Object Recogniton Based on Undecimated Wavelet TransformIJCOAiir
Object Recognition (OR) is the mission of finding a specified object in an image or video sequence
in computer vision. An efficient method for recognizing object in an image based on Undecimated Wavelet
Transform (UWT) is proposed. In this system, the undecimated coefficients are used as features to recognize the
objects. The given original image is decomposed by using the UWT. All coefficients are taken as features for
the classification process. This method is applied to all the training images and the extracted features of
unknown object are used as an input to the K-Nearest Neighbor (K-NN) classifier to recognize the object. The
assessment of the system is agreed on using Columbia Object Image Library Dataset (COIL-100) database.
ABSTRACT Feature extraction plays a vital role in the analysis and interpretation of remotely sensed data. The two important components of Feature extraction are Image enhancement and information extraction. Image enhancement techniques help in improving the visibility of any portion or feature of the image. Information extraction techniques help in obtaining the statistical information about any particular feature or portion of the image. This presented work focuses on the various feature extraction techniques and area of optical character recognition is a particularly important in Image processing. Keywords— Image character recognition, Methods for Feature Extraction, Basic Gabor Filter, IDA, and PCA.
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGESIJCI JOURNAL
Template matching technique is useful for searching and finding the location of a template image (Small part of image) in the larger image. This technique is also used in Optical Character Recognition (OCR) tools and these tools are used for converting the scanned document images into normal text. Template matching technique is used to find and recognize the template image which is found in the given input image. In this research work, template matching technique is applied for scanned document images which contains characters (both uppercase and lowercase) and numerals. In order to perform the comparison of the template image with the input image we have used Performance Index method and it is compared with the normalized cross correlation and cross correlation methods. Different types of comparisons done in this work are, (i) comparing single character from a word, sentence and paragraph; (ii) comparing multiple characters (words) from a word, sentence and paragraph.
A NOVEL PROBABILISTIC BASED IMAGE SEGMENTATION MODEL FOR REALTIME HUMAN ACTIV...sipij
Automatic human activity detection is one of the difficult tasks in image segmentation application due to
variations in size, type, shape and location of objects. In the traditional probabilistic graphical
segmentation models, intra and inter region segments may affect the overall segmentation accuracy. Also,
both directed and undirected graphical models such as Markov model, conditional random field have
limitations towards the human activity prediction and heterogeneous relationships. In this paper, we have
studied and proposed a natural solution for automatic human activity segmentation using the enhanced
probabilistic chain graphical model. This system has three main phases, namely activity pre-processing,
iterative threshold based image enhancement and chain graph segmentation algorithm. Experimental
results show that proposed system efficiently detects the human activities at different levels of the action
datasets.
A novel predicate for active region merging in automatic image segmentationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Issues in Image Registration and Image similarity based on mutual informationDarshana Mistry
This is my 2nd Doctorate progresses committee presentation in image registration which is explained how do you find image similarity based on Entropy and mutual information
This paper introduces the implementation of fingerprint matching Minutiae Algorithm for Fingerprint
Matching. These algorithm increases the reliability accuracy of the fingerprint matching. The proposed method was
evaluated by means of experiment conducted on the FVC2002, FVC2004 database. Experimental results confirm
that the taking time of the fingerprint image matching is very less than the other methods. This algorithm is very
effective algorithm for the identification of fingerprint image.
Fingerprints are imprints formed by friction
ridges of the skin and thumbs. They have long been used for
identification because of their immutability and individuality.
Immutability refers to the permanent and unchanging character
of the pattern on each finger. Individuality refers to the
uniqueness of ridge details across individuals; the probability
that two fingerprints are alike is about 1 in 1.9x1015. In despite of
this improvement which is adopted by the Federal Bureau of
Investigation (FBI), the fact still is “The larger the fingerprint
files became, the harder it was to identify somebody from their
fingerprints alone. Moreover, the fingerprint requires one of the
largest data templates in the biometric field”. The finger data
template can range anywhere from several hundred bytes to over
1,000 bytes depending upon the level of security that is required
and the method that is used to scan one's fingerprint. For these
reasons this work is motivated to present another way to tackle
the problem that is relies on the properties of Vector
Quantization coding algorithm.
Face recognition using gaussian mixture model & artificial neural networkeSAT Journals
Abstract
Face recognition is a non-contact and friendly biometric identification technology. It has broad application prospects in the
military, public security and economic security. In this work, we also consider illumination variable database. The images have
taken from far distance and do not consider the close view face of the individual as in most of the face databases, clear face view
has been considered. In this first we located face as region of interest and then LBP and LPQ descriptors are used which is
illuminance invariant in nature. After this GMM has been used to reduce feature set by taking negative log-likelihood from each
LBP and LPQ descripted image histograms. After this ANN consumes stayed used for organization purposes. The investigational
consequencesshow excellent correctness rates in overall testing of input data.
Keywords: Illumination invariant, face recognition, LBP, LPQs,GMM,ANN
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Latent fingerprints lifted from crime scenes often contain overlapping prints, which are
difficult to separate and match by state-of-the-art fingerprint matchers. The methods that have been
proposed to separate overlapping fingerprints and successful matching previously suffer from limited
accuracy of the estimated orientation field. In this paper, the robustness of overlapping fingerprints
separation is increased, particularly for low quality images. This algorithm reconstructs the
orientation fields of component prints by modeling fingerprint orientation fields. To facilitate this,
orientation cues of component fingerprints are utilized, which are manually marked by fingerprint
examiners. The effectiveness of this model has been evaluated.
A comparative study on classification of image segmentation methods with a fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
National Flags Recognition Based on Principal Component Analysisijtsrd
Recognizing an unknown flag in a scene is challenging due to the diversity of the data and to the complexity of the identification process. And flags are associated with geographical regions, countries and nations. But flag identification of different countries is a challenging and difficult task. Recognition of an unknown flag image in a scene is challenging due to the diversity of the data and to the complexity of the identification process. The aim of the study is to propose a feature extraction based recognition system for Myanmar's national flag. Image features are acquired from the region and state of flags which are identified by using principal component analysis PCA . PCA is a statistical approach used for reducing the number of features in National flags recognition system. Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "National Flags Recognition Based on Principal Component Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26775.pdfPaper URL: https://www.ijtsrd.com/other-scientific-research-area/other/26775/national-flags-recognition-based-on-principal-component-analysis/soe-moe-myint
Enhancing the Design pattern Framework of Robots Object Selection Mechanism -...INFOGAIN PUBLICATION
In order to enable a computer to construct and display a three-dimensional array, solid objects from a single two-dimensional photograph, the rules and assumptions of depth perception have been carefully analyzed and mechanized. It is assumed that a photograph is a perspective projection of a set of objects which can be constructed from transformations of known three-dimensional models, and that the objects are supported by other visible objects or by a ground plane. These assumptions enable a computer to obtain a reasonable, three-dimensional description from the edge information in a photograph by means of a topological, mathematical process. A computer program has been written which can process a photograph into a line drawing .transform the line drawing into a three-dimensional representation and, finally, display the three-dimensional structure with all the hidden lines removed, from any point of view. The 2-D to 3-D construction and 3-D to 2-D display processes are sufficiently general to handle most collections of planar-surfaced objects and provide a valuable starting point for future investigation of computer-aided three-dimensional systems.
Object Recogniton Based on Undecimated Wavelet TransformIJCOAiir
Object Recognition (OR) is the mission of finding a specified object in an image or video sequence
in computer vision. An efficient method for recognizing object in an image based on Undecimated Wavelet
Transform (UWT) is proposed. In this system, the undecimated coefficients are used as features to recognize the
objects. The given original image is decomposed by using the UWT. All coefficients are taken as features for
the classification process. This method is applied to all the training images and the extracted features of
unknown object are used as an input to the K-Nearest Neighbor (K-NN) classifier to recognize the object. The
assessment of the system is agreed on using Columbia Object Image Library Dataset (COIL-100) database.
Building extraction from remote sensing imageries by data fusion techniqueseSAT Journals
Abstract This paper presents a data fusion approach for manmade objects extraction from high-resolution IKONOS satellite images. Buildings can have various complex forms and roofs of various compositional materials. Their automatic extraction from imagery is a very difficult problem. Applying normal image processing methods could not achieve satisfied performance, especially for high-resolution satellite images. It is based on edge maps derived from IKONOS data. Local changes or variations of the intensity of the imagery (such as edges and corners) are important information for image processing and pattern recognition. K-MEANS clustering is one of the most popular techniques that can be used to classify satellite images. This technique coupled with canny edge detection, which has double threshold technique is less fooled by noise, forms a very good tool in detection of man-made features. The above mentioned techniques are applied to one meter IKONOS imagery of the highly urbanized Singapore city, to detect building edges within scene. Keywords: Canny edge detection, RGB color matrices, Gaussian filter, K-means clustering, non-maximum suppression.
Building extraction from remote sensing imageries by data fusion techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Human Computer Interaction Algorithm Based on Scene Situation Awareness cscpconf
Implicit interaction based on context information is widely used and studied in the virtual scene.
In context based human computer interaction, the meaning of action A is well defined. For
instance, the right wave is defined turning paper or PPT in context B, And it mean volume up in
context C. However, Select object in a virtual scene with multiple objects, context information is
not fit. In view of this situation, this paper proposes using the least squares fitting curve beam to
predict the user's trajectory, so as to determine what object the user’s wants to operate .And
fitting the starting position of the straight line according to the change of the discrete table. And
using the bounding box size control the Z variable to move in an appropriate location.
Experimental results show that the proposed in this paper based on bounding box size to control
the Z variables get a good effect; by fitting the trajectory of a human hand, to predict the object
that the subjects would like to operate. The correct rate is 88.6%.
Pixel Based Fusion Methods for Concealed Weapon DetectionIJERA Editor
Concealed Weapon Detection(CWD) is the detection of weapons underneath a person’s clothing which is an important obstacle for the security of general public as well as safety of public assets like airports and buildings. Concealed weapons such as handbags , knives and explosives are detected using manual screening procedures. It is desirable to detect the concealed weapons from a far off distance at airports and other secured places. A number of sensors with different phenomenology have been developed to observe objects underneath’s persons clothing. As no single technology provide improved performance in CWD applications, different image fusion schemes based on pixel level is proposed . Image obtained from visual camera does not reveal any information hidden under persons clothing whereas MWM image obtained from MWM (Millimeter Wave Imaging )sensor reveal clothing penetration underneath persons cloth but cannot identify the person. In this paper fusion of MWM image with visible image based on pixels is proposed. Experimental results reveal that fused image can identify the person with concealed weapons. Performance metrics such as standard deviation, entropy and cross entropy is calculated and from simulation results it is observed that PCA based fusion method is similar to DWT based fusion scheme.
Target Detection Using Multi Resolution Analysis for Camouflaged Images ijcisjournal
Target detection is a challenging problem having many applications in defense and civil. Most of the
targets in defense are camouflaged. It is difficult for a system to detect camouflaged targets in an image. A
novel and constructive approach is proposing to detect object in camouflage images. This method uses
various methodologies such as 2-D DWT, gray level co-occurrence matrix (GLCM), wavelet coefficient
features, region growing algorithm and canny edge detection. Target detection is achieved by calculating
wavelet coefficient features from GLCM of transformed sub blocks of the image. Seed block is obtained by
evaluating wavelet coefficient features. Finally the camouflage object is highlighted using image
processing schemes. The proposed target detection system is implemented in Matlab 7.7.0 and tested on
different kinds of images.
Development of Human Tracking System For Video Surveillancecscpconf
Visual surveillance in dynamic scenes, especially for human and some objects is one of the
most active research areas. An attempt has been made to this issue in this work. It has wide
spectrum of promising application including human identification to detect the suspicious
behavior, crowd flux statistics, and congestion analysis using multiple cameras.
In this paper deals with the problem of detecting and tracking multiple moving people in a static
background. Detection of foreground object is done by background subtraction. Detected
objects are identified and analyzed through different blobs. Then tracking is performed by
matching corresponding features of blob. An algorithm has been developed in this perspective
using Angular Deviation of Center of Gravity (ADCG), which gives a satisfying result for segmentation of human object.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSijma
Nowadays, image alteration in the mainstream media has become common. The degree of manipulation is
facilitated by image editing software. In the past two decades the number indicating manipulation of
images rapidly grows. Hence, there are many outstanding images which have no provenance information
or certainty of authenticity. Therefore, constructing a scientific and automatic way for evaluating image
authenticity is an important task, which is the aim of this paper. In spite of having outstanding
performance, all the image forensics schemes developed so far have not provided verifiable information
about source of tampering. This paper aims to propose a different kind of scheme, by exploiting a group of
similar images, to verify the source of tampering. First, we define our definition with regard to tampered
image. The distinctive features are obtained by exploiting Scale- Invariant Feature Transform (SIFT)
technique. We then proposed clustering technique to identify the tampered region based on distinctive
keypoints. In contrast to k-means algorithm, our technique does not require the initialization of k value. The
experimental results over and beyond the dataset indicate the efficacy of our proposed scheme
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...sipij
The problem of structure extraction from the image which contains many clustered objects is a challenging one for high level image analysis. When an image contains many clustered objects overlapping of objects can cause for hiding the structure. The existing segmentation techniques for better understanding, not able to the address the constituent parts of the image implicitly. The approaches like multistage segmentation address to some extent, but for each stage a separate structure is extracted, and thus causes for the ambiguity about the structure. The proposed approach called Ant Colony Optimization and Fuzzy logic based technique resolves this problem, and gives the implicit structure, that meets with original structure. The segmentation approach uses the swarm intelligence technique based on the behavior of the ant colonies. The segmentation is the process of separating the non-overlapping regions that constitute an image. The segmentation is important for structured and non-structured image analysis and classification for better understanding.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Integration of poses to enhance the shape of the object tracking from a singl...eSAT Journals
Abstract In computer vision, tracking human pose has received a growing attention in recent years. The existing methods used multi-view videos and camera calibrations to enhance the shape of the object in 3D view. In this paper, tracking and partial reconstruction of the shape of the object from a single view video is identified. The goal of the proposed integrated method is to detect the movement of a person more accurately in 2D view. The integrated method is a combination of Silhouette based pose estimation and Scene flow based pose estimation. The silhouette based pose estimation is used to enhance the shape of the object for 3D reconstruction and scene flow based pose estimation is used to capture the size as well as the stability of the object. By integrating these two poses, the accurate shape of the object has been calculated from a single view video. Keywords: Pose Estimation, optical Flow, Silhouette, Object Reconstruction, 3D Objects
Similar to DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN (20)
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS IJCSEIT Journal
Trailers carry large containers to various destinations in the world. These are manually locked on to
trailers as they move through these long distances. Security mainly refers to the safety of a state,
organization, property, and individuals against criminal activity. The study was made to analyze the
existing trailer locks and the insecurity being experienced currently. The study also focused on creating a
background to building an automated lock system for auto-mobiles. Findings showed that there are various
container types like the General Purpose containers, the Hard-Top containers and the Open-Top among
others. Similarly, the twist locks were the ones revised for this study. The study also discussed the
weaknesses of the twist locks, most especially the non-notification on unsecured locks. This causes leads to
accidents and wastage of lives and property. The study finally proposed an automated lock system to
overcome these weaknesses to some good extent.
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone
use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as
well as provides options to access a smartphone through other smartphone or a normal mobile via Short
Message Service. This model provides option to track and secure the mobile by locking it. It also provides
facilities to receive the incoming call and sms information to the remotely connected device and enables the
remote user to control the mobile through SMS. The proposed model is validated by the prototype
implementation in Android platform. Various tests are conducted in the implementation and the results are
discussed.
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...IJCSEIT Journal
The Job selection process in today’s globally competitive economy can be a daunting task for prospective
employees no matter their experience level. Although many years of research has been devoted to job
search and application resulting in good integration with information technology including the internet and
intelligent agent-based architectures, there are still many areas that need to be enhanced. Two such areas
include the quality of jobs associated with applicants in the job search by profiling the needs of employers
against the needs of prospective employees and the security and verifications schemes integrated to reduce
the instances of fraud and identity theft. The integration of mobile, intelligent agent, and cryptography
technologies provide benefits such as improved accessibility wirelessly, intelligent dynamic profiling, and
increased security. With this in mind we propose the intelligent mobile agents instead of human agents to
perform the Job search using fuzzy preferences which is been published elsewhere and application
operations incorporating the use of agents with a trust authority to establish employer trust and validate
applicant identity and accuracy. Our proposed system incorporates design methodologies to use JADELEAP
and Android to provide a robust, secure, user friendly solution.
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...IJCSEIT Journal
A face recognition system using different local features with different distance measures is proposed in this
paper. Proposed method is fast and gives accurate detection. Feature vector is based on Eigen values,
Eigen vectors, and diagonal vectors of sub images. Images are partitioned into sub images to detect local
features. Sub partitions are rearranged into vertically and horizontally matrices. Eigen values, Eigenvector
and diagonal vectors are computed for these matrices. Global feature vector is generated for face
recognition. Experiments are performed on benchmark face YALE database. Results indicate that the
proposed method gives better recognition performance in terms of average recognized rate and retrieval
time compared to the existing methods.
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
Identifying attackers is a major apprehension to both organizations and governments. Recently, the most
used applications for prevention or detection of attacks are intrusion detection systems. Biometrics
technology is simply the measurement and use of the unique characteristics of living humans to distinguish
them from one another and it is more useful as compare to passwords and tokens as they can be lost or
stolen so we have choose the technique biometric authentication. The biometric authentication provides the
ability to require more instances of authentication in such a quick and easy manner that users are not
bothered by the additional requirements. In this paper, we have given a brief introduction about
biometrics. Then we have given the information regarding the intrusion detection system and finally we
have proposed a method which is based on fingerprint recognition which would allow us to detect more
efficiently any abuse of the computer system that is running.
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
A video fingerprint is a recognizer that is derived from a piece of video content. The video fingerprinting
methods obtain unique features of a video that differentiates one video clip from another. It aims to identify
whether a query video segment is a copy of video from the video database or not based on the signature of
the video. It is difficult to find whether a video is a copied video or a similar video, since the features of the
content are very similar from one video to the other. The main focus of this paper is to detect that the query
video is present in the video database with robustness depending on the content of video and also by fast
search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithms are adopted in
this paper to achieve robust, fast, efficient and accurate video copy detection. As a first step, the
Fingerprint Extraction algorithm is employed which extracts a fingerprint through the features from the
image content of video. The images are represented as Temporally Informative Representative Images
(TIRI). Then, the second step is to find the presence of copy of a query video in a video database, in which
a close match of its fingerprint in the corresponding fingerprint database is searched using inverted-filebased
method. The proposed system is tested against various attacks like noise, brightness, contrast,
rotation and frame drop. Thus the performance of the proposed system on an average shows high true
positive rate of 98% and low false positive rate of 1.3% for different attacks.
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
In this paper, the impact of Forward Error Correction (FEC) code namely Trellis code with interleaver on
the performance of wavelet based MC-CDMA wireless communication system with the implementation of
Alamouti antenna diversity scheme has been investigated in terms of Bit Error Rate (BER) as a function of
Signal-to-Noise Ratio (SNR) per bit. Simulation of the system under proposed study has been done in M-ary
modulation schemes (MPSK, MQAM and DPSK) over AWGN and Rayleigh fading channel incorporating
Walsh Hadamard code as orthogonal spreading code to discriminate the message signal for individual
user. It is observed via computer simulation that the performance of the interleaved coded based proposed
system outperforms than that of the uncoded system in all modulation schemes over Rayleigh fading
channel.
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...IJCSEIT Journal
In this paper we extend the problem of classification using Fuzzy Association Rule Mining and propose the
concept of Fuzzy Weighted Associative Classifier (FWAC). Classification based on Association rules is
considered to be effective and advantageous in many cases. Associative classifiers are especially fit to
applications where the model may assist the domain experts in their decisions. Weighted Associative
Classifiers that takes advantage of weighted Association Rule Mining is already being proposed. However,
there is a so-called "sharp boundary" problem in association rules mining with quantitative attribute
domains. This paper proposes a new Fuzzy Weighted Associative Classifier (FWAC) that generates
classification rules using Fuzzy Weighted Support and Confidence framework. The naïve approach can be
used to generating strong rules instead of weak irrelevant rules. where fuzzy logic is used in partitioning
the domains. The problem of Invalidation of Downward Closure property is solved and the concept of
Fuzzy Weighted Support and Fuzzy Weighted Confidence frame work for Boolean and quantitative item
with weighted setting is generalized. We propose a theoretical model to introduce new associative classifier
that takes advantage of Fuzzy Weighted Association rule mining.
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALIJCSEIT Journal
In this paper, a system, developed for speech encoding, analysis, synthesis and gender identification is
presented. A typical gender recognition system can be divided into front-end system and back-end system.
The task of the front-end system is to extract the gender related information from a speech signal and
represents it by a set of vectors called feature. Features like power spectrum density, frequency at
maximum power carry speaker information. The feature is extracted using First Fourier Transform (FFT)
algorithm. The task of the back-end system (also called classifier) is to create a gender model to recognize
the gender from his/her speech signal in recognition phase. This paper also presents the digital processing
of a speech signals (pronounced “A” and “B”) which are taken from 10 persons, 5 of them are Male and
the rest of them are Female. Power Spectrum Estimation of the signal is examined .The frequency at
maximum power of the English Phonemes is extracted from the estimated power spectrum. The system uses
threshold technique as identification tool. The recognition accuracy of this system is 80% on average.
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALIJCSEIT Journal
The proposed approach avoids the semantic gap in image retrieval by combining automatic relevance
feedback and a modified stochastic algorithm. A visual feature database is constructed from the image
database, using combined feature vector. Very few fast-computable features are included in this step. The
user selects the query image, and based on that, the system ranks the whole dataset. The nearest images are
retrieved and the first automatic relevance feedback is generated. The combined similarity of textual and
visual feature space using Latent Semantic Indexing is evaluated and the images are labelled as relevant or
irrelevant. The feedback drives a feature re-weighting process and is routed to the particle swarm
optimizer. Instead of classical swarm update approach, the swarm is split, for each swarm to perform the
search in parallel, thereby increasing the performance of the system. It provides a powerful optimization
tool and an effective space exploration mechanism. The proposed approach aims to achieve the following
goals without any human interaction - to cluster relevant images using meta-heuristics and to dynamically
modify the feature space by feeding automatic relevance feedback.
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...IJCSEIT Journal
In Wireless Ad hoc network, cooperation of nodes can be achieved by more interactions at higher protocol
layers, particularly the MAC (Medium Access Control) and network layers play vital role. MAC facilitates
a routing protocol based on position location of nodes at network layer specially known as Beacon-less
geographic routing (BLGR) using Contention-based selection process. This paper proposes two levels of
cross-layer framework -a MAC network cross-layer design for forwarder selection (or routing) and a
MAC-PHY for relay selection. Wireless networks suffers huge number of communication at the same time
leads to increase in collision and energy consumption; hence focused on new Contention access method
that uses a dynamical change of channel access probability which can reduce the number of contention
times and collisions. Simulation result demonstrates the best Relay selection and the comparative of direct
mode with the cooperative networks. And also demonstrates the Performance evaluation of contention
probability with Collision avoidance.
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMIJCSEIT Journal
Karyotyping is a process in which chromosomes in a dividing cell are properly stained, identified and
displayed in a standard format, which helps geneticist to study and diagnose genetic factors behind various
genetic diseases and for studying cancer. M-FISH (Multiplex Fluorescent In-Situ Hybridization) provides
color karyotyping. In this paper, an automated method for M-FISH chromosome segmentation based on
watershed transform followed by naive Bayes classification of each region using the features, mean and
standard deviation, is presented. Also, a post processing step is added to re-classify the small chromosome
segments to the neighboring larger segment for reducing the chances of misclassification. The approach
provided improved accuracy when compared to the pixel-by-pixel approach. The approach was tested on
40 images from the dataset and achieved an accuracy of 84.21 %.
Steganography is the technique of hiding a confidential message in an ordinary message and the extraction
of that secret message at its destination. Different carrier file formats can be used in steganography.
Among these carrier file formats, digital images are the most popular. For this work, digital images are
used. Here steganography is done on the skin portion of an image. First skin portion of an image is
detected. Random pixels are selected from that detected region using a pseudo-random number generator.
The bits of the secret message will be embedded on the LSB of these random pixels. An analysis is done to
check the efficiency and robustness of the proposed method. The aim of this work is to show that
steganography done using random pixel selection is less prone to outside attacks.
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...IJCSEIT Journal
In many applications like FIR filters, FFT, signal processing and measurements, we are required (~45 dB)
or less side lobes amplitudes. However, the problem is usual window based FIR filter design lies in its side
lobes amplitudes that are higher than the requirement of application. We propose a window function,
which has better performance like narrower main lobe width, minimum side lobe peak compared to the
several commonly used windows. The proposed window has slightly larger main lobe width of the
commonly used Hamming window, while featuring 6.2~22.62 dB smaller side lobe peak. The proposed
window maintains its maximum side lobe peak about -58.4~-52.6 dB compared to -35.8~-38.8 dB of
Hamming window for M=10~14, while offering roughly equal main lobe width. Our simulated results also
show significant performance upgrading of the proposed window compared to the Kaiser, Gaussian, and
Lanczos windows. The proposed window also shows better performance than Dolph-Chebyshev window.
Finally, the example of designed low pass FIR filter confirms the efficiency of the proposed window.
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...IJCSEIT Journal
Association rule mining (ARM) is the process of generating rules based on the correlation between the set
of items that the customers purchase.Of late, data mining researchers have improved upon the quality of
association rule mining for business development by incorporating factors like value (utility), quantity of
items sold (weight) and profit. The rules mined without considering utility values (profit margin) will lead
to a probable loss of profitable rules.
The advantage of wealth of the customers’ needs information and rules aids the retailer in designing his
store layout[9]. An algorithm CSHURI, Customer Segmentation using HURI, is proposed, a modified
version of HURI [6], finds customers who purchase high profitable rare items and accordingly classify the
customers based on some criteria; for example, a retail business may need to identify valuable customers
who are major contributors to a company’s overall profit. For a potential customer arriving in the store,
which customer group one should belong to according to customer needs, what are the preferred functional
features or products that the customer focuses on and what kind of offers will satisfy the customer, etc.,
finds the key in targeting customers to improve sales [9], which forms the base for customer utility mining.
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...IJCSEIT Journal
The exploration of oceans and sea beds is being made increasingly possible through the development of
Autonomous Underwater Vehicles (AUVs). This is an activity that concerns the marine community and it
must confront the existence of notable challenges. However, an automatic detecting and tracking system is
the first and foremost element for an AUV or an aqueous surveillance network. In this paper a method of
Kalman filter was presented to solve the problems of objects track in sonar images. Region of object was
extracted by threshold segment and morphology process, and the features of invariant moment and area
were analysed. Results show that the method presented has the advantages of good robustness, high
accuracy and real-time characteristic, and it is efficient in underwater target track based on sonar images
and also suited for the purpose of Obstacle avoidance for the AUV to operate in the constrained
underwater environment.
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEIJCSEIT Journal
Breast cancer is one of the leading cancers for women in developed countries including India. It is the
second most common cause of cancer death in women. The high incidence of breast cancer in women has
increased significantly in the last years. In this paper we have discussed various data mining approaches
that have been utilized for breast cancer diagnosis and prognosis. Breast Cancer Diagnosis is
distinguishing of benign from malignant breast lumps and Breast Cancer Prognosis predicts when Breast
Cancer is to recur in patients that have had their cancers excised. This study paper summarizes various
review and technical articles on breast cancer diagnosis and prognosis also we focus on current research
being carried out using the data mining techniques to enhance the breast cancer diagnosis and prognosis.
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...IJCSEIT Journal
Advancement in information system leads organizations to apply e-learning system to train their employees
in order to enhance its performance. In this respect, applying web based training will enable the
organization to train their employees quickly, efficiently and effectively anywhere at any time. This
research aims to extend Unified Theory of Acceptance and Use Technology (UTAUT) using some factors
such flexibility of web based training system, system interactivity and system enjoyment, in order to explain
the employees’ intention to use web based training system. A total of 290 employees have participated in
this study. The findings of the study revealed that performance expectancy, facilitating conditions, social
influence and system flexibility have direct effect on the employees’ intention to use web based training
system, while effort expectancy, system enjoyment and system interactivity have indirect effect on
employees’ intention to use the system.
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETIJCSEIT Journal
The innovative concept of Complex Fuzzy Set is introduced. The objective of the this paper to investigate
the concept of Complex Fuzzy set in constraint to a traditional Fuzzy set , where the membership function
ranges from [0, 1], but in the Complex fuzzy set extended to a unit circle in a complex plane, where the
member ship function in the form of complex number. The Compressive study of mathematical operation of
Complex Fuzzy set is presented. The basic operation like addition, subtraction, multiplication and division
are described here. The Novel idea of this paper to measure the similarity between two fuzzy relations by
evaluating δ -equality. Here also we introduce the probabilistic interpretation of the complex fuzzy set
where we attempted to clarify the distinction between Fuzzy logic and probability.
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...IJCSEIT Journal
This paper presents an optimization of an FPGA circuit implementation of 3D reconstruction algorithm of
medicals images. It is based on an algorithmic specification in the shape of a Factorized and Conditioned
Data Dependences Graph (GFCDD). An automatic and optimized implementation of the algorithm of «
Marching Cubes » has been carried out. The repetitive property of the algorithm has been exploited, as
much as possible, by means of the methodology “Adequacy Algorithm Structures”.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
DOI : 10.5121/ijcseit.2012.2216 187
DETECTION OF CONCEALED WEAPONS IN X-RAY
IMAGES USING FUZZY K-NN
Dr. Mohamed Mansoor Roomi #1
R.Rajashankari#2
Department of Electronics and Communication Engineering, Thiagarajar College of
Engineering,Madurai
1
smmroomi@tce.edu
2
r.rajasankari@gmail.com
ABSTRACT
Scanning baggage by x-ray and analysing such images have become important technique for detecting
illicit materials in the baggage at Airports. In order to provide adequate security, a reliable and fast
screening technique is needed for baggage examination.This paper aims at providing an automatic method
for detecting concealed weapons, typically a gun in the baggage by employing image segmentation method
to extract the objects of interest from the image followed by applying feature extraction methods namely
Shape context descriptor and Zernike moments. Finally the objects are classified using fuzzy KNN as illicit
or non-illicit object.
KEYWORDS
Aviation security, Shape Context Descriptor, Zernike Moments, Nearest Neighbour Classifier
1.INTRODUCTION
X-ray imaging is an important technology in many fields from inspection of delicate objects to
weapon detection at security checkpoints [1].To achieve higher threat detection rates during
inspection of X-ray luggage scans is a pressing and sought after goal for airport security
personnel. The Baggage inspection system used in airport ensures security of the passengers. The
process of identifying the contents of each bag and the methods adopted by terrorists for hiding
the threat objects are complicated, the existing luggage inspection system do not reveal 100% of
threat items. Further an object inside a bag may be in any position, it may be rotated so an
algorithm whist is rotational, translational invariant should be used for providing accurate results.
In addition, the threat item is superimposed by other objects in the bag, the harder it becomes to
detect it (effect of superposition). The passenger’s baggage may contain threat items such as
handgun, bomb, grenade,etc which must be detected efficiently so the human operators must be
assisted by an weapon detection system. Advanced security screening systems are becoming
increasingly used to aid airport screeners in detecting potential threat items [2]. Unfortunately,
most airport screening is still based on the manual detection of potential threat objects by human
experts. In response to this, security training is relying heavily on the object recognition test
(ORT) as a means of qualifying human airport luggage screeners [4].In order to provide
appropriate security, a much more sophisticated, reliable, and fast screening technique is needed
for passenger identification and baggage examination. Automatic threat detection is an important
application in x-ray scene analysis. Understanding x-ray images is a challenging task in computer
2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
188
vision and an automatic system should be developed that consumes less time for processing and
performs accurately with reduced false positive results.
Although several X-ray technology based automatic systems exist for threats detection, only a
few of these systems make use of the well established pattern recognition and machine learning
techniques.On the other hand, several approaches based on Classifier have
been proposed to detect weapons[3].Additionally, the importance of image enhancement and
pseudo-coloring[5] to help aid decision making by human is now a recognized area of critical
need. Also, the system should provide automatic detection of potential threat objects.
2. RELATED WORK
For the detection of threat items, many types of imaging system exist. X-ray imaging systems and
MMW (Millimetre wave imaging) are used and x-ray imaging system is widely used for carry-on
bags. The techniques used for analysing these x-ray images are pseudo-coloring and segmentation
based techniques. Pseudo-coloring [1] process is the one in which the objects inside the bag are
given different colors based on their material type. In segmentation based methods, the x-ray
images are segmented to extract the objects of interest. Using these methods, satisfactory results
are produced and assisted human for detecting the threat items. X-ray photons, however,
penetrate most materials. As a result, all objects along an x-ray path attenuate the x-ray and
contribute to the final measured intensity. In the x-ray community, a common way of
disambiguating objects is through CT reconstruction [7]. This is typically obtained through the
filtered back-projection algorithm. Although several X-ray technology based automatic systems
exist for threats detection [8], only a few of these systems make use of the well established
pattern recognition and machine learning techniques [9, 10, 11, and 12]. New X-ray imaging
systems at airports use dual-energy analysis to estimate the atomic numbers of materials in the
passenger baggage. This method obtains a measure of the density and thickness of the material.
3. PROPOSED WORK.
The image is converted to binary image by choosing the threshold as the mean of the two peaks
of bimodal histogram and the objects are labelled. The area of each object is computed and the
values are sorted. The mean value is calculated and is set as threshold to collect the objects of
interest. Object boundary is extracted and shape feature extraction algorithm is implemented. The
classifier is trained with the extracted features and the object is classified as object or non-object.
Figure 1 SampleX-ray Images
3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
189
Figure 1 shows some of the x-ray images considered in this work.Figure 2 shows the overall
frame work for the approach.
Image
Figure 1 Flow chart of proposed work
3.1 FEATURE EXTRACTION
3.1.1 SHAPE CONTEXT DESCRIPTOR
Shape is not the only, but a very powerful descriptor of image content .Shape is almost certainly
the most important property that is perceived about objects. Shape provides more information
about the object than other features and can be used in object recognition. Using shape as a
attribute provide more accurate and reliable results .Addressing objects based on their shape is
unique.Shape is an important cue as it captures a prominent element of an object.. Ideally, a good
shape descriptor has the following desirable properties1)Discrimination should be
high;2)Efficient matching;3)Compact representation;4)Efficient Feature Extraction;5)Invariance
to shape representation;6)Invariance to similarity transformation;7)Invariance to shape
degeneracies and noises.
Shape context is a shape descriptor proposed by Serge Belongie and Jitendra Malik[13]. The
shape context is anticipated to be a way of describing shapes that allows for measuring
shape similarity and the recovering of point correspondences.It characterize a particular
Removal of Spurious
Component
Preliminary Feature
Extraction
Binarization
Extract Object Boundary
Co-ordinates
Shape Context
Descriptor
Zernike Moments Max, Min, Mean Gray
value
Fuzzy k-NN Classifier
4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
190
point location on the shape.The fundamental idea is to pick n points on the contours of a
shape. For each point pi on the shape, consider the n − 1 vectors obtained by connecting
pi to all other points.The set of all these vectors is a rich description of the shape localized
at that point but is far too detailed. The key initiative is that the distribution over relative
positions is a robust, compressed, and very discriminative descriptor. So, for the point pi,
the coarse histogram of the relative coordinates of the remaining n − 1 points, Concretely,
for a point pi on the shape, compute a coarse histogram hi of the relative coordinates of the
remaining n-1 points
)}()(:{# kbinpqpqh ii
k
i ∈−≠= (1)
is define to be the shape context of pi . The bins are normally taken to be uniform in log-
polar space. In the absence of background clutter, the shape context of a point on a shape can be
made invariant under uniform scaling of the shape as a whole. This is accomplished by
normalizing all radial distances by the mean distance α between the n2
point pairs in the shape.
Consider the shape of the alphabet fig.3 (a).sampled edge points of the shape. A log polar
histogram bin as shown in fig.3 (b) is overlaid on any sampled boundary point. Belongie et al.
have used 12 bins for log r and 5 bins for angle θ. As illustrated in Fig. 1, shape contexts is
computed for each point in the shape and will be unique for each point and similar shapes will
have similar shape context.Translational invariance come naturally to shape context. Scale
invariance is obtained by normalizing all radial distances by the mean distance between
all the point pairs in the shape.
Figure 2 Shape Context Computation
3.1.2 ZERNIKE MOMENTS
Moments have been widely used in image processing applications through the years. For both
contour and region of a shape, one can use moment's theory to analyse the object. Geometrical,
central and normalized moments were for many decades the only family of applied moments. The
main disadvantage of these descriptors was their disability to fully describe an object in a way
that, using the moments set, the reconstruction of the object could be possible. In other words
they are not orthogonal. Zernike comes to fill this gap, by introducing a set of complex
polynomials, which form a complete orthogonal set over the interior of the unit circle,
x2
+ y2
= 1.
These polynomials have the form
)exp()(),(),( θρθρ jmyx RVV nmnmnm
== (2)
5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
191
Where n is a non-negative integer m is a non zero integer subject to the constraints n-|m| even and
|m|≤ n, ρ is the length of vector from the origin ( )yx, to the pixel(x, y),θ the angle between vector
ρ and x axis in counter-clockwise direction. Rnm(ρ ) is the Zernike radial polynomials in (ρ,θ)
polar coordinates
)()(, ρρ nmmn RR =− (3)
The Zernike moment of order n with repetition m for a continuous image function f(x,y), that
vanishes outside the unit disk is
∫∫
≤+
+
=
1
*
22
),(),(
1
),(
yx
nmnm
dxdyVyxf
n
yxZ θρ
π
(4)
For a digital image, the integrals are replaced by summations to get
∑∑ ≤+
+
=
x
nm
y
nm
yxyxf
n
VZ 1),,(),(
1 22*
θρ
π
(5)
Suppose that one knows all moments Znm of f(x,y) up to a given order nmax. It is desired to
reconstruct a discrete function ),(ˆ yxf whose moments exactly match those of f(x,y) up to the
given order nmax. Zernike moments are the coefficients of the image expansion into orthogonal
Zernike polynomials. By orthogonality of the Zernike basis
),(),(ˆ
max
0
θρnm
n
n m
nm
Vyxf Z∑∑=
= (6)
Since Zernike moments are only rotationally invariant, additional properties of translation and
scale invariance should be given to these moments in some way. We can introduce translation
invariance in the Zernike moments by converting the absolute pixel coordinates as follows
−
−
→
0
0
Yy
Xx
y
x
(7)
Where
00
10
0
m
m
X =
00
01
0
m
m
Y =
are the centroid coordinates of the object (with m denoting the geometrical moment).
Scaling invariance can be achieved by normalizing the Zernike moments with respect to the
geometrical moment m00 of the object. The resulting moments are derived from the following
equation
6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
192
00
'
m
Z
Z nm
nm = (8)
where Znm are the Zernike moments computed by using equation (4.4).Since Zernike basis
functions take the unit disk as their domain, this disk must be specified before moments can be
calculated.
In the implementation, all the shapes are normalized into a unit circle of fixed radius. The unit
disk is then centred on the shape centroid. This makes the obtained moments scale and translation
invariant. Rotation invariance is achieved by only using magnitudes of the moments. Rotation
invariance is achieved by only using magnitudes of the moments. The magnitudes are then
normalized by dividing them by the mass of the shape.
The similarity between two shapes indexed with Zernike moments descriptors is measured by the
Euclidean distance between the two Zernike moments vectors. The computation of ZMD does not
need to know boundary information, making it suitable for more complex shape representation.
Like Fourier descriptors, Zernike moments descriptors can be constructed to arbitrary order, this
overcomes the drawback of geometric moments in which higher order moments are difficult to
construct. However, Zernike moments descriptors lose the perceptual meanings as those reflected
in Fourier descriptors and geometric moments. Besides, ZMD does not emphasize shape
boundary features which are important features of a shape. Zernike moments have many
advantages such as rotation invariance(the magnitudes of Zernike moments are invariant to
rotation), robustness(they are robust to noise and minor variations in shape) and
expressiveness(since the basis is orthogonal, they have minimum information redundancy).
3.2 CLASSIFICATION
Once significant features are extracted from X-ray images, a good classification technique is
needed to identify the target object with a quantified confidence level so that this information can
assist the security operator in making an appropriate response. Classifiers ranging from KNN to
the Artificial Neural Networks (ANNs)are used for image classification, shape recognition, and
image retrieval. However the classification rate in x-ray luggage scanning is well below
satisfactory levels.
3.2.1 FUZZY K-NN CLASSIFIER
Fuzzy k-nearest neighbor is a classification technique, which provides the simplicity and the
practicability of classical K nearest neighbor and also the advantages of using fuzzy logic. Fuzzy
sets are sets whose elements have degrees of membership. In classical set theory, the membership
of elements in a set is assessed in binary terms according to a bivalent condition — an element
either belongs or does not belong to the set. By contrast, fuzzy set theory permits the gradual
assessment of the membership of elements in a set; this is described with the aid of a membership
function. This algorithm assigns membership as a function of the object’s distance from its K-
nearest neighbours and the memberships in the possible classes.The main algorithm is very
similar to K-NN. In the training procedure, the sample objects are located to the feature vector
space and these samples are initialized in a fuzzy state. In the classification phase, for each new
object x, it’s K nearest neighbors are detected and then class membership values are calculated
according to the following formula:
7. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
193
∑
∑
=
=
= K
j
j
K
j
jij
i
W
Wu
xu
1
1
)( (9)
Where, uij
is the i
th
class membership value of neighborj
and Wj is the weight of the neighborj
given by
(10)
A distance measure d(i1,i2) between any pair a1=(a1,1 ,.........,a1,k); a2=(a2,1 ,.........,a2,k) of instances
Euclidean distance is given by
2
1
,2,1212 )(),( ∑=
−=
k
j
jj aaaad (11)
The value of m, used to scale the effect of the distance between x and neighborj
, is entirely
arbitrary. As m approaches to ± infinity, the results of classifier approach to K-nn.
Figure 3 A Classification Example
Figure 3 shows A classification example of an unlabeled object with using fuzzy k nearest
neighbor algorithm. In the figure (a), the unlabeled green circular object’s 3 neighbors are at the
same distance.
Fuzzy K-NN approach reduces the disadvantages of traditional K-NN approach and also it is a
simple and effective solution for classification.
( ) 1
2
tan
1
−
=
m
j
cedis
W
8. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
194
4. RESULTS AND DISCUSSION
In this work the x-ray images of bags which are taken in the airport were considered. Size
of the images used for processing is 310 X 1035. To obtain the optimum result in
classification an efficient algorithm is used.In this project, feature extraction technique is
applied to the input pre-processed image to extract features .A total of 15 images are taken among
which seven images are with weapon and the remaining images are without weapon. The
classifier which is used in this project classify efficiently. The classifier is initially trained for all
the images. The training images with a new set of two images which is not included in the
training is considered for testing. Figure 4 shows the objects of interest extracted after preliminary
feature extraction process.A set of training and testing images considered for classification is
shown in Figure 5 and Figure 6 respectively.
Figure 5 Training Images
Figure 4 Objects Of Interest Extracted
9. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
195
Figure 6 Testing Images
Figure 7 shows the detected weapon in the x-ray images considered.
Figure 7 Detected Weapon
5. CONCLUSION
In this work, a fuzzy KNN based classifier has been presented to detect concealed
weapon by capturing and analysing x-ray images. This proposed work relies on reliable
features like Shape context descriptor and Zernike moments to detect concealed weapons.
The proposed method performs satisfactorily and the future work involves classification
of detected weapons.
10. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
196
References
[1] Abidi, B., Y. Zheng, A. Gribok, and M. Abidi,. Improving Weapon Detection in Single Energy X-
Ray Images Through Pseudocoloring.
[2] N.E.L. Shanks and A.L.W. Bradley, Handbook of Checked Baggage Screening: Advanced Airport
Security Operation, WileyBlackwell, 2004.
[3] Steve Green, Michael Blumenstein, Vallipuram Muthukkumarasamy and Jun Jo School of
Information Technology, Investigation of a classification-based technique to detect Illicit objects for
aviation security.
[4] D. Hardmeier, F. Hofer, A. Schwaninger,"The X-ray object recognition test (X-ray ORT) – a reliable
and valid instrument for measuring visual abilities needed in X-ray screening," IEEE CCST 2005, pp.
189-192.
[5] Abidi, B., Y. Zheng, A. Gribok and M. Abidi, Screener Evaluation of Pseudo-Colored Single Energy
X-ray Luggage Images. Proceedings of IEEE conference on Computer Vision and Pattern Recognition
Workshop, San Diego CA June 2005.
[6] B. Abidi, J. Liang, M. Mitckes, and M. Abidi. Improving the detection of lowdensity weapons in x-
ray luggage scans using image enhancement and novel scene-decluttering techniques. Jrnl of Elec.
Imaging, 13(3):523–538, 2004.
[7] A. C. Kak and M. Slaney. Principles of computerized tomographic imaging. Society for Industrial
and Applied Mathematics, PA, USA, 2001.
[8] S. Singh and M. Singh, “Explosives detection systems(EDS) for aviation security,” Signal Processing,
vol. 83, no. 1, pp. 31–55, 2003.
[9] R. Gesick, C. Saritac, and C. Hung, “Automatic Image Analysis process for the detection of concealed
weapon” in Proceedings of the 5th
Annual Workshop on Cyber Security and Information Intelligent
Research,2009.
[10] V. Muthukkumarasamy, M. Blumenstein, J. Jo, and S.Green, “Intelligent illicit object detection
system for enhanced aviation security”,in International Conference on Simulated Evolution and
Learning,2004.
[11] X.Shi, “Improving object classification in X-ray luggage inspection,Ph.D Thesis,Department of
Computer and Electrical Engineering,Virginia Tech.and State University,2000.
[12] T. Feather, I. Guan, A. Lee-Kwen, and R.B. Paranjape, “Caxss: an intelligent threat detection system,”
SPIE, Applications of
Signal and image Processing in Explosives Detection Systems, vol. 1824,pp.152-161, 1993.
[13] A.S.Belongie,J.Malik and J.Puzicha, “Shape matching and object recognition using shape
contexts”,IEEE Trans.PAMI,vol.24,pp509-522,April 2002.
[14] A.Khotanzad and Y.H.Hong, “Invariant Image Recognition by Zernike Moments”,IEEE Transactions
on Pattern Anal& Machine Intelligence,vol.PAMI-12,No.5.,pp.489-497,1990.
[15] Keller, J.M., Gray, R., Givens, J.A.J.R. A Fuzzy k-nearest Neighbor Algorithm. IEEE Trans. Systems
Man Cybernet. 15(4), 580-585, 1985.
Authors
S.Mohamed Mansoor Roomi received his B.E degree in Electronics and communication.
Engineering from Madurai Kamarajar University, in 1990 and the M. E (Power Systems) &
ME (Communication Systems) from Thiagarajar College of Engineering, Madurai in
1992&1997 and phd in 2009 from Madurai Kamarajar University.His primary Research
Interests include Image Enhancement and Analysis.
R.Rajashankari received her B.E degree in is in Electronics and Communication. Engineering
from Sethu Institute of Technology,Virudhunagar.She is currently doing her M.E degree in
Communication systems at Thiagarajar College of Engineering,Madurai,India Her research
interests.