This document discusses a method for removing shadows from video object planes (VOPs) and watermarking the resulting shadow-free VOP sequences. It begins with an introduction to computer vision and issues related to shadow detection. Next, it reviews previous work on shadow removal and digital watermarking. The proposed method first converts input VOPs to HSV color space and uses normalized saturation-value difference indexing to segment and remove shadows. It then embeds a watermark into the shadow-free VOP using hybrid DCT and DWT transforms before extracting the watermark using inverse transforms. The method aims to improve security over single-transform watermarking while avoiding issues like added noise in previous approaches.
Human motion is fundamental to understanding behaviour. In spite of advancement on single image 3 Dimensional pose and estimation of shapes, current video-based state of the art methods unsuccessful to produce precise and motion of natural sequences due to inefficiency of ground-truth 3 Dimensional motion data for training. Recognition of Human action for programmed video surveillance applications is an interesting but forbidding task especially if the videos are captured in an unpleasant lighting environment. It is a Spatial-temporal feature-based correlation filter, for concurrent observation and identification of numerous human actions in a little-light environment. Estimated the presentation of a proposed filter with immense experimentation on night-time action datasets. Tentative results demonstrate the potency of the merging schemes for vigorous action recognition in a significantly low light environment.
This document outlines a student project to develop a system to detect non-metallic weapons on passengers at airports using infrared light and image processing. The student aims to enhance airport security by detecting hidden plastic guns. The project proposes using a CCD sensor and infrared light to create digital images that can then be analyzed using particle analysis tools to identify threats. Initial testing showed some success in detecting plastic objects but identified challenges around orientation, lighting, and distance that need further refinement.
IRJET- A Review on Image Denoising & Dehazing Algorithm to Improve Dark Chann...IRJET Journal
This document summarizes a research paper that proposes a new approach to simultaneously dehaze and denoise images using an adaptive windows method and a new energy model. The proposed technique estimates a transmission map using the dark channel prior to reduce haze artifacts and improve estimation precision. A numerical algorithm based on Chambolle–Pock is designed to efficiently solve the new variation model and produce haze-free and noise-free images. Experimental results on real scenes demonstrate the effectiveness of the approach.
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET Journal
This document summarizes a research paper that proposes a new method for detecting human falls in videos using deep learning. The method uses a recurrent convolutional neural network (RCN) that applies convolutional neural networks (CNNs) to video segments and connects them with long short-term memory (LSTM) to model temporal relationships. It also enhances video frames using co-saliency detection to highlight important human activity regions before feeding them to the RCN. The researchers tested the method on a dataset of 768 video clips from 4 activity classes and achieved 98.12% accuracy at detecting falls, demonstrating the effectiveness of the co-saliency-enhanced RCN approach.
The document provides an introduction to computer vision. It discusses key topics including:
- What computer vision is and why it is useful. It uses mathematical and computational tools to extract information from images and improve human vision.
- Some basic concepts in computer vision including digital images, sampling, noise removal, segmentation, and feature extraction techniques.
- Where computer vision is used such as healthcare, autonomous vehicles, augmented/virtual reality, industry, social media, security, agriculture, and fashion.
- A brief history of computer vision including classical approaches and the revolution enabled by advances in artificial intelligence and deep learning.
Shadow Detection and Removal Techniques A Perspective Viewijtsrd
This document discusses techniques for shadow detection and removal in images. It provides an overview of various methods used, including those based on texture analysis, color information, Gaussian mixture models, and deterministic non-model based approaches. The document then reviews several published papers on different shadow detection and removal algorithms. These algorithms are compared based on advantages and disadvantages in terms of accuracy, computational efficiency, and applicability to different image types and conditions. The conclusion is that shadows remain a challenging problem for computer vision tasks and that the most suitable detection and removal technique depends on the specific image type and application.
The Basic Idea Behind “Smart Web Cam Motion Detection Surveillance System” Is To Stop The Intruder To Getting Into The Place Where A High End Security Is Required. This Paper Proposes A Method For Detecting The Motion Of A Particular Object Being Observed. The Motion Tracking Surveillance Has Gained A Lot Of Interests Over Past Few Years. This System Is Brought Into Effect Providing Relief To The Normal Video Surveillance System Which Offers Time-Consuming Reviewing Process. Through The Study And Evaluation Of Products, We Propose A Motion Tracking Surveillance System Consisting Of Its Method For Motion Detection And Its Own Graphic User Interface.
IRJET - Contrast and Color Improvement based Haze Removal of Underwater Image...IRJET Journal
This document proposes a method for removing haze from underwater images using fusion techniques. It involves three main steps:
1. Removal of haze from the input underwater image using a water shield filter to extract a dehazed image.
2. Denoising the dehazed image using a sequential algorithm to compensate for uneven lighting and enhance image features.
3. Fusing the dehazed and denoised images to produce a clear output image with both haze and noise removed.
The method aims to improve underwater image visibility and contrast correction in a simple and effective manner. Evaluation on sample images demonstrates reduced haze and artifacts after processing.
Human motion is fundamental to understanding behaviour. In spite of advancement on single image 3 Dimensional pose and estimation of shapes, current video-based state of the art methods unsuccessful to produce precise and motion of natural sequences due to inefficiency of ground-truth 3 Dimensional motion data for training. Recognition of Human action for programmed video surveillance applications is an interesting but forbidding task especially if the videos are captured in an unpleasant lighting environment. It is a Spatial-temporal feature-based correlation filter, for concurrent observation and identification of numerous human actions in a little-light environment. Estimated the presentation of a proposed filter with immense experimentation on night-time action datasets. Tentative results demonstrate the potency of the merging schemes for vigorous action recognition in a significantly low light environment.
This document outlines a student project to develop a system to detect non-metallic weapons on passengers at airports using infrared light and image processing. The student aims to enhance airport security by detecting hidden plastic guns. The project proposes using a CCD sensor and infrared light to create digital images that can then be analyzed using particle analysis tools to identify threats. Initial testing showed some success in detecting plastic objects but identified challenges around orientation, lighting, and distance that need further refinement.
IRJET- A Review on Image Denoising & Dehazing Algorithm to Improve Dark Chann...IRJET Journal
This document summarizes a research paper that proposes a new approach to simultaneously dehaze and denoise images using an adaptive windows method and a new energy model. The proposed technique estimates a transmission map using the dark channel prior to reduce haze artifacts and improve estimation precision. A numerical algorithm based on Chambolle–Pock is designed to efficiently solve the new variation model and produce haze-free and noise-free images. Experimental results on real scenes demonstrate the effectiveness of the approach.
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET Journal
This document summarizes a research paper that proposes a new method for detecting human falls in videos using deep learning. The method uses a recurrent convolutional neural network (RCN) that applies convolutional neural networks (CNNs) to video segments and connects them with long short-term memory (LSTM) to model temporal relationships. It also enhances video frames using co-saliency detection to highlight important human activity regions before feeding them to the RCN. The researchers tested the method on a dataset of 768 video clips from 4 activity classes and achieved 98.12% accuracy at detecting falls, demonstrating the effectiveness of the co-saliency-enhanced RCN approach.
The document provides an introduction to computer vision. It discusses key topics including:
- What computer vision is and why it is useful. It uses mathematical and computational tools to extract information from images and improve human vision.
- Some basic concepts in computer vision including digital images, sampling, noise removal, segmentation, and feature extraction techniques.
- Where computer vision is used such as healthcare, autonomous vehicles, augmented/virtual reality, industry, social media, security, agriculture, and fashion.
- A brief history of computer vision including classical approaches and the revolution enabled by advances in artificial intelligence and deep learning.
Shadow Detection and Removal Techniques A Perspective Viewijtsrd
This document discusses techniques for shadow detection and removal in images. It provides an overview of various methods used, including those based on texture analysis, color information, Gaussian mixture models, and deterministic non-model based approaches. The document then reviews several published papers on different shadow detection and removal algorithms. These algorithms are compared based on advantages and disadvantages in terms of accuracy, computational efficiency, and applicability to different image types and conditions. The conclusion is that shadows remain a challenging problem for computer vision tasks and that the most suitable detection and removal technique depends on the specific image type and application.
The Basic Idea Behind “Smart Web Cam Motion Detection Surveillance System” Is To Stop The Intruder To Getting Into The Place Where A High End Security Is Required. This Paper Proposes A Method For Detecting The Motion Of A Particular Object Being Observed. The Motion Tracking Surveillance Has Gained A Lot Of Interests Over Past Few Years. This System Is Brought Into Effect Providing Relief To The Normal Video Surveillance System Which Offers Time-Consuming Reviewing Process. Through The Study And Evaluation Of Products, We Propose A Motion Tracking Surveillance System Consisting Of Its Method For Motion Detection And Its Own Graphic User Interface.
IRJET - Contrast and Color Improvement based Haze Removal of Underwater Image...IRJET Journal
This document proposes a method for removing haze from underwater images using fusion techniques. It involves three main steps:
1. Removal of haze from the input underwater image using a water shield filter to extract a dehazed image.
2. Denoising the dehazed image using a sequential algorithm to compensate for uneven lighting and enhance image features.
3. Fusing the dehazed and denoised images to produce a clear output image with both haze and noise removed.
The method aims to improve underwater image visibility and contrast correction in a simple and effective manner. Evaluation on sample images demonstrates reduced haze and artifacts after processing.
Shadow Detection and Removal in Still Images by using Hue Properties of Color...ijsrd.com
This paper involves the review of the Shadow Detection and Removal in still images. No prior information has been used such as background images etc. for finding the shadows. It is a very challenging issue for the computer vision system that shadows effect the perception of artificial intelligence based machines in appropriately detecting the particular object as shadows also picked by them and detected as false positive objects. Also in surveillance, it affects the proper tracking of humans such as at airports. We proposed a method to remove shadows which eliminates the shadow much better than existed methods. RGB space has been used of the images and some morphological operations also applied to get better results.
Design of Shadow Detection and Removal Systemijsrd.com
Detection and removal of shadow forms a major usage in computer vision application. Presence of shadows causes object distortion. Shadow removal increases the quality of the video surveillance. Shadow detection and removal is carried out in three stages. Foreground image is detected in the first stage using frame differencing technique. Shadow part is detected in the second stage using the hue, saturation, and intensity of the moving object. Shadow removal is done in the third stage by replacing the shadow pixels with the background pixels. All the three modules are collectively implemented in Visual C++. Precision values in the range of 0.9923 to 0.9959 are obtained for different input videos.
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET Journal
This document discusses a proposed real-time video surveillance system that utilizes machine learning, computer vision, and image processing algorithms. The system aims to detect and analyze objects of interest in CCTV footage in order to identify suspicious activities and assist authorities. It employs algorithms for face detection and recognition, as well as detection of weapons and abnormal movements. The system uses frameworks like OpenCV and TensorFlow to perform tasks like facial analysis, age and gender estimation, human pose estimation, and weapon detection in real-time video streams. It analyzes existing algorithms and evaluates their suitability for the system. The results of implementing and testing various algorithms on sample footage are also presented.
IRJET- A Review on Moving Object Detection in Video Forensics IRJET Journal
This document reviews research on moving object detection in video forensics. It discusses challenges in analyzing large amounts of surveillance video data and summarizes several papers that propose methods for tasks like video synopsis, abandoned object detection, person identification, copy-move forgery detection, and assessing evidence quality. The goal is to develop techniques for efficiently analyzing video evidence and detecting anomalies or tampering.
1. The document proposes a new method for shadow detection and removal in satellite images using image segmentation, shadow feature extraction, and inner-outer outline profile line (IOOPL) matching.
2. Key steps include segmenting the image, detecting suspected shadows, eliminating false shadows through analysis of color and spatial properties, extracting shadow boundaries, and obtaining homogeneous sections through IOOPL similarity matching to determine radiation parameters for shadow removal.
3. Experimental results showed the method could successfully detect shadows and remove them to improve image quality for applications like object classification and change detection.
This document discusses a new methodology for shadow removal from images based on Strong Edge Detection (SED). The SED method recognizes strong shadow edges by analyzing image patch characteristics and features to classify shadow edges. Spatial smoothing is also used. Entropy and standard deviation results of the SED method and an earlier Patch Based Shadow Edge Detection method are calculated and compared, showing the SED method performs better with lower entropy and higher standard deviation. The SED method detects shadow edges more accurately than the previous patch-based approach.
IRJET- Identification of Missing Person in the Crowd using Pretrained Neu...IRJET Journal
The document describes a proposed system to identify missing persons in crowded areas using pretrained convolutional neural networks. The system would involve collecting images of missing persons from different angles to create a dataset for training. An AlexNet pretrained neural network would then be used to detect faces in live video captured by a drone camera of crowded areas. Detected faces would be cropped, stored in a database, and used to further train the network. During testing, the system could identify missing persons by displaying their images when detected in the crowd. The goal of the system is to help police efficiently locate missing people in crowded public settings like festivals or meetings.
IRJET-Real-Time Object Detection: A SurveyIRJET Journal
This document provides an overview of real-time object detection techniques. It discusses several challenges in detecting objects including illumination variation, moving object appearance changes, abrupt motion, occlusion, shadows, and problems related to cameras. The document then reviews several existing object detection methods and algorithms. These include techniques using color segmentation, edge tracking, shape context features, image segmentation, and support vector machines or k-nearest neighbor classifiers applied to features like GIST or SIFT. The goal of the literature review is to analyze different object recognition and segmentation approaches that could be applied for real-time object detection.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Applications of Image and Video Deduplication: A SurveyIRJET Journal
This document discusses applications of image and video deduplication techniques. It begins by providing background on the growth of multimedia data and need for deduplication to reduce redundant data. It then describes key aspects of image and video deduplication, including extracting fingerprints from images and frames to identify duplicates. The document reviews several studies on image and video deduplication applications, such as identifying near-duplicate images on social media, detecting spoofed face images, verifying image copy detection, and eliminating near-duplicates from visual sensor networks. Overall, the document surveys various real-world implementations of image and video deduplication.
Analysis of Human Behavior Based On Centroid and Treading TrackIJMER
This document discusses a video surveillance system that uses background subtraction and centroid tracking to analyze human behavior in videos. It begins with an introduction and overview of previous work on motion detection methods. It then describes the proposed system, which uses an adaptive background subtraction method to detect moving objects and extract centroid features for tracking. Experimental results show the system can detect abnormal behaviors by analyzing changes in an object's centroid movement and treading track over time. The system is able to distinguish between normal and irregular behaviors with high accuracy.
This document summarizes a survey paper on hand gesture recognition using color hex matrices and hidden Markov models. It discusses limitations of current vision-based and data glove-based recognition methods and proposes a solution using a webcam to capture hand images, convert them to RGB matrices, and recognize gestures by comparing changes in the matrices over time using hidden Markov models. The method aims to provide low-cost real-time hand gesture recognition using commonly available hardware and software.
The document summarizes a research project on single image haze removal using a variable fog-weight. It begins with an introduction on how haze degrades image quality and the need for haze removal techniques. It then discusses the motivation, literature review, objective, and main contribution of the proposed method. The method uses the dark channel prior to estimate the transmission map and atmospheric light. It then applies a variable fog-weight to modify the transmission map and reduce halo artifacts. A guided filter is used for transmission refinement before recovering the haze-free scene radiance. The method aims to improve on existing techniques by reducing time complexity and halo artifacts while enhancing image visibility.
Performance of Various Order Statistics Filters in Impulse and Mixed Noise Re...sipij
Remote sensing images (ranges from satellite to seismic) are affected by number of noises like interference, impulse and speckle noises. Image denoising is one of the traditional problems in digital image processing, which plays vital role as a pre-processing step in number of image and video applications. Image denoising still remains a challenging research area for researchers because noise
removal introduces artifacts and causes blurring of the images. This study is done with the intension of designing a best algorithm for impulsive noise reduction in an industrial environment. A review of the typical impulsive noise reduction systems which are based on order statistics are done and particularized for the described situation. Finally, computational aspects are analyzed in terms of PSNR values and some solutions are proposed.
IRJET- Removal of Rain Streaks and Shadow from an ImageIRJET Journal
This document proposes and evaluates a methodology for removing rain streaks and shadows from images. It first discusses how poor weather impacts image quality and computer vision systems. It then reviews previous methods for removing rain streaks and shadows. The proposed methodology uses a deep residual neural network to identify and remove rain streaks by decomposing the image. It detects shadows based on pixel mean values and removes them by adjusting pixel values at shadow edges. Experimental results on sample images show the method effectively removes rain streaks and shadows. The document concludes the method can be improved to handle heavier rain and complex shadows.
The document presents a project that aims to neutralize image capturing devices. It discusses detecting cameras using LEDs and image processing, then disabling the camera with a laser. The system works by identifying cameras using their CCD sensor properties when exposed to light. Images are processed to locate cameras then a laser is aimed at the camera lens to overexpose the image sensor. The document outlines the system components, working, safety measures and potential for future development.
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...csandit
Motion detection and object segmentation are an important research area of image-video
processing and computer vision. The technique and mathematical modeling used to detect and
segment region of interest (ROI) objects comprise the algorithmic modules of various high-level
techniques in video analysis, object extraction, classification, and recognition. The detection of
moving object is significant in many tasks, such as video surveillance & moving object tracking.
The design of a video surveillance system is directed on involuntary identification of events of
interest, especially on tracking and on classification of moving objects. An entropy based realtime
adaptive non-parametric window thresholding algorithm for change detection is
anticipated in this research. Based on the approximation of the value of scatter of sections of
change in a difference image, a threshold of every image block is calculated discriminatively
using entropy structure, and then the global threshold is attained by averaging all thresholds for
image blocks of the frame. The block threshold is calculated contrarily for regions of change
and background. Investigational results show the proposed thresholding algorithm
accomplishes well for change detection with high efficiency.
Preserving Global and Local Features for Robust FaceRecognition under Various...CSCJournals
The increasing use of biometric technologies in high-security applications and beyond has stressed the requirement for highly dependable face recognition systems. Much research on face recognition considering the large variations in the visual stimulus due to illumination conditions, viewing directions or poses, facial expressions, aging, and disguises such as facial hair, glasses, or cosmetics has been done earlier. However, in reality the noises that may embed into an image document during scanning, printing or image capturing process will affect the performance of face recognition algorithms. Though different filtering algorithms are available for noise reduction, applying a filtering algorithm that is sensitive to one type of noise to an image which has been degraded by another type of noise lead to unfavourable results. In turn, these conditions stress the importance of the design of robust face recognition algorithms that retain recognition rates even under noisy conditions. In reality, many face recognition algorithms exist and produce good results for noiseless environments but not with various noises. In this work, numerous experiments have been conducted to analyze the robustness of our proposed Combined Global and Local Preserving Features (CGLPF) algorithm along with other existing conventional algorithms under different types of noises such as Gaussian noise, speckle noise, salt and pepper noise and quantization noise.
The paper explores iris recognition for personal identification and verification. In this paper a new iris recognition technique is proposed using (Scale Invariant Feature Transform) SIFT. Image-processing algorithms have been validated on noised real iris image database. The proposed innovative technique is computationally effective as well as reliable in terms of recognition rates.
Analysis of lithography based approaches in development of semiconductorsijcsit
The end of the 19th century brought about a change in the dynamics of computing by the development of the
microprocessor. Huge bedroom size computers began being replaced by portable, smaller sized desktops.
Today the world is dominated by silicon, which has circumscribed chip development for computers through
microprocessors. Majority of the integrated circuits that are manufactured at present are developed using
the concept of Lithography. This paper presents a detailed analysis of multiple Lithography methodologies
as a means for advanced integrated circuit development. The study paper primarily restricts to examples in
the context of Lithography, surveying the various existing techniques of Lithography in literature,
examining feasible and efficient methods, highlighting the various pros and cons of each of them.
An Object Detection, Tracking And Parametric Classification– A ReviewIRJET Journal
This document summarizes object detection techniques for video processing. It discusses how object detection is the first and important step for any video analysis. It then reviews several approaches for object detection, including background subtraction, frame differencing, optical flow, and temporal differencing. The document also summarizes trends in object detection techniques presented in various research papers from 2009 to 2014, highlighting advantages and limitations of the different approaches.
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET Journal
This document reviews techniques for detecting objects in video surveillance systems. It discusses common object detection methods like frame differencing, optical flow, and background subtraction. Frame differencing detects motion by calculating pixel differences between frames but cannot detect still objects. Optical flow estimates pixel motion between frames to detect objects. Background subtraction models the static background and detects objects by subtracting current frames from the background model. The document analyzes these techniques and their use in video surveillance applications like traffic monitoring and security. It concludes more research is needed to improve object classification accuracy and handle challenges like camera motion.
Shadow Detection and Removal in Still Images by using Hue Properties of Color...ijsrd.com
This paper involves the review of the Shadow Detection and Removal in still images. No prior information has been used such as background images etc. for finding the shadows. It is a very challenging issue for the computer vision system that shadows effect the perception of artificial intelligence based machines in appropriately detecting the particular object as shadows also picked by them and detected as false positive objects. Also in surveillance, it affects the proper tracking of humans such as at airports. We proposed a method to remove shadows which eliminates the shadow much better than existed methods. RGB space has been used of the images and some morphological operations also applied to get better results.
Design of Shadow Detection and Removal Systemijsrd.com
Detection and removal of shadow forms a major usage in computer vision application. Presence of shadows causes object distortion. Shadow removal increases the quality of the video surveillance. Shadow detection and removal is carried out in three stages. Foreground image is detected in the first stage using frame differencing technique. Shadow part is detected in the second stage using the hue, saturation, and intensity of the moving object. Shadow removal is done in the third stage by replacing the shadow pixels with the background pixels. All the three modules are collectively implemented in Visual C++. Precision values in the range of 0.9923 to 0.9959 are obtained for different input videos.
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET Journal
This document discusses a proposed real-time video surveillance system that utilizes machine learning, computer vision, and image processing algorithms. The system aims to detect and analyze objects of interest in CCTV footage in order to identify suspicious activities and assist authorities. It employs algorithms for face detection and recognition, as well as detection of weapons and abnormal movements. The system uses frameworks like OpenCV and TensorFlow to perform tasks like facial analysis, age and gender estimation, human pose estimation, and weapon detection in real-time video streams. It analyzes existing algorithms and evaluates their suitability for the system. The results of implementing and testing various algorithms on sample footage are also presented.
IRJET- A Review on Moving Object Detection in Video Forensics IRJET Journal
This document reviews research on moving object detection in video forensics. It discusses challenges in analyzing large amounts of surveillance video data and summarizes several papers that propose methods for tasks like video synopsis, abandoned object detection, person identification, copy-move forgery detection, and assessing evidence quality. The goal is to develop techniques for efficiently analyzing video evidence and detecting anomalies or tampering.
1. The document proposes a new method for shadow detection and removal in satellite images using image segmentation, shadow feature extraction, and inner-outer outline profile line (IOOPL) matching.
2. Key steps include segmenting the image, detecting suspected shadows, eliminating false shadows through analysis of color and spatial properties, extracting shadow boundaries, and obtaining homogeneous sections through IOOPL similarity matching to determine radiation parameters for shadow removal.
3. Experimental results showed the method could successfully detect shadows and remove them to improve image quality for applications like object classification and change detection.
This document discusses a new methodology for shadow removal from images based on Strong Edge Detection (SED). The SED method recognizes strong shadow edges by analyzing image patch characteristics and features to classify shadow edges. Spatial smoothing is also used. Entropy and standard deviation results of the SED method and an earlier Patch Based Shadow Edge Detection method are calculated and compared, showing the SED method performs better with lower entropy and higher standard deviation. The SED method detects shadow edges more accurately than the previous patch-based approach.
IRJET- Identification of Missing Person in the Crowd using Pretrained Neu...IRJET Journal
The document describes a proposed system to identify missing persons in crowded areas using pretrained convolutional neural networks. The system would involve collecting images of missing persons from different angles to create a dataset for training. An AlexNet pretrained neural network would then be used to detect faces in live video captured by a drone camera of crowded areas. Detected faces would be cropped, stored in a database, and used to further train the network. During testing, the system could identify missing persons by displaying their images when detected in the crowd. The goal of the system is to help police efficiently locate missing people in crowded public settings like festivals or meetings.
IRJET-Real-Time Object Detection: A SurveyIRJET Journal
This document provides an overview of real-time object detection techniques. It discusses several challenges in detecting objects including illumination variation, moving object appearance changes, abrupt motion, occlusion, shadows, and problems related to cameras. The document then reviews several existing object detection methods and algorithms. These include techniques using color segmentation, edge tracking, shape context features, image segmentation, and support vector machines or k-nearest neighbor classifiers applied to features like GIST or SIFT. The goal of the literature review is to analyze different object recognition and segmentation approaches that could be applied for real-time object detection.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Applications of Image and Video Deduplication: A SurveyIRJET Journal
This document discusses applications of image and video deduplication techniques. It begins by providing background on the growth of multimedia data and need for deduplication to reduce redundant data. It then describes key aspects of image and video deduplication, including extracting fingerprints from images and frames to identify duplicates. The document reviews several studies on image and video deduplication applications, such as identifying near-duplicate images on social media, detecting spoofed face images, verifying image copy detection, and eliminating near-duplicates from visual sensor networks. Overall, the document surveys various real-world implementations of image and video deduplication.
Analysis of Human Behavior Based On Centroid and Treading TrackIJMER
This document discusses a video surveillance system that uses background subtraction and centroid tracking to analyze human behavior in videos. It begins with an introduction and overview of previous work on motion detection methods. It then describes the proposed system, which uses an adaptive background subtraction method to detect moving objects and extract centroid features for tracking. Experimental results show the system can detect abnormal behaviors by analyzing changes in an object's centroid movement and treading track over time. The system is able to distinguish between normal and irregular behaviors with high accuracy.
This document summarizes a survey paper on hand gesture recognition using color hex matrices and hidden Markov models. It discusses limitations of current vision-based and data glove-based recognition methods and proposes a solution using a webcam to capture hand images, convert them to RGB matrices, and recognize gestures by comparing changes in the matrices over time using hidden Markov models. The method aims to provide low-cost real-time hand gesture recognition using commonly available hardware and software.
The document summarizes a research project on single image haze removal using a variable fog-weight. It begins with an introduction on how haze degrades image quality and the need for haze removal techniques. It then discusses the motivation, literature review, objective, and main contribution of the proposed method. The method uses the dark channel prior to estimate the transmission map and atmospheric light. It then applies a variable fog-weight to modify the transmission map and reduce halo artifacts. A guided filter is used for transmission refinement before recovering the haze-free scene radiance. The method aims to improve on existing techniques by reducing time complexity and halo artifacts while enhancing image visibility.
Performance of Various Order Statistics Filters in Impulse and Mixed Noise Re...sipij
Remote sensing images (ranges from satellite to seismic) are affected by number of noises like interference, impulse and speckle noises. Image denoising is one of the traditional problems in digital image processing, which plays vital role as a pre-processing step in number of image and video applications. Image denoising still remains a challenging research area for researchers because noise
removal introduces artifacts and causes blurring of the images. This study is done with the intension of designing a best algorithm for impulsive noise reduction in an industrial environment. A review of the typical impulsive noise reduction systems which are based on order statistics are done and particularized for the described situation. Finally, computational aspects are analyzed in terms of PSNR values and some solutions are proposed.
IRJET- Removal of Rain Streaks and Shadow from an ImageIRJET Journal
This document proposes and evaluates a methodology for removing rain streaks and shadows from images. It first discusses how poor weather impacts image quality and computer vision systems. It then reviews previous methods for removing rain streaks and shadows. The proposed methodology uses a deep residual neural network to identify and remove rain streaks by decomposing the image. It detects shadows based on pixel mean values and removes them by adjusting pixel values at shadow edges. Experimental results on sample images show the method effectively removes rain streaks and shadows. The document concludes the method can be improved to handle heavier rain and complex shadows.
The document presents a project that aims to neutralize image capturing devices. It discusses detecting cameras using LEDs and image processing, then disabling the camera with a laser. The system works by identifying cameras using their CCD sensor properties when exposed to light. Images are processed to locate cameras then a laser is aimed at the camera lens to overexpose the image sensor. The document outlines the system components, working, safety measures and potential for future development.
VIDEO SEGMENTATION FOR MOVING OBJECT DETECTION USING LOCAL CHANGE & ENTROPY B...csandit
Motion detection and object segmentation are an important research area of image-video
processing and computer vision. The technique and mathematical modeling used to detect and
segment region of interest (ROI) objects comprise the algorithmic modules of various high-level
techniques in video analysis, object extraction, classification, and recognition. The detection of
moving object is significant in many tasks, such as video surveillance & moving object tracking.
The design of a video surveillance system is directed on involuntary identification of events of
interest, especially on tracking and on classification of moving objects. An entropy based realtime
adaptive non-parametric window thresholding algorithm for change detection is
anticipated in this research. Based on the approximation of the value of scatter of sections of
change in a difference image, a threshold of every image block is calculated discriminatively
using entropy structure, and then the global threshold is attained by averaging all thresholds for
image blocks of the frame. The block threshold is calculated contrarily for regions of change
and background. Investigational results show the proposed thresholding algorithm
accomplishes well for change detection with high efficiency.
Preserving Global and Local Features for Robust FaceRecognition under Various...CSCJournals
The increasing use of biometric technologies in high-security applications and beyond has stressed the requirement for highly dependable face recognition systems. Much research on face recognition considering the large variations in the visual stimulus due to illumination conditions, viewing directions or poses, facial expressions, aging, and disguises such as facial hair, glasses, or cosmetics has been done earlier. However, in reality the noises that may embed into an image document during scanning, printing or image capturing process will affect the performance of face recognition algorithms. Though different filtering algorithms are available for noise reduction, applying a filtering algorithm that is sensitive to one type of noise to an image which has been degraded by another type of noise lead to unfavourable results. In turn, these conditions stress the importance of the design of robust face recognition algorithms that retain recognition rates even under noisy conditions. In reality, many face recognition algorithms exist and produce good results for noiseless environments but not with various noises. In this work, numerous experiments have been conducted to analyze the robustness of our proposed Combined Global and Local Preserving Features (CGLPF) algorithm along with other existing conventional algorithms under different types of noises such as Gaussian noise, speckle noise, salt and pepper noise and quantization noise.
The paper explores iris recognition for personal identification and verification. In this paper a new iris recognition technique is proposed using (Scale Invariant Feature Transform) SIFT. Image-processing algorithms have been validated on noised real iris image database. The proposed innovative technique is computationally effective as well as reliable in terms of recognition rates.
Analysis of lithography based approaches in development of semiconductorsijcsit
The end of the 19th century brought about a change in the dynamics of computing by the development of the
microprocessor. Huge bedroom size computers began being replaced by portable, smaller sized desktops.
Today the world is dominated by silicon, which has circumscribed chip development for computers through
microprocessors. Majority of the integrated circuits that are manufactured at present are developed using
the concept of Lithography. This paper presents a detailed analysis of multiple Lithography methodologies
as a means for advanced integrated circuit development. The study paper primarily restricts to examples in
the context of Lithography, surveying the various existing techniques of Lithography in literature,
examining feasible and efficient methods, highlighting the various pros and cons of each of them.
An Object Detection, Tracking And Parametric Classification– A ReviewIRJET Journal
This document summarizes object detection techniques for video processing. It discusses how object detection is the first and important step for any video analysis. It then reviews several approaches for object detection, including background subtraction, frame differencing, optical flow, and temporal differencing. The document also summarizes trends in object detection techniques presented in various research papers from 2009 to 2014, highlighting advantages and limitations of the different approaches.
IRJET- A Review Analysis to Detect an Object in Video Surveillance SystemIRJET Journal
This document reviews techniques for detecting objects in video surveillance systems. It discusses common object detection methods like frame differencing, optical flow, and background subtraction. Frame differencing detects motion by calculating pixel differences between frames but cannot detect still objects. Optical flow estimates pixel motion between frames to detect objects. Background subtraction models the static background and detects objects by subtracting current frames from the background model. The document analyzes these techniques and their use in video surveillance applications like traffic monitoring and security. It concludes more research is needed to improve object classification accuracy and handle challenges like camera motion.
In today's competitive environment, the security concerns have grown tremendously. In the modern world, possession is known to be 9/10'ths of the law. Hence, it is imperative for one to be able to safeguard one's property from worldly harms such as thefts, destruction of property, people with malicious intent etc. Due to the advent of technology in the modern world, the methodologies used by thieves and robbers for stealing has been improving exponentially. Therefore, it is necessary for the surveillance techniques to also improve with the changing world. With the improvement in mass media and various forms of communication, it is now possible to monitor and control the environment to the advantage of the owners of the property
IRJET- Real Time Video Object Tracking using Motion EstimationIRJET Journal
The document discusses real time video object tracking using motion estimation techniques. It describes using background subtraction, thresholding, background estimation and optical flow to detect and track moving objects in video frames. Morphological operations like dilation and erosion are used for smoothing detected object regions. Dynamic thresholding and mathematical morphology help attenuate color variations from background motions while highlighting moving objects. The algorithm marks pixels as foreground if above a threshold and performs closing and removes small regions. Background is updated adaptively to prevent detection of artificial tails behind moving objects. Correlation of frames improves detection of multiple moving objects with significant contrast changes, even with poor lighting conditions.
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...IRJET Journal
This document describes a proposed system to assist visually impaired individuals using object detection. The system uses YOLO (You Only Look Once) deep learning for fast and reliable object detection in images captured by a webcam in real-time. Detected objects are identified and conveyed to the user via text-to-speech. This allows visually impaired users to navigate indoor and outdoor environments with information about surrounding objects. The proposed system aims to address challenges faced by existing assistive technologies through improved accuracy and real-time performance of object recognition compared to other methods.
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
One of the biggest and important issues in the video watermarking is the distortion and attacks. The attacks and distortion affect the digital watermarking. Watermarking is an embedding process. With the help of watermarking, we insert the data into the digital objects. There are few methods are available for authentication of data, securing/protection of data. The watermarking technique also provides the data security, copyright protection and authentication of the data. Watermarking provides a comfortable life to authorized users. In my proposed work, we are working on distorted watermarked video. The distortion is present on the watermarked video is rational 7 th and 8 th order distortion model. In this paper, firstly we are embedding the watermark information into the original video and after that work on the distortion model which may be come into the watermarked video. We are also calculating the PSNR (Peak signal to noise ratio), SSIM (Structural similarity index measure), Correlation, BER (Bit Error Rate) and MSE (Mean Square Error) parameters for distorted watermarked video. We are showing the relationship between correlation and SSIM with BER, MSE and PSNR.
IRJET- Object Detection and Recognition for Blind AssistanceIRJET Journal
1. The document proposes a system using object and color recognition and convolutional neural networks to enhance the capabilities of visually impaired people.
2. The system uses a camera mounted on glasses to capture images which are then preprocessed, compressed, and used to train a classifier model to recognize common objects.
3. The proposed hardware implementation uses a Raspberry Pi for its small size and open source software support, including TensorFlow for training convolutional neural network models.
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...IRJET Journal
This document summarizes a research paper that proposes a new method for detecting moving objects in videos using foreground detection and background subtraction. The key steps of the proposed method include initializing a background model using the median of initial frames, dynamically updating the background model to adapt to lighting changes, subtracting the background model from current frames and applying a threshold to detect moving objects, and using morphological operations and projection analysis to extract human bodies and remove noise. The experimental results showed that the proposed method can accurately and reliably detect moving human bodies in real-time video surveillance.
Overview Of Video Object Tracking SystemEditor IJMTER
The goal of video object tracking system is segmenting a region of interest from a video
scene and keeping track of its motion, positioning and occlusion. There are the three steps of video
object tracking system those are object detection, object classification and object tracking. Object
detection is performed to check existence of objects in video. Then the detected object can be
classified in various categories on the basis on their shape, motion, color and texture. Object tracking
is performed using monitoring object changes. This paper we are going to take overview of different
object detection, object classification and object tracking techniques and also the comparison of
different techniques used for various stages of tracking.
Real Time Detection of Moving Object Based on Fpgaiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1. The document describes a method for real-time detection of moving objects based on background subtraction and its implementation on an FPGA. A static camera is used to capture video frames. The first frame is used as the reference background frame. Pixels in subsequent frames are compared to the background frame and objects are detected where pixel differences exceed a threshold.
2. The method was tested on sample surveillance videos. Background subtraction accurately detected moving objects in test videos in real-time. Future work may include identifying objects using face or palm recognition and activity recognition for visual surveillance applications.
Real Time Moving Object Detection for Day-Night Surveillance using AIIRJET Journal
This document presents a project to develop a web application for real-time moving object detection for both day and night surveillance using artificial intelligence. The application can detect objects in images, videos, and real-time video streams from a user's device. It implements computer vision techniques using OpenCV for image processing. A YOLOv4 deep learning model is trained on a dataset containing dark images to enable nighttime object detection. The trained model is deployed as a web app using Streamlit and hosted on Heroku to be accessible across different devices and operating systems. The project aims to provide a solution for various object detection and image processing tasks.
This document discusses object detection techniques for images. It begins with an introduction to image processing and object detection. Object detection aims to find instances of real-world objects in images and is used in applications like surveillance and automotive safety. The document then reviews several papers on related topics, including object removal from videos, visual surveillance systems for tracking targets, and augmented reality object compositing. It proposes using skull detection and region growing techniques to detect particular objects while removing shadows and other background objects for improved detection. Region growing would detect the object, while skull detection removes it from the image to analyze the object separately. In summary, the document reviews object detection methods and proposes a hybrid approach using skull detection and region growing.
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...sipij
Object tracking can be defined as the process of detecting an object of interest from a video scene and
keeping track of its motion, orientation, occlusion etc. in order to extract useful information. It is indeed a
challenging problem and it’s an important task. Many researchers are getting attracted in the field of
computer vision, specifically the field of object tracking in video surveillance. The main purpose of this
paper is to give to the reader information of the present state of the art object tracking, together with
presenting steps involved in Background Subtraction and their techniques. In related literature we found
three main methods of object tracking: the first method is the optical flow; the second is related to the
background subtraction, which is divided into two types presented in this paper, then the temporal
differencing and the SIFT method and the last one is the mean shift method. We present a novel approach
to background subtraction that compare a current frame with the background model that we have set
before, so we can classified each pixel of the image as a foreground or a background element, then comes
the tracking step to present our object of interest, which is a person, by his centroid. The tracking step is
divided into two different methods, the surface method and the K-NN method, both are explained in the
paper. Our proposed method is implemented and evaluated using CAVIAR database.
Intelligent Video Surveillance System using Deep LearningIRJET Journal
This document discusses an intelligent video surveillance system using deep learning. It proposes a framework that first detects abnormal human activity in video streams using an effective CNN model. It then tracks detected individuals throughout the video using an ultra-fast object tracker. Feature extraction is performed on consecutive frames using a CNN, and a deep learning model is trained to recognize and detect activities based on temporal changes in frames. The system aims to allow for quick abnormal activity detection with low computational complexity compared to other methods.
IRJET- Application of MCNN in Object DetectionIRJET Journal
This document discusses using a multi-column convolutional neural network (MCNN) for object detection in videos. The MCNN approach is compared to other methods like CNN and HOG-BOW-Gray pooling and is shown to achieve over 95% accuracy for pedestrian detection. The document outlines extracting frames from videos, dividing images into regions, classifying regions using CNNs, and combining results to detect objects. The MCNN approach is concluded to be useful for applications like medical imaging due to its high detection accuracy.
In today's competitive environment, the security concerns have grown tremendously. In the modern world, possession is known to be 9/10'ths of the law. Hence, it is imperative for one to be able to safeguard one's property from worldly harms such as thefts, destruction of property, people with malicious intent etc. Due to the advent of technology in the modern world, the methodologies used by thieves and robbers for stealing has been improving exponentially. Therefore, it is necessary for the surveillance techniques to also improve with the changing world. With the improvement in mass media and various forms of communication, it is now possible to monitor and control the environment to the advantage of the owners of the property
IRJET- Moving Object Detection with Shadow Compression using Foreground Segme...IRJET Journal
The document describes a study that investigates using foreground segmentation to extract moving objects from videos by detecting differences between frames, with the goal of tracking silhouettes of moving objects to create an interactive video display. The researchers propose using a statistical approach to segment foreground objects and apply filtering techniques to reduce noise from the extracted shadows. The results indicate the extraction process accurately tracks motion and outlines of foreground objects between frames.
IRJET - Direct Me-Nevigation for Blind PeopleIRJET Journal
This document describes a system for direct navigation assistance for blind people using object detection and audio cues. It uses a convolutional neural network model called You Only Look Once (YOLO) to perform real-time object detection on camera images and then describes the detected objects and their locations to the blind user using 3D spatialized sound. The system aims to allow blind users to independently navigate environments by audibly identifying surrounding objects. It analyzes previous works on sensory substitution and assistive technologies for the blind, as well as research on using 3D sound for navigation assistance. The document outlines the object detection methods used, including YOLO and anchor boxes to improve accuracy at detecting multiple objects within each image grid.
This document discusses the development of a face mask detection system using YOLOv4. The system uses a deep learning model with YOLOv4 to detect faces in real-time video and determine if each person is wearing a mask or not. It is trained on images of faces with and without masks. The model uses CSPDarknet53 as the backbone network and PANet for feature aggregation. It is implemented with OpenCV and a Python GUI for a user interface. The goal is to help enforce mask mandates and alert authorities if too many people in an area are not wearing masks.
This document proposes methods for generating electricity from speed breakers. It discusses 5 classifications of speed breaker power generators that use different mechanisms: 1) a chain drive mechanism, 2) a rack and pinion system, 3) direct use of the load through a reciprocating device, 4) a translator and stator topology, and 5) a pressure lever mechanism. The document also outlines the advantages of using speed breakers for power generation such as low cost and maintenance and being a renewable source. Some challenges are also noted such as selecting a suitable generator and dealing with rain damage.
Cassava waste water was used as an admixture to replace distilled water in ratios of 5%, 10%, 15%, and 20% for producing sandcrete blocks. 60 sandcrete blocks of size 450mm x 150mm x 225mm were produced with different admixture ratios and a control with 0% admixture. The blocks were cured for 7, 14, 21, and 28 days and then tested for moisture content, specific gravity, water absorption, and compressive strength. Test results showed that blocks with 20% cassava waste water admixture met the minimum compressive strength requirement of 3.30 N/mm2 set by Nigerian standards, indicating the potential of cassava waste water to improve sandcrete block quality and
The document presents a theorem on random fixed points in metric spaces. It begins with introductions to fixed point theory, random fixed point theory, and relevant definitions. The main result is Theorem 3.1, which proves that if a self-mapping E on a complete metric space X satisfies certain contraction conditions involving parameters between 0 and 1, then E has a unique fixed point. The proof constructs a Cauchy sequence that converges to the unique fixed point. The document contributes to the study of random equations and random fixed point theory, which has applications in nonlinear analysis, probability theory, and other fields.
1. The document discusses applying multi-curve reconstruction technology to seismic inversion to improve accuracy and reliability. It focuses on reconstructing SP and RMN curves from well logs that are affected by various distortions.
2. The process of reconstructing the curves involves removing baseline drift, standardizing values, applying linear filtering, and fitting the curves. This removes interference and retains valid lithological information.
3. Reconstructing high quality curves improves the resolution and credibility of seismic inversion results. The method is shown to effectively predict sand distribution with little error.
This document compares the performance of a Minimum-Mean-Square-Error (MMSE) adaptive receiver and a conventional Rake receiver for receiving Ultra-Wideband (UWB) signals over a multipath fading channel. It first describes the UWB pulse shapes and channel model used, including the 6th derivative of the Gaussian pulse and the IEEE 802.15.3a modified Saleh-Valenzuela channel model. It then discusses the Direct-Sequence and Time-Hopping transmission and multiple access schemes for UWB. The document presents the receiver structures for the MMSE adaptive receiver and Rake receiver and compares their performance using MATLAB simulations.
This document summarizes a study on establishing logging interpretation models for reservoir parameters like porosity, permeability, oil saturation, and gas saturation in the Gaotaizi Reservoir of the L Oilfield. Models were developed using core data from 4 wells and include:
1) A porosity model relating acoustic travel time to porosity with an error of 0.92%
2) A permeability model relating permeability to porosity with an error of 0.31%
3) An oil saturation model using resistivity data with empirically determined parameters
4) A method to determine original gas saturation from mercury injection data.
Application of the models improved interpretation precision and allowed recalculation of oil and gas reserves for the
This document discusses predicting spam videos on social media platforms using machine learning. It proposes using attributes like number of likes, comments, and view count to classify videos as spam or not spam. A predictive algorithm is developed that uses threshold values for attributes and natural language processing of comments to classify videos. Testing of the algorithm on a dataset achieved a spam prediction precision of 93.6%. Issues with small datasets decreasing accuracy are also discussed, along with continuing work to address this issue.
1) The study experimentally evaluated the compatibility relationship between polymer solutions and oil layers through core flooding tests with different permeability cores.
2) The results showed that injection rate decreased with increasing polymer concentration and molecular weight, and increased with permeability.
3) Based on the results, boundaries for injection capability were established and a compatibility chart was proposed to guide polymer solution selection for different sedimentary microfacies in the field based on permeability and pore size.
1. The document discusses the identification of lithologic traps in the D3 Member of the Gaonan Region using seismic attribute analysis, acoustic impedance inversion, and sedimentary microfacies analysis.
2. Several lithologic traps were identified in the I and II oil groups of the D3 Member, with the largest trap located between wells G46 and G146X1 covering an area of about 2.35 km2.
3. Impedance inversion, seismic attribute analysis, and sedimentary microfacies characterization using 3D seismic data helped determine the location and development of effective lithologic traps in the thin sandstone-shale interbeds of the target stratum.
This document examines using coal ash as a partial replacement for cement in concrete. Coal ash was substituted for cement at rates of 5%, 10%, and 15% by weight. Testing found that concrete with a 5% substitution of coal ash exhibited only a slight decrease in compressive strength of 2% at 28 days while gaining improved workability. Higher substitution rates of 10% and 15% coal ash led to greater decreases in compressive and tensile strength. The study concludes that a 5% substitution of coal ash for cement provides benefits of reduced cost and improved workability with minimal strength impacts, representing an effective use of a waste material that addresses sustainability.
Accounting professional judgment involves handling accounting events and compiling financial reports according to regulations and standards. However, professional judgment is sometimes manipulated to distort accounting information. The document discusses three ways manipulation occurs: 1) abandoning accounting principles, 2) optional changes to accounting policies, and 3) abuse of accounting estimates. The causes of manipulation include distorted motivations from corporate governance issues and catering to various stakeholder interests. Strengthening supervision and improving the accounting system are proposed to manage manipulation of professional judgment.
The document discusses research on the distribution of oil and water in the eastern block of the Chao202-2 area in China. It establishes standards for identifying oil, poor oil, dry, and water layers using well logging data. Analysis shows structural reservoirs are dominant and fault and sand body configuration control oil-water distribution. Oil-water distribution varies between fault blocks from "up oil, bottom water" to "up water, bottom oil" depending on structure and sand body development.
The document describes an intelligent fault diagnosis system for reciprocating pumps that uses pressure and flow signals as inputs. It consists of hardware for data acquisition and a software system for signal processing, feature extraction, and fault diagnosis using wavelet neural networks. The system was able to accurately diagnose three main fault types - seal ring faults, valve damage, and spring faults - based on differences observed in the pressure curves. Testing on over 12 samples of each fault type achieved a correct diagnosis rate of over 94%. The system provides a fast and effective means of remotely monitoring reciprocating pumps and identifying faults.
This document discusses the application of meta-learning algorithms in banking sector data mining for fraud detection. It proposes using Classification and Regression Tree (CART), AdaBoost, LogitBoost, Bagging and Dagging algorithms for classification of banking transaction data. The experimental results show that Bagging algorithm has the best performance with the lowest misclassification rate, making it effective for banking fraud detection through data mining. Data mining can help banks detect patterns for applications like credit scoring, payment default prediction, fraud detection and risk management by analyzing customer transaction history and loan details.
This document presents a numerical solution for unsteady heat and mass transfer flow past an infinite vertical plate with variable thermal conductivity, taking into account Dufour number and heat source effects. The governing equations are non-linear and coupled, and were solved numerically using an implicit finite difference scheme. Various parameters, including Dufour number and heat source, were found to influence the velocity, temperature, and concentration profiles. Skin friction, Nusselt number, and Sherwood number were also calculated.
The document discusses methods for obtaining a background image using depth information from a depth camera to more accurately extract foreground objects. It finds that accumulating depth images and taking the median value at each pixel provides the most accurate background image. The accuracy of three methods - average, median, and mode - are evaluated using simulated depth data of a captured plane. The median method provides the best results, followed by average, while mode performs worst. More accumulated images provide a more accurate background image across all methods.
This document presents a mathematical model for determining the minimum overtaking sight distance (OSDm) required for an ascending vehicle to safely pass another slower vehicle on a single lane highway with an incline. It defines sight distance, stopping sight distance, perception-reaction time and derives equations to calculate the reaction distance (d1), overtaking distance (d2), vehicle travel distance during overtaking (d3), and total minimum OSDm based on vehicle characteristics, road geometry, and coefficients of friction. The safe overtaking zone is defined as 3 times the minimum OSDm. The model accounts for effects of slope angle and aims to satisfy laws of mechanics for overtaking maneuvers on inclined two-way single lane highways.
This document discusses a novel technique for better analysis of ice properties using Kalman filtering. It summarizes previous research on sea ice segmentation using SAR imagery and dual polarization techniques. It proposes using an automated SAR algorithm along with Kalman filtering to more accurately detect sea ice properties from RADARSAT1 and RADARSAT2 imagery data. The document reviews techniques for image segmentation, dual polarization, PMA detection, and related work on sea ice classification using statistical ice properties, edge preserving region models, and object extraction methods.
This document summarizes a study on the bioaccumulation of heavy metals in bass fish (Morone Saxatilis) caught at Rodoni Cape in the Adriatic Sea in Albania. Samples of bass fish were collected from five sites and analyzed for mercury, lead, and cadmium levels in their muscles. The concentrations of heavy metals varied between fish and sites but were below international limits for human consumption. While the fish were found to be safe for eating, the study recommends continuous monitoring of metal levels in fish from the area due to various factors that can influence metal uptake over time.
This document discusses optimal maintenance policies for repairable systems with linearly increasing hazard rates. It considers a system with a constant repair rate and predetermined availability requirement. There are two maintenance policies: corrective maintenance only, and preventive maintenance at set time intervals. The goal is to determine the preventive maintenance interval that guarantees the availability requirement at minimum cost. Equations are developed to calculate the availability under each policy and the optimal preventive maintenance interval based on both availability and cost. A numerical example is provided to demonstrate the decision process in determining the optimal policy.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 2250-3021, ISSN (p): 2278-8719
Vol. 04, Issue 06 (June. 2014), ||V1|| PP 30-40
International organization of Scientific Research 30 | P a g e
Watermarked Shadow Free Vop Sequences Using Hybrid
Transforms
T. Vishnu Priya1
, K. Gopi Suresh2
, CH.Sandeep3
, V. Siva Sai Kumar4
, S. Rizwaan5
1
(Asst. Professor in E.C.E dept, S.R.K.I.T/ JNTUK, INDIA)
2
(E.C.E, S.R.K.I.T/ Jntuk, India) 3
(E.C.E, S.R.K.I.T/ Jntuk, India)
4
(E.C.E, S.R.K.I.T/ Jntuk, India) 5
(E.C.E, S.R.K.I.T/ Jntuk, India)
Abstract: - Today, detection and tracking is vital to many applications dealing with image sequences such as
video surveillance like military, defense systems, law enforcements and cryptography. In object based coding,
video frames are defined in terms of layers of Video Object Planes(VOP).With the development of modern
technology more attention has been shifted towards spatial resolution for object recognition, mapping and image
capabilities. Unexpected shadows effect its resolution. Removal of shadow from VOP’s will assist the
applications for comprehensive detection of activities. While transmitting video through unstructured network
makes it vulnerable to many attacks. In order to protect the video content from attacks, digital watermarking is
necessary. In this project, we implement to achieve an efficient algorithm for the watermarked VOP sequences
by applying hybrid transformation techniques.
Keywords – Cryptography, Hybrid transformation, shadow, spatial resolution, VOP
I. INTRODUCTION
Computer Vision is concerned with the theory of building artificial systems that obtain information
from images. The image data can have many forms such as video sequence, views from multiple cameras or
multi-dimensional data from a medical scanner. There are many characteristics of computer vision which are
considered to be relevant that are image processing/image analysis. These processes focused on 2D images and
their transformations. Imaging which focuses on producing 2D & 3D images. Machine vision focuses on
manufacturing applications and Pattern Recognition. Typical tasks of computer vision are image recognition,
motion, scene reconstruction, image restoration, image acquisition, pre-processing, feature extraction, detection
and high-level processing. Organization of computer vision systems is application dependent. Video
Surveillance is an important application of Computer Vision for an organization, from the security point of
view. This is one application where an automated system can replace human beings. Detection and tracking is
vital to many applications dealing with image sequences such as video surveillance like military, defense
systems, law enforcements and cryptography. However, an unexpected shadow causes difficulties such as object
merging, shape distortion and even loss of object [1].A shadow occurs when an object partially or totally
occludes direct light from a source of illumination. In general, shadows can be divided into two major classes:
self shadows and cast shadows. A self shadow occurs in the portion of an object which is not illuminated by
direct light. A cast shadow is the area projected by the object in the direction of direct light. Cast shadows can
be further classified into umbra and penumbra region, which is a result of multi-lighting and self shadows also
have many sub-regions such as shading and inter reflection. Usually, the self shadows are vague shadows and do
not have clear boundaries. On the other hand, cast shadows are hard shadows and always have a violent contrast
to background. The difficulties in shadow detection arise because of two important visual features. First, since
shadows typically differ from background, shadow points are detected as foreground objects. Second, shadows
move in same motion as their objects casting them [1]. For these reasons, shadow detection and removal in
images/videos is serious problem and has become an active research area. Any foreground object segmented out
from a video which have a semantic meaning is called Video Object plane (VOP). An innate problem of VOP
generation is that objects of interest are not homogeneous with respect to low level features such as color,
intensity, texture and optical flow. Hence, conventional low-level segmentation algorithms will fail to extract
required meaningful partitions. Hence automatic segmentation of VOPs is active research topic which has lot of
challenging problems like shape changing, rotations, intra object motion, rigid parts, cluttered background,
moving background and eliminating shadows etc., Nowadays, most of the data is saved in digital format. The
advantage of saving the data in digital format is easy for creation, modification and distribution. The rise of
Internet usage over the past few years has produced a diverse range of dynamic and highly interactive
environment for this digital information exchange. However, the efficiency of information exchange and
manipulation results the issue of copyright protection become increasingly significant. The possibility of
2. Watermarked Shadow Free Vop Sequences Using Hybrid Transforms
International organization of Scientific Research 31 | P a g e
unlimited copying of digital media without any loss of quality may cause the media producers and content
providers a considerable financial loss. In order to protect the owner’s copyright on their media watermarking
technique was introduced. Watermarking is a technique of data hiding which embeds data into a digital signal.
The new technology of digital watermarking has been advocated by many specialists as the best method to such
multimedia copyright protection problems. It’s expected that digital watermarking will have a wide span of
above mentioned applications. The digital watermarking method to be effective it should be imperceptible and
robust to common image manipulations like compression and other digital signal processing operations. In this
project, we implemented automatic shadow removal algorithm in the first step, digital image watermarking
algorithm based on Hybrid transforms in the next step and then extract the digital watermark by applying
inverse of the above transform in the last step.
II. REVIEW OF THE PROJECT
Different Case Studies in Previous Work:
Case 1: Initially 5 percent noise level is added to the input VOP to obtain noisy VOP. The added noise is
removed by applying CMF filter. Shadow has been removed from the VOP with their proposed algorithm.
Watermark is added to the resultant VOP. The watermark is extracted from the VOP. To know the effect,
quality checking metrics have been used i.e. PSNR value.
Case 2: In the second test case, noise is added to input VOP and it is removed prior to shadow elimination.
After elimination of shadow watermarking is done and next water mark is extracted.
Case 3: In this test case, initially shadow has been eliminated from the input VOP. Addition of noise and
reduction of noise is performed in subsequent steps. A watermark is added to the resultant VOP and next water
mark is extracted.
Case 4: Initially, shadow is eliminated from the input VOP. The resultant shadow eliminated VOP, 5 percent
level of noise is added which is then reduced. For authentication, a watermark is embedded into the resultant
VOP and extracted.
Case 5: The experimental setup of test case 4 is similar to setup of test case5. Some modules have been
interchanged to have complete view of results of different tests. Initially, shadow is eliminated from input VOP.
A watermark is embedded by using DWT watermarking for authentication. To study noise effect, some noise is
inserted which is then tried to reduce by applying noise removal smoothing filter on the resultant VOP. The
watermarks are extracted then to discover the distortion occurred to them.
The above cases does not yield better results so we proposed a method in which noise is not added and
removed, In the watermarking we use hybrid Transforms instead of applying single transform i.e. either DCT or
DWT. Due to this more security is available.
Proposed Method:
The block diagram of proposed method as shown below
Fig.1: Block Diagram of Proposed Method
III. SHADOW REMOVAL
Shadow:
A shadow is an area where direct light from a light source cannot reach due to obstruction by an object.
It occupies all of the space behind an opaque object with light in front of it. The cross-section of a shadow is a
two-dimensional silhouette or reverses projection of the object blocking the light. Sunlight causes many objects
to have shadows at certain times of the day. The angle of the sun and its apparent height in the sky causes a
change in the length of shadows. Low-angles create longer shadows.
Shadow occurs when object partially or totally occludes light from light source. Shadow in image
reduces the reliability of many computer vision algorithms and often degrades the visual quality of images
that we cannot recognize the original image of a particular object. Shadows are basically classified into two
types namely 1) Static shadows 2) Moving shadows. In Static shadows the VOP sequences are stationary with
respect to that of the object under observation. Moving shadows indicates shadows motion with respect to the
object that is moving. It is easy to eliminate static shadow by background subtraction method but the moving
shadow is moving with the movement objects, so the background subtraction cannot remove the moving
shadow.
Here are our basic assumptions discussed in this paper. First the illumination image is spatially smooth.
Second there is no change in the texture inside the shadow region and finally in the shadow regions, the
illumination image is close to be constant. Pixels inside shadow regions have different colors because of the
reflectance image not the illumination one.
SHADOW
REMOVAL
DCT/
DWT
WATER
MARK
INVERSE
DCT/DWT
O/P VOP
WATERMARK
EXTRACT
WATERMARK
INPUT
VOP
3. Watermarked Shadow Free Vop Sequences Using Hybrid Transforms
International organization of Scientific Research 32 | P a g e
Color transformation shadow removal:
a) Color transformation:
The RGB-based color images are converted into HSV color space. In HSV color space,
shadow regions hold some special properties (color and optical properties) which can be used for shadow
segmentation.
Fig.2: RGB to HSV Color Space Image
b) Shadow segmentation:
Based on these particular properties of shadows, the normalized saturation-value difference index
is constructed to identify shadows. NSVDI is calculated by subtracting the value component from the
saturation component for each image pixel. In NSVDI images, shadow regions are segmented by a threshold.
c) Shadow compensation:
Histogram matching method is used to adjust the hue, saturation and value component in
segmented shadow regions respectively, by matching histogram with the local surroundings around each
shadow region. Then, the result images are converted back to RGB color space.
Methodology for Shadow Removal:
Foreground Detection:
a) Background Reference image:
A background reference image is required for the process of shadow removal. It will be used to as
reference to every new frame which will result in the outline of objects and their shadows. I used the first frame
of every video as the background reference image.
b) Background subtraction:
Background subtraction is a widely used method in Computer Vision for separating or segmenting
out the foreground objects from the background of a video. The foreground objects are defined to be the parts of
the image that changes and the background is made out of the pixels that stay relatively constant.
It is the first step in extraction. The difference between the current frame and the background shows the dynamic
context. The Otsu threshold method is used to transform the different images into a binary map. In binary map,
there is lot of influential noises. For this situation, this paper uses a binary morphological algorithm to filter the
region which contains the number of white pixels less than the default threshold N in the 8 bordering regions,
thereby removing noise influence. After removing noise from the binary map, it can be seen that a lot of noise
has been filtered out, but the bike on the left of the lane line and the vehicle in the far right lane line still have
some influence. To remedy this, this project extracts auxiliary lane line positions to eliminate the influence.
In order to ensure the integrity of the object, expansion of binary map processing should be carried out. Image
expansion can effectively repair the holes and smooth the edges of objects. Then, it is used to mark object areas
and to compute the areas of every separate block in order to transform them into block diagrams for object
extraction.
Background subtraction alone cannot effectively remove shadow influences because object and background
gray levels are too similar (the profile extracted by background subtraction is incomplete when object and
background have similar gray levels) so the vehicle profile cannot meet the needs of the illegal lane changing
detection system. So, a second step of object edge extraction is put forward.
In this project we mainly used the background subtraction algorithm and thresholding described in [2].
However, for the first step, we assume that we have the background image that has been registered initially.
Thus, we do not need to do background registration. Next, since we assume the illumination is high, threshold
with proper values gives the required effects.
First we do absolute frame difference between subsequent grabbed frames and then we threshold the
difference images. To suppress the shadow, threshold values is chosen high.
The approach taken to identifying foreground regions is to:
1. Construct a model of the background scene by sampling the scene when no people or other relevant objects
are present.
2. Compare new images of the scene to this background model and determine any discrepancies; these are
considered foreground regions.
3. Update the background model as each new image is collected.
The background model allows for a mismatch between the locations of pixels in successive images, i.e., pixel
shift. For each pixel, a window around the previous position of the pixel is searched to determine the new
4. Watermarked Shadow Free Vop Sequences Using Hybrid Transforms
International organization of Scientific Research 33 | P a g e
location of the pixel. This stabilizes the image, countering for example, the results of a shaking camera. Note
that the foreground region generated by a person in the image will consist of both the person and his/her
shadow. The last step in the background subtraction is to eliminate the shadow region. Shadows are patches of a
background region in which the color value is the same, but the intensity is darker.
Fig.3: Stabilization (left) and Shadow Elimination (right)
The left images are unprocessed background subtraction, and the right images are the processed background
subtraction.
c) Normalizing the RGB factor in each frame:
In this we have done pre-processing for the background reference image and also for the
subsequent frame of the given video. This is done to remove the change of intensity in any frame. Converting an
RGB image into normalized RGB removes the effect of intensity variations.
This takes places as follows
1. First will convert the image to double for accurate calculation.
2. After converting the frame to double will normalize the each color red, green and blue of a frame so that we
will reduce the effect of change in intensity in a frame. We will normalize each R, G, B part individually.
In this project we performed the normalization of RGB color space model for frame and after that it subtracts
each frame of the video from the background frame
After that we applied the threshold on each frame so that we can get a shadow free image in distorted frame
where we will just show the moving object. Threshold limit for the image is done by
RGB to HSV conversion formula:
The R, G, B values are divided by 255 to change the range from 0-255 to 0-1:
R' = R/255 G' = G/255 B' = B/255 --------- (1)
𝐶 𝑚𝑎𝑥 = max(R', G', B') 𝐶 𝑚𝑖𝑛 = min(R', G', B') Δ = 𝐶 𝑚𝑎𝑥 - 𝐶 𝑚𝑖𝑛 ---------- (2)
Hue calculation:
H =
60°
×
𝐺′− 𝐵′
∆
𝑚𝑜𝑑6 , 𝐶 𝑚𝑎𝑥 = 𝑅′
60°
×
𝐵′− 𝑅′
∆
+ 2 , 𝐶 𝑚𝑎𝑥 = 𝐺′
60°
×
𝑅′ − 𝐺′
∆
+ 4 , 𝐶 𝑚𝑎𝑥 = 𝐵′
--------- (3)
Saturation calculation:
𝑠 =
0, ∆= 0
∆
𝐶 𝑚𝑎𝑥
, ∆<> 0 ---------- (4)
Value calculation:
V = 𝐶 𝑚𝑎𝑥 ---------- (5)
Table: The Data Contrast Between the Body and the Background
5. Watermarked Shadow Free Vop Sequences Using Hybrid Transforms
International organization of Scientific Research 34 | P a g e
From the below table we analysis the threshold so that we can get the shadow free image and from the above
table we can see that maximum change is in the Red color and the maximum change is around 0.211. This is for
the particular video. So in general we can make it more flexible and can adjust it to the general value for the
entire image. So finally I taken the threshold as 0.35
Threshold = 0.35 (Depends on the video file)
Threshold of 0.35 is applied to get the shadow free image. Threshold should be adjusted for other video files.
P (P<0.35) = 0;
P (P>=0.35) = 1;
By performing the above function we will get a shadow free image with the background and just we will see the
moving object. Finally we got a shadow free image, but we need to reconstruct it so morphological operation is
applied on this image so that we can get original video with just the detection of moving object.
Morphological
Operation:
Morphology is a broad set of image processing operations that process images based on shapes.
Morphological operations apply a structuring element to an input image, creating an output image of the same
size. In a morphological operation, the value of each pixel in the output image is based on a comparison of the
corresponding pixel in the input image with its neighbours. By choosing the size and shape of the
neighbourhood, you can construct a morphological operation that is sensitive to specific shapes in the input
image. We need exact boundary of the objects and their shadows. For this we applied background subtraction on
gray scale image of the each frame of the video.
Fig 4: RGB to grey scale image
Convert the RGB image into the gray scale so that we can apply the background subtraction on it. For this
process we converted the background reference image as well as the current frame to gray scale and then
performed the operation on the gray scale image of the video sequence.
Dilation adds pixels to the boundaries of objects in an image, while erosion removes pixels on object
boundaries. The number of pixels added or removed from the objects in an image depends on the size and shape
of the structuring element used to process the image. After the above step we will do dilation on the above frame
and well use infill to fill out the holes in a bound area of an image.
IV. WATERMARKING
INTRODUCTION:
General Definition of Watermark:
A watermark is a recognizable image or pattern in paper that appears as various shades of
lightness/darkness when viewed by transmitted light (or when viewed by reflected light, atop a dark
(284,154) (294,154) (306,159)
Pixel Body Back-ground Body Back-ground Body Back-ground
R 78 125 81 126 151 118
G 37 123 32 124 81 122
B 43 126 36 129 81 123
𝐶𝑟 .494 .334 .544 .333 .482 .325
𝐶𝑔 .234 .329 .215 .327 .259 .336
𝐶𝑏 .272 .337 .242 .340 .259 .339
∆ 𝑟 +0.160 +0.211 +0.157
∆ 𝑏 -0.095 -0.112 -0.077
∆ 𝑔 -0.065 -0.098 -0.080
6. Watermarked Shadow Free Vop Sequences Using Hybrid Transforms
International organization of Scientific Research 35 | P a g e
background), caused by thickness or density variations in the paper. Watermarks have been used on postal
stamps, currency, and other government documents to discourage counterfeiting.
Fig.5: Watermarked currency
What is Digital Watermarking?
Digital watermarking can be defined as the process of embedding a certain piece of information (known
as watermark) into multimedia content including text documents, images, audio or video streams, such that the
watermark can be detected or extracted later in order to provide copyright protection to the data and prevent
illegal copying.
CLASSIFICATION
Fig.6: Watermarking Classification
Techniques According To Working Domain:
Spatial Vs Frequency domain:
Spatial watermarking is easy to implement from computational point of view but too fragile to
withstand large varieties of external attacks. Frequency or transformed domain approach offers robust
watermarking but in most cases implementation needs higher computational complexity. Moreover the
transform domain technique is global in nature (global within the block in block-based approach) and cannot
restrict visual degradation of the cover image. But in spatial domain technique, degradation in image quality due
to water marking could be controlled locally leaving the region of interest unaffected.
The watermarks that are embedded in spatial domain will easily be removed by common filtering
process. Besides that, some of the spatial domain watermarking scheme are unable to detect the embedded
watermark when the watermarked image underwent geometrical distortion like additional of noise.
Applications of Watermarking:
Copyright Protection & Owner identification:
To protect its intellectual property, the data owner can embed a watermark representing copyright
information of his data. This application can be a really helpful tool in settling copyright disputes in court. It is
probably the most widely spread use of digital images watermarking and it is also the application we have
worked on in the present project.
Watermarking
According to
Embedding
Domain
According to
Type of
Document
According to
Human
Perception
Spatial
Domain
Frequency
Domain
Image Audio VideoText
Invisible Visible
Robust Fragile
Private Public
7. Watermarked Shadow Free Vop Sequences Using Hybrid Transforms
International organization of Scientific Research 36 | P a g e
Broadcast monitoring:
In order to help the automated identification of broadcasted programs, original watermarks can be
inserted in any type of data to be widely broadcasted on a network. It could assure that advertisers received the
airtime they have paid for or make certain that musicians’ property is not rebroadcast by pirate stations (or at
least, if so, that it can be detected).
Data Authentication:
Fragile watermarks are used to detect any corruption of an image or any other type of data. If the watermark is
detected, the data is genuine, if not the data has been corrupted and cannot be considered.
Data Hiding (Covert Communications):
The transmission of private data is probably one of the earliest applications of watermarking. As one would
probably have already understood, it consists of implanting a strategic message into an innocuous one in a way
that would prevent any unauthorized person to detect it.
Requirements of Watermarking:
To achieve maximum protection of intellectual property with watermarked media, several requirements must be
satisfied
Undeletable:
The watermark must be difficult or even impossible to remove by a hacker, at least without obviously degrading
the host signal.
Statistically Undetectable:
A pirate should not be able to detect the watermark by comparing several watermarked signals belonging to the
same author.
Unambiguous:
Retrieval of the watermark should be unambiguously identify the owner, and the accuracy of identification
should degrade gracefully in the face of attacks
Security:
The security requirement of a watermarking system can differ slightly depending on the application.
Watermarking security implies that the watermark should be difficult to remove or alter without damaging the
host signal. As all watermarking systems seek to protect watermark information, without loss of generality,
watermarking security can be regarded as the ability to assure secrecy and integrity of the watermark
information, and resist malicious attacks.
Robustness:
The watermark should be surviving the lossy compression techniques like JPEG, which is commonly
used for transmission and storage. The watermark should be retrievable even if common signal processing
operation are applied, such as signal enhancement, geometric image operations, noise, filtering, and etc.
V. HYBRID TRANSFORMS
Discrete Cosine Transformation (DCT):
DCT like a Fourier Transform, it represents data in terms of frequency space rather than an
amplitude space. This is useful because that corresponds more to the way humans perceive light, so that the part
that are not perceived can be identified and thrown away. DCT based watermarking techniques are robust
compared to spatial domain techniques. Such algorithms are robust against simple image processing operations
like low pass filtering, brightness and contrast adjustment, blurring etc. However, they are difficult to implement
and are computationally more expensive. At the same time they are weak against geometric attacks like rotation,
scaling, cropping etc. DCT domain watermarking can be classified into Global DCT watermarking and Block
based DCT watermarking. Embedding in the perceptually significant portion of the image has its own
advantages because most compression schemes remove the perceptually insignificant portion of the image.
The discrete cosine transforms is a technique for converting a signal into elementary sum of
sinusoids of varying magnitudes and frequencies. With an input image, X, the DCT coefficients for the
transformed output image, Y, are computed according to Eq. 6 shown below. In the equation, X, is the input
image having N × M pixels, X (m, n) is the intensity of the pixel in row m and column n of the image, and Y (u,
v) is the DCT coefficient in row u and column v of the DCT matrix.
𝑌 𝑢, 𝑣 =
2
𝑀
2
𝑁
𝛼 𝑢 𝛼 𝑣 X m, n
N-1
v=0
M-1
u=0 cos
2𝑚+1 𝑢𝜋
2𝑀
cos
(2𝑛+1)𝑣𝜋
2𝑁
------ (6)
Where
𝛼 𝑢 =
1
2
𝑢 = 0
1 𝑢 = 1,2, … . , 𝑁 − 1
𝛼 𝑣 =
1
2
𝑣 = 0
1 𝑣 = 1,2, … . , 𝑁 − 1
The image is reconstructed by applying inverse DCT operation according to Eq. 7:
8. Watermarked Shadow Free Vop Sequences Using Hybrid Transforms
International organization of Scientific Research 37 | P a g e
𝑋 𝑚, 𝑛 =
2
𝑀
2
𝑁
𝛼 𝑢 𝛼 𝑣Y u, v
N-1
v=0
M-1
u=0 cos
2𝑚+1 𝑢𝜋
2𝑀
cos
(2𝑛+1)𝑣𝜋
2𝑁
------- (7)
The popular block-based DCT transform segments an image non-overlapping block and applies DCT to each
block. This result in giving three frequencies Sub-bands: low frequency sub-band, mid-frequency sub-band and
high frequency sub-band. DCT-based watermarking is based on two facts. The first fact is that much of the
signal energy lies at low-frequencies sub-band which contains the most important visual parts of the
image. The second fact is that high frequency components of the image are usually removed through
compression and noise attacks. The watermark is therefore embedded by modifying the coefficients of the
middle frequency sub-band so that the visibility of the image will not be affected and the watermark will not
be removed by compression.
Fig.7: Mechanism of DCT Transform
Advantages:
1) DCT domain watermarking is comparatively much better than the spatial domain encoding since DCT
domain watermarking can survive against the attacks such as noising, compression, sharpening, and filtering.
2) It uses JPEG compression method to apply DCT watermarking as a parameter. One may use different
parameters related to image processing, and these parameters might provide equal or even stronger robustness
against various attacks based on image processing [7].
3) Discrete cosine Transform (DCT), where pseudorandom sequences, such as M sequences, are added to the
DCT at the middle frequencies as signatures.
Discrete Wavelet Transformation (DWT):
The Discrete Wavelet Transform (DWT) [5] is currently used in a wide variety of signal processing
applications such as in audio and video compression, removal of noise in audio, and the simulation of wireless
antenna distribution. Wavelets have their energy concentrated in time and are well suited for the analysis of
transient, time-varying signals. Since most of the real life signals encountered are time varying in nature, the
Wavelet Transform suits many applications very well. Wavelets are special functions in a form analogous to
Sines and cosines in Fourier analysis, are used as basal functions for representing signals. For 2-D
images, applying DWT corresponds to processing the image by 2-D filters in each dimension. The filters divide
the input image into four non-overlapping multi-resolution sub-bands LL1, LH1, HL1 and HH1. The sub-band
LL1 represents the coarse-scale DWT coefficients while the sub-bands LH1, HL1 and HH1 represent the fine-
scale of DWT coefficients. To obtain the next coarser scale of wavelet coefficients, the sub-band LL1 is further
processed until some final scale N is reached. When N is reached we will have 3N+1 sub-bands consisting of
the multi-resolution sub-bands LL 𝑁 and LH 𝑋, HL 𝑋 and HH 𝑋 where x ranges from 1 until N [6].
Due to its excellent Spatio-frequency localization properties, the DWT is very suitable to
identify the areas in the host image where a watermark can be embedded effectively. In particular, this
property allows the exploitation of the masking effect of the human visual system such that if a DWT
coefficient is modified, only the region corresponding to that Coefficient will be modified. In general most of
the Image energy is concentrated at the lower frequency Sub-bands LL 𝑋 and therefore embedding watermarks
in these sub-bands may degrade the image significantly. Embedding in the low frequency sub- bands, however,
could increase robustness significantly. On the other hand, the high frequency sub-bands HH 𝑋 include the edges
and textures of the image and the human eye is not generally sensitive to changes in such sub-bands. This
allows the watermark to be embedded without being perceived by the human eye. The compromise adopted by
many DWT-based watermarking algorithm, is to embed the watermark in the middle frequency sub-bands LH 𝑋
and HL 𝑋 where acceptable performance of imperceptibility and robustness could be achieved.
9. Watermarked Shadow Free Vop Sequences Using Hybrid Transforms
International organization of Scientific Research 38 | P a g e
Fig.8: Level decompositions of DWT Transform
Advantages:
1) The watermarking method has multi resolution characteristics and is hierarchical. It is usually true that the
human eyes are not sensitive to the small changes in edges and textures of an image but are very sensitive to the
small changes in the smooth parts of an image. With the DWT, the edges and textures are usually to the high
frequency sub-bands, such as HH, LH and HL etc. Large frequencies in these bands usually indicate edges in an
image [7].
2) The watermarking method robust to wavelet transform based image compressions, such as the embedded
zero-tree wavelet (EZW) image compression scheme, and as well as to other common image distortions, such as
additive noise, rescaling/stretching, and half toning. This is advantage over DCT.
In this project, we will describe a digital image watermarking algorithm based on combining two transforms
DWT and DCT. Watermarking is done by altering the wavelet coefficients of carefully selected DWT sub-
bands, followed by the application of the DCT transform on the selected sub-bands:
HYBRID TRANSFORMS ALGORITHM:
In this algorithm [6] first of all the DWT of image is taken which gives us 4 different components of the
image out of which I am embedding the watermark in either horizontal or vertical component by taking its DCT.
After embedding watermark we are taking inverse DCT and inverse DWT respectively to get original view of
image back.
Steps in Embedding Watermarking using Hybrid Transforms:
Step 1: Apply DWT to decompose the cover host image into four non-overlapping multi-resolution sub bands:
LL, HL, LH, and HH.
Step 2: Apply DCT to each block in the chosen sub-band
Step 3: Re-formulate the grey-scale watermark image into a vector of zeros and ones.
Step 4: Generate two uncorrelated pseudorandom sequences. One sequence is used to embed watermark bit 0
(PN_0) and the other sequence is used to embed the watermark bit 1 (PN_1). (Number of elements in each of
the pseudorandom sequences must be equal to the number of mid-band elements of the DCT-transformed DWT
sub-bands.)
Step 5: Embed the pseudorandom sequences, PN_0 and PN_1, with a gain factor alpha (α), in the DCT
transformed 8 X 8 blocks of the selected DWT sub-bands of the host image.
Step 6: Embedding is not to all coefficients of the DCT block, but only to the mid-band DCT coefficients. If we
donate X as the matrix of the mid-band coefficients of the DCT transformed block, then embedding is done as
follows:
If the watermark bit is 0 then
𝑋′
= 𝑋 + 𝛼 ∗ 𝑃𝑁_0
Otherwise,
If the watermark bit is 1 then,
𝑋′
= 𝑋 + 𝛼 ∗ 𝑃𝑁_1
Step 7: Apply inverse DCT (IDCT) to each block after its mid-band coefficients have been modified to
embed the watermark bits as described in the previous step.
Step 8: Apply the inverse DWT (IDWT) transform on the DWT transformed image, including the modified sub-
band, to produce the watermarked host image.
10. Watermarked Shadow Free Vop Sequences Using Hybrid Transforms
International organization of Scientific Research 39 | P a g e
Fig.9: Combined DWT-DCT Watermark Embedding Procedure
The watermark extraction procedure is depicted in Fig. 5.4, and described in details in the following
steps. The combined DWT-DCT algorithm is a blind watermarking algorithm, and thus the original host
image is not required to extract the watermark.
Steps in Extraction of Watermark Using Hybrid Transforms:
Step 1: Apply IDCT to decompose the watermarked image into non-overlapping multi-resolution sub band: LL.
Step 2: Apply IDWT to chosen sub-band (LL), and extract the VOP.
Step 3: Reconstruct the watermark using the extracted watermark bits, and compute the similarity between the
original and extracted watermark and VOP.
Fig.10: Combined DWT-DCT Watermark Extraction Procedure
VI. RESULT
Fig.11: Original Frame and Foreground VOP Fig.12: Shadow Removal and Result Image
original frame foreground VOP
Watermark
Formation
Watermark
PN-Sequence
Extraction
Algorithm
Watermarked
Image
1-Level
DWT
DCT
Extracted
Watermark
Original
Image
1-Level
DWT
DCT
Embedding
Algorithm
IDCT
1-Level
DWT
Watermarked
Image
Watermark
Watermark
Formation
PN-Sequence