International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
Texture based feature extraction and object trackingPriyanka Goswami
The project involved developing and implementing different texture analysis based extraction techniques like Local Binary Pattern (LBP), Local Derivative Pattern (LDP) and Local Ternary Pattern (LTP) in MATLAB and carrying out a comparative study by analyzing the effectiveness of each technique using a standard set of images (Yale data set). The most optimum technique is then applied to identify cloud patterns and track their motion (in pixel position changes) in time series images (acquired from weather satellites like GOES) using the Chi-Square Difference method.
Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...IJTET Journal
Abstract— Bone Mineral Density (BMD) estimations and fracture investigation of the spine bones are retrained to the vertebral bodies (VBs).A contemporary shape and appearance based method is proposed to segment VBs in clinical Computed Tomography (CT) images without any user arbitration. The proposed approach depends on both image appearance and shape information. Shape knowledge is aggregated from a set of training shapes. Then shape variations are estimated using statistical shape model which approximates the shape variations of the vertebral bodies and its background in the variability region. To segment a VB, the graph cut method used to detect the VB region automatically. Detected contours are aligned and mean shape model is created. The spatial interaction between the neighboring pixels is identified. The statistical shape model is used to produce the deformable shape model and all instances of the shape lies with the current estimate of the mean shape.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
Texture based feature extraction and object trackingPriyanka Goswami
The project involved developing and implementing different texture analysis based extraction techniques like Local Binary Pattern (LBP), Local Derivative Pattern (LDP) and Local Ternary Pattern (LTP) in MATLAB and carrying out a comparative study by analyzing the effectiveness of each technique using a standard set of images (Yale data set). The most optimum technique is then applied to identify cloud patterns and track their motion (in pixel position changes) in time series images (acquired from weather satellites like GOES) using the Chi-Square Difference method.
Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...IJTET Journal
Abstract— Bone Mineral Density (BMD) estimations and fracture investigation of the spine bones are retrained to the vertebral bodies (VBs).A contemporary shape and appearance based method is proposed to segment VBs in clinical Computed Tomography (CT) images without any user arbitration. The proposed approach depends on both image appearance and shape information. Shape knowledge is aggregated from a set of training shapes. Then shape variations are estimated using statistical shape model which approximates the shape variations of the vertebral bodies and its background in the variability region. To segment a VB, the graph cut method used to detect the VB region automatically. Detected contours are aligned and mean shape model is created. The spatial interaction between the neighboring pixels is identified. The statistical shape model is used to produce the deformable shape model and all instances of the shape lies with the current estimate of the mean shape.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
Local Phase Oriented Structure Tensor To Segment Texture Images With Intensit...CSCJournals
This paper proposed the active contour based texture image segmentation scheme using the linear structure tensor and tensor oriented steerable Quadrature filter. Linear Structure tensor (LST) is a popular method for the unsupervised texture image segmentation where LST contains only horizontal and vertical orientation information but lake in other orientation information and also in the image intensity information on which active contour is dependent. Therefore in this paper, LST is modified by adding intensity information from tensor oriented structure tensor to enhance the orientation information. In the proposed model, these phases oriented features are utilized as an external force in the region based active contour model (ACM) to segment the texture images having intensity inhomogeneity and noisy images. To validate the results of the proposed model, quantitative analysis is also shown in terms of accuracy using a Berkeley image database.
Comparative Analysis of Hand Gesture Recognition TechniquesIJERA Editor
During past few years, human hand gesture for interaction with computing devices has continues to be active area of research. In this paper survey of hand gesture recognition is provided. Hand Gesture Recognition is contained three stages: Pre-processing, Feature Extraction or matching and Classification or recognition. Each stage contains different methods and techniques. In this paper define small description of different methods used for hand gesture recognition in existing system with comparative analysis of all method with its benefits and drawbacks are provided.
A reliable gait features are required to extract the gait sequences from an images. In this paper suggested a
simple method for gait identification which is based on moments. Moment values are extracted on different
number of frames of Gray Scale and Silhouette images of CASIA database. These moment values are
considered as feature values. Fuzzy logic and Nearest Neighbor Classifier are used for classification. Both
achieved higher recognition.
Image segmentation methods for brain mri imageseSAT Journals
Abstract
In Image Processing, extracting the region of interest is a very challenging task. To extract information, pre-processing algorithms are important in MRI image. Edge detection is a task in which points in image are identified at which brightness changes sharply or it has discontinuities. It is an essential pre- processing step in medical image segmentation, for object recognition of the human organs. The applications of medical image segmentation are 3D reconstruction and quantitative analysis and so on. We used MRI images because MRI images give best view of tissues in any part of human body. In this paper, difficulties of edge detection in brain magnetic resonance images are considered and a new approach to edge detection is introduced. There are many traditional edge detection methods for extracting edges from images have been introduced such as gradient based operators like sobel, prewitt, robert were initially used for edge detection, but they did not give sharp edges and were highly sensitive to noise image. And in medical field accuracy is important fact. To overcome these difficulties, we proposed new method called as Active Contour method or snake model. . In the field of medical segmentation, Active contour method is one of popular research topic. This method is used for detecting brain region based on their energy function. In order to compare between them, one slice of MRI image tested with these methods. The traditional and proposed edge detection algorithms are implemented in MATLAB and results of proposed method are presented and compared with traditional approach.
Keywords: Edge detection, Brain MRI images, Canny edge detector, Active contour method and MATLAB.
Integration of poses to enhance the shape of the object tracking from a singl...eSAT Journals
Abstract In computer vision, tracking human pose has received a growing attention in recent years. The existing methods used multi-view videos and camera calibrations to enhance the shape of the object in 3D view. In this paper, tracking and partial reconstruction of the shape of the object from a single view video is identified. The goal of the proposed integrated method is to detect the movement of a person more accurately in 2D view. The integrated method is a combination of Silhouette based pose estimation and Scene flow based pose estimation. The silhouette based pose estimation is used to enhance the shape of the object for 3D reconstruction and scene flow based pose estimation is used to capture the size as well as the stability of the object. By integrating these two poses, the accurate shape of the object has been calculated from a single view video. Keywords: Pose Estimation, optical Flow, Silhouette, Object Reconstruction, 3D Objects
A comparative study on classification of image segmentation methods with a fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Blind Source Separation Using Hessian EvaluationCSCJournals
This paper focuses on the blind image separation using sparse representation for natural images. The statistics of the natural image is based on one particular statistical property called sparseness, which is closely related to the super-gaussian distribution. Since natural images can have both gaussian and non gaussian distribution, the original infomax algorithm cannot be directly used for source separation as it is better suited to estimate the super-gaussian sources. Hence, we explore the property of sparseness for image representation and show that it can be effectively used for blind source separation. The efficiency of the proposed method is compared with other sparse representation methods through Hessian evaluation.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
SEGMENTATION USING ‘NEW’ TEXTURE FEATUREacijjournal
Color, texture, shape and luminance are the prominent features for image segmentation. Texture is an
organized group of spatial repetitive arrangements in an image and it is a vital attribute in many image
processing and computer vision applications. The objective of this work is to segment the texture sub
images from the given arbitrary image. The main contribution of this work is to introduce “NEW” texture
feature descriptor to the image segmentation field. The NEW texture descriptor labels the neighborhood
pixels of a pixel in an image as N,W,NW,NE,WW,NN and NNE(N-North, W-West).To find the prediction
value, the gradient of the intensity functions are calculated. Eight component binary vectors are formed
and compared to prediction value. Finally end up with 256 possible vectors. Fuzzy c-means clustering is
used to segment the similar regions in textural image Extensive experimentation shows that the proposed
methodology works better for segmenting the texture images, and also segmentation performance are
evaluated.
Dynamic texture based traffic vehicle monitoring systemeSAT Journals
Abstract Dynamic Textures are function of both space and time which exhibit spatio-temporal stationary property. They have spatially repetitive patterns which vary with time. In this paper, importance of phase spectrum in the signals is utilized and a novel method for vehicle monitoring is proposed with the help of Fourier analysis, synthesis and image processing. Methods like Doppler radar or GPS navigation are used commonly for tracking. The proposed image based approach has an added advantage that the clear image of the object (vehicle) can be used for future reference like proof of incidence, identification of owner and registration number. Keywords-Fourier Transform, dynamic texture, phase spectrum
Amalgamation of contour, texture, color, edge, and spatial features for effic...eSAT Journals
Abstract From the past few years, Content based image retrieval (CBIR) has been a progressive and curious research area. Image retrieval is a process of extraction of the set of images from the available image database resembling the query image. Many CBIR techniques have been proposed for relevant image recoveries. However most of them are based on a particular feature extraction like texture based recovery, color based retrieval system etc. Here in this paper we put forward a novel technique for image recovery based on the integration of contour, texture, color, edge, and spatial features. Contourlet decomposition is employed for the extraction of contour features such as energy and standard deviation. Directionality and anisotropy are the properties of contourlet transformation that makes it an efficient technique. After feature extraction of query and database images, similarity measurement techniques such as Squared Euclidian and Manhattan distance were used to obtain the top N image matches. The simulation results in Matlab show that the proposed technique offers a better image retrieval. Satisfactory precision-recall rate is also maintained in this method. Keywords: Contourlet Decomposition, Local Binary Pattern, Squared Euclidian Distance, Manhattan Distance
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Medical image analysis and processing using a dual transformeSAT Journals
Abstract The demand for images in medical field has increased drastically over the years. The need for reducing the storage space has resulted in image compression. This paper presents a dual transform for medical image compression algorithm. The experimental results determines how the compression ratio (CR), peak signal to noise ratio (PSNR) and SNR (signal to noise ratio) of different compression algorithms responds to dual transform algorithm. Keywords: DCT, SPIHT, Haar Wavelet, Linear approximation transform, image compression, Singular Value Decomposition (SVD).
Local Phase Oriented Structure Tensor To Segment Texture Images With Intensit...CSCJournals
This paper proposed the active contour based texture image segmentation scheme using the linear structure tensor and tensor oriented steerable Quadrature filter. Linear Structure tensor (LST) is a popular method for the unsupervised texture image segmentation where LST contains only horizontal and vertical orientation information but lake in other orientation information and also in the image intensity information on which active contour is dependent. Therefore in this paper, LST is modified by adding intensity information from tensor oriented structure tensor to enhance the orientation information. In the proposed model, these phases oriented features are utilized as an external force in the region based active contour model (ACM) to segment the texture images having intensity inhomogeneity and noisy images. To validate the results of the proposed model, quantitative analysis is also shown in terms of accuracy using a Berkeley image database.
Comparative Analysis of Hand Gesture Recognition TechniquesIJERA Editor
During past few years, human hand gesture for interaction with computing devices has continues to be active area of research. In this paper survey of hand gesture recognition is provided. Hand Gesture Recognition is contained three stages: Pre-processing, Feature Extraction or matching and Classification or recognition. Each stage contains different methods and techniques. In this paper define small description of different methods used for hand gesture recognition in existing system with comparative analysis of all method with its benefits and drawbacks are provided.
A reliable gait features are required to extract the gait sequences from an images. In this paper suggested a
simple method for gait identification which is based on moments. Moment values are extracted on different
number of frames of Gray Scale and Silhouette images of CASIA database. These moment values are
considered as feature values. Fuzzy logic and Nearest Neighbor Classifier are used for classification. Both
achieved higher recognition.
Image segmentation methods for brain mri imageseSAT Journals
Abstract
In Image Processing, extracting the region of interest is a very challenging task. To extract information, pre-processing algorithms are important in MRI image. Edge detection is a task in which points in image are identified at which brightness changes sharply or it has discontinuities. It is an essential pre- processing step in medical image segmentation, for object recognition of the human organs. The applications of medical image segmentation are 3D reconstruction and quantitative analysis and so on. We used MRI images because MRI images give best view of tissues in any part of human body. In this paper, difficulties of edge detection in brain magnetic resonance images are considered and a new approach to edge detection is introduced. There are many traditional edge detection methods for extracting edges from images have been introduced such as gradient based operators like sobel, prewitt, robert were initially used for edge detection, but they did not give sharp edges and were highly sensitive to noise image. And in medical field accuracy is important fact. To overcome these difficulties, we proposed new method called as Active Contour method or snake model. . In the field of medical segmentation, Active contour method is one of popular research topic. This method is used for detecting brain region based on their energy function. In order to compare between them, one slice of MRI image tested with these methods. The traditional and proposed edge detection algorithms are implemented in MATLAB and results of proposed method are presented and compared with traditional approach.
Keywords: Edge detection, Brain MRI images, Canny edge detector, Active contour method and MATLAB.
Integration of poses to enhance the shape of the object tracking from a singl...eSAT Journals
Abstract In computer vision, tracking human pose has received a growing attention in recent years. The existing methods used multi-view videos and camera calibrations to enhance the shape of the object in 3D view. In this paper, tracking and partial reconstruction of the shape of the object from a single view video is identified. The goal of the proposed integrated method is to detect the movement of a person more accurately in 2D view. The integrated method is a combination of Silhouette based pose estimation and Scene flow based pose estimation. The silhouette based pose estimation is used to enhance the shape of the object for 3D reconstruction and scene flow based pose estimation is used to capture the size as well as the stability of the object. By integrating these two poses, the accurate shape of the object has been calculated from a single view video. Keywords: Pose Estimation, optical Flow, Silhouette, Object Reconstruction, 3D Objects
A comparative study on classification of image segmentation methods with a fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Blind Source Separation Using Hessian EvaluationCSCJournals
This paper focuses on the blind image separation using sparse representation for natural images. The statistics of the natural image is based on one particular statistical property called sparseness, which is closely related to the super-gaussian distribution. Since natural images can have both gaussian and non gaussian distribution, the original infomax algorithm cannot be directly used for source separation as it is better suited to estimate the super-gaussian sources. Hence, we explore the property of sparseness for image representation and show that it can be effectively used for blind source separation. The efficiency of the proposed method is compared with other sparse representation methods through Hessian evaluation.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
SEGMENTATION USING ‘NEW’ TEXTURE FEATUREacijjournal
Color, texture, shape and luminance are the prominent features for image segmentation. Texture is an
organized group of spatial repetitive arrangements in an image and it is a vital attribute in many image
processing and computer vision applications. The objective of this work is to segment the texture sub
images from the given arbitrary image. The main contribution of this work is to introduce “NEW” texture
feature descriptor to the image segmentation field. The NEW texture descriptor labels the neighborhood
pixels of a pixel in an image as N,W,NW,NE,WW,NN and NNE(N-North, W-West).To find the prediction
value, the gradient of the intensity functions are calculated. Eight component binary vectors are formed
and compared to prediction value. Finally end up with 256 possible vectors. Fuzzy c-means clustering is
used to segment the similar regions in textural image Extensive experimentation shows that the proposed
methodology works better for segmenting the texture images, and also segmentation performance are
evaluated.
Dynamic texture based traffic vehicle monitoring systemeSAT Journals
Abstract Dynamic Textures are function of both space and time which exhibit spatio-temporal stationary property. They have spatially repetitive patterns which vary with time. In this paper, importance of phase spectrum in the signals is utilized and a novel method for vehicle monitoring is proposed with the help of Fourier analysis, synthesis and image processing. Methods like Doppler radar or GPS navigation are used commonly for tracking. The proposed image based approach has an added advantage that the clear image of the object (vehicle) can be used for future reference like proof of incidence, identification of owner and registration number. Keywords-Fourier Transform, dynamic texture, phase spectrum
Amalgamation of contour, texture, color, edge, and spatial features for effic...eSAT Journals
Abstract From the past few years, Content based image retrieval (CBIR) has been a progressive and curious research area. Image retrieval is a process of extraction of the set of images from the available image database resembling the query image. Many CBIR techniques have been proposed for relevant image recoveries. However most of them are based on a particular feature extraction like texture based recovery, color based retrieval system etc. Here in this paper we put forward a novel technique for image recovery based on the integration of contour, texture, color, edge, and spatial features. Contourlet decomposition is employed for the extraction of contour features such as energy and standard deviation. Directionality and anisotropy are the properties of contourlet transformation that makes it an efficient technique. After feature extraction of query and database images, similarity measurement techniques such as Squared Euclidian and Manhattan distance were used to obtain the top N image matches. The simulation results in Matlab show that the proposed technique offers a better image retrieval. Satisfactory precision-recall rate is also maintained in this method. Keywords: Contourlet Decomposition, Local Binary Pattern, Squared Euclidian Distance, Manhattan Distance
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Medical image analysis and processing using a dual transformeSAT Journals
Abstract The demand for images in medical field has increased drastically over the years. The need for reducing the storage space has resulted in image compression. This paper presents a dual transform for medical image compression algorithm. The experimental results determines how the compression ratio (CR), peak signal to noise ratio (PSNR) and SNR (signal to noise ratio) of different compression algorithms responds to dual transform algorithm. Keywords: DCT, SPIHT, Haar Wavelet, Linear approximation transform, image compression, Singular Value Decomposition (SVD).
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Denoising and Edge Detection Using SobelmethodIJMER
The main aim of our study is to detect edges in the image without any noise , In many of the images edges carry important information of the image, this paper presents a method which consists of sobel operator and discrete wavelet de-noising to do edge detection on images which include white Gaussian noises. There were so many methods for the edge detection, sobel is the one of the method, by using this sobel operator or median filtering, salt and pepper noise cannot be removed properly, so firstly we use complex wavelet to remove noise and sobel operator is used to do edge detection on the image. Through the pictures obtained by the experiment, we can observe that compared to other methods, the method has more obvious effect on edge detection.
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...sipij
This paper focuses on improved edge model based on Curvelet coefficients analysis. Curvelet transform is
a powerful tool for multiresolution representation of object with anisotropic edge. Curvelet coefficients
contributions have been analyzed using Scale Invariant Feature Transform (SIFT), commonly used to study
local structure in images. The permutation of Curvelet coefficients from original image and edges image
obtained from gradient operator is used to improve original edges. Experimental results show that this
method brings out details on edges when the decomposition scale increases.
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...IJMER
Model-Based image segmentation plays an important role in image analysis and image
retrieval. To analyze the features of the image, model based segmentation algorithm will be more
efficient. This paper, proposed Automatic Image Segmentation using Wavelets (AISWT) based on
normalized graph cut method to make segmentation simpler. Discrete Wavelet Transform is considered
for segmentation which contains significant information of the input for the approximation band of image.
The Histogram based algorithm is used to obtain the number of regions and the initial parameters like
mean, variance and mixing factor
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Improved Characters Feature Extraction and Matching Algorithm Based on SIFTNooria Sukmaningtyas
According to SIFT algorithm does not have the property of affine invariance, and the high
complexity of time and space, it is difficult to apply to real-time image processing for batch image
sequence, so an improved SIFT feature extraction algorithm was proposed in this paper. Firstly, the MSER
algorithm detected the maximally stable extremely regions instead of the DOG operator detected extreme
point, increasing the stability of the characteristics, and reducing the number of the feature descriptor;
Secondly, the circular feature region is divided into eight fan-shaped sub-region instead of 16 square subregion
of the traditional SIFT, and using Gaussian function weighted gradient information field to construct
the new SIFT features descriptor. Compared with traditional SIFT algorithm, The experimental results
showed that the algorithm not only has translational invariance, scale invariance and rotational invariance,
but also has affine invariance and faster speed that meet the requirements of real-time image processing
applications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
Automatic rectification of perspective distortion from a single image using p...ijcsa
Perspective distortion occurs due to the perspective projection of 3D scene on a 2D surface. Correcting the distortion of a single image without losing any desired information is one of the challenging task in the field of Computer Vision. We consider the problem of estimating perspective distortion from a single still image of an unstructured environment and to make perspective correction which is both quantitatively accurate as well as visually pleasing. Corners are detected based on the orientation of the image. A method based on plane homography and transformation is used to make perspective correction. The algorithm infers frontier information directly from the images, without any reference objects or prior knowledge of the camera parameters. The frontiers are detected using geometric context based segmentation. The goal of this paper is to present a framework providing fully automatic and fast perspective correction.
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
Synthetic Aperture Radar (SAR) images are inherently affected by multiplicative speckle noise, due to the coherent nature of scattering phenomena. In this paper, a novel algorithm capable of suppressing speckle noise using Particle Swarm Optimization (PSO) technique is presented. The algorithm initially identifies homogenous region from the corrupted image and uses PSO to optimize the Thresholding of curvelet coefficients to recover the original image. Average Power Spectrum Value (APSV) has been used as objective function of PSO. The Proposed algorithm removes Speckle noise effectively and the performance of the algorithm is tested and compared with Mean filter, Median filter, Lee filter, Statistic Lee filter, Kuan filter, frost filter and gamma filter., outperforming conventional filtering methods.
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
Synthetic Aperture Radar (SAR) images are inherently affected by multiplicative speckle noise, due to the coherent nature of scattering phenomena. In this paper, a novel algorithm capable of suppressing speckle noise using Particle Swarm Optimization (PSO) technique is presented. The algorithm initially identifies homogenous region from the corrupted image and uses PSO to optimize the Thresholding of curvelet coefficients to recover the original image. Average Power Spectrum Value (APSV) has been used as objective function of PSO. The Proposed algorithm removes Speckle noise effectively and the performance of the algorithm is tested and compared with Mean filter, Median filter, Lee filter, Statistic Lee filter, Kuan filter, frost filter and gamma filter., outperforming conventional filtering methods.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Pd3426592664
1. Surendra Padavala,V. Venkata Rao / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2659-2664
2659 | P a g e
Content Based Image Retrieval Using Region Based Shape
Descriptor and SVM Algorithm
Surendra Padavala1
, V. Venkata Rao2
1
P.G Student, Dept. of ECE Narasaraopeta Engineering College Narasaraopeta, Andhra Pradesh, India
2
Professor and HoD, Department. of ECE Narasaraopeta Engineering College Narasaraopeta, Andhra Pradesh,
India
Abstract
Content Based Image Retrieval (CBIR)
system using Region based shape descriptors is
proposed in my work. Further, the image
classification efficiency is improved by employing
Support Vector Machine (SVM) classifier. In this
paper we concentrate on region based shape
descriptors. In Region based shape descriptors
include Hu moments, Zernike Moments, and exact
Legendre Moment. In CBIR system the region
based shape descriptors, viz., MI, ZM and ELM in
terms of retrieval efficiency and retrieval time are
observed. In Exact Legendre Moments (ELM) for
gray scale images is proposed in this work. The
CBIR system is tested by conducting experiments
on Corel shape database,. It consists of 20 classes
of images with each class consisting of 72 different
orientations resulting in a total of 1440 images. All
these gray scale images in the database are of the
size 128×128. All images of all the 20 classes are
used for experimentation.
Index Terms— Content Based Image Retrieval,
Region based shape descriptors, Hu‟s moments,
Zernike Moments, Exact Legendre Moments Support
Vector Machines.
I. INTRODUCTION
Shape is one of the primary visual features in
CBIR, various type of shape descriptors have been
used to extract image patterns in a number of
applications. Numerous shape descriptors have been
proposed in the literature. Broadly classifies shape
descriptors for 2D shapes in two ways:
i. Contour Based where object shape is represented
by its boundary and features (e.g. boundary
length, curvature, and fourier shape descriptors).
The shape description schemes are called external
representations.
ii. Region Based object shape is described by the
region occupied by the object. These description
schemes are called internal representations.
Contour based shape descriptors make use of
only the boundary information, ignoring the shape
interior content. Therefore, these descriptors cannot
represent shapes for which the complete boundary
information is not available. On the other hand, region-
based descriptors exploit both boundary and
internal pixels, and therefore are applicable to generic
shapes. Among the region-based descriptors, moments
have been very popular since they were first
introduced in the 60‟s. In this paper we concentrate on
region based shape descriptors. Region based shape
descriptors include Hu moments, Geometric moments,
Legendre Moment, and Zernike Moments. These
features have been studied in detail and used
extensively in many applications.
The purpose of this paper to experimentally
investigate into the combinations of shape descriptors
and SVM algorithm that capture the concept of shape
similarity and dissimilarity.
II. REGION BASED SHAPE DESCRIPTORS
Shape is one of the most widely used image
feature exploited in content-based image retrieval
systems, In this section, we describe important region
based shape descriptors: Hu‟s Moments, Zernike
Moments, Exact Legendre Moments
Hu’s Moments:
Hu moments were proposed in and have the
property of being scale, translation and rotation
invariant. To compute the Hu moments, first the
central moments are computed from the geometric
moments as:
00M
Mij
ij
Where 212 jiforji
Based on the second and third order central moments,
Hu defined the following six absolute orthogonal
invariant moments:
02201 I
2
11
2
02202 4 I
2
0321
2
12303 333 I
2
0321
2
21304 I
2
3012
2
213030123012
2
0321
2
1230123012305
33
333
I
2. Surendra Padavala,V. Venkata Rao / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2659-2664
2660 | P a g e
0321123011
2
0321
2
1230
02206
4
I
and one skew orthogonal invariant moment:
2
0321
2
213003211230
2
0321
2
213021300321
33
33
h
The skew invariant is useful in distinguishing
mirror images.
This descriptor can be utilized to accomplish
pattern identification not only independent of size,
position and orientation, but also independent of
parallel projection.
Zernike Moments
Zernike Moments (ZM) are orthogonal
moments and can be used to represent shape content
of an image with minimum amount of information
redundancy. Orthogonal moments allow for accurate
reconstruction of the image, and makes optimal
utilization of shape information. Zernike Moments
(ZM) are widely used in CBIR as shape descriptors.
ZM have many desirable properties, viz., rotation
invariance and robustness to noise. The complex ZM
are derived by projecting the image function onto an
orthogonal polynomial over the interior of a unit
circle 122
yx as follows.
jmRpVyxV nmnmnm exp,,
2
0
2
!
2
!
2
!
!
1
mn
s
sns
nm
s
mn
s
mn
s
sn
R
where, n is non-negative integer, m is an integer such than
mn is even and nm ,
22
yx ,
2
tan 1 x
. Projecting the image
function onto the basis set, results
Zernike moments of order n with repetition m given
by
x y
nmnm Vyxf
n
A
,,
1
where, 122
yx .
Exact Legendre Moments:
Legendre Moments (LM) are continuous and
orthogonal moments, they can be used to represent an
image with minimum amount of information
redundancy. Many algorithms are developed for the
computation of LM , but these methods focus mainly
on 2D geometric moments. When they are applied to
a digital image, a numerical approximation is
necessary. Error due to approximation increases as the
order of the moment increases. An accurate method
for computing the Exact Legendre Moments (ELM)
proposed by Hosney is as follows.
Legendre moments of order qpg for an
image with intensity function yxf , are defined as
1
1
1
1
,
4
1212
dxdyyxfypxp
qp
L pppq
Where, xpp is the
th
P order Legendre polynomial
defined as
p
k
p
p
p
k
kpp x
dx
d
p
xaxp
0
2
1
!2
1
where, 1,1x and xpp obeys the following
recursive relation
xp
p
p
xxp
p
p
xp ppp 11
11
12
With 10 xp , xxp 1 and P>1.
The set of Legendre polynomials
xpp forms a complete orthogonal basis set on the
interval [-1, 1]. A digital image of size NN is an
array of pixels. Centres of these pixels are the
points ji yx , .
In order to improve accuracy, it is proposed to use the
following approximated form
N
i
N
j
jipqpq yxfyxh
qp
L
1 1
,,
4
1212
Where, xixi
2
1
1 and
yjyi
2
1
1 with i,j=1,2,3…N
2
2
2
2
,
i
i
i
i
jj
jj
x
x
x
x
yy
yy
qpjipq dxdyypxpyxh
This double integration is required to be
evaluated exactly to remove the approximation error
in computation of Legendre moments. A special
polynomial is given as follows.
12
11
p
xpxp
dxxp
pp
p
3. Surendra Padavala,V. Venkata Rao / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2659-2664
2661 | P a g e
where, 1p , The set of Legendre moments can thus
be computed exactly by
N
i
N
j
jqippq yxfxIxIL
1 1
,
~
Where,
1
1
22
12
i
i
u
uppip xpxxp
q
q
xI
1
1
22
12
j
j
V
Vppjq ypyyp
q
q
xI
Where,
xi
x
xU i
ii
1
2
1
xi
x
xU i
ii
11
2
Similarly,
yj
y
yV
j
ij
1
2
1
yj
y
yV
j
ij
11
2
Equation pqL
~
is valid only
for 1p , 1q .Further, moment kernels can be
generated using ip xI and jq xI . Computation of
ELM using pqL
~
is time consuming.
Hence, ELM can be obtained in two steps by
successive computation of 1D
th
q order moments for
each row as follows. By rewriting in separable form
N
i
iqippq YxIL
1
~
Where,
N
i
jijpiq yxfyIY
1
,
Where, iqY is the
th
q order moment of
th
i row
Since,
N
xI io
1
. Substituting this in pqL
~
results
the following
N
i
iqoq Y
N
L
1
1~
The number of ELM of order g is given
by
2
21
gg
Ntotal .
These ELM features are used for CBIR in this work.
III. SVM ALGORITHM
Support Vector Machines (SVMs) are
supervised learning methods used for image
classification. It views the given image database as
two sets of vectors in an „ n ‟ dimensional space and
constructs a separating hyper plane that maximizes the
margin between the images relevant to query and the
images not relevant to the query. SVM is a kernel
method and the kernel function used in SVM is very
crucial in determining the performance.
The basic principle of SVMs is a maximum
margin classifier. Using the kernel methods, the data
can be first implicitly mapped to a high dimensional
kernel space. The maximum margin classifier is
determined in the kernel space and the corresponding
decision function in the original space can be non-
linear. The non-linear data in the feature space is
classified into linear data in kernel space by the
SVMs. This is illustrated in Figure 1 as follows.
Fig. 1. The function „f‟ embeds the data in the
original space(a) kernel space (b) where
the nonlinear pattern now becomes
linear.
The aim of SVM classification method is to
find an optimal hyper plane separating relevant and
irrelevant vectors by maximizing the size of the
margin (between both classes). Image classification or
categorization is a machine learning approach and can
be treated as a step for speeding-up image retrieval in
large databases and to improve retrieval accuracy.
Similarly, in the absence of labeled data, unsupervised
clustering is also found useful for increasing the
retrieval speed as well as to improve retrieval
accuracy. Image clustering inherently depends on a
similarity measure, while image classification has
been performed by different methods that neither
require nor make use of similarity measures.
Faster and accurate CBIR algorithms are
required for real time applications. This can be
achieved by employing a classifier such as Support
Vector Machine (SVM). SVM is a supervised
learning method used for image classification. It
views the given image database as two sets of vectors
in an „ n ‟ dimensional space and constructs a
separating hyper plane that maximizes the margin
between the images relevant to query and the images
non relevant to the query. A CBIR system using ELM
4. Surendra Padavala,V. Venkata Rao / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2659-2664
2662 | P a g e
features and ELM features with SVM as classifier is
proposed in this work.
The basic procedure involved in the proposed
CBIR system is as follows.
Computation of ELM for the given image to form
the feature vector.
Calculation of distance measure between the
feature vectors of query and data base images.
Retrieval of similar images based on minimum
distance.
Employ SVM classifier to classify the images in
the database
Increase the number of training samples to
improve the classification efficiency.
The steps of proposed CBIR algorithm are as
follows.
Exact Legendre moments for the database
images are computed by using to form the feature
database.
Feature database is created by feature vector
Mdatabase ffff ,.., 21 for the image database
consisting of M images. Each feature vector if
for Mi ,...2,1 , is a set of ELM of order
gqp )(
databasepqi LLLf ...0100
A feature vector comprising of ELM of order
gqp )( for the query image is formulated.
querypqq LLLf ...0100
Distance measure between the feature vector
bf of the query image and each feature vector of
the database images if is calculated by using
Canberra distance
c
qid .
M
i
iq
qc
qi
ff
f
d 1
where, g is the order of
moments.
Retrieve all the relevant images to the query
image based on minimum distance
c
qid .
Train the SVM by selecting proper samples of the
database from each class. All the classes of the
image database are labeled.
Pass the class labels with their features to the
SVM classifier with the chosen kernel. The
Gaussian Radial Basis Function kernel is
considered as defined in.
Classify all the images from the database by
considering each image in the database as the
query image.
A query image may be any one of the
database images. This query image is then processed
to compute the feature vector in equation for qf .The
distance
c
qid is computed between the query image
''q and image from database ''i . The distances are
then sorted in increasing order and the closest sets of
images are then retrieved. The top “N” retrieved
images are used for computing the performance of the
proposed algorithm. The retrieval efficiency is
measured by counting the number of matches.
IV. RESULTS
Retrieval performance of the proposed CBIR
system is tested by conducting experiments on Corel
shape database, COIL-20. It consists of 20 classes of
images with each class consisting of 72 different
orientations resulting in a total of 1440 images. All
these gray scale images in the database are of the size
128×128. All images of all the 20 classes are used for
experimentation. Experiments are conducted using
MATLAB 7.2.0 with Pentium-IV, 3.00 GHz
computer and osusvm toolbox. Fig.2 shows the result
for order 4, 5, 6, 7, 8, and 9 are considered. It results
in feature vectors of dimension 9, 12, 16, 20, 25, and
30 respectively for ZM. Whereas it is 15, 21, 28, 36,
45, and 55 respectively for ELM and Comparative
average retrieval efficiency of the CBIR system for
various moments and moment orders is presented in
Table I. The Fig. 3 shows the classification efficacy of
the CBIR system for various moments and moment
orders. As the number of training samples increases,
the classification efficiency also increases. This is
presented in Table II.
TABLE I.
Metho
ds
Moment order
4 5 6 7 8 9 10
Hu‟s
Momen
ts
45.2
0
45.2
0
45.2
0
45.
20
45.20 45.20
45.
20
Zernike
Momen
ts
49.0
9
52.3
1
52.4
6
52.
57
53.62 54.36
54.
26
Propos
ed(EL
M)
68.4
7
69.3
0
78.6
8
82.
77
87.50 89.23
92.
75
As SVM is a kernel method, the kernel
function used in SVM is very crucial in determining
the performance. A kernel function needs to be chosen
with appropriate parameters. The kernel is tuned with a
pre-defined ideal kernel matrix. As a kernel method,
SVMs can efficiently handle nonlinear patterns.
However, the choice of kernel and tuning of
appropriate parameters, adapting SVMs for specific
requirements of CBIR such as learning with small
sample is a challenging problem. Average retrieval
times for order 9 for the CBIR systems based on MI,
ZM, and ELM are 0.49, 1.25, and 0.549 seconds
5. Surendra Padavala,V. Venkata Rao / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2659-2664
2663 | P a g e
respectively. It is observed that MIs are faster but
inefficient for CBIR. ELM based CBIR system is
faster and efficient compared to other moment based
CBIR systems.
TABLE II.
Methods
Number of Training Samples
4 5 6 7
Hu‟s
Moment
47.71 48.93 50.64 51.41
Zernike
Moments
82.01 83.26 84.72 86.74
Proposed(EL
M)
82.70 84.37 84.65 87.22
Fig. 2. Comparative average retrieval efficiency of the
CBIR system for various moments and moment orders
Fig. 3. Comparative classification efficiency of the
CBIR system for various moments and moment orders
V. CONCLUSION
A CBIR system using region based shape
descriptors is proposed in this work. Performance of
the proposed CBIR system is superior compared to
Bishnu et al., method on COIL-20 database in terms of
average retrieval efficiency and average retrieval time.
It is also shown that region based shape descriptors are
mainly ELMs perform better compared to other image
moments, viz., Hu‟s, ZM and LM for CBIR
applications. Further, improved classification
efficiency is also obtained by employing SVM
classifier. It is observed that the average retrieval
efficiency is increased as the moment order increases.
It is also observed that the classification efficiency of
the proposed CBIR system increased with the increase
in the number of training samples.
REFERENCES
[1] C. Wi06 and J. W. Davis, “A Perceptual
Study of Shape Metrics.”
[2] C. Rao, S. S. Kumar, and B. C. Mohan,
“Content based image retrieval using exact
legendre moments and support vector
machine,” arXiv preprint arXiv:1005.5437,
2010.
[3] N. Santhosh and M. T. M. Kumari, “Content
Based Image Retrieval Using Multiwavelet.”
[4] K. A. Kumar and Y. B. Reddy, “Content
Based Image Retrieval Using SVM
Algorithm,” International Journal of
Electrical and Electronics Engineering
(IJEEE), ISSN (PRINT), pp. 2231–5284.
[5] D. N. F. Awang Iskandar, J. A. Thom, and S.
M. Tahaghoghi, “Content-based image
retrieval using image regions as query
examples,” in Proceedings of the nineteenth
conference on Australasian database-Volume
75, 2008, pp. 38–46.
[6] A. Jain, R. Muthuganapathy, and K. Ramani,
“Content-based image retrieval using shape
and depth from an engineering database,” in
Advances in Visual Computing, Springer,
2007, pp. 255–264.
[7] R. R. Eamani and G. H. Prasad, “Content-
Based Image Retrieval Using Support Vector
Machine in digital image processing
techniques.”
[8] D. Zhang and G. Lu, “Content-Based Shape
Retrieval Using Different Shape Descriptors:
A Comparative Study.,” in ICME, 2001.
[9] K. Rieck, P. Laskov, and K.-R. Müller,
“Efficient algorithms for similarity measures
over sequential data: A look beyond
kernels,” in Pattern Recognition, Springer,
2006, pp. 374–383.
[10] Y. Aytar and A. Zisserman, “Enhancing
Exemplar SVMs using Part Level Transfer
Regularization,” 2012.
[11] D. N. M. Cardoso, D. J. Muller, F.
Alexandre, L. A. P. Neves, P. M. G.
Trevisani, and G. A. Giraldi, “Iterative
Technique for Content-Based Image
Retrieval using Multiple SVM Ensembles.”
J. Clerk Maxwell, A Treatise on Electricity
and Magnetism, 3rd ed., vol. 2. Oxford:
Clarendon, 1892, pp.68–73.
[12] A. Marakakis, N. Galatsanos, A. Likas, and
A. Stafylopatis, “Relevance Feedback for
Content-Based Image Retrieval Using
Support Vector Machines and Feature
6. Surendra Padavala,V. Venkata Rao / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2659-2664
2664 | P a g e
Selection,” in Artificial Neural Networks–
ICANN 2009, Springer, 2009, pp. 942–951.
[13] M. Vorobyov, “Shape Classification Using
Zernike Moments,” 2011.
Dr. V.Venkata Rao has his M.E in
Microwave and Radar Engineering from
Osmania University Hyderabad. He
obtained his PHD from JNTU Hyderabad.
Presently he is working as Professor and
HOD of ECE (Electronics and Communication
Engineering) in Narasaraopeta Engineering College,
Narasaraopeta, Guntur Dt, Andhra Pradesh, India.
He has over 19 years of experience in industry R&D
and teaching. He has published and presented 40
research papers in reputed international /national
journals and conferences .He is a life member of
ISTE. His research area includes GPS image
processing and embedded systems.
Surendra padavala received Bachelor‟s
Degree in Electronics and Communication
Engineering from JNTU, Hyderabad. He is
Pursuing his M.Tech in Digital Electronics
and Communication System in JNTU,
Kakinada.
His current research interests are Digital image
Processing, Embedded systems and Communication
systems