identify criminal or pedophile in online child pornography images and video is a challenging task when the faces and other distinguish features are not shown. To address these kind of problems, the system of recogniti...
详细信息
ISBN:
(纸本)9781509016488
identify criminal or pedophile in online child pornography images and video is a challenging task when the faces and other distinguish features are not shown. To address these kind of problems, the system of recognition using androgenic hair pattern is being developed. The system of recognition presented in this paper used three main parts of methods, pre-processing methods, feature extraction with Haar Wavelet Transform level 1 decomposition and classification using Nearest Neighbor. Using 400 images of lower right legs with controlled condition, the system was analyzed. The Haar Wavelet Transformation for level 1 decomposition gave 83.48 % of average recognition precision when using 10-fold cross validation with nearest neighbor classification.
This paper presents an application of LabVIEW and camera interface which is used for taking attendance in classroom. The system use a camera which is connected to PC on USB interface and attached to each and every cla...
详细信息
ISBN:
(纸本)9781467385879
This paper presents an application of LabVIEW and camera interface which is used for taking attendance in classroom. The system use a camera which is connected to PC on USB interface and attached to each and every classroom for taking snap of students presented. LabVIEW graphical programming environment is a tool for realizing the image acquisition and processing. This software has several advantages: simple implementation, modularity, flexibility, attractive user interface and possibility to develop very easy new features. Face recognition and machine vision applications in automatic inspection of various electronic modules can also be implemented using given algorithm.
This Paper proposes a novel method for the blind detection of image pre-processing techniques by means of statistical patternrecognition in image forensics. The technique is intended to detect sensor intrinsic pre-pr...
详细信息
ISBN:
(纸本)9781467389174
This Paper proposes a novel method for the blind detection of image pre-processing techniques by means of statistical patternrecognition in image forensics. The technique is intended to detect sensor intrinsic pre-processingsteps as well as manually applied filters. We have exemplary chosen 6 pre-processing filters with different parameter settings. The concept utilizes 29 image features which are supposed to allow for a reliable model creation during supervised learning. The evaluation of the trained models indicates average accuracies between 82.50 and 94.53%. The investigation of image data from 8 sensors leads to the detection of credible pre-processing filters. Those results adumbrate that our method might be suitable to prove the authenticity of the data origin and the integrity of image data based on the detected preprocessing techniques. The preliminary evaluation for manually applied filters yields recognition accuracies between 39.09% (14 classes) and 53.33% (7 classes).
Imposters gain unauthorized access to biometric recognition systems using fake biometric data of the legitimate user termed as spoofing. Spoofing of face recognition systems is done by photographs, 3D models and video...
详细信息
ISBN:
(纸本)9781450347563
Imposters gain unauthorized access to biometric recognition systems using fake biometric data of the legitimate user termed as spoofing. Spoofing of face recognition systems is done by photographs, 3D models and videos of the user. Attack video contains noise from the acquisition process. In this work, we use noise residual content of the video in order to detect spoofed videos. We take advantage of wavelet transform for representing the noise video. Samples of the noise video, termed as visual rhythm image is created for each video. Local Binary pattern (LBP) and uniform Local Binary pattern (LBPu2) are extracted from the visual rhythm image followed by classification using Support Vector machine (SVM). Large size of video from which a number of frames are used for analysis results in huge execution timing. In this work the spoof detection algorithm is applied on various levels of subsections of the video frames resulting in reduced execution timing with reasonable detection accuracies.
Multiple instance learning (MIL) is a form of weakly supervised learning for problems in which training instances are arranged into bags, and a label is provided for whole bags but not for individual instances. Most p...
详细信息
ISBN:
(纸本)9781467389105
Multiple instance learning (MIL) is a form of weakly supervised learning for problems in which training instances are arranged into bags, and a label is provided for whole bags but not for individual instances. Most proposed MIL algorithms focus on bag classification, but more recently, the classification of individual instances has attracted the attention of the patternrecognition community. While these two tasks are similar, there are important differences in the consequences of instance misclassification. In this paper, the scoring function learned by MIL classifiers for the bag classification task is exploited for instance classification by adjusting the decision threshold. A new criterion for the threshold adjustment is proposed and validated using 7 reference MIL algorithms on 3 real-world data sets from different application domains. Experiments show considerable improvements in accuracy over these algorithms for instance classification. In some applications, the unweighted average recall increases by as much as 18%, while the F-1-score increases by 12%.
The problem of emotion state recognition using the sigma-pi artificial neural network is considered. The specific feature of the considered network is the presence of two different types of activation functions: sigmo...
详细信息
ISBN:
(纸本)9781509037360
The problem of emotion state recognition using the sigma-pi artificial neural network is considered. The specific feature of the considered network is the presence of two different types of activation functions: sigmoid and bell-shaped. A learning algorithm for the sigma-pi network is proposed. This algorithm is characterized by high approximation accuracy especially for nonlinear processes in real time. Training and testing network on image dataset was made.
In ISO TC249 conference, tongue diagnosis has been one of the most active research and their objectifications has become significant with the help of numerous statistical and machinelearning algorithm. Color informat...
详细信息
ISBN:
(数字)9781510604315
ISBN:
(纸本)9781510604315
In ISO TC249 conference, tongue diagnosis has been one of the most active research and their objectifications has become significant with the help of numerous statistical and machinelearning algorithm. Color information of substance or tongue body has kept valuable information regarding the state of disease and its correlation with the internal organs. In order to produce high reproducibility of color measurement analysis, tongue images have to undergo several procedures such as color correction, segmentation and tongue's substance-coating separation. This paper presents a novel method to recognize substance and coating from tongue images and eliminate the tongue coating for accurate substance color measurement for diagnosis. By utilizing Hue, Saturation, Value (HSV) color space, new color-brightness threshold parameters have been devised to improve the efficiency of tongue's substance and coating separation procedures and eliminate shadows. The algorithm offers fastprocessing time around 0.98 seconds for 60,000 pixels tongue image. The successful tongue's substance and coating separation rate reported is 90% compared to the labelled data verified by the practitioners. Using 300 tongue images, the substance Lab color measurement with small standard deviation had revealed the effectiveness of this proposed method in computerized tongue diagnosis system.
Object recognition and texture identification are the two main application of sonar imageprocessing. It consists of 3 main steps such as image segmentation, object recognition and pattern identification. Before all t...
详细信息
ISBN:
(纸本)9781467367257
Object recognition and texture identification are the two main application of sonar imageprocessing. It consists of 3 main steps such as image segmentation, object recognition and pattern identification. Before all these steps, some of the preprocessing procedure are included such as filtering of noise, edge detection etc. Many edge detection operators are available and also a mathematical modeling called morphological processing is also very useful for edge detection. Color images generally have more visual perception over gray scale and monochrome images. Therefore in this paper the standard edge detection techniques along with the morphological processing are carried out. Comparison of the result along with the pseudo colored image proves that the morphological processing along with edge detection techniques gives more information than another one. Subjective analysis tells that, this approach mainly useful for the sonar image objects consist of larger shadow regions.
The proceedings contain 108 papers. The special focus in this conference is on Smart Trends in Information Technology and Computer Communications. The topics include: Real time sign language processing system;nano sca...
ISBN:
(纸本)9789811034329
The proceedings contain 108 papers. The special focus in this conference is on Smart Trends in Information Technology and Computer Communications. The topics include: Real time sign language processing system;nano scale dual material gate silicon on nothing junctionless MOSFET for improving short channel effect and analog performance;an improved image compression technique using Huffman coding and FFT;comparison and analysis of cuckoo search and firefly algorithm for image enhancement;an exploration of miscellaneous palm print recognition modalities;plugin for instantaneous web page rejuvenation and translation;issues and requirements for successful integration of semantic knowledge in web usage mining for effective personalization;image fusion based on the modified curvelet transform;a case study of Indian hospitality and tourism sector;a comparative study of various algorithms in wireless networking;research and analysis of open security issues in communication for wireless sensor network;empirical analysis of image segmentation techniques;sentiment analysis at document level;an approach to sentiment analysis on unstructured data in big data environment;lung cancer diagnosis by hybrid support vector machine;multi chromatic balls with relaxed criterion to detect larger communities in social networks;image segmentation and object recognition using machinelearning;proposed algorithms to the state explosion problem;predicting software maintainability using object oriented dynamic complexity measures;security enhancement of blowfish block cipher and comparative analytical study for news text classification techniques applied for stock market price extrapolation.
QR codes have become useful and efficient data storage tools which are exploited in many commercial applications including product tracking, website redirection, etc. A QR code is a 2-dimensional barcode localised thr...
详细信息
ISBN:
(纸本)9781509016488
QR codes have become useful and efficient data storage tools which are exploited in many commercial applications including product tracking, website redirection, etc. A QR code is a 2-dimensional barcode localised through three finder patterns (three squares characterised by a series of alternative black and white modules at ratios 1: 1: 3: 1: 1) placed in its three corners. QR codes are generally placed in different environments with complex backgrounds (overlapping text, pictures, etc.), and are often captured under unfavourable conditions such as poor lighting. These factors can significantly affect the recognition ability and thus may hinder correct QR code localisation and identification. In order to appropriately address these issues, in this paper, we present a QR code recognition algorithm based on histogram of oriented gradients (HOG) features combined with support vector machine (SVM) classifiers. Using HOG, we extract gradient features of each extracted pattern. Subsequently, the obtained features are passed to two linear SVM classifiers, one trained with finder patterns and one trained with alignment patterns, to remove irrelevant patterns. QR codes are then conveniently localised according to a pattern closeness constraint. In the laststage, the captured code is enhanced by applying a perspective correction followed by image binarisation and morphological processing. Finally, the patterns are decoded using an accurate 2-d barcode decoder. Our proposed approach is designed for an embedded systems using a Raspberry Pi equipped with a HD camera and a small robot carrying the equipment.
暂无评论