Quality assessment of Purple Fringing Aberrated (PFA) images remains an unsolved problem because the original untainted natural image of the scene is not available at the point of analysis. As a result, the problem as...
详细信息
ISBN:
(纸本)9789813290884;9789813290877
Quality assessment of Purple Fringing Aberrated (PFA) images remains an unsolved problem because the original untainted natural image of the scene is not available at the point of analysis. As a result, the problem assumes the form of a blind assessment. This PFA is a false coloration localized around the edge regions where the contrast differential is high. One can, therefore, surmise that if this coloration is largely homogeneous in the chrominance space, the edge is expected to be crisp and the image sharp and clear. However, if this coloration pattern is diverse in the chrominance space, the edges will be fuzzy and this, in turn, will have an impact on the visual clarity of the image. The fringe diversity, therefore, becomes a measure of PFA image quality, provided the fringes are distributed in several parts of the image. This diversity has been captured by first characterizing the chrominance space spanned by the PFA pixels and then using the eigenvalue ratio as a measure of color diversity.
In this paper, we present a novel problem of handwritten word spotting in cluttered environment where a word is cluttered by a strike-through with a line stroke. These line strokes can be straight, slant, broken, cont...
详细信息
ISBN:
(纸本)9789813292918;9789813292901
In this paper, we present a novel problem of handwritten word spotting in cluttered environment where a word is cluttered by a strike-through with a line stroke. These line strokes can be straight, slant, broken, continuous, or wavy in nature. Vertical Projection Profile (VPP) feature and its modified version, which is the combinatorics Vertical Projection Profile (cVPP) feature is extracted and aligned by modified Dynamic Time Warping (DTW) algorithm. The dataset for the proposed problem is not available so we prepared our dataset. We compare our method with Rath and Manmath [6], and PHOCNET [17] for handwritten word spotting in the presence of strike-through, and achieve better results.
With the increase in the need for video-based navigation, the estimation of 3D coordinates of a point in space, using images, is one of the most challenging tasks in the field of computervision. In this work, we prop...
详细信息
ISBN:
(纸本)9789813290884;9789813290877
With the increase in the need for video-based navigation, the estimation of 3D coordinates of a point in space, using images, is one of the most challenging tasks in the field of computervision. In this work, we propose a novel approach to formulate the triangulation problem using Sampson's distance, and have shown that the approach theoretically converges toward an existing state-of-the-art algorithm. The theoretical formulation required for achieving optimal solution is presented along with its comparison with the existing algorithm. Based on the presented solution, it has been shown that the proposed approach converges closely to Kanatani-Sugaya-Niitsuma algorithm. The purpose of this research is to open a new frontier to view the problem in a novel way and further work on this approach may lead to some new findings to the triangulation problem.
This work proposes Block-wise uniform local binary pattern histogram (BULBPH) followed by kernel discrimination analysis (KDA) as descriptor for palmprint recognition. BULBPH provides distribution of uniform patterns ...
详细信息
ISBN:
(纸本)9789813290884;9789813290877
This work proposes Block-wise uniform local binary pattern histogram (BULBPH) followed by kernel discrimination analysis (KDA) as descriptor for palmprint recognition. BULBPH provides distribution of uniform patterns (such as line and wrinkles) in local region and can be better used as palmprint features. KDA is applied on BULBPH to reduce dimension and enhance discriminative capability using chi-RBF kernel. The experiments are conducted on four palmprint databases and performance is compared with related descriptors. It is observed that KDA on BULBPH descriptor achieves more than 99% accuracy with 4.04 decidability index on four palmprint databases.
Terrorism is on an ever-increasing rise and is one of the major threats the world is facing today. Terrorist attacks mostly take place in crowded areas such as railway stations and airports. They involve the use of ex...
详细信息
ISBN:
(纸本)9789813290884;9789813290877
Terrorism is on an ever-increasing rise and is one of the major threats the world is facing today. Terrorist attacks mostly take place in crowded areas such as railway stations and airports. They involve the use of explosives which are placed inside suspicious abandoned objects like bags, suitcases, etc. In this paper, we are proposing a model that can classify abandoned and unattended objects separately and backtrack to identify the owner as well as find the last known location of the owner in a social environment using visual surveillance feed in real time for rapid alert and action.
Detecting irregularity in an image or video is an important task in quality control or automatic visual inspection. This paper presents an image embedding technique for detecting an irregularity or abnormality in imag...
详细信息
ISBN:
(纸本)9789813292918;9789813292901
Detecting irregularity in an image or video is an important task in quality control or automatic visual inspection. This paper presents an image embedding technique for detecting an irregularity or abnormality in images. This can further be utilized in image screening application. In the proposed architecture, deep adversarial autoencoder is trained to extract the features from images. Using these features and skip-gram model, we develop the image2vec architecture to capture contextual probability in an image. Various score aggregation techniques are explored and its performance is reported. As a case study, we present a scenario of foreign body object detection in clinical-grade X-ray images. The proposed approach is found to correctly detect and localize abnormality in images.
image super resolution is a signal processing technique to post-process a captured image to retrieve its high-resolution version. Majority of the conventional super resolution methods fail to perform in presence of no...
详细信息
ISBN:
(纸本)9789813292918;9789813292901
image super resolution is a signal processing technique to post-process a captured image to retrieve its high-resolution version. Majority of the conventional super resolution methods fail to perform in presence of noise. In this paper, a noise robust reconstruction based single image super resolution (SISR) algorithm is proposed, using alternating directionmethod of multipliers (ADMM) and plug-and-play modeling. The plug-and-play prior concept is incorporated to the two variable update steps in ADMM. Therefore, a fast SISR model and a denoiser are used in ADMM to implement the proposed robust SISR scheme. The experimental results show that the noise performance of the proposed approach is better than the conventional methods. The impact of parameter selection on the performance of the algorithm is experimentally analyzed and the results are presented.
We deal with the problem of multi-task learning (MTL) in the context of performing multiple related visual dense prediction tasks from single image inputs. The soft-sharing-based deep MTL Convnets (CNN) have separate ...
详细信息
Copy-move forgery is a well-known image forgery technique. In this image manipulation method, a certain area of the image is replicated and affixed over the same image on different locations. Most of the times replica...
详细信息
ISBN:
(纸本)9789813292918;9789813292901
Copy-move forgery is a well-known image forgery technique. In this image manipulation method, a certain area of the image is replicated and affixed over the same image on different locations. Most of the times replicated segments suffer from multiple post-processing and geometrical attacks to hide sign of tampering. We have used block-based method for forgery detection. In block-based proficiencies, image is parted into partially overlapping blocks. Features are extracted corresponding to blocks. In the proposed scheme, we have computed Gray-Level Co-occurrence Matrix (GLCM) for blocks. Singular Value Decomposition (SVD) is applied over GLCM to find singular values. We have calculated Local Binary Pattern (LBP) for all blocks. The singular values and LBP features combinedly construct feature vector corresponding to blocks. These feature vectors are sorted lexicographically. Further, similar blocks discovered to identify replicated section of image. To ensure endurance of the proposed methods, Detection Accuracy (DA), False Positive Rate (FPR), and F-Measure are calculated and compared with existing methods. Experimental results establish the validity of proposed scheme for precise detection, even when meddled region of image sustain distortion due to brightness change, blurring, color reduction, and contrast adjustment.
Mushroom is an important fungus which contains a good source of vitamin B and a large amount of protein when compared to all other vegetables. It helps to prevent cancer, useful in weight loss and increases the immuni...
详细信息
ISBN:
(纸本)9789813290884;9789813290877
Mushroom is an important fungus which contains a good source of vitamin B and a large amount of protein when compared to all other vegetables. It helps to prevent cancer, useful in weight loss and increases the immunity power of human. On the other hand, some mushrooms are toxic and can prove dangerous if we eat them. Therefore, it is a prominent task to differentiate, the edible and poisonous mushrooms. This paper focuses on developing a method for classification of mushroom using its texture feature, which is based on the machine learning approach. The performance of the proposed approach is 76.6% by using SVM classifier, which is found better with respect to the other classifiers like KNN, Logistic Regression, Linear Discriminant, Decision Tree, and Ensemble classifiers.
暂无评论