The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a steganography method using the digital images. Here, we are embedding the data which is to be secured into the digital image. Human Visual System proved that the changes in the image edges are insensitive to human eyes. Therefore we are using edge detection method in steganography to increase data hiding capacity by embedding more data in these edge pixels. So, if we can increase...
In the present work, we propose a new weighted fusion scheme using Daubechies complex wavelet transform (DCxWT). Shift sensitivity and lack of phase information in real valued wavelet transforms motivated to use DCxWT for multimodal medical image fusion. It was experimentally found that shift invariance and phase information properties improve the performance of image fusion in complex wavelet domain...
In food handling industry, grading of granular food materials is necessary because samples of material are subjected to adulteration. In the past, food products in the form of particles or granules were passed through sieves or other mechanical means for grading purposes. In this paper, analysis is performed on basmati rice granules; to evaluate the performance using image processing and Neural Network...
The advent of the internet age has led to the increase of prominent network security issues. Information encryption has long been a method used for information security. With the rapid development of parallel computing capacities of computer hardware, this method alone could not be trusted to ensure security by increasing the key sizes, thus bringing in the information hiding techniques into the scenario...
Moving object segmentation is an important step toward development of any computer vision systems. In the present work, we have proposed a new method for segmentation of moving objects, which is based on single change detection method applied on Contourlet coefficients of two consecutive frames. We have chosen contourlet transform as it has high directionality and represents salient features of image...
One of the emerging areas in image processing is color image enhancement. It is the process of improving image quality such as human visibility, edge sharpening, improving the contrast, etc. It is mainly applicable in medical images, satellite images. An algorithm for color image enhancement has been proposed that perform enhancement in red, green, blue components separately. These components are...
Impulse noise is a spark that affects the contents of digital images. It also occurs during image acquisition, transmission due to malfunctioning of pixel elements in the camera sensors, faulty memory locations, timing errors in analog to digital conversion and bit errors during transmission. Removal of impulse noise involves detection followed by filtering mechanism. There are two types of impulse...
This paper presents a new method for vehicle license plate localization. The proposed method uses wavelet decomposition for localizing the license plate. We first preprocess the image by masking the non-license plate border with the prior knowledge of the distance of the vehicle. We then use the unique property of sudden and a frequent transition which takes place across characters of the license...
Biometric palmprint identification is a technology used for identification and verification of palmprints using image acquisition, preprocessing, feature extraction and template matching. Even though the existing palmprint authentication systems have several advantages, there exist many disadvantages such as less accuracy, computational complexity, implementation expense, high resolution and storage...
Unimodal biometric systems have to contend with a variety of problems such as noisy data, intra-class variations, spoof attacks, and unacceptable error rates. Some of these limitations can be addressed by multimodal biometric systems that integrate multiple sources of human information to identify as well to provide ultra secure system for the information. The main objective of the proposed system...
In image processing, bi-cubic pre-processing is frequently chosen over bi-linear pre-processing. Images sampled again with bicubic pre-processing are better and have fewer pre-processing obstacles. In linear methods, multiple pre-processing kernels of definite size have been taken. Such linear pre-processing techniques were inserted without concentration on the edges. Thus, they can fetch obstacles,...
Paper presents performance comparison of palm print identification techniques based on fractional coefficients of transformed palm print edge image using three transforms namely Cosine., Haar and Kekre. In transform domain., the energy of image gets concentrated towards low frequency region; this characteristic of image transforms is used here to reduce the feature vector size of palm print images...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.