The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a simple method for the facial expression detection to identify the normal and unusual of expression variations of the human face is proposed. The approach uses the binary edge image to present the shape of facial expression. The modified Hausdorff distance measure is adapted to our approach to compare between the unusual and normal face expression. In our algorithm, it just needs to...
In order to detect the location of smoke in the Measuring System for Ground Shell Dispersion (MSGSD), presented an improved algorithm for the Background Subtraction. Focused on introducing design of the image detection algorithm. The results show that the system can quickly, accurately and effectively detect the location of the smoke.
Image stitching are ideally suited for applications such as image stabilization, summarization, and the creation of panoramic mosaics. This paper proposes a approach to stitch images fast and with high quality.Image alignment algorithms can discover the correspondence relationships among images with varying degrees of overlap. In this process, they uses SIFT to look for the trait points, and uses...
Document image distortion often appears when captured by the camera; this may induce recognition mistakes by OCR. In this paper, a robust and fast dewarping method of document images is proposed. Compared with traditional method, the computation of the correction baseline and the distance for vertical displace in this method is independent of the document's content, so it can guarantee the precision...
With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the multimedia. This paper considers the problem of embedding a binary watermark in a gray-level image using the concept of Visual Cryptography (VC). This paper proposes a watermarking scheme which offers better security than Hwang's method, so that, attackers will not be able to...
Based on the binary image, the thesis proposes a suit of algorithm for the license plate intelligent recognition system serving the expressway toll collection system. Firstly, the algorithm of first difference combined with the method of determining the threshold of binarization via accumulating pixel spots is used in pre-processing. Secondly, taking advantage of the horizontal texture characteristic...
Forest fire, if not detected early enough, can cause great damage. In order to reduce it, it is important to detect fire as soon as possible and take actions to it. In this paper we propose a new image detection method for identifying fire in videos. The method analyzes the frame-to-frame change in given features of potential fire regions. These features are color, boundary roughness and skewness...
Gaussian mixture modeling is a recent approach in texture analysis and is used to model image textures. Texture is modeled using a mixture of Gaussian distributions, which capture the local statistical properties of the texture. The mixture parameters are estimated using Expectation Maximization algorithm. This algorithm finds the maximum likelihood estimate of the parameters of an underlying distribution...
In this paper, a three tier strategy is suggested to recognize the hand-printed characters of Devanagari script. In primary and secondary stage classification, the structural properties of the script are exploited to avoid classification error. The results of all the three stages are reported on two classifiers i.e. MLP and SVM and the results achieved with the later are very good. The performance...
As security is a major concern in present times, reliable authentication systems are in great demand. A biometric trait like the vascular pattern on the back of the hand of a person is unique and secure. A biometric system working on this principle often fails to authenticate a person either because of the varying hand posture or due to an injury altering the vein pattern. In this paper we propose...
This paper addresses a novel algorithm for face recognition using neural networks trained by Image patterns those are achieved from Gabor features. The system commences on convolving some morphed images of particular face with a series of Gabor filter co-efficient at different scales and orientations. Two novel contributions of this paper are: contribution of morphing and using binary patterns of...
User authentication and personal privacy is an important aspect of reliable information system. Biometric recognition with cryptography provides a reliable solution for user authentication and identity management. This paper proposes a unique way of creating biometric template using palm-dorsa vein pattern and enhancing its security level by encrypting with elliptic hashing, called biometric encrypted...
As a crucial procedure in which images are divided into distinct non-overlapping regions and the interested objects are extracted in the process of image analyzing and image recognizing, image segmentation plays a considerable role in extracting medical lesions, measuring specific tissues, and realizing three-dimensional reconstruction. In this paper, integrated with the studies of dental micro-CT...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.