The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We identify a novel instance of the background subtraction problem that focuses on extracting near-field foreground objects captured using handheld cameras. Given two user-generated videos of a scene, one with and the other without the foreground object (s), our goal is to efficiently generate an output video with only the foreground object (s) present in it. We cast this challenge as a spatio-temporal...
One of the important steps in image fusion is image registration. The process of determining the spatial transformation that maps the points in the target image to the points in the source image is known as image registration. Various image registration approaches can be classified as area, feature and transform domain based. Choice of approach depends on image contents and application. Area based...
Different features are extracted for Pattern Recognition using an efficient algorithms like Scale Invariant Feature Transform, Rotation invariant Radon Transform and extracting statistical features of a texture image. Support vector machine with RBF kernel in Weka is used in this paper for classification. This paper shows method to classify the clothing texture patterns like strips, plaid, pattern...
Classification of Videos based on their content is becoming more and more essential everyday because of the vast amount of video data becoming available. Various Feature Extraction and data mining techniques can be used to perform Video Classification. This paper uses edge detection techniques such as Object Extraction and Canny Edge Detection (using Sobel, Prewitt and Robert's operator) to extract...
One of major key component in Khmer language processing is how to transform Khmer texts into series of separated Khmer words. But unlike in Latin languages such as English or French; Khmer language does not have any explicit word boundary delimiters such as blank space to separate between each word. Moreover, Khmer language has more complex structure to word form which causes Khmer Unicode standard...
A novel stroke-based method to localize text in unconstrained natural scene images is proposed. Firstly, in order to improve the edge detection in tough situations where the texts are partially occluded or noisy, we use stroke width histogram as guidance to generate a series of superpixels. Secondly, we present a novel way of using distance transform and sobel operator to extract character skeleton...
One-bit transform (1BT), followed by binary motion estimation, is an effective alternative for accelerating traditional 8-bit motion estimation (ME) in video coding. The underlining assumption in the design of 1BT methods is that natural videos contain noise. For screen content videos, however, the special characteristics (e.g. screen content is typically noise-free) can be exploited to further improve...
Iris recognition is highly stable, accurate and secure verification technology for biometric authentication. The main focus of this paper, obtain a good identification percentage based on human iris. Further the image is successfully recognized when some pixels are missing or image is distorted. In the paper, counter propagation neural network is used for iris recognition. The CPN is a combination...
In order to avoid the over-segmentation problem caused by original watershed transform and improve the segmentation precision of Mycobacterium Tuberculosis (MTB) images, a novel segmentation algorithm is proposed based on automatic-marker watershed transform. The automatic marker is accomplished by Gaussian weighted adaptive threshold segmentation and local minimum points search within gradient image...
The technology of fingertip tracking is widely used in robot control field, the fingertip of robot can be accurately controlled. But the fingertip tracking is very complicated, there is much uncertainty for the speed and direction during the movement of fingertip, so the fingertip tracking technology becomes one key point in the robot control field. In the early, the feedback tracking algorithm was...
Most of the state-of-the-art methods for action recognition are very complex and variant to the geometric transformation like scaling, translation and rotation. Cuboid based method required all frames to extract the cuboid of action that's why cuboid based methods are expensive. Other methods use contour based approach for feature representation which is not robust to noise. So we require a very fast...
Over the past few decades, a considerable amount of literature has been published on shape classification. Since classification of well-segmented shapes has become easy to achieve, a number of recent studies have emphasized the importance of robustness to noise and deformations. So in this paper, we undertake the task of classifying similar & noisy binary shape images, using a biologically inspired...
Information extraction from signals has been a long time research topic and numerous signal transforms have been defined for the same purpose. In this paper, a comparative study of various signal transforms on basis of time-frequency (TF) resolution, cross-terms suppression and maximum information content has been presented. The transforms considered for the analysis are Frequency domain transforms,...
With the advent of sophisticated image editing softwares, it has become easy to forge digital images. Copy-move is a very common technique for image forgery; retouching tools are applied along with it which makes copy-move invisible to the naked eye. An image can be forged using copy-move technique to duplicate or hide undesirable objects. When some object is copy-moved with the help of geometrical...
Condition monitoring is a vital task in the maintenance of industry machines. This paper proposes a reliable condition monitoring method using a genetic algorithm (GA) which selects the most discriminate features by taking a transformation matrix. Experimental results show that the features selected by the GA outperforms original and randomly selected features using the same k-nearest neighbor (k-NN)...
Partially constrained human recognition through periocular region has emerged as a new paradigm in biometric security. This article proposes Phase Intensive Global Pattern (PIGP): a novel global feature based on variation of intensity of a pixel-neighbours with respect to different phases. The feature thus extracted is claimed to be rotation invariant and hence useful to identify human from images...
Recommender systems provide recommendations on variety of personal activities or relevant items of interest. They can play a significant role for E-commerce and in daily personal decisions. However, existing recommender systems still face challenges in dealing with sparse data and still achieving high accuracy and reasonable performance. The issue with missing rating leads to inaccuracies when trying...
Wireless channels are highly prone to eavesdropping. To mitigate this problem encryption systems are used. Analog scrambling systems achieve confidentiality through modification of analog signals. Unfortunately, current literatures lack a thorough security analysis of these systems. In this paper security of hopping window time domain scrambler is investigated. It is shown that cipher-text of these...
Data compression algorithms are used in process plants to store and transmit data for analysis purposes. Amount of data is increasing in process plants due to advances in automation and process monitoring technologies. Process data historians are used in plants to store, manage, retrieve and analyze process data. Process data historians use data compression algorithms to effectively manage large amount...
The histogram specification turns a shape of a histogram into that we want to specify. This technique can be applied usefully in various image processing fields such as machine vision. However, the histogram specification technique has its basic limits. For instance, the histogram does not have location information of pixels. Also, the accuracy of specification drops because of quantization error...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.