Image Splicing Detection Based on Texture Consistency of Shadow

Size: px
Start display at page:

Download "Image Splicing Detection Based on Texture Consistency of Shadow"

Transcription

1 Image Splicing Detection Based on Texture Consistency of Shadow 1 Yongzhen Ke, Weidong Min, 3 Xiuping Du, 4 Dandan Li 1,,4 School of computer science and software engineering, Tianjin Polytechnic University, China, keyongzhen@tjpu.edu.cn *3 School of internet education, Tianjin University, China, duxiuping@tju.edu.cn Abstract This paper takes the advantage of the property that the shadow will not obviously change the surface texture of object and presents a method based on texture feature consistency of shadow for image splicing detection. First, texture features of shadows areas and its adjacent lit areas are extracted. Then, the Euclidean distance is used to measure the similarity of texture features. Last, a texture features fusion framework integrating multiple texture cues for forgery detection is proposed to improve algorithm performance, robustness, and adaptability. Experimental results show that the algorithm is simple and effective. 1. Introduction Keywords: Image Forensic, Texture, Shadow, Feature Fusion Nowadays, digital cameras are playing an important role in our daily life as well as in forensic affairs. However, the sophisticated digital image processing software, such as Photoshop and ACDSee, have made image tampering much easier to operate but harder to detect. Today, splicing operation is widely used under various conditions. Especially in recent years, numerous photos in photography competition are exposed to be synthesized. This urges us to find a ways to distinguish the authentic and tampered photos. In order to solve this problem, digital image forensic technology emerges at a historic moment. As a digital image forensic technology, blind forensic technology is becoming a new hotspot in the field of multimedia security with a wide application prospect because of its advantages of identifying image authenticity and source without relying on any signature extraction or pre-embedded information. At present, the detection algorithm for image splicing can be roughly divided into two categories: detection algorithm based on authenticity of the local area and detection algorithm based on source inconsistency. The former contains many detection algorithms. Farid [1] used higher-order spectral analysis to analyze the high order coefficient generated by splicing operation, after that Ng et al. [] used bicoherence along with other features to detect the high order correlation introduced by splicing. Hilbert-Huang transformation, Discrete Cosine Transform and wavelet decomposition were also used in literature [3-5]. Lipsiz law [6] and phase consistency method [7] can be used to measure the signal smoothness or sharpness according to wavelet coefficients. Hui Fan et al.[8] proposed a blurred image tampering detection method using hommonorphic filtering in dyadic contourlet domain to enhance the blurred edges. Some algorithms also used the illumination direction [9, 10] and image chroma [11] to detect the image. Approaches based on the consistency of imaging source are based on the fact that natural images are usually obtained through data acquisition devices, which introduce uniform characteristics to the entire image, and henceforth the variation in the local characteristics across the image can be used to detect tampering. The characteristics of the lens [1], sensor pattern noise [13], color filter array interpolation [14-16], and consistency of camera response function [17, 18] have been used to detect image forgeries. Shadows provide important visual cues for depth, shape, contact, and lighting in our perception of the world. Shadow as an important feature of the digital image, has already been used in image splicing detection [19, 0]. Methods detecting photographic composites based on shadow geometry and shadow photometry are introduced in literature [19]. Qiguang Liu [0] proposed a framework for detecting tampered digital images based on photometric consistency of illumination in shadows. The approach proposed in this paper is based on both the assumption that the shadow as well as main body is copied and pasted from another image during forgery and the property that the shadow will not obviously change the surface texture of object. In other words, the shadow areas with their adjacent non-shadow area should have the same or similar texture. So, the texture in the shadow area is Journal of Convergence Information Technology(JCIT) Volume8, Number4,Feb 013 doi: /jcit.vol8.issue4.101

2 not consistent with that in the original lit area in tamper image. Based on the above mentions, this paper presents a method based on texture feature consistency of shadow for image splicing detection. First, we extracted texture features of shadows areas and its adjacent lit areas. Then, the Euclidean distance is used to measure the similarity of texture features. Last, texture features fusion is used to improve performance, robustness, and adaptability. This paper is organized as follows: Section describes the proposed algorithm in details. The valuable experiment results are shown in Section 3. Section 4 concludes this paper.. The proposed image splicing detection algorithm based on texture consistency of shadow.1. The principle of texture consistency of shadow Shadows contain a wealth of information in digital images. There are many important visual cues of the shadow [1, ] : a) Shadow is dark but does not significantly change either the color or the texture of the background covered. b) Shadow is always associated with the object that casts and the behaviour of that object (e.g. if a person opens his arms, the shadow will reflect the motion and the shape of the person). c) Shadow shape is the projection of the object shape on the background. For an extended light source (not a point light source), the projection is unlikely to be perspective. d) Both the position and strength of the light source are known. e) Shadow boundaries tend to change direction according to the geometry of the surfaces on which they are cast. Our approach takes the advantage of the property that the shadow will not obviously change the surface texture of object. As shown in Figure 1, the shadow area (S) of the real scene should have the same or similar texture features with adjacent non-shadow area (N). We extract LBP texture feature (see figure ) and difference matrix texture feature (see figure3) of digital images for non-shadow area and shadow area. Figure 1. Images with shadow where N represents the non-shadow area and S represents the shadow area (a) (b) (c) (d) (a) LBP of non-shadow area of left image in Figure 1.(b)LBP of shadow area of left image in Figure 1. (c) LBP of non-shadow area of right image in Figure 1.(d)LBP of shadow area of right image in Figure 1. Figure. Local Binary Pattern (LBP) of different image for non-shadow area and shadow area

3 (a) (b) (c) (d) (a) Difference matrix of non-shadow area of left image in Figure 1. (b)difference matrix of shadow area of left image in Figure 1. (c) Difference matrix of non-shadow area of right image in Figure 1.(d)Difference matrix of shadow area of right image in Figure 1. Figure 3. Difference matrix of different image for non-shadow area and shadow area Figure and Figure 3 show that shadow area have the same or similar texture to its adjacent nonshadow area on the same image, called texture consistency of shadow, but textures of shadow area and non-shadow area between the different images are inconsistent.. Image splicing detection algorithm During image forgery, the shadow as well as main body is copied and pasted from another image. Based on the above characteristics, the texture of shadow area is inconsistent with that of non-shadow area for Mosaic image. Image splicing detection algorithm based on texture consistency of shadow is shown in figure 4. First, the shadow area and adjacent non-shadow area are extracted, and then texture features are obtained. Last, Calculation of similarity between the textures is applied to decide whether the input image is an original image or a forgery image..3 Texture features Figure 4. The image splicing detection algorithm A number of texture features such as Gray-level Co-occurrence Matrix, Local Binary Pattern, Gabor Filtering, and Difference Matrix are used in the proposed algorithm Gray-level Co-occurrence Matrix One of the most popular and powerful ways to describe texture is using of GLCM [3]. It represents an estimate of the probability that a pixel has a gray level intensity g i and a neighboring pixel has an intensity g j, where g j [0, Ng 1] and Ng is the number of available gray levels in the image. For the brightness level b 1 and b, co-occurrence matrix C is as follows: N N P b P ' ' b C 1 (1) b1, b xy xy x 1 y 1 where x ' is given by the distance d and offset angle as follows :

4 and the same as ' y ' x x d d d cos ( 1, max ) 0, ' y y d d d sin ( 1,max ) 0, (3) The formula (1) can be applied to the image to get a symmetric square matrix. In the gray-level cooccurrence matrix generation process, the maximum distance is set to a pixel, and the direction is set to select each point of the four nearest neighbor. GLCM is based on a point and its four nearest points obtained symbiotic relationship. GLCM reflects the direction, adjacent intervals and change of information of gray image..3.. Local Binary Pattern Local Binary Pattern was introduced by Ojala in 1996 [4] for texture classification. Basic LBP operator is a computational efficient operator. Taking each pixel as a threshold, the operator transferred its 3 3neighborhood into a 8-bit binary code, as shown in Figure 5. () Figure 5. Basic LBP operator The decimal form of the resulting 8-bit word (LBP code) can be expressed as follows: 7 i i c (4) LBP= B j -j where ji corresponds to the grey value of the center pixel (x c, y c ), j c corresponds to the grey values of the 8 surrounding pixels, and function B(x) is defined as: i=0 1 x 0 Bx= 0 x<0 (5) Due to its texture discriminative property and its very low computational cost, LBP is becoming very popular in pattern recognition Gabor Filtering Gabor filtering [3] is a wavelet-based method for texture description and classification. Gabor filters extract local orientation and scale information of the texture. Two-dimensional Gabor function can be expressed as: 1 1 x y g(x,y)=( )exp jw x y x y x (6)

5 where w is the frequency of bandwidth, x and y are gaussian constants along x axis and y axis direction. By scale and orientation transformation based on mother wavelet g(x,y), you can get a group of auto-correlation filter: mn -m ' ' g x,y =k g x,y, k 1, m, n Z (7) ' m ' m where x k xcos ysin, y k xcos ysin, indicates the direction, k m has related to scale. For a given image I( xy,, ) its Gabor wavelet can be defined as: mn *, (, ), (8) mn T x y I x y g x x y y dxdy * denotes conjugate complex Difference Matrix Differential matrix [3] is expressed as gray change of image pixels in their neighborhood. A texture element of 3 3 neighborhood of pixels is shown in Figure 6. I a, b a, b x 1 a x 1, y 1 b y 1 represents gray value at the coordinates ab, of image. Given the following definitions: Figure 6. Texture element 1 3 4, 1, x+1, y,, -1 x, y+1, +1, -1 x-1, y+1, A x y I x y I A x y I x y I A x y I x y I A x, y I x 1, y-1 I x+1 y+1 (9) then, A xy, A xy, A xy, 1,, 3, A xy represent the gray change of pixel I (x, y) 4, in the horizontal direction (0 ), vertical (90 ), the main diagonal direction (45 ) and vice-diagonal direction (135 ), respectively. A 1, A, A 3, A 4 are four matrix of the differential matrix of the four directions, respectively.

6 .4. Texture feature fusion Because of the shortcomings of the texture descriptor itself, complexity and uncertainty of Realistic scenes, detection results are often not very ideal when using a single texture features for image splicing detection. Therefore, it is necessary to fuse a variety of texture features description together in the local regional authenticity of blind image detection. On one hand, since the characteristics of different textures in different scenes have different performance, the fusion of different texture features helps to widen the scope of application of the algorithm, and improve the accuracy of detection. On the other hand, when using different texture features in the image splicing detection, if a texture feature is missing, you can set weight of this texture zero, other features will be used to obtain the correct result. This can improve not only the detection accuracy but also the robustness and the adaptability of the algorithm. The texture feature fusion process is shown in figure 7. First, because some texture feature descriptions may have great dimensions, principal component analysis for dimensionality reduction of texture features is introduced in order to reduce computational complexity. Second, because texture characteristic value ranges are very different, features are normalized in order to avoid large similarity deviations caused by direct calculation of characteristic vectors. Third, the Euclidean distance is used to measure the similarity of characteristics: d ( S, N) ( V S V ) (10) where V S corresponds to feature vector of shadow area, and V N corresponds to feature vector of non-shadow area. Finally, the linear combination of several Euclidean distances as criterion functions for authenticity of images is shown in formula (11). D w1d 1 wd w3d 3 w4d 4 (11) w w w w 1 1 where d 1, d, d 3, d 4 represent the Euclidean distances of GLCM features, LBP features, differential matrix features, and Gabor filter features, respectively, and represent the weight of the texture features, respectively. Shadow Area/Lit Area 3 4 N GLCM features LBP Feature differential matrix features gabor filter features PCA PCA PCA PCA Normalization Normalization Normalization Normalization Euclidean Distance d1 Euclidean Distance d Euclidean Distance d3 Euclidean Distance d4 Feature Fusion Result output Figure 7. The fusion process

7 3. Results and discussion Some experiment images are selected from CASIA tampered image detection evaluation database [5], and others are collected by authors. All experiment images are saved in JPEG format. The shadow area and lit area of image are extracted by hand. Four texture features are computed, which are GLCM, Gabor filtering with its center frequency set to 0. and its range of the direction of 0,, LBP local binary patterns, and differential matrix. In order to improve the detection rate and reduce the complexity of the algorithm, principal component analysis (PCA) is applied to reduce the dimensionality of texture features. Features with more than 85% of the contribution to image are selected as main components to achieve balance of efficiency and performance. Initial weights are given according to the experience. Last weights after the experimental results analysis are adjusted as follows: GLCM feature s weight 1 = 0.4, LBP feature s weight = 0.3, the weight of differential matrix 3 = 0., Gabor filtering s weight 4 = 0.1. Value Feature Table 1. The detection results of authentic scene Gray level cooccurrence binary matrix Local Difference Gabor filter matrix Pattern Feature fusion result Figure 1 grass road grass land playground Value Feature Table. The detection results of splicing scene Gray level cooccurrence matrix Local binary Pattern Difference matrix Gabor filter Feature fusion result Figure 6 grass grass land road load Images shown in Figure 8 for testing scenarios include different categories, such as grass, pavement and other different types of scenes. Figure 8(a-d) are real images and Figure 8(e-h) are tamper images. Experiment results are shown in table 1 and table. From the experimental data, we can found that some texture features such as Gabor features are insufficient to distinguish between real image and tamper image. In order to enhance the ability of texture descriptors to distinguish between real image and tamper image and improve the accuracy of each experiment, we made a fusion of different texture features. From experiment results shown in table1 and table, we know that the gray level cooccurrence matrix has the strongest ability to distinguish between different textures. So GLCM is assigned as a larger weight 1 = 0.4, whereas the LBP features and differential matrix feature are set to relatively small weight = 0.3 and 3 = 0., and the weight of Gabor filter features is set as 4 = 0.1. The Euclidean distances of real images shown in Figure 8(a-d) were , , , and , while the Euclidean distance of tamper images shown in Figure 8(e-h) were 1.507, , , and In other words, detection results are more obvious after applying multiple feature fusion. The Euclidean distance of real scenario is maintained above 1.0, while the splitting scene is generally low Euclidean distance values, 0.7 or less.

8 (a)grass (b)grass (c)road (d)playground (e)grass (f)grass 4. Conclusion (g) land (h)land Figure 8. Part of the experiment images where N represents the non-shadow area and S represents the shadow area This paper first introduces the concept of texture consistency of shadow, then proposes a detailed algorithm based on texture consistency of shadow for image splicing detection. Several texture features are fused to improve performance. Experimental results show that the algorithm is simple and effective. However, there are some shortcomings in the experiment and disadvantages, such as manually selecting the shadow and non-shadow extraction areas and setting fusion weights set according to experience. In the future, the authors will continue to optimize the algorithm and further improve the applicability and intelligent process of the algorithm. 5. References [1] Hany Farid, "Detecting digital forgeries using bispectral analysis", Massachusetts Institute of Technology (technical report), 1999 [] Tian-Tsong Ng, Shih-Fu Chang, "Blind detection of photomontage using higher order statistics", In Proceeding of the 004 IEEE International Symposium on Circuits and Systems,pp ,004 [3] Dongdong Fu, Yun Q. Shi, Wei Su, "Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition", In Proceeding of the 5th International Workshop on Digital Watermarking, pp ,006 [4] Xiaobing Kang, Guangfeng Lin, Yajun Chen, Erhu Zhang, Ganglong Duan, "Detecting Tampered Regions in Digital Images Using Discrete Cosine Transform and Singular Value Decomposition", International Journal of Digital Content Technology and its Applications, vol.6, no.3, 01 [5] Juan Qin, Feng Li, Lingyun Xiang, Jianming Zhang, "Detection of Image Region Copy-move Forgery Using Wavelet Moment", International Journal of Digital Content Technology and its

9 Applications, vol.6, no.18, pp , 01 [6] Yagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir Memon, "Tamper detection based on regularity of wavelet transform coefficients", In Proceeding of the 14th IEEE International Conference on Image Processing, pp ,006 [7] Wen Chen, Yun Q. Shi, Wei Su, "Image splicing detection using -D phase congruency and statistical moments of characteristic function", In Proceeding of the SPIE Security, Steganography, and Watermarking of Multimedia Contents IX,007 [8] Hui fan, Yongliang Wang, Jinjiang Li, "Exposing Image Fuzzy Forgeries based on Dyadic Contrast Contourlet", Journal of Convergence Information Technology, vol.6, no.7, pp.38-47, 011 [9] Micah K. Johnson, Hany Farid, "Exposing Digital Forgeries in Complex Lighting Environments", IEEE Transactions on Information Forensics and Security, vol., no.3, pp , 007 [10] Micah K. Johnson, Hany Farid, "Exposing Digital Forgeries by Detecting Inconsistencies in Lighting", In Proceeding of the 7th workshop on Multimedia and security,pp1-9,005 [11] Wei Wang, Jing Dong, Tieniu Tan, "Effective image splicing detection based on image chroma", In Proceeding of the 009 IEEE International Conference on Image Processing, pp ,009 [1] Micah K. Johnson, Hany Farid, "Exposing Digital Forgeries Through Chromatic Aberration", In Proceeding of the ACM Multimedia and Security Workshop,pp.48-44,006 [13] Mo Chen, Jessica Fridrich, Jan Lukáš, Miroslav Goljan, "Imaging sensor noise as digital X-ray for revealing forgeries", In Proceeding of the 9th International Information Hiding Workshop, pp.34-58, 008 [14] Popescu, A.C., Hany Farid, "Exposing digital forgeries in color filter array interpolated images", IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers Inc.,vol.53, no.10, pp , 005 [15] Ashwin Swaminathan, Min Wu, K. J. Ray Liu, "Optimization of input pattern for semi nonintrusive component forensics of digital cameras", In Proceeding of the 007 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.5-8,007 [16] Bo Wang, Xiangwei Kong, Lanying Wu, "Different-quality Re-demosaicing in Digital Image Forensics", Journal of Convergence Information Technology, vol.7, no.17, pp , 01 [17] Yu-Feng Hsu, Shih-Fu Chang, "Image splicing detection using camera response function consistency and automatic segmentation", In Proceeding of the IEEE International Conference on Multimedia and Expo, pp.8-31,007 [18] Yu-Feng Hsu, Shih-Fu Chang, "Detecting image splicing using geometry invariants and camera characteristics consistency", In Proceeding of the 006 IEEE International Conference on Multimedia and Expo,pp ,006 [19] Wei Zhang, Xiaochun Cao, Jiawan Zhang, Jigui Zhu, Ping Wang, "Detecting Photographic Composites Using Shadows", In Proceeding of the ICME 009, pp , 009. [0] Qiguang Liu, Xiaochun Cao, Chao Deng, Xiaojie Guo, "Identifying Image Composites Through Shadow Matte Consistency", IEEE Transactions on Information Forensics and Security, vol.6, no.3, pp , 011 [1] Ning Wang, "Study on Shadow Detection and Removal" (in Chinese), Beijing Jiao Tong University (master dissertation), China, 008. [] Lin Yang, "Research on the Image Segmentation and Shadow Removing Algorithm" (in Chinese), Harbin Institute of Technology (master dissertation), China, 007 [3] Mark Nixon, Alberto Aguado, Feature Extraction and Image Processing (second edition), Publishing House of Electronics Industry, China, 010. [4] Timo Ojala, Matti Pietikäinen1, David Harwood, "A comparative study of texture measures with classification based on feature distributions", Pattern Recognition, Pergamon Press Inc, vol.9, no.1, pp.51-59, 1996 [5] CASIA Tampered Image Detection Evaluation Database,

Improved LBP and K-Nearest Neighbors Algorithm

Improved LBP and K-Nearest Neighbors Algorithm Image-Splicing Forgery Detection Based On Improved LBP and K-Nearest Neighbors Algorithm Fahime Hakimi, Department of Electrical and Computer engineering. Zanjan branch, Islamic Azad University. Zanjan,

More information

Copy Move Forgery using Hu s Invariant Moments and Log-Polar Transformations

Copy Move Forgery using Hu s Invariant Moments and Log-Polar Transformations Copy Move Forgery using Hu s Invariant Moments and Log-Polar Transformations Tejas K, Swathi C, Rajesh Kumar M, Senior member, IEEE School of Electronics Engineering Vellore Institute of Technology Vellore,

More information

Digital Image Forgery Detection Based on GLCM and HOG Features

Digital Image Forgery Detection Based on GLCM and HOG Features Digital Image Forgery Detection Based on GLCM and HOG Features Liya Baby 1, Ann Jose 2 Department of Electronics and Communication, Ilahia College of Engineering and Technology, Muvattupuzha, Ernakulam,

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Copy-Move Forgery Detection using DCT and SIFT

Copy-Move Forgery Detection using DCT and SIFT Copy-Move Forgery Detection using DCT and SIFT Amanpreet Kaur Department of Computer Science and Engineering, Lovely Professional University, Punjab, India. Richa Sharma Department of Computer Science

More information

Detecting Digital Image Forgeries By Multi-illuminant Estimators

Detecting Digital Image Forgeries By Multi-illuminant Estimators Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID

More information

Algorithm for the Digital Forgery Catching Technique for Image Processing Application

Algorithm for the Digital Forgery Catching Technique for Image Processing Application Algorithm for the Digital Forgery Catching Technique for Image Processing Application Manish Jain 1, Vinod Rampure 2 ¹Department of Computer Science and Engineering, Modern Institute of Technology and

More information

Run-length and edge statistics based approach for image splicing detection

Run-length and edge statistics based approach for image splicing detection Run-length and edge statistics based approach for image splicing detection Jing Dong 1, Wei Wang 1, Tieniu Tan 1 and Yun Q. Shi 2 1 National Laboratory of Pattern Recognition, Institute of Automation,

More information

Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform

Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform Reduced Time Complexity for of Copy-Move Forgery Using Discrete Wavelet Transform Saiqa Khan Computer Engineering Dept., M.H Saboo Siddik College Of Engg., Mumbai, India Arun Kulkarni Information Technology

More information

COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University

COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University 2011 Eighth International Conference Computer Graphics, Imaging and Visualization COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM Najah Muhammad 1, Muhammad Hussain 2, Ghulam Muhammad 2, and

More information

An Adaptive Threshold LBP Algorithm for Face Recognition

An Adaptive Threshold LBP Algorithm for Face Recognition An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent

More information

CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT

CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT 2.1 BRIEF OUTLINE The classification of digital imagery is to extract useful thematic information which is one

More information

BRIEF Features for Texture Segmentation

BRIEF Features for Texture Segmentation BRIEF Features for Texture Segmentation Suraya Mohammad 1, Tim Morris 2 1 Communication Technology Section, Universiti Kuala Lumpur - British Malaysian Institute, Gombak, Selangor, Malaysia 2 School of

More information

CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT

CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 145 CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 5.1 INTRODUCTION This chapter discusses the application of enhancement technique in palmprint recognition system. Section 5.2 describes image sharpening

More information

FEATURE EXTRACTION TECHNIQUES FOR IMAGE RETRIEVAL USING HAAR AND GLCM

FEATURE EXTRACTION TECHNIQUES FOR IMAGE RETRIEVAL USING HAAR AND GLCM FEATURE EXTRACTION TECHNIQUES FOR IMAGE RETRIEVAL USING HAAR AND GLCM Neha 1, Tanvi Jain 2 1,2 Senior Research Fellow (SRF), SAM-C, Defence R & D Organization, (India) ABSTRACT Content Based Image Retrieval

More information

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of

More information

Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision

Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Zhiyan Zhang 1, Wei Qian 1, Lei Pan 1 & Yanjun Li 1 1 University of Shanghai for Science and Technology, China

More information

FORENSIC DETECTION OF MEDIAN FILTERING IN DIGITAL IMAGES. Gang Cao Yao Zhao Rongrong Ni Lifang Yu Huawei Tian

FORENSIC DETECTION OF MEDIAN FILTERING IN DIGITAL IMAGES. Gang Cao Yao Zhao Rongrong Ni Lifang Yu Huawei Tian FORENSIC DETECTION OF MEDIAN FILTERING IN DIGITAL IMAGES Gang Cao Yao Zhao Rongrong Ni Lifang Yu Huawei Tian Institute of Information Science, Beijing Jiaotong University, Beijing, 44, China {6256, yzhao,

More information

A New Feature Local Binary Patterns (FLBP) Method

A New Feature Local Binary Patterns (FLBP) Method A New Feature Local Binary Patterns (FLBP) Method Jiayu Gu and Chengjun Liu The Department of Computer Science, New Jersey Institute of Technology, Newark, NJ 07102, USA Abstract - This paper presents

More information

An algorithm of lips secondary positioning and feature extraction based on YCbCr color space SHEN Xian-geng 1, WU Wei 2

An algorithm of lips secondary positioning and feature extraction based on YCbCr color space SHEN Xian-geng 1, WU Wei 2 International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 015) An algorithm of lips secondary positioning and feature extraction based on YCbCr color space SHEN Xian-geng

More information

SOME stereo image-matching methods require a user-selected

SOME stereo image-matching methods require a user-selected IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, VOL. 3, NO. 2, APRIL 2006 207 Seed Point Selection Method for Triangle Constrained Image Matching Propagation Qing Zhu, Bo Wu, and Zhi-Xiang Xu Abstract In order

More information

Forensic analysis of JPEG image compression

Forensic analysis of JPEG image compression Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic

More information

Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography

Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography , pp.37-41 http://dx.doi.org/10.14257/astl.2013.31.09 Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography Lanying Li 1, Yun Zhang 1, 1 School of Computer Science and Technology

More information

Algorithm research of 3D point cloud registration based on iterative closest point 1

Algorithm research of 3D point cloud registration based on iterative closest point 1 Acta Technica 62, No. 3B/2017, 189 196 c 2017 Institute of Thermomechanics CAS, v.v.i. Algorithm research of 3D point cloud registration based on iterative closest point 1 Qian Gao 2, Yujian Wang 2,3,

More information

Fabric Defect Detection Based on Computer Vision

Fabric Defect Detection Based on Computer Vision Fabric Defect Detection Based on Computer Vision Jing Sun and Zhiyu Zhou College of Information and Electronics, Zhejiang Sci-Tech University, Hangzhou, China {jings531,zhouzhiyu1993}@163.com Abstract.

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical esearch, 015, 7(3):175-179 esearch Article ISSN : 0975-7384 CODEN(USA) : JCPC5 Thread image processing technology research based on

More information

International Journal of Computer Techniques Volume 4 Issue 1, Jan Feb 2017

International Journal of Computer Techniques Volume 4 Issue 1, Jan Feb 2017 RESEARCH ARTICLE OPEN ACCESS Facial expression recognition based on completed LBP Zicheng Lin 1, Yuanliang Huang 2 1 (College of Science and Engineering, Jinan University, Guangzhou, PR China) 2 (Institute

More information

Bridge Surface Crack Detection Method

Bridge Surface Crack Detection Method , pp.337-343 http://dx.doi.org/10.14257/astl.2016. Bridge Surface Crack Detection Method Tingping Zhang 1,2, Jianxi Yang 1, Xinyu Liang 3 1 School of Information Science & Engineering, Chongqing Jiaotong

More information

Research on the Wood Cell Contour Extraction Method Based on Image Texture and Gray-scale Information.

Research on the Wood Cell Contour Extraction Method Based on Image Texture and Gray-scale Information. , pp. 65-74 http://dx.doi.org/0.457/ijsip.04.7.6.06 esearch on the Wood Cell Contour Extraction Method Based on Image Texture and Gray-scale Information Zhao Lei, Wang Jianhua and Li Xiaofeng 3 Heilongjiang

More information

EFFICIENT REPRESENTATION OF LIGHTING PATTERNS FOR IMAGE-BASED RELIGHTING

EFFICIENT REPRESENTATION OF LIGHTING PATTERNS FOR IMAGE-BASED RELIGHTING EFFICIENT REPRESENTATION OF LIGHTING PATTERNS FOR IMAGE-BASED RELIGHTING Hyunjung Shim Tsuhan Chen {hjs,tsuhan}@andrew.cmu.edu Department of Electrical and Computer Engineering Carnegie Mellon University

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

Schedule for Rest of Semester

Schedule for Rest of Semester Schedule for Rest of Semester Date Lecture Topic 11/20 24 Texture 11/27 25 Review of Statistics & Linear Algebra, Eigenvectors 11/29 26 Eigenvector expansions, Pattern Recognition 12/4 27 Cameras & calibration

More information

An Approach for Reduction of Rain Streaks from a Single Image

An Approach for Reduction of Rain Streaks from a Single Image An Approach for Reduction of Rain Streaks from a Single Image Vijayakumar Majjagi 1, Netravati U M 2 1 4 th Semester, M. Tech, Digital Electronics, Department of Electronics and Communication G M Institute

More information

Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian

Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian Hebei Engineering and

More information

Pedestrian Detection with Improved LBP and Hog Algorithm

Pedestrian Detection with Improved LBP and Hog Algorithm Open Access Library Journal 2018, Volume 5, e4573 ISSN Online: 2333-9721 ISSN Print: 2333-9705 Pedestrian Detection with Improved LBP and Hog Algorithm Wei Zhou, Suyun Luo Automotive Engineering College,

More information

manufacturing process.

manufacturing process. Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 203-207 203 Open Access Identifying Method for Key Quality Characteristics in Series-Parallel

More information

Texture Segmentation by Windowed Projection

Texture Segmentation by Windowed Projection Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw

More information

Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation

Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation Obviously, this is a very slow process and not suitable for dynamic scenes. To speed things up, we can use a laser that projects a vertical line of light onto the scene. This laser rotates around its vertical

More information

Motivation. Intensity Levels

Motivation. Intensity Levels Motivation Image Intensity and Point Operations Dr. Edmund Lam Department of Electrical and Electronic Engineering The University of Hong ong A digital image is a matrix of numbers, each corresponding

More information

High Resolution Remote Sensing Image Classification based on SVM and FCM Qin LI a, Wenxing BAO b, Xing LI c, Bin LI d

High Resolution Remote Sensing Image Classification based on SVM and FCM Qin LI a, Wenxing BAO b, Xing LI c, Bin LI d 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 2015) High Resolution Remote Sensing Image Classification based on SVM and FCM Qin LI a, Wenxing BAO b, Xing LI

More information

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation , pp.162-167 http://dx.doi.org/10.14257/astl.2016.138.33 A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation Liqiang Hu, Chaofeng He Shijiazhuang Tiedao University,

More information

AN EFFICIENT BATIK IMAGE RETRIEVAL SYSTEM BASED ON COLOR AND TEXTURE FEATURES

AN EFFICIENT BATIK IMAGE RETRIEVAL SYSTEM BASED ON COLOR AND TEXTURE FEATURES AN EFFICIENT BATIK IMAGE RETRIEVAL SYSTEM BASED ON COLOR AND TEXTURE FEATURES 1 RIMA TRI WAHYUNINGRUM, 2 INDAH AGUSTIEN SIRADJUDDIN 1, 2 Department of Informatics Engineering, University of Trunojoyo Madura,

More information

MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION

MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION Panca Mudjirahardjo, Rahmadwati, Nanang Sulistiyanto and R. Arief Setyawan Department of Electrical Engineering, Faculty of

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Texture Segmentation by using Haar Wavelets and K-means Algorithm

Texture Segmentation by using Haar Wavelets and K-means Algorithm Texture Segmentation by using Haar Wavelets and K-means Algorithm P. Ashok Babu Associate Professor, Narsimha Reddy Engineering College, Hyderabad, A.P., INDIA, ashokbabup2@gmail.com Dr. K. V. S. V. R.

More information

Exposing Digital Forgeries in Complex Lighting Environments. Nimit Dhulekar. December 12, 2010

Exposing Digital Forgeries in Complex Lighting Environments. Nimit Dhulekar. December 12, 2010 CSCI 6270 COMPUTATIONAL VISION PROJECT Exposing Digital Forgeries in Complex Lighting Environments Nimit Dhulekar December 12, 2010 1 Abstract The increase in sophistication of image manipulation software

More information

Temperature Calculation of Pellet Rotary Kiln Based on Texture

Temperature Calculation of Pellet Rotary Kiln Based on Texture Intelligent Control and Automation, 2017, 8, 67-74 http://www.scirp.org/journal/ica ISSN Online: 2153-0661 ISSN Print: 2153-0653 Temperature Calculation of Pellet Rotary Kiln Based on Texture Chunli Lin,

More information

A Novel Block-DCT and PCA Based Image Perceptual Hashing Algorithm

A Novel Block-DCT and PCA Based Image Perceptual Hashing Algorithm www.ijcsi.org 399 A Novel Block-DCT and PCA Based Image Perceptual Hashing Algorithm Zeng Jie College of Information Engineering, Shenzhen University Shenzhen, Guangdong, P.R.China Abstract Image perceptual

More information

A Novel Method for Block Size Forensics Based on Morphological Operations

A Novel Method for Block Size Forensics Based on Morphological Operations A Novel Method for Block Size Forensics Based on Morphological Operations Weiqi Luo, Jiwu Huang, and Guoping Qiu 2 Guangdong Key Lab. of Information Security Technology Sun Yat-Sen University, Guangdong,

More information

Invariant Features of Local Textures a rotation invariant local texture descriptor

Invariant Features of Local Textures a rotation invariant local texture descriptor Invariant Features of Local Textures a rotation invariant local texture descriptor Pranam Janney and Zhenghua Yu 1 School of Computer Science and Engineering University of New South Wales Sydney, Australia

More information

The Afresh Transform Algorithm Based on Limited Histogram Equalization of Low Frequency DCT Coefficients

The Afresh Transform Algorithm Based on Limited Histogram Equalization of Low Frequency DCT Coefficients Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 623-630 623 Open Access The Afresh Transform Algorithm Based on Limited Histogram Equalization

More information

Fingerprint Recognition using Texture Features

Fingerprint Recognition using Texture Features Fingerprint Recognition using Texture Features Manidipa Saha, Jyotismita Chaki, Ranjan Parekh,, School of Education Technology, Jadavpur University, Kolkata, India Abstract: This paper proposes an efficient

More information

TEXTURE ANALYSIS USING GABOR FILTERS

TEXTURE ANALYSIS USING GABOR FILTERS TEXTURE ANALYSIS USING GABOR FILTERS Texture Types Definition of Texture Texture types Synthetic Natural Stochastic < Prev Next > Texture Definition Texture: the regular repetition of an element or pattern

More information

Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors

Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors Sahar Q. Saleh 1, Muhammad Hussain 1, Ghulam Muhammad 1, and George Bebis 2 1 College of Computer and Information Sciences,

More information

Feature Extraction and Image Processing, 2 nd Edition. Contents. Preface

Feature Extraction and Image Processing, 2 nd Edition. Contents. Preface , 2 nd Edition Preface ix 1 Introduction 1 1.1 Overview 1 1.2 Human and Computer Vision 1 1.3 The Human Vision System 3 1.3.1 The Eye 4 1.3.2 The Neural System 7 1.3.3 Processing 7 1.4 Computer Vision

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Third Edition Rafael C. Gonzalez University of Tennessee Richard E. Woods MedData Interactive PEARSON Prentice Hall Pearson Education International Contents Preface xv Acknowledgments

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

2 Proposed Methodology

2 Proposed Methodology 3rd International Conference on Multimedia Technology(ICMT 2013) Object Detection in Image with Complex Background Dong Li, Yali Li, Fei He, Shengjin Wang 1 State Key Laboratory of Intelligent Technology

More information

Keywords Digital Image Forgery, Forgery Detection, Transform Domain, Phase Correlation, Noise Variation

Keywords Digital Image Forgery, Forgery Detection, Transform Domain, Phase Correlation, Noise Variation Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Copy-Move Image

More information

Depth. Common Classification Tasks. Example: AlexNet. Another Example: Inception. Another Example: Inception. Depth

Depth. Common Classification Tasks. Example: AlexNet. Another Example: Inception. Another Example: Inception. Depth Common Classification Tasks Recognition of individual objects/faces Analyze object-specific features (e.g., key points) Train with images from different viewing angles Recognition of object classes Analyze

More information

Image Tampering Detection

Image Tampering Detection Image Tampering Detection Yun Q. Shi and Patchara Sutthiwan Intelligent Multimedia Lab New Jersey Institute of Technology shi@njit.edu 24 April 2009 A Natural Image Model Approach to Tampering Detection

More information

Gabor Filter HOG Based Copy Move Forgery Detection

Gabor Filter HOG Based Copy Move Forgery Detection IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p-ISSN: 2278-8735 PP 41-45 www.iosrjournals.org Gabor Filter HOG Based Copy Move Forgery Detection Monisha Mohan

More information

Motivation. Gray Levels

Motivation. Gray Levels Motivation Image Intensity and Point Operations Dr. Edmund Lam Department of Electrical and Electronic Engineering The University of Hong ong A digital image is a matrix of numbers, each corresponding

More information

Digital Image Forgery detection using color Illumination and Decision Tree Classification

Digital Image Forgery detection using color Illumination and Decision Tree Classification RESEARCH ARTICLE OPEN ACCESS Digital Image Forgery detection using color Illumination and Decision Tree Classification Chitra Ganesan, V.R. Bhuma Chitra Ganesan, the author is currently pursuing M.E (Software

More information

Texture Features in Facial Image Analysis

Texture Features in Facial Image Analysis Texture Features in Facial Image Analysis Matti Pietikäinen and Abdenour Hadid Machine Vision Group Infotech Oulu and Department of Electrical and Information Engineering P.O. Box 4500, FI-90014 University

More information

Multiresolution Texture Analysis of Surface Reflection Images

Multiresolution Texture Analysis of Surface Reflection Images Multiresolution Texture Analysis of Surface Reflection Images Leena Lepistö, Iivari Kunttu, Jorma Autio, and Ari Visa Tampere University of Technology, Institute of Signal Processing P.O. Box 553, FIN-330

More information

FEATURES EXTRACTION USING A GABOR FILTER FAMILY

FEATURES EXTRACTION USING A GABOR FILTER FAMILY FEATURES EXTRACTION USING A GABOR FILTER FAMILY Danian Zheng, Yannan Zhao, Jiaxin Wang State Key Laboratory of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua

More information

Leaf Image Recognition Based on Wavelet and Fractal Dimension

Leaf Image Recognition Based on Wavelet and Fractal Dimension Journal of Computational Information Systems 11: 1 (2015) 141 148 Available at http://www.jofcis.com Leaf Image Recognition Based on Wavelet and Fractal Dimension Haiyan ZHANG, Xingke TAO School of Information,

More information

Spatial Adaptive Filter for Object Boundary Identification in an Image

Spatial Adaptive Filter for Object Boundary Identification in an Image Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 9, Number 1 (2016) pp. 1-10 Research India Publications http://www.ripublication.com Spatial Adaptive Filter for Object Boundary

More information

Chapter 11 Representation & Description

Chapter 11 Representation & Description Chain Codes Chain codes are used to represent a boundary by a connected sequence of straight-line segments of specified length and direction. The direction of each segment is coded by using a numbering

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

Short Survey on Static Hand Gesture Recognition

Short Survey on Static Hand Gesture Recognition Short Survey on Static Hand Gesture Recognition Huu-Hung Huynh University of Science and Technology The University of Danang, Vietnam Duc-Hoang Vo University of Science and Technology The University of

More information

Learning based face hallucination techniques: A survey

Learning based face hallucination techniques: A survey Vol. 3 (2014-15) pp. 37-45. : A survey Premitha Premnath K Department of Computer Science & Engineering Vidya Academy of Science & Technology Thrissur - 680501, Kerala, India (email: premithakpnath@gmail.com)

More information

Filtering and Enhancing Images

Filtering and Enhancing Images KECE471 Computer Vision Filtering and Enhancing Images Chang-Su Kim Chapter 5, Computer Vision by Shapiro and Stockman Note: Some figures and contents in the lecture notes of Dr. Stockman are used partly.

More information

BSB663 Image Processing Pinar Duygulu. Slides are adapted from Selim Aksoy

BSB663 Image Processing Pinar Duygulu. Slides are adapted from Selim Aksoy BSB663 Image Processing Pinar Duygulu Slides are adapted from Selim Aksoy Image matching Image matching is a fundamental aspect of many problems in computer vision. Object or scene recognition Solving

More information

An efficient face recognition algorithm based on multi-kernel regularization learning

An efficient face recognition algorithm based on multi-kernel regularization learning Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel

More information

Image Denoising Methods Based on Wavelet Transform and Threshold Functions

Image Denoising Methods Based on Wavelet Transform and Threshold Functions Image Denoising Methods Based on Wavelet Transform and Threshold Functions Liangang Feng, Lin Lin Weihai Vocational College China liangangfeng@163.com liangangfeng@163.com ABSTRACT: There are many unavoidable

More information

An Angle Estimation to Landmarks for Autonomous Satellite Navigation

An Angle Estimation to Landmarks for Autonomous Satellite Navigation 5th International Conference on Environment, Materials, Chemistry and Power Electronics (EMCPE 2016) An Angle Estimation to Landmarks for Autonomous Satellite Navigation Qing XUE a, Hongwen YANG, Jian

More information

Cotton Texture Segmentation Based On Image Texture Analysis Using Gray Level Co-occurrence Matrix (GLCM) And Euclidean Distance

Cotton Texture Segmentation Based On Image Texture Analysis Using Gray Level Co-occurrence Matrix (GLCM) And Euclidean Distance Cotton Texture Segmentation Based On Image Texture Analysis Using Gray Level Co-occurrence Matrix (GLCM) And Euclidean Distance Farell Dwi Aferi 1, Tito Waluyo Purboyo 2 and Randy Erfa Saputra 3 1 College

More information

Subpixel Corner Detection Using Spatial Moment 1)

Subpixel Corner Detection Using Spatial Moment 1) Vol.31, No.5 ACTA AUTOMATICA SINICA September, 25 Subpixel Corner Detection Using Spatial Moment 1) WANG She-Yang SONG Shen-Min QIANG Wen-Yi CHEN Xing-Lin (Department of Control Engineering, Harbin Institute

More information

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:

More information

result, it is very important to design a simulation system for dynamic laser scanning

result, it is very important to design a simulation system for dynamic laser scanning 3rd International Conference on Multimedia Technology(ICMT 2013) Accurate and Fast Simulation of Laser Scanning Imaging Luyao Zhou 1 and Huimin Ma Abstract. In order to design a more accurate simulation

More information

Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology

Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology Course Presentation Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology Image Compression Basics Large amount of data in digital images File size

More information

Liver Image Mosaicing System Based on Scale Invariant Feature Transform and Point Set Matching Method

Liver Image Mosaicing System Based on Scale Invariant Feature Transform and Point Set Matching Method Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 014, 8, 147-151 147 Open Access Liver Image Mosaicing System Based on Scale Invariant Feature Transform

More information

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316

More information

Color Local Texture Features Based Face Recognition

Color Local Texture Features Based Face Recognition Color Local Texture Features Based Face Recognition Priyanka V. Bankar Department of Electronics and Communication Engineering SKN Sinhgad College of Engineering, Korti, Pandharpur, Maharashtra, India

More information

A Survey on Feature Extraction Techniques for Palmprint Identification

A Survey on Feature Extraction Techniques for Palmprint Identification International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1

More information

Lecture 6: Multimedia Information Retrieval Dr. Jian Zhang

Lecture 6: Multimedia Information Retrieval Dr. Jian Zhang Lecture 6: Multimedia Information Retrieval Dr. Jian Zhang NICTA & CSE UNSW COMP9314 Advanced Database S1 2007 jzhang@cse.unsw.edu.au Reference Papers and Resources Papers: Colour spaces-perceptual, historical

More information

Multimedia Computing: Algorithms, Systems, and Applications: Edge Detection

Multimedia Computing: Algorithms, Systems, and Applications: Edge Detection Multimedia Computing: Algorithms, Systems, and Applications: Edge Detection By Dr. Yu Cao Department of Computer Science The University of Massachusetts Lowell Lowell, MA 01854, USA Part of the slides

More information

Detection of Edges Using Mathematical Morphological Operators

Detection of Edges Using Mathematical Morphological Operators OPEN TRANSACTIONS ON INFORMATION PROCESSING Volume 1, Number 1, MAY 2014 OPEN TRANSACTIONS ON INFORMATION PROCESSING Detection of Edges Using Mathematical Morphological Operators Suman Rani*, Deepti Bansal,

More information

Copy-Move Image Forgery Detection Based on Center-Symmetric Local Binary Pattern

Copy-Move Image Forgery Detection Based on Center-Symmetric Local Binary Pattern IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. I (July Aug. 2015), PP 66-70 www.iosrjournals.org Copy-Move Image Forgery Detection Based on

More information

An Adaptive Color Image Visible Watermark Algorithm Supporting for Interested Area and its Application System Based on Internet

An Adaptive Color Image Visible Watermark Algorithm Supporting for Interested Area and its Application System Based on Internet MATEC Web of Conferences 25, 0301 8 ( 2015) DOI: 10.1051/ matecconf/ 20152 503018 C Owned by the authors, published by EDP Sciences, 2015 An Adaptive Color Image Visible Watermark Algorithm Supporting

More information

DETECTION OF SMOOTH TEXTURE IN FACIAL IMAGES FOR THE EVALUATION OF UNNATURAL CONTRAST ENHANCEMENT

DETECTION OF SMOOTH TEXTURE IN FACIAL IMAGES FOR THE EVALUATION OF UNNATURAL CONTRAST ENHANCEMENT DETECTION OF SMOOTH TEXTURE IN FACIAL IMAGES FOR THE EVALUATION OF UNNATURAL CONTRAST ENHANCEMENT 1 NUR HALILAH BINTI ISMAIL, 2 SOONG-DER CHEN 1, 2 Department of Graphics and Multimedia, College of Information

More information

TEXTURE CLASSIFICATION METHODS: A REVIEW

TEXTURE CLASSIFICATION METHODS: A REVIEW TEXTURE CLASSIFICATION METHODS: A REVIEW Ms. Sonal B. Bhandare Prof. Dr. S. M. Kamalapur M.E. Student Associate Professor Deparment of Computer Engineering, Deparment of Computer Engineering, K. K. Wagh

More information

Experimentation on the use of Chromaticity Features, Local Binary Pattern and Discrete Cosine Transform in Colour Texture Analysis

Experimentation on the use of Chromaticity Features, Local Binary Pattern and Discrete Cosine Transform in Colour Texture Analysis Experimentation on the use of Chromaticity Features, Local Binary Pattern and Discrete Cosine Transform in Colour Texture Analysis N.Padmapriya, Ovidiu Ghita, and Paul.F.Whelan Vision Systems Laboratory,

More information

Gabor Surface Feature for Face Recognition

Gabor Surface Feature for Face Recognition Gabor Surface Feature for Face Recognition Ke Yan, Youbin Chen Graduate School at Shenzhen Tsinghua University Shenzhen, China xed09@gmail.com, chenyb@sz.tsinghua.edu.cn Abstract Gabor filters can extract

More information

Research on Evaluation Method of Video Stabilization

Research on Evaluation Method of Video Stabilization International Conference on Advanced Material Science and Environmental Engineering (AMSEE 216) Research on Evaluation Method of Video Stabilization Bin Chen, Jianjun Zhao and i Wang Weapon Science and

More information

Short Run length Descriptor for Image Retrieval

Short Run length Descriptor for Image Retrieval CHAPTER -6 Short Run length Descriptor for Image Retrieval 6.1 Introduction In the recent years, growth of multimedia information from various sources has increased many folds. This has created the demand

More information

Tiled Texture Synthesis

Tiled Texture Synthesis International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1667-1672 International Research Publications House http://www. irphouse.com Tiled Texture

More information