International Journal of Image, Graphics and Signal Processing (IJIGSP)

IJIGSP Vol. 5, No. 7, Jun. 2013

Cover page and Table of Contents: PDF (size: 141KB)

Table Of Contents

REGULAR PAPERS

A Robust Palmprint Recognition System Based on Both Principal Lines and Gabor Wavelets

By Nouha BEN MAHFOUDH Yousra BEN JEMAA Faouzi BOUCHHIMA

DOI: https://doi.org/10.5815/ijigsp.2013.07.01, Pub. Date: 8 Jun. 2013

We present in this paper a new palmprint recognition system based on the principal lines of the palm. An original algorithm is proposed in order to detect automatically principal lines and extract their corre-spondent geometrical features. Given the complexity of the palmprint recognition and in order to ameliorate performances, we propose a hybrid approach based on both geometrical and gabor features.
A comparative study between the three feature vectors obtained from the geometrical approach, global approach and combination of both has proved that the geometrical features are the most relevant since they can give the best compromise recognition Rate/Time. Moreover, a combination of geometrical features with global features can improve recognition rate while keeping the same recognition and learning times. Obtained results also show that the hybrid approach performances are very satisfactory and even surpass the very popular ones.

[...] Read more.
Visual Improvement for Hepatic Abscess Sonogram by Segmentation after Curvelet Denoising

By Mohammed Tarek GadAllah Mohammed Mabrouk Sharaf Fahima Aboualmagd Essawy Samir Mohammed Badawy

DOI: https://doi.org/10.5815/ijigsp.2013.07.02, Pub. Date: 8 Jun. 2013

A wise automated method for wisely improving the visualization of hepatic abscess sonogram, a modest trial is being done to denoise and reduce the ultrasound scan speckles wisely and effectively. As an effective way for improving the diagnostic decision; improved sonogram for hepatic abscess is reconstructed by ultrasound scan image segmentation after denoising in Curvelet transform domain. Better sonogram visualization is required for better human interpretation. Speckle noise filtering of medical ultrasound images is needed for enhanced diagnosis. Double thresholding segmentation was applied on, an ultrasound scan image for a Liver with amebic abscess, after it had been denoised in Curvelet transform domain. The result is enhanced wise effect on the hepatic abscess sonogram image's visualization which improves physicians' decisions. Moreover, this method effectively reduces the memory storage size for the image which consequently decreases computation processing time.

[...] Read more.
Genetic Algorithm Based Image Steganography for Enhancement of Concealing Capacity and Security

By Jyoti Md. Sabir

DOI: https://doi.org/10.5815/ijigsp.2013.07.03, Pub. Date: 8 Jun. 2013

This paper proposes a Genetic Algorithm based steganography for enhancement of embedding capacity and security. Steganography is a method to provide secret communication between sender and receiver by concealing message in cover image. LSB bit encoding method is that the simplest encoding method to cover secret message in color pictures and grayscale pictures. Steganalysis is a method of detecting secret message hidden in a cover image. RS steganalysis is one of the most reliable steganalysis which performs statistical analysis of the pixels to successfully detection of hidden message in an image. This paper presents a secured steganography method using genetic algorithm to protect against the RS attack in color images. The proposed steganography scheme embeds message in integer wavelet transform coefficients by using a mapping function. This mapping function based on GA in an 8x8 block on the input cover color image. After embedding the message optimal pixel adjustment process is applied. By applying the OPAP the error difference between the cover image and stego image is minimized. Frequency domain technique is used to increase the robustness of proposed method. Use of IWT prevents the floating point precision problems of the wavelet filter. GA is used to increase the hiding capacity of image and maintains the quality of image. Experimental results are shows that the proposed steganography method is more secured against RS attack as compared to existing methods. Result showed that Peak signal to noise ratio and image utilization, 49.65 db and 100% respectively.

[...] Read more.
Retinal Blood Vessel Segmentation with Optic Disc Pixels Exclusion

By Randy Cahya Wihandika Nanik Suciati

DOI: https://doi.org/10.5815/ijigsp.2013.07.04, Pub. Date: 8 Jun. 2013

The morphological changes of retinal blood vessels are important indicators used to diagnose and monitor the progression of various diseases. A number of retinal blood vessel segmentation methods have been introduced, including the line operator based methods, which have shown satisfactory results. However, the basic line operator method cannot discriminate the pixels around the retinal optic disc, resulting in false classification of those pixels. In this paper, we integrate the detection of pixels around the retinal optic disc to the line operator method so that those pixels can be excluded from the vessel pixels. The method is evaluated on the widely used retinal dataset, the DRIVE dataset. The results demonstrate that the proposed method has made improvements over the basic and the multi-scale line detector with accuracy and area under curve of 0.942 and 0.9521, respectively.

[...] Read more.
Design and Development of PC Based Data Acquisition System for Radiation Measurement

By M. A. A. Mashud Md. Shamim Hossain Nurul Islam Md. Serajul Islam

DOI: https://doi.org/10.5815/ijigsp.2013.07.05, Pub. Date: 8 Jun. 2013

A PC based data acquisition was designed and developed using GM detector and a programmable microcontroller 16F876 of PIC family. This unit was calibrated with the standard Canberra Counter. It gave prompt response directly and has low power consumption. It was tested for gamma ray measurement to continuously monitor a radiological resulting from the natural and man-made sources that threat site security and human health. The system was simple to use, required no additional hardware and allows the selection of data. The collected data were easily being exported to a PC via parallel port. A "C" language program was developed to control the function of the entire system, using PCWH compiler.

[...] Read more.
Comparative Analysis of AODV and DSDV Performance in Vanets using NS-2

By Anam Mustaqeem Nadeem Majeed Muazzam Maqsood

DOI: https://doi.org/10.5815/ijigsp.2013.07.06, Pub. Date: 8 Jun. 2013

Vehicular ad-hoc networks (VANETs) form when vehicles are equipped with devices capable of short-range wireless communication. Vehicular Ad hoc networks involve motion of nodes depending on the mobility model chosen. Three important considerations in simulation of VANETs are mobility models, network simulator and the routing protocols. Selection of appropriate mobility model for evaluating routing protocol leads to efficient simulation results. Performance of routing protocols in VANETs can be measured using four metrics; bandwidth, packet loss, throughput and scalability. This research work is based on the simulation based analysis of Vehicular Ad- hoc networks using NS-2 as the network simulator. Performance evaluation of the protocols is conducted on the basis of four defined metrics and as conclusion is made according to the simulation results.

[...] Read more.
Novel High Quality Data Hiding System

By Fahd Alharbi

DOI: https://doi.org/10.5815/ijigsp.2013.07.07, Pub. Date: 8 Jun. 2013

Data Hiding is the process of embedding data into a media form such as image, voice, and video. The major methods used for data hiding are the frequency domain and the spatial domain. In the frequency domain, the secret data bits are inserted into the coefficients of the image pixel's frequency representation such as Discrete Cosine Transform (DCT) , Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) . On the other hand, in the spatial domain method, the secret data bits are inserted directly into the images' pixels value decomposition. The Lest Significant Bit (LSB) is consider as the most widely spatial domain method used for data hiding. LSB embeds the secret message's bits into the least significant bit plane( Binary decomposition) of the image in a sequentially manner . The LSB is simple, but it poses some critical issues. The secret message is easily detected and attacked duo to the sequential embedding process. Moreover, embedding using a higher bit plane would degrade the image quality. In this paper, we are proposing a novel data hiding method based on Lucas number system. We use Lucas number system to decompose the images' pixels values to allow using higher bit plane for embedding without degrading the image's quality. Moreover, the data hiding process security is enhanced by using Pseudo Random Number Generators(PRNG) for selecting the image's pixels used for embedding data.

[...] Read more.
A Novel Container ISO Code Localization Using an Object Clustering Method with Opencv and Visual Studio Application

By Ronesh Sharma Seong Ro Lee

DOI: https://doi.org/10.5815/ijigsp.2013.07.08, Pub. Date: 8 Jun. 2013

An automatic container code recognition system is of a great importance to the logistic supply chain management. Techniques have been proposed and implemented for the ISO container code region identification and recognition, however those systems have limitations on the type of container images with illumination factor and marks present on the container due to handling in the mass environmental condition. Moreover the research is not limited for differentiating between different formats of code and color of code characters. In this paper firstly an object clustering method is proposed to localize each line of the container code region. Secondly, the localizing algorithm is implemented with opencv and visual studio to perform localization and then recognition. Thus for real time application, the implemented system has added advantage of being easily integrated with other web application to increase the efficiency of the supply chain management. The experimental results and the application demonstrate the effectiveness of the proposed system for practical use.

[...] Read more.