IJIGSP Vol. 5, No. 7, Jun. 2013
Cover page and Table of Contents: PDF (size: 141KB)
REGULAR PAPERS
We present in this paper a new palmprint recognition system based on the principal lines of the palm. An original algorithm is proposed in order to detect automatically principal lines and extract their corre-spondent geometrical features. Given the complexity of the palmprint recognition and in order to ameliorate performances, we propose a hybrid approach based on both geometrical and gabor features.
A comparative study between the three feature vectors obtained from the geometrical approach, global approach and combination of both has proved that the geometrical features are the most relevant since they can give the best compromise recognition Rate/Time. Moreover, a combination of geometrical features with global features can improve recognition rate while keeping the same recognition and learning times. Obtained results also show that the hybrid approach performances are very satisfactory and even surpass the very popular ones.
A wise automated method for wisely improving the visualization of hepatic abscess sonogram, a modest trial is being done to denoise and reduce the ultrasound scan speckles wisely and effectively. As an effective way for improving the diagnostic decision; improved sonogram for hepatic abscess is reconstructed by ultrasound scan image segmentation after denoising in Curvelet transform domain. Better sonogram visualization is required for better human interpretation. Speckle noise filtering of medical ultrasound images is needed for enhanced diagnosis. Double thresholding segmentation was applied on, an ultrasound scan image for a Liver with amebic abscess, after it had been denoised in Curvelet transform domain. The result is enhanced wise effect on the hepatic abscess sonogram image's visualization which improves physicians' decisions. Moreover, this method effectively reduces the memory storage size for the image which consequently decreases computation processing time.
[...] Read more.This paper proposes a Genetic Algorithm based steganography for enhancement of embedding capacity and security. Steganography is a method to provide secret communication between sender and receiver by concealing message in cover image. LSB bit encoding method is that the simplest encoding method to cover secret message in color pictures and grayscale pictures. Steganalysis is a method of detecting secret message hidden in a cover image. RS steganalysis is one of the most reliable steganalysis which performs statistical analysis of the pixels to successfully detection of hidden message in an image. This paper presents a secured steganography method using genetic algorithm to protect against the RS attack in color images. The proposed steganography scheme embeds message in integer wavelet transform coefficients by using a mapping function. This mapping function based on GA in an 8x8 block on the input cover color image. After embedding the message optimal pixel adjustment process is applied. By applying the OPAP the error difference between the cover image and stego image is minimized. Frequency domain technique is used to increase the robustness of proposed method. Use of IWT prevents the floating point precision problems of the wavelet filter. GA is used to increase the hiding capacity of image and maintains the quality of image. Experimental results are shows that the proposed steganography method is more secured against RS attack as compared to existing methods. Result showed that Peak signal to noise ratio and image utilization, 49.65 db and 100% respectively.
[...] Read more.The morphological changes of retinal blood vessels are important indicators used to diagnose and monitor the progression of various diseases. A number of retinal blood vessel segmentation methods have been introduced, including the line operator based methods, which have shown satisfactory results. However, the basic line operator method cannot discriminate the pixels around the retinal optic disc, resulting in false classification of those pixels. In this paper, we integrate the detection of pixels around the retinal optic disc to the line operator method so that those pixels can be excluded from the vessel pixels. The method is evaluated on the widely used retinal dataset, the DRIVE dataset. The results demonstrate that the proposed method has made improvements over the basic and the multi-scale line detector with accuracy and area under curve of 0.942 and 0.9521, respectively.
[...] Read more.A PC based data acquisition was designed and developed using GM detector and a programmable microcontroller 16F876 of PIC family. This unit was calibrated with the standard Canberra Counter. It gave prompt response directly and has low power consumption. It was tested for gamma ray measurement to continuously monitor a radiological resulting from the natural and man-made sources that threat site security and human health. The system was simple to use, required no additional hardware and allows the selection of data. The collected data were easily being exported to a PC via parallel port. A "C" language program was developed to control the function of the entire system, using PCWH compiler.
[...] Read more.Vehicular ad-hoc networks (VANETs) form when vehicles are equipped with devices capable of short-range wireless communication. Vehicular Ad hoc networks involve motion of nodes depending on the mobility model chosen. Three important considerations in simulation of VANETs are mobility models, network simulator and the routing protocols. Selection of appropriate mobility model for evaluating routing protocol leads to efficient simulation results. Performance of routing protocols in VANETs can be measured using four metrics; bandwidth, packet loss, throughput and scalability. This research work is based on the simulation based analysis of Vehicular Ad- hoc networks using NS-2 as the network simulator. Performance evaluation of the protocols is conducted on the basis of four defined metrics and as conclusion is made according to the simulation results.
[...] Read more.Data Hiding is the process of embedding data into a media form such as image, voice, and video. The major methods used for data hiding are the frequency domain and the spatial domain. In the frequency domain, the secret data bits are inserted into the coefficients of the image pixel's frequency representation such as Discrete Cosine Transform (DCT) , Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) . On the other hand, in the spatial domain method, the secret data bits are inserted directly into the images' pixels value decomposition. The Lest Significant Bit (LSB) is consider as the most widely spatial domain method used for data hiding. LSB embeds the secret message's bits into the least significant bit plane( Binary decomposition) of the image in a sequentially manner . The LSB is simple, but it poses some critical issues. The secret message is easily detected and attacked duo to the sequential embedding process. Moreover, embedding using a higher bit plane would degrade the image quality. In this paper, we are proposing a novel data hiding method based on Lucas number system. We use Lucas number system to decompose the images' pixels values to allow using higher bit plane for embedding without degrading the image's quality. Moreover, the data hiding process security is enhanced by using Pseudo Random Number Generators(PRNG) for selecting the image's pixels used for embedding data.
[...] Read more.An automatic container code recognition system is of a great importance to the logistic supply chain management. Techniques have been proposed and implemented for the ISO container code region identification and recognition, however those systems have limitations on the type of container images with illumination factor and marks present on the container due to handling in the mass environmental condition. Moreover the research is not limited for differentiating between different formats of code and color of code characters. In this paper firstly an object clustering method is proposed to localize each line of the container code region. Secondly, the localizing algorithm is implemented with opencv and visual studio to perform localization and then recognition. Thus for real time application, the implemented system has added advantage of being easily integrated with other web application to increase the efficiency of the supply chain management. The experimental results and the application demonstrate the effectiveness of the proposed system for practical use.
[...] Read more.