IJIGSP Vol. 7, No. 1, Dec. 2014
Cover page and Table of Contents: PDF (size: 125KB)
REGULAR PAPERS
Diabetic retinopathy is a severe complication retinal disease caused by advanced diabetes mellitus. Long suffering of this disease without threatment may cause blindness. Therefore, early detection of diabetic retinopathy is very important to prevent to become proliferative. One indication that a patient has diabetic retinopathy is the existence of hard exudates besides other indications such as microaneurysms and hemorrhages. In this study, the existence of hard exudates is applied to classify the moderate and severe grading of non-proliferative diabetic retinopathy in retinal fundus images. The hard exudates are segmented using K-means clustering. The segmented regions are extracted to obtain a feature vector which consists of the areas, the perimeters, the number of centroids and its standard deviation. Using three different classifiers, i.e. soft margin Support Vector Machine, Multilayer Perceptron, and Radial Basis Function Network, we achieve the accuracy of 89.29%, 91.07%, and 85.71% respectively, for 56 training data and 56 testing data of retinal images.
[...] Read more.In this paper we propose a geometry- topology based algorithm for Japanese Hiragana character recognition. This algorithm is based on center of gravity identification and is size, translation and rotation invariant. In addition, to the center of gravity, topology based landmarks like conjunction points masking the intersection of closed loops and multiple strokes, as well as end points have been used to compute centers of gravity of these points located in the individual quadrants of the circles enclosing the characters. After initial pre-processing steps like notarization, resizing, cropping, noise removal, synchronization, the total number of conjunction points as well as the total number of end points are computed and stored. The character is then encircled and divided into four quadrants. The center of gravity (cog) of the entire character as well as the cogs of each of the four quadrants are computed and the Euclidean distances of the conjunction and end points in each of the quadrants with the cogs are computed and stored. Values of these quantities both for target and template images are computed and a match is made with the character having the minimum Euclidean distance. Average accuracy obtained is 94.1 %.
[...] Read more.Quest of fool proof methods for extracting various urban features from high resolution satellite imagery with minimal human intervention has resulted in developing texture based algorithms. In view of the fact that the textural properties of images provide valuable information for discrimination purposes, it is appropriate to employ texture based algorithms for feature extraction. The Gray Level Co-occurrence Matrix (GLCM) method represents a highly efficient technique of extracting second order statistical texture features. The various urban features can be distinguished based on a set of features viz. energy, entropy, homogeneity etc. that characterize different aspects of the underlying texture. As a preliminary step, notable numbers of regions of interests of the urban feature and contrast locations are identified visually. After calculating Gray Level Co-occurrence matrices of these selected regions, the aforementioned texture features are computed. These features can be used to shape a high-dimensional feature vector to carry out content based retrieval. The insignificant features are eliminated to reduce the dimensionality of the feature vector by executing Principal Components Analysis (PCA). The selection of the discriminating features is also aided by the value of Jeffreys-Matusita (JM) distance which serves as a measure of class separability Feature identification is then carried out by computing these chosen feature vectors for every pixel of the entire image and comparing it with their corresponding mean values. This helps in identifying and classifying the pixels corresponding to urban feature being extracted. To reduce the commission errors, various index values viz. Soil Adjusted Vegetation Index (SAVI), Normalized Difference Vegetation Index (NDVI) and Normalized Difference Water Index (NDWI) are assessed for each pixel. The extracted output is then median filtered to isolate the feature of interest after removing the salt and pepper noise present, if any. Accuracy assessment of the methodology is performed by comparing the pixel-based evaluation on the basis of visual assessment of the image and the resultant mask image. This algorithm has been validated using high resolution images and its performance is found to be satisfactory.
[...] Read more.The evaluation of the performance of the Content Based Image Retrieval is undertaken for the consideration in this paper. Here the point of the discussion is the performance of the CBIR system using object oriented image segmentation and the evolutionary computational technique. The visual characteristics of the objects such as color, intensity and texture are extracted by the conventional methods. Object oriented image segmentation along with the evolutionary computational technique is proposed here for Image Retrieval Algorithm. Unsupervised Curve evolution method is used for object oriented segmentation of the Image and genetic Algorithm is used for the Optimum Classification and reduction in the Feature dimensionality. The Algorithm is tested on the images which are characterized by the low depth. The Berkeley database is found to be suitable for this purpose. The experimental result shows that the Genetic Algorithm enhances the performance of this Content Based Image Retrieval and found to be suitable for optimization of features selection and compression technique for Feature space.
[...] Read more.An overview of state of art in computerized object recognition techniques regarding digital images is revised. Advantages of shape based techniques are discussed. Importance of "Fourier Descriptor" (FD) for the shape based object representation is described. A survey for the available shape signature assignment methods with Fourier descriptors is presented. Details for the design of shape signature containing the crucial information of corners of the object are depicted. A novel shape signature is designed basing on the Farthest Point Angle (FPA) which corresponds to the contour point. FPA signature considers the computation of the angle between the line drawn from each contour point and the line drawn from the farthest corner point. Histogram for each 15o angle conceiving the information of the object is constructed. FPA signature is evaluated for three standard databases; viz., two in Kimia {K-99, K-216} and one in MPEG CE-1 Set B. The performance of the present FPA method estimated through recognition rate, time and degree of matching and is found to be higher.
[...] Read more.Information hiding in digital media such as audio, video and or images in order to establish the owner rights and to protect the copyrights commonly known as digital watermarking has received considerable attention of researchers over last few decades and lot of work has been done accordingly. A number of schemes and algorithms have been proposed and implemented using different techniques. The effectiveness of the technique depends on the host data values chosen for information hiding and the way watermark is being embedded in them. However, in view of the threats posed by the online pirates, the robustness and the security of the underlying watermarking techniques have always been a major concern of the researchers. This paper presents a secure and robust watermarking technique for color images using Discrete Wavelet Transformation. The results obtained have shown that the technique is robust against various common image processing attacks.
[...] Read more.Biometric authentication system is having several security issues. Two security issues are template protection at system database and at communication channel between system database and matcher subsystem of biometric system. In this paper, two level watermarking technique based on CS Theory framework in wavelet domain is proposed for security and authentication of biometric template at these two vulnerable points. In the proposed technique, generate sparse measurement information of fingerprint and iris biometric template using CS theory framework. This sparse measurement information is used as secure watermark information which is embedding into a face image of same individual for generation of multimodal biometric template. Sparse watermark information is computed using Discrete Wavelet transform (DWT) and random seed. The proposed watermarking technique not only provide protection to biometric templates, it also gives computational security against spoofing attack because of it is difficult for imposter to get three secure biometric template information where two encoded biometric template is embed in term of sparse measurement information into third biometric template. Similarity value between original watermark image and reconstructed watermark image is the measuring factor for identification and authentication. The experimental results show that the technique is robust against various attacks.
[...] Read more.WiMAX is a broadband wireless communication system which provides fixed as well as mobility services. The mobile-WiMAX offers a special feature that has adopted an adaptive modulation and coding (AMC) in OFDM to provide higher data rates and error free transmission. AMC technique employs the channel state information (CSI) to efficiently utilize the channel and maximize the throughput with better spectral efficiency. In this paper, LSE, MMSE, LMMSE, Low rank (Lr)-LMMSE channel estimators are integrated with the physical layer. The performance of estimation algorithms is analyzed in terms of BER, SNR, MSE and throughput. Simulation results proved that increment in modulation scheme size causes to improvement in throughput along with BER value. There is a trade-off among modulation size, BER value and throughput.
[...] Read more.