Bird Species Identification from an Image

Artificial Intelligence & ML, Image Processing, Machine Learning
Predicting ground shaking intensities using DYFI data and estimating event terms to identify induced earthquakes In daily life we can hear a variety of creatures including human speech, dog barks, birdsongs, frog calls, etc. Many animals generate sounds either for communication or as a by product of their living activities such as eating, moving, flying, mating etc. Bird species identification is a well-known problem to ornithologists, and it is considered as a scientific task since antiquity. Technology for Birds and their sounds are in many ways important for our culture. They can be heard even in big cities and most people can recognize at least a few most common species by their sounds. Biologists tried to investigate species richness, presence or absence of indicator species, and the population sizes of…
Read More

Identifying Gender From Facial Features

Artificial Intelligence & ML, Image Processing, Machine Learning
Identifying Gender From Facial Features Previous research has shown that our brain has specialized nerve cells responding to specific local features of a scene, such as lines, edges, angles or movement. Our visual cortex combines these scattered pieces of information into useful patterns. Automatic face recognition aims to extract these meaningful pieces of information and put them together into a useful representation in order to perform a classification/identification task on them. While we attempt to identify gender from facial features, we are often curious about what features of the face are most important in determining gender. Are localized features such as eyes, nose and ears more important or overall features such as head shape, hair line and face contour more important? There are a plethora of successful and robut face…
Read More

Object Detection for Semantic SLAM using Convolution Neural Networks

Artificial Intelligence & ML, Data mining, Image Processing, Machine Learning
Object Detection for Semantic SLAM using Convolution Neural Networks Conventional SLAM (Simultaneous Localization and Mapping) systems typically provide odometry estimates and point-cloud reconstructions of an unknown environment. While these outputs can be used for tasks such as autonomous navigation, they lack any semantic information. Our project implements a modular object detection framework that can be used in conjunction with a SLAM engine to generate semantic scene reconstructions. A semantically-augmented reconstruction has many potential applications. Some examples include: • Discriminating between pedestrians, cars, bicyclists, etc in an autonomous driving system. • Loop-closure detection based on object-level descriptors. • Smart household bots that can retrieve objects given a natural language command. An object detection algorithm designed for these applications has a unique set of requirements and constraints. The algorithm needs to be…
Read More

Application of Neural Network In Handwriting Recognition

Artificial Intelligence & ML, Image Processing, Machine Learning
Application of Neural Network In Handwriting Recognition Handwriting recognition can be divided into two categories, namely on-line and off-line handwriting recognition. On-line recognition involves live transformation of character written by a user on a tablet or a smart phone. In contrast, off-line recognition is more challenging, which requires automatic conversion of scanned image or photos into a computerreadable text format. Motivated by the interesting application of off-line recognition technology, for instance the USPS address recognition system, and the Chase QuickDeposit system, this project will mainly focus on discovering algorithms that allow accurate, fast, and efficient character recognition process. The report will cover data acquisition, image processing, feature extraction, model training, results analysis, and future works. Image Processing Flow   Research Paper Link: Download Paper
Read More

Facial Keypoints Detection

Artificial Intelligence & ML, Image Processing
Facial Keypoints Detection Nowadays, facial key points detection has become a very popular topic and its applications include Snapchat, How old are you, have attracted a large number of users. The objective of facial key points detection is to find the facial key points in a given face, which is very challenging due to very different facial features from person to person. The idea of deep learning has been applied to this problem, such as neural network and cascaded neural network. And the results of these structures are significantly better than state-of-the-art methods, like feature extraction and dimension reduction algorithms. In our project, we would like to locate the key points in a given image using deep architectures to not only obtain lower loss for the detection task but also…
Read More

Image Mining Project

Data mining, Image Processing, Web | Desktop Application
Image Mining Project This software project concentrates on improved search for images. Usually we find systems that efficiently provide data mining functionality. This includes searching by comparing with text data. This text data is easy to mine since we just compare the words (alphabet combinations) to the words in our database. Well when it comes to images , most of the systems use data mining to search images based on image alt attribute or title that is the text associated to the image. Well this system searches images based on the image patterns and graphical methods, comparing images graphically to find a match between image color values. This efficient image mining system utilizes graphical pattern matching techniques and an algorithm for fast and approximate image retrieval using C#.
Read More

Graphical Password By Image Segmentation

Image Processing, Security and Encryption, Web | Desktop Application
Graphical Password By Image Segmentation The project allows user to input an image as its password and only user knows what the image looks like as a whole. On receiving the image the system segments the image into an array of images and stores them accordingly. The next time user logs on to the system the segmented image is received by the system in a jumbled order. Now if user chooses the parts of image in an order so as to make the original image he sent then user is considered authentic. Else the user is not granted access. The system uses image segmentation based on coordinates. The coordinates of the segmented image allow the system to fragment the image and store it in different parts. Actually system segments the…
Read More

Video Surveillance Project

Image Processing, Security and Encryption, Web | Desktop Application
Video Surveillance Project This is an innovative approach to video surveillance software project. We normally find video camera?s in banks and other organization that continuously record and save the recorded video footage for days or months. This utilizes a lot of battery life and storage capacity to store these large video footage. Well this video surveillance software is an enhanced version of organization security that continuously monitors but only records unusual changes in the organization. These unusual changes may include theft detection or fire detection in offices. It may also include rodent detection in bakeries or restaurants after closing. As soon as the system catches any unusual activity it takes steps and informs the user by: 1. Sending an sms to the user about an unusual activity. 2. Sending an…
Read More

Document checker and Corrector Project

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Web | Desktop Application
Document checker and Corrector Project HECKS YOUR .DOC OR .DOCX FILES IN THIS YOU CAN ATTACH FOLDER OF WORD DOCS AND THEN THE BELOW CONDITIONS CAN BE CHECKED IN THOSE DOC FILES AND ERROR REPORTS CAN BE GENERATED: ? All the pages must be seprate files, i.e 800 pages will be 800 files. ? All formatting should be in inches (?). ? FILE : Page set up : Top-Bottom-Left-Right 0.25?& Gutter: 0.5? Paper size A4, Layout: header/footer 0.7? ? Heading first ? Heading Style 1 ? Arial ? 16 ? Bold ? Heading second ? Heading Style 2 ? Arial ? 14 ? Bold & Italic. ? Heading third ? Heading Style 3 ? Arial ? 13 ? Bold & Italic. Use only in Header & Footer ? Heading position…
Read More

Student Attendance System by Barcode Scan

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Web | Desktop Application
Student Attendance System by Bar-code Scan In past days student mark their attendance on paper but sometimes there are chances of losing the paper. In that case we cannot calculate the attendance of students. So to overcome these issues we implement the system that will hide all student information (identity card) inside the Bar-Code. The project is a system that takes down students attendance using bar-code. Every student is provided with a card containing a unique bar-code. Each bar-code represents a unique id of students. Students just have to scan their cards using bar-code scanner and the system notes down their attendance as per dates. System then stores all the students attendance records and generates defaulter list. It also generates an overall report in excel sheet for admin. Such kind…
Read More

Face Recognition Attendance System

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Web | Desktop Application
Face Recognition Attendance System The system is developed for deploying an easy and a secure way of taking down attendance. The software first captures an image of all the authorized persons and stores the information into database. The system then stores the image by mapping it into a face coordinate structure. Next time whenever the registered person enters the premises the system recognizes the person and marks his attendance along with the time. It the person arrives late than his reporting time, the system speaks a warning ?you are xx minutes late! Do not repeat this.? Note: This system has around 40%-60% accuracy in scanning and recognizing faces.
Read More

Automatic Answer Checker

Artificial Intelligence & ML, Data mining, Image Processing, Security and Encryption, Sensor, Web | Desktop Application
Automatic Answer Checker An automatic answer checker application that checks and marks written answers similar to a human being. This software application is built to check subjective answers in an online examination and allocate marks to the user after verifying the answer. The system requires you to store the original answer for the system. This facility is provided to the admin. The admin may insert questions and respective subjective answers in the system. These answers are stored as notepad files. When a user takes the test he is provided with questions and area to type his answers. Once the user enters his/her answers the system then compares this answer to original answer written in database and allocates marks accordingly. Both the answers need not be exactly same word to word.…
Read More

Secure Lab Access Using Card Scanner Plus Face Recognition

Image Processing, Security and Encryption, Web | Desktop Application
Secure Lab Access Using Card Scanner Plus Face Recognition Research laboratories funded by private or government organizations are of strategic importance to a country. A lot of sensitive research is carried on in such laboratories. The confidentiality of such premises is of prime importance for the benefit of the society. At such time it becomes necessary to ensure high level authentication and authorization of personnel entering such facilities. A single form of authentication/authorization is not enough for these sensitive organizations. Here we propose a system that combines two different forms of authentication techniques to ensure only authorized persons access the premises. Our system integrates biometrics with secure card to create a dual secure high end security system never implemented before. The system first checks if the persons face is registered…
Read More

Expression Identification Using Image Processing

Image Processing, Web | Desktop Application
Expression Identification Using Image Processing There can be number of expression to explore emotions. Here we proposed a system where emotions can be analyzed and studied about emotions based on expression recognition technology. We will be working on images. Images are prone to noise so we will be using image preprocessing methodology to remove noise from image and to get accurate result. There will be expressive images stored in folder we extract color value of these images and store it into dataset. Filter is used to remove noise from image. Image is given as input to the system. We used an effective algorithm to recognize the expression. The proposed system is able to detect expression with 50%-60% success rate.
Read More

Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval.

Image Processing
Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval. With many potential practical applications, content- based image retrieval (CBIR) has attracted substantial attention during the past few years. A variety of relevance feedback (RF) schemes have been developed as a powerful tool to bridge the semantic gap between low-level visual features and high-level semantic concepts, and thus to improve the performance of CBIR systems. Among various RF approaches, support-vector-machine (SVM)-based RF is one of the most popular techniques in CBIR. Despite the success, directly using SVM as an RF scheme has two main drawbacks. First, it treats the positive and negative feedbacks equally, which is not appropriate since the two groups of training feedbacks have distinct properties. Second, most of the SVM-based RF techniques do not take into account the…
Read More

Automatic image equalization and contrast enhancement using Gaussian mixture

Image Processing, Web | Desktop Application
Automatic image equalization and contrast enhancement using Gaussian mixture Abstract In this paper, we propose an adaptive image equalization algorithm which automatically enhances the contrast in an input image. The algorithm uses Gaussian mixture model (GMM) to model the image grey-level distribution, and the intersection points of the Gaussian components in the model are used to partition the dynamic range of the image into input grey-level intervals. The contrast equalized image is generated by transforming the pixels’ grey levels in each input interval to the appropriate output grey-level interval according to the dominant Gaussian component and cumulative distribution function (CDF) of the input interval. To take account of human perception the Gaussian components with small variances are weighted with smaller values than the Gaussian components with larger variances, and the…
Read More

Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

Image Processing, Web | Desktop Application
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords Photos with people (e.g., family, friends, celebrities, etc.) are the major interest of users. Thus, with the exponentially growing photos, large-scale content-based face image retrieval is an enabling technology for many emerging applications. In this work, we aim to utilize automatically detected human attributes that contain semantic cues of the face photos to improve content- based face retrieval by constructing semantic codewords for effi-cient large-scale face retrieval. By leveraging human attributes in a scalable and systematic framework, we propose two orthogonal methods named attribute-enhanced sparse coding and attribute- embedded inverted indexing to improve the face retrieval in the offline and online stages. We investigate the effectiveness of different attributes and vital factors essential for face retrieval. Experimenting on two public datasets, the…
Read More

An effective image steganalysis method based on neighborhood information of pixels

Image Processing, Web | Desktop Application
An effective image steganalysis method based on neighborhood information of pixels This project focuses on image steganalysis. We use higher order image statistics based on neighborhood information of pixels (NIP) to detect the stego images from original ones. We use subtracting gray values of adjacent pixels to capture neighborhood information, and also make use of ―rotation invariant‖ property to reduce the dimensionality for the whole feature sets. We tested two kinds of NIP feature, the experimental results illustrates that our proposed feature sets are with good performance and even outperform the state-of-art in certain aspect.
Read More

Automatic Plant Leaf Classification for a Mobile Field Guide

Image Processing
Automatic Plant Leaf Classification for a Mobile Field Guide In this paper we describe the development of an Android application that gives users the ability to identify plant species based on photographs of the plant’s leaves taken with a mobile phone. At the heart of this application is an algorithm that acquires morphological features of the leaves, computes welldocumented metrics such as the angle code histogram (ACH), then classifies the species based on a novel combination of the computed metrics. The algorithm is first trained against several samples of known plant species and then used to classify unknown query species. Aided by features designed into the application such as touchscreen image rotation and contour preview, the algorithm is very successful in properly classifying species contained in the training library.
Read More

Secure And Authenticated Reversible Data Hiding In Encrypted Images

Image Processing, Web | Desktop Application
Secure And Authenticated Reversible Data Hiding In Encrypted Images Reversible data hiding a novel technique which is used to embed additional information in the encrypted images, applies in military and medical images, which can be recoverable with original media and the hided data without loss. A number of reversible data hiding techniques were proposed in the recent years, but on analysis, all lacks in providing the security and authentication. This project proposes a novel reversible data hiding technique which work is separable, the receiver can extract the original image or extra embedded data or both according to the keys hold by the receiver. On the other hand the receiver can verify the data hided by the data hider, such that the work proposes both security and authentication. This project proposes…
Read More

An extended visual cryptography scheme without pixel expansion for halftone images

Image Processing, Web | Desktop Application
An extended visual cryptography scheme without pixel expansion for halftone images Visual cryptography is a secret sharing scheme which use images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, the share images are constructed to contain meaningful cover images, thereby providing opportunities for integrating visual cryptography and biometric security techniques. In this paper, we propose a method for processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the recovered image is the same as for the original halftone secret image. The resulting scheme maintains the perfect security of the original extended visual cryptography approach.
Read More

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG

Image Processing, Web | Desktop Application
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Abstract—A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the PNG image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel…
Read More

Robust Face-Name Graph Matching for Movie Character Identification

Image Processing, Web | Desktop Application
Robust Face-Name Graph Matching for Movie Character Identification Automatic face identification of characters in movies has drawn significant research interests and led to many interesting applications. It is a challenging problem due to the huge variation in the appearance of each character. Although existing methods demonstrate promising results in clean environment, the performances are limited in complex movie scenes due to the noises generated during the face tracking and face clustering process. In this paper we present two schemes of global face-name matching based framework for robust character identification. The contributions of this work include: 1) A noise insensitive character relationship representation is incorporated. 2) We introduce an edit operation based graph matching algorithm. 3) Complex character changes are handled by simultaneously graph partition and graph matching. 4) Beyond existing…
Read More

A DYMANIC METHOD TO SECURE CONFIDENTIAL DATA USING SIGNCRYPTION WITH STEGANOGRAPHY

Image Processing, Web | Desktop Application
A DYMANIC METHOD TO SECURE CONFIDENTIAL DATA USING SIGNCRYPTION WITH STEGANOGRAPHY Since years due to the increase of technology, the means of communication and transferring information from one point to the other has been drastically changed. Because of this rapid development of technology, few people misusing the technology to unveil the confidential data. To provide high end security to the data to prevent form the attackers we are proposing a dynamic method in this paper. Two things are important to provide security to the data confidentiality and encryption. In this paper we are using signcryption technique to provide high security to the data, by encrypting the data with digital signature, because of this the attacker cannot do any kind of modification to the data in case the data is decrypted…
Read More

Mitigating of fire based disaster using IP

Image Processing, Web | Desktop Application
Mitigating of fire based disaster using IP Present work is an in depth study to detect flames in video by processing the data captured by an ordinary camera. Previous vision based methods were based on color difference, motion detection of flame pixel and flame edge detection. This paper focuses on optimizing the flame detection by identifying gray cycle pixels nearby the flame, which is generated because of smoke and of spreading of fire pixel and the area spread of flame. These techniques can be used to reduce false alarms along with fire detection methods . The novel system simulate the existing fire detection techniques with above given new techniques of fire detection and give optimized way to detect the fire in terms of less false alarms by giving the accurate…
Read More

A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

Image Processing, Web | Desktop Application
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching This paper proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The pixel pair is then replaced by the searched coordinate to conceal the digit. Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM. The maximum capacity of EMD is 1.161 bpp and DE extends the payload of EMD by embedding digits in a larger notational system. The proposed method offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits…
Read More

A Keyless Approach to Image Encryption

Image Processing, Security and Encryption, Web | Desktop Application
A Keyless Approach to Image Encryption Maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves dividing the image into random shares to maintain the images secrecy. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach without the use of encryption keys. The approach employs Sieving, Division and Shuffling to generate random shares such that with minimal computation, the original secret image can be recovered from the random shares without any loss of image…
Read More

N-Square Approach For Lossless Image Compression And Decompression

Image Processing, Web | Desktop Application
N-Square Approach For Lossless Image Compression And Decompression There are several lossy and lossless coding techniques developed all through the last two decades. Although very high compression can be achieved with lossy compression techniques, they are deficient in obtaining the original image. While lossless compression technique recovers the image exactly. In applications related to medical imaging lossless techniques are required, as the loss of information is deplorable. The objective of image compression is to symbolize an image with a handful number of bits as possible while preserving the quality required for the given application. In this paper we are introducing a new lossless encoding and decoding technique which even better reduces the entropy there by reducing the average number of bits with the utility of Non Binary Huffman coding through…
Read More

An Efficient Real Time Moving Object Detection Method for Video Surveillance System

Image Processing, Web | Desktop Application
An Efficient Real Time Moving Object Detection Method for Video Surveillance System Moving object detection has been widely used in diverse discipline such as intelligent transportation systems, airport security systems, video monitoring systems, and so on. In this paper, we propose an efficient moving object detection method using enhanced edge localization mechanism and gradient directional masking for video surveillance system. In our proposed method, gradient map images are initially generated from the input and background images using a gradient operator. The gradient difference map is then calculated from gradient map images. The moving object is then detected by using appropriate directional masking and thresholding. Simulation results indicate that the proposed method consistently performs well under different illumination conditions including indoor, outdoor, sunny, and foggy cases. Moreover, it outperforms well known…
Read More

Image Authentication and Restoration using BlockWise Fragile Watermarking based on k-Medoids Clustering Approach

Image Processing, Web | Desktop Application
Image Authentication and Restoration using BlockWise Fragile Watermarking based on k-Medoids Clustering Approach This paper proposes a block-wise fragile watermarking scheme based on k-medoids clustering approach. Proposed scheme is effective enough to reconstruct the tampered extensive content of an image. According to the suggested algorithm, first of all image is divided into the blocks and forty eight bits are calculated for each block, which consist of forty five Recovery bits and three Authentication bits namely Union bit, Affiliation bit and Spectrum bit. Authentication bits for a particular block are calculated by extracting five MSBs from each pixel of that block and apply them, on some predefined hash functions. Forty five Recovery bits are calculated using the means of derived clusters and its corresponding mapping bits. These Forty eight bits for…
Read More

A robust skew detection method based on maximum gradient difference and R-signature

Image Processing, Web | Desktop Application
A robust skew detection method based on maximum gradient difference and R-signature In this paper we study the detection of skewed text lines in scanned document images. The aim of our work is to develop a new automatic approach able to estimate precisely the skew angle of text in document images. Our new method is based on Maximum Gradient Difference (MGD) and R-signature. It detects zones that have high variations of gray values in different directions using the MGD transform. We consider these zones as being text regions. R-signature which is a shape descriptor based on Radon transform is then applied in order to approximate the skew angle. The accuracy of the proposed algorithm is evaluated on an open dataset by comparing error rates.
Read More

Image-based object detection under varying illumination in environments with specular surfaces

Image Processing, Web | Desktop Application
Image-based object detection under varying illumination in environments with specular surfaces Image-based environment representations capture the appearance of the surroundings of a mobile robot and are useful for the detection of novelty. However, image-based novelty detection can be impaired by illumination effects. In this paper we present an approach for the image-based detection of novel objects in a scene under varying lighting conditions and in the presence of objects with specular surfaces. The computation of an illumination-invariant image-based environment representation allows for the extraction of the shading of the environment from camera images. Using statistical models infered from the luminance and the saturation component of the shading images, secularities and shadows are detected and suppressed in the process of novelty detection. Experimental results show that the proposed method outperforms two…
Read More

A New Block Compressive Sensing to Control the Number of Measurements

Image Processing, Web | Desktop Application
A New Block Compressive Sensing to Control the Number of Measurements Compressive Sensing (CS) aims to recover a sparse signal from a small number of projections onto random vectors. Be- cause of its great practical possibility, both academia and in- dustries have made efforts to develop the CS’s reconstruction performance, but most of existing works remain at the theo- retical study. In this paper, we propose a new Block Compres- sive Sensing (nBCS), which has several benefits compared to the general CS methods. In particular, the nBCS can be dynamically adaptive to varying channel capacity because it conveys the good inheritance of the wavelet transform.
Read More

Secure Authentication using Image Processing and Visual Cryptography for Banking Applications

Image Processing, Web | Desktop Application
Secure Authentication using Image Processing and Visual Cryptography for Banking Applications Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch ofces. The major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of the databases on the internet, it is always quite difcult to trust the information on the internet. To solve this problem of authentication, we are proposing an algorithm based on image processing and visual cryptography. This paper proposes a technique of processing the signature of a customer and then dividing it into shares. Total number of shares to be created is depending on the scheme chosen by the bank.…
Read More

Lossless image compression based on data folding

Image Processing, Web | Desktop Application
Lossless image compression based on data folding The paper presents an approach for lossless image compression in spatial domain for continuous-tone images using a novel concept of image folding. The proposed method uses the property of adjacent neighbor redundancy for prediction. In this method, column folding followed by row folding is applied iteratively on the image till the image size reduces to a smaller pre-defined value. For column folding, elements of even columns are subtracted from elements of odd columns. Thereafter, row folding is applied on odd columns in a similar fashion. In row folding, even rows are subtracted from odd rows and the resultant odd rows are used for next iteration. The difference data, thus obtained, is stored in a tile format; which along with the reduced image is…
Read More

A chaotic system based fragile watermarking scheme for image tamper detection

Image Processing, Web | Desktop Application
A chaotic system based fragile watermarking scheme for image tamper detection In the past few years, various fragile watermarking techniques have been proposed for image authen- tication and tamper detection. In this paper, a novel chaos based watermarking scheme for image authentication and tamper detection is proposed. Tamper localization and detection accuracy are two important aspects of the authentication watermarking schemes. Our scheme can detect any modifica- tion made to the image and can also indicate the specific locations that have been modified. To improve the security of the proposed scheme two chaotic maps are employed. Since chaotic maps are sensitive to initial values, the corresponding position relation between pixels in the watermarked image and the watermark get disturbed, which helps the watermarking scheme to withstand counterfeiting attacks. Initial values…
Read More

Linear distance coding for image classification

Image Processing, Web | Desktop Application
Linear distance coding for image classification The traditional SPM approach based on bag-of-features (BoF) requires nonlinear classifiers to achieve good image classification performance. This paper presents a simple but effective coding scheme called Locality-constrained Linear Coding (LLC) in place of the VQ coding in traditional SPM. LLC utilizes the locality constraints to project each descriptor into its local-coordinate system, and the projected coordinates are integrated by max pooling to generate the final representation. With linear classifier, the proposed approach performs remarkably better than the traditional nonlinear SPM, achieving state-of-the-art performance on several benchmarks. Compared with the sparse coding strategy [22], the objective function used by LLC has an analytical solution. In addition, the paper proposes a fast approximated LLC method by first performing a K-nearest-neighbor search and then solving a…
Read More

Security Enhancement Scheme for Image Steganography using S-DES Technique

Image Processing
Security Enhancement Scheme for Image Steganography using S-DES Technique In today‟s information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. Cryptography and Steganography are the two major techniques for secret communication. The contents of secret message are scrambled in cryptography, where as in steganography the secret message is embedded into the cover medium. This paper presents a new generalized model by combining cryptographic and steganographic Technique. These two techniques encrypt the data as well as hide the encrypted data in another medium so the fact that a message being sent is concealed. In cryptography we are using Simplified Data Encryption Standard (S-DES) algorithm to encrypt secret message and then alteration component method is used to hide encrypted…
Read More

Robust Watermarking of Compressed and Encrypted JPEG2000 Images

Image Processing, Web | Desktop Application
Robust Watermarking of Compressed and Encrypted JPEG2000 Images Digital asset management systems (DAMS) generally handle media data in a compressed and encrypted form. It is sometimes necessary to watermark these compressed encrypted media items in the compressed-encrypted domain itself for tamper detection or ownership declaration or copyright management purposes. It is a challenge to watermark these compressed encrypted streams as the compression process would have packed the information of raw media into a low number of bits and encryption would have randomized the compressed bit stream. Attempting to watermark such a randomized bit stream can cause a dramatic degradation of the media quality. Thus it is necessary to choose an encryption scheme that is both secure and will allow watermarking in a predictable manner in the compressed encrypted domain. In…
Read More

Image compression and decompression using adaptive interpolation

Image Processing, Web | Desktop Application
Image compression and decompression using adaptive interpolation A simple and fast lossy compression and decompression algorithm for digital images is proposed. The method offers varying compression ratios (depending on dimensions of the image) and the acquired decompressed image is close to the original one. A selectable tradeoff between storage size and image quality is allowed,making it possible to adjust degree of compression. Compared to JPEG, it provides us better compression ratio. The suggested method does not restrict itself to any particular type of image.
Read More