Video Surveillance Project

Image Processing, Multimedia, Parallel And Distributed System
Name Video Surveillance Project Technology DotNET,MS SQL Category Web Application Description This is an innovative approach to video surveillance software project. We normally find video camera’s in banks and other organization that continuously record and save the recorded video footage for days or months. This utilizes a lot of battery life and storage capacity to store these large video footage. Well this video surveillance software is an enhanced version of organization security that continuously monitors but only records unusual changes in the organization. These unusual changes may include theft detection or fire detection in offices. It may also include rodent detection in bakeries or restaurants after closing. As soon as the system catches any unusual activity it takes steps and informs the user by: 1. Sending an sms to the…
Read More

Graphical Password By Image Segmentation

Image Processing, Parallel And Distributed System, Security & Encryption, Web Application
Name Graphical Password By Image Segmentation Technology DotNET,MS SQL Category Web Application Description The project allows user to input an image as its password and only user knows what the image looks like as a whole. On receiving the image the system segments the image into an array of images and stores them accordingly. The next time user logs on to the system the segmented image is received by the system in a jumbled order. Now if user chooses the parts of image in an order so as to make the original image he sent then user is considered authentic. Else the user is not granted access. The system uses image segmentation based on coordinates. The coordinates of the segmented image allow the system to fragment the image and store…
Read More

Face Recognition Attendance System

Image Processing, Parallel And Distributed System, Web Application
Name Face Recognition Attendance System Technology DotNET,MS SQL Category Web Application Description The system is developed for deploying an easy and a secure way of taking down attendance. The software first captures an image of all the authorized persons and stores the information into database. The system then stores the image by mapping it into a face coordinate structure. Next time whenever the registered person enters the premises the system recognizes the person and marks his attendance along with the time. It the person arrives late than his reporting time, the system speaks a warning “you are xx minutes late! Do not repeat this.” Note: This system has around 40%-60% accuracy in scanning and recognizing faces. IEEE Paper Yes IEEE Paper Year 2015
Read More

Look Based Media Player

Image Processing, Multimedia, Parallel And Distributed System
Name Look Based Media Player Technology DotNET,MS SQL Category Web Application Description Name Automated Attendance System Technology DotNET,MS SQL Category Web Application Description Usually when you are watching a video and someone calls you, you have to look somewhere else or go away from pc for some time so you miss some part of the video. Later you need to drag back the video from where you saw it. Well here is a solution to this problem. A look based media player that pauses itself when user is not looking at it. The player starts running again as soon as the user looks at it again. This is done using the camera or webcam on top of the computer. As long as the camera detects the users face looking at…
Read More

Cursor Movement By Hand Gesture Project

Image Processing, Multimedia, Web Application
Name Cursor Movement By Hand Gesture Project Technology DotNET,MS SQL Category Web Application Description Name Automated Attendance System Technology DotNET,MS SQL Category Web Application Description We all wonder it would have been so comfortable if we could control cursor through the use of hand gestures. Well our proposed project puts forward a hand gesture based system that allows user to control the pc mouse movements through the use of hand movements. Our system uses pc webcam in order to detect hand gesture movements. The system continuously scans the camera input for five finger hand like patterns. Once a hand is detected, the system then locks it as an objects. A flag is set on the object in order to mark it as an object. After the object has been flagged…
Read More

Camera Motion Sensing Project

Image Processing, Multimedia, Parallel And Distributed System
Name Camera Motion Sensing Project Technology DotNET,MS SQL Category Web Application Description A motion sensor project that detects motion and sounds an alarm accordingly. This software system is designed in C# that constantly monitors an environment using a camera and sounds an alarm and even records images of the motion taking place as soon as it takes place IEEE Paper Yes IEEE Paper Year 2015
Read More

Expression Identification Using Image Processing

Image Processing, Web Application
Name Expression Identification Using Image Processing Technology MsSql, Dot NET Category Web Application Description There can be number of expression to explore emotions. Here we proposed a system where emotions can be analyzed and studied about emotions based on expression recognition technology. We will be working on images. Images are prone to noise so we will be using image preprocessing methodology to remove noise from image and to get accurate result. There will be expressive images stored in folder we extract color value of these images and store it into dataset. Filter is used to remove noise from image. Image is given as input to the system. We used an effective algorithm to recognize the expression. The proposed system is able to detect expression with 50%-60% success rate. IEEE Paper…
Read More

Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval.

Image Processing
Name Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval. Technology Matlab, Dot net Category Image Processing Description With many potential practical applications, content- based image retrieval (CBIR) has attracted substantial attention during the past few years. A variety of relevance feedback (RF) schemes have been developed as a powerful tool to bridge the semantic gap between low-level visual features and high-level semantic concepts, and thus to improve the performance of CBIR systems. Among various RF approaches, support-vector-machine (SVM)-based RF is one of the most popular techniques in CBIR. Despite the success, directly using SVM as an RF scheme has two main drawbacks. First, it treats the positive and negative feedbacks equally, which is not appropriate since the two groups of training feedbacks have distinct properties. Second, most of the…
Read More

Automatic image equalization and contrast enhancement using Gaussian mixture

Image Processing
Name Automatic image equalization and contrast enhancement using Gaussian mixture Technology Matlab, Dot nat Category Image Processing Description Abstract In this paper, we propose an adaptive image equalization algorithm which automatically enhances the contrast in an input image. The algorithm uses Gaussian mixture model (GMM) to model the image grey-level distribution, and the intersection points of the Gaussian components in the model are used to partition the dynamic range of the image into input grey-level intervals. The contrast equalized image is generated by transforming the pixels’ grey levels in each input interval to the appropriate output grey-level interval according to the dominant Gaussian component and cumulative distribution function (CDF) of the input interval. To take account of human perception the Gaussian components with small variances are weighted with smaller values…
Read More

Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

Image Processing
Name Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords Technology Matlab, Dot net Category Image Processing Description Photos with people (e.g., family, friends, celebrities, etc.) are the major interest of users. Thus, with the exponentially growing photos, large-scale content-based face image retrieval is an enabling technology for many emerging applications. In this work, we aim to utilize automatically detected human attributes that contain semantic cues of the face photos to improve content- based face retrieval by constructing semantic codewords for effi-cient large-scale face retrieval. By leveraging human attributes in a scalable and systematic framework, we propose two orthogonal methods named attribute-enhanced sparse coding and attribute- embedded inverted indexing to improve the face retrieval in the offline and online stages. We investigate the effectiveness of different attributes and vital factors essential…
Read More

An effective image steganalysis method based on neighborhood information of pixels

Image Processing
Name An effective image steganalysis method based on neighborhood information of pixels Technology Matlab, Dot net Category Image Processing Description This project focuses on image steganalysis. We use higher order image statistics based on neighborhood information of pixels (NIP) to detect the stego images from original ones. We use subtracting gray values of adjacent pixels to capture neighborhood information, and also make use of ―rotation invariant‖ property to reduce the dimensionality for the whole feature sets. We tested two kinds of NIP feature, the experimental results illustrates that our proposed feature sets are with good performance and even outperform the state-of-art in certain aspect. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Automatic Plant Leaf Classification for a Mobile Field Guide

Image Processing
Name Automatic Plant Leaf Classification for a Mobile Field Guide Technology Matlab, Dot net, Java Category Image Processing Description In this paper we describe the development of an Android application that gives users the ability to identify plant species based on photographs of the plant’s leaves taken with a mobile phone. At the heart of this application is an algorithm that acquires morphological features of the leaves, computes welldocumented metrics such as the angle code histogram (ACH), then classifies the species based on a novel combination of the computed metrics. The algorithm is first trained against several samples of known plant species and then used to classify unknown query species. Aided by features designed into the application such as touchscreen image rotation and contour preview, the algorithm is very successful…
Read More

Secure And Authenticated Reversible Data Hiding In Encrypted Images

Image Processing
Name Secure And Authenticated Reversible Data Hiding In Encrypted Images Technology Matlab, Dot net Category Image Processing Description Reversible data hiding a novel technique which is used to embed additional information in the encrypted images, applies in military and medical images, which can be recoverable with original media and the hided data without loss. A number of reversible data hiding techniques were proposed in the recent years, but on analysis, all lacks in providing the security and authentication. This project proposes a novel reversible data hiding technique which work is separable, the receiver can extract the original image or extra embedded data or both according to the keys hold by the receiver. On the other hand the receiver can verify the data hided by the data hider, such that the…
Read More

An extended visual cryptography scheme without pixel expansion for halftone images

Image Processing
Name An extended visual cryptography scheme without pixel expansion for halftone images Technology Matlab, Dot net Category Image Processing Description Visual cryptography is a secret sharing scheme which use images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, the share images are constructed to contain meaningful cover images, thereby providing opportunities for integrating visual cryptography and biometric security techniques. In this paper, we propose a method for processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the recovered image is the same as for the original halftone secret image. The resulting scheme maintains the perfect security…
Read More

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG

Image Processing
Name A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Technology Matlab, Dot net Category Image Processing Description Abstract—A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the PNG image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share…
Read More

Robust Face-Name Graph Matching for Movie Character Identification

Image Processing
Name Robust Face-Name Graph Matching for Movie Character Identification Technology Matlab, Dot net Category Image Processing Description Automatic face identification of characters in movies has drawn significant research interests and led to many interesting applications. It is a challenging problem due to the huge variation in the appearance of each character. Although existing methods demonstrate promising results in clean environment, the performances are limited in complex movie scenes due to the noises generated during the face tracking and face clustering process. In this paper we present two schemes of global face-name matching based framework for robust character identification. The contributions of this work include: 1) A noise insensitive character relationship representation is incorporated. 2) We introduce an edit operation based graph matching algorithm. 3) Complex character changes are handled by…
Read More

A DYMANIC METHOD TO SECURE CONFIDENTIAL DATA USING SIGNCRYPTION WITH STEGANOGRAPHY

Image Processing
Name A DYMANIC METHOD TO SECURE CONFIDENTIAL DATA USING SIGNCRYPTION WITH STEGANOGRAPHY Technology Matlab, Dot net Category Image Processing Description Since years due to the increase of technology, the means of communication and transferring information from one point to the other has been drastically changed. Because of this rapid development of technology, few people misusing the technology to unveil the confidential data. To provide high end security to the data to prevent form the attackers we are proposing a dynamic method in this paper. Two things are important to provide security to the data confidentiality and encryption. In this paper we are using signcryption technique to provide high security to the data, by encrypting the data with digital signature, because of this the attacker cannot do any kind of modification…
Read More

Mitigating of fire based disaster using IP

Image Processing
Name Mitigating of fire based disaster using IP Technology Matlab, dot net Category Image Processing Description Present work is an in depth study to detect flames in video by processing the data captured by an ordinary camera. Previous vision based methods were based on color difference, motion detection of flame pixel and flame edge detection. This paper focuses on optimizing the flame detection by identifying gray cycle pixels nearby the flame, which is generated because of smoke and of spreading of fire pixel and the area spread of flame. These techniques can be used to reduce false alarms along with fire detection methods . The novel system simulate the existing fire detection techniques with above given new techniques of fire detection and give optimized way to detect the fire in…
Read More

A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

Image Processing
Name A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Technology Matlab, Dot net Category Image Processing Description This paper proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The pixel pair is then replaced by the searched coordinate to conceal the digit. Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM. The maximum capacity of EMD is 1.161 bpp and DE extends the payload of EMD by embedding digits in a larger notational system. The proposed method offers lower distortion than DE by…
Read More

A Keyless Approach to Image Encryption

Image Processing
Name A Keyless Approach to Image Encryption Technology Matlab, Dot net Category Image Processing Description Abstract— Maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves dividing the image into random shares to maintain the images secrecy. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach without the use of encryption keys. The approach employs Sieving, Division and Shuffling to generate random shares such that with minimal computation, the original secret image can be…
Read More

N-Square Approach For Lossless Image Compression And Decompression

Image Processing
Name N-Square Approach For Lossless Image Compression And Decompression Technology Matlab, Dot net Category Image Processing Description There are several lossy and lossless coding techniques developed all through the last two decades. Although very high compression can be achieved with lossy compression techniques, they are deficient in obtaining the original image. While lossless compression technique recovers the image exactly. In applications related to medical imaging lossless techniques are required, as the loss of information is deplorable. The objective of image compression is to symbolize an image with a handful number of bits as possible while preserving the quality required for the given application. In this paper we are introducing a new lossless encoding and decoding technique which even better reduces the entropy there by reducing the average number of bits…
Read More

An Efficient Real Time Moving Object Detection Method for Video Surveillance System

Image Processing
Name An Efficient Real Time Moving Object Detection Method for Video Surveillance System Technology MATLAB, Dot net Category Image Processing Description Moving object detection has been widely used in diverse discipline such as intelligent transportation systems, airport security systems, video monitoring systems, and so on. In this paper, we propose an efficient moving object detection method using enhanced edge localization mechanism and gradient directional masking for video surveillance system. In our proposed method, gradient map images are initially generated from the input and background images using a gradient operator. The gradient difference map is then calculated from gradient map images. The moving object is then detected by using appropriate directional masking and thresholding. Simulation results indicate that the proposed method consistently performs well under different illumination conditions including indoor, outdoor,…
Read More

Image Authentication and Restoration using BlockWise Fragile Watermarking based on k-Medoids Clustering Approach

Image Processing
Name Image Authentication and Restoration using BlockWise Fragile Watermarking based on k-Medoids Clustering Approach Technology MATLAB, Dot net Category Image Processing Description This paper proposes a block-wise fragile watermarking scheme based on k-medoids clustering approach. Proposed scheme is effective enough to reconstruct the tampered extensive content of an image. According to the suggested algorithm, first of all image is divided into the blocks and forty eight bits are calculated for each block, which consist of forty five Recovery bits and three Authentication bits namely Union bit, Affiliation bit and Spectrum bit. Authentication bits for a particular block are calculated by extracting five MSBs from each pixel of that block and apply them, on some predefined hash functions. Forty five Recovery bits are calculated using the means of derived clusters and…
Read More

A robust skew detection method based on maximum gradient difference and R-signature

Image Processing
Name A robust skew detection method based on maximum gradient difference and R-signature Technology MATLAB, Dot net Category Image Processing Description In this paper we study the detection of skewed text lines in scanned document images. The aim of our work is to develop a new automatic approach able to estimate precisely the skew angle of text in document images. Our new method is based on Maximum Gradient Difference (MGD) and R-signature. It detects zones that have high variations of gray values in different directions using the MGD transform. We consider these zones as being text regions. R-signature which is a shape descriptor based on Radon transform is then applied in order to approximate the skew angle. The accuracy of the proposed algorithm is evaluated on an open dataset by…
Read More

Image-based object detection under varying illumination in environments with specular surfaces

Image Processing
Name Image-based object detection under varying illumination in environments with specular surfaces Technology MATLAB, Dot net Category Image Processing Description Image-based environment representations capture the appearance of the surroundings of a mobile robot and are useful for the detection of novelty. However, image-based novelty detection can be impaired by illumination effects. In this paper we present an approach for the image-based detection of novel objects in a scene under varying lighting conditions and in the presence of objects with specular surfaces. The computation of an illumination-invariant image-based environment representation allows for the extraction of the shading of the environment from camera images. Using statistical models infered from the luminance and the saturation component of the shading images, secularities and shadows are detected and suppressed in the process of novelty detection.…
Read More

A New Block Compressive Sensing to Control the Number of Measurements

Image Processing
Name A New Block Compressive Sensing to Control the Number of Measurements Technology Dot net, MATLAB Category Image Processing Description Compressive Sensing (CS) aims to recover a sparse signal from a small number of projections onto random vectors. Be- cause of its great practical possibility, both academia and in- dustries have made efforts to develop the CS’s reconstruction performance, but most of existing works remain at the theo- retical study. In this paper, we propose a new Block Compres- sive Sensing (nBCS), which has several benefits compared to the general CS methods. In particular, the nBCS can be dynamically adaptive to varying channel capacity because it conveys the good inheritance of the wavelet transform. IEEE Paper Yes IEEE Paper Year 2011 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Lossless image compression based on data folding

Image Processing
Name Lossless image compression based on data folding Technology Dot net, MATLAB Category Image Processing Description The paper presents an approach for lossless image compression in spatial domain for continuous-tone images using a novel concept of image folding. The proposed method uses the property of adjacent neighbor redundancy for prediction. In this method, column folding followed by row folding is applied iteratively on the image till the image size reduces to a smaller pre-defined value. For column folding, elements of even columns are subtracted from elements of odd columns. Thereafter, row folding is applied on odd columns in a similar fashion. In row folding, even rows are subtracted from odd rows and the resultant odd rows are used for next iteration. The difference data, thus obtained, is stored in a…
Read More

A chaotic system based fragile watermarking scheme for image tamper detection

Image Processing
Name A chaotic system based fragile watermarking scheme for image tamper detection Technology Dot net, MATLAB Category Image Processing Description In the past few years, various fragile watermarking techniques have been proposed for image authen- tication and tamper detection. In this paper, a novel chaos based watermarking scheme for image authentication and tamper detection is proposed. Tamper localization and detection accuracy are two important aspects of the authentication watermarking schemes. Our scheme can detect any modifica- tion made to the image and can also indicate the specific locations that have been modified. To improve the security of the proposed scheme two chaotic maps are employed. Since chaotic maps are sensitive to initial values, the corresponding position relation between pixels in the watermarked image and the watermark get disturbed, which helps…
Read More

Linear distance coding for image classification

Image Processing
Name Linear distance coding for image classification Technology Dot net, MATLAB Category Image Processing Description The traditional SPM approach based on bag-of-features (BoF) requires nonlinear classifiers to achieve good image classification performance. This paper presents a simple but effective coding scheme called Locality-constrained Linear Coding (LLC) in place of the VQ coding in traditional SPM. LLC utilizes the locality constraints to project each descriptor into its local-coordinate system, and the projected coordinates are integrated by max pooling to generate the final representation. With linear classifier, the proposed approach performs remarkably better than the traditional nonlinear SPM, achieving state-of-the-art performance on several benchmarks. Compared with the sparse coding strategy [22], the objective function used by LLC has an analytical solution. In addition, the paper proposes a fast approximated LLC method by…
Read More

Security Enhancement Scheme for Image Steganography using S-DES Technique

Image Processing
Name Security Enhancement Scheme for Image Steganography using S-DES Technique Technology Dot net, MATLAB Category Image Processing Description In today‟s information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. Cryptography and Steganography are the two major techniques for secret communication. The contents of secret message are scrambled in cryptography, where as in steganography the secret message is embedded into the cover medium. This paper presents a new generalized model by combining cryptographic and steganographic Technique. These two techniques encrypt the data as well as hide the encrypted data in another medium so the fact that a message being sent is concealed. In cryptography we are using Simplified Data Encryption Standard (S-DES) algorithm to encrypt secret message and…
Read More

Robust Watermarking of Compressed and Encrypted JPEG2000 Images

Image Processing
Name Robust Watermarking of Compressed and Encrypted JPEG2000 Images Technology Dot net, MATLAB Category Image Processing Description Digital asset management systems (DAMS) generally handle media data in a compressed and encrypted form. It is sometimes necessary to watermark these compressed encrypted media items in the compressed-encrypted domain itself for tamper detection or ownership declaration or copyright management purposes. It is a challenge to watermark these compressed encrypted streams as the compression process would have packed the information of raw media into a low number of bits and encryption would have randomized the compressed bit stream. Attempting to watermark such a randomized bit stream can cause a dramatic degradation of the media quality. Thus it is necessary to choose an encryption scheme that is both secure and will allow watermarking in…
Read More

Image compression and decompression using adaptive interpolation

Image Processing
Name Image compression and decompression using adaptive interpolation Technology Dot net, MATLAB Category Image Processing Description Abstract: A simple and fast lossy compression and decompression algorithm for digital images is proposed. The method offers varying compression ratios (depending on dimensions of the image) and the acquired decompressed image is close to the original one. A selectable tradeoff between storage size and image quality is allowed,making it possible to adjust degree of compression. Compared to JPEG, it provides us better compression ratio. The suggested method does not restrict itself to any particular type of image. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More