Improved window adaptive gray level co-occurrence matrix for extraction and analysis of texture characteristics of pulmonary nodules

Author(s):  
Hao Chen ◽  
Wei Li ◽  
Youyu Zhu
Author(s):  
Abdelkrim Latreche ◽  
Kadda Benyahia

Electronic mail has become one of the most popular and frequently used channels for personal and professional online communication. Despite its benefits, e-mail faces a major security problem, which is the daily reception of a large number of unsolicited electronic messages, known as “spam emails.” Today, most electronic mail systems have simple spam filtering mechanisms based on text spam filtering technologies. To circumvent these filters, spammers are introducing new techniques of embedding spam messages in the image attached to the mail. In this article, the authors propose a new method for spam image filtering. The proposed system can distinguish between legitimate images from spam images based on the texture characteristics of the image attached to an email. From each image, around 20 characteristics can be extracted from the gray level co-occurrence matrix (GLCM). Then, to classify the images as spam or ham, the authors use a new metaheuristic nature-inspired model for building classifiers based on the social worker bees and enhanced nearest-centroid classification method.


2020 ◽  
Vol 4 (1) ◽  
pp. 203-211
Author(s):  
FADHILLAH AZMI ◽  
Amir Saleh ◽  
N P Dharshinni

Data security by using an alphanumeric combination password is no longer used, so it needs to be added security that is difficult to be manipulated by certain people. One type of security is the type of biometrics technology using face recognition which has different characteristics by combining the Viola-Jones algorithm to detect facial features, GLCM (Gray Level Co-occurrence Matrix) for extracting the texture characteristics of an image, and Cosine Similarity for the measurement of the proximity of the data (image matching). The image will be detected using the Viola-Jones algorithm to get face, eyes, nose, and mouth. The image detection results will be calculated the value of the texture characteristics with the GLCM (Gray Level Cooccurrence Matrix) algorithm. Image matching using cosine similarity will determine or match the data stored in the database with new image input until identification results are obtained. The results obtained in this study get the level of accuracy of the identification of the three algorithms by 77.20% with the amount of data that was correctly identified as many as 386 out of 500 images.Keywords: Security, face recognition, Viola-Jones, Cosine Similarity.


2012 ◽  
Vol 31 (6) ◽  
pp. 1628-1630
Author(s):  
Jia-jia OU ◽  
Bi-ye CAI ◽  
Bing XIONG ◽  
Feng LI

2019 ◽  
Vol 13 (2) ◽  
pp. 136-141 ◽  
Author(s):  
Abhisek Sethy ◽  
Prashanta Kumar Patra ◽  
Deepak Ranjan Nayak

Background: In the past decades, handwritten character recognition has received considerable attention from researchers across the globe because of its wide range of applications in daily life. From the literature, it has been observed that there is limited study on various handwritten Indian scripts and Odia is one of them. We revised some of the patents relating to handwritten character recognition. Methods: This paper deals with the development of an automatic recognition system for offline handwritten Odia character recognition. In this case, prior to feature extraction from images, preprocessing has been done on the character images. For feature extraction, first the gray level co-occurrence matrix (GLCM) is computed from all the sub-bands of two-dimensional discrete wavelet transform (2D DWT) and thereafter, feature descriptors such as energy, entropy, correlation, homogeneity, and contrast are calculated from GLCMs which are termed as the primary feature vector. In order to further reduce the feature space and generate more relevant features, principal component analysis (PCA) has been employed. Because of the several salient features of random forest (RF) and K- nearest neighbor (K-NN), they have become a significant choice in pattern classification tasks and therefore, both RF and K-NN are separately applied in this study for segregation of character images. Results: All the experiments were performed on a system having specification as windows 8, 64-bit operating system, and Intel (R) i7 – 4770 CPU @ 3.40 GHz. Simulations were conducted through Matlab2014a on a standard database named as NIT Rourkela Odia Database. Conclusion: The proposed system has been validated on a standard database. The simulation results based on 10-fold cross-validation scenario demonstrate that the proposed system earns better accuracy than the existing methods while requiring least number of features. The recognition rate using RF and K-NN classifier is found to be 94.6% and 96.4% respectively.


ICT Express ◽  
2021 ◽  
Author(s):  
Fitri Utaminingrum ◽  
Syam Julio A. Sarosa ◽  
Corina Karim ◽  
Femiana Gapsari ◽  
Randy Cahya Wihandika

Sign in / Sign up

Export Citation Format

Share Document