Advanced Image Processing Techniques and Applications - Advances in Computational Intelligence and Robotics
Latest Publications


TOTAL DOCUMENTS

17
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781522520535, 9781522520542

Author(s):  
Prabu Sevugan ◽  
Swarnalatha Purushotham ◽  
Ajay Chandran

Enthusiasm for accuracy farming practices and advances is becoming quickly all through the agrarian world. The accuracy farming can make utilization of the current methods, for example, GPS (Global Positioning System) innovation, GIS (Geographical Information System) innovation, RS (Remote Sensing) innovation and ES (Expert System) innovation et cetera, with a specific end goal to separate the agribusiness specialized measures among plots to acquire the better peripheral advantage of economy and environment. The study demonstrates to those generally accepted methods to utilize GIS (Geography Information System), Data mining and Web innovations in the rural master choice framework. This security with mass storage is satisfied by using GIS cloud server. This chapter discuss with an Integrated Geographic Information System with ES using Cloud Computing.


Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Author(s):  
Usha Devi Gandhi

The sensing power of traditional camera networks for efficiently addressing the critical tasks in the process of cluster – based target tracking of human, such as measurement integration, inclusion/exclusion in the cluster and cluster head rotation. The Wireless Camera Networks efficiently uses distribution friendly representation and methods in which every node contributes to the computation in each mechanism without the requirement of any prior knowledge of the rest of the nodes. These mechanisms and methods are integrated in two different distributed schemas so that it can be implemented in the same mean time without taking into the consideration of cluster size. Thus, the experimental evaluation shows that the proposed schemes and mechanisms drastically reduce the energy consumption and computational burden with respect to the existing methodology.


Author(s):  
Padma T ◽  
Jayashree Nair

Hard mathematical problems having no polynomial time algorithms to determine a solution are seemly in design of secure cryptosystems. The proposed watermarking system used number theoretic concepts of the hard higher order Diophantine equations for image content authentication scheme with three major phases such as 1) Formation of Diophantine equation; 2) Generation and embedding of dual Watermarks; and 3) Image content authentication and verification of integrity. Quality of the watermarked images, robustness to compression and security are bench-marked with two peer schemes which used dual watermarks.


Author(s):  
Vasumathy M ◽  
Mythili Thirugnanam

Foreign body aspiration (FBA) is a common problem among pediatric population that requires early diagnosis and prompt successful management. Conventionally the radiography image inspection processes are carried out manually by the experts of medical field. Recently automated systems are developed to improve the quality of the radiography images but none of the work carried out especially to determine the characteristics of the foreign bodies in pediatric foreign body aspired radiography images. The proposed approach focuses on characterizing the foreign body shape using sixteen various geometric and edge features. The shapes are determined by using fuzzy logical connectives formed by logically connecting two or more extracted information and a binary decision tree. More than 100 X-Ray radiography images are used to obtained the experimental research. The method proved that the results are more accurate in determining the foreign body shapes as circle, polygon, sharp and irregular automatically with less time.


Author(s):  
Chantana Chantrapornchai ◽  
Jitdumrong Preechasuk

Steganography is one of the techniques used to communicate secret data through the cover media such as images, videos, audio, texts etc. In this work, we consider the algorithms of steganography based on DCT and wavelet transform. The aspects of media quality after hiding the information in the digital media are considered. Particularly, we compare the performance of the prototype algorithms, representing the DCT and wavelet-based image steganography algorithms respectively, using the PSNR, capacity, robustness and accuracy aspects. For video steganography, with various wavelet transforms, we compare the quality of the derived information, when frames are dropped and the effects of payload is studied. The application of using such steganography algorithm which can embed multiple messages, each of which requires a separate key is proposed. The application can estimate the capacity used and capacity remains for the given cover image and texts.


Author(s):  
Suresh Kumar Nagarajan ◽  
Arun Kumar Sangaiah

This is the survey for finding vegetation, deforestation of earth images from various related papers from different authors. This survey deals with remote sensing and normalized difference vegetation index with various techniques. We survey almost 100 theoretical and empirical contributions in the current decade related to image processing, NDVI generation by using various new techniques. We also discuss significant challenges involved in the adaptation of existing image processing techniques to generation NDVI systems that can be useful in the real world. The resolution of remote sensing images increases every day, raising the level of detail and the heterogeneity of the scenes. Most of the existing geographic information systems classification tools have used the same methods for years. With these new high resolution images, basic classification methods do not provide satisfactory results.


Author(s):  
Jeyabharathi D ◽  
Dejey D

Developing universal methods for background subtraction and object tracking is one of the critical and hardest challenges in many video processing and computer-vision applications. To achieve superior foreground detection quality across unconstrained scenarios, a novel Two Layer Rotational Symmetry Dynamic Texture (RSDT) model is proposed, which avoids illumination variations by using two layers of spatio temporal patches. Spatio temporal patches describe both motion and appearance parameters in a video sequence. The concept of key frame is used to avoid redundant samples. Auto Regressive Integrated Moving Average model (ARIMA) (Hyndman & Rob, 2015) estimates the statistical parameters from the subspace. Uniform Local Derivative Pattern (LDP) (Zhang et al., 2010) acts as a feature for tracking objects in a video. Extensive experimental evaluations on a wide range of benchmark datasets validate the efficiency of RSDT compared to Center Symmetric Spatio Temporal Local Ternary Pattern (CS-STLTP) (Lin et al., 2015) for unconstrained video analytics.


Author(s):  
Chitra Anil Dhawale

Biometric Systems provide improved security over traditional electronic access control methods such as RFID tags, electronic keypads and some mechanical locks. The user's authorized card or password pin can be lost or stolen. In order for the biometrics to be ultra-secure and to provide more-than-average accuracy, more than one form of biometric identification is required. Hence the need arises for the use of multimodal biometrics. This uses a combination of different biometric recognition technologies. This chapter begins with the basic idea of Biometrics, Biometrics System with its components, Working and proceeds with the need of Multimodal Biometrics with the emphasis on review of various multimodal systems based on fusion ways and fusion level of various features. The last section of this chapter describes various multimodal Biometric Systems.


Author(s):  
Claudio Urrea ◽  
Gabriel Solar

The results of new experiments on the detection and description of images for an EKF-SLAM monocular application are employed in order to obtain a dispersed set of features without related data association problems. By means of different detectors/descriptors, the number of features observed and the ability to observe the same feature in various captures is evaluated. To this end, a monocular vision system independent of the EKF-SLAM system is designed and implemented using the MatLab software. This new system allows for—in addition to image capture—the detection and description of features as well as the association of data between images, thus serving as a priori information to avoid incorrect associations between the obtained features and the map of an EKF-SLAM system. Additionally, it enables the evaluation and comparison of the precision, consistency and convergence of various algorithms.


Sign in / Sign up

Export Citation Format

Share Document