首页 > 最新文献

2014 Fifth International Conference on Signal and Image Processing最新文献

英文 中文
Rule Line Detection and Removal in Handwritten Text Images 手写体文本图像中的规则线检测与去除
Pub Date : 2014-01-08 DOI: 10.1109/ICSIP.2014.55
Syed Imtiaz, P. Nagabhushan, S. D. Gowda
Analysis of handwritten document images is one of the key areas of research in image processing domain. The objective of the analysis is to recognize the text components in an image and extract the intended information. However, inscription of handwriting usually would be on documents with rule lines, since they act as guide lines to the writer to ensure the writing remains straight and is of uniform size. These lines make the task of recognition difficult and hence removing them automatically becomes a major issue in text image processing. To accomplish this objective, an attempt is being made in this paper to remove the horizontal rule lines and vertical margin line for efficient recognition and analysis of the foreground text. Using mathematical morphology, predominant horizontal and vertical lines are removed leaving out stray lines which hinder the further processing of text. The stray lines are identified and removed using entropy with sliding window based on dynamic thresholding.
手写体文档图像分析是图像处理领域的研究热点之一。分析的目的是识别图像中的文本成分并提取预期的信息。然而,笔迹的铭文通常是在有规则线的文件上,因为它们是作者的指导线,以确保文字保持直线和均匀的大小。这些线条使识别任务变得困难,因此自动去除它们成为文本图像处理中的一个主要问题。为了实现这一目标,本文尝试去除水平线和垂直边距线,以便有效地识别和分析前景文本。使用数学形态学,主要的水平线和垂直线被删除,留下干扰文本进一步处理的杂散线。利用基于动态阈值的滑动窗口熵来识别和去除杂散线。
{"title":"Rule Line Detection and Removal in Handwritten Text Images","authors":"Syed Imtiaz, P. Nagabhushan, S. D. Gowda","doi":"10.1109/ICSIP.2014.55","DOIUrl":"https://doi.org/10.1109/ICSIP.2014.55","url":null,"abstract":"Analysis of handwritten document images is one of the key areas of research in image processing domain. The objective of the analysis is to recognize the text components in an image and extract the intended information. However, inscription of handwriting usually would be on documents with rule lines, since they act as guide lines to the writer to ensure the writing remains straight and is of uniform size. These lines make the task of recognition difficult and hence removing them automatically becomes a major issue in text image processing. To accomplish this objective, an attempt is being made in this paper to remove the horizontal rule lines and vertical margin line for efficient recognition and analysis of the foreground text. Using mathematical morphology, predominant horizontal and vertical lines are removed leaving out stray lines which hinder the further processing of text. The stray lines are identified and removed using entropy with sliding window based on dynamic thresholding.","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Vision Based Robotic System for Military Applications -- Design and Real Time Validation 基于视觉的军事机器人系统——设计与实时验证
Pub Date : 2014-01-08 DOI: 10.1109/ICSIP.2014.8
Sandeep Bhat, M. Meenakshi
This paper presents the design, development and validation of vision based autonomous robotic system for military applications. Sum of Absolute Difference (SAD) algorithm is used for the implementation of the proposed image processing algorithm. It works on the principle of image subtraction. The developed algorithm is validated in real time by change-based moving object detection method. The novelty of this work is the application of the developed autonomous robot for the detection of mines in the war field. Developed algorithm is validated both in offline using MATLAB simulation and in real time by conducting an experiment. Once the confidence of using the algorithm is increased, developed algorithm is coded into the Microcontroller based hardware and is validated in real time. Real time experimental results match well with those of the offline simulation results. However, there is only a small mismatch in distance and accuracy of the target detection, which is due to the limitations of the hardware used for the implementation.
本文介绍了基于视觉的军用自主机器人系统的设计、开发和验证。采用绝对差和(Sum of Absolute Difference, SAD)算法实现了所提出的图像处理算法。它的工作原理是图像减法。通过基于变化的运动目标检测方法对该算法进行了实时验证。这项工作的新颖之处在于将自主机器人应用于战场上的地雷探测。通过MATLAB仿真和实时实验验证了所开发算法的有效性。一旦提高了使用算法的可信度,就将所开发的算法编码到基于单片机的硬件中,并进行实时验证。实时实验结果与离线仿真结果吻合较好。然而,在目标检测的距离和精度上只有很小的不匹配,这是由于用于实现的硬件的限制。
{"title":"Vision Based Robotic System for Military Applications -- Design and Real Time Validation","authors":"Sandeep Bhat, M. Meenakshi","doi":"10.1109/ICSIP.2014.8","DOIUrl":"https://doi.org/10.1109/ICSIP.2014.8","url":null,"abstract":"This paper presents the design, development and validation of vision based autonomous robotic system for military applications. Sum of Absolute Difference (SAD) algorithm is used for the implementation of the proposed image processing algorithm. It works on the principle of image subtraction. The developed algorithm is validated in real time by change-based moving object detection method. The novelty of this work is the application of the developed autonomous robot for the detection of mines in the war field. Developed algorithm is validated both in offline using MATLAB simulation and in real time by conducting an experiment. Once the confidence of using the algorithm is increased, developed algorithm is coded into the Microcontroller based hardware and is validated in real time. Real time experimental results match well with those of the offline simulation results. However, there is only a small mismatch in distance and accuracy of the target detection, which is due to the limitations of the hardware used for the implementation.","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125194422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Novel Algorithm to Protect the Secret Image through Image Fusion and Verifying the Dealer and the Secret Image 通过图像融合保护秘密图像并验证经销商和秘密图像的新算法
Pub Date : 2014-01-08 DOI: 10.1109/ICSIP.2014.17
P. Devaki, G. R. Rao
In the recent past the images of various fields are being considered for processing for various purposes. In this paper we are proposing an algorithm for protecting the secret image whose confidentiality needs to be maintained, and also to authenticate the distributor who distributes that secret image to multiple users. The secret image will be fused with the fingerprint of the dealer for authentication purpose. Fusion of the finger print will be done by using image fusion technique to generate a single image consisting of the secret image as well as the finger print image of the dealer. The fused image will be divided in to number of shares based on the threshold secret sharing technique. This provides both confidentiality of the secret image and as well as the authentication of the dealer who has sent the image. The verification will be done during reconstruction of the secret image.
在最近的过去,正在考虑为各种目的处理各种领域的图像。在本文中,我们提出了一种算法来保护需要保持机密性的秘密映像,并对将该秘密映像分发给多个用户的分发者进行身份验证。秘密图像将与经销商的指纹融合以进行身份验证。指纹的融合将通过图像融合技术生成由秘密图像和经销商指纹图像组成的单一图像来完成。基于阈值秘密共享技术,将融合后的图像分割为多个共享。这既提供了秘密图像的保密性,也提供了发送图像的经销商的身份验证。验证将在秘密图像的重建过程中进行。
{"title":"A Novel Algorithm to Protect the Secret Image through Image Fusion and Verifying the Dealer and the Secret Image","authors":"P. Devaki, G. R. Rao","doi":"10.1109/ICSIP.2014.17","DOIUrl":"https://doi.org/10.1109/ICSIP.2014.17","url":null,"abstract":"In the recent past the images of various fields are being considered for processing for various purposes. In this paper we are proposing an algorithm for protecting the secret image whose confidentiality needs to be maintained, and also to authenticate the distributor who distributes that secret image to multiple users. The secret image will be fused with the fingerprint of the dealer for authentication purpose. Fusion of the finger print will be done by using image fusion technique to generate a single image consisting of the secret image as well as the finger print image of the dealer. The fused image will be divided in to number of shares based on the threshold secret sharing technique. This provides both confidentiality of the secret image and as well as the authentication of the dealer who has sent the image. The verification will be done during reconstruction of the secret image.","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125933326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Robust Segmentation Technique for Line, Word and Character Extraction from Kannada Text in Low Resolution Display Board Images 从低分辨率显示板图像中提取卡纳达语文本的行、词和字符的鲁棒分割技术
Pub Date : 2014-01-08 DOI: 10.1142/S021946781450003X
S. Angadi, M. Kodabagi
Reliable extraction/segmentation of text lines, words and characters is one of the very important steps for development of automated systems for understanding the text in low resolution display board images. In this paper, a new approach for segmentation of text lines, words and characters from Kannada text in low resolution display board images is presented. The proposed method uses projection profile features and on pixel distribution statistics for segmentation of text lines. The method also detects text lines containing consonant modifiers and merges them with corresponding text lines, and efficiently separates overlapped text lines as well. The character extraction process computes character boundaries using vertical profile features for extracting character images from every text line. Further, the word segmentation process uses k-means clustering to group inter character gaps into character and word cluster spaces, which are used to compute thresholds for extracting words. The method also takes care of variations in character and word gaps. The proposed methodology is evaluated on a data set of 1008 low resolution images of display boards containing Kannada text captured from 2 mega pixel cameras on mobile phones at various sizes 240x320, 600x800 and 900x1200. The method achieves text line segmentation accuracy of 97.17%, word segmentation accuracy of 97.54% and character extraction accuracy of 99.09%. The proposed method is tolerant to font variability, spacing variations between characters and words, absence of free segmentation path due to consonant and vowel modifiers, noise and other degradations. The experimentation with images containing overlapped text lines has given promising results.
可靠地提取/分割文本行、词和字符是开发低分辨率显示板图像文本理解自动化系统的重要步骤之一。本文提出了一种从低分辨率显示板图像中提取卡纳达语文本行、词和字符的新方法。该方法利用投影轮廓特征和像素分布统计信息对文本行进行分割。该方法还可以检测包含辅音修饰语的文本行,并将其与相应的文本行合并,并有效地分离重叠的文本行。字符提取过程使用垂直轮廓特征计算字符边界,以便从每个文本行提取字符图像。此外,分词过程使用k-means聚类将字符间隙分组为字符和词簇空间,用于计算提取单词的阈值。该方法还考虑到字符和单词间隔的变化。该方法在1008张低分辨率图像的数据集上进行了评估,这些图像来自手机上的200万像素相机,尺寸分别为240 × 320、600 × 800和900 × 1200,其中包含卡纳达语文本。该方法的文本行分割准确率为97.17%,分词准确率为97.54%,字符提取准确率为99.09%。该方法可以容忍字体的变化、字符和单词之间的间距变化、由于辅音和元音修饰语而缺乏自由分割路径、噪声和其他退化。对包含重叠文本行的图像进行实验得到了令人满意的结果。
{"title":"A Robust Segmentation Technique for Line, Word and Character Extraction from Kannada Text in Low Resolution Display Board Images","authors":"S. Angadi, M. Kodabagi","doi":"10.1142/S021946781450003X","DOIUrl":"https://doi.org/10.1142/S021946781450003X","url":null,"abstract":"Reliable extraction/segmentation of text lines, words and characters is one of the very important steps for development of automated systems for understanding the text in low resolution display board images. In this paper, a new approach for segmentation of text lines, words and characters from Kannada text in low resolution display board images is presented. The proposed method uses projection profile features and on pixel distribution statistics for segmentation of text lines. The method also detects text lines containing consonant modifiers and merges them with corresponding text lines, and efficiently separates overlapped text lines as well. The character extraction process computes character boundaries using vertical profile features for extracting character images from every text line. Further, the word segmentation process uses k-means clustering to group inter character gaps into character and word cluster spaces, which are used to compute thresholds for extracting words. The method also takes care of variations in character and word gaps. The proposed methodology is evaluated on a data set of 1008 low resolution images of display boards containing Kannada text captured from 2 mega pixel cameras on mobile phones at various sizes 240x320, 600x800 and 900x1200. The method achieves text line segmentation accuracy of 97.17%, word segmentation accuracy of 97.54% and character extraction accuracy of 99.09%. The proposed method is tolerant to font variability, spacing variations between characters and words, absence of free segmentation path due to consonant and vowel modifiers, noise and other degradations. The experimentation with images containing overlapped text lines has given promising results.","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116532668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Automatic Segmentation of Ovarian Follicle Using K-Means Clustering 基于k均值聚类的卵巢卵泡自动分割
Pub Date : 2014-01-08 DOI: 10.1109/ICSIP.2014.27
K. V, M. Ramya
Automatic detection of human ovarian follicles has been of increasing interest in recent years and is a significant area of women's health. Improper development of ovarian follicles has been an important reason for infertility in women. Currently, detection of ovarian follicle is done through diagnostic imaging technique called ultrasonography. Follicles differ in shape and colour. Further, the camouflaging characteristic of ultrasound images and the presence of speckle noise make the follicle detection a challenging task. In this paper, a novel method for automatic recognition of follicles in ultrasound images is proposed. Discrete wavelet transform based k-means clustering is proposed. Discrete wavelet transform is preferred due to its superior spectral temporal resolution that helps in despeckling the ultrasound images. K-means clustering is used to segment the image into different anatomical structures to yield better segmentation. Structural Similarity (SSIM), False Acceptance Rate (FAR) and False Rejection Rate (FRR) are used to demonstrate the efficiency of the proposed method.
近年来,人类卵巢卵泡的自动检测越来越引起人们的兴趣,是妇女健康的一个重要领域。卵巢卵泡发育不良一直是女性不孕症的重要原因。目前,卵巢卵泡的检测是通过超声诊断成像技术来完成的。卵泡的形状和颜色各不相同。此外,超声图像的伪装特性和斑点噪声的存在使卵泡检测成为一项具有挑战性的任务。本文提出了一种超声图像中卵泡自动识别的新方法。提出了基于离散小波变换的k均值聚类方法。离散小波变换是首选的,因为它具有优越的光谱时间分辨率,有助于去除超声图像。使用K-means聚类将图像分割成不同的解剖结构,以获得更好的分割效果。用结构相似度(SSIM)、错误接受率(FAR)和错误拒绝率(FRR)来验证该方法的有效性。
{"title":"Automatic Segmentation of Ovarian Follicle Using K-Means Clustering","authors":"K. V, M. Ramya","doi":"10.1109/ICSIP.2014.27","DOIUrl":"https://doi.org/10.1109/ICSIP.2014.27","url":null,"abstract":"Automatic detection of human ovarian follicles has been of increasing interest in recent years and is a significant area of women's health. Improper development of ovarian follicles has been an important reason for infertility in women. Currently, detection of ovarian follicle is done through diagnostic imaging technique called ultrasonography. Follicles differ in shape and colour. Further, the camouflaging characteristic of ultrasound images and the presence of speckle noise make the follicle detection a challenging task. In this paper, a novel method for automatic recognition of follicles in ultrasound images is proposed. Discrete wavelet transform based k-means clustering is proposed. Discrete wavelet transform is preferred due to its superior spectral temporal resolution that helps in despeckling the ultrasound images. K-means clustering is used to segment the image into different anatomical structures to yield better segmentation. Structural Similarity (SSIM), False Acceptance Rate (FAR) and False Rejection Rate (FRR) are used to demonstrate the efficiency of the proposed method.","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122819587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Video Watermarking by Adjusting the Pixel Values and Using Scene Change Detection 通过调整像素值和使用场景变化检测的视频水印
Pub Date : 2014-01-08 DOI: 10.1109/ICSIP.2014.47
P. S. Venugopala, H. Sarojadevi, N. Chiplunkar, Vani Bhat
Digital video is one of the popular multimedia data exchanged in the internet. Due to its perfectly replicable nature many illegal copies of the original video can be made. Methods are needed to protect copyrights of the owner and prevent illegal copying. A video can also undergo several intentional attacks like frame dropping, averaging, cropping and median filtering and unintentional attacks like addition of noise and compression which can compromise copyright information, thereby denying the authentication. In this paper, the design and implementation of scene based watermarking where extraction will be a blind method, is proposed. The developed method embeds 8 bit-plane images, obtained from single gray scale watermark image, into different scenes of a video sequence. In this algorithm, some of the luminous values in the video pictures are selected and divided into groups, and the watermark bits are embedded by adjusting the relative relationship of the member in each group. A sufficient number of watermark bits will be embedded into the video pictures without causing noticeable distortion. The watermark will be correctly retrieved at the extraction stage, even after various types of video manipulation and other signal processing attacks.
数字视频是互联网上流行的多媒体数据交换方式之一。由于其完全可复制的性质,许多原始视频的非法副本可以制作。需要采取措施保护版权所有者的权利,防止非法复制。一个视频也会遭受一些故意的攻击,比如丢帧、平均、裁剪和中值过滤,以及一些无意的攻击,比如添加噪音和压缩,这些攻击会损害版权信息,从而拒绝认证。本文提出了一种基于场景的水印的设计与实现,其中水印的提取是一种盲提取方法。该方法将单个灰度水印图像得到的8位平面图像嵌入到视频序列的不同场景中。该算法从视频图像中选取一些发光值并进行分组,通过调整每组成员的相对关系嵌入水印位。足够数量的水印位将嵌入到视频图像中,而不会引起明显的失真。即使经过各种视频处理和其他信号处理攻击,水印也能在提取阶段被正确提取出来。
{"title":"Video Watermarking by Adjusting the Pixel Values and Using Scene Change Detection","authors":"P. S. Venugopala, H. Sarojadevi, N. Chiplunkar, Vani Bhat","doi":"10.1109/ICSIP.2014.47","DOIUrl":"https://doi.org/10.1109/ICSIP.2014.47","url":null,"abstract":"Digital video is one of the popular multimedia data exchanged in the internet. Due to its perfectly replicable nature many illegal copies of the original video can be made. Methods are needed to protect copyrights of the owner and prevent illegal copying. A video can also undergo several intentional attacks like frame dropping, averaging, cropping and median filtering and unintentional attacks like addition of noise and compression which can compromise copyright information, thereby denying the authentication. In this paper, the design and implementation of scene based watermarking where extraction will be a blind method, is proposed. The developed method embeds 8 bit-plane images, obtained from single gray scale watermark image, into different scenes of a video sequence. In this algorithm, some of the luminous values in the video pictures are selected and divided into groups, and the watermark bits are embedded by adjusting the relative relationship of the member in each group. A sufficient number of watermark bits will be embedded into the video pictures without causing noticeable distortion. The watermark will be correctly retrieved at the extraction stage, even after various types of video manipulation and other signal processing attacks.","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127013612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Crypto-coding Technique for Land Mobile Satellite Channel 陆地移动卫星信道的密码编码技术
Pub Date : 2014-01-08 DOI: 10.1109/ICSIP.2014.30
Rajashri Khanai, G. Kulkarni, Dattaprasad Torse
In this paper, we have introduced an improved combined cryptography-error correction method, which is called "Crypto-Coding". Although in previous experiments, combined error correction and encryption functionality has been studied into one single step, the modification needed in the introduction of encryption block improves the performance of the system. The combined System's performances are evaluated on Land Mobile Satellite (LMS) Channel. The results are compared with the system using ideal encryption and decryption.
本文提出了一种改进的组合密码纠错方法,称为“密码编码”。虽然在之前的实验中,已经将纠错和加密功能结合在一个步骤中进行了研究,但是在引入加密块时所需要的修改提高了系统的性能。在陆地移动卫星(LMS)信道上对组合系统的性能进行了评价。结果与采用理想加解密方式的系统进行了比较。
{"title":"Crypto-coding Technique for Land Mobile Satellite Channel","authors":"Rajashri Khanai, G. Kulkarni, Dattaprasad Torse","doi":"10.1109/ICSIP.2014.30","DOIUrl":"https://doi.org/10.1109/ICSIP.2014.30","url":null,"abstract":"In this paper, we have introduced an improved combined cryptography-error correction method, which is called \"Crypto-Coding\". Although in previous experiments, combined error correction and encryption functionality has been studied into one single step, the modification needed in the introduction of encryption block improves the performance of the system. The combined System's performances are evaluated on Land Mobile Satellite (LMS) Channel. The results are compared with the system using ideal encryption and decryption.","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wavelet Based Signal Processing Technique for Classification of Power Quality Disturbances 基于小波的电能质量扰动分类技术
Pub Date : 2014-01-08 DOI: 10.1109/ICSIP.2014.59
M. Tuljapurkar, A. Dharme
This paper presents an effective method for classification of power quality disturbances, employing wavelet transformation for disturbance identification and Modular artificial Neural Network(MANN) technique for accurate classification of these disturbances. Disturbances such as voltage sag, swell and harmonics which are typical in power system are simulated. Wavelet transform, which has the ability to analyze these power quality problems simultaneously in both time and frequency domain is used to extract features of the disturbances by decomposing the signal using multi resolution analysis. These features are used to detect and localize the disturbances. ANN, the powerful tool with parallel processing capability, is suitable to classify the disturbances. Modular neural network is employed in this paper for automatic classification of power quality disturbances. The proposed algorithm has been verified by simulating various PQ disturbances and results are analyzed using Math works MATLAB.
本文提出了一种有效的电能质量扰动分类方法,采用小波变换进行扰动识别,采用模块化人工神经网络(MANN)技术对扰动进行精确分类。对电力系统中常见的电压暂降、膨胀和谐波等干扰进行了仿真。小波变换具有在时域和频域同时分析电能质量问题的能力,通过多分辨率分析对信号进行分解,提取干扰特征。这些特征被用来检测和定位干扰。神经网络作为一种具有并行处理能力的强大工具,适合于对扰动进行分类。本文采用模块化神经网络对电能质量扰动进行自动分类。通过对各种PQ干扰的仿真验证了该算法的有效性,并利用MATLAB软件对仿真结果进行了分析。
{"title":"Wavelet Based Signal Processing Technique for Classification of Power Quality Disturbances","authors":"M. Tuljapurkar, A. Dharme","doi":"10.1109/ICSIP.2014.59","DOIUrl":"https://doi.org/10.1109/ICSIP.2014.59","url":null,"abstract":"This paper presents an effective method for classification of power quality disturbances, employing wavelet transformation for disturbance identification and Modular artificial Neural Network(MANN) technique for accurate classification of these disturbances. Disturbances such as voltage sag, swell and harmonics which are typical in power system are simulated. Wavelet transform, which has the ability to analyze these power quality problems simultaneously in both time and frequency domain is used to extract features of the disturbances by decomposing the signal using multi resolution analysis. These features are used to detect and localize the disturbances. ANN, the powerful tool with parallel processing capability, is suitable to classify the disturbances. Modular neural network is employed in this paper for automatic classification of power quality disturbances. The proposed algorithm has been verified by simulating various PQ disturbances and results are analyzed using Math works MATLAB.","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Face Recognition Using Active Illumination Equalization and Mirror Image Superposition as Pre-processing Techniques 基于主动照度均衡和镜像叠加预处理技术的人脸识别
Pub Date : 2014-01-08 DOI: 10.1109/ICSIP.2014.21
S. Hitesh, Babu Student, Shreyas H R Student, K. Manikantan, S. Ramachandran
Face Recognition (FR) under varying lighting conditions and pose is very challenging. This paper proposes a novel approach for enhancing the performance of a FR system, employing a unique combination of Active Illumination Equalization (AIE), Image Sharpening (IS), Standard Deviation Filtering (SDF), Mirror Image Superposition (MIS) and Binary Particle Swarm Optimization (BPSO). AIE is used for removal of non-uniform illumination and MIS is used to neutralize pose variance. Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) are used for efficient feature extraction and BPSO-based feature selection algorithm is used to search the feature space for the optimal feature subset. Experimental results, obtained by applying the proposed algorithm on Color FERET, Pointing Head Pose and Extended Yale B face databases, show that the proposed system outperforms other FR systems.
人脸识别(FR)在不同的光照条件和姿态下是非常具有挑战性的。本文提出了一种新的增强FR系统性能的方法,该方法采用主动照明均衡(AIE)、图像锐化(IS)、标准差滤波(SDF)、镜像叠加(MIS)和二进制粒子群优化(BPSO)的独特组合。AIE用于去除非均匀光照,MIS用于中和姿态方差。利用离散小波变换(DWT)和离散余弦变换(DCT)进行有效的特征提取,利用基于bpso的特征选择算法在特征空间中搜索最优特征子集。在Color FERET、Pointing Head Pose和Extended Yale B人脸数据库上的实验结果表明,该算法优于其他人脸识别系统。
{"title":"Face Recognition Using Active Illumination Equalization and Mirror Image Superposition as Pre-processing Techniques","authors":"S. Hitesh, Babu Student, Shreyas H R Student, K. Manikantan, S. Ramachandran","doi":"10.1109/ICSIP.2014.21","DOIUrl":"https://doi.org/10.1109/ICSIP.2014.21","url":null,"abstract":"Face Recognition (FR) under varying lighting conditions and pose is very challenging. This paper proposes a novel approach for enhancing the performance of a FR system, employing a unique combination of Active Illumination Equalization (AIE), Image Sharpening (IS), Standard Deviation Filtering (SDF), Mirror Image Superposition (MIS) and Binary Particle Swarm Optimization (BPSO). AIE is used for removal of non-uniform illumination and MIS is used to neutralize pose variance. Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) are used for efficient feature extraction and BPSO-based feature selection algorithm is used to search the feature space for the optimal feature subset. Experimental results, obtained by applying the proposed algorithm on Color FERET, Pointing Head Pose and Extended Yale B face databases, show that the proposed system outperforms other FR systems.","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117048227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Entropy Computations of Document Images in Run-Length Compressed Domain 行距压缩域文档图像的熵计算
Pub Date : 2014-01-08 DOI: 10.1109/ICSIP.2014.51
P. Nagabhushan, M. Javed, B. Chaudhuri
Compression of documents, images, audios and videos have been traditionally practiced to increase the efficiency of data storage and transfer. However, in order to process or carry out any analytical computations, decompression has become an unavoidable pre-requisite. In this research work, we have attempted to compute the entropy, which is an important document analytic directly from the compressed documents. We use Conventional Entropy Quantifier (CEQ) and Spatial Entropy Quantifiers (SEQ) for entropy computations [1]. The entropies obtained are useful in applications like establishing equivalence, word spotting and document retrieval. Experiments have been performed with all the data sets of [1], at character, word and line levels taking compressed documents in run-length compressed domain. The algorithms developed are computational and space efficient, and results obtained match 100% with the results reported in [1].
传统上,压缩文档、图像、音频和视频的做法是为了提高数据存储和传输的效率。然而,为了处理或执行任何分析计算,解压缩已成为不可避免的先决条件。在本研究中,我们尝试直接从压缩文档中计算熵,这是一种重要的文档分析方法。我们使用常规熵量词(CEQ)和空间熵量词(SEQ)进行熵计算。获得的熵在建立等价、单词定位和文档检索等应用中很有用。对[1]的所有数据集进行了实验,在字符、单词和行级别上对运行长度压缩域中的压缩文档进行了实验。所开发的算法具有计算效率和空间效率,所得到的结果与[1]中报道的结果吻合100%。
{"title":"Entropy Computations of Document Images in Run-Length Compressed Domain","authors":"P. Nagabhushan, M. Javed, B. Chaudhuri","doi":"10.1109/ICSIP.2014.51","DOIUrl":"https://doi.org/10.1109/ICSIP.2014.51","url":null,"abstract":"Compression of documents, images, audios and videos have been traditionally practiced to increase the efficiency of data storage and transfer. However, in order to process or carry out any analytical computations, decompression has become an unavoidable pre-requisite. In this research work, we have attempted to compute the entropy, which is an important document analytic directly from the compressed documents. We use Conventional Entropy Quantifier (CEQ) and Spatial Entropy Quantifiers (SEQ) for entropy computations [1]. The entropies obtained are useful in applications like establishing equivalence, word spotting and document retrieval. Experiments have been performed with all the data sets of [1], at character, word and line levels taking compressed documents in run-length compressed domain. The algorithms developed are computational and space efficient, and results obtained match 100% with the results reported in [1].","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"7 Suppl 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121865809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2014 Fifth International Conference on Signal and Image Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1