首页 > 最新文献

2015 International Conference on Communication, Information & Computing Technology (ICCICT)最新文献

英文 中文
Fractal image compression using genetic algorithm with ranking select mechanism 基于排序选择机制的遗传算法对分形图像进行压缩
A. N. Kulkarni, S. Gandhe, P. Dhulekar, G. Phade
The demand for images in video sequences and computer animation has increased drastically over the years. This gives attention on an important issue of compression, resulting into reduction in cost of data storage and transmission. For still image compression JPEG is used world -wide. But alternative methods are also being explored; Fractal image compression is one of them. It is based on the self-similarity property to find out the best match within the image itself. This property is used to generate a fractal code. In this paper, the new approach for fractal image compression using genetic algorithm with ranking select mechanism is proposed. This proposed algorithm is applied on fractal as well as non-fractal images and the experimental result shows that the encoding time for both types of images is greatly reduced while maintaining their quality intact.
多年来,对视频序列和计算机动画中的图像的需求急剧增加。这引起了人们对压缩这一重要问题的关注,从而降低了数据存储和传输的成本。对于静止图像压缩,JPEG是世界范围内使用的。但人们也在探索其他方法;分形图像压缩就是其中之一。它是基于图像本身的自相似特性来寻找最佳匹配。此属性用于生成分形代码。提出了一种基于排序选择机制的遗传算法对分形图像进行压缩的新方法。将该算法应用于分形和非分形图像,实验结果表明,在保持图像质量不变的情况下,两类图像的编码时间都大大减少。
{"title":"Fractal image compression using genetic algorithm with ranking select mechanism","authors":"A. N. Kulkarni, S. Gandhe, P. Dhulekar, G. Phade","doi":"10.1109/ICCICT.2015.7045731","DOIUrl":"https://doi.org/10.1109/ICCICT.2015.7045731","url":null,"abstract":"The demand for images in video sequences and computer animation has increased drastically over the years. This gives attention on an important issue of compression, resulting into reduction in cost of data storage and transmission. For still image compression JPEG is used world -wide. But alternative methods are also being explored; Fractal image compression is one of them. It is based on the self-similarity property to find out the best match within the image itself. This property is used to generate a fractal code. In this paper, the new approach for fractal image compression using genetic algorithm with ranking select mechanism is proposed. This proposed algorithm is applied on fractal as well as non-fractal images and the experimental result shows that the encoding time for both types of images is greatly reduced while maintaining their quality intact.","PeriodicalId":324889,"journal":{"name":"2015 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116899784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy thresholding based sub-band elimination DWT scheme for image compression 基于能量阈值的子带消去DWT图像压缩方法
Afshan Mulla, Jaypal Baviskar, Pavankumar Borra, Sunita Yadav, Amol Baviskar
Images with texture patterns have embedded feature of offering visual patterns, that have the property of homogeneity. They provide cardinal information pertaining to the structural arrangement of the surfaces. Huge databases containing such images require highly competent compression schemes. This paper proposes a compression scheme for gray-scale texture images based on a unique Discrete Wavelet Transform (DWT) Sub-band Elimination guided by energy thresholding. The algorithm operates on sub-bands generated by the wavelet transform and determines the dominating coefficients which contribute to the maximum energy. It then eliminates redundant coefficients and facilitates efficient compression ratio. The performance of the algorithm is evaluated by calculating various quality metrics viz. PSNR, MSE etc and plotting apposite graphs by experimenting on standard texture gray-scale image database.
纹理图案图像具有提供视觉图案的内在特征,具有同质性。它们提供有关表面结构排列的基本信息。包含此类图像的庞大数据库需要非常高效的压缩方案。提出了一种基于能量阈值制导的离散小波变换子带消除的灰度纹理图像压缩方案。该算法对小波变换产生的子带进行运算,确定能量最大的主导系数。然后,它消除了冗余系数,促进了有效的压缩比。通过在标准纹理灰度图像数据库上进行实验,计算各种质量指标如PSNR、MSE等,并绘制相应的图形,对算法的性能进行评价。
{"title":"Energy thresholding based sub-band elimination DWT scheme for image compression","authors":"Afshan Mulla, Jaypal Baviskar, Pavankumar Borra, Sunita Yadav, Amol Baviskar","doi":"10.1109/ICCICT.2015.7045711","DOIUrl":"https://doi.org/10.1109/ICCICT.2015.7045711","url":null,"abstract":"Images with texture patterns have embedded feature of offering visual patterns, that have the property of homogeneity. They provide cardinal information pertaining to the structural arrangement of the surfaces. Huge databases containing such images require highly competent compression schemes. This paper proposes a compression scheme for gray-scale texture images based on a unique Discrete Wavelet Transform (DWT) Sub-band Elimination guided by energy thresholding. The algorithm operates on sub-bands generated by the wavelet transform and determines the dominating coefficients which contribute to the maximum energy. It then eliminates redundant coefficients and facilitates efficient compression ratio. The performance of the algorithm is evaluated by calculating various quality metrics viz. PSNR, MSE etc and plotting apposite graphs by experimenting on standard texture gray-scale image database.","PeriodicalId":324889,"journal":{"name":"2015 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125025475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Virtualization of Wireless Sensor Network with efficient power saving scheme 具有高效节能方案的无线传感器网络虚拟化
Shital Vaibhavraj Gharge, Srinu Dharavath
Wireless Sensor Network (WSN) has gained more importance in current era and given contribution on broad range of commercial applications. These networks consists of small, battery powered sensors communicating with each other to monitor the environment forming a network with ease of deployment where wired infrastructure is too expensive and difficult to deploy. In applications like home automation, health care monitoring multivendor and heterogeneous sensor nodes are deployed. For such applications virtualization in sensor network (VSN) may provide flexibility, ensure security and increase manageability. WSN implies various challenges in design and operations as major fact that sensor nodes run out of energy quickly has been an issue. So for energy consumption, better and improved clustering routing protocols are needed. This Paper surveys novel approach of using virtual sensor architecture and also presents improved clustering algorithm as efficient power saving scheme. Simulation results indicate superior performance of improved clustering algorithm in energy consumption and VSN approach reduces overall cost and complexity.
无线传感器网络(WSN)在当今时代越来越受到重视,并在广泛的商业应用中做出了贡献。这些网络由相互通信的小型电池供电传感器组成,以监测环境,形成易于部署的网络,在有线基础设施过于昂贵且难以部署的情况下。在家庭自动化等应用中,部署了医疗保健监控多供应商和异构传感器节点。对于这些应用,传感器网络(VSN)中的虚拟化可以提供灵活性、确保安全性和增加可管理性。无线传感器网络在设计和操作方面面临着各种挑战,因为传感器节点的能量耗尽已经成为一个主要问题。因此,为了降低能耗,需要更好和改进的集群路由协议。本文研究了利用虚拟传感器架构的新方法,并提出了改进的聚类算法作为一种有效的节能方案。仿真结果表明,改进的聚类算法在能量消耗和VSN方法方面具有优越的性能,降低了总成本和复杂度。
{"title":"Virtualization of Wireless Sensor Network with efficient power saving scheme","authors":"Shital Vaibhavraj Gharge, Srinu Dharavath","doi":"10.1109/ICCICT.2015.7045671","DOIUrl":"https://doi.org/10.1109/ICCICT.2015.7045671","url":null,"abstract":"Wireless Sensor Network (WSN) has gained more importance in current era and given contribution on broad range of commercial applications. These networks consists of small, battery powered sensors communicating with each other to monitor the environment forming a network with ease of deployment where wired infrastructure is too expensive and difficult to deploy. In applications like home automation, health care monitoring multivendor and heterogeneous sensor nodes are deployed. For such applications virtualization in sensor network (VSN) may provide flexibility, ensure security and increase manageability. WSN implies various challenges in design and operations as major fact that sensor nodes run out of energy quickly has been an issue. So for energy consumption, better and improved clustering routing protocols are needed. This Paper surveys novel approach of using virtual sensor architecture and also presents improved clustering algorithm as efficient power saving scheme. Simulation results indicate superior performance of improved clustering algorithm in energy consumption and VSN approach reduces overall cost and complexity.","PeriodicalId":324889,"journal":{"name":"2015 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124537331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Image transmission over OFDM system using trigonometric transforms 利用三角变换的OFDM系统图像传输
Nasheet Fatima
This paper proposes a system for transmission of image through OFDM system. To improve performance of system in terms of peak to average power ratio (PAPR) and Peak to signal noise ratio, Trigonometric Transforms such as DCT and DST are used.
本文提出了一种基于OFDM系统的图像传输系统。为了提高系统在峰值与平均功率比(PAPR)和峰值与信噪比方面的性能,采用了DCT和DST等三角变换。
{"title":"Image transmission over OFDM system using trigonometric transforms","authors":"Nasheet Fatima","doi":"10.1109/ICCICT.2015.7045690","DOIUrl":"https://doi.org/10.1109/ICCICT.2015.7045690","url":null,"abstract":"This paper proposes a system for transmission of image through OFDM system. To improve performance of system in terms of peak to average power ratio (PAPR) and Peak to signal noise ratio, Trigonometric Transforms such as DCT and DST are used.","PeriodicalId":324889,"journal":{"name":"2015 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115585078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance comparison of different operating systems in the private cloud with KVM hypervisor using SIGAR framework 使用SIGAR框架对私有云中不同操作系统与KVM管理程序的性能进行比较
P. V. V. Reddy, L. Rajamani
Hypervisors enable multiple operating systems to run above it with the help of virtualization technique by sharing underlying physical resources. KVM hypervisor uses hybrid virtualization technique i.e., it uses full virtualization technique along with hardware assisted virtualization. It is motivating to analyse different Operating Systems (OSs) performance in the Private Cloud with KVM hypervisor. We have chosen three guest operating systems, namely Windows 2008 R2, Red Hat Enterprise Linux 5 (RHEL 5) and Ubuntu 10.04 Lucid Lynx (all are 64-bit) for the experimentation in the private cloud which is created using CloudStack. The three Operating Systems (OSs) are prudently chosen to represent three categories (Hardware virtualized guest or Hardware Virtual Machine (HVM), para-virtualized commercial guest and para-virtualized free guest). The performances of three Operating Systems have been planned to evaluate by creating low, medium and high workloads. The Operating Systems are compared by performance tests of CPU utilization, memory management, disk activity, and network communication. Important System information is gathered using SIGAR framework on the respective guest Operating System on KVM hypervisor.
虚拟机管理程序通过共享底层物理资源,借助虚拟化技术,使多个操作系统能够在其之上运行。KVM管理程序使用混合虚拟化技术,即使用完全虚拟化技术和硬件辅助虚拟化。使用KVM管理程序分析私有云中不同操作系统(os)的性能是一种激励。我们选择了三个客户操作系统,即Windows 2008 R2、Red Hat Enterprise Linux 5 (RHEL 5)和Ubuntu 10.04 Lucid Lynx(都是64位),在使用CloudStack创建的私有云中进行实验。这三种操作系统经过精心选择,分别代表三种类型(硬件虚拟化客户端或硬件虚拟机(HVM)、半虚拟化的商业客户端和半虚拟化的自由客户端)。计划通过创建低、中、高工作负载来评估三种操作系统的性能。操作系统通过CPU利用率、内存管理、磁盘活动和网络通信的性能测试进行比较。重要的系统信息是在KVM管理程序上的相应客户机操作系统上使用SIGAR框架收集的。
{"title":"Performance comparison of different operating systems in the private cloud with KVM hypervisor using SIGAR framework","authors":"P. V. V. Reddy, L. Rajamani","doi":"10.1109/ICCICT.2015.7045680","DOIUrl":"https://doi.org/10.1109/ICCICT.2015.7045680","url":null,"abstract":"Hypervisors enable multiple operating systems to run above it with the help of virtualization technique by sharing underlying physical resources. KVM hypervisor uses hybrid virtualization technique i.e., it uses full virtualization technique along with hardware assisted virtualization. It is motivating to analyse different Operating Systems (OSs) performance in the Private Cloud with KVM hypervisor. We have chosen three guest operating systems, namely Windows 2008 R2, Red Hat Enterprise Linux 5 (RHEL 5) and Ubuntu 10.04 Lucid Lynx (all are 64-bit) for the experimentation in the private cloud which is created using CloudStack. The three Operating Systems (OSs) are prudently chosen to represent three categories (Hardware virtualized guest or Hardware Virtual Machine (HVM), para-virtualized commercial guest and para-virtualized free guest). The performances of three Operating Systems have been planned to evaluate by creating low, medium and high workloads. The Operating Systems are compared by performance tests of CPU utilization, memory management, disk activity, and network communication. Important System information is gathered using SIGAR framework on the respective guest Operating System on KVM hypervisor.","PeriodicalId":324889,"journal":{"name":"2015 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123452362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Bimodal biometric identification with Palmprint and Iris traits using fractional coefficients of Walsh, Haar and Kekre transforms 基于Walsh, Haar和Kekre变换分数系数的掌纹和虹膜特征双峰识别
Sudeep D. Thepade, Rupali K. Bhondave
Biometric identification verifies user identity by comparing an encoded value with a stored value of the concerned biometric characteristic. Multimodal person authentication system is more effective and more challenging. The fusion of multiple biometric traits helps to minimize the system error rate. The benefit of energy compaction of transforms in higher coefficients is taken here to reduce the feature vector size of image by taking fractional coefficients of transformed image. Smaller feature vector size results as less time for comparison of feature vectors resulting in faster identification. Iris and Palmprint are together taken here for bimodal biometric identification with fractional energy of Kekre, Walsh and Haar transformed Palm and Iris images. The test beds of 60 pairs of Iris and Palmprint samples of 10 persons (6 per person of iris as well asPalmprint) are used as test bed for experimentation. Experimental result that the show fractional coefficients perform better as indicatedby higher GAR values over consideration of 100% coefficients. In Walsh and haar transforms the bimodal identification of iris and Palmprint could not perform better than individual consideration of alone Palmprint but perform better than Iris. In Kekre transform bimodal with Palmprint and Iris has shown improvement in performance.
生物特征识别通过将编码值与有关生物特征的存储值进行比较来验证用户身份。多模式人认证系统更有效,也更具挑战性。多种生物特征的融合有助于降低系统错误率。本文利用高系数变换的能量压缩优势,通过对变换后的图像取分数阶系数来减小图像的特征向量大小。特征向量的大小越小,特征向量的比较时间越短,识别速度越快。利用Kekre、Walsh和Haar变换后的掌纹和虹膜图像的分数能量,对虹膜和虹膜进行双峰生物特征识别。使用10人60对虹膜和掌纹样本(每人6对虹膜和掌纹)的试验台作为实验的试验台。实验结果表明,与100%系数相比,分数系数的GAR值更高,表明分数系数的性能更好。在Walsh和haar变换中,虹膜和掌纹的双峰识别不能优于单独考虑掌纹的单峰识别,但优于虹膜的单峰识别。在Kekre变换中,掌纹和虹膜的双峰变换性能得到了改善。
{"title":"Bimodal biometric identification with Palmprint and Iris traits using fractional coefficients of Walsh, Haar and Kekre transforms","authors":"Sudeep D. Thepade, Rupali K. Bhondave","doi":"10.1109/ICCICT.2015.7045729","DOIUrl":"https://doi.org/10.1109/ICCICT.2015.7045729","url":null,"abstract":"Biometric identification verifies user identity by comparing an encoded value with a stored value of the concerned biometric characteristic. Multimodal person authentication system is more effective and more challenging. The fusion of multiple biometric traits helps to minimize the system error rate. The benefit of energy compaction of transforms in higher coefficients is taken here to reduce the feature vector size of image by taking fractional coefficients of transformed image. Smaller feature vector size results as less time for comparison of feature vectors resulting in faster identification. Iris and Palmprint are together taken here for bimodal biometric identification with fractional energy of Kekre, Walsh and Haar transformed Palm and Iris images. The test beds of 60 pairs of Iris and Palmprint samples of 10 persons (6 per person of iris as well asPalmprint) are used as test bed for experimentation. Experimental result that the show fractional coefficients perform better as indicatedby higher GAR values over consideration of 100% coefficients. In Walsh and haar transforms the bimodal identification of iris and Palmprint could not perform better than individual consideration of alone Palmprint but perform better than Iris. In Kekre transform bimodal with Palmprint and Iris has shown improvement in performance.","PeriodicalId":324889,"journal":{"name":"2015 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124830659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Image compression using improvised column based Thepade's Cosine Error Vector Rotation (TCEVR) Codebook generation in Vector Quantization 基于随机列的矢量量化中thepage余弦误差矢量旋转(TCEVR)码本生成的图像压缩
Sudeep D. Thepade, Lokesh S. Katore
Image compression is inevitable now a days as multimedia based data is increasing at faster rate. Vector Quantization plays vital role in Codebook generation. Codebook is the soul of Vector Quantization. There are several methods to generate Codebook but the recent one is Thepade's Cosine Error Vector Rotation (TCEVR), which is proven better than others (KEVR, KEVRW, LBG). Paper proposes novel Column based error Vector Rotation for TCEVR. The proposed column based improvisation in TCEVR is tested with a test bed of 18 images for image compression. Experimentation result show that the proposed TCEVR Codebook generation in VQ for Image compression is showing improvisation over earlier proposed Row based TCEVR. As observed from lower average Euclidean distance between the original and regenerated images for various Codebook sizes.
随着基于多媒体的数据以更快的速度增长,图像压缩是不可避免的。矢量量化在码本生成中起着至关重要的作用。码本是矢量量化的灵魂。有几种方法来生成码本,但最近的一个是thepage的余弦误差矢量旋转(TCEVR),这被证明比其他(KEVR, KEVRW, LBG)更好。提出了一种基于列的误差矢量旋转算法。在一个包含18幅图像的图像压缩试验台上,对提出的基于列的TCEVR即兴算法进行了测试。实验结果表明,基于VQ的图像压缩TCEVR码本生成比先前提出的基于行的TCEVR编码具有更强的即时性。从不同码本大小的原始图像和再生图像之间较低的平均欧几里得距离可以观察到。
{"title":"Image compression using improvised column based Thepade's Cosine Error Vector Rotation (TCEVR) Codebook generation in Vector Quantization","authors":"Sudeep D. Thepade, Lokesh S. Katore","doi":"10.1109/ICCICT.2015.7045730","DOIUrl":"https://doi.org/10.1109/ICCICT.2015.7045730","url":null,"abstract":"Image compression is inevitable now a days as multimedia based data is increasing at faster rate. Vector Quantization plays vital role in Codebook generation. Codebook is the soul of Vector Quantization. There are several methods to generate Codebook but the recent one is Thepade's Cosine Error Vector Rotation (TCEVR), which is proven better than others (KEVR, KEVRW, LBG). Paper proposes novel Column based error Vector Rotation for TCEVR. The proposed column based improvisation in TCEVR is tested with a test bed of 18 images for image compression. Experimentation result show that the proposed TCEVR Codebook generation in VQ for Image compression is showing improvisation over earlier proposed Row based TCEVR. As observed from lower average Euclidean distance between the original and regenerated images for various Codebook sizes.","PeriodicalId":324889,"journal":{"name":"2015 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Novel data mining based image classification with Bayes, Tree, Rule, Lazy and Function Classifiers using fractional row mean of Cosine, Sine and Walsh column transformed images 基于贝叶斯、树、规则、懒分类器和函数分类器的基于余弦、正弦和沃尔什列变换图像的分数行平均值的新型数据挖掘图像分类
Sudeep D. Thepade, Madhura Kalbhor
Important task in image database is to organize images into appropriate category using different features of images. Image classification is studied for many years. There are various techniques proposed to increase the accuracy of classification. In this paper a novel data mining based approach is proposed for content based image classification. Feature extraction and classification algorithms are two main steps in classification process. This paper proposes the use of orthogonal transform to generate the feature vector and to investigate effectiveness of different transforms (Cosine, Sine, and Walsh). Experimentation is carried on different sizes of feature vectors which are formed by taking fractional coefficients. Classification algorithm from different families such as Bayes (Naive Bayes and Bayes Net), Function (RBFNetwork and Simple Logistic), Lazy (IB1 and Kstar), Rule (Decision and Part) and Tree (BFTree, J48 Random Tree and Random Forest) are used for classification. Experimental results and its analysis have shown the Simple Logistic classifier with Walsh transform to be better for proposed data mining based image classification technique.
图像数据库的一项重要任务是利用图像的不同特征对图像进行分类。图像分类研究已经进行了很多年。提出了各种技术来提高分类的准确性。本文提出了一种基于数据挖掘的基于内容的图像分类方法。特征提取和分类算法是分类过程中的两个主要步骤。本文提出使用正交变换来生成特征向量,并研究不同变换(余弦变换、正弦变换和沃尔什变换)的有效性。对取分数阶系数形成的不同大小的特征向量进行了实验。分类算法使用不同家族的分类算法,如Bayes (Naive Bayes和Bayes Net)、Function (RBFNetwork和Simple Logistic)、Lazy (IB1和Kstar)、Rule (Decision和Part)和Tree (BFTree、J48 Random Tree和Random Forest)。实验结果和分析表明,基于沃尔什变换的简单逻辑分类器能够更好地实现基于数据挖掘的图像分类技术。
{"title":"Novel data mining based image classification with Bayes, Tree, Rule, Lazy and Function Classifiers using fractional row mean of Cosine, Sine and Walsh column transformed images","authors":"Sudeep D. Thepade, Madhura Kalbhor","doi":"10.1109/ICCICT.2015.7045727","DOIUrl":"https://doi.org/10.1109/ICCICT.2015.7045727","url":null,"abstract":"Important task in image database is to organize images into appropriate category using different features of images. Image classification is studied for many years. There are various techniques proposed to increase the accuracy of classification. In this paper a novel data mining based approach is proposed for content based image classification. Feature extraction and classification algorithms are two main steps in classification process. This paper proposes the use of orthogonal transform to generate the feature vector and to investigate effectiveness of different transforms (Cosine, Sine, and Walsh). Experimentation is carried on different sizes of feature vectors which are formed by taking fractional coefficients. Classification algorithm from different families such as Bayes (Naive Bayes and Bayes Net), Function (RBFNetwork and Simple Logistic), Lazy (IB1 and Kstar), Rule (Decision and Part) and Tree (BFTree, J48 Random Tree and Random Forest) are used for classification. Experimental results and its analysis have shown the Simple Logistic classifier with Walsh transform to be better for proposed data mining based image classification technique.","PeriodicalId":324889,"journal":{"name":"2015 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129946567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Probabilistic triangular shuffling approach in DWT based image compression scheme 基于小波变换的概率三角变换图像压缩方法
Afshan Mulla, Jaypal Baviskar, Swapnil Wagh, Neha Kudu, Amol Baviskar
In the image processing domain, researchers all over the world aim at designing algorithms which posses the feature of facilitating multiple advantages amalgamated in one scheme viz. compression, fusion, enhancement, security etc. In various classified applications such as military, medical, forensics etc, the image databases are huge and contain a lot of information. Hence, compression of these high-quality images and securing these databases becomes imperative. This paper proposes a Discrete Wavelet Transform (DWT) guided image compression as well as image security technique. The RGB color images are converted into textured images by exploiting DWT properties and thereby facilitating image compression. Since this process is reversible, the colors in the image are retrieved back from the texture patterns. In addition, the security of the image is enhanced based on a novel probabilistic triangular shuffling scheme. The overall proposed algorithm assists in achieving 67-70% compression ratio and improved security. Evaluating the performance of the algorithm, various graphs pertaining to PSNR, MSE, probability of security breach are realized.
在图像处理领域,世界各国的研究人员都致力于设计一种能够将压缩、融合、增强、安全等多种优点融合在一起的算法。在军事、医学、法医等各种分类应用中,图像数据库规模庞大,包含大量信息。因此,压缩这些高质量图像并保护这些数据库变得势在必行。提出了一种基于离散小波变换(DWT)的图像压缩和图像安全技术。利用DWT属性将RGB彩色图像转换为纹理图像,从而便于图像压缩。由于这个过程是可逆的,图像中的颜色是从纹理模式中检索回来的。此外,基于一种新的概率三角洗牌方案,增强了图像的安全性。总体而言,该算法有助于实现67-70%的压缩比,并提高安全性。通过对算法性能的评估,实现了PSNR、MSE、安全漏洞概率的各种图形。
{"title":"Probabilistic triangular shuffling approach in DWT based image compression scheme","authors":"Afshan Mulla, Jaypal Baviskar, Swapnil Wagh, Neha Kudu, Amol Baviskar","doi":"10.1109/ICCICT.2015.7045658","DOIUrl":"https://doi.org/10.1109/ICCICT.2015.7045658","url":null,"abstract":"In the image processing domain, researchers all over the world aim at designing algorithms which posses the feature of facilitating multiple advantages amalgamated in one scheme viz. compression, fusion, enhancement, security etc. In various classified applications such as military, medical, forensics etc, the image databases are huge and contain a lot of information. Hence, compression of these high-quality images and securing these databases becomes imperative. This paper proposes a Discrete Wavelet Transform (DWT) guided image compression as well as image security technique. The RGB color images are converted into textured images by exploiting DWT properties and thereby facilitating image compression. Since this process is reversible, the colors in the image are retrieved back from the texture patterns. In addition, the security of the image is enhanced based on a novel probabilistic triangular shuffling scheme. The overall proposed algorithm assists in achieving 67-70% compression ratio and improved security. Evaluating the performance of the algorithm, various graphs pertaining to PSNR, MSE, probability of security breach are realized.","PeriodicalId":324889,"journal":{"name":"2015 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132006503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A robust technique for relational database watermarking and verification 一种可靠的关系数据库水印与验证技术
Swathi Melkundi, Chaitali Chandankhede
Outsourcing of data is increasing with the rapid growth of internet. There is every possibility that data reaches illegal hands. As a result, there is increase in illegal copying of data, piracy, illegal redistribution, forgery and theft. Watermarking technology is a solution for these challenges. It addresses the ownership problem. It deters illegal copying and protects copyright of data. Watermarking technology mainly involves the process of watermark insertion and watermark extraction. Watermark insertion means embedding an imperceptible watermark in the relational database. In watermark extraction we extract the embedded watermark without the help of original database. In this paper we propose a new watermarking technique, which will watermark both textual and numerical data. Our proposed method also does watermark verification where, the watermark extracted from the database is compared with the original watermark that is known only to the owner of the database. This is accomplished through Levenshtein distance algorithm.
随着互联网的快速发展,数据外包越来越多。数据极有可能落入不法分子之手。因此,非法复制数据、盗版、非法再分发、伪造和盗窃行为有所增加。水印技术是解决这些挑战的一种方法。它解决了所有权问题。它阻止非法复制并保护数据的版权。水印技术主要包括水印插入和水印提取两个过程。水印插入是指在关系数据库中嵌入一个不易察觉的水印。水印提取是在不借助原始数据库的情况下提取嵌入的水印。本文提出了一种新的水印技术,可以同时对文本和数字数据进行水印。我们提出的方法还进行了水印验证,其中,从数据库中提取的水印与只有数据库所有者知道的原始水印进行比较。这是通过Levenshtein距离算法实现的。
{"title":"A robust technique for relational database watermarking and verification","authors":"Swathi Melkundi, Chaitali Chandankhede","doi":"10.1109/ICCICT.2015.7045676","DOIUrl":"https://doi.org/10.1109/ICCICT.2015.7045676","url":null,"abstract":"Outsourcing of data is increasing with the rapid growth of internet. There is every possibility that data reaches illegal hands. As a result, there is increase in illegal copying of data, piracy, illegal redistribution, forgery and theft. Watermarking technology is a solution for these challenges. It addresses the ownership problem. It deters illegal copying and protects copyright of data. Watermarking technology mainly involves the process of watermark insertion and watermark extraction. Watermark insertion means embedding an imperceptible watermark in the relational database. In watermark extraction we extract the embedded watermark without the help of original database. In this paper we propose a new watermarking technique, which will watermark both textual and numerical data. Our proposed method also does watermark verification where, the watermark extracted from the database is compared with the original watermark that is known only to the owner of the database. This is accomplished through Levenshtein distance algorithm.","PeriodicalId":324889,"journal":{"name":"2015 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132150086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2015 International Conference on Communication, Information & Computing Technology (ICCICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1