Pub Date : 2013-03-01DOI: 10.1109/ISSP.2013.6526877
Verma Bhupender, R. Pandey
This paper presents a video directional weighted median filter with suitable colour correction to remove random valued impulse noise from colour video sequences. The switching median technique is utilized to protect noise free pixels from filtering so as to avoid blurring of frames. The threshold used for identifying isolated noisy pixels is made adaptive based on the local statistics of the current pixel component. The restoration of noisy pixels is done by utilizing the brightness and colour information obtained from directional weighted median filter and vector directional filter, respectively. Local statistics for video filtering involves a three dimensional sliding window for estimation of characteristics of current pixel. This three dimensional sliding window provides spatial as well as temporal information about the neighbourhood for independent restoration of frame under consideration but decision for filtering is made only on the basis of information obtained from current frame only because of the fact that the consecutive frames may also have special characteristics. Only noise free pixels of three dimensional sliding window, are used for restoration of frame under consideration. Simulation results show that the proposed filter yields superior performance in comparison to other filtering methods available in literature.
{"title":"A video directional weighted median filter with adaptive threshold and colour correction","authors":"Verma Bhupender, R. Pandey","doi":"10.1109/ISSP.2013.6526877","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526877","url":null,"abstract":"This paper presents a video directional weighted median filter with suitable colour correction to remove random valued impulse noise from colour video sequences. The switching median technique is utilized to protect noise free pixels from filtering so as to avoid blurring of frames. The threshold used for identifying isolated noisy pixels is made adaptive based on the local statistics of the current pixel component. The restoration of noisy pixels is done by utilizing the brightness and colour information obtained from directional weighted median filter and vector directional filter, respectively. Local statistics for video filtering involves a three dimensional sliding window for estimation of characteristics of current pixel. This three dimensional sliding window provides spatial as well as temporal information about the neighbourhood for independent restoration of frame under consideration but decision for filtering is made only on the basis of information obtained from current frame only because of the fact that the consecutive frames may also have special characteristics. Only noise free pixels of three dimensional sliding window, are used for restoration of frame under consideration. Simulation results show that the proposed filter yields superior performance in comparison to other filtering methods available in literature.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-01DOI: 10.1109/ISSP.2013.6526885
K. Raval, S. Zafar
The advancing world of digital multimedia communication is faces problems related to security and authenticity of digital data. In the context of multimedia communication, digital images and videos have numerous applications in entertainment world like TV channel broadcasting. Digital Watermarking algorithms used to protect the copyright of digital images and to verify multimedia data security. Most watermarking algorithms transform the host image and embedding of the watermark information by robust way. Uncompressed digital images need a lot storage capacity and bandwidth so efficient image transmission need image compression. The solution is becoming more complex with the growth of data. We propose Digital Watermarking by proposed transform Algorithm based on DCT-DWT watermarking. By this method we can do secure image transmission.
{"title":"Digital Watermarking with copyright authentication for image communication","authors":"K. Raval, S. Zafar","doi":"10.1109/ISSP.2013.6526885","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526885","url":null,"abstract":"The advancing world of digital multimedia communication is faces problems related to security and authenticity of digital data. In the context of multimedia communication, digital images and videos have numerous applications in entertainment world like TV channel broadcasting. Digital Watermarking algorithms used to protect the copyright of digital images and to verify multimedia data security. Most watermarking algorithms transform the host image and embedding of the watermark information by robust way. Uncompressed digital images need a lot storage capacity and bandwidth so efficient image transmission need image compression. The solution is becoming more complex with the growth of data. We propose Digital Watermarking by proposed transform Algorithm based on DCT-DWT watermarking. By this method we can do secure image transmission.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132980637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-01DOI: 10.1109/ISSP.2013.6526901
U. Bhattacharjee, K. Sarmah
This paper report the experiments carried out on a recently collected multilingual speech database namely Arunachali Language Speech Database (ALS-DB) to identify the spoken language of the speaker. The speech database consists of speech data recorded from 200 speakers with Arunachali languages of North-East India as mother tongue. The speech data is collected in three different languages English, Hindi and a local language which belongs to any one of the four major languages of Arunachal Pradesh: Adi, Nyishi, Galo and Apatani. The collected database is evaluated with Gaussian mixture model (GMM) based language identification system with MFCC and MFCC with Prosodic features as feature vector. The initial study explores the fact that performance of a baseline GMM-MFCC based language identification system improves considerably when the prosodic features are considered as additional features with MFCC. It has been observed that when prosodic features are combined with MFCC features, performance of the system improved by nearly 11% over the baseline performance.
本文报道了在最近收集的多语种语音数据库**i Language speech database (ALS-DB)上进行的识别说话人口语的实验。语音数据库由200名以印度东北部**i种语言为母语的使用者的语音数据记录而成。语音数据是用三种不同的语言收集的:英语、印地语和一种当地语言,这种语言属于**的四种主要语言之一:阿迪语、尼什语、加洛语和阿帕塔尼语。采用基于高斯混合模型(GMM)的语言识别系统对收集到的数据库进行评价,该系统以MFCC和以韵律特征为特征向量的MFCC为特征向量。初步的研究发现,当韵律特征被作为MFCC的附加特征考虑时,基于GMM-MFCC的基线语言识别系统的性能显著提高。当韵律特征与MFCC特征相结合时,系统的性能比基线性能提高了近11%。
{"title":"Language identification system using MFCC and prosodic features","authors":"U. Bhattacharjee, K. Sarmah","doi":"10.1109/ISSP.2013.6526901","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526901","url":null,"abstract":"This paper report the experiments carried out on a recently collected multilingual speech database namely Arunachali Language Speech Database (ALS-DB) to identify the spoken language of the speaker. The speech database consists of speech data recorded from 200 speakers with Arunachali languages of North-East India as mother tongue. The speech data is collected in three different languages English, Hindi and a local language which belongs to any one of the four major languages of Arunachal Pradesh: Adi, Nyishi, Galo and Apatani. The collected database is evaluated with Gaussian mixture model (GMM) based language identification system with MFCC and MFCC with Prosodic features as feature vector. The initial study explores the fact that performance of a baseline GMM-MFCC based language identification system improves considerably when the prosodic features are considered as additional features with MFCC. It has been observed that when prosodic features are combined with MFCC features, performance of the system improved by nearly 11% over the baseline performance.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114529704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-01DOI: 10.1109/ISSP.2013.6526926
N. Chandel, S. Mishra, N. Gupta, Amit Sinhal
With the arrival of cloud computing technology utilization of resources is increases multifold, and also increases security issues in different cloud environment. This paper presents a new scheme for secure cloud creation using RC6 encryption algorithm for securing the cloud environment. The results show the performance of proposed technique in public and private cloud.
{"title":"Creation of secure cloud environment using RC6","authors":"N. Chandel, S. Mishra, N. Gupta, Amit Sinhal","doi":"10.1109/ISSP.2013.6526926","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526926","url":null,"abstract":"With the arrival of cloud computing technology utilization of resources is increases multifold, and also increases security issues in different cloud environment. This paper presents a new scheme for secure cloud creation using RC6 encryption algorithm for securing the cloud environment. The results show the performance of proposed technique in public and private cloud.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"618 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-01DOI: 10.1109/ISSP.2013.6526897
Hasnain Vohra, Hetal Patel
We propose an algorithm for image segmentation using the output of any boundary detector. Our algorithm constructs closed regions from the brittle boundaries of boundary maps which are usually obtained when boundary detectors are used for natural images. The proposed algorithm works on a bottom-up process which analyzes neighbourhoods of boundary points to detect discontinuities and connects them. We call this process optimization of boundary maps which is followed by dilation of boundaries and the watershed transform to obtain image segments. The segmentation results can be controlled with user-tuned parameters.
{"title":"Optimizing boundary maps for image segmentation","authors":"Hasnain Vohra, Hetal Patel","doi":"10.1109/ISSP.2013.6526897","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526897","url":null,"abstract":"We propose an algorithm for image segmentation using the output of any boundary detector. Our algorithm constructs closed regions from the brittle boundaries of boundary maps which are usually obtained when boundary detectors are used for natural images. The proposed algorithm works on a bottom-up process which analyzes neighbourhoods of boundary points to detect discontinuities and connects them. We call this process optimization of boundary maps which is followed by dilation of boundaries and the watershed transform to obtain image segments. The segmentation results can be controlled with user-tuned parameters.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123505275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-01DOI: 10.1109/ISSP.2013.6526899
Md. Iqbal Quraishi, M. De, K. G. Dhal, S. Mondal, G. Das
Old degraded historical documents carry various important information regarding our culture, economics etc. proper restoration of these documents is very necessary. After digitization of these documents there remain noises and other low resolution components. These affect the overall visual appearance of the documents. In this paper a novel approach is proposed to enhance ancient historical documents. To enhance these digital format documents a two way approach is considered. At first Particle Swarm Optimization (PSO) and bilateral filter is applied. At second level Non-Linear Enhancement with bilateral filter is applied. Both the approaches are then tested visually and quantitively to show the effectiveness of the approach.
{"title":"A novel hybrid approach to restore historical degraded documents","authors":"Md. Iqbal Quraishi, M. De, K. G. Dhal, S. Mondal, G. Das","doi":"10.1109/ISSP.2013.6526899","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526899","url":null,"abstract":"Old degraded historical documents carry various important information regarding our culture, economics etc. proper restoration of these documents is very necessary. After digitization of these documents there remain noises and other low resolution components. These affect the overall visual appearance of the documents. In this paper a novel approach is proposed to enhance ancient historical documents. To enhance these digital format documents a two way approach is considered. At first Particle Swarm Optimization (PSO) and bilateral filter is applied. At second level Non-Linear Enhancement with bilateral filter is applied. Both the approaches are then tested visually and quantitively to show the effectiveness of the approach.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120880085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-01DOI: 10.1109/ISSP.2013.6526935
S. Pandya, P. Virparia
The Untouched data of the University can be used to achieve the competitive advantage by having data analysis using Data Mining Techniques. Comparing Application of Classification and Association Rule Mining Techniques to identify fitness of the technique in education domain is an attempt towards uncovering hidden patterns in an Indian University. By experimental results authors have found the Classification comparatively brings more clear and straight pictures of hidden patterns subject to the dataset chosen.
{"title":"Comparing the application of classification and association rule mining techniques of data mining in an Indian university to uncover hidden patterns","authors":"S. Pandya, P. Virparia","doi":"10.1109/ISSP.2013.6526935","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526935","url":null,"abstract":"The Untouched data of the University can be used to achieve the competitive advantage by having data analysis using Data Mining Techniques. Comparing Application of Classification and Association Rule Mining Techniques to identify fitness of the technique in education domain is an attempt towards uncovering hidden patterns in an Indian University. By experimental results authors have found the Classification comparatively brings more clear and straight pictures of hidden patterns subject to the dataset chosen.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128462774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-01DOI: 10.1109/ISSP.2013.6526922
P. Dinesh, P. Kishore, B. Vivekanandan, S. Moorthi
The paper reports a navigation system which uses passive RFID tags for localization. The entire terrain is mapped into a grid of nodes each containing a tag that refers to a specific location on the terrain which is sensed by the vehicle using the onboard compatible RFID reader. These tags provide the vehicle with the sense of its position and orientation on the terrain. The system uses Flood fill algorithm to generate the shortest path to the destination while also maneuvering the obstacles. During the course of traversing the path, on reading each tag, the system ensures that the location read from tag is consistent with the generated route. On the event of any mismatch, a new path to the destination is generated, empowering the system with error detection and correction capabilities. The system uses FPGA as the processing unit on account of its flexibility and high parallel processing capabilities.
{"title":"RFID based navigation system for unmanned material handling vehicles using FPGA","authors":"P. Dinesh, P. Kishore, B. Vivekanandan, S. Moorthi","doi":"10.1109/ISSP.2013.6526922","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526922","url":null,"abstract":"The paper reports a navigation system which uses passive RFID tags for localization. The entire terrain is mapped into a grid of nodes each containing a tag that refers to a specific location on the terrain which is sensed by the vehicle using the onboard compatible RFID reader. These tags provide the vehicle with the sense of its position and orientation on the terrain. The system uses Flood fill algorithm to generate the shortest path to the destination while also maneuvering the obstacles. During the course of traversing the path, on reading each tag, the system ensures that the location read from tag is consistent with the generated route. On the event of any mismatch, a new path to the destination is generated, empowering the system with error detection and correction capabilities. The system uses FPGA as the processing unit on account of its flexibility and high parallel processing capabilities.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129735094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-01DOI: 10.1109/ISSP.2013.6526900
S. Chaudhari, R. Gulati
This paper addresses the script identification problem of bilingual printed document images. We propose an OCR system that separates and identify mixed English-Gujarati digits. Here, first the system is trained with standard data samples. Then for testing, data samples are collected from different sources of paper like, news paper, book, magazine, etc. Random sized pre-processed image is normalized to uniform sized image. A statistical approach is used for feature extraction. For classification kNN classifier is used. The model gives average accuracy of 99.26% for Gujarati digits, 99.20% for English digits, and overall accuracy 99.23%.
{"title":"An OCR for separation and identification of mixed English — Gujarati digits using kNN classifier","authors":"S. Chaudhari, R. Gulati","doi":"10.1109/ISSP.2013.6526900","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526900","url":null,"abstract":"This paper addresses the script identification problem of bilingual printed document images. We propose an OCR system that separates and identify mixed English-Gujarati digits. Here, first the system is trained with standard data samples. Then for testing, data samples are collected from different sources of paper like, news paper, book, magazine, etc. Random sized pre-processed image is normalized to uniform sized image. A statistical approach is used for feature extraction. For classification kNN classifier is used. The model gives average accuracy of 99.26% for Gujarati digits, 99.20% for English digits, and overall accuracy 99.23%.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-01DOI: 10.1109/ISSP.2013.6526912
C. K. Krunal, R. Dhaval, R. Yogesh
The mobile ad-hoc network study is based on simulations as well as the fundamental necessary simplified assumption of physical reality. Testing the simulation for various protocols in a practical environment shows how theories can be authenticated in practice. Our approach is to build a model that can be used to simulate and test the path selection from plentiful paths available from source to the destination. We are interested in optimal path selection and analysis in Bluetooth scatter net routing with respect to some key parameter. The key parameter includes the number of intermediate hops. We want to determine whether and how paths are selected and what changes take place with the mobility of the nodes. Our approach is to list out the available path between source and destination by indicating the number of intermediate hops. Based on that user can select the shortest path from the proposed network. Finally in this paper, To make the scatter net structure more suitable to serve in mobile ad hoc networks our model shows our approach of selecting the optimal path proves better in terms of data delivery from a given sender to receiver.
{"title":"Optimal path selection in short range wireless communication","authors":"C. K. Krunal, R. Dhaval, R. Yogesh","doi":"10.1109/ISSP.2013.6526912","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526912","url":null,"abstract":"The mobile ad-hoc network study is based on simulations as well as the fundamental necessary simplified assumption of physical reality. Testing the simulation for various protocols in a practical environment shows how theories can be authenticated in practice. Our approach is to build a model that can be used to simulate and test the path selection from plentiful paths available from source to the destination. We are interested in optimal path selection and analysis in Bluetooth scatter net routing with respect to some key parameter. The key parameter includes the number of intermediate hops. We want to determine whether and how paths are selected and what changes take place with the mobility of the nodes. Our approach is to list out the available path between source and destination by indicating the number of intermediate hops. Based on that user can select the shortest path from the proposed network. Finally in this paper, To make the scatter net structure more suitable to serve in mobile ad hoc networks our model shows our approach of selecting the optimal path proves better in terms of data delivery from a given sender to receiver.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"47 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132629417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}