首页 > 最新文献

2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)最新文献

英文 中文
Comparative evaluation of feature normalization techniques for voice password based speaker verification 基于语音密码的说话人验证特征归一化技术的比较评价
Fidalizia Pyrtuh, Sarfaraz Jelil, Geetima Kachari, L. J. Singh
This paper presents a comparative study of the normalization techniques used at feature level in voice password based speaker verification system. The input sample speech is recorded at different instants of time and environment. Hence, there is a variation in the input sample due to the environmental interference, noise, emotions etc. The input sample is a human voice with unique passwords taken/recorded at three different instants of time or day. This input sample is processed using sampling, pre-emphasis, MFCC feature extraction and DTW. In order to enhance the features we have used three different popular feature normalization techniques namely MVN (Mean and Variance Normalization), CMN (Cepstral Mean Normalization) and PCA(Principal Component Analysis) and analyzed the result of each technique individually. The objective of this paper is to compare the performance and efficiency of these techniques and evaluate which of these gives the best verification rate. According to our findings CMN gives the best results.
本文对基于语音密码的说话人验证系统中特征级的归一化技术进行了比较研究。在不同的时间和环境下记录输入的语音样本。因此,由于环境干扰、噪声、情绪等,输入样本存在变化。输入样本是在三个不同的时间或一天中拍摄/记录的具有唯一密码的人类声音。该输入样本使用采样、预强调、MFCC特征提取和DTW进行处理。为了增强特征,我们使用了三种不同的流行特征归一化技术,即MVN(均值和方差归一化),CMN(倒谱均值归一化)和PCA(主成分分析),并分别分析了每种技术的结果。本文的目的是比较这些技术的性能和效率,并评估哪一种技术给出了最好的验证率。根据我们的研究结果,CMN给出了最好的结果。
{"title":"Comparative evaluation of feature normalization techniques for voice password based speaker verification","authors":"Fidalizia Pyrtuh, Sarfaraz Jelil, Geetima Kachari, L. J. Singh","doi":"10.1109/NCVPRIPG.2013.6776237","DOIUrl":"https://doi.org/10.1109/NCVPRIPG.2013.6776237","url":null,"abstract":"This paper presents a comparative study of the normalization techniques used at feature level in voice password based speaker verification system. The input sample speech is recorded at different instants of time and environment. Hence, there is a variation in the input sample due to the environmental interference, noise, emotions etc. The input sample is a human voice with unique passwords taken/recorded at three different instants of time or day. This input sample is processed using sampling, pre-emphasis, MFCC feature extraction and DTW. In order to enhance the features we have used three different popular feature normalization techniques namely MVN (Mean and Variance Normalization), CMN (Cepstral Mean Normalization) and PCA(Principal Component Analysis) and analyzed the result of each technique individually. The objective of this paper is to compare the performance and efficiency of these techniques and evaluate which of these gives the best verification rate. According to our findings CMN gives the best results.","PeriodicalId":436402,"journal":{"name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","volume":"78 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123268036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework for abandoned object detection from video surveillance 基于视频监控的废弃目标检测框架
R. Tripathi, A. S. Jalal, C. Bhatnagar
In this paper, we propose a method to detect abandoned object from surveillance video. In first step, foreground objects are extracted using background subtraction in which background modeling is done through running average method. In second step, static objects are detected by using contour features of foreground objects of consecutive frames. In third step, detected static objects are classified into human and non-human objects by using edge based object recognition method which is capable to generate the score for full or partial visible object. Nonhuman static object is analyzed to detect abandoned object. Experimental results show that proposed system is efficient and effective for real-time video surveillance, which is tested on IEEE Performance Evaluation of Tracking and Surveillance data set (PETS 2006, PETS 2007) and our own dataset.
本文提出了一种从监控视频中检测废弃物体的方法。首先,采用背景相减法提取前景目标,通过运行平均法对背景进行建模;第二步,利用连续帧前景目标的轮廓特征检测静态目标。第三步,采用基于边缘的目标识别方法,将检测到的静态目标分为人类和非人类目标,并生成完全或部分可见目标的分数。对非人类静态物体进行分析,检测废弃物体。在IEEE跟踪与监控性能评估数据集(PETS 2006, PETS 2007)和我们自己的数据集上进行了测试,结果表明该系统在实时视频监控中是高效有效的。
{"title":"A framework for abandoned object detection from video surveillance","authors":"R. Tripathi, A. S. Jalal, C. Bhatnagar","doi":"10.1109/NCVPRIPG.2013.6776161","DOIUrl":"https://doi.org/10.1109/NCVPRIPG.2013.6776161","url":null,"abstract":"In this paper, we propose a method to detect abandoned object from surveillance video. In first step, foreground objects are extracted using background subtraction in which background modeling is done through running average method. In second step, static objects are detected by using contour features of foreground objects of consecutive frames. In third step, detected static objects are classified into human and non-human objects by using edge based object recognition method which is capable to generate the score for full or partial visible object. Nonhuman static object is analyzed to detect abandoned object. Experimental results show that proposed system is efficient and effective for real-time video surveillance, which is tested on IEEE Performance Evaluation of Tracking and Surveillance data set (PETS 2006, PETS 2007) and our own dataset.","PeriodicalId":436402,"journal":{"name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122798771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Generalized newtonian fluid simulations 广义牛顿流体模拟
Nitish Tripathi, P J Narayanan
We present an approach to simulate both Newtonian and generalized Newtonian fluids using Lattice Boltzmann Method. The focus has been on accurately modelling non-Newtonian fluids at the micro channel level from biological fluids in the past. Our method can model macroscopic behaviour of such fluids by simulating the variation of properties such as viscosity through the bulk of the fluid. The method works regardless of the magnitude of flow, be it through a thin tube or a large quantity of liquid splashing in a container. We simulate the change in viscosity of a generalized Newtonian fluid and its free surface interactions with obstacles and boundaries. We harness the inherent parallelism of Lattice Boltzmann Method to give a fast GPU implementation for the same.
我们提出了一种用晶格玻尔兹曼方法模拟牛顿流体和广义牛顿流体的方法。过去的重点是在生物流体的微通道水平上精确地模拟非牛顿流体。我们的方法可以通过模拟流体整体粘度等特性的变化来模拟此类流体的宏观行为。无论流量大小,无论是通过细管还是在容器中飞溅的大量液体,该方法都有效。我们模拟了广义牛顿流体的粘度变化及其自由表面与障碍和边界的相互作用。我们利用晶格玻尔兹曼方法固有的并行性,给出了一个快速的GPU实现。
{"title":"Generalized newtonian fluid simulations","authors":"Nitish Tripathi, P J Narayanan","doi":"10.1109/NCVPRIPG.2013.6776169","DOIUrl":"https://doi.org/10.1109/NCVPRIPG.2013.6776169","url":null,"abstract":"We present an approach to simulate both Newtonian and generalized Newtonian fluids using Lattice Boltzmann Method. The focus has been on accurately modelling non-Newtonian fluids at the micro channel level from biological fluids in the past. Our method can model macroscopic behaviour of such fluids by simulating the variation of properties such as viscosity through the bulk of the fluid. The method works regardless of the magnitude of flow, be it through a thin tube or a large quantity of liquid splashing in a container. We simulate the change in viscosity of a generalized Newtonian fluid and its free surface interactions with obstacles and boundaries. We harness the inherent parallelism of Lattice Boltzmann Method to give a fast GPU implementation for the same.","PeriodicalId":436402,"journal":{"name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125273576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High quality depth map estimation by kinect upsampling and hole filling using RGB features and mutual information 利用RGB特征和互信息进行kinect上采样和孔填充的高质量深度图估计
Nidhi Chahal, S. Chaudhury
High quality depth map estimation is required for better visualization of 3D views as there is great impact of depth map quality on overall 3D image quality. If the depth is estimated from conventional ways using two or more images, some defects come into picture, mostly in regions without texture. We utilised Microsoft Kinect RGBD dataset to obtain input color images and depth maps which also includes some noise factors. We proposed a method to remove this noise and get quality depth images. First the color and depth images are aligned to each other using intensity based image registration. This method of image alignment is mostly used in medical field, but we applied this technique to correct kinect depth maps by which one can avoid cumbersome task of feature based point correspondence between images. There is no requirement of preprocessing or segmentation steps if we use intensity based image alignment method. Second, we proposed an algorithm to fill the unwanted gaps in kinect depth maps and upsampled it using corresponding high resolution color image. Finally we applied 9×9 median filtering on implementation results and get high quality and improved depth maps.
由于深度图质量对整体3D图像质量的影响很大,因此需要高质量的深度图估计才能更好地实现3D视图的可视化。如果使用两张或多张图像进行传统的深度估计,则会出现一些缺陷,主要是在没有纹理的区域。我们使用Microsoft Kinect RGBD数据集获得输入颜色图像和深度图,其中也包含一些噪声因素。提出了一种去除噪声的方法,得到高质量的深度图像。首先,使用基于强度的图像配准将颜色和深度图像相互对齐。这种图像对齐方法主要用于医学领域,但我们将这种技术应用于kinect深度图的校正,从而避免了图像之间基于特征点对应的繁琐任务。如果使用基于强度的图像对齐方法,则不需要预处理和分割步骤。其次,我们提出了一种算法来填补kinect深度图中不需要的空白,并使用相应的高分辨率彩色图像对其进行上采样。最后对实现结果进行9×9中值滤波,得到高质量的深度图。
{"title":"High quality depth map estimation by kinect upsampling and hole filling using RGB features and mutual information","authors":"Nidhi Chahal, S. Chaudhury","doi":"10.1109/NCVPRIPG.2013.6776238","DOIUrl":"https://doi.org/10.1109/NCVPRIPG.2013.6776238","url":null,"abstract":"High quality depth map estimation is required for better visualization of 3D views as there is great impact of depth map quality on overall 3D image quality. If the depth is estimated from conventional ways using two or more images, some defects come into picture, mostly in regions without texture. We utilised Microsoft Kinect RGBD dataset to obtain input color images and depth maps which also includes some noise factors. We proposed a method to remove this noise and get quality depth images. First the color and depth images are aligned to each other using intensity based image registration. This method of image alignment is mostly used in medical field, but we applied this technique to correct kinect depth maps by which one can avoid cumbersome task of feature based point correspondence between images. There is no requirement of preprocessing or segmentation steps if we use intensity based image alignment method. Second, we proposed an algorithm to fill the unwanted gaps in kinect depth maps and upsampled it using corresponding high resolution color image. Finally we applied 9×9 median filtering on implementation results and get high quality and improved depth maps.","PeriodicalId":436402,"journal":{"name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121575331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assisting the autistic with improved facial expression recognition from mixed expressions 帮助自闭症患者提高面部表情识别能力
Washef Ahmed, S. Mitra, Kunal Chanda, Debasis Mazumdar
People suffering from autism have difficulty with recognizing other people's emotions and are therefore unable to react to it. Although there have been attempts aimed at developing a system for analyzing facial expressions for persons suffering from autism, very little has been explored for capturing one or more expressions from mixed expressions which are a mixture of two closely related expressions. This is essential for psychotherapeutic tool for analysis during counseling. This paper presents the idea of improving the recognition accuracy of one or more of the six prototypic expressions namely happiness, surprise, fear, disgust, sadness and anger from the mixture of two facial expressions. For this purpose a motion gradient based optical flow for muscle movement is computed between frames of a given video sequence. The computed optical flow is further used to generate feature vector as the signature of six basic prototypic expressions. Decision Tree generated rule base is used for clustering the feature vectors obtained in the video sequence and the result of clustering is used for recognition of expressions. The relative intensity of expressions for a given face present in a frame is measured. With the introduction of Component Based Analysis which is basically computing the feature vectors on the proposed regions of interest on a face, considerable improvement has been noticed regarding recognition of one or more expressions. The results have been validated against human judgement.
患有自闭症的人很难识别他人的情绪,因此无法对他人的情绪做出反应。尽管有人试图开发一种系统来分析自闭症患者的面部表情,但很少有人探索从混合表情中捕捉一种或多种表情,混合表情是两种密切相关的表情的混合物。这是必不可少的心理治疗工具,分析在咨询过程中。本文提出了从两种面部表情的混合中提高快乐、惊讶、恐惧、厌恶、悲伤和愤怒六种原型表情中的一种或多种识别精度的想法。为此,在给定视频序列的帧之间计算基于运动梯度的肌肉运动光流。利用计算得到的光流生成特征向量作为6个基本原型表达式的签名。使用决策树生成的规则库对视频序列中获得的特征向量进行聚类,并将聚类结果用于表情识别。在一帧中测量给定面部表情的相对强度。随着基于分量的分析(Component Based Analysis)的引入,在人脸感兴趣的区域上计算特征向量,在识别一个或多个表情方面已经有了相当大的改进。这些结果已经与人类的判断相违背。
{"title":"Assisting the autistic with improved facial expression recognition from mixed expressions","authors":"Washef Ahmed, S. Mitra, Kunal Chanda, Debasis Mazumdar","doi":"10.1109/NCVPRIPG.2013.6776229","DOIUrl":"https://doi.org/10.1109/NCVPRIPG.2013.6776229","url":null,"abstract":"People suffering from autism have difficulty with recognizing other people's emotions and are therefore unable to react to it. Although there have been attempts aimed at developing a system for analyzing facial expressions for persons suffering from autism, very little has been explored for capturing one or more expressions from mixed expressions which are a mixture of two closely related expressions. This is essential for psychotherapeutic tool for analysis during counseling. This paper presents the idea of improving the recognition accuracy of one or more of the six prototypic expressions namely happiness, surprise, fear, disgust, sadness and anger from the mixture of two facial expressions. For this purpose a motion gradient based optical flow for muscle movement is computed between frames of a given video sequence. The computed optical flow is further used to generate feature vector as the signature of six basic prototypic expressions. Decision Tree generated rule base is used for clustering the feature vectors obtained in the video sequence and the result of clustering is used for recognition of expressions. The relative intensity of expressions for a given face present in a frame is measured. With the introduction of Component Based Analysis which is basically computing the feature vectors on the proposed regions of interest on a face, considerable improvement has been noticed regarding recognition of one or more expressions. The results have been validated against human judgement.","PeriodicalId":436402,"journal":{"name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reversible watermarking technique to enhance security of a biometric authentication system 提高生物特征认证系统安全性的可逆水印技术
Vaibhav B. Joshi, M. Raval, S. Mitra, P. Rege, S. K. Parulkar
For every biometric template protecting technique, non-reversibility, accuracy, and revocability are essential features. Several template protecting techniques like bio-hash or biometric crypto system are used to transform raw biometric features into alternative form known as protected template [2]. As the protected templates are non-reversible, biometric verification is done in a transform domain. Tampered or stolen protected template may cause false validation; therefore its authentication in the database is essential. Reversible watermarking technique provides one such effective mechanism. Watermark protected templates are stored in the database at the time of its enrollment. During verification phase, incoming query template is compared with many database templates until a match is established. This verification technique increase complexity and burden on a biometric authentication system. In this paper, we propose a tag based template searching in reversible watermarking technique to check authenticity and reduce burden on biometric authentication system. In the proposal, rotation, scale and translation (RST) invariant features of biometric image are used for tagging the data. Watermark reversibility in the proposed method ensures that its presence do not affect native biometric authentication. Moreover presence of watermark in the biometric template provides security against replay attack.
对于每一种生物特征模板保护技术来说,不可逆性、准确性和可撤销性是其基本特征。几种模板保护技术,如生物哈希或生物特征加密系统,用于将原始生物特征转换为被称为保护模板的替代形式[2]。由于受保护的模板是不可逆的,因此生物识别验证是在转换域中完成的。受保护模板被篡改或被盗可能导致错误验证;因此,它在数据库中的身份验证是必不可少的。可逆水印技术提供了一种有效的机制。受水印保护的模板在注册时存储在数据库中。在验证阶段,将传入的查询模板与许多数据库模板进行比较,直到建立匹配。这种验证技术增加了生物特征认证系统的复杂性和负担。本文提出了一种基于标签的模板搜索的可逆水印技术,以验证水印的真实性,减轻生物特征认证系统的负担。该方法利用生物特征图像的旋转、尺度和平移(RST)不变性特征对数据进行标记。水印的可逆性保证了水印的存在不影响原生生物特征认证。此外,生物特征模板中水印的存在提供了防止重放攻击的安全性。
{"title":"Reversible watermarking technique to enhance security of a biometric authentication system","authors":"Vaibhav B. Joshi, M. Raval, S. Mitra, P. Rege, S. K. Parulkar","doi":"10.1109/NCVPRIPG.2013.6776240","DOIUrl":"https://doi.org/10.1109/NCVPRIPG.2013.6776240","url":null,"abstract":"For every biometric template protecting technique, non-reversibility, accuracy, and revocability are essential features. Several template protecting techniques like bio-hash or biometric crypto system are used to transform raw biometric features into alternative form known as protected template [2]. As the protected templates are non-reversible, biometric verification is done in a transform domain. Tampered or stolen protected template may cause false validation; therefore its authentication in the database is essential. Reversible watermarking technique provides one such effective mechanism. Watermark protected templates are stored in the database at the time of its enrollment. During verification phase, incoming query template is compared with many database templates until a match is established. This verification technique increase complexity and burden on a biometric authentication system. In this paper, we propose a tag based template searching in reversible watermarking technique to check authenticity and reduce burden on biometric authentication system. In the proposal, rotation, scale and translation (RST) invariant features of biometric image are used for tagging the data. Watermark reversibility in the proposed method ensures that its presence do not affect native biometric authentication. Moreover presence of watermark in the biometric template provides security against replay attack.","PeriodicalId":436402,"journal":{"name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125575546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A frequency domain approach to silhouette based gait recognition 基于轮廓的步态识别频域方法
Soumyadip Sengupta, Udit Halder, R. Panda, A. S. Chowdhury
In this paper, we propose a frequency domain based model-free gait recognition approach from silhouette inputs using Fourier Transform. Gait sequences are first converted into frequency domain using Fourier transform. Information content of the frequency components are analysed next to determine the number of effective frequencies which can help in the recognition process. These principal frequencies are treated separately to obtain scores based on the correlation coefficient between the gallery and the probe images. The individual scores are fused in the last stage to obtain the final score. The proposed approach is compared with other state-of-the-art model-free gait recognition algorithms. Experimental results on the USF HumanID database clearly indicate the supremacy of our technique.
本文提出了一种基于傅立叶变换的无模型步态识别方法。首先利用傅里叶变换将步态序列转换到频域。然后分析频率分量的信息含量,确定有效频率的个数,以帮助识别过程。这些主频率被分别处理,以获得基于画廊和探针图像之间的相关系数的分数。在最后阶段将个人分数融合,得到最终分数。将该方法与其他先进的无模型步态识别算法进行了比较。USF HumanID数据库的实验结果清楚地表明了我们技术的优势。
{"title":"A frequency domain approach to silhouette based gait recognition","authors":"Soumyadip Sengupta, Udit Halder, R. Panda, A. S. Chowdhury","doi":"10.1109/NCVPRIPG.2013.6776261","DOIUrl":"https://doi.org/10.1109/NCVPRIPG.2013.6776261","url":null,"abstract":"In this paper, we propose a frequency domain based model-free gait recognition approach from silhouette inputs using Fourier Transform. Gait sequences are first converted into frequency domain using Fourier transform. Information content of the frequency components are analysed next to determine the number of effective frequencies which can help in the recognition process. These principal frequencies are treated separately to obtain scores based on the correlation coefficient between the gallery and the probe images. The individual scores are fused in the last stage to obtain the final score. The proposed approach is compared with other state-of-the-art model-free gait recognition algorithms. Experimental results on the USF HumanID database clearly indicate the supremacy of our technique.","PeriodicalId":436402,"journal":{"name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124510584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object boundary detection using Rough Set Theory 基于粗糙集理论的目标边界检测
Ashish Phophalia, S. Mitra, Ajit Rajwade
A Rough Set Theory based closed form object boundary detection method has been suggested in this paper. Most of the edge detection methods fail in getting closed boundary of objects of any shape present in the image. Active contour based methods are available to get such object boundaries. The Multiphase Chan-Vese Active Contour Method is one of the most popular of such techniques. However, it is constrained with number of objects present in the image. The granular processing using Rough Set method overcomes this constraint and provides a closed curve around the boundary of the objects. This information can further be utilized in selection of similar patches for various image processing problems such as Image Denoising, Image Super-resolution, Image Segmentation etc. The proposed boundary detection method has been tested in presence of noise also. The experimental results have shown on synthetic image as well as on MRI of human brain. The performance of proposed method is found to be encouraging.
提出了一种基于粗糙集理论的封闭形式目标边界检测方法。大多数边缘检测方法都无法得到图像中任意形状物体的封闭边界。基于活动轮廓的方法可以得到这类目标的边界。多相Chan-Vese活动轮廓法是其中最流行的技术之一。然而,它受到图像中存在的对象数量的限制。使用粗糙集方法的颗粒处理克服了这一限制,并在物体边界周围提供了封闭曲线。这些信息可以进一步用于选择类似的patch来解决各种图像处理问题,如图像去噪、图像超分辨率、图像分割等。本文还对存在噪声的边界检测方法进行了测试。实验结果已在人脑的合成图像和MRI上得到证实。结果表明,该方法的性能令人鼓舞。
{"title":"Object boundary detection using Rough Set Theory","authors":"Ashish Phophalia, S. Mitra, Ajit Rajwade","doi":"10.1109/NCVPRIPG.2013.6776259","DOIUrl":"https://doi.org/10.1109/NCVPRIPG.2013.6776259","url":null,"abstract":"A Rough Set Theory based closed form object boundary detection method has been suggested in this paper. Most of the edge detection methods fail in getting closed boundary of objects of any shape present in the image. Active contour based methods are available to get such object boundaries. The Multiphase Chan-Vese Active Contour Method is one of the most popular of such techniques. However, it is constrained with number of objects present in the image. The granular processing using Rough Set method overcomes this constraint and provides a closed curve around the boundary of the objects. This information can further be utilized in selection of similar patches for various image processing problems such as Image Denoising, Image Super-resolution, Image Segmentation etc. The proposed boundary detection method has been tested in presence of noise also. The experimental results have shown on synthetic image as well as on MRI of human brain. The performance of proposed method is found to be encouraging.","PeriodicalId":436402,"journal":{"name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133497387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Duplicate open page removal from video stream of book flipping 从翻书的视频流中复制打开的页面移除
Dibyayan Chakraborty, P. Roy, J. Álvarez, U. Pal
Book flipping scanning refers to the process of recording a book while the user performs the flipping action of its pages. In recent years it has gained much attention as it reduces the workload of book digitization significantly. It is a challenging task because flipping at random speed and direction causes difficulties to identify distinct open page images (OPI) which represent each page of the book. In this paper, we propose a fast technique for removing duplicate open pages introduced in the video stream due to erroneous flipping. We present an algorithm that exploits cues from edge information of flipping pages. The nature of the cues extracted from the region of interest (ROI) of the frame, determines the flipping or an open state of a page whereas temporal position a flipping page determines the direction of the flipping. Combining these information we decide whether an open page image is a duplicate or not. Experiments are performed on video documents recorded using a standard resolution camera to validate the duplicate open page removal algorithm and we have obtained 95% accuracy.
翻书扫描是指在用户进行翻书动作的同时,记录一本书的过程。近年来,它因显著减少图书数字化工作量而受到广泛关注。这是一项具有挑战性的任务,因为以随机的速度和方向翻转会导致难以识别代表每一页的不同的打开页面图像(OPI)。本文提出了一种快速去除视频流中由于错误翻转而引入的重复打开页面的技术。我们提出了一种利用翻页边缘信息线索的算法。从帧的感兴趣区域(ROI)提取的线索的性质决定了页面的翻转或打开状态,而翻转页面的时间位置决定了翻转的方向。结合这些信息,我们决定打开的页面图像是否是重复的。用标准分辨率相机记录的视频文件进行实验,验证了重复打开页面去除算法,准确率达到95%。
{"title":"Duplicate open page removal from video stream of book flipping","authors":"Dibyayan Chakraborty, P. Roy, J. Álvarez, U. Pal","doi":"10.1109/NCVPRIPG.2013.6776203","DOIUrl":"https://doi.org/10.1109/NCVPRIPG.2013.6776203","url":null,"abstract":"Book flipping scanning refers to the process of recording a book while the user performs the flipping action of its pages. In recent years it has gained much attention as it reduces the workload of book digitization significantly. It is a challenging task because flipping at random speed and direction causes difficulties to identify distinct open page images (OPI) which represent each page of the book. In this paper, we propose a fast technique for removing duplicate open pages introduced in the video stream due to erroneous flipping. We present an algorithm that exploits cues from edge information of flipping pages. The nature of the cues extracted from the region of interest (ROI) of the frame, determines the flipping or an open state of a page whereas temporal position a flipping page determines the direction of the flipping. Combining these information we decide whether an open page image is a duplicate or not. Experiments are performed on video documents recorded using a standard resolution camera to validate the duplicate open page removal algorithm and we have obtained 95% accuracy.","PeriodicalId":436402,"journal":{"name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129960617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Partial Fourier reconstruction using subspace projection 利用子空间投影的部分傅立叶重构
K. Uma, C. Kesavadas, J. S. Paul
Scan time reduction in MRI can be achieved by partial k-space reconstruction. Truncation of the k-space results in generation of artifacts in the reconstructed image. A subspace projection algorithm is developed for artifact-free reconstruction of sparse MRI. The algorithm is applied to a frequency weighted k-space, which fits into a signal-space model for sparse MR images. The application is illustrated using Magnetic Resonance Angiogram (MRA).
通过部分k空间重建可以减少MRI扫描时间。截断k空间会在重建图像中产生伪影。提出了一种用于稀疏核磁共振图像无伪影重建的子空间投影算法。该算法应用于频率加权k空间,适合稀疏MR图像的信号空间模型。应用磁共振血管造影(MRA)说明。
{"title":"Partial Fourier reconstruction using subspace projection","authors":"K. Uma, C. Kesavadas, J. S. Paul","doi":"10.1109/NCVPRIPG.2013.6776211","DOIUrl":"https://doi.org/10.1109/NCVPRIPG.2013.6776211","url":null,"abstract":"Scan time reduction in MRI can be achieved by partial k-space reconstruction. Truncation of the k-space results in generation of artifacts in the reconstructed image. A subspace projection algorithm is developed for artifact-free reconstruction of sparse MRI. The algorithm is applied to a frequency weighted k-space, which fits into a signal-space model for sparse MR images. The application is illustrated using Magnetic Resonance Angiogram (MRA).","PeriodicalId":436402,"journal":{"name":"2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130299051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1