11,798 research outputs found
Texture classification based on DCT and soft computing
We present a classification method based on the discrete cosine transform (DCT) coefficients of texture image. Since the DCT works on gray level images, the color scheme of each image is transformed into gray levels. For classifying the images with DCT, we used two popular soft computing techniques, namely neurocomputing and neuro-fuzzy computing. We used a feedforward neural network trained by backpropagation algorithm and an evolving fuzzy neural network to classify the textures. The soft computing models were trained using 80% of the texture data and remaining was used for testing and validation purposes. A performance comparison was made among the soft computing models for the texture classification problem. We also analyzed the effects of prolonged training of neural networks. It was observed that the proposed neuro-fuzzy model performed better than neural network
Soft Computing Tool Approach for Texture Classification Using Discrete Cosine Transform
Texture can be considered as a repeating pattern of local variation of pixel intensities. Cosine Transform (DCT) coefficients of texture images. As DCT works on gray level images, the color scheme of each image is transformed into gray levels. For classifying the images using DCT, two popular soft computing techniques namely neurocomputing and neuro-fuzzy computing are used. A feedforward neural network is used to train the backpropagation learning algorithm and an evolving fuzzy neural network to classify the textures. The soft computing models were trained using 80% of the texture data and the remaining was used for testing and validation purposes. A performance comparison was made among the soft computing models for the texture classification problem. In texture classification the goal is to assign an unknown sample image to a set of known texture classes. It is observed that the proposed neuro-fuzzy model performed better than the neural network
Fast object detection in compressed JPEG Images
Object detection in still images has drawn a lot of attention over past few
years, and with the advent of Deep Learning impressive performances have been
achieved with numerous industrial applications. Most of these deep learning
models rely on RGB images to localize and identify objects in the image.
However in some application scenarii, images are compressed either for storage
savings or fast transmission. Therefore a time consuming image decompression
step is compulsory in order to apply the aforementioned deep models. To
alleviate this drawback, we propose a fast deep architecture for object
detection in JPEG images, one of the most widespread compression format. We
train a neural network to detect objects based on the blockwise DCT (discrete
cosine transform) coefficients {issued from} the JPEG compression algorithm. We
modify the well-known Single Shot multibox Detector (SSD) by replacing its
first layers with one convolutional layer dedicated to process the DCT inputs.
Experimental evaluations on PASCAL VOC and industrial dataset comprising images
of road traffic surveillance show that the model is about faster than
regular SSD with promising detection performances. To the best of our
knowledge, this paper is the first to address detection in compressed JPEG
images
Universal Image Steganalytic Method
In the paper we introduce a new universal steganalytic method in JPEG file format that is detecting well-known and also newly developed steganographic methods. The steganalytic model is trained by MHF-DZ steganographic algorithm previously designed by the same authors. The calibration technique with the Feature Based Steganalysis (FBS) was employed in order to identify statistical changes caused by embedding a secret data into original image. The steganalyzer concept utilizes Support Vector Machine (SVM) classification for training a model that is later used by the same steganalyzer in order to identify between a clean (cover) and steganographic image. The aim of the paper was to analyze the variety in accuracy of detection results (ACR) while detecting testing steganographic algorithms as F5, Outguess, Model Based Steganography without deblocking, JP Hide&Seek which represent the generally used steganographic tools. The comparison of four feature vectors with different lengths FBS (22), FBS (66) FBS(274) and FBS(285) shows promising results of proposed universal steganalytic method comparing to binary methods
- âŠ