22 research outputs found

    Content-Based Image Retrieval Based on Electromagnetism-Like Mechanism

    Get PDF
    Recently, many researchers in the field of automatic content-based image retrieval have devoted a remarkable amount of research looking for methods to retrieve the best relevant images to the query image. This paper presents a novel algorithm for increasing the precision in content-based image retrieval based on electromagnetism optimization technique. The electromagnetism optimization is a nature-inspired technique that follows the collective attraction-repulsion mechanism by considering each image as an electrical charge. The algorithm is composed of two phases: fitness function measurement and electromagnetism optimization technique. It is implemented on a database with 8,000 images spread across 80 classes with 100 images in each class. Eight thousand queries are fired on the database, and the overall average precision is computed. Experimental results of the proposed approach have shown significant improvement in the retrieval performance in regard to precision

    A Forensic Scheme for Revealing Post-processed Region Duplication Forgery in Suspected Images

    Get PDF
    Recent researches have demonstrated that local interest points alone can be employed to detect region duplication forgery in image forensics. Authentic images may be abused by copy-move tool in Adobe Photoshop to fully contained duplicated regions such as objects with high primitives such as corners and edges. Corners and edges represent the internal structure of an object in the image which makes them have a discriminating property under geometric transformations such as scale and rotation operation. They can be localised using scale-invariant features transform (SIFT) algorithm. In this paper, we provide an image forgery detection technique by using local interest points. Local interest points can be exposed by extracting adaptive non-maximal suppression (ANMS) keypoints from dividing blocks in the segmented image to detect such corners of objects. We also demonstrate that ANMS keypoints can be effectively utilised to detect blurred and scaled forged regions. The ANMS features of the image are shown to exhibit the internal structure of copy moved region. We provide a new texture descriptor called local phase quantisation (LPQ) that is robust to image blurring and also to eliminate the false positives of duplicated regions. Experimental results show that our scheme has the ability to reveal region duplication forgeries under scaling, rotation and blur manipulation of JPEG images on MICC-F220 and CASIA v2 image datasets

    Image resolution enhancement using improved edge directed interpolation algorithm

    Get PDF
    Image resolution enhancement is a process to convert the low-resolution (LR) image into a high-resolution (HR) image. This method is applied in many image processing field. One of the commonly used techniques for image resolution enhancement is interpolation. The results of pixel interpolation can vary significantly depending on the interpolation algorithm. Moreover, the conventional interpolation methods are not efficient to assign accurate interpolation value to the HR edge pixels. Therefore, in this study, we propose an improved edge directed interpolation (EDI) algorithm, which is able to preserve the sharpness of edges. The proposed method is divided into three main steps: edge pixel filtering; bi-cubic interpolation, and EDI. The edge pixels and non-edge pixels are separated by the adaptive edge filtering method. After that bi-cubic interpolation is applied for non-edge pixels. The Lagrange interpolation polynomial is used for bi-cubic interpolation. Finally, an improved EDI is applied to the edge pixels. The proposed method is tested on the several standard grayscale images and compared with the existing methods. According to the evaluation results, the proposed method provides the higher performance of the subjective and objective quality than the standing EDI methods

    Dr. Hamid Abdullah Jalab Altulea, Senior Lecturer, Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, 50603 Kuala Lumpur, MALAYSIA

    No full text
    Researcher Profile Poster by Frontier Science Research Cluster (FSRC), University of Malaya

    Defect detection based on extreme edge of defective region histogram

    No full text
    Automatic thresholding has been used by many applications in image processing and pattern recognition systems. Specific attention was given during inspection for quality control purposes in various industries like steel processing and textile manufacturing. Automatic thresholding problem has been addressed well by the commonly used Otsu method, which provides suitable results for thresholding images based on a histogram of bimodal distribution. However, the Otsu method fails when the histogram is unimodal or close to unimodal. Defects have different shapes and sizes, ranging from very small to large. The gray-level distributions of the image histogram can vary between unimodal and multimodal. Furthermore, Otsu-revised methods, like the valley-emphasis method and the background histogram mode extents, which overcome the drawbacks of the Otsu method, require preprocessing steps and fail to use the general threshold for multimodal defects. This study proposes a new automatic thresholding algorithm based on the acquisition of the defective region histogram and the selection of its extreme edge as the threshold value to segment all defective objects in the foreground from the image background. To evaluate the proposed defect-detection method, common standard images for experimentation were used. Experimental results of the proposed method show that the proposed method outperforms the current methods in terms of defect detection

    Anti-spoofing method for fingerprint recognition using patch based deep learning machine

    No full text
    Today's with increasing identity theft, biometric systems based on fingerprints have a growing importance in protection and access restrictions. Malicious users violate them by presenting fabricated attempts. For example, artificial fingerprints constructed by gelatin, Play-Doh and Silicone molds may be misused for access and identity fraud by forgers to clone fingerprints. This process is called spoofing. To detect such forgeries, some existing methods using handcrafted descriptors have been implemented for assuring user presence. Most of them give low accuracy rates in recognition. The proposed method used Discriminative Restricted Boltzmann Machines to recognize fingerprints accurately against fabricated materials used for spoofing. © 2019 Karabuk Universit

    Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients

    No full text
    Digital image forgery has significantly increased due to the rapid development of several tools of image manipulation. Based on the manipulation used to produce a tampered image, image forgery techniques can be characterized into three types: copy–move forgery, image splicing, and image retouching. Image splicing is achieved by adding regions from one image into another. This technique changes the content of the target image and causes variations in image features which are used to detect the forgery regions. In this study, an image splicing forgery detection method based on low-dimensional singular value decomposition of discrete cosine transform (DCT) coefficients has been presented. The suspicious input image is divided into multi-size blocks, and each block is transformed into 2D DCT. The DCT coefficients are calculated correspondingly to each block. The features from DCT are extracted using SVD algorithm. The roughness measure is calculated for the set of singular values obtained. Lastly, four types of statistical features—mean, variance, third-order moment skewness, and fourth-order moment kurtosis—are extracted from SVD features and are then arranged in a feature vector. Feature reduction has been applied by kernel principal component analysis. Finally, support vector machine is used to distinguish between the authenticated and spliced images. The proposed method was evaluated against three standard image datasets CASIA v1, DVMM v1, and DVMM v2. The proposed method shows an average detection accuracy of 97.15, 99.30, and 96.97 for DVMM v1, CASIA v1, and DVMM v2, respectively. These results outperform several current image splicing detection methods. © 2018, The Natural Computing Applications Forum

    Cloud Entropy Management System Involving a Fractional Power

    No full text
    Cloud computing (CC) capacities deliver high quality, connected with demand services and service-oriented construction. Nevertheless, a cloud service (CS) is normally derived from numerous stages of facilities and concert features, which determine the value of the cloud service. Therefore, it is problematic for the users to estimate these cloud services and select them to appropriate their requirements. In this study, a new algorithm is carried out for a multi-agent system (MAS) based on fractional power. The study depends on a fractional difference equation of type two point boundary value problem (BVP) based on the fractional entropy. We discuss the existence of solutions for the system as well as the stability, utilizing the Hadamard well-posed problem. Experimental results show that the proposed method demonstrates stability and performance

    Perturbation of Fractional Multi-Agent Systems in Cloud Entropy Computing

    No full text
    A perturbed multi-agent system is a scheme self-possessed of multiple networking agents within a location. This scheme can be used to discuss problems that are impossible or difficult for a specific agent to solve. Intelligence cloud entropy management systems involve functions, methods, procedural approaches, and algorithms. In this study, we introduce a new perturbed algorithm based on the fractional Poisson process. The discrete dynamics are suggested by using fractional entropy and fractional type Tsallis entropy. Moreover, we study the algorithm stability

    A survey on skin detection in colored images

    No full text
    Color is an efficient feature for object detection as it has the advantage of being invariant to changes in scaling, rotation, and partial occlusion. Skin color detection is an essential required step in various applications related to computer vision. The rapidly-growing research in human skin detection is based on the premise that information about individuals, intent, mode, and image contents can be extracted from colored images, and computers can then respond in an appropriate manner. Detecting human skin in complex images has proven to be a challenging problem because skin color can vary dramatically in its appearance due to many factors such as illumination, race, aging, imaging conditions, and complex background. However, many methods have been developed to deal with skin detection problem in color images. The purpose of this study is to provide an up-to-date survey on skin color modeling and detection methods. We also discuss relevant issues such as color spaces, cost and risks, databases, testing, and benchmarking. After investigating these methods and identifying their strengths and limitations, we conclude with several implications for future direction. © 2018, Springer Nature B.V
    corecore