3 Let's start with a little quiz... Can you spot the forgery the below image?
4 Let's start with a little quiz... Can you recognize these identical patches? Existed in the original image Pasted here
5 Let's start with a little quiz... This is the original image: The following detail was hidden
6 Let's start with a little quiz... Can you spot the forgery the below image?
7 Let's start with a little quiz... Can you recognize these identical patches? Existed in the original image Pasted here Pasted here
8 Let's start with a little quiz... This is the original image: The following detail was hidden
9 Let's start with a little quiz... Can you spot the forgery the below image?
10 Let's start with a little quiz... Can you recognize these identical patches? Pasted here Existed in the original image
11 Let's start with a little quiz... This is the original image: The following detail was hidden
12 Introduction The Problem So, as you can probably guess from the quiz we started with, we want to deal with the problem of image forgery by copying and pasting patches from the original image into itself, which is commonly used for hiding image details... Forge...
13 Let's go on...
14 Introduction Our Goal So, our goal is to detect the image forgery i.e. we want to detect and spot 2 or more image patches which are very similar. We base on the fact that in a natural image, the probability of patches to be that similar tends to 0
15 Introduction Our Goal What is the probability to have these 2 identical leaves and their water drops in the same position in one natural image? You're right the probability tends to 0 Some farmer might have wanted to clear an insect from his logo?
16 Introduction Challenges We want to support detection also with rotation Copy-paste with rotation
17 Introduction Difficulties 1) We want to compare each patch to each other patch in the image, in various sizes many comparisons 2) As we also want to support comparison under geometrical transformations, the amount of comparisons becomes enormous and not practical
18 Introduction Former Works There were former works trying to solve the same problem (Like with PCA). The advantages of the solutions we'll see today: 1) Run faster and computationally easier 2) Detection after JPEG Compression or Gaussian noise 3) Detection of rotated duplication
19 Let's go on...
20 Introduction Wavelets Let's start with an example...
21 Introduction Wavelets Let's have a look at the following frequency-domain filters: A horizontal high-pass filter A horizontal low-pass filter And of course some classic image... A vertical high-pass filter A vertical low-pass filter
22 Introduction Wavelets Now, let's take the image and compute the following components: Apply horizontal high-pass filter and vertical high-pass filter
23 Introduction Wavelets Now, let's take the image and compute the following components: Let's call this component HH
24 Introduction Wavelets Now, let's take the image and compute the following components: Apply horizontal low-pass filter and vertical high-pass filter
25 Introduction Wavelets Now, let's take the image and compute the following components: Let's call this component LH
26 Introduction Wavelets Now, let's take the image and compute the following components: Apply horizontal high-pass filter and vertical low-pass filter
27 Introduction Wavelets Now, let's take the image and compute the following components: Let's call this component HL
28 Introduction Wavelets Now, let's apply low pass filter in both directions and down-scale the image (like in Gaussian pyramid): Let's call this component LL
29 Introduction Wavelets Now, let's continue computing the components recursively, using the down-scaled image as the source image: Continuing recursively...
30 Introduction Wavelets We decided to stop the pyramid computations after two iterations, but we could continue to compute more levels... The image, again low-pass-filtered and down-scaled
31 Introduction Wavelets Wavelets features: We name the wavelet components according to their type and hierarchy level: LL2 LH1 HL2 LH2 HH2 HH1 HL1
32 Introduction Wavelets Wavelets features: We can compute any LLi component, including the original image, LL0, by up-scaling the LLi component to its original size and combining it with the HLi, LHi and HHi components We save only the smallest LL component in the pyramid, but, we also save all the HL, LH and HH components, thus we can recursively compute any LLi
33 Introduction Wavelets Wavelet reconstruction of LLi from (i-1) level components : Taken from Matlab documentation:
34 Introduction Wavelets Wavelets benefits: While a regular image gives us only very detailed spatial information (We have no frequency index ):
35 Introduction Wavelets Wavelets benefits:...and while FFT gives us only very detailed frequency information (We cannot see the image):
36 Introduction Wavelets Wavelets benefits: A wavelet pyramid tries to give us both of them:
37 Introduction Wavelets Wavelets spatial vs frequency tradeof: 1) We can get a high resolution spatial information from the wavelet's lower levels (those that are closer to the original image) 2) We can get various frequencies information when going up and down the pyramid levels, where upper levels show lower frequencies
38 Introduction Wavelets More about wavelets: Discrete Wavelet Transform (DWT), also commonly called Wavelets, has huge number of applications in engineering, computer science and other sciences. A remarkable and very known usage of DWT is for JPEG 2000 image compression... We will now see how it helps with detecting copy-paste image forgeries
39 Last steps before the real thing...
40 Introduction Phase Correlation Again, let's start with an example... Take a look at these 2 noisy images:
41 Introduction Phase Correlation If you look deeply, you might be able to see that they are not just translated, but also each of them has its own diferent Gaussian noise...
42 Introduction Phase Correlation Let's apply phase-correlation using the following operation: F is the Fourier Transform conj is the complex conjugate
43 Introduction Phase Correlation The location of this bold white dot tells us that the image are translated according to its location from top-left: (x1, y1) Input Phase Correlation Output IFFT
44 Introduction Phase Correlation Usage for image matching: For 2 similar images, we expect to see a significant peak in the phase-correlation
45 Introduction Phase Correlation Usage for image matching: The most significant advantage of Phase Correlation, in contradiction to other correlations, is the resilience to Gaussian noise, JPEG compression and other noises and defects. It enables to efficiently find similarity while other correlations are mostly good for finding identity
46 Let's start with the interesting stuff...
47 Idea We can split the image to overlapping blocks in some size that we choose, and then we can try to somehow compare them and to look for similar ones. The main problem is that on large image, this process could take very long time
48 Idea An optimization: Let's look for similar blocks in the smallest image in the pyramid. Then, we'll each time continue to a larger level, checking only the candidates found in the former level x x This process might save us a lot of time
49 Idea An example: Forged Image
50 Idea An example: Detection in smallest level LLk
51 Idea An example: Detection in next level LLk-1
52 Idea An example: Detection in next level LLk-2
53 Idea An example: The Original Image
54 Let's go on...
55 Flow Input Image Convert to Grayscale
56 Flow Input Image Convert to Grayscale Compute Wavelet Transform
57 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of overlapping blocks We divide the smallest LL image in the pyramid, into all possible (bxb)-sized overlapping blocks
58 Flow Input Image Convert to Grayscale We turn each block into a b^2 sized vector and assign each vector as a row into a (M-b+1)x(N-b+1)-sized matrix Compute Wavelet Transform Matrix of overlapping blocks Block 1 Block (M-b+1) In another matrix, we save each vector's real coordinates in the image
59 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of overlapping blocks We remove all blocks with low contrast. We tell that a block has low contrast if the difference between its maximum intensity pixel and its minimum intensity pixel is lower than some predefined threshold T. This helps to prevent noisy results, such as 2 identical blue patches of the sky
60 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of overlapping blocks Then, we sort the remaining matrix rows lexicographically
61 Flow Input Image Convert to Grayscale We compute phase-correlation between each block and its p matrix neighbors above and below the current row: Compute Wavelet Transform Matrix of overlapping blocks Compute blocks phase-correlation F is the Fourier Transform conj is the complex conjugate
62 Flow Input Image Convert to Grayscale Compute Wavelet Transform If the maximum value of the phase-correlation of 2 blocks exceeds our defined threshold T, we mark the coordinates of these blocks as candidates that should be checked more deeply in the larger wavelet pyramid's LL images Matrix of overlapping blocks Max Compute blocks phase-correlation
63 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of overlapping blocks Compute blocks phase-correlation Repeat checking candidates down the pyramid (larger images) We will now take the coordinates of the candidate blocks we found similar in the current level, and will check them in the next, more detailed level, LLk-1
64 Flow Input Image Convert to Grayscale Compute Wavelet Transform The process now is much simpler: we already have candidates blocks to compare using phase correlation Candidates for matching Matrix of overlapping blocks Compute blocks phase-correlation Repeat checking candidates down the pyramid (larger images) We add m pixels on each side of the matching regions, so our Coordinates fit to the larger image
65 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of overlapping blocks Compute blocks phase-correlation Repeat checking candidates down the pyramid (larger images) Again, we compute phase-correlation of the more detailed blocks, and if the largest value exceeds the threshold T, we mark the blocks as candidates for the next level
66 Flow Input Image Convert to Grayscale We repeat this step down the pyramid, until finally we report the matching blocks in LL0 (the original image), as duplicates LLk Compute Wavelet Transform candidates LLk-1 Matrix of overlapping blocks Compute blocks phase-correlation Repeat checking candidates down the pyramid (larger images)... candidates LL0
67 Flow Input Image Convert to Grayscale Finally, the LL0 computed candidates are reported as the found duplicates Compute Wavelet Transform LL0 Matrix of overlapping blocks Compute blocks phase-correlation Repeat checking candidates down the pyramid (larger images) Report Duplicates! Duplicates!
68 Working Examples Original Image Forged Image Output
69 Working Examples Original Image Forged Image Output
70 Working Examples Original Image Forged Image Output
71 Working Examples Original Image Forged Image Output
72 Let's see another algorithm...
73 Idea The following algorithm is going to start in a flow that is very similar to the algorithm we've just seen. The following steps are repeated in the same way: Image conversion to Grayscale Calculation of Wavelet transform Dividing the smallest LLk image into all possible bxb blocks
74 Idea After we divided the smallest LLk image into all possible bxb blocks, we are going to continue in a diferent way: Calculating 9-sized feature vectors for each block Sorting the vectors lexicographically in a matrix Looking for similar adjacent matrix rows Checking similarity of candidates' neighbors Let's look deeper...
75 Flow Input Image Convert to Grayscale Compute Wavelet Transform We already have the wavelet pyramid of the grayscale-converted image, like we had in the previous algorithm
76 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of blocks' features Like we did in the previous algorithm, we divide the smallest LL image in the pyramid into all possible (bxb)-sized overlapping blocks
77 Flow Input Image Convert to Grayscale For each bxb sized block, we calculate the following features: Compute Wavelet Transform Matrix of blocks' features We start with getting 4 sub-blocks of each block B, where the sub-blocks are created by splitting B diagonally 2 times, each time with a different diagonal
78 Flow Input Image Convert to Grayscale The first feature we calculate is the average of the middle of block B Compute Wavelet Transform Block B Matrix of blocks' features The middle of block B If the size of block B is bxb, then they size of the middle of the block should be (b*i)x(b*i), for some constant I we pre-define to be a value between 0.65 and 0.99 (e.g. 2/3)
79 Flow Input Image Convert to Grayscale Block B Compute Wavelet Transform Matrix of blocks' features The middle of block B The benefit of taking the center of the block, is that when copying image patches from area to another area, the border pixels are usually smoothed to fit the new position. Taking the center letting us ignore these border pixels This benefit helps us when the block is on the border of the copied patch
80 Flow Input Image Convert to Grayscale The next 4 features we calculate are the following: Compute Wavelet Transform Matrix of blocks' features We compute the average of the whole block B and of each of the sub-blocks B1-B4
81 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of blocks' features Now we assign the following values to the feature vector: 2 <-- Average(B1) / Average(B) 3 <-- Average(B2) / Average(B) 4 <-- Average(B3) / Average(B) 5 <-- Average(B4) / Average(B)
82 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of blocks' features These features help us to deal with Gaussian noise in the image, as if 2 identical blocks differ only because of different Gaussian noise, we still expect in high probability to find similar proportion between respective sub-blocks to the blocks
83 Flow Input Image Convert to Grayscale The next 4 features we calculate are the following: Compute Wavelet Transform Matrix of blocks' features Now we assign the following values to the feature vector: 2 <-- Average(B1) - Average(B) 3 <-- Average(B2) - Average(B) 4 <-- Average(B3) - Average(B) 5 <-- Average(B4) - Average(B)
84 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of blocks' features These features help us to deal with the cases when a constant value is added to the intensity level of all the pixels at at least one of the blocks. In such a case, the difference of the averages will be similar, and so these 4 features
85 Flow Input Image Convert to Grayscale We've computed the whole feature vector of B Compute Wavelet Transform Matrix of blocks' features Now let's normalize all its components To be in the range of integers [0, 255]
86 Flow Input Image Convert to Grayscale We are now able to assign all these vectors into a matrix M and sort it lexicographically and efficiently using Radix Sort Compute Wavelet Transform 9 columns (the features) Matrix of blocks' features (M-b+1)(N-b+1) rows (one row per block)
87 Flow Input Image Convert to Grayscale Now, when we have the lexicographically sorted matrix of feature vectors, we check each pair of adjacent rows vi, vi+1 Compute Wavelet Transform Matrix of blocks' features Checking adjacent feature vectors For each such pair of vectors, we compute their euclidean distance. If the computed distance is less than our predefined threshold T1 we continue to another check
88 Flow Input Image Convert to Grayscale For each pair of rows that passed the Euclidean distance test and found similar enough, we continue to the next step Compute Wavelet Transform Matrix of blocks' features Checking adjacent feature vectors We compute the distance between their corresponding image coordinates. If the computed distance is greater than our predefined threshold T2, then we define this pair as suspected
89 Flow Input Image Convert to Grayscale Compute Wavelet Transform The first threshold T1 we've just used, helped us to know whether two blocks are similar enough On the other hand, our second threshold T2 we used, helped us to know whether the similar blocks are not too close in the real image, thus we can ignore blocks which are naturally similar Matrix of blocks' features Checking adjacent feature vectors Passed on T1, failed on T2 Passed on T2, Failed on T1 Passed both T1 and T2
90 Flow Input Image Convert to Grayscale Now, when we have a suspected pair of blocks, we check the similarity of their neighbors, using an efficient way, named Neighbor Shift Compute Wavelet Transform Matrix of blocks' features Checking adjacent feature vectors Comparing neighbors If our suspected blocks are b1 and b2, for each neighbor of b1, we will compute the subtraction of its feature vector and the feature vector of b1 We will do the same for the corresponding neighbor of b2.
91 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of blocks' features Checking adjacent feature vectors Comparing neighbors Finally, we'll compare the subtraction result we got for b1 with the result we got in b2. If we get the same result, we will mark also the corresponding neighbors as duplicates
92 Flow Input Image Convert to Grayscale Compute Wavelet Transform Finally, we filter out suspected blocks and their neighbors which cover an area smaller than some threshold we defined in advance. This filtering is done in order to prevent noisy results Matrix of blocks' features Duplicates! Checking adjacent feature vectors Comparing neighbors Report Duplicates!
93 Working Examples A pretty easy detection... Forged Image Output
94 Working Examples An example with Gaussian noise... Forged Image Output
95 Working Examples An example with JPEG Compression... Forged Image Output
96 Try staying concentrated for just a little more...
97 Detecting Rotated Duplications Remember this friend? Copy-paste with rotation
98 Detecting Rotated Duplications We are not going to do many steps diferent than the algorithm we've just seen. One major diference though, is that we're not going to compute any features except for the pixels themselves
99 Detecting Rotated Duplications As we are going to work with the pixels themselves, and not with any computed features, our algorithm will be more limited: - It will not support detection after Gaussian Noise - It will not support detection after JPEG compression For supporting detection of rotated duplications, we will require the following changes...
100 Detecting Rotated Duplications Change 1 Block size Here, our overlapping blocks' size is forced to be 3x3. We enumerate the block's pixels according to the following chart:
101 Detecting Rotated Duplications Change 2 Feature vector size and contents The size of our feature vector is going to be 18 (instead of 9). The first 9 features are the sorted values of all the 9 pixels in the block. The next 9 features is the original location [0-8] of each of the 9 first features (we sorted them, so we want to remember their original location somehow...)
102 Detecting Rotated Duplications Change 3 Calculation of feature vectors similarity Here, we first compare the first 9 features in the vector and we expect to see at least 7 of 9 such similar values. Else, we ignore this pair of blocks An example for 2 matching blocks The circular order is the same, but it is possible to see the rotation
103 Detecting Rotated Duplications Change 3 Calculation of feature vectors similarity If we found enough similar features in the first 9 features, we proceed to check whether the next 9 features of the 2 vectors look similar in their circular order. The circular sequence also implies the rotation angle.
104 Detecting Rotated Duplications Next Steps: After we discovered the similarity of 2 blocks and an angle Θ, we continue with the Neighbor Shif method we used in the regular algorithm, while here we check the similarity of neighbors with the same angle Θ
105 Working Examples An example with rotation, no noise or compression... Forged Image Output
106 Failing Examples A Failing example with Gaussian Noise... Forged Image Output
107 Failing Examples A Failing example with JPEG Compression... Forged Image Output
108 Bibliography Er. Saiqa Khan Er. Arun Kulkarni An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, Vivek Kumar Singh and R.C. Tripathi Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method International Journal of Advanced Science and Technology Vol. 35, October, 2011
Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni firstname.lastname@example.org Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform
Templates and Image Pyramids 09/07/17 Computational Photography Derek Hoiem, University of Illinois Why does a lower resolution image still make sense to us? What do we lose? Image: http://www.flickr.com/photos/igorms/136916757/
Templates and Image Pyramids 09/06/11 Computational Photography Derek Hoiem, University of Illinois Project 1 Due Monday at 11:59pm Options for displaying results Web interface or redirect (http://www.pa.msu.edu/services/computing/faq/autoredirect.html)
Resampling Image Scaling This image is too big to fit on the screen. How can we reduce it? How to generate a halfsized version? Image sub-sampling 1/8 1/4 Throw away every other row and column to create
Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.
Prof. Feng Liu Fall 2018 http://www.cs.pdx.edu/~fliu/courses/cs447/ 10/04/2018 1 Last Time Image file formats Color quantization 2 Today Dithering Signal Processing Homework 1 due today in class Homework
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
Image Pyramids Sanja Fidler CSC420: Intro to Image Understanding 1 / 35 Finding Waldo Let s revisit the problem of finding Waldo This time he is on the road template (filter) image Sanja Fidler CSC420:
Digital images Digital Image Processing Fundamentals Dr Edmund Lam Department of Electrical and Electronic Engineering The University of Hong Kong (a) Natural image (b) Document image ELEC4245: Digital
SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel Dnyaneshwar.K 1, CH.Suneetha 2 Abstract In this paper, Compression and improving the Quality of
Int. J. Elec&Electr.Eng&Telecoms. 2014 Vinoda Yaragatti and Bhaskar B, 2014 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 3, No. 3, July 2014 2014 IJEETC. All Rights Reserved FACE RECOGNITION USING
A Modified Image Coder using HVS Characteristics Mrs Shikha Tripathi, Prof R.C. Jain Birla Institute Of Technology & Science, Pilani, Rajasthan-333 031 email@example.com, firstname.lastname@example.org
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
Digital Image Processing 3 November 6 Dr. ir. Aleksandra Pizurica Prof. Dr. Ir. Wilfried Philips Aleksandra.Pizurica @telin.ugent.be Tel: 9/64.345 UNIVERSITEIT GENT Telecommunicatie en Informatieverwerking
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Image Compression
Filters Materials from Prof. Klaus Mueller Think More about Pixels What exactly a pixel is in an image or on the screen? Solid square? This cannot be implemented A dot? Yes, but size matters Pixel Dots
Fourier Transform Fourier Transform Any signal can be expressed as a linear combination of a bunch of sine gratings of different frequency Amplitude Phase 2 1 3 3 3 1 sin 3 3 1 3 sin 3 1 sin 5 5 1 3 sin
Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich * Dept. of Computer Science, University of Buenos Aires, Argentina ABSTRACT Conventional techniques for signal
2014 Sixth International Conference on Computational Intelligence and Communication Networks Interpolation of CFA Color Images with Hybrid Image Denoising Sasikala S Computer Science and Engineering, Vasireddy
Volume, Issue 11, November 201 ISSN: 2277 12X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach
Sampling and Pyramids 15-463: Rendering and Image Processing Alexei Efros with lots of slides from Steve Seitz Today Sampling Nyquist Rate Antialiasing Gaussian and Laplacian Pyramids 1 Fourier transform
Robust watermarking based on DWT SVD Anumol Joseph 1, K. Anusudha 2 Department of Electronics Engineering, Pondicherry University, Puducherry, India email@example.com, firstname.lastname@example.org Abstract
MATLAB 6.5 Image Processing Toolbox Tutorial The purpose of this tutorial is to gain familiarity with MATLAB s Image Processing Toolbox. This tutorial does not contain all of the functions available in
Motion illusion, rotating snakes Image Filtering 9/4/2 Computer Vision James Hays, Brown Graphic: unsharp mask Many slides by Derek Hoiem Next three classes: three views of filtering Image filters in spatial
UE22 FEBRUARY 2016 1 Image compression with multipixels Alberto Isaac Barquín Murguía Abstract Digital images, depending on their quality, can take huge amounts of storage space and the number of imaging
Elementary Plots Why Should We Care? Everyone uses plotting But most people ignore or are unaware of simple principles Default plotting tools are not always the best More importantly, it is easy to lie
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based
MATLAB Image Processing Toolbox Copyright: Mathworks 1998. The following is taken from the Matlab Image Processing Toolbox users guide. A complete online manual is availabe in the PDF form (about 5MB).
J Inf Process Syst, Vol.13, No.5, pp.1331~1344, October 2017 https://doi.org/10.3745/jips.03.0042 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Data Hiding Algorithm for Images Using Discrete Wavelet
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2016 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Kishan
OpenStax-CNX module: m33156 1 Image Processing - License Plate Localization and Letters Extraction * Cynthia Sung Chinwei Hu Kyle Li Lei Cao This work is produced by OpenStax-CNX and licensed under the
Digital Image Processing Part 2: Image Enhancement Digital Image Processing Course Introduction in the Spatial Domain Lecture AASS Learning Systems Lab, Teknik Room T26 email@example.com Course
Coding and Analysis of Cracked Road Image Using Radon Transform and Turbo codes G.Bhaskar 1, G.V.Sridhar 2 1 Post Graduate student, Al Ameer College Of Engineering, Visakhapatnam, A.P, India 2 Associate
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Image Compression Mr.P.S.Jagadeesh Kumar Associate Professor,
Question 1. Suppose you have an image I that contains an image of a left eye (the image is detailed enough that it makes a difference that it s the left eye). Write pseudocode to find other left eyes in
03/07/07 PHY310: Statistical Data Analysis 1 PHY310: Lecture 14 Statistical Tests: More Complicated Discriminants Road Map When the likelihood discriminant will fail The Multi Layer Perceptron discriminant
Images and Filters EE/CSE 576 Linda Shapiro What is an image? 2 3 . We sample the image to get a discrete set of pixels with quantized values. 2. For a gray tone image there is one band F(r,c), with values
Computer Graphics Si Lu Fall 2017 http://www.cs.pdx.edu/~lusi/cs447/cs447_547_comput er_graphics.htm 10/02/2015 1 Announcements Free Textbook: Linear Algebra By Jim Hefferon http://joshua.smcvt.edu/linalg.html/
Elementary Plots Why Should We Care? Everyone uses plotting But most people ignore or are unaware of simple principles Default plotting tools (or default settings) are not always the best More importantly,
RGB Image Reconstruction Using Two-Separated Band Reject Filters Muthana H. Hamd Computer/ Faculty of Engineering, Al Mustansirya University Baghdad, Iraq ABSTRACT Noises like impulse or Gaussian noise
Efficient Image Compression Technique using JPEG2000 with Adaptive Threshold Md. Masudur Rahman Mawlana Bhashani Science and Technology University Santosh, Tangail-1902 (Bangladesh) Mohammad Motiur Rahman
CS4495/6495 Introduction to Computer Vision 2C-L3 Aliasing Recall: Fourier Pairs (from Szeliski) Fourier Transform Sampling Pairs FT of an impulse train is an impulse train Sampling and Aliasing Sampling
Compression Compression and Image Formats Reduce amount of data used to represent an image/video Bit rate and quality requirements Necessary to facilitate transmission and storage Required quality is application
CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25 Homework #1 ( Due: Oct 10 ) Figure 1: The laser game. Task 1. [ 60 Points ] Laser Game Consider the following game played on an n n board,
06: Thinking in Frequencies CS 5840: Computer Vision Instructor: Jonathan Ventura Decomposition of Functions Taylor series: Sum of polynomials f(x) =f(a)+f 0 (a)(x a)+ f 00 (a) 2! (x a) 2 + f 000 (a) (x
CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area
Prof. Feng Liu Fall 2018 http://www.cs.pdx.edu/~fliu/courses/cs447/ 10/02/2018 1 Announcements Free Textbook: Linear Algebra By Jim Hefferon http://joshua.smcvt.edu/linalg.html/ Homework 1 due in class
Sampling and Reconstruction Many slides from Steve Marschner 15-463: Computational Photography Alexei Efros, CMU, Fall 211 Sampling and Reconstruction Sampled representations How to store and compute with
The Camera Club B&W Negative Proccesing After Scanning. David Champion January 2011 That s how to scan a negative, now I will explain how to process the image using Photoshop CS5. To achieve a good scan
VHDL design of lossy DWT based image compression technique for video conferencing Anitha Mary. M 1 and Dr.N.M. Nandhitha 2 1 VLSI Design, Sathyabama University Chennai, Tamilnadu 600119, India 2 ECE, Sathyabama
1. Text problem 3.1 CS 445 HW#2 Solutions (a) General form: problem figure,. For the condition shown in the Solving for K yields Then, (b) General form: the problem figure, as in (a) so For the condition
A PROPOSED ALGORITHM FOR DIGITAL WATERMARKING Dr. Mohammed F. Al-Hunaity firstname.lastname@example.org Meran M. Al-Hadidi Merohadidi77@gmail.com Dr.Belal A. Ayyoub belal_ayyoub@ hotmail.com Abstract: This paper
Journal of Applied Science and Engineering, Vol. 21, No. 4, pp. 563 569 (2018) DOI: 10.6180/jase.201812_21(4).0008 On Fusion Algorithm of Infrared and Radar Target Detection and Recognition of Unmanned
Performance Analysis of Local Adaptive Real Oriented Dual Tree Wavelet Transform in Image Processing Swati Khare 1, Harshvardhan Mathur 2 M.Tech, Department of Computer Science and Engineering, Sobhasaria
Special Topics in Display Technology 1 st semester, 2016 II. Basic Concepts in Display Systems * Reference book: [Display Interfaces] (R. L. Myers, Wiley) 1. Display any system through which ( people through
Chapter 2 Image Enhancement in the Spatial Domain Abstract Although the transform domain processing is essential, as the images naturally occur in the spatial domain, image enhancement in the spatial domain
Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret
Lane Detection in Automotive Contents Introduction... 2 Image Processing... 2 Reading an image... 3 RGB to Gray... 3 Mean and Gaussian filtering... 5 Defining our Region of Interest... 6 BirdsEyeView Transformation...
Princeton ELE 201, Spring 2014 Laboratory No. 2 Shazam 1 Background In this lab we will begin to code a Shazam-like program to identify a short clip of music using a database of songs. The basic procedure
Code No: R05410408 Set No. 1 1. (a) Explain the process of Image acquisition. (b) Discuss different elements used in digital image processing system. [8+8] 2. (a) Find Fourier transform 2 -D sinusoidal
International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 215 ISSN 291-273 Image Quality Estimation of Tree Based DWT Digital Watermarks MALVIKA SINGH PG Scholar,
MITOCW watch?v=zkcj6jrhgy8 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
1 Past questions from the last 6 years of exams for programming 101 with answers. 1. Describe bubble sort algorithm. How does it detect when the sequence is sorted and no further work is required? Bubble
Image Processing 048860 Final Test Time: 100 minutes. Allowed materials: A calculator and any written/printed materials are allowed. Answer 4-6 complete questions of the following 10 questions in order
Vision Review: Image Processing Course web page: www.cis.udel.edu/~cer/arv September 7, Announcements Homework and paper presentation guidelines are up on web page Readings for next Tuesday: Chapters 6,.,
Practical Image and Video Processing Using MATLAB Chapter 10 Neighborhood processing What will we learn? What is neighborhood processing and how does it differ from point processing? What is convolution
Conway s Soldiers Jasper Taylor And the maths problem that I did was called Conway s Soldiers. And in Conway s Soldiers you have a chessboard that continues infinitely in all directions and every square
Last Lecture photomatix.com Today Image Processing: from basic concepts to latest techniques Filtering Edge detection Re-sampling and aliasing Image Pyramids (Gaussian and Laplacian) Removing handshake
Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence
CSCI 29: Comp Photo Fall 28 @ Brown University James Tompkin Many slides thanks to James Hays old CS 29 course, along with all of its acknowledgements. Things I forgot on Thursday Grads are not required
PAGE 433 Accurate Delay Measurement of Coded Speech Signals with Subsample Resolution Wenliang Lu, D. Sen, and Shuai Wang School of Electrical Engineering & Telecommunications University of New South Wales,
Implementation of Image Restoration Techniques in MATLAB Jitendra Suthar 1, Rajendra Purohit 2 Research Scholar 1,Associate Professor 2 Department of Computer Science, JIET, Jodhpur Abstract:- Processing