Reliable Classification of Partially Occluded Coins

Size: px
Start display at page:

Download "Reliable Classification of Partially Occluded Coins"

Transcription

1 Reliable Classification of Partially Occluded Coins L.J.P. van der Maaten P.J. Boon MICC, Universiteit Maastricht P.O. Box 616, 6200 MD Maastricht, The Netherlands telephone: (+31) fax: (+31) Abstract 1 Introduction Over the last years, a number of successful systems for reliable classification of heterogeneous coin collections have been developed [3, 7, 8, 9, 10]. State-of-the-art systems for coin classification recognize coins by means of measurements in digital photographs of these coins, which gives these systems a large advantage over traditional coin classification systems based on thickness and weight measurements. Image-based coin classification systems can be subdivided into two types, viz., systems based on invariant features [3, 9] and systems based on template matching [7, 8, 10]. The latter type of systems has proven to be the most successful one in, e.g., the 2006 MUSCLE CIS benchmark competition. In contrast to systems for the classification of modern coins, the development of systems for the classification of historical coins has gained virtually no attention, possible due to the lack of publicly available digitized historical coin collections. Systems for the automatic classification of historical coins could be of great interest to cultural heritage institutions such as the Dutch Money and Bank Museum, because they can make numismatic knowledge available to a large public. In [10], some promising results are reported on a dataset of Merovingian coins, but these results are limited in scope. In [5], a project that aims at the automatic classification of Roman coins is discussed, but no experimental results are reported. In order to trigger the development of systems for classification of historical coins, the 2007 MUSCLE CIS benchmark competition aims at the classification of modern coins under the presence of occlusions. This paper describes our submission to the benchmark competition, which is based on the system described in [10]. The outline of the remainder of this paper is as follows. In section 2, the MUSCLE CIS benchmark competition 2007 is described in more detail. Section 3 provides a detailed description of 1

2 our system. In section 4, we present our experiments on the M USCLE C IS benchmark dataset. The results of our experiments are discussed in more detail in section 5. Section 6 concludes the paper. 2 M USCLE C IS benchmark competition 2007 The M USCLE C IS benchmark competition 2006 is the predecessor of the 2007 competition in which two systems for coin classification participated [8, 9]. The setup of the 2007 competition is similar to the 2006 competition, however, the test coins in the 2007 competition may be partially occluded. Four examples of partially occluded coins are shown in Figure 1. The idea behind the distortions is to simulate historical coins, in which generally only partial stamp information is available. The aim of the competition is to classify 5,000 coins (i.e., 10,000 coin images) within 12 hours Figure 1: Examples of partially occluded coins. on a normal 3GHz PC with 1GB RAM. As a result, only computational efficient techniques can be applied in the coin classification system. Approximately 3% of the coins in the testset was not in the trainingset, and needs to be classified as unknown. At least 70% of the coin classifications needs to be correct in order to participate in the competition. The performance of the system is measured by means of an assessment scheme that outputs a number of points. For each correct classification, the system receives 1 point, whereas incorrect classifications lead to a score update of -100 points. Classifications as unknown receive no points (unless the coin is truly an unknown coin). For every coin class of which at least one coin was classified correctly, the system receives an additional 25 points (in order to prevent the submission of systems that are trained only on a subset of the coin classes in the trainingdata). The assessment scheme clearly indicates the importance of reliable classifications. 3 The system The workflow of our system for classification of coins consists of three main stages: (1) a segmentation stage, (2) a feature extraction stage, and (3) a classification stage. In the segmentation stage, the coin is extracted from its background in the coin photograph. In addition, occluded parts of the coins may be recognized in the segmentation stage. In the feature extraction stage,

3 informative features are extracted from the segmented coin image. In our system, the features are formed by polar gradient orientations. In the classification stage, a label is assigned to unlabeled coins by means of a nearest neighbor approach. The three stages are described in more detail in subsection 3.1 to subsection Segmentation In our system, segmentation is performed by means of a two-stage approach. In the first stage, we attempt to segment coins by means of an edge-detection with additional morphological operations. In this stage, we assume the upperleft pixel of the coin photograph is a background pixel. Subsequently, the segmentation is verified by checking whether the segmented part is (nearly) circular and whether its area is sufficiently large. In case the segmentation has failed in the first stage, the second segmentation stage is executed. In the second stage, segmentation is performed by means of a Hough circle detector [4] that is implemented in a multi-scale manner. More specifically, we iteratively perform the circle detection using six radiuses that lie around the radius of the maximum Hough accumulator in the previous iteration. The iterations are performed until the finest level of detail (i.e., 1 pixel radius differences between the six radiuses) is reached. The segmentation allows for extracting the coin from its background in the coin photograph, but it does not identify occluded parts of the coins. The identification of occluded parts is of interest, because it may help to improve the similarity measure between coins that is discussed later. Because the conveyor belt has a regular structure, occluded regions in the coins may be identified by means of a texture classifier. In this respect, we performed experiments with texton-based texture classifiers [6, 11]. Texton-based texture classifiers perform texture classification based on a codebook of so-called textons. Textons are small patches of texture that are represented by means of, e.g., a collection of filter responses or a simple concatenation of pixel values. The texton codebook is constructed by performing vector quantization (e.g., using k-means clustering or Kohonen maps) on a set of randomly selected textons. We performed experiments with texton-based texture classifiers using a codebook of 20 pixel-based textons of size In these experiments, we experienced a strong performance of texton-based texture classifiers for the detection of occlusions (both with respect to computational efficiency and true positive rate). The occlusion detection is illustrated in Figure 2. Figure 2: Occlusion detection by a texton-based texture classifier.

4 3.2 Feature extraction Results in previous studies on coin classification show that template matching approaches to coin classification generally outperform coin classification systems based on rotation-invariant features [3, 7, 8, 10]. Hence, we opt for a template matching approach to coin classification. Since the main visual information in coins is contained in its stamp, it is natural to perform the template matching based on gradient images. In previous studies, both classification based on gradient orientations and gradient magnitudes is already investigated [7, 8]. These studies give rise to the observation that gradient orientations contain valuable structured information in regions with very low gradient magnitudes, which is illustrated in Figure 3. Gradient orientations have also been successfully applied in, e.g., image registration [1] and face localization [2]. Hence, we opt for a template matching approach based on gradient orientations. In our system, feature extraction is performed by means of a two-stage approach. First, the coin Figure 3: Illustration of gradient magnitude and orientation. image is convolved with a small Gaussian kernel, and it is converted into a polar representation. The use of a polar coin representation facilitates the computation of rotation-invariant gradient orientations. Second, the polar coin image is convolved with a small Gaussian kernel, and the gradient orientations in the resulting image are computed. The gradient orientation of an image I with coordinates (x, y) is given by ( ) δi/δy Θ = arctan (1) δi/δx The reader should note that these gradient orientations correspond to tangential and slope orientations in the original Cartesian space. As a result, polar gradient orientations are invariant to rotations of the coin. In addition, the use of a polar coin representation allows for efficient computation of our similarity measure.

5 3.3 Classification The classification of coin images starts with a preselection based on area and thickness. If the measured radius of a coin differs more than 7 pixels from the other coins in a coin class, or its thickness differs more than 1.25 mm, the coin class is rejected. In addition, edge-based statistical features could be used as preselection features [10]. Coin classes that are not rejected are gathered in a preselection list. The classification of coin images is performed by means of a nearest-neighbor search through the preselection list, in which a similarity measure s ij between the coins i and j is employed that is given by s ij = max γ ɛ (Θ α i (x, y), Θ j (x, y)) dydx (2) α In the equation, Θ α i represents the polar gradient orientation image Θ i that is circularly shifted corresponding to a rotation of the coin by α degrees. The decision function γ ɛ (, ) determines whether two gradient orientations are similar or not. The value of γ ɛ (, ) is 1 when the absolute difference between two gradient orientations is smaller than ɛ, and 0 when the absolute difference between both gradient orientations is larger than ɛ. If both gradient orientations are undefined, the decision function γ ɛ (, ) returns 1. The function γ ɛ (, ) returns ɛ when one of π the gradient orientations is undefined, or when the location is marked by the occlusion detector. The decision function is employed to make the system robust to small variations in the gradient orientations. The maximization over the coin orientation α is necessary in order to construct a rotation invariant similarity measure. Because a coin has two sides, two classifications have to be performed, and these classifications need to be combined. We opt for a simple combination strategy in which a classification is solely accepted when both classifications correspond. In case the two classifications do not correspond, the coin is classified as unknown. This classifier combination strategy ensures reliability of the classifications. In order to increase the reliability of the classifications, we also compare the orientations α 1 and α 2 we found in the computation of the similarity measure. Due to the digitization process of the coins, these orientations should roughly correspond. We classify a coin as unknown, whenever the difference between α 1 and α 2 is larger than 70 degrees. 4 Experiments In order to evaluate the performance of our coin classification system, we performed experiments in which we measure the generalization errors of our coin classifiers on the coin dataset described in section 2. In subsection 4.1, we describe the setup of these experiments. Subsection 4.2 presents the results of our experiments on the coin dataset. 4.1 Experimental setup We evaluated the performance of our system on two datasets: (1) a normal coin testset from the 2006 competition, and (2) the occluded coin testset from the 2007 competition. Both datasets consist of 5,000 coins (i.e., they contain 10,000 coin images). In both experiments, we trained

6 Settings Results Dataset Occl. detection Correct Incorrect Unknown Normal No 88.86% 0.38% 10.76% Occluded No 75.63% 0.14% 24.23% Occluded Yes 75.85% 0.20% 23.95% Table 1: Performance of our approach on modern coin datasets. our system on the set of coin prototypes. In the experiments, we measure the percentage of correct classifications, the percentage of incorrect classifications, and the total computation time that is consumed for the processing of the complete dataset. 4.2 Results Table 1 presents the results of the experiments with our system on both the normal and the occluded modern coin datasets. The table shows the percentage of correctly classified coins, the percentage of incorrectly classified coins, and the percentage of coins that was classified as unknown. For the experiments on the occluded coin dataset, we show the performance of our system with and without the use of occlusion detection (see subsection 3.1). From the results presented in the table, we make two observations. First, the results reveal that the presence of occlusions in the coins degrades the performance of our coin classification system by approximately 13%. The set of coins that was not classified by the system mainly consists of coins with very low contrast and of coins with large occluded regions. Second, the results in Table 1 show that the detection of occlusions does not improve the classification performance of the system. Eliminating occluded image regions from the similarity measure even seems to slightly increase the number of incorrect classifications. 5 Discussion From the results presented in the previous section we made two main observations: (1) the presence of occlusions in coins degrades the performance of coin classification systems and (2) detection of these occlusions using texture classifiers does not improve the performance on coin datasets in which coins are partially occluded. The results in section 4 show that the presence of occlusions clearly reduces the performance of coin classification systems. The explanation for the degradation in performance caused by the presence of occlusions is twofold: (1) the amount of stamp information is reduced and (2) the occlusion borders contain very structured gradient orientations. In the occluded image regions, the number of corresponding gradient orientations with an training image is presumably nearly random. This increases the influence of noise in the remainder of the coin on the similarity measure. At the borders of the occlusions, the gradient orientations are very structured and might correspond to patterns in the stamps of other coins, leading to misclassifications. The results in Table 1 show that occlusion detection by means of a texton-based texture clas-

7 sifier does not improve the generalization performance of our system on a dataset of partially occluded coins. Most likely, this is due to the regularity of the texture in the occluded parts of the coin. The conveyor belt texture roughly contains an equal amount of all orientations. As a result, an occlusion causes a nearly constant term to be added to our similarity measure, of which the effect is largely mitigated by the normalization in the similarity measure. On the other hand, false positives in the texture classification may reduce the performance of the coin classification system by removing possibly important information from the similarity measure. Although our results on the dataset of partially occluded coins are promising, the reader should note that the performance of our coin classification system will be worse on historical coin collections, due to the presence of additional distortions in historical coins. For instance, in historical coins the coin stamp is often not in the center of the coin. In addition, historical coins are often highly degraded by being buried in the soil. These distortions are illustrated in Figure 4 1. (a) Coin with stamp that is out-of-center. (b) Coin that is heavily degraded. Figure 4: Examples of distortions in historical coins. 6 Conclusion The paper presented a reliable system for the classification of coins that are partially occluded. The system performs template matching based on gradient orientations in order to classify the coins. The system correctly classifies 76% of the coins in the 2007 MUSCLE CIS benchmark dataset, while making only 0.1% misclassifications. We presented an approach for occlusion detection based on texton-based texture classifiers, but found that occlusion detection does not improve the performance of the system. Future work is directed towards improving our system for the classification of Merovingian and Roman coins. The main issue that needs to be addressed is that the center of stamps of historical coins often does not coincide with the center of the coin itself. A possible way to address this issue is by allowing translations next to rotations in the similarity measure. Alternatively, the coin stamps could be registered by iteratively minimizing the distance between edge-based statistical features [9] before the similarity measure is computed. 1 The images are taken from

8 Acknowledgements This work was supported by NWO/CATCH under grant References [1] A.J. Fitch, A. Kadyrov, W.J. Christmas, and J. Kittler. Orientation correlation. In Proceedings of the British Machine Vision Conference 2002, volume 1, pages , [2] B. Fröba and C. Küllbeck. Orientation template matching for face localization in complex visual scenes. In International Conference on Image Processing 2000, pages , [3] R. Huber, H. Ramoser, K. Mayer, H. Penz, and M. Rubik. Classification of coins using an eigenspace approach. Pattern Recognition Letters, 26(1):61 75, , 4 [4] J. Illingworth and J. Kittler. A survey of the Hough transform. Computer Vision, Graphics, and Image Processing, 44(1):87 116, [5] M. Kampel and M. Zaharieva. Coins. In Proceedings of the CAA 2007 (to appear), [6] T. Leung and J. Malik. Representing and recognizing the visual appearance of materials using three-dimensional textons. International Journal of Computer Vision, 43(1):29 44, [7] M. Nölle. Distribution distance measures applied to 3D object recognition: A case study. In Proceedings of the 25 th Pattern Recognition Symposium of the German Association for Pattern Recognition, pages 84 91, , 4 [8] M. Reisert, O. Ronneberger, and H. Burkhardt. An efficient gradient based registration technique for coin recognition. In Proceedings of the MUSCLE CIS Coin Recognition Competition Workshop, pages 19 31, , 2, 4 [9] L.J.P. van der Maaten and P.J. Boon. Coin-o-matic: A new system for fast and reliable coin classfication. In Proceedings of the MUSCLE CIS Coin Recognition Competition Workshop, pages 7 17, , 2, 7 [10] L.J.P. van der Maaten, P.J. Boon, and E.O. Postma. Automatic classification of modern and historical coins. In Proceedings of the International Conference on Computer Vision 2007 (submitted), , 4, 5 [11] M. Varma and A. Zisserman. Classifying images of materials: Achieving viewpoint and illumination independence. In Proceedings of the 7 th European Conference on Computer Vision, volume 3, pages ,

Biometrics Final Project Report

Biometrics Final Project Report Andres Uribe au2158 Introduction Biometrics Final Project Report Coin Counter The main objective for the project was to build a program that could count the coins money value in a picture. The work was

More information

Image Processing Based Systems and Techniques for the Recognition of Ancient and Modern Coins

Image Processing Based Systems and Techniques for the Recognition of Ancient and Modern Coins Image Processing Based Systems and Techniques for the Recognition of Ancient and Modern Coins Shatrughan Modi Frontier Research Group, Samsung India Software Operations, Bangalore- 560093, India Seema

More information

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods 19 An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods T.Arunachalam* Post Graduate Student, P.G. Dept. of Computer Science, Govt Arts College, Melur - 625 106 Email-Arunac682@gmail.com

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Coin Recognition and Classification: A Review

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Coin Recognition and Classification: A Review Coin Recognition and Classification: A Review Prajakta Waghulde 1, Dr. A. M. Patil 2 1 Master Student, 2 Prof. and HOD, EXT Department J.T.Mahajan, College of Engineering,Faizpur Abstract: Coins are a

More information

Introduction to Machine Learning

Introduction to Machine Learning Introduction to Machine Learning Deep Learning Barnabás Póczos Credits Many of the pictures, results, and other materials are taken from: Ruslan Salakhutdinov Joshua Bengio Geoffrey Hinton Yann LeCun 2

More information

Design of Temporally Dithered Codes for Increased Depth of Field in Structured Light Systems

Design of Temporally Dithered Codes for Increased Depth of Field in Structured Light Systems Design of Temporally Dithered Codes for Increased Depth of Field in Structured Light Systems Ricardo R. Garcia University of California, Berkeley Berkeley, CA rrgarcia@eecs.berkeley.edu Abstract In recent

More information

ARRAY PROCESSING FOR INTERSECTING CIRCLE RETRIEVAL

ARRAY PROCESSING FOR INTERSECTING CIRCLE RETRIEVAL 16th European Signal Processing Conference (EUSIPCO 28), Lausanne, Switzerland, August 25-29, 28, copyright by EURASIP ARRAY PROCESSING FOR INTERSECTING CIRCLE RETRIEVAL Julien Marot and Salah Bourennane

More information

Improved SIFT Matching for Image Pairs with a Scale Difference

Improved SIFT Matching for Image Pairs with a Scale Difference Improved SIFT Matching for Image Pairs with a Scale Difference Y. Bastanlar, A. Temizel and Y. Yardımcı Informatics Institute, Middle East Technical University, Ankara, 06531, Turkey Published in IET Electronics,

More information

Toward an Augmented Reality System for Violin Learning Support

Toward an Augmented Reality System for Violin Learning Support Toward an Augmented Reality System for Violin Learning Support Hiroyuki Shiino, François de Sorbier, and Hideo Saito Graduate School of Science and Technology, Keio University, Yokohama, Japan {shiino,fdesorbi,saito}@hvrl.ics.keio.ac.jp

More information

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com

More information

Blur Estimation for Barcode Recognition in Out-of-Focus Images

Blur Estimation for Barcode Recognition in Out-of-Focus Images Blur Estimation for Barcode Recognition in Out-of-Focus Images Duy Khuong Nguyen, The Duy Bui, and Thanh Ha Le Human Machine Interaction Laboratory University Engineering and Technology Vietnam National

More information

Light-Field Database Creation and Depth Estimation

Light-Field Database Creation and Depth Estimation Light-Field Database Creation and Depth Estimation Abhilash Sunder Raj abhisr@stanford.edu Michael Lowney mlowney@stanford.edu Raj Shah shahraj@stanford.edu Abstract Light-field imaging research has been

More information

Distinguishing Mislabeled Data from Correctly Labeled Data in Classifier Design

Distinguishing Mislabeled Data from Correctly Labeled Data in Classifier Design Distinguishing Mislabeled Data from Correctly Labeled Data in Classifier Design Sundara Venkataraman, Dimitris Metaxas, Dmitriy Fradkin, Casimir Kulikowski, Ilya Muchnik DCS, Rutgers University, NJ November

More information

Intelligent Traffic Sign Detector: Adaptive Learning Based on Online Gathering of Training Samples

Intelligent Traffic Sign Detector: Adaptive Learning Based on Online Gathering of Training Samples 2011 IEEE Intelligent Vehicles Symposium (IV) Baden-Baden, Germany, June 5-9, 2011 Intelligent Traffic Sign Detector: Adaptive Learning Based on Online Gathering of Training Samples Daisuke Deguchi, Mitsunori

More information

Identifying the Real Van Gogh with Brushstroke Textons

Identifying the Real Van Gogh with Brushstroke Textons Tilburg centre for Creative Computing P.O. Box 90153 Tilburg University 5000 LE Tilburg, The Netherlands http://www.uvt.nl/ticc Email: ticc@uvt.nl Copyright c Laurens van der Maaten and Eric Postma 2009.

More information

Comparing Computer-predicted Fixations to Human Gaze

Comparing Computer-predicted Fixations to Human Gaze Comparing Computer-predicted Fixations to Human Gaze Yanxiang Wu School of Computing Clemson University yanxiaw@clemson.edu Andrew T Duchowski School of Computing Clemson University andrewd@cs.clemson.edu

More information

Evaluating the stability of SIFT keypoints across cameras

Evaluating the stability of SIFT keypoints across cameras Evaluating the stability of SIFT keypoints across cameras Max Van Kleek Agent-based Intelligent Reactive Environments MIT CSAIL emax@csail.mit.edu ABSTRACT Object identification using Scale-Invariant Feature

More information

Fast identification of individuals based on iris characteristics for biometric systems

Fast identification of individuals based on iris characteristics for biometric systems Fast identification of individuals based on iris characteristics for biometric systems J.G. Rogeri, M.A. Pontes, A.S. Pereira and N. Marranghello Department of Computer Science and Statistic, IBILCE, Sao

More information

Research on Hand Gesture Recognition Using Convolutional Neural Network

Research on Hand Gesture Recognition Using Convolutional Neural Network Research on Hand Gesture Recognition Using Convolutional Neural Network Tian Zhaoyang a, Cheng Lee Lung b a Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China E-mail address:

More information

Student Attendance Monitoring System Via Face Detection and Recognition System

Student Attendance Monitoring System Via Face Detection and Recognition System IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal

More information

A Comparison of Histogram and Template Matching for Face Verification

A Comparison of Histogram and Template Matching for Face Verification A Comparison of and Template Matching for Face Verification Chidambaram Chidambaram Universidade do Estado de Santa Catarina chidambaram@udesc.br Marlon Subtil Marçal, Leyza Baldo Dorini, Hugo Vieira Neto

More information

A Spatial Mean and Median Filter For Noise Removal in Digital Images

A Spatial Mean and Median Filter For Noise Removal in Digital Images A Spatial Mean and Median Filter For Noise Removal in Digital Images N.Rajesh Kumar 1, J.Uday Kumar 2 Associate Professor, Dept. of ECE, Jaya Prakash Narayan College of Engineering, Mahabubnagar, Telangana,

More information

Midterm Examination CS 534: Computational Photography

Midterm Examination CS 534: Computational Photography Midterm Examination CS 534: Computational Photography November 3, 2015 NAME: SOLUTIONS Problem Score Max Score 1 8 2 8 3 9 4 4 5 3 6 4 7 6 8 13 9 7 10 4 11 7 12 10 13 9 14 8 Total 100 1 1. [8] What are

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

Texture Classifier Robustness for Sub-Organ Sized Windows

Texture Classifier Robustness for Sub-Organ Sized Windows Texture Classifier Robustness for Sub-Organ Sized Windows William H. Horsthemke Jacob D. Furst Daniela Raicu DePaul University School of Computer Science Chicago, IL horsthemke@acm.org jfurst@cs.depaul.edu

More information

An Efficient Method for Vehicle License Plate Detection in Complex Scenes

An Efficient Method for Vehicle License Plate Detection in Complex Scenes Circuits and Systems, 011,, 30-35 doi:10.436/cs.011.4044 Published Online October 011 (http://.scirp.org/journal/cs) An Efficient Method for Vehicle License Plate Detection in Complex Scenes Abstract Mahmood

More information

DEFOCUS BLUR PARAMETER ESTIMATION TECHNIQUE

DEFOCUS BLUR PARAMETER ESTIMATION TECHNIQUE International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 4, July-August 2016, pp. 85 90, Article ID: IJECET_07_04_010 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=4

More information

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 3, May - June 2018, pp. 177 185, Article ID: IJARET_09_03_023 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=3

More information

Authenticated Automated Teller Machine Using Raspberry Pi

Authenticated Automated Teller Machine Using Raspberry Pi Authenticated Automated Teller Machine Using Raspberry Pi 1 P. Jegadeeshwari, 2 K.M. Haripriya, 3 P. Kalpana, 4 K. Santhini Department of Electronics and Communication, C K college of Engineering and Technology.

More information

Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval

Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval Sheraz Ahmed, Koichi Kise, Masakazu Iwamura, Marcus Liwicki, and Andreas Dengel German Research Center for

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

Keywords coin, feature extraction, neural network, recognition.

Keywords coin, feature extraction, neural network, recognition. Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Sample Coin

More information

Colour correction for panoramic imaging

Colour correction for panoramic imaging Colour correction for panoramic imaging Gui Yun Tian Duke Gledhill Dave Taylor The University of Huddersfield David Clarke Rotography Ltd Abstract: This paper reports the problem of colour distortion in

More information

An Hybrid MLP-SVM Handwritten Digit Recognizer

An Hybrid MLP-SVM Handwritten Digit Recognizer An Hybrid MLP-SVM Handwritten Digit Recognizer A. Bellili ½ ¾ M. Gilloux ¾ P. Gallinari ½ ½ LIP6, Université Pierre et Marie Curie ¾ La Poste 4, Place Jussieu 10, rue de l Ile Mabon, BP 86334 75252 Paris

More information

Indian Coin Matching and Counting Using Edge Detection Technique

Indian Coin Matching and Counting Using Edge Detection Technique Indian Coin Matching and Counting Using Edge Detection Technique Malatesh M 1*, Prof B.N Veerappa 2, Anitha G 3 PG Scholar, Department of CS & E, UBDTCE, VTU, Davangere, Karnataka, India¹ * Associate Professor,

More information

Fake Impressionist Paintings for Images and Video

Fake Impressionist Paintings for Images and Video Fake Impressionist Paintings for Images and Video Patrick Gregory Callahan pgcallah@andrew.cmu.edu Department of Materials Science and Engineering Carnegie Mellon University May 7, 2010 1 Abstract A technique

More information

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION Scott Deeann Chen and Pierre Moulin University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering 5 North Mathews

More information

AUTOMATIC DETECTION OF HEDGES AND ORCHARDS USING VERY HIGH SPATIAL RESOLUTION IMAGERY

AUTOMATIC DETECTION OF HEDGES AND ORCHARDS USING VERY HIGH SPATIAL RESOLUTION IMAGERY AUTOMATIC DETECTION OF HEDGES AND ORCHARDS USING VERY HIGH SPATIAL RESOLUTION IMAGERY Selim Aksoy Department of Computer Engineering, Bilkent University, Bilkent, 06800, Ankara, Turkey saksoy@cs.bilkent.edu.tr

More information

Blur Detection for Historical Document Images

Blur Detection for Historical Document Images Blur Detection for Historical Document Images Ben Baker FamilySearch bakerb@familysearch.org ABSTRACT FamilySearch captures millions of digital images annually using digital cameras at sites throughout

More information

Image Enhancement in spatial domain. Digital Image Processing GW Chapter 3 from Section (pag 110) Part 2: Filtering in spatial domain

Image Enhancement in spatial domain. Digital Image Processing GW Chapter 3 from Section (pag 110) Part 2: Filtering in spatial domain Image Enhancement in spatial domain Digital Image Processing GW Chapter 3 from Section 3.4.1 (pag 110) Part 2: Filtering in spatial domain Mask mode radiography Image subtraction in medical imaging 2 Range

More information

INTAIRACT: Joint Hand Gesture and Fingertip Classification for Touchless Interaction

INTAIRACT: Joint Hand Gesture and Fingertip Classification for Touchless Interaction INTAIRACT: Joint Hand Gesture and Fingertip Classification for Touchless Interaction Xavier Suau 1,MarcelAlcoverro 2, Adolfo Lopez-Mendez 3, Javier Ruiz-Hidalgo 2,andJosepCasas 3 1 Universitat Politécnica

More information

Detection of License Plates of Vehicles

Detection of License Plates of Vehicles 13 W. K. I. L Wanniarachchi 1, D. U. J. Sonnadara 2 and M. K. Jayananda 2 1 Faculty of Science and Technology, Uva Wellassa University, Sri Lanka 2 Department of Physics, University of Colombo, Sri Lanka

More information

Learning Hierarchical Visual Codebook for Iris Liveness Detection

Learning Hierarchical Visual Codebook for Iris Liveness Detection Learning Hierarchical Visual Codebook for Iris Liveness Detection Hui Zhang 1,2, Zhenan Sun 2, Tieniu Tan 2, Jianyu Wang 1,2 1.Shanghai Institute of Technical Physics, Chinese Academy of Sciences 2.National

More information

Digital Support for Archaeology

Digital Support for Archaeology , 189 205 Digital Support for Archaeology Paul Boon, Laurens van der Maaten, Hans Paijmans and Eric Postma Tilburg Centre for Creative Computing, Tilburg University, The Netherlands Guus Lange Dutch State

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

An Analysis of Image Denoising and Restoration of Handwritten Degraded Document Images

An Analysis of Image Denoising and Restoration of Handwritten Degraded Document Images Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Performance Analysis of a 1-bit Feedback Beamforming Algorithm

Performance Analysis of a 1-bit Feedback Beamforming Algorithm Performance Analysis of a 1-bit Feedback Beamforming Algorithm Sherman Ng Mark Johnson Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2009-161

More information

Method for Real Time Text Extraction of Digital Manga Comic

Method for Real Time Text Extraction of Digital Manga Comic Method for Real Time Text Extraction of Digital Manga Comic Kohei Arai Information Science Department Saga University Saga, 840-0027, Japan Herman Tolle Software Engineering Department Brawijaya University

More information

Segmentation of Fingerprint Images

Segmentation of Fingerprint Images Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands

More information

An Improved Binarization Method for Degraded Document Seema Pardhi 1, Dr. G. U. Kharat 2

An Improved Binarization Method for Degraded Document Seema Pardhi 1, Dr. G. U. Kharat 2 An Improved Binarization Method for Degraded Document Seema Pardhi 1, Dr. G. U. Kharat 2 1, Student, SPCOE, Department of E&TC Engineering, Dumbarwadi, Otur 2, Professor, SPCOE, Department of E&TC Engineering,

More information

Coin Images Seibersdorf - Benchmark

Coin Images Seibersdorf - Benchmark Coin Images Seibersdorf - Benchmark Michael Nölle 1, Björn Jonsson 2, Michael Rubik 2 ARC Seibersdorf research GmbH 1 Safety & Security, 2 High Performance Image Processing A-2444 Seibersdorf michael.noelle@arcs.ac.at

More information

Automated Signature Detection from Hand Movement ¹

Automated Signature Detection from Hand Movement ¹ Automated Signature Detection from Hand Movement ¹ Mladen Savov, Georgi Gluhchev Abstract: The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify

More information

Keywords: - Gaussian Mixture model, Maximum likelihood estimator, Multiresolution analysis

Keywords: - Gaussian Mixture model, Maximum likelihood estimator, Multiresolution analysis Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Expectation

More information

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro

More information

Learning to Predict Indoor Illumination from a Single Image. Chih-Hui Ho

Learning to Predict Indoor Illumination from a Single Image. Chih-Hui Ho Learning to Predict Indoor Illumination from a Single Image Chih-Hui Ho 1 Outline Introduction Method Overview LDR Panorama Light Source Detection Panorama Recentering Warp Learning From LDR Panoramas

More information

Segmentation using Saturation Thresholding and its Application in Content-Based Retrieval of Images

Segmentation using Saturation Thresholding and its Application in Content-Based Retrieval of Images Segmentation using Saturation Thresholding and its Application in Content-Based Retrieval of Images A. Vadivel 1, M. Mohan 1, Shamik Sural 2 and A.K.Majumdar 1 1 Department of Computer Science and Engineering,

More information

Autocomplete Sketch Tool

Autocomplete Sketch Tool Autocomplete Sketch Tool Sam Seifert, Georgia Institute of Technology Advanced Computer Vision Spring 2016 I. ABSTRACT This work details an application that can be used for sketch auto-completion. Sketch

More information

CHAPTER-4 FRUIT QUALITY GRADATION USING SHAPE, SIZE AND DEFECT ATTRIBUTES

CHAPTER-4 FRUIT QUALITY GRADATION USING SHAPE, SIZE AND DEFECT ATTRIBUTES CHAPTER-4 FRUIT QUALITY GRADATION USING SHAPE, SIZE AND DEFECT ATTRIBUTES In addition to colour based estimation of apple quality, various models have been suggested to estimate external attribute based

More information

Exercise questions for Machine vision

Exercise questions for Machine vision Exercise questions for Machine vision This is a collection of exercise questions. These questions are all examination alike which means that similar questions may appear at the written exam. I ve divided

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS

SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS 1 WAHYU KUSUMA R., 2 PRINCE BRAVE GUHYAPATI V 1 Computer Laboratory Staff., Department of Information Systems, Gunadarma University,

More information

PHASE PRESERVING DENOISING AND BINARIZATION OF ANCIENT DOCUMENT IMAGE

PHASE PRESERVING DENOISING AND BINARIZATION OF ANCIENT DOCUMENT IMAGE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 7, July 2015, pg.16

More information

An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP)

An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP) , pp.13-22 http://dx.doi.org/10.14257/ijmue.2015.10.8.02 An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP) Anusha Alapati 1 and Dae-Seong Kang 1

More information

Real-Time Face Detection and Tracking for High Resolution Smart Camera System

Real-Time Face Detection and Tracking for High Resolution Smart Camera System Digital Image Computing Techniques and Applications Real-Time Face Detection and Tracking for High Resolution Smart Camera System Y. M. Mustafah a,b, T. Shan a, A. W. Azman a,b, A. Bigdeli a, B. C. Lovell

More information

Fovea and Optic Disc Detection in Retinal Images with Visible Lesions

Fovea and Optic Disc Detection in Retinal Images with Visible Lesions Fovea and Optic Disc Detection in Retinal Images with Visible Lesions José Pinão 1, Carlos Manta Oliveira 2 1 University of Coimbra, Palácio dos Grilos, Rua da Ilha, 3000-214 Coimbra, Portugal 2 Critical

More information

Thai Amulet Recognition Using Simple Feature

Thai Amulet Recognition Using Simple Feature Thai Amulet Recognition Using Simple Feature Thanachai Sauthananusuk, Chalie Charoenlarpnopparut and Toshiaki Kondo School of Information, Computer and Communication Technology Sirindhorn International

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

A Novel Morphological Method for Detection and Recognition of Vehicle License Plates

A Novel Morphological Method for Detection and Recognition of Vehicle License Plates American Journal of Applied Sciences 6 (12): 2066-2070, 2009 ISSN 1546-9239 2009 Science Publications A Novel Morphological Method for Detection and Recognition of Vehicle License Plates 1 S.H. Mohades

More information

Jitter Analysis Techniques Using an Agilent Infiniium Oscilloscope

Jitter Analysis Techniques Using an Agilent Infiniium Oscilloscope Jitter Analysis Techniques Using an Agilent Infiniium Oscilloscope Product Note Table of Contents Introduction........................ 1 Jitter Fundamentals................. 1 Jitter Measurement Techniques......

More information

SCIENCE & TECHNOLOGY

SCIENCE & TECHNOLOGY Pertanika J. Sci. & Technol. 25 (S): 163-172 (2017) SCIENCE & TECHNOLOGY Journal homepage: http://www.pertanika.upm.edu.my/ Performance Comparison of Min-Max Normalisation on Frontal Face Detection Using

More information

Classification of Road Images for Lane Detection

Classification of Road Images for Lane Detection Classification of Road Images for Lane Detection Mingyu Kim minkyu89@stanford.edu Insun Jang insunj@stanford.edu Eunmo Yang eyang89@stanford.edu 1. Introduction In the research on autonomous car, it is

More information

Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images

Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images Keshav Thakur 1, Er Pooja Gupta 2,Dr.Kuldip Pahwa 3, 1,M.Tech Final Year Student, Deptt. of ECE, MMU Ambala,

More information

An Improved Method of Computing Scale-Orientation Signatures

An Improved Method of Computing Scale-Orientation Signatures An Improved Method of Computing Scale-Orientation Signatures Chris Rose * and Chris Taylor Division of Imaging Science and Biomedical Engineering, University of Manchester, M13 9PT, UK Abstract: Scale-Orientation

More information

ROBOT VISION. Dr.M.Madhavi, MED, MVSREC

ROBOT VISION. Dr.M.Madhavi, MED, MVSREC ROBOT VISION Dr.M.Madhavi, MED, MVSREC Robotic vision may be defined as the process of acquiring and extracting information from images of 3-D world. Robotic vision is primarily targeted at manipulation

More information

COMPARATIVE STUDY AND ANALYSIS FOR GESTURE RECOGNITION METHODOLOGIES

COMPARATIVE STUDY AND ANALYSIS FOR GESTURE RECOGNITION METHODOLOGIES http:// COMPARATIVE STUDY AND ANALYSIS FOR GESTURE RECOGNITION METHODOLOGIES Rafiqul Z. Khan 1, Noor A. Ibraheem 2 1 Department of Computer Science, A.M.U. Aligarh, India 2 Department of Computer Science,

More information

RELEASING APERTURE FILTER CONSTRAINTS

RELEASING APERTURE FILTER CONSTRAINTS RELEASING APERTURE FILTER CONSTRAINTS Jakub Chlapinski 1, Stephen Marshall 2 1 Department of Microelectronics and Computer Science, Technical University of Lodz, ul. Zeromskiego 116, 90-924 Lodz, Poland

More information

Rubik's Cube Solver William Pitt c Professor Rosin Dr Mumford Bsc Computer Science School of Computer Science and Informatics 03/05/2013

Rubik's Cube Solver William Pitt c Professor Rosin Dr Mumford Bsc Computer Science School of Computer Science and Informatics 03/05/2013 Rubik's Cube Solver William Pitt c1015111 Professor Rosin Dr Mumford Bsc Computer Science School of Computer Science and Informatics 03/05/2013 1 Abstract The Rubik's cube solver consisted three main parts

More information

Object Recognition System using Template Matching Based on Signature and Principal Component Analysis

Object Recognition System using Template Matching Based on Signature and Principal Component Analysis Object Recognition System using Template Matching Based on Signature and Principal Component Analysis Inad A. Aljarrah Jordan University of Science & Technology, Irbid, Jordan inad@just.edu.jo Ahmed S.

More information

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Linear Gaussian Method to Detect Blurry Digital Images using SIFT IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

APPENDIX 1 TEXTURE IMAGE DATABASES

APPENDIX 1 TEXTURE IMAGE DATABASES 167 APPENDIX 1 TEXTURE IMAGE DATABASES A 1.1 BRODATZ DATABASE The Brodatz's photo album is a well-known benchmark database for evaluating texture recognition algorithms. It contains 111 different texture

More information

Automatic Segmentation and Indexing in a Database of Bird Images

Automatic Segmentation and Indexing in a Database of Bird Images University of Massachusetts Amherst From the SelectedWorks of R. Manmatha 2000 Automatic Segmentation and Indexing in a Database of Bird Images Madirakshi Das R. Manmatha, University of Massachusetts -

More information

ECC419 IMAGE PROCESSING

ECC419 IMAGE PROCESSING ECC419 IMAGE PROCESSING INTRODUCTION Image Processing Image processing is a subclass of signal processing concerned specifically with pictures. Digital Image Processing, process digital images by means

More information

Robust Document Image Binarization Techniques

Robust Document Image Binarization Techniques Robust Document Image Binarization Techniques T. Srikanth M-Tech Student, Malla Reddy Institute of Technology and Science, Maisammaguda, Dulapally, Secunderabad. Abstract: Segmentation of text from badly

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

Study Impact of Architectural Style and Partial View on Landmark Recognition

Study Impact of Architectural Style and Partial View on Landmark Recognition Study Impact of Architectural Style and Partial View on Landmark Recognition Ying Chen smileyc@stanford.edu 1. Introduction Landmark recognition in image processing is one of the important object recognition

More information

Quality Control of PCB using Image Processing

Quality Control of PCB using Image Processing Quality Control of PCB using Image Processing Rasika R. Chavan Swati A. Chavan Gautami D. Dokhe Mayuri B. Wagh ABSTRACT An automated testing system for Printed Circuit Board (PCB) is preferred to get the

More information

Webcam Image Alignment

Webcam Image Alignment Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCSE-2011-46 2011 Webcam Image Alignment

More information

Classification in Image processing: A Survey

Classification in Image processing: A Survey Classification in Image processing: A Survey Rashmi R V, Sheela Sridhar Department of computer science and Engineering, B.N.M.I.T, Bangalore-560070 Department of computer science and Engineering, B.N.M.I.T,

More information

Selection of Temporally Dithered Codes for Increasing Virtual Depth of Field in Structured Light Systems

Selection of Temporally Dithered Codes for Increasing Virtual Depth of Field in Structured Light Systems Selection of Temporally Dithered Codes for Increasing Virtual Depth of Field in Structured Light Systems Abstract Temporally dithered codes have recently been used for depth reconstruction of fast dynamic

More information

Multi-modal Human-computer Interaction

Multi-modal Human-computer Interaction Multi-modal Human-computer Interaction Attila Fazekas Attila.Fazekas@inf.unideb.hu SSIP 2008, 9 July 2008 Hungary and Debrecen Multi-modal Human-computer Interaction - 2 Debrecen Big Church Multi-modal

More information

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique Ms. Priti V. Dable 1, Prof. P.R. Lakhe 2, Mr. S.S. Kemekar 3 Ms. Priti V. Dable 1 (PG Scholar) Comm (Electronics) S.D.C.E.

More information

Development of an Education System for Surface Mount Work of a Printed Circuit Board

Development of an Education System for Surface Mount Work of a Printed Circuit Board Development of an Education System for Surface Mount Work of a Printed Circuit Board H. Ishii, T. Kobayashi, H. Fujino, Y. Nishimura, H. Shimoda, H. Yoshikawa Kyoto University Gokasho, Uji, Kyoto, 611-0011,

More information

Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2, b, Ma Hui2, c

Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2, b, Ma Hui2, c 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2,

More information

How Many Pixels Do We Need to See Things?

How Many Pixels Do We Need to See Things? How Many Pixels Do We Need to See Things? Yang Cai Human-Computer Interaction Institute, School of Computer Science, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15213, USA ycai@cmu.edu

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

Objective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs

Objective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs Objective Evaluation of Edge Blur and Artefacts: Application to JPEG and JPEG 2 Image Codecs G. A. D. Punchihewa, D. G. Bailey, and R. M. Hodgson Institute of Information Sciences and Technology, Massey

More information