SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
IJASCSE, Vol 2, Issue 1, 2013
Feb. 28
            Four Side Distance: A New Fourier Shape
                            Signature

                            Sonya Eini                                                 Abdolah Chalechale
           Department of Computer Engineering                                  Department of Computer Engineering
                    Razi University                                                     Razi University
                   Kermanshah, Iran                                                    Kermanshah, Iran



  Abstract— Shape is one of the main features in content based
  image retrieval (CBIR). This paper proposes a new shape              In this paper, a new content based image retrieval
  signature. In this technique, features of each shape are         technique using shape feature is proposed. The proposed
  extracted based on four sides of the rectangle that covers the   shape signature uses the distances between a shape and
  shape. The proposed technique is Fourier based and it is
                                                                   four sides of the rectangle that covers it.
  invariant to translation, scaling and rotation. The retrieval
  performance between some commonly used Fourier based                 The rest of the paper is organized as follows: Section II
  signatures and the proposed four sides distance (FSD)            is related works. The proposed signature is presented in
  signature has been tested using MPEG-7 database.                 Section III. The experimental results are studied in Section
  Experimental results are shown that the FSD signature has        IV and Section V is conclusion.
  better performance compared with those signatures.
                                                                                      II.   RELATED WORKS
     Keywords-Content based Image Retrieval (CBIR); Shape;             Shape is the most important feature for recognition of
  Four Sides Distance (FSD); Fourier Signatures.
                                                                   objects in an image [3]. There are two classes of
                       I.      INTRODUCTION                        techniques in shape based retrieval systems. Region based
                                                                   techniques and boundary based techniques. A region based
      Because of the increasing amount of digital images and
                                                                   technique uses whole shape region but a boundary based
  necessity of efficient image retrieval systems, content based
                                                                   technique only uses boundary points of shapes in feature
  image retrieval (CBIR) systems was introduced in the early
  1990’s [1]. CBIR systems do not have the problems of             vector extraction.
  traditional text based image retrieval (TBIR) systems. In            Region based techniques often involve intensive
  CBIR systems, users’ requests are in form of a query image       computations and fail to distinguish between objects that
  and images are retrieved based on visual contents (features)     are similar [4]. Thus boundary based techniques are more
  of images [2]. Color, texture and shape are the main             efficient than region based techniques. Several number of
  low-level features for CBIR. A block diagram of CBIR             techniques have presented that are based on boundary of
  systems is shown in Fig. 1. In CBIR systems, a feature           shapes.
  vector of each image is extracted based on one or a mixture          One important class of boundary based techniques is
  of those low-level features. Then, the similarity distance       Fourier descriptors (FD). In the FD methods, the Fourier
  between the feature vector of the query image and the            transformed boundary is used as a shape feature [5]. The
  feature vectors of the database's images are measured.           discrete Fourier transform of a signature r(t) is computed
  Finally, system retrieves similar images to the query based      as (1).
  on their similarity values.




                                                                      The an coefficients are called the Fourier descriptors of
                                                                   the shape. They should be used as (2) to be invariant
                                                                   against translation, scaling and rotation of images.




                                                                      Some commonly used Fourier based signatures that are
                                                                   used in our experiments, are polar coordinate (PC),
                                                                   complex coordinate (CC), angular radial coordinate
             Figure 1. Block diagram of CBIR systems.              (ARC), angular function (AF), triangle area representation
                                                                   (TAR) and chord length distance (CLD).

  www.ijascse.in                                                                                                       Page 27
IJASCSE, Vol 2, Issue 1, 2013
Feb. 28

  A. Polar Coordinate (PC)
      The feature vector of this signature at each boundary                D. Angular RadialCoordinate (ARC)
  point (xt ,yt) is a complex number. The real part is the                     The feature vector of this signature at each boundary
  distance between the point and the centroid (xc ,yc) of the              point is a complex number that the real part is radial and
  shape. It is computed as (3). The complex part is the angle              the complex part is same as the AF signature [8]. See Fig.
  between radial and x axis [8]. See Fig. 2(a). Equation (4) is            2(d). Equation (7) is the feature vector of this descriptor.
  the feature vector of this descriptor.

                                                                    (3)
                                                                           E. Triangle Area Representation (TAR)
                                                                               The feature vector of this signature is the area formed
                                                                           by each sequential three boundary points of a shape. It
  B. Complex Coordinate (CC)                                               distinguishes between concave and convex regions [9]. See
      The feature vector of this signature at each boundary                Fig. 2(e).
  point (xt ,yt) is a complex number. The real part is (xt-xc)             F. Chord Length Distance (CLD)
  and the complex part is (yt-yc) [7]. See Fig. 2(b). Equation
                                                                              In this signature, the feature vector at each boundary
  (5) is the feature vector of this descriptor.
                                                                           point p is the distance between that point and another
                                                                           boundary point q, such that pq be a vertical line to the
                                                                           tangent vector at p [10]. See Fig. 2(f).
  C. Angular Function (AF)                                                                  III.   THE PROPOSED SIGNATURE
      This signature considers the changes of directions for                   In this section, a new shape signature is proposed. It is
  some boundary points of a shape (with s step) [4]. The                   a boundary based approach.
  feature vector of this descriptor is computed as (6). See                    In the first stage, the rectangle that covers a shape is
  Fig. 2(c).                                                               obtained. Then, N points on the shape's boundary are
                                                                           considered. These selected points should have a same
                                                                           distance with each other. In the most important phase of
                                                                           the feature extraction, four values for each one of the
                                                                           selected boundary points are obtained. These four values
                                                                           for each point are defined as:




               Figure 2. Fourier shape signatures: (a) Polar Coordinate (PC) signature; (b) Complex Coordinate (CC) signature; (c) Angular
              Function (AF) signature; (d) Angular Radial Coordinate (ARC) signature; (e) Triangle Area Representation (TAR) signature; (f)
                                                              Chord Length Distance (CLD).
  www.ijascse.in                                                                                                                         Page 28
IJASCSE, Vol 2, Issue 1, 2013
Feb. 28
                                                                              A proper shape retrieval signature should be invariant
                                                                         against translation, scaling and rotation of the shape. The
  -   The distance between the boundary point and the                    FSD signature is translation invariant. It uses the smallest
      opposite point of it at the top side of the rectangle.             rectangle that covers the shape. Extraction of this rectangle
      This is the first element of this point in feature vector          is independent from the translation of the shape.
      and it is called dTop.
                                                                         A. Scale Normalization
  -   The distance between the boundary point and the                         For normalization of the FSD signature against scale,
      opposite point of it at the right side of the rectangle.           the obtained distances should be normalized. If a distance
      This is the second element of this point in feature                is from the length side of the rectangle, we should divide it
      vector and it is called dRight.                                    to the width of the rectangle (W). If a distance is from the
                                                                         width side of the rectangle, we should divide it to the
  -   The distance between the boundary point and the                    length of the rectangle (L). Therefore, the feature vector of
      opposite point of it at the bottom side of the rectangle.          the FSD for tth point changes as (9).
      This is the third element of this point in feature vector
      and it is called dBottom.

  -   The distance between the boundary point and the
      opposite point of it at the left side of the rectangle.            B. Rotation Normalization
      This is the fourth element of this point in feature
      vector and it is called dLeft.                                         The FSD signature is rotation invariant by using the
                                                                         magnitude values of the descriptor and ignoring the phase
      Therefore, the size of the proposed method is 4N. This             information. Therefore, the Fourier coefficients of the FSD
  signature is called four side distance (FSD). The feature              signature are calculated as (10).
  vector for the tth point of the FSD is computed as (8).



      The feature extraction process is displayed in Fig. 3.
  The original shape is shown in Fig. 3(a). Fig. 3(b) shows
  the shape and the rectangle that covers it. It also shows that
  how to compute four values for one of the boundary points
  of the shape.
      Fig. 4 shows FSD signature for two different classes of
  shapes. It is clear that the FSD feature vectors of same
  classes of shape are similar to each other.




                           Figure 3. The Four Sides Distance (FSD) signature: (a) The original shape; (b) Computing the
                           distances between the shape’s boundary points and four sides of the rectangle that covers it.




  www.ijascse.in                                                                                                             Page 29
IJASCSE, Vol 2, Issue 1, 2013
Feb. 28


                                                                                            IV.    EXPERIMENTAL RESULTS
                                                                               For performance measurement and comparing the
                                                                           proposed technique with other commonly used shape
                                                                           signatures, we use part B of the MPEG7 database [11]. It
                                                                           consists of 1400 images that are classified into 70 classes.
                                                                           Each class has 20 similar images. Fig. 5 shows some
                                                                           samples of this database. All the 1400 shapes in the
                                                                           database are used as queries in our experiments.
                                                                               Euclidean distance has been used for similarity
                                                                           measurement. The retrieval performance is measured in
                                                                           terms of precision and recall. Precision measures the
                                                                           retrieval accuracy, whereas recall measures the capability
                                                                           to retrieve relevant items from the database [12]. They are
                                                                           calculated as (11) and (12), respectively.




          Figure 4. The FSD signatures of two different classes
                              of shapes.




                                    Figure 5. Samples of 11 classes of shapes from set B of the MPEG-7 database.




  www.ijascse.in                                                                                                              Page 30
IJASCSE, Vol 2, Issue 1, 2013
Feb. 28
                                                                             TABLE I.       THE AVERAGE PRECISION FOR HIGH AND LOW LEVELS
  Some samples of retrieved images based on the FSD                           OF RECALL FOR THE FSD AND OTHER FOURIER DESCRIPTORS ON THE
                                                                                                  MPEG-7 DATABASE.
  signature are shown in Fig. 6. These shapes are in MPEG-7
  database. Based on these retrieval shapes, it is clears that                    Signatures
                                                                                                                     Average Precision
  the FSD signature is not sensitive against translation, scale                                             Recall ≤ 50%            Recall > 50%
  and rotation.                                                                       FSD                      67.72                       35.83

      Table 1 shows the average of precision for low and                               PC                      64.40                       35.12
  high levels of recalls (recall ≤ 50% and recall > 50%) for                          CC                       64.76                       22.59
  the FSD signature and seven well-known signatures. It is
                                                                                      ARC                      58.93                       26.83
  clear that the performance of the FSD signature is higher
  than them. For better comparison, Fig. 7 shows the                                   AF                      57.39                       27.88
  precision-recall curves of the proposed FSD method and                              TAR                      58.70                       23.54
  two of those shape signatures (CC and CLD). It is obvious
  that the precision-recall curve of the FSD method is higher                         CLD                      57.80                       24.00
  than the CLD and CC signatures. It is concluded that, the
  proposed method has a good performance in comparison
  with some of well-known shape signatures.




                          Figure 6. Retrieval images for seven classes of shape in MPEG-7 database based on the FSD signature: (a)
                              Butterfly class; (b) Beetle class; (c) Tree class; (d) Hammer class; (e) Jar class; (f) Device6 class; (g)
                                                                           Sea_snake class.

  www.ijascse.in                                                                                                                             Page 31
IJASCSE, Vol 2, Issue 1, 2013
Feb. 28




                             Figure 7. The precision-recall curves of the proposed method (FSD) and some well-known shape
                                                                        signatures.




                           V.    CONCLUSION                                [3]  N. Alajlan, I. El Rube, M.S. Kamel and G. Freeman, “Shape
                                                                                retrieval using triangle- area representation and dynamic space
  One of the important low-level features in content-based                      warping,” Patern Recognition, vol. 40, pp. 1911-1920, 2007.
  image retrieval is shape. This paper proposed a new CBIR                 [4] Akrem El-ghazal, OtmanBasir and SaeidBelkasim: “Farthest point
  system based on shape feature. This is based on boundary                      distance: Anew shape signature for Fourier descriptors,” Signal
  points of shapes. The four sides of the rectangle that covers                 Processing: Image Communication 24, pp. 572-586, 2009.
  a shape are considered. Then some points on the surface of               [5] R.C. Gonzalez, R.E. Woods, “Digital Image Processing,”Addison-
  the shape, is selected. The distances between the points on                   Wesley, Reading, MA, 2002.
  the shape's boundary and four sides of the rectangle, are                [6] K.L. Tan, and L. F. Thiang, “Retrieving similar shapes
                                                                                effectively and efficiently,”Multimedia Tools and Applications,
  computed as feature vector.                                                   Kluwer Academic Publishers, Netherlands, pp.111–134, 2003.
  The proposed method that is called four side distance                    [7] D.S. Zhang, G. Lu, “A comparative study of curvature scale space
  (FSD) is a Fourier based descriptor and it is not sensitive to                and Fourier descriptors,” Journal of Visual Communication and
  translation, scaling and rotation. The proposed FSD                           Image Representation 14,pp.41–60, 2003.
  signature is compared with six commonly used Fourier                     [8] I.Kunttu and L.Lepisto, “Shape-based retrieval of industrial surface
                                                                                defects using angular radius Fourier descriptor,”IET Image
  based descriptors (CC, PC, AF, ARC, TAR and CLD).                             Processing, 2007, 1, (2), pp.231–236, 2007.
  Experimental results are shown that the average of                       [9] Yang Mingqiang, Kpalma Kidiyo and Ronsin Joseph, “A
  precision for low and high levels of recall for the FSD                       survey       of   shape      feature extraction techniques,”Pattern
  signature is higher than those commonly used signatures.                      Recognition, Peng-Yeng Yin (Ed.), pp.43-90, 2008.
                                                                           [10] D.S. Zhang and G. Lu, “Study and evaluation of different
                                                                                Fourier methods for image retrieval,” Image and Vision
                             REFERENCES                                         Computing 23, pp.33–49, 2005.
                                                                           [11] F. Mokhtarian, M. Bober,               “Curvature Scale Space
  [1]   Suchismita Das, Shruti Garg and G. Sahoo,“Comparison of Content         Representation:Theory Application and MPEG-7 Standardization,”
        Based Image Retrieval Systems Using Wavelet and Curvelet                first ed., KluwerAcademic Publishers, Dordrecht, 2003.
        Transform,” The International Journal of Multimedia & Its
        Applications (IJMA) Vol.4, No.4, pp.137-154, August 2012.          [12] RitendraDatta, DhirajJoshi, Jia Li and James Z. Wang, “Image
                                                                                Retrieval: Ideas, Influences, and Trends of the New Age,” ACM
  [2]   NidhiSinghai and Prof. Shishir K. Shandilya, “A Survey On:              Computing Surveys, Vol. 40, No. 2, Article 5, Publication date:
        Content Based Image Retrieval Systems,” International Journal of        April 2008.
        Computer Applications (0975 – 8887) Volume 4 – No.2, pp. 22-26,
        July 2010.




  www.ijascse.in                                                                                                                        Page 32

Weitere ähnliche Inhalte

Was ist angesagt?

Block Matching Project
Block Matching ProjectBlock Matching Project
Block Matching Projectdswazalwar
 
Full n final prjct
Full n final prjctFull n final prjct
Full n final prjctpunu2602
 
Reconstruction of fingerprints
Reconstruction of fingerprintsReconstruction of fingerprints
Reconstruction of fingerprintsJuhi Khandelwal
 
Basic image matching techniques, epipolar geometry and normalized image
Basic image matching techniques, epipolar geometry and normalized imageBasic image matching techniques, epipolar geometry and normalized image
Basic image matching techniques, epipolar geometry and normalized imageNational Cheng Kung University
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...Petroleum Training Institute
 
Fingerprint _prem
Fingerprint _premFingerprint _prem
Fingerprint _premlgbl40
 
Classifier fusion method to recognize
Classifier fusion method to recognizeClassifier fusion method to recognize
Classifier fusion method to recognizeIJCI JOURNAL
 
Image segmentation
Image segmentationImage segmentation
Image segmentationMukul Jindal
 
SHADOW DETECTION USING TRICOLOR ATTENUATION MODEL ENHANCED WITH ADAPTIVE HIST...
SHADOW DETECTION USING TRICOLOR ATTENUATION MODEL ENHANCED WITH ADAPTIVE HIST...SHADOW DETECTION USING TRICOLOR ATTENUATION MODEL ENHANCED WITH ADAPTIVE HIST...
SHADOW DETECTION USING TRICOLOR ATTENUATION MODEL ENHANCED WITH ADAPTIVE HIST...ijcsit
 
A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...IJSRD
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2Aly Abdelkareem
 

Was ist angesagt? (19)

Block Matching Project
Block Matching ProjectBlock Matching Project
Block Matching Project
 
PPT s07-machine vision-s2
PPT s07-machine vision-s2PPT s07-machine vision-s2
PPT s07-machine vision-s2
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Full n final prjct
Full n final prjctFull n final prjct
Full n final prjct
 
Reconstruction of fingerprints
Reconstruction of fingerprintsReconstruction of fingerprints
Reconstruction of fingerprints
 
Basic image matching techniques, epipolar geometry and normalized image
Basic image matching techniques, epipolar geometry and normalized imageBasic image matching techniques, epipolar geometry and normalized image
Basic image matching techniques, epipolar geometry and normalized image
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Fb3110231028
Fb3110231028Fb3110231028
Fb3110231028
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
 
Local binary pattern
Local binary patternLocal binary pattern
Local binary pattern
 
Fingerprint _prem
Fingerprint _premFingerprint _prem
Fingerprint _prem
 
Classifier fusion method to recognize
Classifier fusion method to recognizeClassifier fusion method to recognize
Classifier fusion method to recognize
 
PPT s04-machine vision-s2
PPT s04-machine vision-s2PPT s04-machine vision-s2
PPT s04-machine vision-s2
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Line detection algorithms
Line detection algorithmsLine detection algorithms
Line detection algorithms
 
SHADOW DETECTION USING TRICOLOR ATTENUATION MODEL ENHANCED WITH ADAPTIVE HIST...
SHADOW DETECTION USING TRICOLOR ATTENUATION MODEL ENHANCED WITH ADAPTIVE HIST...SHADOW DETECTION USING TRICOLOR ATTENUATION MODEL ENHANCED WITH ADAPTIVE HIST...
SHADOW DETECTION USING TRICOLOR ATTENUATION MODEL ENHANCED WITH ADAPTIVE HIST...
 
A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2
 

Ähnlich wie Four Side Distance: A New Fourier Shape Signature

Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...
Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...
Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...sipij
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeIJERA Editor
 
Amalgamation of contour, texture, color, edge, and spatial features for effic...
Amalgamation of contour, texture, color, edge, and spatial features for effic...Amalgamation of contour, texture, color, edge, and spatial features for effic...
Amalgamation of contour, texture, color, edge, and spatial features for effic...eSAT Journals
 
Performance analysis of chain code descriptor for hand shape classification
Performance analysis of chain code descriptor for hand shape classificationPerformance analysis of chain code descriptor for hand shape classification
Performance analysis of chain code descriptor for hand shape classificationijcga
 
A Hybrid Technique for Shape Matching Based on chain code and DFS Tree
A Hybrid Technique for Shape Matching Based on chain code and DFS TreeA Hybrid Technique for Shape Matching Based on chain code and DFS Tree
A Hybrid Technique for Shape Matching Based on chain code and DFS TreeIOSR Journals
 
Using Aspect Ratio to Classify Red Blood Images
Using Aspect Ratio to Classify Red Blood ImagesUsing Aspect Ratio to Classify Red Blood Images
Using Aspect Ratio to Classify Red Blood ImagesIOSR Journals
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
The Geometric Characteristics of the Linear Features in Close Range Photogram...
The Geometric Characteristics of the Linear Features in Close Range Photogram...The Geometric Characteristics of the Linear Features in Close Range Photogram...
The Geometric Characteristics of the Linear Features in Close Range Photogram...IJERD Editor
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALsipij
 
12776032.ppt
12776032.ppt12776032.ppt
12776032.pptfgjf3
 
Fourier descriptors & moments
Fourier descriptors & momentsFourier descriptors & moments
Fourier descriptors & momentsrajisri2
 
4 satellite image fusion using fast discrete
4 satellite image fusion using fast discrete4 satellite image fusion using fast discrete
4 satellite image fusion using fast discreteAlok Padole
 
E041122335
E041122335E041122335
E041122335IOSR-JEN
 
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint RecognitionExtended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint RecognitionCSCJournals
 
Automatic Relative Radiometric Normalization for Change Detection of Satellit...
Automatic Relative Radiometric Normalization for Change Detection of Satellit...Automatic Relative Radiometric Normalization for Change Detection of Satellit...
Automatic Relative Radiometric Normalization for Change Detection of Satellit...IDES Editor
 

Ähnlich wie Four Side Distance: A New Fourier Shape Signature (20)

Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...
Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...
Image Information Retrieval From Incomplete Queries Using Color and Shape Fea...
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of Cheque
 
Amalgamation of contour, texture, color, edge, and spatial features for effic...
Amalgamation of contour, texture, color, edge, and spatial features for effic...Amalgamation of contour, texture, color, edge, and spatial features for effic...
Amalgamation of contour, texture, color, edge, and spatial features for effic...
 
Performance analysis of chain code descriptor for hand shape classification
Performance analysis of chain code descriptor for hand shape classificationPerformance analysis of chain code descriptor for hand shape classification
Performance analysis of chain code descriptor for hand shape classification
 
A Hybrid Technique for Shape Matching Based on chain code and DFS Tree
A Hybrid Technique for Shape Matching Based on chain code and DFS TreeA Hybrid Technique for Shape Matching Based on chain code and DFS Tree
A Hybrid Technique for Shape Matching Based on chain code and DFS Tree
 
Using Aspect Ratio to Classify Red Blood Images
Using Aspect Ratio to Classify Red Blood ImagesUsing Aspect Ratio to Classify Red Blood Images
Using Aspect Ratio to Classify Red Blood Images
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
The Geometric Characteristics of the Linear Features in Close Range Photogram...
The Geometric Characteristics of the Linear Features in Close Range Photogram...The Geometric Characteristics of the Linear Features in Close Range Photogram...
The Geometric Characteristics of the Linear Features in Close Range Photogram...
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 
12776032.ppt
12776032.ppt12776032.ppt
12776032.ppt
 
Bi4103375380
Bi4103375380Bi4103375380
Bi4103375380
 
Hh2513151319
Hh2513151319Hh2513151319
Hh2513151319
 
Hh2513151319
Hh2513151319Hh2513151319
Hh2513151319
 
Fourier descriptors & moments
Fourier descriptors & momentsFourier descriptors & moments
Fourier descriptors & moments
 
4 satellite image fusion using fast discrete
4 satellite image fusion using fast discrete4 satellite image fusion using fast discrete
4 satellite image fusion using fast discrete
 
E041122335
E041122335E041122335
E041122335
 
Av4301248253
Av4301248253Av4301248253
Av4301248253
 
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint RecognitionExtended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
 
Automatic Relative Radiometric Normalization for Change Detection of Satellit...
Automatic Relative Radiometric Normalization for Change Detection of Satellit...Automatic Relative Radiometric Normalization for Change Detection of Satellit...
Automatic Relative Radiometric Normalization for Change Detection of Satellit...
 
E0343034
E0343034E0343034
E0343034
 

Mehr von IJASCSE

Inter Time Series Sales Forecasting
Inter Time Series Sales ForecastingInter Time Series Sales Forecasting
Inter Time Series Sales ForecastingIJASCSE
 
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...IJASCSE
 
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...IJASCSE
 
Improving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudImproving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudIJASCSE
 
Theoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsTheoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsIJASCSE
 
Improved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansImproved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansIJASCSE
 
A Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningA Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningIJASCSE
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...IJASCSE
 
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsDesign Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsIJASCSE
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...IJASCSE
 
A Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerA Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerIJASCSE
 
Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...IJASCSE
 
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...IJASCSE
 
Evaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsEvaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsIJASCSE
 
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...IJASCSE
 
An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...IJASCSE
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkIJASCSE
 
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...IJASCSE
 
Portfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelPortfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelIJASCSE
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...IJASCSE
 

Mehr von IJASCSE (20)

Inter Time Series Sales Forecasting
Inter Time Series Sales ForecastingInter Time Series Sales Forecasting
Inter Time Series Sales Forecasting
 
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
 
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
 
Improving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudImproving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure Cloud
 
Theoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsTheoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel Sections
 
Improved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansImproved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-Means
 
A Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningA Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and Learning
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
 
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsDesign Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
 
A Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerA Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layer
 
Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...
 
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
 
Evaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsEvaluation of Exception Handling Metrics
Evaluation of Exception Handling Metrics
 
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
 
An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
 
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
 
Portfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelPortfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz model
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Four Side Distance: A New Fourier Shape Signature

  • 1. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 Four Side Distance: A New Fourier Shape Signature Sonya Eini Abdolah Chalechale Department of Computer Engineering Department of Computer Engineering Razi University Razi University Kermanshah, Iran Kermanshah, Iran Abstract— Shape is one of the main features in content based image retrieval (CBIR). This paper proposes a new shape In this paper, a new content based image retrieval signature. In this technique, features of each shape are technique using shape feature is proposed. The proposed extracted based on four sides of the rectangle that covers the shape signature uses the distances between a shape and shape. The proposed technique is Fourier based and it is four sides of the rectangle that covers it. invariant to translation, scaling and rotation. The retrieval performance between some commonly used Fourier based The rest of the paper is organized as follows: Section II signatures and the proposed four sides distance (FSD) is related works. The proposed signature is presented in signature has been tested using MPEG-7 database. Section III. The experimental results are studied in Section Experimental results are shown that the FSD signature has IV and Section V is conclusion. better performance compared with those signatures. II. RELATED WORKS Keywords-Content based Image Retrieval (CBIR); Shape; Shape is the most important feature for recognition of Four Sides Distance (FSD); Fourier Signatures. objects in an image [3]. There are two classes of I. INTRODUCTION techniques in shape based retrieval systems. Region based techniques and boundary based techniques. A region based Because of the increasing amount of digital images and technique uses whole shape region but a boundary based necessity of efficient image retrieval systems, content based technique only uses boundary points of shapes in feature image retrieval (CBIR) systems was introduced in the early 1990’s [1]. CBIR systems do not have the problems of vector extraction. traditional text based image retrieval (TBIR) systems. In Region based techniques often involve intensive CBIR systems, users’ requests are in form of a query image computations and fail to distinguish between objects that and images are retrieved based on visual contents (features) are similar [4]. Thus boundary based techniques are more of images [2]. Color, texture and shape are the main efficient than region based techniques. Several number of low-level features for CBIR. A block diagram of CBIR techniques have presented that are based on boundary of systems is shown in Fig. 1. In CBIR systems, a feature shapes. vector of each image is extracted based on one or a mixture One important class of boundary based techniques is of those low-level features. Then, the similarity distance Fourier descriptors (FD). In the FD methods, the Fourier between the feature vector of the query image and the transformed boundary is used as a shape feature [5]. The feature vectors of the database's images are measured. discrete Fourier transform of a signature r(t) is computed Finally, system retrieves similar images to the query based as (1). on their similarity values. The an coefficients are called the Fourier descriptors of the shape. They should be used as (2) to be invariant against translation, scaling and rotation of images. Some commonly used Fourier based signatures that are used in our experiments, are polar coordinate (PC), complex coordinate (CC), angular radial coordinate Figure 1. Block diagram of CBIR systems. (ARC), angular function (AF), triangle area representation (TAR) and chord length distance (CLD). www.ijascse.in Page 27
  • 2. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 A. Polar Coordinate (PC) The feature vector of this signature at each boundary D. Angular RadialCoordinate (ARC) point (xt ,yt) is a complex number. The real part is the The feature vector of this signature at each boundary distance between the point and the centroid (xc ,yc) of the point is a complex number that the real part is radial and shape. It is computed as (3). The complex part is the angle the complex part is same as the AF signature [8]. See Fig. between radial and x axis [8]. See Fig. 2(a). Equation (4) is 2(d). Equation (7) is the feature vector of this descriptor. the feature vector of this descriptor. (3) E. Triangle Area Representation (TAR) The feature vector of this signature is the area formed by each sequential three boundary points of a shape. It B. Complex Coordinate (CC) distinguishes between concave and convex regions [9]. See The feature vector of this signature at each boundary Fig. 2(e). point (xt ,yt) is a complex number. The real part is (xt-xc) F. Chord Length Distance (CLD) and the complex part is (yt-yc) [7]. See Fig. 2(b). Equation In this signature, the feature vector at each boundary (5) is the feature vector of this descriptor. point p is the distance between that point and another boundary point q, such that pq be a vertical line to the tangent vector at p [10]. See Fig. 2(f). C. Angular Function (AF) III. THE PROPOSED SIGNATURE This signature considers the changes of directions for In this section, a new shape signature is proposed. It is some boundary points of a shape (with s step) [4]. The a boundary based approach. feature vector of this descriptor is computed as (6). See In the first stage, the rectangle that covers a shape is Fig. 2(c). obtained. Then, N points on the shape's boundary are considered. These selected points should have a same distance with each other. In the most important phase of the feature extraction, four values for each one of the selected boundary points are obtained. These four values for each point are defined as: Figure 2. Fourier shape signatures: (a) Polar Coordinate (PC) signature; (b) Complex Coordinate (CC) signature; (c) Angular Function (AF) signature; (d) Angular Radial Coordinate (ARC) signature; (e) Triangle Area Representation (TAR) signature; (f) Chord Length Distance (CLD). www.ijascse.in Page 28
  • 3. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 A proper shape retrieval signature should be invariant against translation, scaling and rotation of the shape. The - The distance between the boundary point and the FSD signature is translation invariant. It uses the smallest opposite point of it at the top side of the rectangle. rectangle that covers the shape. Extraction of this rectangle This is the first element of this point in feature vector is independent from the translation of the shape. and it is called dTop. A. Scale Normalization - The distance between the boundary point and the For normalization of the FSD signature against scale, opposite point of it at the right side of the rectangle. the obtained distances should be normalized. If a distance This is the second element of this point in feature is from the length side of the rectangle, we should divide it vector and it is called dRight. to the width of the rectangle (W). If a distance is from the width side of the rectangle, we should divide it to the - The distance between the boundary point and the length of the rectangle (L). Therefore, the feature vector of opposite point of it at the bottom side of the rectangle. the FSD for tth point changes as (9). This is the third element of this point in feature vector and it is called dBottom. - The distance between the boundary point and the opposite point of it at the left side of the rectangle. B. Rotation Normalization This is the fourth element of this point in feature vector and it is called dLeft. The FSD signature is rotation invariant by using the magnitude values of the descriptor and ignoring the phase Therefore, the size of the proposed method is 4N. This information. Therefore, the Fourier coefficients of the FSD signature is called four side distance (FSD). The feature signature are calculated as (10). vector for the tth point of the FSD is computed as (8). The feature extraction process is displayed in Fig. 3. The original shape is shown in Fig. 3(a). Fig. 3(b) shows the shape and the rectangle that covers it. It also shows that how to compute four values for one of the boundary points of the shape. Fig. 4 shows FSD signature for two different classes of shapes. It is clear that the FSD feature vectors of same classes of shape are similar to each other. Figure 3. The Four Sides Distance (FSD) signature: (a) The original shape; (b) Computing the distances between the shape’s boundary points and four sides of the rectangle that covers it. www.ijascse.in Page 29
  • 4. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 IV. EXPERIMENTAL RESULTS For performance measurement and comparing the proposed technique with other commonly used shape signatures, we use part B of the MPEG7 database [11]. It consists of 1400 images that are classified into 70 classes. Each class has 20 similar images. Fig. 5 shows some samples of this database. All the 1400 shapes in the database are used as queries in our experiments. Euclidean distance has been used for similarity measurement. The retrieval performance is measured in terms of precision and recall. Precision measures the retrieval accuracy, whereas recall measures the capability to retrieve relevant items from the database [12]. They are calculated as (11) and (12), respectively. Figure 4. The FSD signatures of two different classes of shapes. Figure 5. Samples of 11 classes of shapes from set B of the MPEG-7 database. www.ijascse.in Page 30
  • 5. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 TABLE I. THE AVERAGE PRECISION FOR HIGH AND LOW LEVELS Some samples of retrieved images based on the FSD OF RECALL FOR THE FSD AND OTHER FOURIER DESCRIPTORS ON THE MPEG-7 DATABASE. signature are shown in Fig. 6. These shapes are in MPEG-7 database. Based on these retrieval shapes, it is clears that Signatures Average Precision the FSD signature is not sensitive against translation, scale Recall ≤ 50% Recall > 50% and rotation. FSD 67.72 35.83 Table 1 shows the average of precision for low and PC 64.40 35.12 high levels of recalls (recall ≤ 50% and recall > 50%) for CC 64.76 22.59 the FSD signature and seven well-known signatures. It is ARC 58.93 26.83 clear that the performance of the FSD signature is higher than them. For better comparison, Fig. 7 shows the AF 57.39 27.88 precision-recall curves of the proposed FSD method and TAR 58.70 23.54 two of those shape signatures (CC and CLD). It is obvious that the precision-recall curve of the FSD method is higher CLD 57.80 24.00 than the CLD and CC signatures. It is concluded that, the proposed method has a good performance in comparison with some of well-known shape signatures. Figure 6. Retrieval images for seven classes of shape in MPEG-7 database based on the FSD signature: (a) Butterfly class; (b) Beetle class; (c) Tree class; (d) Hammer class; (e) Jar class; (f) Device6 class; (g) Sea_snake class. www.ijascse.in Page 31
  • 6. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 Figure 7. The precision-recall curves of the proposed method (FSD) and some well-known shape signatures. V. CONCLUSION [3] N. Alajlan, I. El Rube, M.S. Kamel and G. Freeman, “Shape retrieval using triangle- area representation and dynamic space One of the important low-level features in content-based warping,” Patern Recognition, vol. 40, pp. 1911-1920, 2007. image retrieval is shape. This paper proposed a new CBIR [4] Akrem El-ghazal, OtmanBasir and SaeidBelkasim: “Farthest point system based on shape feature. This is based on boundary distance: Anew shape signature for Fourier descriptors,” Signal points of shapes. The four sides of the rectangle that covers Processing: Image Communication 24, pp. 572-586, 2009. a shape are considered. Then some points on the surface of [5] R.C. Gonzalez, R.E. Woods, “Digital Image Processing,”Addison- the shape, is selected. The distances between the points on Wesley, Reading, MA, 2002. the shape's boundary and four sides of the rectangle, are [6] K.L. Tan, and L. F. Thiang, “Retrieving similar shapes effectively and efficiently,”Multimedia Tools and Applications, computed as feature vector. Kluwer Academic Publishers, Netherlands, pp.111–134, 2003. The proposed method that is called four side distance [7] D.S. Zhang, G. Lu, “A comparative study of curvature scale space (FSD) is a Fourier based descriptor and it is not sensitive to and Fourier descriptors,” Journal of Visual Communication and translation, scaling and rotation. The proposed FSD Image Representation 14,pp.41–60, 2003. signature is compared with six commonly used Fourier [8] I.Kunttu and L.Lepisto, “Shape-based retrieval of industrial surface defects using angular radius Fourier descriptor,”IET Image based descriptors (CC, PC, AF, ARC, TAR and CLD). Processing, 2007, 1, (2), pp.231–236, 2007. Experimental results are shown that the average of [9] Yang Mingqiang, Kpalma Kidiyo and Ronsin Joseph, “A precision for low and high levels of recall for the FSD survey of shape feature extraction techniques,”Pattern signature is higher than those commonly used signatures. Recognition, Peng-Yeng Yin (Ed.), pp.43-90, 2008. [10] D.S. Zhang and G. Lu, “Study and evaluation of different Fourier methods for image retrieval,” Image and Vision REFERENCES Computing 23, pp.33–49, 2005. [11] F. Mokhtarian, M. Bober, “Curvature Scale Space [1] Suchismita Das, Shruti Garg and G. Sahoo,“Comparison of Content Representation:Theory Application and MPEG-7 Standardization,” Based Image Retrieval Systems Using Wavelet and Curvelet first ed., KluwerAcademic Publishers, Dordrecht, 2003. Transform,” The International Journal of Multimedia & Its Applications (IJMA) Vol.4, No.4, pp.137-154, August 2012. [12] RitendraDatta, DhirajJoshi, Jia Li and James Z. Wang, “Image Retrieval: Ideas, Influences, and Trends of the New Age,” ACM [2] NidhiSinghai and Prof. Shishir K. Shandilya, “A Survey On: Computing Surveys, Vol. 40, No. 2, Article 5, Publication date: Content Based Image Retrieval Systems,” International Journal of April 2008. Computer Applications (0975 – 8887) Volume 4 – No.2, pp. 22-26, July 2010. www.ijascse.in Page 32