• Title/Summary/Keyword: Chain-Code

Search Result 220, Processing Time 0.039 seconds

Connected-component Labeling using Contour Following (윤곽추적 영역채색 기법)

  • 심재창;이준재;하영호
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.5
    • /
    • pp.95-107
    • /
    • 1994
  • A new efficient contour following algorithm for connected-component labeling processing is proposed. The basic idea of the algorithm is that the total number of downward chain codes is the same as one of upward chain codes along the closed contour. If the chain code direction is upward, then region start mark is assigned at the chain code departure pixel and if the chain code is downward, then region end mark is assigned at the chain code arrival pixel. The proposed algorithm extracts directly the contour information from only the current direction information of chain. This makes the algorithm simple and fast and requires less memory with comparison to the conventional algorithms.The proposed contour following algorithm can be applied to the various kind of image processing such as region filling, restoration and region feature extraction.

  • PDF

A Study on Character Recognition using HMM and the Mason's Theorem

  • Lee Sang-kyu;Hur Jung-youn
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.259-262
    • /
    • 2004
  • In most of the character recognition systems, the method of template matching or statistical method using hidden Markov model is used to extract and recognize feature shapes. In this paper, we used modified chain-code which has 8-directions but 4-codes, and made the chain-code of hand-written character, after that, converted it into transition chain-code by applying to HMM(Hidden Markov Model). The transition chain code by HMM is analyzed as signal flow graph by Mason's theory which is generally used to calculate forward gain at automatic control system. If the specific forward gain and feedback gain is properly set, the forward gain of transition chain-code using Mason's theory can be distinguished depending on each object for recognition. This data of the gain is reorganized as tree structure, hence making it possible to distinguish different hand-written characters. With this method, $91\%$ recognition rate was acquired.

  • PDF

Writer Verification Using Spatial Domain Features under Different Ink Width Conditions

  • Kore, Sharada Laxman;Apte, Shaila Dinkar
    • Journal of Computing Science and Engineering
    • /
    • v.10 no.2
    • /
    • pp.39-50
    • /
    • 2016
  • In this paper, we present a comparative study of spatial domain features for writer identification and verification with different ink width conditions. The existing methods give high error rates, when comparing two handwritten images with different pen types. To the best of our knowledge, we are the first to design the feature with different ink width conditions. To address this problem, contour based features were extracted using a chain code method. To improve accuracy at higher levels, we considered histograms of chain code and variance in bins of histogram of chain code as features to discriminate handwriting samples. The system was trained and tested for 1,000 writers with two samples using different writing instruments. The feature performance is tested on our newly created dataset of 4,000 samples. The experimental results show that the histogram of chain code feature is good compared to other methods with false acceptance rate of 11.67%, false rejection rate of 36.70%, average error rates of 24.18%, and average verification accuracy of 75.89% on our new dataset. We also studied the effect of amount of text and dataset size on verification accuracy.

CONSTRUCTION FOR SELF-ORTHOGONAL CODES OVER A CERTAIN NON-CHAIN FROBENIUS RING

  • Kim, Boran
    • Journal of the Korean Mathematical Society
    • /
    • v.59 no.1
    • /
    • pp.193-204
    • /
    • 2022
  • We present construction methods for free self-orthogonal (self-dual or Type II) codes over ℤ4[v]/〈v2 + 2v〉 which is one of the finite commutative local non-chain Frobenius rings of order 16. By considering their Gray images on ℤ4, we give a construct method for a code over ℤ4. We have some new and optimal codes over ℤ4 with respect to the minimum Lee weight or minimum Euclidean weight.

Mode Selection Chain Code for Coding of Line Drawing Images (선도형의 부호화를 위한 모드설정 체인코드)

  • 장기철;최연성;최종수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.1
    • /
    • pp.41-53
    • /
    • 1988
  • Line drawing images are the most proper information to represent the characteristics and shapes of digital images and used for recognition and communication. For the coding of line drawing images, common eight-direction chain code is used mostly. In the paper, the new mode selection chain code method is proposed which can compress the eight-direction chain code about twenty percents and be used for the reversible coding method of line drawing images. In this coding techniques, we set a reference mode for each quadrant around an abject pixel, and assign 3-directional code for these reference modes. Therefore a line pixel is coded with 3 bits. Also, a new corner finding method of line drawing images using this mode selection chain code is proposed in this paper.

  • PDF

Research on Mobile Malicious Code Prediction Modeling Techniques Using Markov Chain (마코프 체인을 이용한 모바일 악성코드 예측 모델링 기법 연구)

  • Kim, JongMin;Kim, MinSu;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.19-26
    • /
    • 2014
  • Mobile malicious code is typically spread by the worm, and although modeling techniques to analyze the dispersion characteristics of the worms have been proposed, only macroscopic analysis was possible while there are limitations in predicting on certain viruses and malicious code. In this paper, prediction methods have been proposed which was based on Markov chain and is able to predict the occurrence of future malicious code by utilizing the past malicious code data. The average value of the malicious code to be applied to the prediction model of Markov chain model was applied by classifying into three categories of the total average, the last year average, and the recent average (6 months), and it was verified that malicious code prediction possibility could be increased by comparing the predicted values obtained through applying, and applying the recent average (6 months).

Flowchart-C Conversion System using Camera (카메라를 이용한 flowchart-C변환 시스템)

  • 이창우;주윤희;손영선
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.05a
    • /
    • pp.165-168
    • /
    • 2003
  • 본 논문에서는 CCD 흑백 카메라를 이용하여 프로그래머의 알고리즘이 표현된 flowchart의 영상을 입력받아 C언어 코드로 변환하는 시스템을 구현하였다. 입력된 영상을 이진화 처리한 영상으로부터 flowchart 기호들을 인식하기 위하여 chain code 방법을 이용하였고, flowchart 기호에 기술된 영문자 및 특수문자의 인식을 위하여 가로 및 세로 히스토그램을 이용하여 한 문자색 분할한 후 각 문자들을 구성하는 흑화소 pixel의 합과 chain code 방법을 사용하였다. 가로 및 세로 투영을 이용하여 흐름선을 인식함으로써 flowchart의 논리흐름을 파악할 수 있었다. 이 시스템을 수치연산에 적용하여, 프로그래머의 알고리즘에 부합하는 프로그램이 작성되어짐을 확인할 수 있었다.

  • PDF

Content-based Image Retrieval using an Improved Chain Code and Hidden Markov Model (개선된 chain code와 HMM을 이용한 내용기반 영상검색)

  • 조완현;이승희;박순영;박종현
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.375-378
    • /
    • 2000
  • In this paper, we propose a novo] content-based image retrieval system using both Hidden Markov Model(HMM) and an improved chain code. The Gaussian Mixture Model(GMM) is applied to statistically model a color information of the image, and Deterministic Annealing EM(DAEM) algorithm is employed to estimate the parameters of GMM. This result is used to segment the given image. We use an improved chain code, which is invariant to rotation, translation and scale, to extract the feature vectors of the shape for each image in the database. These are stored together in the database with each HMM whose parameters (A, B, $\pi$) are estimated by Baum-Welch algorithm. With respect to feature vector obtained in the same way from the query image, a occurring probability of each image is computed by using the forward algorithm of HMM. We use these probabilities for the image retrieval and present the highest similarity images based on these probabilities.

  • PDF

Chain code based New Decision Technique of Edge Orientation (체인코드를 이용한 새로운 에지 방향 결정 기법)

  • Sung, Min-Chul;Lee, Sang-Hwa;Cho, Nam-Ik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.1
    • /
    • pp.101-106
    • /
    • 2007
  • In this paper, we propose chain code based decision technique of edge orientation. Edge Information is one of the most important information for handling image signals, and is applied to various civilian and military area, such as image surveillance for military reconnaissance, restoration of noised image signal, fingerprint recognition, and so on. The conventional methods to find edge orientations exploit a certain size of mask which weights for a certain direction, so they showed limitations in the case of diagonal edges except 45 degrees. We find edge orientations using chain code. According to the experiments, the proposed method shows better performance than the conventional approaches. The exact edge orientations including diagonal directions are well found.