• Title/Summary/Keyword: computer image analysis

Search Result 1,466, Processing Time 0.03 seconds

Extracting Muscle Area with ART2 based Quantization from Rehabilitative Ultrasound Images (ART2 기반 양자화를 이용한 재활 초음파 영상에서의 근육 영역 추출)

  • Kim, Kwang-Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.6
    • /
    • pp.11-17
    • /
    • 2014
  • While safe and convenient, ultrasound imaging analysis is often criticized by its subjective decision making nature by field experts in analyzing musculoskeletal system. In this paper, we propose a new automatic method to extract muscle area using ART2 neural network based quantization. A series of image processing algorithms such as histogram smoothing and End-in search stretching are applied in pre-processing phase to remove noises effectively. Muscle areas are extracted by considering various morphological features and corresponding analysis. In experiment, our ART2 based Quantization is verified as more effective than other general quantization methods.

Texture Comparison with an Orientation Matching Scheme

  • Nguyen, Cao Truong Hai;Kim, Do-Yeon;Park, Hyuk-Ro
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.389-398
    • /
    • 2012
  • Texture is an important visual feature for image analysis. Many approaches have been proposed to model and analyze texture features. Although these approaches significantly contribute to various image-based applications, most of these methods are sensitive to the changes in the scale and orientation of the texture pattern. Because textures vary in scale and orientations frequently, this easily leads to pattern mismatching if the features are compared to each other without considering the scale and/or orientation of textures. This paper suggests an Orientation Matching Scheme (OMS) to ease the problem of mismatching rotated patterns. In OMS, a pair of texture features will be compared to each other at various orientations to identify the best matched direction for comparison. A database including rotated texture images was generated for experiments. A synthetic retrieving experiment was conducted on the generated database to examine the performance of the proposed scheme. We also applied OMS to the similarity computation in a K-means clustering algorithm. The purpose of using K-means is to examine the scheme exhaustively in unpromising conditions, where initialized seeds are randomly selected and algorithms work heuristically. Results from both types of experiments show that the proposed OMS can help improve the performance when dealing with rotated patterns.

Adaptive Background Modeling Considering Stationary Object and Object Detection Technique based on Multiple Gaussian Distribution

  • Jeong, Jongmyeon;Choi, Jiyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.51-57
    • /
    • 2018
  • In this paper, we studied about the extraction of the parameter and implementation of speechreading system to recognize the Korean 8 vowel. Face features are detected by amplifying, reducing the image value and making a comparison between the image value which is represented for various value in various color space. The eyes position, the nose position, the inner boundary of lip, the outer boundary of upper lip and the outer line of the tooth is found to the feature and using the analysis the area of inner lip, the hight and width of inner lip, the outer line length of the tooth rate about a inner mouth area and the distance between the nose and outer boundary of upper lip are used for the parameter. 2400 data are gathered and analyzed. Based on this analysis, the neural net is constructed and the recognition experiments are performed. In the experiment, 5 normal persons were sampled. The observational error between samples was corrected using normalization method. The experiment show very encouraging result about the usefulness of the parameter.

Forgery Detection Mechanism with Abnormal Structure Analysis on Office Open XML based MS-Word File

  • Lee, HanSeong;Lee, Hyung-Woo
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.47-57
    • /
    • 2019
  • We examine the weaknesses of the existing OOXML-based MS-Word file structure, and analyze how data concealment and forgery are performed in MS-Word digital documents. In case of forgery by including hidden information in MS-Word digital document, there is no difference in opening the file with the MS-Word Processor. However, the computer system may be malfunctioned by malware or shell code hidden in the digital document. If a malicious image file or ZIP file is hidden in the document by using the structural vulnerability of the MS-Word document, it may be infected by ransomware that encrypts the entire file on the disk even if the MS-Word file is normally executed. Therefore, it is necessary to analyze forgery and alteration of digital document through internal structure analysis of MS-Word file. In this paper, we designed and implemented a mechanism to detect this efficiently and automatic detection software, and presented a method to proactively respond to attacks such as ransomware exploiting MS-Word security vulnerabilities.

Classification of Tumor cells in Phase-contrast Microscopy Image using Fourier Descriptor (위상차 현미경 영상 내 푸리에 묘사자를 이용한 암세포 형태별 분류)

  • Kang, Mi-Sun;Lee, Jeong-Eom;Kim, Hye-Ryun;Kim, Myoung-Hee
    • Journal of Biomedical Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.169-176
    • /
    • 2012
  • Tumor cell morphology is closely related to its migratory behaviors. An active tumor cell has a highly irregular shape, whereas a spherical cell is inactive. Thus, quantitative analysis of cell features is crucial to determine tumor malignancy or to test the efficacy of anticancer treatment. We use 3D time-lapse phase-contrast microscopy to analyze single cell morphology because it enables to observe long-term activity of living cells without photobleaching and phototoxicity, which is common in other fluorescence-labeled microscopy. Despite this advantage, there are image-level drawbacks to phase-contrast microscopy, such as local light effect and contrast interference ring. Therefore, we first corrected for non-uniform illumination artifacts and then we use intensity distribution information to detect cell boundary. In phase contrast microscopy image, cell is normally appeared as dark region surrounded by bright halo ring. Due to halo artifact is minimal around the cell body and has non-symmetric diffusion pattern, we calculate cross sectional plane which intersects center of each cell and orthogonal to first principal axis. Then, we extract dark cell region by analyzing intensity profile curve considering local bright peak as halo area. Finally, we calculated the Fourier descriptor that morphological characteristics of cell to classify tumor cells into active and inactive groups. We validated classification accuracy by comparing our findings with manually obtained results.

A Study on the 3D Visualization of Typhoons Using the COMS Data

  • Kim, Tae-Min;Choi, Jin-Woo;Park, Jin-Woong;Kim, Hyo-Min;Oh, Sung-Nam;Yang, Young-Kyu
    • Korean Journal of Remote Sensing
    • /
    • v.27 no.6
    • /
    • pp.753-760
    • /
    • 2011
  • The satellite Chollian was successfully launched on June 27, 2010 and is expected to perform its communication, oceanographic, and meteorological duties for seven years. The follow-up launch of the Chollian satellite is already being planned, and diverse studies are under way to enable the use of the Korean satellite data. Studies are also being actively conducted in and out of Korea to visualize the meteorological data on the open-source virtual globes. The meteorological data include ground observation, satellite, and digital-model data. In this study, an efficient three-dimensional technique was developed to visualize typhoons on the virtual globes using the Chollian satellite data. This study was conducted to provide service to the public via the scientific visualization of the satellite image data, and to create an efficient satellite image analysis environment for meteorological researchers.

Determination of Object Similarity Closure Using Shared Neighborhood Connectivity

  • Radhakrishnan, Palanikumar;Arokiasamy, Clementking
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.41-44
    • /
    • 2014
  • Sequential object analysis are playing vital role in real time application in computer vision and object detections.Measuring the similarity in two images are very important issue any authentication activities with how best to compare two independent images. Identification of similarities of two or more sequential images is also the important in respect to moving of neighborhoods pixels. In our study we introduce the morphological and shared near neighborhoods concept which produces a sufficient results of comparing the two images with objects. Considering the each pixel compare with 8-connectivity pixels of second image. For consider the pixels we expect the noise removed images are to be considered, so we apply the morphological transformations such as opening, closing with erosion and dilations. RGB of pixel values are compared for the two sequential images if it is similar we include the pixels in the resultant image otherwise ignore the pixels. All un-similar pixels are identified and ignored which produces the similarity of two independent images. The results are produced from the images with objects and gray levels. It produces the expected results from our process.

Determination of homogeneity index of cementitious composites produced with eps beads by image processing techniques

  • Comak, Bekir;Aykanat, Batuhan;Bideci, Ozlem Salli;Bideci, Alper
    • Computers and Concrete
    • /
    • v.29 no.2
    • /
    • pp.107-115
    • /
    • 2022
  • With the improvements in computer technologies, utilization of image processing techniques has increased in many areas (such as medicine, defence industry, other industries etc.) Many different image processing techniques are used for surface analysis, detection of manufacturing defects, and determination of physical and mechanical characteristics of composite materials. In this study, cementitious composites were obtained by addition of Grounded Granulated Blast-Furnace Slag (GGBFS), Styrene Butadiene polymer (SBR), and Grounded Granulated Blast-Furnace Slag and Styrene Butadiene polymer together (GGBFS+SBR). Expanded Polystyrene (EPS) beads were added to these cementitious composites in different ratios (20%, 40% and 60%). The mechanical and physical characteristics of the composites were determined, and homogeneity indexes of the composites were determined by image processing techniques to determine EPS distribution forms in them. Physical and mechanical characteristics of the produced samples were obtained by applying consistency, density, water absorption, compressive strength (7 and 28 days), flexural strength (7 and 28 days) and tensile splitting strength (7 and 28 days) tests on them. Also, visual examination by using digital microscope, and image analysis by using image processing techniques with open source coded ImageJ program were performed. As a result of the study, it is determined that GGBFS and SBR addition strengthens the adhesion sites formed as it increases the adhesion power of the mixture and helps to get rid of the segregation problem caused by EPS. As a result of the image processing analysis it is demonstrated that GGBFS and SBR addition has positive contribution on homogeneity index.

A New Robust Blind Crypto-Watermarking Method for Medical Images Security

  • Mohamed Boussif;Oussema Boufares;Aloui Noureddine;Adnene Cherif
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.93-100
    • /
    • 2024
  • In this paper, we propose a novel robust blind crypto-watermarking method for medical images security based on hiding of DICOM patient information (patient name, age...) in the medical imaging. The DICOM patient information is encrypted using the AES standard algorithm before its insertion in the medical image. The cover image is divided in blocks of 8x8, in each we insert 1-bit of the encrypted watermark in the hybrid transform domain by applying respectively the 2D-LWT (Lifting wavelet transforms), the 2D-DCT (discrete cosine transforms), and the SVD (singular value decomposition). The scheme is tested by applying various attacks such as noise, filtering and compression. Experimental results show that no visible difference between the watermarked images and the original images and the test against attack shows the good robustness of the proposed algorithm.

A Comparative Analysis of Research Trends in the Information and Communication Technology Field of South and North Korea Using Data Mining

  • Jiwan Kim;Hyunkyoo Choi;Jeonghoon Mo
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.14-30
    • /
    • 2023
  • The purpose of this study is to compare research trends in the information and communication technology (ICT) field between North and South Korea and analyze the differences by using data mining. Frequency analysis, clustering, and network analysis were performed using keywords from seven South Korean and two North Korean ICT academic journals published for five years (2015-2019). In the case of South Korea (S. Korea), the frequency of research on image processing and wireless communication was high at 16.7% and 16.3%, respectively. North Korea (N. Korea) had a high frequency of research, in the order of 18.2% for image processing, 16.9% for computer/Internet applications/security, and 16.4% for industrial technology. N. Korea's natural language processing (NLP) sector was 11.9%, far higher than S. Korea's 0.7 percent. Student education is a unique subject that is not clustered in S. Korea. In order to promote exchanges between the two Koreas in the ICT field, the following specific policies are proposed. Joint research will be easily possible in the image processing sector, with the highest research rate in both Koreas. Technical cooperation of medical images is required. If S. Korea's high-quality image source is provided free of charge to N. Korea, research materials can be enriched. In the field of NLP, it calls for proposing exchanges such as holding a Korean language information conference, developing a Korean computer operating system. The field of student education encourages support for remote education contents and management know-how, as well as joint research on student remote evaluation.