Professional Documents
Culture Documents
Project Seminar
Project Seminar
Abstract—A methodological study on significance of image 3. Image repossession (search for the image of
processing and its applications in the field of computer interest.)
vision is carried out here. During an image processing 4. Measurement of pattern (measures a range of
operation the input given is an image and its output is an objects in an image.)
enhanced high quality image as per the techniques used . 5. Image acknowledgment (differentiate the objects in
Image processing usually referred as digital image an image)[11]
processing, but optical and analog image processing also are
possible. Our study provides a solid introduction to image II. RELATED WORK
processing along with segmentation techniques, computer
vision fundamentals and its applied applications that will be
of worth to the image processing and computer vision
The evils of digital image segmentation represent
research communities. great challenges for computer vision. The extensive
range of the problems of computer vision may make
Keywords- Image restoration; Image segmentation; Face good use of image segmentation. Many researchers
Detection; Character Recognition; Signature Verification; had created several methods to deal with the problem
Biometrics; Automatic Target Recognition; Fuzzy C-Mean. of image segmentation. Zimmer et al. [12] created a
method to detect the mobility of live cells using the
I. INTRODUCTION active contour (snakes) method. Mukherjee et al. [14]
modified a method to handle the tracking problem
In digital image processing, computer algorithms are
using threshold method. Coskun et al. [13] used the
used to perform image processing. Digital image
inverse modelling to detect the mobility of living
processing has several advantages over the analog image
cells. Recently there have been a number of
processing. It provides a large number of algorithms to be
researchers has tried to create several image
used with the input data. In digital image processing we
segmentation algorithms as in (Krinidis et al.,
can avoid some processing problems such as noise
creation and signal distortion at some point in signal Mélange, et al., Mignotte et al.). In this paper we
processing. In 2000s, fast computers became available for managed to review and summarize the major
signal processing and digital image processing has techniques for digital image segmentation.
become the popular form of image processing. For the
III. IMAGE PROCESSING & ITS APPLICATIONS
reason that, signal image processing became versatile
method, and also cheapest [1].
A. Image Enhancement
Image enhancement changes the visual impact that the
Image processing using analog techniques can be used
image has on the interpreter in a way that improves the
for the hard copies like printouts and photographs. Image
information content. It sharpens image features such as
analysts use a range of fundamentals of interpretation
edges, boundaries, or contrast in order to make a graphic
while using these visual techniques. The image processing
display more helpful for display and analysis. Image
is not just restricted to area that has to be studied but on
enhancement techniques are applied where subjective
knowledge of analyst. Association is another important
excellence of images is important for individual
tool in image processing through visual techniques. So
interpretation. Many algorithms for accomplishing
analysts apply a mixture of personal knowledge and
collateral data to image processing. contrast enhancement have been developed and applied to
Image processing is very strongly related to computer problems in image processing.
vision and computer graphics. The goals of image a. Contrast enhancement
b. Intensity, hue, and saturation transformations
processing can be divided into five groups:
c. Density slicing
1. Hallucination (monitor the objects that are not
d. Edge enhancement
visible.)
e. Making digital mosaics
2. Image restoration and sharpening (for creating
f. Producing synthetic stereo images
better image.)
g. Noise removal using a Wiener filter accuracy for the majority fonts are now usual. Some
h. Linear contrast adjustment marketable methods are capable of duplicating formatted
i. Median filtering output that very much look like the original scanned pane
j. Unsharp mask filtering. including columns, images and other non-textual
components [6].
B. Image Restoration
Image Restoration takes a corrupt/noisy image and
estimates the clean, original image. Corruption may come
in many forms such as motion blur, noise and camera
mis-focus. The purpose of image restoration is to restore
images that have been degraded . It is similar to image
enhancement, but more objective. In cases where the
image is corrupted by noise, the best we may hope to do
is to compensate for the degradation it caused. Image
restoration is different from image enhancement. Image
enhancement is designed to give emphasis to features of
the image that make the image more pleasant to the
observer, but does not necessarily generate realistic data
from a scientific point of view. Image Enhancement
methods like stretching contrast, de-blurring by a nearest
neighbor process supplied by imaging packages do not
use priori model of the method that created the image.[3]
Figure- 1: Flowchart of OCR [11]
C. Image Compression
Image compression is an application of data F. Signature Verification
compression that helps to decrease irrelevance and A handwritten signature is one of the most employed
idleness of the image data in order to be able to store data form of secure personal authentication. Signature
in incompetent form[ 11]. The aim of image compression verification can be performed in two ways: offline
is to reduce the redundancy of the image and to store data signature verification and on-line signature verification.
in an efficient form. Image compression can be lossy or Offline systems use the scanned image of a signature.
lossless. Lossless compression is preferential for archival And the online systems use the samples that are captured
reasons and frequently for medical image processing, at the time the signature is made. Generally, the offline
technical drawings etc. signature verification system is composed of three stages:
a) Preprocessing : In this step ,a range of operations
D. Face Detection are applied to the signature image to improve the quality
Face recognition system is the most accurate among of the signature and this quality image increases the
the whole types of biometric. The final goal of researchers accuracy of the feature extraction and verification.
in this part is to enable computers to try to be like the b) Feature extraction : This process identifies and
human vision system. To attain this objective,” Strong differentiates an individual signature by applying various
and coordinated effort between the computer vision, types of features such as global features, geometric
signal processing, and psychophysics and neurosciences features and texture features.
communities is needed”[ 7] c) Verification: The incoming image signature
features are compared with genuine signature features
E. Character Recognition based on some pattern classification techniques and
Character recognition enhances the processing of makes a final decision for verification as genuine or
scanned images by allowing us to automatically identify forged signature.
and take out text content from different data fields. For
example, when we scan a form and use document imaging
software to process it, OCR allows us to transfer
information directly from the document to an electronic
database. Optical Character Recognition(OCR) is the
electronic alteration of scanned or photo images of
typewritten or printed text into computer-readable text. It
is a technique of digitizing printed manuscripts such that
they can be by electronic means edited, searched, text-to-
speech, key data extraction and text mining. Early
versions performed this automation with images of every Figure 2. General overview of Static signature verification
character. But it could function, only one font at a time. system [8]
"Intelligent" structures with a great degree of gratitude
Some of the static signature verification methods are a) Feature Extractor
Template matching techniques, Hidden Markov Models Feature extraction is the core of fingerprint
(HMMs), Support Vector Machines (SVMs), etc. technology. The captured image is enhanced and noise
is removed by using noise reduction algorithm which
G. Biometrics processes the image and determines minutiae.
Biometrics refers to metrics related to the
characteristics of human beings, such as fingerprints,
hand geometry, signatures ,retina and iris patterns, voice
waves, DNA etc.
New and emerging biometric techniques are:
1. Human scent recognition
2. EEG biometrics
3. Skin spectroscopy
4. Knuckles texture
5. Finger nail recognition [15]
Figure- 4: Example of image enhancement.
TABLE I. COMPARISON OF BIOMETRIC TECHNIQUES [15]
Most frequently used minutiae in applications
Biometrics Accuracy Cost Size of Long term Security •Points of bifurcation
template stability level •Ridge endings
Facial Low High Large Low Low
Recognition
Voice Low Medium Small Low Low Figure- 5: Two commonly used fingerprint features
Recognition
Here minutiae Coordinate and Angle are calculated. Core
Lip Medium Medium Small Medium High is used as center of reference (0, 0).
Recognition
REFERENCES
[1] Ashraf A. Aly , Safaai Bin Deris, Nazar Zaki;”Research review for
digital segmentation techniques”;International Journal of
Computer Science & Information Technology (IJCSIT) Vol 3, No Research in Engineering and Technology eISSN: 2319-1163 |
5, Oct 2011 pISSN: 2321-7308
[2] Rafael C.Gonzalez and Richard E.Woods, A textbook on “Digital [12] Zimmer, C., Labruyre, E., Meas-Yedid, V., Guilln, N., and Olivo-
Image Processing”,Publications of Pearson,Second Edition,2002. Marin, J. (2002). Segmentation and tracking of migrating cells in
[3] en.wikipedia.org/wiki/Image_processing. videomicroscopy with parametric active contours:a tool for cell-
[4] G.N.SRINIVASAN, Dr. SHOBHA G,”Segmentation Techniques based drug testing. IEEE TransMed Imaging, 21(10):1212–21.
for Target Recognition”,International Journal Of Computers And [13] Coskun, H., Li, Y., and Mackey, M. A. (2007). Ameboid cell
Communication,Issue 3, Volume 1, 2007 motility: A model and inverse problem, with an application to
[5] Jiss Kuruvilla,, Anjali Sankar, Dhanya Sukumaran,”A Study on livecell imaging data. Journal of Theoretical Biology, 244(2): 169–
image analysis of Myristica fragrans for Automatic 179
Harvesting”IOSR Journal of Computer Engineering (IOSR-JCE)e- [14] Dzyubachyk O, Niessen W, Meijering E:Advanced Level - Set
ISSN: 2278-0661,p-ISSN: 2278-8727PP50-55 Based Multiple - Cell Segmentation and Tracking in Time – Lapse
[6] Ayatullah Faruk Mollah, Nabamita Majumder, Subhadip Basu and Fluorescence Microscopy Images. In IEEE International
Mita Nasipuri, "Design of an Optical Character Recognition Symposium on Biomedical Imaging: From Nano to Macro Edited
System for Camera based Handheld Devices", IJCSI International by: Olivo- Marin JC, Bloch I, Laine A. IEEE, Piscataway, NJ;
Journal of Computer Science Issues, Volume: 8, July-2011 . 2008:185-188.
[7] L. Torres, "Is there any hope for face recognition?" in Proc. of the [15] Rupinder Saini , Narinder Rana Rayat ,Comparison of various
5th International Workshop on Image Analysis for Multimedia biometric methods,, International Journal of Advances in Science
Interactive Services (WIAMIS 2004). Lisboa, Portugal, 2004. and Technology (IJAST),ISSN 2348-5426
[8] Vitthal K. Bhosale, Dr. Anil R. Karwankar,”Automatic Static [16] Jianjiang Feng, Member, IEEE, and Anil K. Jain, Fellow,
Signature Verification Systems: A Review”,International Journal Fingerprint Reconstruction: From Minutiae to Phase,IEEE
Of Computational Engineering Research (ijceronline.com) Vol. 3 TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE
Issue. 2 INTELLIGENCE.
[9] Naser Zaeri, Dr. Jucheng Yang (Ed.)”Minutiae-based Fingerprint [17] A.J. Patil, C.S.Patil, R.R.Karhe, M.A.Aher.”Comparative Study of
Extraction and Recognition, Biometrics”,ISBN: 978-953-307-618- Different Clustering Algorithms,International Journal of Advanced
8 Research in Electrical, Electronics and Instrumentation
[10] Muller H, Michoux N, Bandon D, Geissbuhler A. “A review of Energy,ISSN ONLINE(2278-8875) PRINT (2320-3765)
content based image retrieval systems in medical applications
clinical benefits and future directions”. Int J Med Inform 2004;73:1
[11] Basavaprasad B1, Ravi M2,“A study on the importance of image
processing and its applications”, IJRET: International Journal of