Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

A Review on Image Processing and Image Segmentation.

Jiss Kuruvilla Dhanya Sukumaran Anjali Sankar Siji P Joy


Assistant Professor, Assistant Professor, Assistant Professor, Assistant Professor,
Dept. of Computer Applications, Dept. of Computer Applications, Dept. of Computer Applications, Dept. of Computer Applications,
Sree Narayana Gurukulam Sree Narayana Gurukulam Sree Narayana Gurukulam Nirmala College Muvattupuzha,
College of Engineering College of Engineering College of Engineering Kerala,India
Kadayiruppu, Kerala,India Kadayiruppu, Kerala,India Kadayiruppu, Kerala,India sijiadarsh11@gmail.com
jiss.kuruvilla@gmail.com dhanyasukumaran@hotmail.com anjoos007@gmail.com

Abstract—A methodological study on significance of image 3. Image repossession (search for the image of
processing and its applications in the field of computer interest.)
vision is carried out here. During an image processing 4. Measurement of pattern (measures a range of
operation the input given is an image and its output is an objects in an image.)
enhanced high quality image as per the techniques used . 5. Image acknowledgment (differentiate the objects in
Image processing usually referred as digital image an image)[11]
processing, but optical and analog image processing also are
possible. Our study provides a solid introduction to image II. RELATED WORK
processing along with segmentation techniques, computer
vision fundamentals and its applied applications that will be
of worth to the image processing and computer vision
The evils of digital image segmentation represent
research communities. great challenges for computer vision. The extensive
range of the problems of computer vision may make
Keywords- Image restoration; Image segmentation; Face good use of image segmentation. Many researchers
Detection; Character Recognition; Signature Verification; had created several methods to deal with the problem
Biometrics; Automatic Target Recognition; Fuzzy C-Mean. of image segmentation. Zimmer et al. [12] created a
method to detect the mobility of live cells using the
I. INTRODUCTION active contour (snakes) method. Mukherjee et al. [14]
modified a method to handle the tracking problem
In digital image processing, computer algorithms are
using threshold method. Coskun et al. [13] used the
used to perform image processing. Digital image
inverse modelling to detect the mobility of living
processing has several advantages over the analog image
cells. Recently there have been a number of
processing. It provides a large number of algorithms to be
researchers has tried to create several image
used with the input data. In digital image processing we
segmentation algorithms as in (Krinidis et al.,
can avoid some processing problems such as noise
creation and signal distortion at some point in signal Mélange, et al., Mignotte et al.). In this paper we
processing. In 2000s, fast computers became available for managed to review and summarize the major
signal processing and digital image processing has techniques for digital image segmentation.
become the popular form of image processing. For the
III. IMAGE PROCESSING & ITS APPLICATIONS
reason that, signal image processing became versatile
method, and also cheapest [1].
A. Image Enhancement
Image enhancement changes the visual impact that the
Image processing using analog techniques can be used
image has on the interpreter in a way that improves the
for the hard copies like printouts and photographs. Image
information content. It sharpens image features such as
analysts use a range of fundamentals of interpretation
edges, boundaries, or contrast in order to make a graphic
while using these visual techniques. The image processing
display more helpful for display and analysis. Image
is not just restricted to area that has to be studied but on
enhancement techniques are applied where subjective
knowledge of analyst. Association is another important
excellence of images is important for individual
tool in image processing through visual techniques. So
interpretation. Many algorithms for accomplishing
analysts apply a mixture of personal knowledge and
collateral data to image processing. contrast enhancement have been developed and applied to
Image processing is very strongly related to computer problems in image processing.
vision and computer graphics. The goals of image a. Contrast enhancement
b. Intensity, hue, and saturation transformations
processing can be divided into five groups:
c. Density slicing
1. Hallucination (monitor the objects that are not
d. Edge enhancement
visible.)
e. Making digital mosaics
2. Image restoration and sharpening (for creating
f. Producing synthetic stereo images
better image.)
g. Noise removal using a Wiener filter accuracy for the majority fonts are now usual. Some
h. Linear contrast adjustment marketable methods are capable of duplicating formatted
i. Median filtering output that very much look like the original scanned pane
j. Unsharp mask filtering. including columns, images and other non-textual
components [6].
B. Image Restoration
Image Restoration takes a corrupt/noisy image and
estimates the clean, original image. Corruption may come
in many forms such as motion blur, noise and camera
mis-focus. The purpose of image restoration is to restore
images that have been degraded . It is similar to image
enhancement, but more objective. In cases where the
image is corrupted by noise, the best we may hope to do
is to compensate for the degradation it caused. Image
restoration is different from image enhancement. Image
enhancement is designed to give emphasis to features of
the image that make the image more pleasant to the
observer, but does not necessarily generate realistic data
from a scientific point of view. Image Enhancement
methods like stretching contrast, de-blurring by a nearest
neighbor process supplied by imaging packages do not
use priori model of the method that created the image.[3]
Figure- 1: Flowchart of OCR [11]
C. Image Compression
Image compression is an application of data F. Signature Verification
compression that helps to decrease irrelevance and A handwritten signature is one of the most employed
idleness of the image data in order to be able to store data form of secure personal authentication. Signature
in incompetent form[ 11]. The aim of image compression verification can be performed in two ways: offline
is to reduce the redundancy of the image and to store data signature verification and on-line signature verification.
in an efficient form. Image compression can be lossy or Offline systems use the scanned image of a signature.
lossless. Lossless compression is preferential for archival And the online systems use the samples that are captured
reasons and frequently for medical image processing, at the time the signature is made. Generally, the offline
technical drawings etc. signature verification system is composed of three stages:
a) Preprocessing : In this step ,a range of operations
D. Face Detection are applied to the signature image to improve the quality
Face recognition system is the most accurate among of the signature and this quality image increases the
the whole types of biometric. The final goal of researchers accuracy of the feature extraction and verification.
in this part is to enable computers to try to be like the b) Feature extraction : This process identifies and
human vision system. To attain this objective,” Strong differentiates an individual signature by applying various
and coordinated effort between the computer vision, types of features such as global features, geometric
signal processing, and psychophysics and neurosciences features and texture features.
communities is needed”[ 7] c) Verification: The incoming image signature
features are compared with genuine signature features
E. Character Recognition based on some pattern classification techniques and
Character recognition enhances the processing of makes a final decision for verification as genuine or
scanned images by allowing us to automatically identify forged signature.
and take out text content from different data fields. For
example, when we scan a form and use document imaging
software to process it, OCR allows us to transfer
information directly from the document to an electronic
database. Optical Character Recognition(OCR) is the
electronic alteration of scanned or photo images of
typewritten or printed text into computer-readable text. It
is a technique of digitizing printed manuscripts such that
they can be by electronic means edited, searched, text-to-
speech, key data extraction and text mining. Early
versions performed this automation with images of every Figure 2. General overview of Static signature verification
character. But it could function, only one font at a time. system [8]
"Intelligent" structures with a great degree of gratitude
Some of the static signature verification methods are a) Feature Extractor
Template matching techniques, Hidden Markov Models Feature extraction is the core of fingerprint
(HMMs), Support Vector Machines (SVMs), etc. technology. The captured image is enhanced and noise
is removed by using noise reduction algorithm which
G. Biometrics processes the image and determines minutiae.
Biometrics refers to metrics related to the
characteristics of human beings, such as fingerprints,
hand geometry, signatures ,retina and iris patterns, voice
waves, DNA etc.
New and emerging biometric techniques are:
1. Human scent recognition
2. EEG biometrics
3. Skin spectroscopy
4. Knuckles texture
5. Finger nail recognition [15]
Figure- 4: Example of image enhancement.
TABLE I. COMPARISON OF BIOMETRIC TECHNIQUES [15]
Most frequently used minutiae in applications
Biometrics Accuracy Cost Size of Long term Security •Points of bifurcation
template stability level •Ridge endings
Facial Low High Large Low Low
Recognition

Iris Scan High High Small Medium Medium

Finger Print Medium Low Small Low Low

Finger Vein High Medium Medium High High

Voice Low Medium Small Low Low Figure- 5: Two commonly used fingerprint features
Recognition
Here minutiae Coordinate and Angle are calculated. Core
Lip Medium Medium Small Medium High is used as center of reference (0, 0).
Recognition

Fingerprint recognition is one of the most popular


biometric techniques used in automatic personal
identification and verification. Every individual has
unique fingerprints. Most fingerprint matching systems
are based on four types of fingerprint representation
schemes: gray scale image, phase image, skeleton image,
and minutiae. Due to its distinctiveness, compactness, and
compatibility with features used by human fingerprint
experts, minutiae-based representation has become the
most widely adopted fingerprint representation
scheme[16].
Figure- 6: Components of a minutiae feature
1) Advanced Minutiae Based Algorithm
b) Matcher
The fingerprint images are matched to those in the
database for either identification (one-to-many matching)
or verification (one-to-one matching).

Figure- 3: Advanced Minutiae Based Algorithm.


algorithms and techniques have been developed for image
segmentation.

Even though different segmentation techniques are at


hand, every method is not equally appropriate for a
particular type of image. Thus the algorithm suitable for
one class of image may not be suitable for another class
of images. Consequently, there is no unanimously
supported method for image segmentation for all
categories of images and as a result it remains a challenge
in image processing and computer vision[5].
Figure- 7: Finger print matching[9].
Segmentation can be classified as follows:
H. Automatic Target Recognition •Region Based
The main objective of the Automatic Target •Edge Based
Detection/Recognition (ATDR) is to detect, classify and •Threshold
track the target objects embedded in an image produced •Feature Based Clustering
by laser radar, synthetic-aperture radar (SAR), or an
infrared or video camera. The first steps in the ATDR A. Region Based
process is to convert the signal from the sensor into a Region is a group of connected pixels having similar
digital image for further processing and then separate the properties. Region based segmentation is a process of
target from its background or surrounding area by partitioning an image into region. Regions are used to
extracting a coarse shape or outline of the target object. interpret images. A region may correspond to particular
Finally, identify the object by matching the features object or different parts of an object. Region-based
describing the target object [4]. Segmentation is one of techniques are generally better in noisy images (where
the main steps in image analysis for Detection, borders are difficult to detect). Fair accuracy levels are
recognition and identification of objects. Several offered in region based methods.
techniques and algorithms have been developed for image
segmentation process like Edge Detection Methods, B. Edge Based
Region Splitting and Region Growing Methods, Image segmentation algorithms generally are based on
Clustering Methods. Many algorithms and techniques are discontinuous intensity values and similar intensity
utilized in ATR process, but no satisfactory single values. In case of discontinuous intensity values, the
approach has yet been found. We can make a high approach is to partition the image based on abrupt
performance ATR system by blending several approaches changes in intensity, such as edges in an image.
together. Segmentation based on Edge Detection refers to the
boundaries where there is an abrupt change in the
I. Image Traffic Monitoring intensity or brightness value of the image. Edge detection
The primary job of traffic monitoring is acquisition of is the problem of primary value in image analysis. The
traffic data and detection of incident. The application of obtained boundary marks the edges of the desired object.
image processing methods for the vehicle detection is Hence by the detection of its edges, the object can be
that, from the series of video images the acquisition of segmented from the image. The output that is received by
traffic data and detection of traffic incident is achieved. applying edge detection algorithm is a binary image. Edge
The most practical application is vehicle tracking. Traffic based methods are interactive in nature . There are three
analysis then leads to reports of speed violations, traffic fundamental steps in edge detection
congestions, accidents, or against the law actions of road o Filtering & Enhancement :In order to facilitate the
users. Several scientists and researchers suggested a detection of edges, it is essential to repress as much noise
variety of approaches to these tasks. as possible and determine changes in intensity in the
neighborhood of a point, without destroying the true
IV. IMAGE SEGMENTATION edges.
o Detection of edge points: determine which edge
The process of partitioning an image into component pixels should be discarded as noise and which should be
regions or objects, so as to change the representation of an retained (usually, thresholding provides the criterion used
image into something that is more easier to analyze in for detection).
order to get more information in the region of interest in o Edge localization: Not all of the points in an image
an image which helps in annotation of the object scene is are edges for a particular application. Edge localization
referred to as image segmentation. Image segmentation is determine the exact location of an edge. Edge thinning
needed in order to identify the content of the image and linking are usually required in this step.[5]
carefully. In this context, edge detection is a fundamental
tool for image segmentation. Several general-purpose
C. Threshold TABLE II. IMAGE SEGMENTATION METHODS:
A COMPARATIVE STUDY
Image segmentation by thresholding is a simple and
powerful technique for segmenting images having light
objects on shady background. Thresholding operation
converts a multi level image into a binary image by
choosing an appropriate threshold T and divide image
pixels into several regions and separate objects from
background. The separation of the objects from the
background is generally done by selecting a value T.
Depending on the thresholding value there are two
techniques . Local thresholding and global thresholding
[10]. When T is constant, the approach is called global
thresholding otherwise it is called local thresholding. If
the background illumination is uneven then the global
thresholding method become failed. But these uneven
illuminations are compensated in local thresholding
method by using multiple thresholds.

If the intensity of any pixel (x,y) is greater than or


equal to the threshold value, then it is considered as a part
of the object otherwise it belongs to background.
Resistance to noise is less when we adopt this method.

D. Feature Based Clustering V. CONCLUSION


Clustering is the process of grouping together of
objects based on some similar properties so that each We have presented a systematic study of image
cluster contains similar objects which are dissimilar to the processing and its applications in this paper. We tried to
objects of other clusters. Clustering is a process which can present the bedrock of image processing and
be performed by different algorithms using different segmentation techniques. We have discussed the basics of
methods for computing or finding the cluster. The quality image processing such as image, image-analysis and
of the good clustering methods produces high intra-cluster understanding, image-transforms, compression
and low inter-cluster similarities. A general approach to techniques, optical character recognition (OCR) and its
image clustering involves addressing the following issues: applications. The segmentation method can be divided
1. How to represent the image. into different type based on the constraint selected for
2. How to organize the data. segmentation like pixel intensity, homogeneity,
3. How to classify an image to a certain cluster. discontinuity, cluster data, topology etc. Each approach
The Clustering methods are classified into K mean has pros and cons. The outcome obtained using one
clustering, Fuzzy C- Means[FCM] Algorithm etc. K- segmentation approach may not be the same as compared
means is one of the fast, robust, simplest unsupervised with other approach.
learning algorithms that solve the well known clustering In spite of several decades of research, there is no
problem. The method is to classify the given data set universally accepted image segmentation algorithm since
through a certain number of k clusters that are fixed a image segmentation is affected by lots of factors such as
priori. K-means clustering algorithms gives optimal result type of image, color, intensity, level of noise, etc. Thus
when data set are dissimilar. there is no single algorithm that is applicable on all types
Fuzzy Clustering is a method which allow the objects of images and nature of problem. Due to all above factors,
to belong to more than one cluster with different image segmentation still remains a big pending problem
membership. This is the one of the effective method for in the areas of image processing.Methods that are specific
pattern recognition. Most commonly used fuzzy to particular applications often achieve better performance
clustering algorithms is the Fuzzy C-Mean[17]. By using and the selection of proper approach to a segmentation
FCM we can retain information of the data set. In FCM, problem can be a difficult problem. A single approach to
the data point is assigned membership to each cluster segment all variety of images may be practically
center as a result of which data point may belong to more unfeasible. The previous knowledge on the image can
than one cluster center. give better results and gives user the choice to choose
appropriate method to segment the image.

REFERENCES
[1] Ashraf A. Aly , Safaai Bin Deris, Nazar Zaki;”Research review for
digital segmentation techniques”;International Journal of
Computer Science & Information Technology (IJCSIT) Vol 3, No Research in Engineering and Technology eISSN: 2319-1163 |
5, Oct 2011 pISSN: 2321-7308
[2] Rafael C.Gonzalez and Richard E.Woods, A textbook on “Digital [12] Zimmer, C., Labruyre, E., Meas-Yedid, V., Guilln, N., and Olivo-
Image Processing”,Publications of Pearson,Second Edition,2002. Marin, J. (2002). Segmentation and tracking of migrating cells in
[3] en.wikipedia.org/wiki/Image_processing. videomicroscopy with parametric active contours:a tool for cell-
[4] G.N.SRINIVASAN, Dr. SHOBHA G,”Segmentation Techniques based drug testing. IEEE TransMed Imaging, 21(10):1212–21.
for Target Recognition”,International Journal Of Computers And [13] Coskun, H., Li, Y., and Mackey, M. A. (2007). Ameboid cell
Communication,Issue 3, Volume 1, 2007 motility: A model and inverse problem, with an application to
[5] Jiss Kuruvilla,, Anjali Sankar, Dhanya Sukumaran,”A Study on livecell imaging data. Journal of Theoretical Biology, 244(2): 169–
image analysis of Myristica fragrans for Automatic 179
Harvesting”IOSR Journal of Computer Engineering (IOSR-JCE)e- [14] Dzyubachyk O, Niessen W, Meijering E:Advanced Level - Set
ISSN: 2278-0661,p-ISSN: 2278-8727PP50-55 Based Multiple - Cell Segmentation and Tracking in Time – Lapse
[6] Ayatullah Faruk Mollah, Nabamita Majumder, Subhadip Basu and Fluorescence Microscopy Images. In IEEE International
Mita Nasipuri, "Design of an Optical Character Recognition Symposium on Biomedical Imaging: From Nano to Macro Edited
System for Camera based Handheld Devices", IJCSI International by: Olivo- Marin JC, Bloch I, Laine A. IEEE, Piscataway, NJ;
Journal of Computer Science Issues, Volume: 8, July-2011 . 2008:185-188.
[7] L. Torres, "Is there any hope for face recognition?" in Proc. of the [15] Rupinder Saini , Narinder Rana Rayat ,Comparison of various
5th International Workshop on Image Analysis for Multimedia biometric methods,, International Journal of Advances in Science
Interactive Services (WIAMIS 2004). Lisboa, Portugal, 2004. and Technology (IJAST),ISSN 2348-5426
[8] Vitthal K. Bhosale, Dr. Anil R. Karwankar,”Automatic Static [16] Jianjiang Feng, Member, IEEE, and Anil K. Jain, Fellow,
Signature Verification Systems: A Review”,International Journal Fingerprint Reconstruction: From Minutiae to Phase,IEEE
Of Computational Engineering Research (ijceronline.com) Vol. 3 TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE
Issue. 2 INTELLIGENCE.
[9] Naser Zaeri, Dr. Jucheng Yang (Ed.)”Minutiae-based Fingerprint [17] A.J. Patil, C.S.Patil, R.R.Karhe, M.A.Aher.”Comparative Study of
Extraction and Recognition, Biometrics”,ISBN: 978-953-307-618- Different Clustering Algorithms,International Journal of Advanced
8 Research in Electrical, Electronics and Instrumentation
[10] Muller H, Michoux N, Bandon D, Geissbuhler A. “A review of Energy,ISSN ONLINE(2278-8875) PRINT (2320-3765)
content based image retrieval systems in medical applications
clinical benefits and future directions”. Int J Med Inform 2004;73:1
[11] Basavaprasad B1, Ravi M2,“A study on the importance of image
processing and its applications”, IJRET: International Journal of

You might also like