SlideShare a Scribd company logo
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
DOI: 10.5121/ijci.2016.5416 135
TARGET DETECTION USING MULTI
RESOLUTION ANALYSIS FOR CAMOUFLAGED
IMAGES
Chennamsetty Pulla Rao1
, Dr. A Guruva Reddy2
and Dr. C.B. Rama Rao3
1
Research scholar, Department of ECE, JNTU Kakinada
2
Professor, Department of ECE, MIC College of Technology
3
Associate professor, Department of ECE, NIT Warangal
ABSTRACT
Target detection is a challenging problem having many applications in defense and civil. Most of the
targets in defense are camouflaged. It is difficult for a system to detect camouflaged targets in an image. A
novel and constructive approach is proposing to detect object in camouflage images. This method uses
various methodologies such as 2-D DWT, gray level co-occurrence matrix (GLCM), wavelet coefficient
features, region growing algorithm and canny edge detection. Target detection is achieved by calculating
wavelet coefficient features from GLCM of transformed sub blocks of the image. Seed block is obtained by
evaluating wavelet coefficient features. Finally the camouflage object is highlighted using image
processing schemes. The proposed target detection system is implemented in Matlab 7.7.0 and tested on
different kinds of images.
KEYWORDS
Canny edge detection, Region growing, seed block, Wavelet decomposition
1. INTRODUCTION
Target detection in camouflaged images is one of the most important applications of computer
vision. Target detection in camouflaged images is an approach by which we identify one or group
of target objects in scene. It is very easy for a human to identify different objects in image but it’s
difficult for a computer program to identify different objects [2]. In target detection in
camouflaged images, images are of different types such as visual, Aerial, IR, etc and they are
under different categories (stationary target, moving target) and environments (atmospheric
turbulences). It is difficult for a computer program to detect target in these restrictions [3]. Till
now so many researches are going on this approach. Some of those approaches [8] are like using
pattern recognition, wavelets, texture, connectivity component based approach, descriptors based
methods and traditional thresholding methods so on. In developing a system, there are many
difficulties like recognition accuracy, occupation of size (image) and execution time so on. These
are the things that motivated me to solve some of those issues. My concentration is towards the
approach that based on wavelet decomposition and wavelet coefficient features.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
136
Figure 1. Simplified model for target detection system
The approach of this paper is to build a constructive approach for target detection in camouflaged
images that recognize the targets in different kinds of images. To make a system that can able to
take images of any size, colour or gray, and related to different environments. It should able to
detect targets of any size and in any environment. Target detection in camouflaged images can be
done using several approaches; a simplified model is shown in figure 1. Wavelet transform is
chosen as it is one of the novel techniques for solving target detection problem.
Camouflage is a natural phenomenon of many animals in the nature. It is an advantage to them,
so that they can protect themselves from their enemies. The similar camouflage technique is used
in military applications. Generally in military applications, camouflage paint patterns are used for
concealing soldiers and their equipment from being detected by the enemy, making them appear
to be part and parcel of the natural environmental conditions surrounding them. The extent to
which we can camouflage will only be limited by our imagination. Different items are used for
these purpose but the ones that standout are face painting, leaves also some fabrics are dyed in
shades of green, tan, black, brown so as to make the wearer indistinguishable from the
surroundings. Wearer may be a human being, or any other equipment.
Different camouflage paint patterns are used depending on the seasonal changes and the type of
terrain used. The standard camouflage colors are blue, regular, desert and woodland. From these
basic colors we can come up with desert sand, forest green, light green, white, earth yellow
among other colors. Colors should always be chosen from the base color followed by the
highlights. The surrounding areas will always determine the type of pattern and colors to use.
2. SCOPE OF APPROACH
Under different types of atmospheric turbulences and different kinds of targets under different
environments with the help of seed blocks it is possible to recognize the objects in images. So all
these approaches are characterize with the help of multi resolution analysis, similarly by the
technique of canny edge detection invented by canny is using to extract the edges of target in the
camouflaged kinds of images as explained above.
3. SELECTED METHODS
There are many methods provided by researchers for recognition of objects. In those few of
methods are met their requirements. Based on the advanced computer vision approaches here we
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
137
suggested the approach like using multi resolution analysis with traditional edge detection and
seed block approaches.
Filter bank structure is the simple implementation of 1-D DWT, whereas image processing
applications requires two dimensional implementation of wavelet transform [4]. Implementation
of 2-D DWT is also referred to as „multidimensional‟ wavelet transform. The multiresolution
analysis as shown in Figure 3.1 This process continues until some final scale is reached.
(a) (b)
Figure 3.1: (a) One level wavelet transform (b) Two level wavelet transform
From the obtained gray level co-occurrence matrix, significant wavelet coefficient features
(WCFs) preferably contrast, cluster shade, and cluster prominence are evaluated [1]. The features
are selected for logarithmic normalization on their dynamic range of values. Several parameters
associated with the co-occurrence matrix are contrast, energy, entropy, cluster prominence,
cluster shade, and local homogeneity. As we know how the GLCM from the Harlick suggested
method. From the obtained gray level co-occurrence matrix, significant wavelet coefficient
features are computed using the formulae given below [2]
Coming to the edge detection technique the traditional technique is The Canny edge detection
operator was developed by John F. Canny in 1986 this method works better compared to sobel
and prewitt operators. The Canny edge detection algorithm is known to many as the optimal edge
detector. Canny proposed some criteria to improve the earlier edge detection methods. An image
and its canny detected image are shown in the following figures 3.3.
Figure 3.3: Original and Canny edge detected image
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
138
4. PROPOSED METHOD
Identification of object in camouflaged images is a difficult approach due to the stochastic nature
of background from the foreground. So traditional approaches and processing schemes is will not
provide a satisfactory results due to its randomness in order to solve the problem in camouflage
images object identification proposing a constructive approaches witch will overcome the
problems in traditional processing schemes. In the proposing approach the results are found to be
satisfactory. The block diagram for the proposed Target Detection in Camouflaged images
system [1, 2] is given in the figure4.1 Input image. Similarly the Process flowchart shows all the
steps involved in this proposed method is shown in figure 4.2
Figure 4.1: Target detection system
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
139
Figure 4.2: Flow chart of proposed target detection system
A. Image resizing:
Consider a camouflage image of different dimensions such that we can divide it into 32 x32 or 16
x16 in the next step. Generally in this system we resizes into 512 x512. If the assumed image is
color image convert it in to gray scale image for better processing. Then in the further steps we
can process easily and able to calculate GLCM [7]. It is shown in the figure 4.3.
(a) (b)
Figure 4.3: (a) Original image of size 356 x 355 x 3, (b) Resized image of size 512 x512
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
140
B. Making sub image blocks:
This proposed system works on the principle of fixed window size technique. If image is resized
into 512 x512, and if we divide into sub images of each size 32x32, we get 256 sub images. If we
divide into 16 x16, we get 512 sub images. Block size depends up on the dimension of the object
and the image.
Figure 4.4: Sub image block
Once sub images are obtained, we have to process each sub image separately in the further steps.
Finally we have to select seed block i.e., sub image block having the highest sum of wavelet
coefficient features. Using the seed block, processing techniques are used to detect the target
C. DWT Decomposition:
After dividing input image into sub image blocks, each sub image block is decomposed using 2-
D DWT. Different wavelets are there to apply such as Haar, Daubechies, Meyer, Morlett and
Symlets. In the proposed method Daubechies wavelet is used which is of order 2. It is represented
as db2. If the size of sub block is more the level of decomposition is to be large in number if it is
not so then small number level of decomposition is enough for multi resolution analysis purpose.
Level of decomposition is 2 for this system. After decomposition, we get wavelet coefficients.
The lower level in decomposition gives coarse level of coefficients which means approximation
coefficients and higher levels give finest scale wavelet coefficients which means detail
coefficients.
If image is resized into 512 x 512 and divided into sub images of size 32 x 32, 256 sub images
are obtained. Then after applying DWT decomposition 256 wavelet coefficients vectors are
obtained.
D. Feature extraction:
From the transformed sub block of camouflage image features are evaluated by statistical means
to find the seed block details from set of sub blocks to process further. The feature are calculating
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
141
by using gray level co-occurrence matrices which is a statistical model based on the probability
of occurrence of gray tone values. The statistical features based on GLCM which are cluster
prominence, cluster shade and contrast used to evaluate seed block from a set of sub block. The
seed block is identified by highest sum of statistical features in each sub block.
Region growing process:
Region growing is a region based segmentation process in which sub regions are grown into
larger regions based on predefined criteria such as threshold and adjacency. In developed
approach, the region growing algorithm is based on mean distance method [1].
In this method, the first step is to sort the feature values of all the windows, that is, sub image
blocks in ascending order so that the window whose value is the largest would be the seed
window. The threshold is determined by finding the average (A) of the first n% of the windows,
which are adaptively chosen depending upon the target image. Now, the statistical feature values
like (cluster details and contrast) of all the 8-adjacent blocks are compared with the average
value, A, and the Shigh value. The window whose value is closer to Shigh (obtained from the seed
block) value will be merged with the seed window. This process is repeated for all 8 adjacent
blocks. If no window is merged from the 8 adjacent blocks, then the algorithm terminates. If at
least one window is merged from the 8 adjacent blocks, then the above procedure will be
repeated with the 16 adjacencies and so on.
Figure 4.5: Image after applying region growing process.
E. Edge detection and Target highlighting
Canny edge detector was one of the good edge detection technique to extract edge information.
Now we apply canny edge detection algorithm to find the edges in the region grown image. It
will give all the edges present in the region grown image. It gives edges of the target in the scene.
This step is used to highlighting step. Image after applying canny edge detection is shown in the
figure 4.6
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
142
(a) (b)
Figure 4.6: (a) Canny edge detected image (b) Target highlighted image
Canny edge detected image is presently in gray level type. This is converted to indexed image
and then converted to RGB image. Then it is added to the original image to highlight the target in
the scene.
5. SIMULATION RESULTS
The simulation of the proposed Target Detection in Camouflaged images system is simulated on
Matlab 7.7.0 (R2008b). The proposed approach is tested on different kind of images, which are of
different sizes and in different environments. The input images may be colour or gray scale and
are of any resolution. These images contain different type of targets such as camouflaged soldiers
in war environment, camouflaged tankers, aero planes, birds and statues
1. Camouflaged soldiers in war environment
2. Camouflaged soldier in green fields
The simulation result for image 1 is discussed in the previous section. Now the simulation result
for image 2 is explained here. For every input image we have resized image, target extracted
image, Canny edge detected image, target highlighted image. Sizes of original image, resized
image, seed block, seed point (x, y) are calculated. Profiles of wavelet coefficient features such as
cluster features and contrast are shown. Details of the seed block (sub image block) are given
1. Camouflaged soldiers in green fields
This is an image contains a soldier camouflaged (disguised) in green fields. For this wavelet
coefficient features are calculated and then seed block is found. Details of the seed block are
given and its sub image block is shown.
Size of the original image = 180 x 150 x 3
Size of the resized image = 512 x 512
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
143
(a) (b)
Figure 5.1: (a) Original image of size 180 x 150 x 3(b) Resized image of size 512 x512
A. Wavelet coefficient features
After applying wavelet decomposition to all sub image blocks, we get coefficients vector. Gray
level co-occurrence matrix is calculated from transformed coefficients. Then statistical features
are evaluated for further processing techniques
Now WCF‟s are calculated for all the sub image blocks and they are plotted as above. Contrast is
normalized linearly and the other two are normalized logarithmically. Sub image with maximum
of the sum of the features is treated as a seed block. Seed point is the centre point of the seed
block. Seed point is used in the region growing algorithm. Now WCF‟s are calculated for all the
sub image blocks and they are plotted as above. Contrast is normalized linearly and the other two
are normalized logarithmically. Sub image with maximum of the sum of the features is treated as
a seed block. Seed point is the centre point of the seed block.
Figure 5.2: Profiles of wavelet coefficient features
B. Seed block details:
Figure 5.3: GUI of Seed block
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
144
Seed block = 242th sub image block
Seed point on the resized image = (497, 49)
Wavelet coefficient features for the seed block shown above:
Contrast = 490
Cluster_shade = 2.2379e+011
Cluster_prominence = 3.0319e+014
C. Region grown, canny edge detected, and target highlighted image:
Figure 5.4: Region grown image Figure 5.5: Canny edge detected image
Figure 5.6: Target highlighted image
D. Tabulations:
Proposed Target Detection in Camouflaged images system is implemented on Matlab7.7.0
(R2008b) and tested on these images. All these information is calculated in the above shown
simulation. Seed block number, seed point and wavelet coefficient features for different images
are tabulated as shown in the table given below:
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
145
S. No Image Seed
Block
Seed
Point
Contrast
Cluster shade Cluster
promin- ence
1 Camouflaged
soldiers in war
environment
107 (209, 337) 750 1.2827e+011 1.4436e+014
2 Camouflaged
soldier in
green fields
242 (497, 49) 490 2.2379e+011 3.0319e+014
The proposed method is tested on different kinds of images in different environments
1 Aero plane 103 (209, 209) 47 1.9077e+011 2.4506e+014
2 Bird 106 (209, 305) 202 2.5880e+011 3.6802e+014
3 Statue 1 70 (337, 305) 77 1.6634e+011 2.0414e+014
4 Ship 217 (433, 273) 446 9.4556e+010 9.6129e+013
6. CONCLUSIONS AND FUTURE SCOPE
The proposed techniques for detecting targets in camouflaged images and is tested on different
kinds of images. Wavelet based approach is adapted to encounter the multiresolution analysis
problem in images like camouflaged images due to randomness in scene. Statistical features are
used as performance metrics in this implementation. These metrics are very useful in the object
detection for camouflaged images. Canny edge operator is appropriate to detect the edges of the
extracted image. The proposed system is implemented on Matlab 7.7.0 (R2008b). Performance of
the algorithm is tested on images of arbitrary sizes, gray or colour, and related to different
environments and the results are convincing. In future, the proposed method can be extended
further at different steps. After resizing the original image, we can divide into sub image blocks
of different dimensions according to the size of the object. Based on the features of the obtained
target we can classify it. It can be extended to detect multiple targets in an image. Performance of
the algorithm can be assessed by changing the wavelets and level of decomposition.
ACKNOWLEDGEMENT
As part of research work it was happy to express sincere thanks to supervisor Dr A Guruva
Reddy of his continuous suggestions and help and also to Co-Supervisor Dr C.B. Rama Rao on
completeness of this research work in a stipulated time with his monitoring and suggestions.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
146
REFERENCES
[1] Sujit K Singh, Chitra A Dhawale and Sanjay Misra, “Survey of Object Detection Methods in
Camouflaged Image”, Proc: IERI, PP. 1-6, ELSEVIER, 2012.
[2] Yuxin Pan, Yiwag Chen, Qiang Fu, Ping Zhang & Xin Xu, “Study on the Camouflaged target
Detection Method Based on 3D Convexity”, Proc: Modern Applied Science , Vol. 5, PP. 152-157,
2011.
[3] Dileep Kumar, Dr. Shrishu Varma, “Multiresolution framework with Neural Network approach for
Automatic Target Recognition (ATR)”, Proc: ICSAAP, PP. 168-173, IEEE computer society, 2009.
[4] B. Ravichandran, Avinash Gandhe, Robert Smith, Raman Mehra, “Robust automatic target
recognition using learning classifier systems”, Proc: INFORMATION FUSION, PP. 252-265,
ELSEVIER ScienceDirect 2007.
[5] Joao Paulo Pordeus Gomes, Jose Fernando Basso Brancalion, and david Fernandes, “Automatic
target Recognition in Synthetic Aperture Radar Image Using Multiresolution Analysis and Classifiers
Combination”, IEEE, 2008.
[6] Hung-Kuo Chu, Wei-Hsin Hsu, Niloy J. Mitra, Daniel Cohen-Or, Tien-Tsin Wong, Tong-Yee Lee,
“Camouflage Images”, ACM transaction on Graphic, 2010.
[7] S. Arivazhagan, L. Ganesan, V. Angayarkanni, “Color Texture Classification using Wavelet
Transform”, Proc: ICCIMA05,IEEE, 2005.
[8] S. Z. Mahmoodabadi, A. Ahmadian, M. D. Abolhasani, M. Eslami, J. H. Bidgoli, “Feature Extraction
Based on Multiresolution Wavelet Transform”, IEEE proceedings , PP. 3902-3905, 2005.
[9] J. Manikandan, B. Venkataramani and M. Jayachandran, “Evaluation of Edge Detection Techniques
towards Implementation of automatic target Recognition”, Proc: Computational Intelligence and
Multimedia applications, PP. 441-445, 2007.
[10] Zeyong Shan and Selin Aviyente, “Image Denoising Based on the Wavelet Co-Occurrence matrix”,
Proc:ICASSP2005 , PP. 645-648, IEEE 2005.
[11] Du-Ming Tsai, Cheng-Huei chiang, “Rotation –invariant pattern matching using wavelet
decomposition”, Proc: Pettern recognition Letters, PP. 191-201, ELSEVIER Pattern recognition
Letters 2002.
[12] G. Van de Wouwer, P. Scheuders and D. Van Dyck, “Statistical Texture Characterization from
Discrete Wavelet Representations” Proc: IEEE TRANSACTIONS ON IMAGE PROCESSING ,
Vol.8, PP. 592-598, 1999.
[13] Robert M. Haralick, K. Shanmugam and Itshak Dinstein, “Textual Features for Image Classification”,
Proc: IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, vol SMc-3,NO.6,,PP.
610-621, 2010.
[14] Ch. S. Sastry, Arun K. Pujari, B. L. Deekshatulu, C. Bhagvati, “A Wavelet based Multiresolution
algorithm for rotation invariant feature extraction”, Proc: Pattern Recognition Letters, vol. 25, PP.
1845-1855, ELSEVIER Pattern Recognition Letters 2004.
[15] Sirui Tian, Chao Wang, Hong Zhang, Bo Zhang, Fan Wu, “A Wavelet Based Targets Detection
Method for high resolution Airborne SAR Data ”, Proc: IEEE transactions of Geosciences and
Remote Sensing Symposium , PP. 2071-2073, 2007.
[16] Bir Bhanu, Automatic Target Recognition: State of the Art Survey, IEEE Transactions on Aerospace
and Electronic Systems, Vol. AES-22, No. 4, July 1986
[17] Rafael C. Gonzalez and Richard E. Woods, “Digital image processing”, Pearson education, Inc, 1999.
[18] E. Hosseini, Aria M.R. Saradjian, J. Amini and C. Lucas, “Generalized co-occurrence Matrix to
Classify IRS-1D Images using Neural Network”, 20th ISPRS Congress, Istanbul, Turkey, July 2004.
[19] Michael W. Roth, “Survey of Neural Network Technology fot Automatic Target Recognition”, IEEE
Transactions on Neural Networks, Vol. 1.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
147
AUTHORS
Chennamsetty Pulla Rao received his Bachelors of Degree in Electronics and
Telecommunication Engineering from IETE in 2007. Received Master’s degree in
Advanced Communication Systems from National Institute of Technology, Warangal
in 2010and pursuing P h D at JNTU Kakinada. At present working as Associate
Professor in MIC College of technology from July 2010.Published one National and
one International Journal research interests are image processing techniques and
Wireless Communications.
Dr. A Guruva Reddy working as Professor in Electronics & communication
engineering at DVR & Dr H.S MIC college of Technology in INDIA. Completed
Doctorial degree from JNTU Ananthapur in the year of 2010. He has 15 international
and national journals in the area of image processing. Also organized and attended
national level workshops like Funded by SERB and Faculty Development
programmes. At present supervising five research scholars in the area of signal and
image processing at JNTU Kakinada.
Dr. RAMA RAO C B working as Associate Professor in Electronics &
communication engineering at NIT Warangal in INDIA. Received Doctorial degree
from IIT kharagpur in the year of 1995.Published 12 international and national journals
in the area of signal and image processing. Also organized and attended several
national level workshops like ISTE and STTP. At present supervising three research
scholars in the area of signal and image processing at NIT Warangal.
Ad

More Related Content

What's hot (20)

D05222528
D05222528D05222528
D05222528
IOSR-JEN
 
A NOVEL PROBABILISTIC BASED IMAGE SEGMENTATION MODEL FOR REALTIME HUMAN ACTIV...
A NOVEL PROBABILISTIC BASED IMAGE SEGMENTATION MODEL FOR REALTIME HUMAN ACTIV...A NOVEL PROBABILISTIC BASED IMAGE SEGMENTATION MODEL FOR REALTIME HUMAN ACTIV...
A NOVEL PROBABILISTIC BASED IMAGE SEGMENTATION MODEL FOR REALTIME HUMAN ACTIV...
sipij
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classification
ijeei-iaes
 
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSEXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
ijma
 
various methods for image segmentation
various methods for image segmentationvarious methods for image segmentation
various methods for image segmentation
Raveesh Methi
 
IMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESIMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUES
Vicky Kumar
 
F43043034
F43043034F43043034
F43043034
IJERA Editor
 
Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing Segmentation
IOSR Journals
 
B42020710
B42020710B42020710
B42020710
IJERA Editor
 
Review of Image Segmentation Techniques based on Region Merging Approach
Review of Image Segmentation Techniques based on Region Merging ApproachReview of Image Segmentation Techniques based on Region Merging Approach
Review of Image Segmentation Techniques based on Region Merging Approach
Editor IJMTER
 
Object extraction using edge, motion and saliency information from videos
Object extraction using edge, motion and saliency information from videosObject extraction using edge, motion and saliency information from videos
Object extraction using edge, motion and saliency information from videos
eSAT Journals
 
Survey on Brain MRI Segmentation Techniques
Survey on Brain MRI Segmentation TechniquesSurvey on Brain MRI Segmentation Techniques
Survey on Brain MRI Segmentation Techniques
Editor IJMTER
 
Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)
VARUN KUMAR
 
A comparison of image segmentation techniques, otsu and watershed for x ray i...
A comparison of image segmentation techniques, otsu and watershed for x ray i...A comparison of image segmentation techniques, otsu and watershed for x ray i...
A comparison of image segmentation techniques, otsu and watershed for x ray i...
eSAT Journals
 
Fuzzy In Remote Classification
Fuzzy In Remote ClassificationFuzzy In Remote Classification
Fuzzy In Remote Classification
University of Oradea
 
Q0460398103
Q0460398103Q0460398103
Q0460398103
IJERA Editor
 
Image classification in remote sensing
Image classification in remote sensingImage classification in remote sensing
Image classification in remote sensing
Alexander Decker
 
Image segmentation 2
Image segmentation 2 Image segmentation 2
Image segmentation 2
Rumah Belajar
 
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
CSCJournals
 
Digital image classification
Digital image classificationDigital image classification
Digital image classification
Aleemuddin Abbasi
 
A NOVEL PROBABILISTIC BASED IMAGE SEGMENTATION MODEL FOR REALTIME HUMAN ACTIV...
A NOVEL PROBABILISTIC BASED IMAGE SEGMENTATION MODEL FOR REALTIME HUMAN ACTIV...A NOVEL PROBABILISTIC BASED IMAGE SEGMENTATION MODEL FOR REALTIME HUMAN ACTIV...
A NOVEL PROBABILISTIC BASED IMAGE SEGMENTATION MODEL FOR REALTIME HUMAN ACTIV...
sipij
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classification
ijeei-iaes
 
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSEXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
ijma
 
various methods for image segmentation
various methods for image segmentationvarious methods for image segmentation
various methods for image segmentation
Raveesh Methi
 
IMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESIMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUES
Vicky Kumar
 
Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing Segmentation
IOSR Journals
 
Review of Image Segmentation Techniques based on Region Merging Approach
Review of Image Segmentation Techniques based on Region Merging ApproachReview of Image Segmentation Techniques based on Region Merging Approach
Review of Image Segmentation Techniques based on Region Merging Approach
Editor IJMTER
 
Object extraction using edge, motion and saliency information from videos
Object extraction using edge, motion and saliency information from videosObject extraction using edge, motion and saliency information from videos
Object extraction using edge, motion and saliency information from videos
eSAT Journals
 
Survey on Brain MRI Segmentation Techniques
Survey on Brain MRI Segmentation TechniquesSurvey on Brain MRI Segmentation Techniques
Survey on Brain MRI Segmentation Techniques
Editor IJMTER
 
Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)
VARUN KUMAR
 
A comparison of image segmentation techniques, otsu and watershed for x ray i...
A comparison of image segmentation techniques, otsu and watershed for x ray i...A comparison of image segmentation techniques, otsu and watershed for x ray i...
A comparison of image segmentation techniques, otsu and watershed for x ray i...
eSAT Journals
 
Image classification in remote sensing
Image classification in remote sensingImage classification in remote sensing
Image classification in remote sensing
Alexander Decker
 
Image segmentation 2
Image segmentation 2 Image segmentation 2
Image segmentation 2
Rumah Belajar
 
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
An Analysis and Comparison of Quality Index Using Clustering Techniques for S...
CSCJournals
 
Digital image classification
Digital image classificationDigital image classification
Digital image classification
Aleemuddin Abbasi
 

Viewers also liked (19)

Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna
ijcisjournal
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
ijcisjournal
 
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
ijcisjournal
 
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
ijcisjournal
 
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square AlgorithmImpedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
ijcisjournal
 
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
ijcisjournal
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systems
ijcisjournal
 
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
ijcisjournal
 
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
ijcisjournal
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryption
ijcisjournal
 
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
ijcisjournal
 
Secure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFTSecure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFT
ijcisjournal
 
128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder 128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder
ijcisjournal
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
ijcisjournal
 
Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...
ijcisjournal
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
ijcisjournal
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishing
ijcisjournal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
ijcisjournal
 
Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna
ijcisjournal
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
ijcisjournal
 
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
ijcisjournal
 
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
ijcisjournal
 
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square AlgorithmImpedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
ijcisjournal
 
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
ijcisjournal
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systems
ijcisjournal
 
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
ijcisjournal
 
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
ijcisjournal
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryption
ijcisjournal
 
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
ijcisjournal
 
Secure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFTSecure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFT
ijcisjournal
 
128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder 128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder
ijcisjournal
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
ijcisjournal
 
Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...
ijcisjournal
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
ijcisjournal
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishing
ijcisjournal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
ijcisjournal
 
Ad

Similar to Target Detection Using Multi Resolution Analysis for Camouflaged Images (20)

D04402024029
D04402024029D04402024029
D04402024029
ijceronline
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI Images
IIRindia
 
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
idescitation
 
93202101
9320210193202101
93202101
IJRAT
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Sub1586
Sub1586Sub1586
Sub1586
International Journal of Science and Research (IJSR)
 
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
sipij
 
IRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A ReviewIRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A Review
IRJET Journal
 
Ijarcet vol-2-issue-7-2369-2373
Ijarcet vol-2-issue-7-2369-2373Ijarcet vol-2-issue-7-2369-2373
Ijarcet vol-2-issue-7-2369-2373
Editor IJARCET
 
Ijarcet vol-2-issue-7-2369-2373
Ijarcet vol-2-issue-7-2369-2373Ijarcet vol-2-issue-7-2369-2373
Ijarcet vol-2-issue-7-2369-2373
Editor IJARCET
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of view
sipij
 
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of PixelsColor Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
CSCJournals
 
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICESA HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
ijcsit
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
iosrjce
 
I010634450
I010634450I010634450
I010634450
IOSR Journals
 
COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATIONCOLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
IAEME Publication
 
N046047780
N046047780N046047780
N046047780
IJERA Editor
 
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERINGA ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
IJNSA Journal
 
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
A NOBEL HYBRID APPROACH FOR EDGE  DETECTIONA NOBEL HYBRID APPROACH FOR EDGE  DETECTION
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
ijcses
 
IRJET- Image Segmentation Techniques: A Survey
IRJET-  	  Image Segmentation Techniques: A SurveyIRJET-  	  Image Segmentation Techniques: A Survey
IRJET- Image Segmentation Techniques: A Survey
IRJET Journal
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI Images
IIRindia
 
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
idescitation
 
93202101
9320210193202101
93202101
IJRAT
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
sipij
 
IRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A ReviewIRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A Review
IRJET Journal
 
Ijarcet vol-2-issue-7-2369-2373
Ijarcet vol-2-issue-7-2369-2373Ijarcet vol-2-issue-7-2369-2373
Ijarcet vol-2-issue-7-2369-2373
Editor IJARCET
 
Ijarcet vol-2-issue-7-2369-2373
Ijarcet vol-2-issue-7-2369-2373Ijarcet vol-2-issue-7-2369-2373
Ijarcet vol-2-issue-7-2369-2373
Editor IJARCET
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of view
sipij
 
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of PixelsColor Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
CSCJournals
 
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICESA HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
ijcsit
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
iosrjce
 
COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATIONCOLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
COLOUR BASED IMAGE SEGMENTATION USING HYBRID KMEANS WITH WATERSHED SEGMENTATION
IAEME Publication
 
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERINGA ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
IJNSA Journal
 
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
A NOBEL HYBRID APPROACH FOR EDGE  DETECTIONA NOBEL HYBRID APPROACH FOR EDGE  DETECTION
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
ijcses
 
IRJET- Image Segmentation Techniques: A Survey
IRJET-  	  Image Segmentation Techniques: A SurveyIRJET-  	  Image Segmentation Techniques: A Survey
IRJET- Image Segmentation Techniques: A Survey
IRJET Journal
 
Ad

Recently uploaded (20)

Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Mike Mingos
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Mike Mingos
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 

Target Detection Using Multi Resolution Analysis for Camouflaged Images

  • 1. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 DOI: 10.5121/ijci.2016.5416 135 TARGET DETECTION USING MULTI RESOLUTION ANALYSIS FOR CAMOUFLAGED IMAGES Chennamsetty Pulla Rao1 , Dr. A Guruva Reddy2 and Dr. C.B. Rama Rao3 1 Research scholar, Department of ECE, JNTU Kakinada 2 Professor, Department of ECE, MIC College of Technology 3 Associate professor, Department of ECE, NIT Warangal ABSTRACT Target detection is a challenging problem having many applications in defense and civil. Most of the targets in defense are camouflaged. It is difficult for a system to detect camouflaged targets in an image. A novel and constructive approach is proposing to detect object in camouflage images. This method uses various methodologies such as 2-D DWT, gray level co-occurrence matrix (GLCM), wavelet coefficient features, region growing algorithm and canny edge detection. Target detection is achieved by calculating wavelet coefficient features from GLCM of transformed sub blocks of the image. Seed block is obtained by evaluating wavelet coefficient features. Finally the camouflage object is highlighted using image processing schemes. The proposed target detection system is implemented in Matlab 7.7.0 and tested on different kinds of images. KEYWORDS Canny edge detection, Region growing, seed block, Wavelet decomposition 1. INTRODUCTION Target detection in camouflaged images is one of the most important applications of computer vision. Target detection in camouflaged images is an approach by which we identify one or group of target objects in scene. It is very easy for a human to identify different objects in image but it’s difficult for a computer program to identify different objects [2]. In target detection in camouflaged images, images are of different types such as visual, Aerial, IR, etc and they are under different categories (stationary target, moving target) and environments (atmospheric turbulences). It is difficult for a computer program to detect target in these restrictions [3]. Till now so many researches are going on this approach. Some of those approaches [8] are like using pattern recognition, wavelets, texture, connectivity component based approach, descriptors based methods and traditional thresholding methods so on. In developing a system, there are many difficulties like recognition accuracy, occupation of size (image) and execution time so on. These are the things that motivated me to solve some of those issues. My concentration is towards the approach that based on wavelet decomposition and wavelet coefficient features.
  • 2. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 136 Figure 1. Simplified model for target detection system The approach of this paper is to build a constructive approach for target detection in camouflaged images that recognize the targets in different kinds of images. To make a system that can able to take images of any size, colour or gray, and related to different environments. It should able to detect targets of any size and in any environment. Target detection in camouflaged images can be done using several approaches; a simplified model is shown in figure 1. Wavelet transform is chosen as it is one of the novel techniques for solving target detection problem. Camouflage is a natural phenomenon of many animals in the nature. It is an advantage to them, so that they can protect themselves from their enemies. The similar camouflage technique is used in military applications. Generally in military applications, camouflage paint patterns are used for concealing soldiers and their equipment from being detected by the enemy, making them appear to be part and parcel of the natural environmental conditions surrounding them. The extent to which we can camouflage will only be limited by our imagination. Different items are used for these purpose but the ones that standout are face painting, leaves also some fabrics are dyed in shades of green, tan, black, brown so as to make the wearer indistinguishable from the surroundings. Wearer may be a human being, or any other equipment. Different camouflage paint patterns are used depending on the seasonal changes and the type of terrain used. The standard camouflage colors are blue, regular, desert and woodland. From these basic colors we can come up with desert sand, forest green, light green, white, earth yellow among other colors. Colors should always be chosen from the base color followed by the highlights. The surrounding areas will always determine the type of pattern and colors to use. 2. SCOPE OF APPROACH Under different types of atmospheric turbulences and different kinds of targets under different environments with the help of seed blocks it is possible to recognize the objects in images. So all these approaches are characterize with the help of multi resolution analysis, similarly by the technique of canny edge detection invented by canny is using to extract the edges of target in the camouflaged kinds of images as explained above. 3. SELECTED METHODS There are many methods provided by researchers for recognition of objects. In those few of methods are met their requirements. Based on the advanced computer vision approaches here we
  • 3. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 137 suggested the approach like using multi resolution analysis with traditional edge detection and seed block approaches. Filter bank structure is the simple implementation of 1-D DWT, whereas image processing applications requires two dimensional implementation of wavelet transform [4]. Implementation of 2-D DWT is also referred to as „multidimensional‟ wavelet transform. The multiresolution analysis as shown in Figure 3.1 This process continues until some final scale is reached. (a) (b) Figure 3.1: (a) One level wavelet transform (b) Two level wavelet transform From the obtained gray level co-occurrence matrix, significant wavelet coefficient features (WCFs) preferably contrast, cluster shade, and cluster prominence are evaluated [1]. The features are selected for logarithmic normalization on their dynamic range of values. Several parameters associated with the co-occurrence matrix are contrast, energy, entropy, cluster prominence, cluster shade, and local homogeneity. As we know how the GLCM from the Harlick suggested method. From the obtained gray level co-occurrence matrix, significant wavelet coefficient features are computed using the formulae given below [2] Coming to the edge detection technique the traditional technique is The Canny edge detection operator was developed by John F. Canny in 1986 this method works better compared to sobel and prewitt operators. The Canny edge detection algorithm is known to many as the optimal edge detector. Canny proposed some criteria to improve the earlier edge detection methods. An image and its canny detected image are shown in the following figures 3.3. Figure 3.3: Original and Canny edge detected image
  • 4. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 138 4. PROPOSED METHOD Identification of object in camouflaged images is a difficult approach due to the stochastic nature of background from the foreground. So traditional approaches and processing schemes is will not provide a satisfactory results due to its randomness in order to solve the problem in camouflage images object identification proposing a constructive approaches witch will overcome the problems in traditional processing schemes. In the proposing approach the results are found to be satisfactory. The block diagram for the proposed Target Detection in Camouflaged images system [1, 2] is given in the figure4.1 Input image. Similarly the Process flowchart shows all the steps involved in this proposed method is shown in figure 4.2 Figure 4.1: Target detection system
  • 5. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 139 Figure 4.2: Flow chart of proposed target detection system A. Image resizing: Consider a camouflage image of different dimensions such that we can divide it into 32 x32 or 16 x16 in the next step. Generally in this system we resizes into 512 x512. If the assumed image is color image convert it in to gray scale image for better processing. Then in the further steps we can process easily and able to calculate GLCM [7]. It is shown in the figure 4.3. (a) (b) Figure 4.3: (a) Original image of size 356 x 355 x 3, (b) Resized image of size 512 x512
  • 6. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 140 B. Making sub image blocks: This proposed system works on the principle of fixed window size technique. If image is resized into 512 x512, and if we divide into sub images of each size 32x32, we get 256 sub images. If we divide into 16 x16, we get 512 sub images. Block size depends up on the dimension of the object and the image. Figure 4.4: Sub image block Once sub images are obtained, we have to process each sub image separately in the further steps. Finally we have to select seed block i.e., sub image block having the highest sum of wavelet coefficient features. Using the seed block, processing techniques are used to detect the target C. DWT Decomposition: After dividing input image into sub image blocks, each sub image block is decomposed using 2- D DWT. Different wavelets are there to apply such as Haar, Daubechies, Meyer, Morlett and Symlets. In the proposed method Daubechies wavelet is used which is of order 2. It is represented as db2. If the size of sub block is more the level of decomposition is to be large in number if it is not so then small number level of decomposition is enough for multi resolution analysis purpose. Level of decomposition is 2 for this system. After decomposition, we get wavelet coefficients. The lower level in decomposition gives coarse level of coefficients which means approximation coefficients and higher levels give finest scale wavelet coefficients which means detail coefficients. If image is resized into 512 x 512 and divided into sub images of size 32 x 32, 256 sub images are obtained. Then after applying DWT decomposition 256 wavelet coefficients vectors are obtained. D. Feature extraction: From the transformed sub block of camouflage image features are evaluated by statistical means to find the seed block details from set of sub blocks to process further. The feature are calculating
  • 7. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 141 by using gray level co-occurrence matrices which is a statistical model based on the probability of occurrence of gray tone values. The statistical features based on GLCM which are cluster prominence, cluster shade and contrast used to evaluate seed block from a set of sub block. The seed block is identified by highest sum of statistical features in each sub block. Region growing process: Region growing is a region based segmentation process in which sub regions are grown into larger regions based on predefined criteria such as threshold and adjacency. In developed approach, the region growing algorithm is based on mean distance method [1]. In this method, the first step is to sort the feature values of all the windows, that is, sub image blocks in ascending order so that the window whose value is the largest would be the seed window. The threshold is determined by finding the average (A) of the first n% of the windows, which are adaptively chosen depending upon the target image. Now, the statistical feature values like (cluster details and contrast) of all the 8-adjacent blocks are compared with the average value, A, and the Shigh value. The window whose value is closer to Shigh (obtained from the seed block) value will be merged with the seed window. This process is repeated for all 8 adjacent blocks. If no window is merged from the 8 adjacent blocks, then the algorithm terminates. If at least one window is merged from the 8 adjacent blocks, then the above procedure will be repeated with the 16 adjacencies and so on. Figure 4.5: Image after applying region growing process. E. Edge detection and Target highlighting Canny edge detector was one of the good edge detection technique to extract edge information. Now we apply canny edge detection algorithm to find the edges in the region grown image. It will give all the edges present in the region grown image. It gives edges of the target in the scene. This step is used to highlighting step. Image after applying canny edge detection is shown in the figure 4.6
  • 8. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 142 (a) (b) Figure 4.6: (a) Canny edge detected image (b) Target highlighted image Canny edge detected image is presently in gray level type. This is converted to indexed image and then converted to RGB image. Then it is added to the original image to highlight the target in the scene. 5. SIMULATION RESULTS The simulation of the proposed Target Detection in Camouflaged images system is simulated on Matlab 7.7.0 (R2008b). The proposed approach is tested on different kind of images, which are of different sizes and in different environments. The input images may be colour or gray scale and are of any resolution. These images contain different type of targets such as camouflaged soldiers in war environment, camouflaged tankers, aero planes, birds and statues 1. Camouflaged soldiers in war environment 2. Camouflaged soldier in green fields The simulation result for image 1 is discussed in the previous section. Now the simulation result for image 2 is explained here. For every input image we have resized image, target extracted image, Canny edge detected image, target highlighted image. Sizes of original image, resized image, seed block, seed point (x, y) are calculated. Profiles of wavelet coefficient features such as cluster features and contrast are shown. Details of the seed block (sub image block) are given 1. Camouflaged soldiers in green fields This is an image contains a soldier camouflaged (disguised) in green fields. For this wavelet coefficient features are calculated and then seed block is found. Details of the seed block are given and its sub image block is shown. Size of the original image = 180 x 150 x 3 Size of the resized image = 512 x 512
  • 9. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 143 (a) (b) Figure 5.1: (a) Original image of size 180 x 150 x 3(b) Resized image of size 512 x512 A. Wavelet coefficient features After applying wavelet decomposition to all sub image blocks, we get coefficients vector. Gray level co-occurrence matrix is calculated from transformed coefficients. Then statistical features are evaluated for further processing techniques Now WCF‟s are calculated for all the sub image blocks and they are plotted as above. Contrast is normalized linearly and the other two are normalized logarithmically. Sub image with maximum of the sum of the features is treated as a seed block. Seed point is the centre point of the seed block. Seed point is used in the region growing algorithm. Now WCF‟s are calculated for all the sub image blocks and they are plotted as above. Contrast is normalized linearly and the other two are normalized logarithmically. Sub image with maximum of the sum of the features is treated as a seed block. Seed point is the centre point of the seed block. Figure 5.2: Profiles of wavelet coefficient features B. Seed block details: Figure 5.3: GUI of Seed block
  • 10. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 144 Seed block = 242th sub image block Seed point on the resized image = (497, 49) Wavelet coefficient features for the seed block shown above: Contrast = 490 Cluster_shade = 2.2379e+011 Cluster_prominence = 3.0319e+014 C. Region grown, canny edge detected, and target highlighted image: Figure 5.4: Region grown image Figure 5.5: Canny edge detected image Figure 5.6: Target highlighted image D. Tabulations: Proposed Target Detection in Camouflaged images system is implemented on Matlab7.7.0 (R2008b) and tested on these images. All these information is calculated in the above shown simulation. Seed block number, seed point and wavelet coefficient features for different images are tabulated as shown in the table given below:
  • 11. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 145 S. No Image Seed Block Seed Point Contrast Cluster shade Cluster promin- ence 1 Camouflaged soldiers in war environment 107 (209, 337) 750 1.2827e+011 1.4436e+014 2 Camouflaged soldier in green fields 242 (497, 49) 490 2.2379e+011 3.0319e+014 The proposed method is tested on different kinds of images in different environments 1 Aero plane 103 (209, 209) 47 1.9077e+011 2.4506e+014 2 Bird 106 (209, 305) 202 2.5880e+011 3.6802e+014 3 Statue 1 70 (337, 305) 77 1.6634e+011 2.0414e+014 4 Ship 217 (433, 273) 446 9.4556e+010 9.6129e+013 6. CONCLUSIONS AND FUTURE SCOPE The proposed techniques for detecting targets in camouflaged images and is tested on different kinds of images. Wavelet based approach is adapted to encounter the multiresolution analysis problem in images like camouflaged images due to randomness in scene. Statistical features are used as performance metrics in this implementation. These metrics are very useful in the object detection for camouflaged images. Canny edge operator is appropriate to detect the edges of the extracted image. The proposed system is implemented on Matlab 7.7.0 (R2008b). Performance of the algorithm is tested on images of arbitrary sizes, gray or colour, and related to different environments and the results are convincing. In future, the proposed method can be extended further at different steps. After resizing the original image, we can divide into sub image blocks of different dimensions according to the size of the object. Based on the features of the obtained target we can classify it. It can be extended to detect multiple targets in an image. Performance of the algorithm can be assessed by changing the wavelets and level of decomposition. ACKNOWLEDGEMENT As part of research work it was happy to express sincere thanks to supervisor Dr A Guruva Reddy of his continuous suggestions and help and also to Co-Supervisor Dr C.B. Rama Rao on completeness of this research work in a stipulated time with his monitoring and suggestions.
  • 12. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 146 REFERENCES [1] Sujit K Singh, Chitra A Dhawale and Sanjay Misra, “Survey of Object Detection Methods in Camouflaged Image”, Proc: IERI, PP. 1-6, ELSEVIER, 2012. [2] Yuxin Pan, Yiwag Chen, Qiang Fu, Ping Zhang & Xin Xu, “Study on the Camouflaged target Detection Method Based on 3D Convexity”, Proc: Modern Applied Science , Vol. 5, PP. 152-157, 2011. [3] Dileep Kumar, Dr. Shrishu Varma, “Multiresolution framework with Neural Network approach for Automatic Target Recognition (ATR)”, Proc: ICSAAP, PP. 168-173, IEEE computer society, 2009. [4] B. Ravichandran, Avinash Gandhe, Robert Smith, Raman Mehra, “Robust automatic target recognition using learning classifier systems”, Proc: INFORMATION FUSION, PP. 252-265, ELSEVIER ScienceDirect 2007. [5] Joao Paulo Pordeus Gomes, Jose Fernando Basso Brancalion, and david Fernandes, “Automatic target Recognition in Synthetic Aperture Radar Image Using Multiresolution Analysis and Classifiers Combination”, IEEE, 2008. [6] Hung-Kuo Chu, Wei-Hsin Hsu, Niloy J. Mitra, Daniel Cohen-Or, Tien-Tsin Wong, Tong-Yee Lee, “Camouflage Images”, ACM transaction on Graphic, 2010. [7] S. Arivazhagan, L. Ganesan, V. Angayarkanni, “Color Texture Classification using Wavelet Transform”, Proc: ICCIMA05,IEEE, 2005. [8] S. Z. Mahmoodabadi, A. Ahmadian, M. D. Abolhasani, M. Eslami, J. H. Bidgoli, “Feature Extraction Based on Multiresolution Wavelet Transform”, IEEE proceedings , PP. 3902-3905, 2005. [9] J. Manikandan, B. Venkataramani and M. Jayachandran, “Evaluation of Edge Detection Techniques towards Implementation of automatic target Recognition”, Proc: Computational Intelligence and Multimedia applications, PP. 441-445, 2007. [10] Zeyong Shan and Selin Aviyente, “Image Denoising Based on the Wavelet Co-Occurrence matrix”, Proc:ICASSP2005 , PP. 645-648, IEEE 2005. [11] Du-Ming Tsai, Cheng-Huei chiang, “Rotation –invariant pattern matching using wavelet decomposition”, Proc: Pettern recognition Letters, PP. 191-201, ELSEVIER Pattern recognition Letters 2002. [12] G. Van de Wouwer, P. Scheuders and D. Van Dyck, “Statistical Texture Characterization from Discrete Wavelet Representations” Proc: IEEE TRANSACTIONS ON IMAGE PROCESSING , Vol.8, PP. 592-598, 1999. [13] Robert M. Haralick, K. Shanmugam and Itshak Dinstein, “Textual Features for Image Classification”, Proc: IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, vol SMc-3,NO.6,,PP. 610-621, 2010. [14] Ch. S. Sastry, Arun K. Pujari, B. L. Deekshatulu, C. Bhagvati, “A Wavelet based Multiresolution algorithm for rotation invariant feature extraction”, Proc: Pattern Recognition Letters, vol. 25, PP. 1845-1855, ELSEVIER Pattern Recognition Letters 2004. [15] Sirui Tian, Chao Wang, Hong Zhang, Bo Zhang, Fan Wu, “A Wavelet Based Targets Detection Method for high resolution Airborne SAR Data ”, Proc: IEEE transactions of Geosciences and Remote Sensing Symposium , PP. 2071-2073, 2007. [16] Bir Bhanu, Automatic Target Recognition: State of the Art Survey, IEEE Transactions on Aerospace and Electronic Systems, Vol. AES-22, No. 4, July 1986 [17] Rafael C. Gonzalez and Richard E. Woods, “Digital image processing”, Pearson education, Inc, 1999. [18] E. Hosseini, Aria M.R. Saradjian, J. Amini and C. Lucas, “Generalized co-occurrence Matrix to Classify IRS-1D Images using Neural Network”, 20th ISPRS Congress, Istanbul, Turkey, July 2004. [19] Michael W. Roth, “Survey of Neural Network Technology fot Automatic Target Recognition”, IEEE Transactions on Neural Networks, Vol. 1.
  • 13. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 147 AUTHORS Chennamsetty Pulla Rao received his Bachelors of Degree in Electronics and Telecommunication Engineering from IETE in 2007. Received Master’s degree in Advanced Communication Systems from National Institute of Technology, Warangal in 2010and pursuing P h D at JNTU Kakinada. At present working as Associate Professor in MIC College of technology from July 2010.Published one National and one International Journal research interests are image processing techniques and Wireless Communications. Dr. A Guruva Reddy working as Professor in Electronics & communication engineering at DVR & Dr H.S MIC college of Technology in INDIA. Completed Doctorial degree from JNTU Ananthapur in the year of 2010. He has 15 international and national journals in the area of image processing. Also organized and attended national level workshops like Funded by SERB and Faculty Development programmes. At present supervising five research scholars in the area of signal and image processing at JNTU Kakinada. Dr. RAMA RAO C B working as Associate Professor in Electronics & communication engineering at NIT Warangal in INDIA. Received Doctorial degree from IIT kharagpur in the year of 1995.Published 12 international and national journals in the area of signal and image processing. Also organized and attended several national level workshops like ISTE and STTP. At present supervising three research scholars in the area of signal and image processing at NIT Warangal.