Sunday, December 22, 2019
Techniques Used For Extracting Useful Information From Images
The main objective over here focusses on the enhanced image searching which can be carried out by performing few of the existing techniques used for extracting useful information from images. These techniques include image classification, Feature Extraction, Face detection and recognition and image retrieval etc. 4.1 Image Classification After the image has been processed using the 3 frameworks proposed the image needs to be classified which is done using the image classification technique of image mining. Classification can be carried out by applying the method of supervised classification and unsupervised classification but here we will mainly focus upon supervised classification. Supervised Classiï ¬ cation Supervised classification isâ⬠¦show more contentâ⬠¦Various trees for example R-tree, R*-tree, R+tree, SR-tree etc are used in such cases. 4.5 Face detection and Recognition The face plays an important role in todayââ¬â¢s world in the identification of the person. Face recognition is the process concerned with the identification of one or more person in images or videos by analyzing the patterns and comparing them with one another. Algorithms that are used for face recognition basically extract facial features and compares them to a face database to find the best and suitable match. Application of face detection and recognition includes biometrics, security and surveillance systems. V. RESULT AND ANLYSIS We have taken six images which includes two Face based image, two Content based image, and one feature based image and the last image which is a combined image which includes all three types i.e. Face, content and feature. The search results obtained when the above mentioned six images were searched for on a search engine is shown in Table I. The following table shows the time taken in the searching process of the images: Image Type of Image Time taken for searching Image1 Face based 5 seconds Image2 Content based 4 seconds Image3 Feature based 5 seconds Image4 Face based 3.5 seconds Image5 Feature based 6 seconds Image6 Combined 7 seconds Table I: Time taken for Image search From the results obtained from the above searches we canShow MoreRelatedComputational Advances Of Big Data1147 Words à |à 5 Pagesââ¬â the data we create and copy annually ââ¬â will reach 44 ZB, or 44 trillion gigabytes [1]. Under the massive increase of global digital data, Big Data term is mainly used to describe large-scale datasets. Big data is high-volume, high-velocity and high-variety information assets that demand cost-effective, innovative forms of information processing for enhanced insight and decision making [2]. Volume of Big Data represents the magnitude of data while variety refers to the heterogeneity of the data.Read MoreMethods of 3D Image Analysis1809 Words à |à 7 PagesIntroduction Since the late 1980s, arguably the most successful method of 3D image analysis has been the model-based segmentation approach. This approach, in its most mature form, matches 3D image information to models which describe not only the expected shape and appearance of a structure, but also statistically-based information about common variations in the structure of interest. In this way, the natural deviations in organic structures are accounted for in the statistical shape model, or SSMRead MoreThe Problems Encountered By Web Mining Essay1304 Words à |à 6 Pagesand removed everyday and it handle huge set of information hence there is an arrival of many number of problems or issues. Normally, web data is highly dimensional, limited query interfaces, keyword oriented search and limited customization to individual user. Due to this, it is very difficult to find the relevant information from the web which may create new issues. Web mining procedures are classification, clustering and as sociation laws which are used to understand the customer behavior , evaluatedRead MoreThe Technology And Artificial Intelligence1002 Words à |à 5 Pagesrange of techniques, which can be applied to a very wide range of application areas. (Russell, Stuart J.; Norvig Peter et al.,2003). Also, evidence will focus on the knowledge acquisition, data mining, computer vision and the search. An artificial intelligence system is intelligent not only of banking and sharing data, but also of acquiring, representing, and manipulating knowledge. (Buchanan. et al., 1983). Data mining is the process of extracting non-trivial and potentially useful information, or knowledgeRead MoreA Novel Memory Forensics Technique For Windows 101730 Words à |à 7 Pagesforensics Technique for Windows 10 Abstract Volatile memory forensics, henceforth referred to as memory forensics, is a subset of digital forensics, which deals with the preservation of the contents of memory of a computing device and the subsequent examination of that memory. The memory of a system typically contains useful runtime information. Such memories are volatile, causing the contents of memory to rapidly decay once no longer supplied with power. Using memory forensic techniques, it is possibleRead MoreContent Based And Model Based Mining Of Data On Image Processing1966 Words à |à 8 PagesDATA ON IMAGE PROCESSING Chandana V S Dept. of Computer Science Engineering M.Tech- Information Technology NIE, Mysuru chandanavs05@gmail.com Uzma Madeeha Dept. of Computer Science Engineering M.Tech- Information Technology NIE, Mysuru uzmamadeeha9@gmail.com Abstractââ¬â As there is vivid implementations in the multimedia technologies, users find it complex for retrieving information with traditional image retrieval techniques. The CBIR techniques are becoming an efficient techniques forRead MoreData Mining And Multimedia Data2897 Words à |à 12 PagesABSTRACT Data mining is a popular technology for extracting interesting information for multimedia data sets, such as audio, video, images, graphics, speech, text and combination of several types of data set. Multimedia data are unstructured data or semi-structured data. These data are stored in multimedia database, multimedia mining which is used to find information from large multimedia database system, using multimedia techniques and powerful tools. This paper analyzes about the use of essentialRead MoreData Mining For Industrial Engineering And Management720 Words à |à 3 PagesIndustrial Engineering and Management journal include production, logistics, quality, operational research, information systems, technology, communication, industrial economics, regional development, management, organizational behavior, human resources, finance, accounting, marketing, education, training, and professional skills [1]. The aim of this journal is to become a reliable source of information for leader s in the field of industrial engineering management journals research, and to feature a rapidRead MoreThe Issues On Multimedia Mining2951 Words à |à 12 PagesMINING ABSTRACT Data mining has popular technology for extracting interesting information for multimedia data sets, such as audio, video, images, graphics, speech, text and combination of several types of data set. Multimedia data are unstructured data or semi-structured data. These data are stored in multimedia database, multimedia mining which is used to find information from large multimedia database system, using multimedia techniques and powerful tools. This paper analyzes aboutthe use of essentialRead MoreAn Efficient Data Concealment Approach Based On Pixel Pair Matching And Encryption Technique1345 Words à |à 6 PagesAN EFFICIENT DATA CONCEALMENT APPROACH BASED ON PIXEL PAIR MATCHING AND ENCRYPTION TECHNIQUE Abstract - This paper proposes a data hiding method using adaptive pixel pair matching and data encryption approach for secret data communication. Steganography is the science of hiding secret data in plain sight within cover data so that it can be securely transmitted over a network. The idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.