A Review: Sobel Canny Hybrid Theoretical Approach & LOG Edge Detection Techniques for Digital Image
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 2
Abstract
Edge detection is an important field in image processing. The purpose of image’s edge Detection is image segmentation, data compression, well matching such as image reconstruction and so on. Images to be compressed are first differentiated and edge information is extracted by investigation of the histogram of small non-overlapping blocks of the differential image. The image is classified into visually active and visually continuous blocks which are then coded individually. There are different methods for achieve the edge detection such as first-order derivatives in an image are computed using the gradient, the second-order derivatives are obtained using the Laplacian and one method for edge detection uses Hilbert Transform. Edge detection refers to the process of locating sharp discontinuities in an image. These discontinuities originate from different scene features such as discontinuities in depth, discontinuities in surface orientation, and changes in material properties and variations in scene illumination. Edge detector is a fundamental tool in image processing, machine vision and computer vision. An effective edge detector reduces a large amount of data but still keeps most of the important feature of the image.
Authors and Affiliations
Harpreet Singh , Er. MandeepKaur
Foundations of a rapid de-noising technique in real time image processing applications
A noise is an inherent entity of the imaging technologies that tend to deteriorate the quality of processed images at all levels. At the hardware level they appear as the dark current, shot noise etc. however at the imag...
CLASSIFICATION TECHNIQUES APPLIED FOR INTRUSION DETECTION
Intrusion detection system (IDS) was designed to monitor the network activity and it identifies the normal and abnormal behavioral pattern in the network. If there was any abnormal pattern, it indicates the system is in...
SECURITY ALGORITHM IN CLOUD COMPUTING: OVERVIEW
Network security is becoming more and more important as people spend more and more time connected. It is a specialized field in computer networking that involves securing a computer network infrastructure. It is typicall...
Fault Tolerance in Wireless Sensor Networks using Stiffed Delaunay Triangulation
In this chapter, we introduce fault tolerance in Wireless Sensor Networks. Firstly, we start with a short description of sensor networks, fault tolerance and its different techniques. Then we discuss the different phases...
A Novel Approach for Reversible Data Hiding in Encrypted Images Using Key Based Pixel Selection
In this paper a new steganographic approach is proposed to increase the confidentiality of the hidden data in RGB images by placing the data randomly across the encrypted images. By using the secret key provided to the u...