An Efficient Boundary Detection and Image Segmentation Method Based on Perceptual Organization
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 1
Abstract
In this paper, we presents a novel method for detecting the boundaries of the object in outdoor images by using most common properties of the images such as perceptual organization laws. Here the proposed segmentation scheme is based on perceptual organization and background recognition. This paper mainly concentrates to recognize the structurally challenging objects, which is generally combination of several constituent parts. Our new proposed method based on perceptual organization model can efficiently recognize the non-accidental relationships, which are perfectly structured from the constituent parts of the strictly structured objects. The simulation results of this paper show that theefficient and accurate image segmentation by using perceptual organization models.
Authors and Affiliations
Ch . S ambasivarao , V. Naganjaneyulu
Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud d...
A Survey of an Adaptive Weighted Spatio-Temporal Pyramid Matching For Video Retrieval
Recently, in the field of video analysis and retrieval Human action recognition in video is an important research and challenging topic. An efficient video retrieval is needed to search most similar and relevant video co...
Recognition of Consonants in Isolated Punjabi Words using DWT
Speech is the medium through which human beings can communicate with each other efficiently. Speech synthesis and recognition are two phases of speech. In this paper, focus is given on speech recognition. Speech recognit...
Secured Packet Hiding Technique for Packet Jamming Attacks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. Jamming attacks can severely interfere with the normal operation of Networks and, consequently, mechani...
Information Security and Risk Management for Banking System
Risk management provides an effective approach for measuring the security, but existing risk management approaches come with major shortcomings such as the demand for a very detailed knowledge about the IT security spher...