AUTOMATED DIGITAL MAMMOGRAM SEGMENTATION FOR DETECTION OF ABNORMAL MASSES USING BINARY HOMOGENEITY ENHANCEMENT ALGORITHM
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 3
Abstract
Many image processing techniques have been developed over the past two decades to help radiologists in diagnosing breast cancer. At the same time, many studies proven that an early diagnosis of breast cancer can increase the survival rate, thus making screening programmes a mandatory step for females. Radiologists have to examine a large number of images. Digital Mammogram has emerged as the most popular screening technique for early detection of Breast Cancer and other abnormalities. Raw digital mammograms are medical images that are difficult to interpret so we need to develop Computer Aided Diagnosis (CAD) systems that will improve detection of abnormalities in mammogram images. Extraction of the breast region by delineation of the breast contour and pectoral muscle allows the search for abnormalities to be limited to the region of the breast without undue influence from the background of the mammogram. We need to perform essential pre-processing steps to suppress artifacts, enhance the breast region and then extract breast region by the process of segmentation. In this paper we present a fully automated scheme for detection of abnormal masses by anatomical segmentation of Breast Region of Interest (ROI). We are using medio-lateral oblique (MLO) view of mammograms. We have proposed a new homogeneity enhancement process namely Binary Homogeneity Enhancement Algorithm (BHEA), followed by an innovative approach for edge detection (EDA). Then obtain the breast boundary by using our proposed Breast Boundary Detection Algorithm (BBDA). After we use our proposed Pectoral Muscle Detection Algorithm (PMDA) to suppress the pectoral muscle thus obtaining the breast ROI, we use our proposed Anatomical Segmentation of Breast ROI (ASB) algorithm to differentiate various regions within the breast. After segregating the different breast regions we use our proposed Seeded Region Growing Algorithm (SRGA) to isolate normal and abnormal regions in the breast tissue. If any abnormalities are present it gets accurately highlighted by this algorithm thus helping the radiologists to further investigate these regions. This composite method have been implemented and applied on all mammograms with abnormalities in mini-MIAS database. The algorithms proposed are fully autonomous, and are able to isolate different types of abnormalities, if present, a task very few existing mammogram segmentation algorithms can claim.
Authors and Affiliations
Indra Kanta Maitra , Sanjay Nag , Prof. Samir K. Bandyopadhyay
Texture Based Image Clustering Using COM and Spatial Information
Clustering is traditionally viewed as an unsupervised method for data analysis. The primary objective of cluster analysis is to partition a given data set into homogeneous clusters. In this paper, we present a novel algo...
PERFORMANCE TESTING CONCURRENT ACCESS ISSUE AND POSSIBLE SOLUTIONS – A CLASSIC CASE OF PRODUCER-CONSUMER
Concurrent access issue is one of the most frequently encountered issues in performance testing. The issue is a classic case of producer consumer problem where multiple clients try to access same code on the server at th...
PRE-IDEALS AND NEW TOPOLOGIES USING FUZZY SETS
A fuzzy ideal on a set X is a non empty collection of subsets of X with heredity property which is also closed under arbitrary union and finite intersections. In this paper, we introduce a weak form of fuzzy ideals namel...
PERCEPTIVE APPROACH FOR ROUTE OPTIMIZATION IN MOBILE IP
The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol[1,2] has been designed within the...
PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS
The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given...