CBIR Using Kekre’s Transform over Row column Mean and Variance Vectors
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
We see the advancement in image acquisition technologies and storage systems which always encourages us to design a sophisticated system to retrieve the images effectively. In this paper, we describe the novel approach for image retrieval based on image contents. It involves creation of feature tabase for all database images which includes formation of feature vector by applying the two methods one is by applying Kekre’s transform over row and column vectors and secondly by applying Kekre’s transform over row - column variance vectors of image. Further we apply a similarity measure to compare the query image and the database images. Finally we retrieve similar images from database based on the pre determined threshold. The database of 525 images of seven different categories (75 from each category) is used for emonstration to compare the performance of these lgorithms using precision and recall as parameters.
Authors and Affiliations
Dr. H. B. Kekre , Kavita Sonavane
Adaptive Background subtraction in Dynamic Environments Using Fuzzy Logic
Abstract— Extracting a background from an image is the enabling step for many high-level vision processing tasks, such as object tracking and activity analysis. Although there are a number of object extraction algorithms...
A Survey on Intrusion in Ad Hoc Networks and its Detection Measures
Ad hoc wireless networks are defined as the category of wireless networks that utilizes multi-hop radio relaying and are capable of operating without the support of any fixed infrastructure hence, they are called infrast...
A Study of Image Segmentation and Edge Detection Techniques
Image segmentation is the key behind image understanding. Image segmentation is one of the most important steps leading to the analysis of processed image data. It is the prime area of research in computer vision. A numb...
Wirelss Security on Security Standard Policy: A Case Studty
Administrators of a network have a variety of different uthentication and encryption technologies to choose from. Administrators must also take into account a variety of organizational factors, not just of technical fac...
A Novel Approach for clustering web user sessions using RST
Web usage mining has assumed importance in learning about web user's behavior and user interactions with the website. It uses data mining techniques to discover non-trivial user behavior patterns. These patterns can then...