Detecting The Optic Disc Using Morphology And Histogram based Thresholding
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 6
Abstract
Optic disc (OD) detection is the most important step while developing an automated screening systems for certain diseases. However, it is a cumbersome task to locate Optic disc in all types of retinal images including normal, healthy images as well as abnormal images (images affected due to disease). This paper presents a method to automatically locate the Optic disc in digital retinal fundus images. The method adopted for the extraction of the optic disc contour is mainly based on mathematical morphology along with appropriate thresholding. This particular method follows multiple steps – in initial steps, pre processing of image is done using filtering and morphology operations, then optic disc is detected using thresholding. Pre processing techniques based on morphological operations includes dilation and erosion. The proposed algorithm gives excellent results and avoids false OD detection. This method is tested on standard databases (DRIONS-DB) provided for researchers on internet.
Authors and Affiliations
Amandeep Kaur , Reecha Sharma
Multi-Authentication for Cloud Security: A Framework
Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware, net...
ASPECTS RELATED TO THE SPECIFICATIONS OF SOFTWARE COMPONENTS
Reuse is the major area to be focused in CBSE, where developing the applications can be done by using off the shelf components. In order to reuse a software component the user must understand clearly about the component...
AN ENHANCED PRIVACY RULE BASED MODEL FOR FILTERING UNPREFERRED MESSAGES
The online social networks (OSN) offers proficient message controls that are posted on their private space in order to avoid un-preferred content displayed to users. But, OSN provides a low supportive and flexibility to...
A Study on signcryption Scheme Based on Eliptic Curve
Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure commu...
A Review on Different Transform based Watermarking Techniques
Over the past decades, watermarking plays a vital role in the branch of information hiding and it hides information in digital media. Watermarking is also used to prevent illegal usage as well as copyright protection or...