SlideShare uma empresa Scribd logo
1 de 7
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
50
Selection of Feature Regions Set for Digital Image
Using Optimization Algorithm
Alpana A. Borse1
, Snehal M. Kamlapur2
1
PG Student, KKWIEER,Nasik, India
2
Associate Professor, KKWIEER,Nasik, India
Email:alpana.borse@gmail.com, snehal_kamalapur@yahoo.com
Abstract- A feature based “Selection of feature region set
for digital image using Optimization Algorithm” is
proposed here. The work is based on simulated attacking
and optimization solving procedure. Image
transformation techniques are used to extract local
features. Simulated attacking procedure is performed to
evaluate the robustness of every candidate feature region.
According to the evaluation results, a track-with-pruning
procedure I adopted to search a minimal primary feature
set which may resists the most predefined attacks. In
order to enhance its resistance capability against
undefined attacks, primary feature set is then extended by
adding some auxiliary feature regions in it. This work is
formulated as a multidimensional knapsack problem and
solved by optimization algorithms such as Genetic
Algorithm, Particle Swarm Optimization and Simulated
Annealing.
Keywords - Feature, optimization, robust, simulated
attacks
I. INTRODUCTION
With the rapid development of internet, manipulation of
data becomes easier. Application uses digital data
including electronic advertising, real-time video and
audio delivery, digital repositories and libraries, and Web
publishing. This ease of access to digital data brings with
itself the problem of copyright protection. It has been
recognized that current copyright laws are not enough for
dealing with digital data. This has led to an interest
towards developing new copy prevention and protection
mechanisms. Thus, increasing interest is based on robust
regions set, using such robust regions one could keep
their information secure. The existing methods do not
imply higher robustness and may degrade the quality of
the digital image against unknown attacks as
characteristics of unknown attacks vary with known
attacks. Thus, the difficulty is to obtain or select most
robust feature region set for information hiding. The
effectiveness of a digital image is indicated by the
robustness of regions against various attacks. The robust
regions are mainly used to sign copyright information of
the digital work as robust regions can resist information
after various kinds of attacks such as signal processing or
geometric distortions.
Thus it is necessary to work on following issues,
 Finding the most robust region set of a digital
image against various kinds of attacks for hiding
information,
 developing a faster robustness measurement
 improving image quality
So feature region set selection method based on
optimization approaches, by which selection of the most
robust regions without violating the image quality is
proposed here.
II. SYSTEM ARCHITECTURE
The system architecture is as in “Figure 1”. There are two
operational stages as Primary feature set searching stage
and feature set extension stage respectively.
2.1 Primary Stage ( Searching Stage)
The aim is to obtain primary feature region set.
a. Extract features
To extract local features, feature detectors are used.
Feature detectors perform specific transformations on
digital images to extract their local features, ranging from
a point to an object, and have been adopted in many
applications such as object recognition, database
retrieval, and motion tracking. Most features of an image
can be preserved after it suffers a distortion such as
scaling, rotation, or illumination changes. Therefore,
several feature-based methods have been developed by
exploiting the robustness of feature regions against
various attacks.
Normally, feature selection according to a single
criterion like corner response or the number of
neighbouring feature points to obtain regions. Various
corner detectors can be used to detect corners. Here,
Harris – Laplace corner detector is used to obtain
regions. “Figure 2” shows the regions detected by Harris
– Laplace corner detector.
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
51
Figure 1: System Architecture
b. Simulated attacking and selection of non
overlapping region set
Since the magnitude of the region gets modified after
attacks on region, it is preferred to select nonoverlapping
regions to avoid major degradation of image quality.It is
hard to accurately identify the robustness of all regions
by a single criterion like the corner response. Therefore,
this stage is based on simulated attacking. It would be
helpful to find out the most robust regions if there is prior
knowledge of each region’s attack resistance
capability.Moreover, a feature region may have different
degrees of robustness against different attacks [4], [8].
Regions obtained in “Figure 2” are survived with
different predefined attacks. A few representative attacks
are applied to the feature regions for evaluating their
robustness in the simulated attacking phase. The attack
resistance analysis phase is implemented by a two-step
procedure. The original feature regions are first checked
if they can be re-detected in the attacked image. The
redetected region is examines the consistency (bit error)
between itself after attacks. Using dr,a to indicate whether
the region can resist the predefined attack or not, it is
defined as
Figure 2: Regions detected by Harris-Laplacian
Corner detector
dr, a = {
1 BER(W, Wr) ≤ T
0 otherwise
………..
(1)
Where,
BER (I, Ia) denotes the bit error between
original image I and image Ia
after different attacks on it
T a predefined bit error
threshold
In the final phase, the most robust and smallest set of
nonoverlapping feature regions is selected according to
the result of attack resistance analysis. This work is
formulated as follows:
R∗
𝑝
= arg
𝑚𝑎𝑥
Rp {∑ 𝑥 𝑅𝑝
𝑎𝑖
Na
𝑖=1 min 𝑅𝑝; }
rk, rj ∈ Rp, k≠j --> rk∩ rj = Ø ……….(2)
Where,
Rp is the set of selected feature regions in
which any two regions rk and rj are not
overlapped, and
The value of for a predefined attack is determined by
=
………… (3)
Where,
R the Rp satisfying with the maximum
Value of ∑ 𝑋Rp
𝑁𝑎
𝑖=1 ai
The selection would be such that, by the involvement of
such region’s series, all predefined attacks on this series
can be resisted As a result, a region set would be better in
robustness when its regions can be complementary in
attack resistance as many as possible. These results are
obtained with the help of track with pruning algorithm.
A track with pruning Algorithm
Step 1: Initialize associated parameters and set the size of inspected feature region sets as NULL.
Step 2: Check if the termination condition is satisfied.
Step 3: while it cannot resist more attacks
The candidate Set is included in the pruned set
by adding more feature regions.
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
52
Step 4: Otherwise
Update the primary feature region set with a candidate feature region set if the latter can resist more attacks
than the former.
Step 5: Stop.
In practice, the aggregate attack resistance capability of
all selected nonoverlapping regions is more convincing,
and it could be regarded as the overall robustness of a
digital image.Sometimes this set may fail to resist some
non predefined attacks, hence we need to add some
auxiliary regions selected from those residual feature
regions to enhance the robustness of image against
undefined attacks under preserving its visual quality.
Since the characteristics of undefined attacks are of wide
variety and are difficult to model, we therefore adopt a
multi-criteria optimization strategy [15], [16] for the
selection of auxiliary feature regions. This phenomena of
feature region selection method based on multi-criteria
optimization strategy is described in stage 2.
2.2 Extended Stage (Optimization Stage)
Neither corner response nor the number of its
neighbouring feature points, however, can guarantee the
selection of nonoverlapping regions with the maximum
robustness to various attacks, because higher corner
response and a large number of its neighbouring feature
points do not always imply higher robustness of itself.
Moreover, a feature region may have different degrees of
robustness against different attacks [3], [5]. A feature
region selection is optimized by optimization to obtain
robust regions against unknown attacks occurs, as, a
feature region may have different degrees of robustness
against different kinds of attacks. To optimize the regions
following optimization algorithms are used–
 Genetic Algorithm (GA) [7], [8], [9]
 Particle Swarm Optimization (PSO) [6], [9]
and
 Simulated Annealing (SA) [11]
An optimal feature region set is chosen to resist the
predefined attacks. But this set may fail to resist some
non predefined attacks, we need to add some auxiliary
regions selected from those residual feature regions to
enhance the robustness of image against undefined
attacks under preserving its visual quality. Since the
characteristics of undefined attacks are of wide variety
and are difficult to model, we therefore adopt a multi-
criteria optimization strategy for the selection of auxiliary
feature regions. First, the assumption that the feature
regions which survive more types of predefined attacks
are more likely to resist undefined attacks is applied. The
symbol is defined to indicate the overall resistance
degree of the region against all predefined attacks, and it
is determined by
= (dr1, a1 + dr1, a2 + ………..+ drn, aNa) = ∑ 𝑋Rp
𝑁𝑎
𝑖=1
…………. (4)
Where,
dri, ai ε {0, 1} indicates if the region can resist the
ith
predefined attack ai and
Na the total number of predefined attacks.
The resistance of a region against a predefined attack is
regarded as a possible characteristic of the region. The
symbol ga
r is the summary representation of Na
characteristics of a region. Other two generic
characteristics of feature regions, the corner response and
the integration scale are referred, since we cannot
exclude the possibility that there are undefined attacks
with the characteristics never occurred in the predefined
attacks. The parameter which denotes the limitation of
quality degradation of an image after being attacked
considered as peak signal-to-noise ratio (PSNR) value
between a cover image and attacked image. Therefore,
the work of the extension stage can be formulated as an
optimization problem formulated as Multi Dimensional
knapsack problem (MDKP) with multiple constraints as
follows,
Maximize∑ (𝑔 𝑎
𝑟𝑗
+ 𝑔 𝑐
𝑟𝑗
+ 𝑔 𝜎
𝑟𝑗
)
|𝑅𝑝∗|
𝑗=1
Srj …………. (5)
Subject to ∑ 𝑞 𝑎
𝑟𝑗
|𝑅𝑝∗|
𝑗=1
. Srj ≤ Qc
∑ (𝑝𝑟𝑖,𝑟𝑗𝑠𝑟𝑖𝑠𝑟𝑗 < 1) 𝑖 =
|𝑅𝑝∗|
𝑗=1
1,2,3, … , |𝑅𝑝∗
|
……....… (6)
Where,
𝑅𝑝∗
The number of feature regions except those
in the primary feature region set as well as
the regions overlapped with them and
𝑠𝑟𝑖 is defined as,
𝑠𝑟𝑖 =
{
1 if the reggion ri is selected
0 otherwise
...… (7)
The value of 𝑝𝑟𝑖𝑟𝑗 indicates whether the two regions are
overlapped and is defined as
𝑝𝑟𝑖𝑟𝑗 = {1 ri ∩ rj ≠ Ǿ
0 otherwise
……… (8)
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
53
The optimization problem formulated by 5 and 6 can be
formulated as MDKP that is a knapsack problem with a
collection of different constraints.
A heuristic search procedure is adopted to solve this
MDKP for determining the best choice of auxiliary
feature regions.
Hence, to solve this MDKP for determining the best
choice of auxiliary feature regions and best choice of
optimization algorithm we have used some optimization
approaches such as GA, PSO, and SA.
III. THE ALGORITHMIC FRAMEWORK OF GA, PSO AND SA
i) Genetic Algorithm (GA)
Generate initial population
Do
Calculate the fitness of each member
// simulate another generation
Do
Select parents from current population
Perform crossover add offspring to the
new population
while new population is not full
Merge new population into the current population
Mutate current population while not converged
ii) Particle Swarm Optimization (PSO)
Randomly generate an initial population
Repeat
for i = 1 to population_size
do
if f( Xi) < f( Pi) then
Pi=Xi
Pg = min (Pneighbours);
for d =1 to dimensions
do
velocity_update();
position_update();
end
end
until termination criterion is met.
iii. Simulated Annealing (SA)
Function SIMULATED-ANNEALING(Problem, Schedule) returns a solution state
Current = MAKE- REGION (INITIAL-SOLUTION [Problem])
For t = 1 to N do
T = Schedule[t] // Index
If T = 0 then return Current
Next = a randomly selected successor of Current
Cost = VALUE[Next] – VALUE[Current]
if Cost > 0 then Current = Next
else Current = Next only with probability exp(-Cost /T)
End
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
54
Comparing results of these different optimization
techniques on feature region set, it determines the best
choice of optimization techniques for selecting most
robust region set under the constraint of preserving image
quality and extracting feature regions in less amount of
time.
IV. EXPERIMENTALRESULTS
System is implemented using Matlab. Results are
obtained for test images. The systems implement Harris-
Laplacian based robust region set selection. The corner
response values are used to remove overlapping feature
regions. TABLE 1 illustrates the comparisons, based on
the criterion of detection ratio, defined as the ratio of the
number successfully detected regions with respect to
total number of regions in an image.
TABLE I
TABLE II and TABLE III gives results for regions, RN. Where RN  Region Number {3, 5, 6, 7, 8}
TABLE II
TABLE III
As illustrated in TABLE II and III, this system enhances the robustness of the system of feature based methods against
attacks.
.
“Figure 3” and “Figure 4” shows results of the proposed system.
V. CONCLUSIONS
Image
Jpeg 50 Jpeg 60 Rotate 15 Rotate 30 Median Gnoises
LE
4/5 4/5 5/5 4/5 3/5 5/5
BA 3/6 5/6 6/6 4/6 6/6 6/6
FR 2/4 2/4 ¾ 1/4 1/4 4/4
RN JPEG 50
JPEG
60
Rotate 15 Rotate30 Median Filter Gnoises
3 1 1 1 1 1 1
5 0 0 1 1 0 1
6 1 1 1 0 0 1
7 1 1 1 1 1 1
8 1 1 1 1 1 1
RN Corner Response Attack Resistance Capability
3
49.2244
3
5
36.6759
3
6
38.1657
3
7
45.9059
3
8
44.7766
3
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
55
The aim behind “Selection of feature region set for
digital image using Optimization Algorithm” is implying
higher robustness of the digital image. This system is
mainly based on simulated attacking and optimization
solving procedure, for obtaining robust region set. It uses
integration scale, corner response and attack’s resistance
capability as performance parameters. Optimization
algorithms such as Genetic Algorithm, Particle Swarm
Optimization and Simulated Annealing to optimize
the regions are used. The results generated after
comparing different optimization techniques, determines
the best technique for selection of most robust region set
under the constraints of preserving image quality and
extracting feature region set in less amount of time. Thus,
optimization based methods significantly improves the
robustness of a digital image. Hence, this system is
suitable for applications in which robustness of a digital
image is primary key, such as, hiding information or
prevention and protection of digital contents.
TABLE IV illustrates the comparison of an optimization algorithm to optimized regions
TABLE IV
SN Terms GA PSO SA
1 Number of Lines More Few Few
2 Memory More Less Less
3 Time Less More More
4 Tuning of parameters Difficult Easiest Easiest
5 Structure Complex Simple Simple
6 Implementation Difficult Easy Easy
Following figure shows regions after attacked on region.
‘a’ ‘b’ ‘c’ ‘d’ ‘e’
Figure 3: Attacked region
Where,
a : original region
b : attacked region after – JPEG Attack
c : attacked region after – ROTATE Attack
d : attacked region after – Gnoises Attack
e : attacked region after – Median Filter Attack
Following images gives results of this system
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.50-56
ISSN: 2278-2419
56
‘a’
‘b’ ‘c’ ‘d’
‘e’ ‘f’ ‘g’
Figure 4: Results of “Selection of feature region set for digital image using Optimization Algorithm”
Where,
a: Original Image of Lina
b: Image after applied Harris Laplace Corner
c: Image before applying TWPA algorithm
d: Image after applying TWPA algorithm
e: Image obtained after applying GA
f: Image obtained after applying PSO
g: Image obtained after applying SA Detector
Results:
Number of Regions for optimization {7, 3, 5, 6, 8}
Fig. ‘d’: Number of Regions obtained after GA {8,
3, 5}
Fig. ‘e’: Number of Regions obtained after PSO {8,
3, 7}
Fig. ‘f’: Number of Regions obtained after SA{8,
3}
REFERENCES
[1] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Kuo , “On the
Selection Optimal Feature Region Set for Robust Digital Image
Watermarking”, in IEEE TRANSACTIONS ON IMAGE
PROCESSING, VOL. 20, NO. 3, MARCH 2011
[2] J. S. Tsai, W. B. Huang, C. L. Chen, and Y. H. Kuo, “A feature-
based digital image watermarking for copyright protection and
content authentication, "in Proc. IEEE Int. Conf. Image Process.,
Sep. 200, vol.5, pp. 469–472.
[3] D. G. Lowe, “Distinctive image features from scale-invariant
keypoints,” Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, Nov.
2004.
[4] C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Mark Liao, “Cocktail
watermarking for digital image protection,” IEEE Trans.
Multimedia, vol. 2, no. 4, pp. 209–224, Dec. 2000.
[5] J. S. Seo and C. D. Yoo, “Image watermarking based on invariant
regions of scale-space representation,”
[6] IEEE Trans. Signal Process., vol. 54, no. 4, pp. 1037–1049, Apr.
2006.
[7] Konstantinos E. Parsopoulos, Michael N. Vrahatis, “ Particle
Swarm Optimization for Constrained optimization Algorithms”
research centre (UPAIRC), GR -26110, Patras, Greece
[8] Riccardo Poli, William B. Langdon and Nicholas F. McPhee “A
Field Guide to Genetic Programming” University of Essex – UK
rpoli@essex.ac.uk
[9] Golderberg, David E., Genetic Algorithms: in Search, Optimization
& Machine Learning, Addison-Wesley Publishing Company, Inc.,
New York, 1989.
[10] Sadiq M. Sait and Habib Youssef, Iterative Computer Algorithms
with Application to Engineering: Solving Combinatorial
Optimization Problems, IEEE Computer Society, LA, 1999.
[11] George S. Tarasenko, Stochastic Optimization in the Soviet Union
Random Search Algorithms, Delphic Associates, Inc., VA, 1985.
[12] Duc Truong Pham and Dervis Karaboga, Intelligent Algorithms,
tabu search, simulated annealing and neural networks, Springer,
New York, 1998.

Mais conteúdo relacionado

Semelhante a V1_I2_2012_Paper7.docx

IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET Journal
 
IRJET- Mango Classification using Convolutional Neural Networks
IRJET- Mango Classification using Convolutional Neural NetworksIRJET- Mango Classification using Convolutional Neural Networks
IRJET- Mango Classification using Convolutional Neural NetworksIRJET Journal
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysisvivatechijri
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueIRJET Journal
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET Journal
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
 
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET Journal
 
IRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A ReviewIRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A ReviewIRJET Journal
 
Classification of Images Using CNN Model and its Variants
Classification of Images Using CNN Model and its VariantsClassification of Images Using CNN Model and its Variants
Classification of Images Using CNN Model and its VariantsIRJET Journal
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET Journal
 
IRJET- American Sign Language Classification
IRJET- American Sign Language ClassificationIRJET- American Sign Language Classification
IRJET- American Sign Language ClassificationIRJET Journal
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIOSR Journals
 
Deceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic SignsDeceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic SignsLeonardoSalvucci1
 
An Effective Attendance Management System using Face Recognition
An Effective Attendance Management System using Face RecognitionAn Effective Attendance Management System using Face Recognition
An Effective Attendance Management System using Face RecognitionIRJET Journal
 
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicImproved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicIRJET Journal
 
Conceptual and Practical Examination of Several Edge Detection Strategies
Conceptual and Practical Examination of Several Edge Detection StrategiesConceptual and Practical Examination of Several Edge Detection Strategies
Conceptual and Practical Examination of Several Edge Detection StrategiesIRJET Journal
 
Using A Application For A Desktop Application
Using A Application For A Desktop ApplicationUsing A Application For A Desktop Application
Using A Application For A Desktop ApplicationTracy Huang
 
IRJET- Forensic Detection of Inverse Tone Mapping in HDR Images
IRJET- Forensic Detection of Inverse Tone Mapping in HDR ImagesIRJET- Forensic Detection of Inverse Tone Mapping in HDR Images
IRJET- Forensic Detection of Inverse Tone Mapping in HDR ImagesIRJET Journal
 
Recognition and tracking moving objects using moving camera in complex scenes
Recognition and tracking moving objects using moving camera in complex scenesRecognition and tracking moving objects using moving camera in complex scenes
Recognition and tracking moving objects using moving camera in complex scenesIJCSEA Journal
 
Plant Disease Detection.pptx
Plant Disease Detection.pptxPlant Disease Detection.pptx
Plant Disease Detection.pptxvikasmittal92
 

Semelhante a V1_I2_2012_Paper7.docx (20)

IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
 
IRJET- Mango Classification using Convolutional Neural Networks
IRJET- Mango Classification using Convolutional Neural NetworksIRJET- Mango Classification using Convolutional Neural Networks
IRJET- Mango Classification using Convolutional Neural Networks
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysis
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep Learning
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
 
IRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A ReviewIRJET- Image Segmentation Techniques: A Review
IRJET- Image Segmentation Techniques: A Review
 
Classification of Images Using CNN Model and its Variants
Classification of Images Using CNN Model and its VariantsClassification of Images Using CNN Model and its Variants
Classification of Images Using CNN Model and its Variants
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android App
 
IRJET- American Sign Language Classification
IRJET- American Sign Language ClassificationIRJET- American Sign Language Classification
IRJET- American Sign Language Classification
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
 
Deceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic SignsDeceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic Signs
 
An Effective Attendance Management System using Face Recognition
An Effective Attendance Management System using Face RecognitionAn Effective Attendance Management System using Face Recognition
An Effective Attendance Management System using Face Recognition
 
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicImproved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
 
Conceptual and Practical Examination of Several Edge Detection Strategies
Conceptual and Practical Examination of Several Edge Detection StrategiesConceptual and Practical Examination of Several Edge Detection Strategies
Conceptual and Practical Examination of Several Edge Detection Strategies
 
Using A Application For A Desktop Application
Using A Application For A Desktop ApplicationUsing A Application For A Desktop Application
Using A Application For A Desktop Application
 
IRJET- Forensic Detection of Inverse Tone Mapping in HDR Images
IRJET- Forensic Detection of Inverse Tone Mapping in HDR ImagesIRJET- Forensic Detection of Inverse Tone Mapping in HDR Images
IRJET- Forensic Detection of Inverse Tone Mapping in HDR Images
 
Recognition and tracking moving objects using moving camera in complex scenes
Recognition and tracking moving objects using moving camera in complex scenesRecognition and tracking moving objects using moving camera in complex scenes
Recognition and tracking moving objects using moving camera in complex scenes
 
Plant Disease Detection.pptx
Plant Disease Detection.pptxPlant Disease Detection.pptx
Plant Disease Detection.pptx
 

Mais de praveena06

Methods to Maximize the well being and Vitality of Moribund Communities
Methods to Maximize the well being and Vitality of Moribund CommunitiesMethods to Maximize the well being and Vitality of Moribund Communities
Methods to Maximize the well being and Vitality of Moribund Communitiespraveena06
 
Identification of Differentially Expressed Genes by unsupervised Learning Method
Identification of Differentially Expressed Genes by unsupervised Learning MethodIdentification of Differentially Expressed Genes by unsupervised Learning Method
Identification of Differentially Expressed Genes by unsupervised Learning Methodpraveena06
 
V1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docV1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docpraveena06
 
V1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxV1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxpraveena06
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docpraveena06
 
V1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docV1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docpraveena06
 
V1_I2_2012_Paper2.docx
V1_I2_2012_Paper2.docxV1_I2_2012_Paper2.docx
V1_I2_2012_Paper2.docxpraveena06
 
V1_I2_2012_Paper1.doc
V1_I2_2012_Paper1.docV1_I2_2012_Paper1.doc
V1_I2_2012_Paper1.docpraveena06
 
V1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docV1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docpraveena06
 
V1_I1_2012_Paper5.doc
V1_I1_2012_Paper5.docV1_I1_2012_Paper5.doc
V1_I1_2012_Paper5.docpraveena06
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docpraveena06
 
V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxpraveena06
 
V1_I1_2012_Paper2.docx
V1_I1_2012_Paper2.docxV1_I1_2012_Paper2.docx
V1_I1_2012_Paper2.docxpraveena06
 
V1_I1_2012_Paper1.doc
V1_I1_2012_Paper1.docV1_I1_2012_Paper1.doc
V1_I1_2012_Paper1.docpraveena06
 

Mais de praveena06 (14)

Methods to Maximize the well being and Vitality of Moribund Communities
Methods to Maximize the well being and Vitality of Moribund CommunitiesMethods to Maximize the well being and Vitality of Moribund Communities
Methods to Maximize the well being and Vitality of Moribund Communities
 
Identification of Differentially Expressed Genes by unsupervised Learning Method
Identification of Differentially Expressed Genes by unsupervised Learning MethodIdentification of Differentially Expressed Genes by unsupervised Learning Method
Identification of Differentially Expressed Genes by unsupervised Learning Method
 
V1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docV1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.doc
 
V1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxV1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docx
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.doc
 
V1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docV1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.doc
 
V1_I2_2012_Paper2.docx
V1_I2_2012_Paper2.docxV1_I2_2012_Paper2.docx
V1_I2_2012_Paper2.docx
 
V1_I2_2012_Paper1.doc
V1_I2_2012_Paper1.docV1_I2_2012_Paper1.doc
V1_I2_2012_Paper1.doc
 
V1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docV1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.doc
 
V1_I1_2012_Paper5.doc
V1_I1_2012_Paper5.docV1_I1_2012_Paper5.doc
V1_I1_2012_Paper5.doc
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.doc
 
V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docx
 
V1_I1_2012_Paper2.docx
V1_I1_2012_Paper2.docxV1_I1_2012_Paper2.docx
V1_I1_2012_Paper2.docx
 
V1_I1_2012_Paper1.doc
V1_I1_2012_Paper1.docV1_I1_2012_Paper1.doc
V1_I1_2012_Paper1.doc
 

Último

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Último (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

V1_I2_2012_Paper7.docx

  • 1. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 50 Selection of Feature Regions Set for Digital Image Using Optimization Algorithm Alpana A. Borse1 , Snehal M. Kamlapur2 1 PG Student, KKWIEER,Nasik, India 2 Associate Professor, KKWIEER,Nasik, India Email:alpana.borse@gmail.com, snehal_kamalapur@yahoo.com Abstract- A feature based “Selection of feature region set for digital image using Optimization Algorithm” is proposed here. The work is based on simulated attacking and optimization solving procedure. Image transformation techniques are used to extract local features. Simulated attacking procedure is performed to evaluate the robustness of every candidate feature region. According to the evaluation results, a track-with-pruning procedure I adopted to search a minimal primary feature set which may resists the most predefined attacks. In order to enhance its resistance capability against undefined attacks, primary feature set is then extended by adding some auxiliary feature regions in it. This work is formulated as a multidimensional knapsack problem and solved by optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization and Simulated Annealing. Keywords - Feature, optimization, robust, simulated attacks I. INTRODUCTION With the rapid development of internet, manipulation of data becomes easier. Application uses digital data including electronic advertising, real-time video and audio delivery, digital repositories and libraries, and Web publishing. This ease of access to digital data brings with itself the problem of copyright protection. It has been recognized that current copyright laws are not enough for dealing with digital data. This has led to an interest towards developing new copy prevention and protection mechanisms. Thus, increasing interest is based on robust regions set, using such robust regions one could keep their information secure. The existing methods do not imply higher robustness and may degrade the quality of the digital image against unknown attacks as characteristics of unknown attacks vary with known attacks. Thus, the difficulty is to obtain or select most robust feature region set for information hiding. The effectiveness of a digital image is indicated by the robustness of regions against various attacks. The robust regions are mainly used to sign copyright information of the digital work as robust regions can resist information after various kinds of attacks such as signal processing or geometric distortions. Thus it is necessary to work on following issues,  Finding the most robust region set of a digital image against various kinds of attacks for hiding information,  developing a faster robustness measurement  improving image quality So feature region set selection method based on optimization approaches, by which selection of the most robust regions without violating the image quality is proposed here. II. SYSTEM ARCHITECTURE The system architecture is as in “Figure 1”. There are two operational stages as Primary feature set searching stage and feature set extension stage respectively. 2.1 Primary Stage ( Searching Stage) The aim is to obtain primary feature region set. a. Extract features To extract local features, feature detectors are used. Feature detectors perform specific transformations on digital images to extract their local features, ranging from a point to an object, and have been adopted in many applications such as object recognition, database retrieval, and motion tracking. Most features of an image can be preserved after it suffers a distortion such as scaling, rotation, or illumination changes. Therefore, several feature-based methods have been developed by exploiting the robustness of feature regions against various attacks. Normally, feature selection according to a single criterion like corner response or the number of neighbouring feature points to obtain regions. Various corner detectors can be used to detect corners. Here, Harris – Laplace corner detector is used to obtain regions. “Figure 2” shows the regions detected by Harris – Laplace corner detector.
  • 2. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 51 Figure 1: System Architecture b. Simulated attacking and selection of non overlapping region set Since the magnitude of the region gets modified after attacks on region, it is preferred to select nonoverlapping regions to avoid major degradation of image quality.It is hard to accurately identify the robustness of all regions by a single criterion like the corner response. Therefore, this stage is based on simulated attacking. It would be helpful to find out the most robust regions if there is prior knowledge of each region’s attack resistance capability.Moreover, a feature region may have different degrees of robustness against different attacks [4], [8]. Regions obtained in “Figure 2” are survived with different predefined attacks. A few representative attacks are applied to the feature regions for evaluating their robustness in the simulated attacking phase. The attack resistance analysis phase is implemented by a two-step procedure. The original feature regions are first checked if they can be re-detected in the attacked image. The redetected region is examines the consistency (bit error) between itself after attacks. Using dr,a to indicate whether the region can resist the predefined attack or not, it is defined as Figure 2: Regions detected by Harris-Laplacian Corner detector dr, a = { 1 BER(W, Wr) ≤ T 0 otherwise ……….. (1) Where, BER (I, Ia) denotes the bit error between original image I and image Ia after different attacks on it T a predefined bit error threshold In the final phase, the most robust and smallest set of nonoverlapping feature regions is selected according to the result of attack resistance analysis. This work is formulated as follows: R∗ 𝑝 = arg 𝑚𝑎𝑥 Rp {∑ 𝑥 𝑅𝑝 𝑎𝑖 Na 𝑖=1 min 𝑅𝑝; } rk, rj ∈ Rp, k≠j --> rk∩ rj = Ø ……….(2) Where, Rp is the set of selected feature regions in which any two regions rk and rj are not overlapped, and The value of for a predefined attack is determined by = ………… (3) Where, R the Rp satisfying with the maximum Value of ∑ 𝑋Rp 𝑁𝑎 𝑖=1 ai The selection would be such that, by the involvement of such region’s series, all predefined attacks on this series can be resisted As a result, a region set would be better in robustness when its regions can be complementary in attack resistance as many as possible. These results are obtained with the help of track with pruning algorithm. A track with pruning Algorithm Step 1: Initialize associated parameters and set the size of inspected feature region sets as NULL. Step 2: Check if the termination condition is satisfied. Step 3: while it cannot resist more attacks The candidate Set is included in the pruned set by adding more feature regions.
  • 3. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 52 Step 4: Otherwise Update the primary feature region set with a candidate feature region set if the latter can resist more attacks than the former. Step 5: Stop. In practice, the aggregate attack resistance capability of all selected nonoverlapping regions is more convincing, and it could be regarded as the overall robustness of a digital image.Sometimes this set may fail to resist some non predefined attacks, hence we need to add some auxiliary regions selected from those residual feature regions to enhance the robustness of image against undefined attacks under preserving its visual quality. Since the characteristics of undefined attacks are of wide variety and are difficult to model, we therefore adopt a multi-criteria optimization strategy [15], [16] for the selection of auxiliary feature regions. This phenomena of feature region selection method based on multi-criteria optimization strategy is described in stage 2. 2.2 Extended Stage (Optimization Stage) Neither corner response nor the number of its neighbouring feature points, however, can guarantee the selection of nonoverlapping regions with the maximum robustness to various attacks, because higher corner response and a large number of its neighbouring feature points do not always imply higher robustness of itself. Moreover, a feature region may have different degrees of robustness against different attacks [3], [5]. A feature region selection is optimized by optimization to obtain robust regions against unknown attacks occurs, as, a feature region may have different degrees of robustness against different kinds of attacks. To optimize the regions following optimization algorithms are used–  Genetic Algorithm (GA) [7], [8], [9]  Particle Swarm Optimization (PSO) [6], [9] and  Simulated Annealing (SA) [11] An optimal feature region set is chosen to resist the predefined attacks. But this set may fail to resist some non predefined attacks, we need to add some auxiliary regions selected from those residual feature regions to enhance the robustness of image against undefined attacks under preserving its visual quality. Since the characteristics of undefined attacks are of wide variety and are difficult to model, we therefore adopt a multi- criteria optimization strategy for the selection of auxiliary feature regions. First, the assumption that the feature regions which survive more types of predefined attacks are more likely to resist undefined attacks is applied. The symbol is defined to indicate the overall resistance degree of the region against all predefined attacks, and it is determined by = (dr1, a1 + dr1, a2 + ………..+ drn, aNa) = ∑ 𝑋Rp 𝑁𝑎 𝑖=1 …………. (4) Where, dri, ai ε {0, 1} indicates if the region can resist the ith predefined attack ai and Na the total number of predefined attacks. The resistance of a region against a predefined attack is regarded as a possible characteristic of the region. The symbol ga r is the summary representation of Na characteristics of a region. Other two generic characteristics of feature regions, the corner response and the integration scale are referred, since we cannot exclude the possibility that there are undefined attacks with the characteristics never occurred in the predefined attacks. The parameter which denotes the limitation of quality degradation of an image after being attacked considered as peak signal-to-noise ratio (PSNR) value between a cover image and attacked image. Therefore, the work of the extension stage can be formulated as an optimization problem formulated as Multi Dimensional knapsack problem (MDKP) with multiple constraints as follows, Maximize∑ (𝑔 𝑎 𝑟𝑗 + 𝑔 𝑐 𝑟𝑗 + 𝑔 𝜎 𝑟𝑗 ) |𝑅𝑝∗| 𝑗=1 Srj …………. (5) Subject to ∑ 𝑞 𝑎 𝑟𝑗 |𝑅𝑝∗| 𝑗=1 . Srj ≤ Qc ∑ (𝑝𝑟𝑖,𝑟𝑗𝑠𝑟𝑖𝑠𝑟𝑗 < 1) 𝑖 = |𝑅𝑝∗| 𝑗=1 1,2,3, … , |𝑅𝑝∗ | ……....… (6) Where, 𝑅𝑝∗ The number of feature regions except those in the primary feature region set as well as the regions overlapped with them and 𝑠𝑟𝑖 is defined as, 𝑠𝑟𝑖 = { 1 if the reggion ri is selected 0 otherwise ...… (7) The value of 𝑝𝑟𝑖𝑟𝑗 indicates whether the two regions are overlapped and is defined as 𝑝𝑟𝑖𝑟𝑗 = {1 ri ∩ rj ≠ Ǿ 0 otherwise ……… (8)
  • 4. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 53 The optimization problem formulated by 5 and 6 can be formulated as MDKP that is a knapsack problem with a collection of different constraints. A heuristic search procedure is adopted to solve this MDKP for determining the best choice of auxiliary feature regions. Hence, to solve this MDKP for determining the best choice of auxiliary feature regions and best choice of optimization algorithm we have used some optimization approaches such as GA, PSO, and SA. III. THE ALGORITHMIC FRAMEWORK OF GA, PSO AND SA i) Genetic Algorithm (GA) Generate initial population Do Calculate the fitness of each member // simulate another generation Do Select parents from current population Perform crossover add offspring to the new population while new population is not full Merge new population into the current population Mutate current population while not converged ii) Particle Swarm Optimization (PSO) Randomly generate an initial population Repeat for i = 1 to population_size do if f( Xi) < f( Pi) then Pi=Xi Pg = min (Pneighbours); for d =1 to dimensions do velocity_update(); position_update(); end end until termination criterion is met. iii. Simulated Annealing (SA) Function SIMULATED-ANNEALING(Problem, Schedule) returns a solution state Current = MAKE- REGION (INITIAL-SOLUTION [Problem]) For t = 1 to N do T = Schedule[t] // Index If T = 0 then return Current Next = a randomly selected successor of Current Cost = VALUE[Next] – VALUE[Current] if Cost > 0 then Current = Next else Current = Next only with probability exp(-Cost /T) End
  • 5. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 54 Comparing results of these different optimization techniques on feature region set, it determines the best choice of optimization techniques for selecting most robust region set under the constraint of preserving image quality and extracting feature regions in less amount of time. IV. EXPERIMENTALRESULTS System is implemented using Matlab. Results are obtained for test images. The systems implement Harris- Laplacian based robust region set selection. The corner response values are used to remove overlapping feature regions. TABLE 1 illustrates the comparisons, based on the criterion of detection ratio, defined as the ratio of the number successfully detected regions with respect to total number of regions in an image. TABLE I TABLE II and TABLE III gives results for regions, RN. Where RN  Region Number {3, 5, 6, 7, 8} TABLE II TABLE III As illustrated in TABLE II and III, this system enhances the robustness of the system of feature based methods against attacks. . “Figure 3” and “Figure 4” shows results of the proposed system. V. CONCLUSIONS Image Jpeg 50 Jpeg 60 Rotate 15 Rotate 30 Median Gnoises LE 4/5 4/5 5/5 4/5 3/5 5/5 BA 3/6 5/6 6/6 4/6 6/6 6/6 FR 2/4 2/4 ¾ 1/4 1/4 4/4 RN JPEG 50 JPEG 60 Rotate 15 Rotate30 Median Filter Gnoises 3 1 1 1 1 1 1 5 0 0 1 1 0 1 6 1 1 1 0 0 1 7 1 1 1 1 1 1 8 1 1 1 1 1 1 RN Corner Response Attack Resistance Capability 3 49.2244 3 5 36.6759 3 6 38.1657 3 7 45.9059 3 8 44.7766 3
  • 6. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 55 The aim behind “Selection of feature region set for digital image using Optimization Algorithm” is implying higher robustness of the digital image. This system is mainly based on simulated attacking and optimization solving procedure, for obtaining robust region set. It uses integration scale, corner response and attack’s resistance capability as performance parameters. Optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization and Simulated Annealing to optimize the regions are used. The results generated after comparing different optimization techniques, determines the best technique for selection of most robust region set under the constraints of preserving image quality and extracting feature region set in less amount of time. Thus, optimization based methods significantly improves the robustness of a digital image. Hence, this system is suitable for applications in which robustness of a digital image is primary key, such as, hiding information or prevention and protection of digital contents. TABLE IV illustrates the comparison of an optimization algorithm to optimized regions TABLE IV SN Terms GA PSO SA 1 Number of Lines More Few Few 2 Memory More Less Less 3 Time Less More More 4 Tuning of parameters Difficult Easiest Easiest 5 Structure Complex Simple Simple 6 Implementation Difficult Easy Easy Following figure shows regions after attacked on region. ‘a’ ‘b’ ‘c’ ‘d’ ‘e’ Figure 3: Attacked region Where, a : original region b : attacked region after – JPEG Attack c : attacked region after – ROTATE Attack d : attacked region after – Gnoises Attack e : attacked region after – Median Filter Attack Following images gives results of this system
  • 7. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.50-56 ISSN: 2278-2419 56 ‘a’ ‘b’ ‘c’ ‘d’ ‘e’ ‘f’ ‘g’ Figure 4: Results of “Selection of feature region set for digital image using Optimization Algorithm” Where, a: Original Image of Lina b: Image after applied Harris Laplace Corner c: Image before applying TWPA algorithm d: Image after applying TWPA algorithm e: Image obtained after applying GA f: Image obtained after applying PSO g: Image obtained after applying SA Detector Results: Number of Regions for optimization {7, 3, 5, 6, 8} Fig. ‘d’: Number of Regions obtained after GA {8, 3, 5} Fig. ‘e’: Number of Regions obtained after PSO {8, 3, 7} Fig. ‘f’: Number of Regions obtained after SA{8, 3} REFERENCES [1] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Kuo , “On the Selection Optimal Feature Region Set for Robust Digital Image Watermarking”, in IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011 [2] J. S. Tsai, W. B. Huang, C. L. Chen, and Y. H. Kuo, “A feature- based digital image watermarking for copyright protection and content authentication, "in Proc. IEEE Int. Conf. Image Process., Sep. 200, vol.5, pp. 469–472. [3] D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, Nov. 2004. [4] C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Mark Liao, “Cocktail watermarking for digital image protection,” IEEE Trans. Multimedia, vol. 2, no. 4, pp. 209–224, Dec. 2000. [5] J. S. Seo and C. D. Yoo, “Image watermarking based on invariant regions of scale-space representation,” [6] IEEE Trans. Signal Process., vol. 54, no. 4, pp. 1037–1049, Apr. 2006. [7] Konstantinos E. Parsopoulos, Michael N. Vrahatis, “ Particle Swarm Optimization for Constrained optimization Algorithms” research centre (UPAIRC), GR -26110, Patras, Greece [8] Riccardo Poli, William B. Langdon and Nicholas F. McPhee “A Field Guide to Genetic Programming” University of Essex – UK rpoli@essex.ac.uk [9] Golderberg, David E., Genetic Algorithms: in Search, Optimization & Machine Learning, Addison-Wesley Publishing Company, Inc., New York, 1989. [10] Sadiq M. Sait and Habib Youssef, Iterative Computer Algorithms with Application to Engineering: Solving Combinatorial Optimization Problems, IEEE Computer Society, LA, 1999. [11] George S. Tarasenko, Stochastic Optimization in the Soviet Union Random Search Algorithms, Delphic Associates, Inc., VA, 1985. [12] Duc Truong Pham and Dervis Karaboga, Intelligent Algorithms, tabu search, simulated annealing and neural networks, Springer, New York, 1998.