Abstract. In recent years, there has been a dramatic increase in the number of images captured by users. This is due to the wide availability of digital cameras and mobile phones which are able to capture and transmit images. Simultaneously, image-editing applications have become more usable, and a casual user can easily improve the quality of an image or change its content. The most common type of image modication is cloning, or copy-move forgery (CMF), which is easy to implement and dicult to detect. In most cases, it is hard to detect CMF with the naked eye and many possible manipulations (attacks) can be used to make the doctored image more realistic. In CMF, the forger copies part(s) of the image and pastes them back into the same image. One possible transformation is rotation, where an object is copied, rotated and pasted. Rotation-invariant features need to be used to detect Copy-Rotate-Move (CRM) forgery. In this paper we presented three contributions. First, a new technique to detect CMF is developed, using Dense Scale-Invariant Feature Transform (DSIFT). Second, a new improved DSIFT descriptor is implemented which is more robust to rotation than Zernike moments. Third, a new method to remove false matching is proposed. Extensive experiments have been conducted to train, evaluate and test the algorithms, the new feature vector and the suggested method to remove false matching. We show that the proposed method can detect forgery in images with blurring, brightness change, colour reduction, JPEG compression, variations in contrast and added noise.
Road signs are so important because they help preserve safe driving conditions; they also influence the safety of drivers and pedestrians. Without these signs, no one would know the driving speed limit, on which direction to drive down a road, any upcoming hazard, or whether they are approaching a merge. It would be chaotic to drive in such situations. Moreover, these signs help new drivers to find their way in the absence of navigators. Therefore, traffic sign recognition takes a critical place in computer vision applications to develop an effective algorithm. In order to tackle this challenge, we proposed the use of Multi-language Traffic Sign Detection and Classification. One of our contributions in this work is that, instead of using the standard grayscale image, we used the RGB colored image. This image is converted into the 2D highest-level grayscale image using the largest values of each pixel in the RGB channels. The novel generated image has the strongest features of the RGB image that make the features distinct and more informative in the classification step. Consider that, in general, the traffic sign has two colors only, the foreground (text location) and background (non-text location). The Maximally Stable Extremal Regions (MSER) used to extract features from the 2D image where the locations of interest are well-identified exclusively by an extremal property of the intensity function in the location and on its outer boundary. The geometrical properties and thinning operations were used to remove the non-text locations. A multi-language OCR was used to understand multi-language. This proposed method has been tested using 240 images which were collected from the Internet and two datasets. The experimental results demonstrated the performance of the proposed method where the traffic sign detected in 92% of the tested images with a very high percentage of localization.
Abstract. The ready availability of image-editing software makes ensuring the authenticity of images an important issue. The most common type of image tampering is cloning, or Copy-Move Forgery (CMF), in which part(s) of the image are copied and pasted back into the same image. One possible transformation is where an object is copied, rotated and pasted; this type of forgery is called Copy-Rotate-Move Forgery (CRMF). Applying post-processing can be used to produce more realistic doctored images and thus can increase the difficulty of forgery detection. This paper presents a novel segmentation-based Copy-Move forgery detection method. A new method has been developed to segment the Copy-Move objects in a consistent way that is more efficient than Simple Linear Iterative Clustering (SLIC) segmentation for CMF/CRMF. We propose a new method to describe irregular shaped blocks (segments). The Segment Gradient Orientation Histogram (SGOH), is used to describe the gradient distribution of each segment. The quality of initial matches is improved by applying hysteresis to grow the primary detection regions. We show that the proposed method can effectively detect forgery involving translation and rotation. Moreover, the proposed method can detect forgery in images with blurring, brightness change, colour reduction, JPEG compression, variations in contrast and added noise.
In a deterministic environment, continuity in planning robot tasks and acting upon the generated plans is essential. This aspect does not commit the planner to generate all the required actions in advance, however; instead, the robot planner can generate the necessary abstract actions, then make the actor responsible for refining these actions into commands. Such commands are executed directly by the robot platform. In this paper, the planning and acting framework, known as RosPlanAct, is modified by including a temporal model that deals with the time interval for each action in the plan. Thus, a chronicle is associated with the abstract actions during the planning phase to act as a base for refining these actions into more detailed activities. The extended framework also has the ability to postpone the execution of any action that requires more details and to activate the monitoring function to compare what was observed with predicted results. This framework was tested in simulation and in real environments. The simulation environment was ROS, with a smart robot car used as a real testing environment. The results showed high performance in accomplishing the specified tasks with an increasing rate of success in executing the actions in the determined period of time and a low rate of failed execution. Throughout this paper, the actor was supported by being given the ability to avoid failure by online interactions between planning and acting sections in order to trigger the executing platform to perform the given task in a deterministic environment. The robot can thus refine the actions in the plan, re-planning as required in order to handle events arising.
Repair and maintenance of underwater structures as well as marine science rely heavily on the results of underwater object detection, which is a crucial part of the image processing workflow. Although many computer vision-based approaches have been presented, no one has yet developed a system that reliably and accurately detects and categorizes objects and animals found in the deep sea. This is largely due to obstacles that scatter and absorb light in an underwater setting. With the introduction of deep learning, scientists have been able to address a wide range of issues, including safeguarding the marine ecosystem, saving lives in an emergency, preventing underwater disasters, and detecting, spooring, and identifying underwater targets. However, the benefits and drawbacks of these deep learning systems remain unknown. Therefore, the purpose of this article is to provide an overview of the dataset that has been utilized in underwater object detection and to present a discussion of the advantages and disadvantages of the algorithms employed for this purpose.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.