2021
DOI: 10.11591/ijece.v11i1.pp872-878
|View full text |Cite
|
Sign up to set email alerts
|

Developing digital signal clustering method using local binary pattern histogram

Abstract: In this paper we presented a new approach to manipulate a digital signal in order to create a features array, which can be used as a signature to retrieve the signal. Each digital signal is associated with the local binary pattern (LBP) histogram; this histogram will be calculated based on LBP operator, then k-means clustering was used to generate the required features for each digital signal. The proposed method was implemented, tested and the obtained experimental results were analyzed. The results showed th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…The face detection process starts with image capture, loading, and conversion to grayscale. The Haar cascade classifier is then used to detect faces, categorizing images as positive (with a face) or negative (without a face) [22]. This classification relies on a trained classifier that determines if a new image is positive or negative based on a dataset of face and non-face images.…”
Section: Face Detection and Face Recognitionmentioning
confidence: 99%
“…The face detection process starts with image capture, loading, and conversion to grayscale. The Haar cascade classifier is then used to detect faces, categorizing images as positive (with a face) or negative (without a face) [22]. This classification relies on a trained classifier that determines if a new image is positive or negative based on a dataset of face and non-face images.…”
Section: Face Detection and Face Recognitionmentioning
confidence: 99%
“…6) The cover image is sourced, and its dimensions are ascertained. (7) The cover image undergoes reshaping into a single-row matrix.…”
Section: Proposed Ulsb2 Steganographic Techniquementioning
confidence: 99%
“…It has been asserted that successful decryption can only transpire if the decryption key is available to the receiver. Parallelly, steganography is characterised as the act of covertly embedding a secret message within a cover file, ensuring its presence remains wholly obscured [1][2][3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Speech signal [1,2] is a set of samples, each of them represents the amplitude value for the corresponding analogue value sampled and quantized at a period of time, this signal can be represented by a one column matrix (mono speech) or two column matrix (stereo speech), these matrices can be easily maintained to apply a necessary operation using the speech signal [3][4][5] .…”
Section: Introductionmentioning
confidence: 99%