Frequency: Quarterly E- ISSN: Awaited P- ISSN: Abstracted/ Indexed in: Ulrich's International Periodical Directory, Google Scholar, SCIRUS, Genamics JournalSeek, EBSCO Information Services
Quarterly published "Inventi Rapid: Image & Video Processing" publishes high quality unpublished, as well as high impact pre-published research and reviews related to graphical tools to visualize, manipulate and process images and videos. The journal includes medical imaging besides many other application areas.
Now days, Surveillance Cameras are used everywhere from home to public and commercial places mainly for purposes like security and monitoring. This project is an application for automatic face detection and tracking in Real Time Video streams from surveillance cameras. The work has been done with web cameras in Open Source platform of 32 bit OpenCV2.4.13 with Python 2.7.8 on 64 bit Windows7. The algorithm uses Haar Feature based Cascade Classifier to extract Haar like features developed from the algorithm proposed by Viola-Jones. Here, the purpose is to count the attendance of students in regular classroom and in examination hall as well as to identify the person present in the video and to decide whether the person belongs to the database or not. The project developed here also shows the details of the person present in video from surveillance camera. We generated the database using the advanced version of mysql that is sqlite3.1.1. Here we have generated database of 4 to 5 persons and it can be extended for many. This project can be extended for smart screens in smart classrooms, offices, institutions etc....
Video stabilization is an instrumental and a very commonly employed image processing operations, yet still a very active area of research. Various mechanisms methods are employed for different applications as and when it is required. Although lots of work have been done in the field of video stabilization, however still not much work has been done in the field of real time video stabilization, especially works dealing with implementation of technology for mounted end applications like capturing systems on off-road vehicles and UAVs. For such specific applications, the computation resource utilization of the stabilization system, especially the motion estimation part decides the overall realtime performance of the system. For that, the choice of descriptor used for motion estimation becomes very important. This paper gives a detailed overview of all the motion estimation techniques and different descriptors, along with a specific discussion on the requirements for real time performance....
This manuscript is related to use of linear algebra called “SVD” to digital image processing. We investigate the use of SVD in digital image processing for image compression and face recognition. Singular value decomposition method can transpose a matrix into USV^t, which is use to refactoring a digital image in three matrices. The using of singular values of such refactoring allows us to represent the image with a smaller set of values, which can preserve useful features of the original image, but use less storage space in the memory, and achieve the image compression process. For image compression by SVD, we will do an experiment on a digital image with the help of MATLAB code. We will use different singular values for compression of image and evaluate different compression ratio and quality measurement for best compression. To perform face recognition with SVD, we treated the set of known faces as vectors in a subspace, called “facespace”, spanned by a small group of “basefaces”. The projection of a new image onto the baseface is then compared to the set of known faces to identify the face. All tests and experiments are carried out by using MATLAB as computing environment and programming language....
Video authentication is a process to establish the fidelity of a digital video. A video authentication system ensures the integrity of digital video and verifies that the video taken into use has not been doctored. In digital watermarking, customized data is embedded in a digital content like an image, video and audio for digital right management, copy control or authentication. For authentication, fragile or semi-fragile watermarks are usually used, where the authentication systems reject any modification made to a digital content. Mainly video watermarking techniques are divided into two types: frequency domain and spatial domain. The idea is to authenticate the digital data by adding watermarking information and extract it back successfully for verification purpose. In commercial video processing systems, watermark embedding and detection need to be performed in real time. For still pictures, detection of the robust watermark can take as long as a few seconds, but this delay is unacceptable for motion pictures especially when the frame rate is fast....
Loading....