Loading...
Search for: image-retrieval
0.007 seconds

    A fusion-based gender recognition method using facial images

    , Article 26th Iranian Conference on Electrical Engineering, ICEE 2018, 8 May 2018 through 10 May 2018 ; 2018 , Pages 1493-1498 ; 9781538649169 (ISBN) Ghojogh, B ; Bagheri Shouraki, S ; Mohammadzade, H ; Iranmehr, E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    This paper proposes a fusion-based gender recognition method which uses facial images as input. Firstly, this paper utilizes pre-processing and a landmark detection method in order to find the important landmarks of faces. Thereafter, four different frameworks are proposed which are inspired by state-of-the-art gender recognition systems. The first framework extracts features using Local Binary Pattern (LBP) and Principal Component Analysis (PCA) and uses back propagation neural network. The second framework uses Gabor filters, PCA, and kernel Support Vector Machine (SVM). The third framework uses lower part of faces as input and classifies them using kernel SVM. The fourth framework uses... 

    Hierarchical concept score post-processing and concept-wise normalization in CNN based video event recognition

    , Article IEEE Transactions on Multimedia ; Volume: 21 , Issue: 1 , Jan , 2019 , 157 - 172 ; 15209210 (ISSN) Soltanian, M ; Ghaemmaghami, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    This paper is focused on video event recognition based on frame level CNN descriptors. Using transfer learning, the image trained descriptors are applied to the video domain to make event recognition feasible in scenarios with limited computational resources. After fine-tuning of the existing Convolutional Neural Network (CNN) concept score extractors, pre-trained on ImageNet, the output descriptors of the different fully connected layers are employed as frame descriptors. The resulting descriptors are hierarchically post-processed and combined with novel and efficient pooling and normalization methods. As major contributions of this work to the video event recognition, we present a... 

    A multi-view-group non-negative matrix factorization approach for automatic image annotation

    , Article Multimedia Tools and Applications ; Volume 77, Issue 13 , 2018 , Pages 17109-17129 ; 13807501 (ISSN) Rad, R ; Jamzad, M ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    In automatic image annotation (AIA) different features describe images from different aspects or views. Part of information embedded in some views is common for all views, while other parts are individual and specific. In this paper, we present the Mvg-NMF approach, a multi-view-group non-negative matrix factorization (NMF) method for an AIA system which considers both common and individual factors. The NMF framework discovers a latent space by decomposing data into a set of non-negative basis vectors and coefficients. The views divided into homogeneous groups and latent spaces are extracted for each group. After mapping the test images into these spaces, a unified distance matrix is... 

    An image annotation rectifying method based on deep features

    , Article 2nd International Conference on Digital Signal Processing, ICDSP 2018, 25 February 2018 through 27 February 2018 ; 2018 , Pages 88-92 ; 9781450364027 (ISBN) Ghostan Khatchatoorian, A ; Jamzad, M ; Sharif University of Technology
    Association for Computing Machinery  2018
    Abstract
    Automatic image annotation methods generate a list of tags for each test image and present it in a matrix structure. To achieve a more accurate annotation, we propose a method with the aim of correcting the tag list. In our method, we detect an indicator for each group of tags and use it to rectify the annotation results. To find a correct indicator, we apply a deep feature vector generated by the “AlexNet” model. Using this indicator, we determine the suitable tags for an image. The purposed method is independent of feature vector, dataset, and annotation method. It can be applied to the currently available annotation methods. Our experiments showed improvement in all annotation methods... 

    Partial discharges pattern recognition of transformer defect model by LBP & HOG features

    , Article IEEE Transactions on Power Delivery ; 2018 ; 08858977 (ISSN) Firuzi, K ; Vakilian, M ; Phung, B. T ; Blackburn, T. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Partial discharge (PD) measurement and identification have great importance to condition monitoring of power transformers. In this paper a new method for recognition of single and multi-source of PD based on extraction of high level image features have been introduced. A database, involving 365 samples of phase-resolved PD (PRPD) data, is developed by measurement carried out on transformer artificial defect models (having different sizes of defect) under a specific applied voltage, to be used for proposed algorithm validation. In the first step, each set of PRPD data is converted into grayscale images to represent different PD defects. Two “image feature extraction” methods, the Local Binary... 

    Using minimum matching for clustering with balancing constraints

    , Article 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8 August 2009 through 9 August 2009 ; Volume 1 , 2009 , Pages 225-228 ; 9781424442461 (ISBN) Shirali Shahreza, S ; Abolhassani, H ; Shirali Shahreza, M. H ; Yangzhou University; Guangdong University of Business Studies; Wuhan Institute of Technology; IEEE SMC TC on Education Technology and Training; IEEE Technology Management Council ; Sharif University of Technology
    2009
    Abstract
    Clustering is a major task in data mining which is used in many applications. However, general clustering is inappropriate for many applications where some constraints should be applied. One category of these constraints is the cluster size constraint. In this paper, we propose a new algorithm for solving the clustering with balancing constraints by using the minimum matching. We compare our algorithm with the method proposed by Banerjee and Ghosh that uses stable matching and show that our algorithm converge to the final solution in fewer iterations. ©2009 IEEE  

    Steganalysis of LSB based image steganography using spatial and frequency domain features

    , Article 2009 IEEE International Conference on Multimedia and Expo, ICME 2009, New York, NY, 28 June 2009 through 3 July 2009 ; 2009 , Pages 1744-1747 ; 9781424442911 (ISBN) Malekmohamadi, H ; Ghaemmaghami, S ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose a method for steganalysis of grayscale images using both spatial and Gabor features. The basis of our work is to use Gabor filter coefficients and statistics of the graylevel co-occurrence matrix of images to train a support vector machine. We show that this feature set works well in steganalysis of grayscale images steganographied by LSB matching and S-tools. ©2009 IEEE  

    Content based image retrieval using the knowledge of texture, color and binary tree structure

    , Article 2009 Canadian Conference on Electrical and Computer Engineering, CCECE '09, St. Johns, NL, 3 May 2009 through 6 May 2009 ; 2009 , Pages 999-1003 ; 08407789 (ISSN); 9781424435081 (ISBN) Mansoori, Z ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    Content base image retrieval is an important research field with many applications. In this paper we presents a new approach for finding similar images to a given query, in a general-purpose image database using content-based image retrieval. Color and texture are used as basic features to describe images. In addition, a binary tree structure is used to describe higher level features of an image. It has been used to keep information about separate segments of the images. The performance of the proposed system has been compared with the SIMPLIcity system using COREL image database. Our experimental results showed that among 10 image categories available in COREL database, our system had a... 

    Using geometrical routing for overlay networking in MMOGs

    , Article Multimedia Tools and Applications ; Volume 45, Issue 1-3 , 2009 , Pages 61-81 ; 13807501 (ISSN) Hariri, B ; Pakravan, M. R ; Shirmohammadi, S ; Alavi, M. H ; Sharif University of Technology
    2009
    Abstract
    At a first glance, transmitting update information to a geographic region in the virtual space seems to be an attractive primitive in Massively Multiplayer Online Gaming (MMOG) applications where players are constantly moving and need to send updates to their neighbors who are in the same region of the virtual space. The system would become more scalable if entities did not need to keep track of each other or send messages directly to one another. Rather, an entity could just send a message to a specific region in the virtual space (its area of effect), as opposed to sending packets to specific IP addresses, significantly reducing tracking and routing overhead. Fundamentally speaking, update... 

    Secure steganography based on embedding capacity

    , Article International Journal of Information Security ; Volume 8, Issue 6 , 2009 , Pages 433-445 ; 16155262 (ISSN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    Mostly the embedding capacity of steganography methods is assessed in non-zero DCT coefficients. Due to unequal distribution of non-zero DCT coefficients in images with different contents, images with the same number of non-zero DCT coefficients may have different actual embedding capacities. This paper introduces embedding capacity as a property of images in the presence of multiple steganalyzers, and discusses a method for computing embedding capacity of cover images. Using the capacity constraint, embedding can be done more secure than the state when the embedder does not know how much data can be hidden securely in an image. In our proposed approach, an ensemble system that uses... 

    Video activity analysis based on 3D wavelet statistical properties

    , Article 11th International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, 15 February 2009 through 18 February 2009 ; Volume 3 , 2009 , Pages 2054-2058 ; 17389445 (ISSN); 9788955191387 (ISBN) Omidyeganeh, M ; Ghaemmagham, S ; Khalilain, H ; IEEE Communications Society, IEEE ComSoc; IEEE Region 10 and IEEE Daejeon Section; Korean Institute of Communication Sciences, KICS; lEEK Communications Society, IEEK ComSoc; Korean Institute of Information Scientists and Engineers, KIISE; et al ; Sharif University of Technology
    2009
    Abstract
    A video activity analysis is presented based on 3D wavelet transform. Marginal and joint statistics as well as mutual information estimates are extracted. Marginal histograms are approximated by Generalized Gaussian Density (GGD) functions. The mutual information between coefficients -as a quantitative estimate of joint statistics- decreases when the activity in the video increases. The relationship between kurtosis graphs, extracted from joint distributions and video activity, is deduced. Results show that the type of activity in the video can be figured out from Kurtosis curves. The GGD and the Kullback-Leibler distance (KLD) are used to retrieve and locate 96% of videos properly  

    Partial discharges pattern recognition of transformer defect model by LBP & HOG features

    , Article IEEE Transactions on Power Delivery ; Volume 34, Issue 2 , 2019 , Pages 542-550 ; 08858977 (ISSN) Firuzi, K ; Vakilian, M ; Phung, B. T ; Blackburn, T. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Partial discharge (PD) measurement and identification have great importance to condition monitoring of power transformers. In this paper, a new method for recognition of single and multi-source of PD based on extraction of high level image features has been introduced. A database, involving 365 samples of phase-resolved PD (PRPD) data, is developed by measurement carried out on transformer artificial defect models (having different sizes of defect) under a specific applied voltage, to be used for proposed algorithm validation. In the first step, each set of PRPD data is converted into grayscale images to represent different PD defects. Two 'image feature extraction' methods, the Local Binary... 

    Hierarchical concept score postprocessing and concept-wise normalization in CNN-based video event recognition

    , Article IEEE Transactions on Multimedia ; Volume 21, Issue 1 , 2019 , Pages 157-172 ; 15209210 (ISSN) Soltanian, M ; Ghaemmaghami, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    This paper is focused on video event recognition based on frame level convolutional neural network (CNN) descriptors. Using transfer learning, the image trained descriptors are applied to the video domain to make event recognition feasible in scenarios with limited computational resources. After fine-tuning of the existing CNN concept score extractors, pretrained on ImageNet, the output descriptors of the different fully connected layers are employed as frame descriptors. The resulting descriptors are hierarchically postprocessed and combined with novel and efficient pooling and normalization methods. As major contributions of this paper to the video event recognition, we present a... 

    Hierarchical concept score postprocessing and concept-wise normalization in cnn-based video event recognition

    , Article IEEE Transactions on Multimedia ; Volume 21, Issue 1 , 2019 , Pages 157-172 ; 15209210 (ISSN) Soltanian, M ; Ghaemmaghami, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    This paper is focused on video event recognition based on frame level convolutional neural network (CNN) descriptors. Using transfer learning, the image trained descriptors are applied to the video domain to make event recognition feasible in scenarios with limited computational resources. After fine-tuning of the existing CNN concept score extractors, pretrained on ImageNet, the output descriptors of the different fully connected layers are employed as frame descriptors. The resulting descriptors are hierarchically postprocessed and combined with novel and efficient pooling and normalization methods. As major contributions of this paper to the video event recognition, we present a... 

    Architecture to improve the accuracy of automatic image annotation systems

    , Article IET Computer Vision ; Volume 14, Issue 5 , August , 2020 , Pages 214-223 Khatchatoorian, A. G ; Jamzad, M ; Sharif University of Technology
    Institution of Engineering and Technology  2020
    Abstract
    Automatic image annotation (AIA) is an image retrieval mechanism to extract relative semantic tags from visual content. So far, the improvement of accuracy in newly developed such methods have been about 1 or 2% in the F1-score and the architectures seem to have room for improvement. Therefore, the authors designed a more detailed architecture for AIA and suggested new algorithms for its main parts. The proposed architecture has three main parts: feature extraction, learning, and annotation. They designed a novel learning method using machine learning and probability bases. In the annotation part, they suggest a novel method that gains the maximum benefit from the learning part. The... 

    High rate data hiding in speech using voicing diversity in an adaptive MBE scheme

    , Article 2008 IEEE Region 10 Conference, TENCON 2008, Hyderabad, 19 November 2008 through 21 November 2008 ; 2008 ; 1424424089 (ISBN); 9781424424085 (ISBN) Jahangiri, E ; Ghaemmaghami, S ; Sharif University of Technology
    2008
    Abstract
    This paper addresses a new approach to data hiding that leads to a high data embedding rate of tens of kbps in a typical digital voice file transmission scheme. The purpose of the proposed method is restricted to offline voice transmission that uses stego speech files in wave format. The basic idea of the algorithm is to embed encrypted covert message in the unvoiced bands of spectrum of the cover speech. Inaudibility of the proposed hiding scheme is investigated through both support vector machines (SVM)-based steganalysis and the ITU-T P.862 PESQ standard speech quality assessment. The results assure imperceptibility and transparency of the stego speech  

    Another approach to detection of abnormalities in MR-images using support vector machines

    , Article ISPA 2007 - 5th International Symposium on Image and Signal Processing and Analysis, Istanbul, 27 September 2007 through 29 September 2007 ; 2007 , Pages 98-101 ; 9789531841160 (ISBN) Behnamghader, E ; Dehestani Ardekani, R ; Torabi, M ; Fatemizadeh, E ; Sharif University of Technology
    2007
    Abstract
    In this paper we will address two major problems in mammogram analysis for breast cancer in MR-images. The first is classification between normal and abnormal cases and then, discrimination between benign and malignant in cancerous cases. Our proposed method extracts textural and statistical descriptive features that are fed to a learning engine based on the use of Support Vector Machine learning framework to categorize them. The obtained results show excellent accuracy in both classification problems, that proves the appropriate combination of our features and selecting powerful classifier i.e. Support Vector Machine leads us to a brilliant outcome  

    Achieving higher perceptual quality and robustness in watermarking using Julian set patterns

    , Article IEE Proceedings: Information Security ; Volume 153, Issue 4 , 2006 , Pages 167-172 ; 17470722 (ISSN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2006
    Abstract
    Some of the most important classes of watermark detection methods in image watermarking are correlation-based algorithms. In these methods usually a pseudorandom noise pattern is embedded in the host image. The receiver can regenerate this pattern by having a key that is the seed of a random number generator. After that if the correlation between this pattern and the image that is assumed to have the watermark is higher than a predefined threshold, it means that the watermark exists and vice versa. Here, we show the advantage of using the Julian set patterns as a watermark, instead of the commonly used pseudorandom noise pattern. Julian set patterns can be regenerated in receiver with few... 

    Fuzzy Adaptive Resonance Theory for content-based data retrieval

    , Article 2006 Innovations in Information Technology, IIT, Dubai, 19 November 2006 through 21 November 2006 ; 2006 ; 1424406749 (ISBN); 9781424406746 (ISBN) Milani Fard, A ; Akbari, H ; Akbarzadeh-T., M. R ; Sharif University of Technology
    2006
    Abstract
    In this paper we propose a content-based text and image retrieval architecture using Fuzzy Adaptive Resonance Theory neural network. This method is equipped with an unsupervised mechanism for dynamic data clustering to deal with incremental information without metadata such as in web environment. Results show noticeable average precision and recall over search results. © 2006 IEEE  

    M-quiz by SMS

    , Article 6th International Conference on Advanced Learning Technologies, ICALT 2006, Kerkrade, 5 July 2006 through 7 July 2006 ; Volume 2006 , 2006 , Pages 726-729 ; 0769526322 (ISBN); 9780769526324 (ISBN) Shahreza, M. S ; Sharif University of Technology
    2006
    Abstract
    Virtual learning is a new idea that has gotten a new form with the emergence of new technologies such as the wireless networks. The mobile phone (cell phone) is a device that is used by most people nowadays. Therefore, one can use the mobile phone for virtual learning on a wide scale. One of the popular and at the same time simple and inexpensive services on the mobile phone is the SMS (Short Message Service). In this paper I propose a method for taking multiple-choice quizzes by using the SMS on mobile phones. In the provision of these tests, some SMS messages were sent to the student along with the answers of the questions, which were steganography in an image. The student, after receiving...