Version-1 (Jan-Feb 2015)
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Algorithm for the Comparison of Different Types of First Order Edge Detection Techniques |
| Country | : | India |
| Authors | : | Vinay Thakur || Som Raj Thakur || Naman Sood |
Abstract: We propose a algorithm for rigorously comparing the different types of edge detection techniques. The computed results and detailed comparison is analytically calculated. The results are verified by simulation. The algorithm is used to evaluate four edge detection techniques. Simulated results of two-dimensional image give the idea about perfect edge technique for reorganization of noisy image. The experiment with several methods shows the ability to detect weak edges.
Keywords: Canny, Sobel, Roberts, Prewitt etc.
[1]. Umbaugh, Scott E (2010). Digital image processing and analysis : human and computer vision with CVIP tools (2nd ed. ed.). Boca
Raton, FL: CRC Press. ISBN 9-7814-3980-2.
[2]. Mamta Juneja , Parvinder Singh Sandhu. "Performance Evaluation of Edge Detection Techniques for Images in Spatial Domain".
International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December, 2009.
[3]. Seif, A.,et.al. ;"A hardware architecture of Prewitt edge detection", Sustainable Utilization and Development in Engineering and
Technology (STUDENT), 2010 IEEE Conference, Malaysia, pp. 99 – 101, 20-21 Nov.2010.
[4]. Canny, J., "A Computational Approach to Edge Detection", IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 8:679-
714, November 1986.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Behavioral Model to Detect Anomalous Attacks in Packet Transmission |
| Country | : | India |
| Authors | : | Suhasini Sodagudi || Prof. Rajasekhara Rao Kurra |
Abstract: Inside a network environment, packets is the most important in carrying data to perform communication. Such a circumstance is easy to be attacked by an intruder and perform eavesdropping which leads to data loss/duplication/redundancy. Comprehend speaking, packet dropping and modification are the two common attacks that can be easily launched by an adversary to disrupt communication in multi hop networks, specifically mobile ad hoc networks. Hence a remedial approach is proposed to compensate such attacks. A tree based approach is designed to designate the attack in order to identify packet droppers and modifiers. In this direction, it has been assumed that the mobile nodes continuously monitor the behaviors of the forwarding mobile nodes which may be neighbors to determine if their neighbors are misbehaving. To address this problem, a hierarchical method is proposed and detects malicious mobile nodes that drop or modify packets. Extensive analysis and simulations have been conducted to study the performance of attacks with respect to efficiency of the scheme.
Keywords: attack, intruder, behavior, packet dropping, modification
[1]. H. Chan and A. Perrig, ―Security and Privacy in SensorNetworks,‖ Computer, vol.36, no. 10, Oct. 2003.
[2]. C. Karlof and D. Wagner, ―Secure Routing in Wireless SensorNetworks: Attacks andcountermeasures,‖ Proc. IEEE First Int'lWorkshop Sensor Network Protocolsapplications03Applications, 2003.
[3]. V. Bhuse, A. Gupta, and L. Lilien, ―DPDSN: Detection of Packet-Dropping Attacksforwireless Sensor Networks,‖ Proc. FourthTrusted Internet Workshop, 2005.
[4]. M. Kefayati, H.R. Rabiee, S.G. Miremadi, and A. Khonsari, ―Misbehavior Resilient Multi Path Data Transmission in MobileAd-Hoc Networks,‖ Proc. Fourth ACM Workshop sec urity of Ad Hoc and Sensor Networks 2006.
[5]. R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, ―Secmr—ASecure MultipathRouting Protocol for Ad Hoc Networks,‖ Ad HocNetworks, vol. 5, no. 1, pp. 87-99,2007.
[6]. F. Ye, H. Luo, S. Lu, and L. Zhang, ―Statistical En-Route Filteringof Injected FalseData inSensor Networks,‖ Proc. IEEE INFOCOM,2004. November 1986.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Canny Edge Detection Algorithm on FPGA |
| Country | : | India |
| Authors | : | Malathy H Lohithaswa |
Abstract: Edge detection is one of the most commonly used operations in image analysis particularly in the areas of feature extraction. Edge indicates the boundary between overlapping objects. An edge is the boundary between an object and the background, hence if the edges are identified accurately in an image all its objects can be located and basic properties such as area, perimeter and shape of an image can be measured. An edge can be defined as a set of connected pixels that forms a boundary between two disjoints regions. Edge detection is basically, a method of segmenting an image into regions of discontinuity. The data of edge detection is very large, so the achievement of high speed of image processing is a difficult task. Field Programmable Gate Array (FPGA) can overcome this difficult task and it is an effective device to realize real-time parallel processing for vast amounts of image and video data. The proposed work shows the implementation of Canny Edge detection algorithm on FPGA.
[1]. Rafael C. Gonzalez, Richard E. Woods. "Digital Image Processing", Prentice Hall, 2nd edition (January 15, 2002).
[2]. Marques, O; "Image Processing Basics", Practical Image and Video Processing Using MATLAB, 2011, pp 21-34.
[3]. Leung, C.M. ; Lu, W.S; "Detection of edges of noisy images by 1-D and 2-D linear FIR digital filters", IEEE International conference on Communications, Computers and Signal Processing, vol.1, 1993, pp. 228-231.
[4]. Alasdair Mc Andrew. "Introduction to Digital Image Processing with MATLAB"
[5]. Ehsan Nadernejad, Sara Sharifzadeh; "Edge Detection Techniques:Evaluations and Comparisons" Applied Mathematical Sciences, Vol. 2, 2008, no. 31, 1507 – 1520.
[6]. Wenhao He and Kui Yuan "An Improved Canny Edge Detector and its Realization on FPGA" IEEE Proceedings of the 7th World Congress on Intelligent Control and Automation, Chongqing, China, June 25 - 27, 2008.
[7]. Qian Xu, Chaitali Chakrabarti and Lina J. Karam "A Distributed Canny Edge Detector and Its Implementation On FPGA" School of Electrical, Computer and Energy Engineering, Arizona State University, IEEE, 2011, pp. 500-505.