Search results for "Pattern Recognition"
showing 10 items of 2301 documents
Robustly correlated key‐medical image for DNA‐chaos based encryption
2021
Abstract Medical images include confidential and sensitive information about patients. Hence, ensuring the security of these images is a crucial requirement. This paper proposes an efficient and secure medical image encryption‐decryption scheme based on deoxyribonucleic acid (DNA), one‐dimensional chaotic maps (tent and logistic maps), and hash functions (SHA‐256 and MD5). The first part of the proposed scheme is the key generation based on the hash functions of the image and its metadata. The key then is highly related and intensely sensitive to the original image. The second part is the rotation and permutation of the first two MSB bit‐plans of the medical image to reduce its black backgr…
Automatic Detection of Infantile Hemangioma using Convolutional Neural Network Approach
2020
Infantile hemangioma is the most common tumor of childhood. This study proposes an automatic detection as a preliminary step for a further accurate monitoring tool to evaluate the clinical status of hemangioma. For the detection of hemangioma pixels, a convolutional neural network (CNN) was trained on patches of two classes (hemangioma and nonhemangioma) from the train dataset, and then it was used to classify all the pixels of the region of interest from the test dataset. In order to evaluate the results of segmentation obtained with CNN, the region of interest of the test dataset was also segmented using two classical methods of segmentation: fuzzy c-means clustering (FCM) and segmentatio…
Trends in pattern recognition
1993
Aims of this paper are to present a short history of pattern recognition, its current areas of interest and future developments. The term pattern recognition is vague, its related topics including the study of sensorial stimuli, the analysis of physical phenomena and models of reasoning. Here we concentrate our attention on visual patterns and the machines that have been realized in order perform automatic pattern recognition. Some theoretical approaches will be also reviewed.
Fast algorithm for detection of reference spheres in digital panoramic radiography.
2009
In this paper, an algorithm for detection of reference spheres from digital panoramic radiographic images is presented. The proposed algorithm was tested on a database of 107 digital panoramic radiographic images which were used for dental diagnostics. Results show that the proposed method exhibits for detection of reference spheres, a sensitivity of 97.33% and specificity of 93.85%. Performance time differed between 0.55 and 2.36s depending on image size. The aim of this work was to provide a fast ellipse detection algorithm to reduce measuring time on preoperative implant planning by lowering the computational cost.
Locality-sensitive hashing enables signal classification in high-throughput mass spectrometry raw data at scale
2021
Mass spectrometry is an important experimental technique in the field of proteomics. However, analysis of certain mass spectrometry data faces a combination of two challenges: First, even a single experiment produces a large amount of multi-dimensional raw data and, second, signals of interest are not single peaks but patterns of peaks that span along the different dimensions. The rapidly growing amount of mass spectrometry data increases the demand for scalable solutions. Existing approaches for signal detection are usually not well suited for processing large amounts of data in parallel or rely on strong assumptions concerning the signals properties. In this study, it is shown that locali…
Evaluating Classifiers for Mobile-Masquerader Detection
2006
As a result of the impersonation of a user of a mobile terminal, sensitive information kept locally or accessible over the network can be abused. The means of masquerader detection are therefore needed to detect the cases of impersonation. In this paper, the problem of mobile-masquerader detection is considered as a problem of classifying the user behaviour as originating from the legitimate user or someone else. Different behavioural characteristics are analysed by designated one-class classifiers whose classifications are combined. The paper focuses on selecting the classifiers for mobile-masquerader detection. The selection process is conducted in two phases. First, the classification ac…
A Support Vector Machine Signal Estimation Framework
2018
Support vector machine (SVM) were originally conceived as efficient methods for pattern recognition and classification, and the SVR was subsequently proposed as the SVM implementation for regression and function approximation. Nowadays, the SVR and other kernel‐based regression methods have become a mature and recognized tool in digital signal processing (DSP). This chapter starts to pave the way to treat all the problems within the field of kernel machines, and presents the fundamentals for a simple, framework for tackling estimation problems in DSP using support vector machine SVM. It outlines the particular models and approximations defined within the framework. The chapter concludes wit…
Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection
2019
International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…
A novel method for network intrusion detection based on nonlinear SNE and SVM
2017
In the case of network intrusion detection data, pre-processing techniques have been extensively used to enhance the accuracy of the model. An ideal intrusion detection system (IDS) is one that has appreciable detection capability overall the group of attacks. An open research problem of this area is the lower detection rate for less frequent attacks, which result from the curse of dimensionality and imbalanced class distribution of the benchmark datasets. This work attempts to minimise the effects of imbalanced class distribution by applying random under-sampling of the majority classes and SMOTE-based oversampling of minority classes. In order to alleviate the issue arising from the curse…
Reduced Reference Mesh Visual Quality Assessment Based on Convolutional Neural Network
2018
3D meshes are usually affected by various visual distortions during their transmission and geometric processing. In this paper we propose a reduced reference method for mesh visual quality assessment. The method compares features extracted from the distorted mesh and the original one using a convolutional neural network in order to estimate the visual quality score. The perceptual distance between two meshes is computed as the Kullback-Leibler divergence between the two sets of feature vectors. Experimental results from two subjective databases (LIRIS masking database and LIRIS/EPFL general purpose database) and comparisons with seven objective metrics cited in the state-of-the-art demonstr…