• 제목/요약/키워드: Feature Detection

검색결과 2,235건 처리시간 0.025초

Edge detection 기반의 SIFT 알고리즘을 이용한 kidney 특징점 검출 방법 (Kidney's feature point extraction based on edge detection using SIFT algorithm in ultrasound image)

  • 김성중;유재천
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2019년도 제60차 하계학술대회논문집 27권2호
    • /
    • pp.89-90
    • /
    • 2019
  • 본 논문에서는 ultrasound image Right Parasagittal Liver에 edge detection을 적용한 후, 특징점 검출 알고리즘인 Scale Invarient Feature Transfom(SIFT)를 이용하여 특징점의 위치를 살펴보도록 한다. edge detection 알고리즘으로는 Canny edge detection과 Prewitt edge detection을 적용하기로 한다.

  • PDF

UFKLDA: An unsupervised feature extraction algorithm for anomaly detection under cloud environment

  • Wang, GuiPing;Yang, JianXi;Li, Ren
    • ETRI Journal
    • /
    • 제41권5호
    • /
    • pp.684-695
    • /
    • 2019
  • In a cloud environment, performance degradation, or even downtime, of virtual machines (VMs) usually appears gradually along with anomalous states of VMs. To better characterize the state of a VM, all possible performance metrics are collected. For such high-dimensional datasets, this article proposes a feature extraction algorithm based on unsupervised fuzzy linear discriminant analysis with kernel (UFKLDA). By introducing the kernel method, UFKLDA can not only effectively deal with non-Gaussian datasets but also implement nonlinear feature extraction. Two sets of experiments were undertaken. In discriminability experiments, this article introduces quantitative criteria to measure discriminability among all classes of samples. The results show that UFKLDA improves discriminability compared with other popular feature extraction algorithms. In detection accuracy experiments, this article computes accuracy measures of an anomaly detection algorithm (i.e., C-SVM) on the original performance metrics and extracted features. The results show that anomaly detection with features extracted by UFKLDA improves the accuracy of detection in terms of sensitivity and specificity.

Haar-like feature를 이용한 얼굴 검출과 추적을 위한 Lucas-Kanade특징 추적 (Face detection using haar-like feature and Tracking with Lucas-Kanade feature tracker)

  • 김기상;김세훈;박진영;최형일
    • 한국HCI학회:학술대회논문집
    • /
    • 한국HCI학회 2008년도 학술대회 1부
    • /
    • pp.835-838
    • /
    • 2008
  • 본 논문에서는 얼굴 영역을 자동으로 검출하여 실시간으로 얼굴의 특징 짐을 추적하는 방법을 제안한다. Haar-like feature를 이용하여 얼굴 영역을 자동으로 추출하였으며, 회전에 강건한 KLT 알고리즘을 적용하여 얼굴의 특징 점들을 추출하였다. 그리고 실시간으로 얼굴의 특징점을 추적하기 위해 Lucas-Kanade 특징 추적 알고리즘을 사용하였다. 실험결과를 통하여 회전과 움직임에 강건하게 얼굴 영역을 검출하고 추적되는 것을 확인하였다.

  • PDF

Face and Hand Activity Detection Based on Haar Wavelet and Background Updating Algorithm

  • Shang, Yiting;Lee, Eung-Joo
    • 한국멀티미디어학회논문지
    • /
    • 제14권8호
    • /
    • pp.992-999
    • /
    • 2011
  • This paper proposed a human body posture recognition program based on haar-like feature and hand activity detection. Its distinguishing features are the combination of face detection and motion detection. Firstly, the program uses the haar-like feature face detection to receive the location of human face. The haar-like feature is provided with the advantages of speed. It means the less amount of calculation the haar-like feature can exclude a large number of interference, and it can discriminate human face more accurately, and achieve the face position. Then the program uses the frame subtraction to achieve the position of human body motion. This method is provided with good performance of the motion detection. Afterwards, the program recognises the human body motion by calculating the relationship of the face position with the position of human body motion contour. By the test, we know that the recognition rate of this algorithm is more than 92%. The results show that, this algorithm can achieve the result quickly, and guarantee the exactitude of the result.

새로운 Free Rectangle 특징을 사용한 Adaboost 기반 얼굴검출 방법 (A Face Detection Method Based on Adaboost Algorithm using New Free Rectangle Feature)

  • 홍용희;한영준;한헌수
    • 한국컴퓨터정보학회논문지
    • /
    • 제15권2호
    • /
    • pp.55-64
    • /
    • 2010
  • 본 논문은 수행시간이 빠르면서 효율성이 높은 새로운 Free Rectangle 특징을 사용한 Adaboost 알고리즘 기반 얼굴 검출 방법을 제안한다. 제안하는 Free Rectangle 특징은 동일한 면적의 분리가 가능한 두 개의 사각형으로 구성된 마스크로부터 정의된다. Haar-like 특징은 다양성을 높이기 위해 일반적으로 두 개 이상의 사각 영역으로 구성한 복잡한 마스크 구조를 갖는다. 하지만, 제안하는 특징 마스크는 두 사각형이 특징 윈도우 안에 놓이는 위치와 크기에 따라 효율성이 좋은 다양한 특징을 얻을 수 있다. 또한 제안하는 특징은 일반 Haar-like 특징과 달리 마스크 형태에 상관없이 두 사각 영역의 화소 합의 차만 계산함으로 수행 시간을 크게 줄일 수 있다. 실세계 영상에서 제안하는 Adaboost 알고리즘 기반 얼굴 검출 기법은 빠른 검출 속도와 높은 검출 결과를 보여 학습 데이터만을 바꿔 다른 물체 검출에도 쉽게 적용이 가능하다.

인터랙티브 TV 컨트롤 시스템을 위한 근적외선 영상에서의 얼굴 검출 (Face Detection for Interactive TV Control System in Near Infra-Red Images)

  • 원철호
    • 센서학회지
    • /
    • 제20권6호
    • /
    • pp.388-392
    • /
    • 2011
  • In this paper, a face detection method for interactive TV control system using a new feature, edge histogram feature, with a support vector machine(SVM) in the near-infrared(NIR) images is proposed. The edge histogram feature is extracted using 16-directional edge intensity and a histogram. Compared to the previous method using local binary pattern(LBP) feature, the proposed method using edge histogram feature has better performance in both smaller feature size and lower equal error rate(EER) for face detection experiments in NIR databases.

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권8호
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

Multiple Vehicle Detection and Tracking in Highway Traffic Surveillance Video Based on SIFT Feature Matching

  • Mu, Kenan;Hui, Fei;Zhao, Xiangmo
    • Journal of Information Processing Systems
    • /
    • 제12권2호
    • /
    • pp.183-195
    • /
    • 2016
  • This paper presents a complete method for vehicle detection and tracking in a fixed setting based on computer vision. Vehicle detection is performed based on Scale Invariant Feature Transform (SIFT) feature matching. With SIFT feature detection and matching, the geometrical relations between the two images is estimated. Then, the previous image is aligned with the current image so that moving vehicles can be detected by analyzing the difference image of the two aligned images. Vehicle tracking is also performed based on SIFT feature matching. For the decreasing of time consumption and maintaining higher tracking accuracy, the detected candidate vehicle in the current image is matched with the vehicle sample in the tracking sample set, which contains all of the detected vehicles in previous images. Most remarkably, the management of vehicle entries and exits is realized based on SIFT feature matching with an efficient update mechanism of the tracking sample set. This entire method is proposed for highway traffic environment where there are no non-automotive vehicles or pedestrians, as these would interfere with the results.

CNN-based Android Malware Detection Using Reduced Feature Set

  • Kim, Dong-Min;Lee, Soo-jin
    • 한국컴퓨터정보학회논문지
    • /
    • 제26권10호
    • /
    • pp.19-26
    • /
    • 2021
  • 딥러닝 기반 악성코드 탐지 및 분류모델의 성능은 특성집합을 어떻게 구성하느냐에 따라 크게 좌우된다. 본 논문에서는 CNN 기반의 안드로이드 악성코드 탐지 시 탐지성능을 극대화할 수 있는 최적의 특성집합(feature set)을 선정하는 방법을 제안한다. 특성집합에 포함될 특성은 기계학습 및 딥러닝에서 특성추출을 위해 널리 사용되는 Chi-Square test 알고리즘을 사용하여 선정하였다. CICANDMAL2017 데이터세트를 대상으로 선정된 36개의 특성을 이용하여 CNN 모델을 학습시킨 후 악성코드 탐지성능을 측정한 결과 이진분류에서는 99.99%, 다중분류에서는 98.55%의 Accuracy를 달성하였다.

Effective Dimensionality Reduction of Payload-Based Anomaly Detection in TMAD Model for HTTP Payload

  • Kakavand, Mohsen;Mustapha, Norwati;Mustapha, Aida;Abdullah, Mohd Taufik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3884-3910
    • /
    • 2016
  • Intrusion Detection System (IDS) in general considers a big amount of data that are highly redundant and irrelevant. This trait causes slow instruction, assessment procedures, high resource consumption and poor detection rate. Due to their expensive computational requirements during both training and detection, IDSs are mostly ineffective for real-time anomaly detection. This paper proposes a dimensionality reduction technique that is able to enhance the performance of IDSs up to constant time O(1) based on the Principle Component Analysis (PCA). Furthermore, the present study offers a feature selection approach for identifying major components in real time. The PCA algorithm transforms high-dimensional feature vectors into a low-dimensional feature space, which is used to determine the optimum volume of factors. The proposed approach was assessed using HTTP packet payload of ISCX 2012 IDS and DARPA 1999 dataset. The experimental outcome demonstrated that our proposed anomaly detection achieved promising results with 97% detection rate with 1.2% false positive rate for ISCX 2012 dataset and 100% detection rate with 0.06% false positive rate for DARPA 1999 dataset. Our proposed anomaly detection also achieved comparable performance in terms of computational complexity when compared to three state-of-the-art anomaly detection systems.