The design of a pattern recognition system requires careful attention to error estimation. The error rate is the most important descriptor of a classifier's performance. The commonly used estimates of error rate are based on the holdout method, the resubstitution method, and the leave-one-out method. All suffer either from large bias or large variance and… (More)
Moment invariants have been frequently used as features for shape recognition. They are computed based on the information provided by both the shape boundary and its interior region. Although several fast algorithms for computing traditional moment invariants have been proposed, none has ever shown the theoretical results of moment invariants computed based… (More)
A new hybrid method is presented that combines the scale space filter (SSF) and Markov random field (MRF) for color image segmentation. The fundamental idea of the SSF is to use the convolution of Gaussian functions and image-histogram to generate a scale space image and then find the proper interval bounded by the local extrema of the derivatives. The… (More)
−Projection-based face recognition has been widely studied during the past two decades. One of the problems is to require a huge storage space to save the face features obtained from training faces. This paper proposes an SVD-based face retrieval system which requires less memory than the PCA, 2DPCA, Fisher, and 2DFisher approaches. The algorithm tested on… (More)
Before rendering 2D or 3D fractals with iterated function systems, it is necessary to calculate the bounding extent of fractals. We develop a new algorithm to compute the bounding box which closely contains the entire attractor of an iterated function system.
We present a novel hybrid method that includes a modulated scheme for reducing the distortion of the reconstructed image and a two-layered structure for grouping participants with different weights in a secret image sharing problem. Conventional secret image sharing methods suffer from truncation distortion, which is the difference between a pixel value and… (More)
A new steganographic method for data hiding in jig swap puzzle images is proposed. First, a color image is taken as input and divided into blocks. Second, each block is rearranged to a new position according to the secret data and a stegokey. The resulting image is a perfect jig swap puzzle. The original image is needed for extracting the secret data. Under… (More)
The jigsaw puzzle has been popular from past to present, and there are many jigsaw puzzle images on the Internet. This paper proposes a novel method to hide secret data in jigsaw puzzle images. First, a digital image is taken as input and divided into blocks. Then, a semicircle is drawn and attached to the right and bottom sides of each block. The secret… (More)
Experimental results of applying two similarity measurements , Euclidean distance and chord distance, to test a set of six Brodatz's textures are reported. Experiments show that in addition to feature extraction, A similarity measurement between images should be simultaneously considered, We also review some other similarity measurements.