IJMTES – IMAGE SEGMENTATION BASED ON DILATION AND EROSION TO REDUCE BACKGROUND NOISE

Journal Title : International Journal of Modern Trends in Engineering and Science

Paper Title : IMAGE SEGMENTATION BASED ON DILATION AND EROSION TO REDUCE BACKGROUND NOISE

Author’s Name : T Bhuvaneswari | K P Keerthana  unnamed

Volume 03 Issue 08 2016

ISSN no:  2348-3121

Page no: 245-250

Abstract – Mathematical morphology is a powerful tool for image processing and analysis in a wide range of applications, including shape recognition, image processing, and video processing document authentication and computer vision. The basic binary morphological operations are dilation and erosion. Either of the two operations has two operands the input signal, which is usually an image, and the structuring element characterized by its shape, size, and center location. The other binary morphological operations such as opening, closing, hit-and-miss, and operation between the images operation are based on various combinations of the two basic operations, dilation, and erosion. A binary image is segmented into different parts, which are processed with different structuring elements in the basic binary compute units. Then, the processing results are combined to form an entire image. To reduce the background noise and to get clean image we going for this binary morphological operation.

Keywords— Single instruction multiple data, Reconfigurable binary processing module 

Reference

  1. Bin Zhang, Kuizhi Mei, and Nanning Zheng, “Reconfigurable Processor for Binary Image Processing,” IEEE Trans.Circuits and Systems for Video Technology, Vol. 23, No. 5, May 2013.
  2. S. Chien and L. Chen, “Reconfigurable morphological image processing accelerator for video object segmentation,” J. Signal Process. Syst., vol.62, no. 1, pp. 77–96, 2011.
  3. M. F. Talu and I. Turkoglu, “A novel object recognition method based on improved edge tracing for binary images,” in Proc. Int. Conf. Appl. Inform. Commun. Technol.,
  4. H. Yang and A. C. Kot, “Binary image authentication with tampering localization by embedding cryptographic signature and block identifier,” IEEE Signal Process. Lett, vol. 13, no. 12, pp. 741–744, Dec. 2006.
  5. M. Wu and B. Liu, “Data hiding in binary image for authentication and annotation,” IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538, Aug.2004.
  6. W. Miao, Q. Lin, W. Zhang et al., “A programmable SIMD vision chip for real-time vision applications,” IEEE J. Solid-State Circuits, vol. 43, no. 6, pp. 1470–1479, Jun. 2008.
  7. H. Yang and A. C. Kot, “Pattern-based data hiding for binary image authentication by connectivity-preserving,” IEEE Trans. Multimedia, vol. 9, no. 3, pp. 475–486, Apr. 2007.
  8. J. Velten and A. Kummert, “Implementation of a high-performance hardware architecture for binary morphological image processing operations,” in Proc. 47th IEEE Int. Midwest Symp. Circuits Syst., Jul. 2004, pp. 241–244.
  9. W. Chan, J. Chang, T. Chen et al., “Efficient content analysis engine for visual surveillance network,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 5, pp. 693– 703, May 2009.
  10. K. Mei, B. Zhang, and C. Ge, “A hierarchical and parallel SoC architecture for vision procesor,” IEICE Electron. Express, vol. 6, no. 19, pp. 1380–1386, 2009.
  11. H. Hedberg, P. Dokladal, and V. Owall, “Binary morphology with spatially variant structuring elements algorithm and architecture,” IEEE Trans. Image Process., vol. 18, no. 3, pp. 562–572, Mar. 2009.