Professional Documents
Culture Documents
Seminar Report
On
Digital Image Processing
BACHELOR OF TECHNOLOGY IN
COMPUTER SCIENCE and ENGINEERING
By
Prem Kumar Rathaor
(Roll No – 1442210060)
Under The Supervision Of
Anshika Bhalla (Ass.Prof.)
Department Of Computer Science and Engineering
Bansal Institute Of Engineering & Technology
To , The
LUCKNOW, INDIA
Preface ..........................................................................................................................3
Acknowledgement ..........................................................................................................4
Certificate………………………………………………………………………………………..5
Abstract ..........................................................................................................................6
Introduction .....................................................................................................................8
Conclusion .....................................................................................................................26
I have made this report file on the topic Digital Image Processing; I have tried my best to
elucidate all the relevant details to the topic to be included in the report. While in the beginning I
have tried to give a general view about this topic.
My efforts and wholehearted co-corporation of each and everyone has ended on a successful
note. I express my sincere gratitude to Mr. Madan Kuswaha Sir for assisting me throughout
the preparation of this topic. I thank him for providing me the reinforcement, confidence and
most importantly the track for the topic whenever I needed it.
I would like to thank respected Mr. Madan Kuswaha (HOD CS/IT) and for giving me such a
wonderful opportunity to expand my knowledge for my own branch and giving me guidelines
to present a seminar report. It helped me a lot to realize of what we study for.
Secondly, I would like to thank my parents who patiently helped me as i went through my work
and helped to modify and eliminate some of the irrelevant or un-necessary stuffs .
Thirdly, I would like to thank my friends who helped me to make my work more organized and
well-stacked till the end.
Next, I would thank Microsoft for developing such a wonderful tool like MS Word. It helped
my work a lot to remain error-free.
Last but clearly not the least; I would thank The Almighty for giving me strength to complete
my report on time.
Image Processing, in its broadest and most literal sense, aims to address the goal of
providing practical, reliable and affordable means to allow machines to cope with
images while assisting man in his general endeavors. The term image processing
itself has become firmly associated with the much more objective of modifying
images such that they are either:
(a) Acknowledgment
(b) Abstract
1. Introduction
2. Image and Image Processing
3. Vision and Computer vision
4. Types of image processing
5. Steps involved in image processing
6. Components of image processing
7. Image sensors (CCD and CMOS)
8. Applications
9. Conclusion
10. References
Images are a vital and integral part of everyday life. On an individual or person-to
person basis, images are used to reason, interpret, illustrate, represent, memorize,
educate, communicate, evaluate, naive, survey, entertainment. We do this
continuously and almost entirely without conscious effort. As man builds machines
to facilitate his ever more complex lifestyle, the only reason for NOT providing
them with the ability to exploit or transparently convey such images is a weakness
of available technology.
One of the first applications of image processing techniques in the first category
was in improving digitized newspaper sent by submarine cable between London
and Newyork. From then till these days, image processing is continuously
field grown so vigorouslythat it is now used to solve variety of problems ranging
improving vision to space program, in geographical information systems, in
medicines, in surveillance etc. Geographers use the same technique to study
pollution patter ns from aerial and satellite imagery. Image enhancement and
restoration techniques are used to process degraded images of unrecoverable
objects or experimental results too expensive to duplicate. In ar choreology,
image processing methods have successfully restored blurred pictures that were
the only available records of are artifacts lost or damaged after photographed. In
physics and techniques plasma and electron microscopy. Similarly successful
applications of image processing can be found in astronomy, biology, nuclear
medicine, law enforcement, and industrial applications.
The entire process of Image Processing and starting from the receiving of visual
information to the giving out of description of the scene, may be divided into three
major stages which are also considered as major sub areas, and are given below
The fundamental problem with password is twofold. First, they are transferable
they can be written down on paper, they can be transferred to someone who should
not have them. Second, and just as important, they can be forgotten. Recent
research suggests that a forgotten password can cost as much as US$ 340 per
event! This is not too surprising. Clearly, the risk and costs of compromised
passwords are a significant factor to consider in developing any sure system. The
critical need for additional level of security has given rise to the field of
“BIOMETRICS”.
This paper encloses the information regarding the ‘IMAGE PROCESSING’. And
discussed one of the major applications of image processing ‘BIOMETRICS’.
Biometrics technology allows determination and verification of one’s identity
through physical characteristics. To put it simply, it turns your body in to your
password. We discussed various biometric techniques like finger scan, retina scan,
facial scan, hand scan etc. Two algorithms have been proposed by taking biometric
techniques to authenticate an ATM account holder, enabling a secure ATM by
image processing. Biometrics is now applied in various public and private sectors.
No doubt, biometrics is going to be next generation’s powerful security tool…!
An Image may be defined as a two dimensional function f (x, y) where x and y are
spatial (plane) coordinates x, y is called intensity or gray level of the image at that
point. When x, y and the amplitude values of f are all finite, discrete quantities, we
Interest in digital image areas: improvement of pictorial information for human
interpretation: and representation for autonomous machine perception.
The entire process of Image Processing and starting from the receiving of visual
information to the giving out of description of the scene, may be divided into three
major stages which are also considered as major sub areas, and are given below
(i) Discretization and representation: Converting visual information into a discrete
form: suitable for computer processing: approximating visual information to save
storage space as well as time requirement in subsequent processing.
(ii) Processing: Improving image quality by filtering etc compressing data to save
OVERVIEW
With the increasing necessity of e-mail accessing and Internet resources and the
convenience it offers serious security concerns also arise. Internet is vulnerable to
intruders who are always snooping to find open computers in the network to steal
personal files, information or cause any damage. Customer files can be disadvanta
No more problems if forgotten passwords and id codes, biometrics is the
technology taking care of it which turns your body into your password. Typically,
the more rigorous you make your password selection and construction rules the
more difficulty users will have in remembering their passwords. Unfortunately,
strict password rules are necessary to stop simple hacker attacks on the network.
The fundamental problem with password is twofold. First, they are transferable
they can be written down on paper, they can be transferred to someone who should
not have them. Second, and just as important, they can be forgotten. Recent
research suggests that a forgotten password can cost as much as US$ 340 per
event! This is not too surprising. Clearly, the risk and costs of compromised
passwords are a significant fact to consider in developing any sure system. The
critical need for additional level of security has given rise to the field of
“BIOMETRICS”.
The present generation security issue is considered the basic TCP/IP encryptions
and other factors that are provided by the network. But there was lack of consistent
identification of individuals, then the newly developed technology Biometrics,
came in to picture. Biometrics can be defined as recognizing and identifying a
person based on physiological or behavioral characteristics. Biometrics
technologies are applied in the following sectors: Public services, law enforcement,
banking, physical access control and control and computer networks. These
include fingerprints, facial features, retina shape, speech, handwriting, etc.
Biometrics can be used to prevent unauthorized access to ATM’s, smart cards,
desktop PC’s workstations, cellular phones, home security systems, door locks, etc.
Digital Image Processing Page 11
The advanced Biometrics solution uses a more sophisticated method called
“identification”. The design of an advanced solution enables the product to search
a very large database and pick the individual from the crowd. Biometric is the most
secure and convenient authentication tool. It can’t be borrowed. Stolen, or forgot
The physiological based techniques, which measure the physiological
characteristics of a person. These include fingerprint verification, iris analysis,
facial analysis, hand geometry-vein patterns, ear recognition, odor detection and.
The behavioral based techniques, which measure the behavior of a person. These
include hand written signature verification and speech analysis. These techniques
involve two major steps. These are the Authentication & the verification.
Authentication is a process of one-to one comparison, rather than a mass searching
process. Identification is a process of checking for a particular identity in the.
The setting of the error tolerance of these systems is critical to their performance.
Should be low and they should both are quoted by the manufacturers.
How biometric technology works
IMAGE
An image (Latin: imago) is an artifact, for example a two-dimensional picture, that
has a similar appearance to some subject²usually a physical object or a person.
Image is a two dimensional light intensity function, f(x, y), where e the value of f
at a spatiallocation (x, y) is the intensity of the image at that point.
Digital image is obtained by sampling and quantizing the function f(x, y).The
function f(x, y) can be a measure of the reflected light (photography), X-ray
attenuation (X-Rays) or any other physical parameter.
IMAGE PROCESSING
In short, Act of examining images for the purpose of identifying objects and
judging their significance. An image may be considered to contain sub- images
sometimes referred to as regions-of -interest, ROIs, or simplyregions.This concept
reflects the fact that images frequently contain collections of objects each of which
can be the basis for a region. In a sophisticated image processing system it should
be possible to apply specific image processing operations to selected regions. Thus
NOTE: Often this information bears little resemblance to visual features that
H u ma n content of an image.
Whatever human eyes see and then perceive the world around- VISION
To duplicate human eye by electronically perceiving and understanding
the image by any means COMPUTER VISION
. Is the use of optical techniques to process image for increasing clarity and
extracting? Information from the image.
a) Image-to-image transformation
b) Image-to-information transformation
c) Information-to-image transformation
The fir st step in the process is image acquisitionthat is, to acquire a digital image.
To do sorequir es following elements:
Imaging Sensors
Digitizer
PREPROCESSING
After a digital image has been acquired, the next step deals with the preprocessing
of the image. The key function of preprocessing is to improve the image in ways
that increase the chances for success of other processes. Mainly, preprocessing
deals with the techniques for enhancing contrast, removing noise, and isolating
regions whose textures indicate a likelihood of alphanumeric information.
SEGMENTATION
The next stage deals with segmentation. Broadly defined, segmentation partitions
an input image into its constituent parts or objects. In general, autonomous
hand a rugged segmentation brings the process a long way towards successful
solution of an imaging problem. On the other hand erratic. Segmentation results
always into eventual failure the output of the segmentation is raw pixel data,
constituting gather the boundary of a region or all the point sin the
region itself. In either case, converting data a form suitable to computer processing
is necessary. Boundary representation is appropriate when the focus is on external
shape characteristics, such as corner so inflections. Regional representation
internal properties, such as textur es or skeletal shape. In some situations both
representations may co-exist.
Choosing a representation is only a part of the solution for transforming raw data
into a form suitable for subsequent computer processing. A method must also be
specified for describing the data so that features of interest are highlighted.
Description also called feature selection, deals with extracting features that result
in some quantitative information of interest or features that are basic for
differentiating one class of object from other.
IMAGE SENSORS
Sensors are device which convert illumination energy into digitized for m. An
Image sensor is a device that converts an optical image to an electric signal. It is
used mostly in digital cameras and other imaging devices. Early sensors were
video camera tubes but a mode n one is typically a charge- coupled device (CCD)
complementary metal oxide semiconductor (CMOS) active pixel sensor. Following
are the sensors which are used dominantly in image processing:
Charge Couple Devices (CCD)
Complementary MOSFET (CMOS)
CMOS sensors also known as ACTIVE PIXEL SENSORS (ASP), uses integrated
circuits like transistors at each pixel that amplify and move the charge using more
traditional wires The CMOS approach is more flexible as each pixel can be read
individually.
Most digital still cameras use either a CCD image sensor or CMOS
sensor.Both types of sensor accomplish the same task of capturing light or
converting it into electrical signals.A CCD is an analog device. When light strikes
the chip it is held as a small electrical charge ineach photo sensors. The charges are
converted to voltage one pixel at a time as they are read from the chip. Additional
circuitry in the camera converts the voltage into digital information. A CMOS chip
is a typo active sensor pixel (ASP) madeusingthe CMOS semiconductor process.
Extra circuitry next to each photo sensor converts the light energy to a voltage.
Additional circuitry on the chip may be included to convert the voltage to digital
data. Neither technology has a clear advantage in image quality .On one hand,
sources when the sensor is overloaded; high end CCD sin turn do not suffer from
this problem. CMOS can potentially be implemented with few are components,
useless power, and/or provide faster readout than CCDs.CCD is a more mature
technology and is in most respects the equal of CMOS.CMOS sensors are less
expensive to manufacture than CCD sensors.
Medicine
Defense
Meteorology
Environmental science
Manufacture
Surveillance
Crime investigation
Script Recognition
Optical Character Recognition
Handwritten Signature Verification
One of the first applications of image processing techniques in the first category
was in improving digitized newspaper sent by submarine cable between London
and NewYork.Fromthen till these days,imageprocessing is continuously improving
human vision.Thefield hasgrown so vigorouslythat it is now used to solve variety o
f problems ranging from improving vision to space program,in geographical
information systems,in medicines,in surveillance etc.Geographers use the same
technique to study pollution patter ns from aerial and satellite imagery. Image
enhancement and restoration techniques are used to process degraded images
of unrecoverable objects or experimental results too expensive to duplicate. In
archaeology, image processing methods have successfully restored blurred pictures
that were the only available records of rare artifacts lost or damaged
after photographed. In physics and related fields, computer techniques routinely
enhance images of experiments in areas such as high energy plasma and electron
microscopy.
Staganogrsphy is the process of hiding the secrete message within the larger one
in such a way that someone can not know the content of the hidden
message.Although,related,steganography is not to be confused with
encryption,which is the process of making a message unintelligible-steganogrphy
is attempt to hide the existence of communication.
Thus our discussion will be focusing on analysis of remotely sensed image. These
images are represented in digital form. When represented on numbers, brightness
can be added, subtracted, multiplied and divided and in general, subjected to
statistical manipulation that are not possible if an image is presented only as
photography. Although digital analysis of remotely sensed data dates from the
early days of remote sensing, the launch of the first landsat earth observation
satellite machine processing (Cambell, 1996 and Jensen, 1996).Previously, digital
remote sensing data could be analyzed only at specialized remote sensing
laboratories. Specialized equipment and trained personnel necessary to conduct
routine machine analysis of data were not widely available, in part because of
limited availability of digital remote sensing data and a lack of appreciation of their
qualities.
Using image processing techniques, we can sharpen the images, contrast to make a
graphic display more useful for display, reduce amount of memory requirement for
storing image information, etc,due to such techniques, image processing is applied
a sin factory floor quality assurance system, sin satellite reconnaissance
systems; as in law enforcement suspect identification systems, and as in plastic
surgery design systems.