SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
DOI: 10.5121/ijci.2016.5424 213
CONTENT BASED IMAGE RETRIEVAL USING GRAY
LEVEL CO-OCCURRENCE MATRIX WITH SVD AND
LOCAL BINARY PATTERN
D.Kishore1
, S.Srinivas Kumar2
, Ch.Srinivasa Rao3
1 Research scholar, ECE Dept., JNTUK, Kakinada, A.P, India.
2 R&D Director, Professor of ECE, JNTUK, Kakinada , A.P, India.
3 Professor, ECE Dept, JNTUCE, Vizianagaram, A.P, India.
ABSTRACT
In this paper, gray level co-occurrence matrix, gray level co-occurrence matrix with singular value
decomposition and local binary pattern are presented for content based image retrieval. Based upon the
feature vector parameters of energy, contrast, entropy and distance metrics such as Euclidean distance,
Canberra distance, Manhattan distance the retrieval efficiency, precision, and recall of the images are
calculated. The retrieval results of the proposed method are tested on Corel-1k database. The results after
being investigated shows a significant improvement in terms of average retrieval rate, average retrieval
precision and recall of different algorithms such as GLCM, GLCM & SVD, LBP with radius one and LBP
with radius two based on different distance metrics.
Keywords
CBIR, GLCM, SVD and LBP.
1. INTRODUCTION:
The image database is increasing fast recently. The capturing of useful images is difficult in the
large image database and we obtain frequently useful images, which is widely extending through
the Internet. It is not easy to change the situation by using existing methods, so it is a new way to
find retrieve images accurately as urgent as possible. Thus image retrieval becomes an essential
topic in pattern recognition domain and image processing. Images can be retrieved in three ways
generally: content based, text based and semantic based[1–4]. Text based retrieval approach is
widely used, such as Google and Baidu, and images can retrieved by using keywords that are
annotated on images. However, with this method we have obtained that images are not related to
our expected results. The two drawbacks of this approach are firstly, images in the database were
manually annoted by annotators and secondly, the retrieval results are poor, because they are
similar to the understanding of the query images. The ordinal approach, example, content based
image retrieval (CBIR) had been proposed in the early 1990’s [4–7]. This approach is based on
retrieving the images by using low level features like colour, shape and texture that can represent
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
214
an image. By using this method, we first extract the low level features on an example image, and
then compute the similarity between the database images and the query image, finally images are
sorted by similarity and the top images will be displayed. CBIR has been shown more
subjectively and effectively compared to text based approach [8–9]. The final approach is
semantic based method. CBIR has also failed to describe the semantic concepts, so some methods
are proposed by researchers for image retrieval by using relevance feedback algorithms. The
relevance feedback algorithms capture user’s preferences and bridge the semantic gap [10], and
the results are closer to human perception. In CBIR, color, shape and texture are the most
significant features.
2. FEATURE EXTRACTION METHODS:
2.1 Gray Level Co-occurrence Matrix (GLCM):
The approach, which is the easiest, for texture description is to use statistical moments of the
histogram based on intensity of region or image. Gray Level Co-occurrence Matrix is a one of the
statistical approach, help to give important information about the relevant position of the
neighboring pixels in an image. The gray level co-occurrence matrix P can be defined for an
image I of size NxN as P(i, j) = Nx=1 Ny=1 , if I(x, y) = i and I(x + ∆x, y + ∆y) = j, 0 otherwise.
Here, the offset (∆x, ∆y), is representing the distance between the neighbor and its pixel of
interest. Note that the offset (∆x, ∆y) parameterization makes the gray level co-occurrence matrix
sensitive to rotation. Choosing an offset vector, such that the rotation of an image is not equal to
180 degrees, will result in a different gray level co-occurrence matrix for the same (rotated)
image. This can be avoided by forming the gray co-occurrence matrix using statistical features of
Co-occurrence matrix, of offsets sweeping through 180 degrees at the same distance parameter ∆
to achieve a degree of invariant rotation (i.e., [0 ∆] for 0◦: P horizontal, [-∆, ∆] for 45◦: P right
diagonal, [-∆ 0] for 90◦: P vertical, and [-∆ − ∆] for 135◦: P left diagonal). Figure 1 illustrates the
details to generate the four co-occurrence matrices using Ng =5 levels for the offsets {[0 1], [-1
1], [-1 0], [-1 -1]} that are defined as one neighboring pixel in the possible four directions. We
can observe that two neighboring pixels (2, 1) of the input image is reflected in PH concurrence
matrix as 3, because there are 3 occurrences of the pixel intensity value 2 and pixel intensity value
1 adjacent to each other in the input image. The neighboring pixels (1, 2) will occur again 3 times
in PH, which makes these matrices symmetric. In the same manner, the other three matrices PV,
PLD, PRD are calculated.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
2.2 Singular Value Decomposition:
Singular Value Decomposition (SVD) is one of the powerful mathematical tools in linear algebra
used in many image processing application
and image watermarking [12]. SVD is an optimal mat
square sense that it packs the maximum signal energy into few coefficients. Singular value
decomposition (SVD) of an image results in three matrices (U, D and V) of same size as that of
the original image. U and V represents the left and right singular vectors of the image matrix and
D is a diagonal matrix with singular values. Further, sin
good performance for shape description. In the SVD of an image, each singular value in the
decomposed matrix (D) specifies the luminance of an image layer providing geometrical
invariance, while the corresponding pair of singular vectors (U,V) specifies the geometry
(structural details) of image layer. According to it, every real matrix
product of three matrices,
If A is represented in matrix format:
The SVD of matrix A can be written as
Where r is the rank of matrix A which is less than or equal to N
are zero. U and V are orthogonal matrices, satisfying the condition
(λ1, λ2, ...). The diagonal entries of
A =
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
Decomposition:
Singular Value Decomposition (SVD) is one of the powerful mathematical tools in linear algebra
used in many image processing applications such as image compression, object recognition [11],
2]. SVD is an optimal matrix decomposition technique in a least
square sense that it packs the maximum signal energy into few coefficients. Singular value
decomposition (SVD) of an image results in three matrices (U, D and V) of same size as that of
resents the left and right singular vectors of the image matrix and
D is a diagonal matrix with singular values. Further, singular values extracted by SVD [1
good performance for shape description. In the SVD of an image, each singular value in the
decomposed matrix (D) specifies the luminance of an image layer providing geometrical
invariance, while the corresponding pair of singular vectors (U,V) specifies the geometry
(structural details) of image layer. According to it, every real matrix A can be decomposed into a
A=UΣVT
If A is represented in matrix format:
can be written as
which is less than or equal to N. The singular values above rank r
are orthogonal matrices, satisfying the condition UT
U= I, VT
V = I, and
diagonal entries of Σ are called the singular values of A, the columns of
[ ]
1
2
1, 2, 1 2
.
0 0 0
0 0 0
.
0 0 0
0 0 0
T
N N
N
u u u v v v
λ
λ
λ
 
 
  × ×   
 
 
rrr VUVUVU λλλ ........222111 ++=
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
215
Singular Value Decomposition (SVD) is one of the powerful mathematical tools in linear algebra
s such as image compression, object recognition [11],
rix decomposition technique in a least
square sense that it packs the maximum signal energy into few coefficients. Singular value
decomposition (SVD) of an image results in three matrices (U, D and V) of same size as that of
resents the left and right singular vectors of the image matrix and
gular values extracted by SVD [11] have
good performance for shape description. In the SVD of an image, each singular value in the SVD
decomposed matrix (D) specifies the luminance of an image layer providing geometrical
invariance, while the corresponding pair of singular vectors (U,V) specifies the geometry
n be decomposed into a
(1)
(2)
(3)
. The singular values above rank r
, and Σ = diag
, the columns of U are
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
called the left singular vectors of
A.
2.2.1 Properties of Singular Value Decomposition:
1. Existence and Uniqueness: Every matrix A, with real or complex values has singular valued
decomposition. .If A is a square matrix and its singular values are distinct, than the left and right
singular vectors are determined uniquely up to sign, i.e., a coordinate reflect
singular values.
2. Energy: The largest singular values is related to spectral norm of the matrix A., i.e.,
, while the square root of sum of its squared SVs is equal to Frobenius norm, i.e.
3. Stability: The SVs have a strong stability since the variation of both original and disturbed SVs
cannot exceed 2-norm of the difference between the original and
4. Invariance to geometric distortions: The SVD exhibits the geometric invariance can be
expressed in: Translational invariance: Both the matrix A and its translated counterpart has same
singular values.
2.3 Local Binary Pattern:
The Local Binary Pattern initially
gives a label for each pixel of an image by
value and assuming the result as a binary number. In various
output values are read either clockwise or
computed by reading the values clockwise, starting from the top left neighbor, as
Figure2. LBP labeling: binary
In other words, given a pixel position (xc, yc), LBP is defined as an ordered set of binary
Comparisons of pixel intensities between the central pixel and its surrounding pixels. The
resulting decimal label value of the 8
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
called the left singular vectors of A, and the columns of V are called the right singular vectors of
2.2.1 Properties of Singular Value Decomposition:
niqueness: Every matrix A, with real or complex values has singular valued
decomposition. .If A is a square matrix and its singular values are distinct, than the left and right
singular vectors are determined uniquely up to sign, i.e., a coordinate reflection of each set of
2. Energy: The largest singular values is related to spectral norm of the matrix A., i.e.,
, while the square root of sum of its squared SVs is equal to Frobenius norm, i.e.
3. Stability: The SVs have a strong stability since the variation of both original and disturbed SVs
norm of the difference between the original and modified matrices.
4. Invariance to geometric distortions: The SVD exhibits the geometric invariance can be
expressed in: Translational invariance: Both the matrix A and its translated counterpart has same
initially appeared as a generic texture descriptor. The LBP operator
each pixel of an image by limiting a 3x3 neighborhood with the
as a binary number. In various publications, the circular 0 and 1
values are read either clockwise or anti clockwise. In this research, the binary result will be
by reading the values clockwise, starting from the top left neighbor, as shown below:
Figure2. LBP labeling: binary label is read clockwise starting from top left neighbor.
In other words, given a pixel position (xc, yc), LBP is defined as an ordered set of binary
Comparisons of pixel intensities between the central pixel and its surrounding pixels. The
al label value of the 8-bit word can be expressed as follows:
2
1
1
2






= ∑=
r
i
iF
A σ
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
216
are called the right singular vectors of
niqueness: Every matrix A, with real or complex values has singular valued
decomposition. .If A is a square matrix and its singular values are distinct, than the left and right
ion of each set of
2. Energy: The largest singular values is related to spectral norm of the matrix A., i.e.,
(4)
3. Stability: The SVs have a strong stability since the variation of both original and disturbed SVs
4. Invariance to geometric distortions: The SVD exhibits the geometric invariance can be
expressed in: Translational invariance: Both the matrix A and its translated counterpart has same
LBP operator
a 3x3 neighborhood with the center pixel
, the circular 0 and 1
e binary result will be
shown below:
label is read clockwise starting from top left neighbor.
In other words, given a pixel position (xc, yc), LBP is defined as an ordered set of binary
Comparisons of pixel intensities between the central pixel and its surrounding pixels. The
21 A=σ
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
Where lc corresponds to the grey value of the center pixel (xc, yc), ln to the grey values of the
8surrounding pixels, and function s (k) is defined as:
LBP can be extended as follows:
In order to treat textures at different scales, the Local Binary Pattern operator was extended to use
neighborhoods of various sizes. By u
pixel values, any radius and number of samples in
following notation is defined:
(P, R) which means P sampling points on a circle of
The following figure shows some examples of different sampling points and radius:
Figure3. LBP different sampling point and radius examples.
In (4,1) LBP case, the four points selected correspond to vertical and horizontal ones,
faces contain more vertical and
operations considering the NXN neighborhoods at an
mask is off the image edge. In these cases
repeating border elements, zero
border. Also, in LBP operator case, the critical boundary, defined by the radius R of
operation, cannot be solved padding technique, so
R). The benefit of this is the final L
the resulting LBP labels image size will be reduced to Width
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
Where lc corresponds to the grey value of the center pixel (xc, yc), ln to the grey values of the
pixels, and function s (k) is defined as:
LBP can be extended as follows:
res at different scales, the Local Binary Pattern operator was extended to use
By using the circular neighborhoods and bilinear interpolation of
pixel values, any radius and number of samples in the neighborhood can be treated
sampling points on a circle of radius R.
The following figure shows some examples of different sampling points and radius:
Figure3. LBP different sampling point and radius examples.
In (4,1) LBP case, the four points selected correspond to vertical and horizontal ones,
vertical and horizontal edges than diagonal ones. When computing pixe
operations considering the NXN neighborhoods at an image boundary, a portion
these cases, various padding techniques are generally
repeating border elements, zero-padding or applying a mirror reflection to define an image
, in LBP operator case, the critical boundary, defined by the radius R of
dding technique, so the operation is started at an image pix
the final LBP labels histogram will be not influenced by the borders,
image size will be reduced to Width-R X Height-R pixels.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
217
(5)
Where lc corresponds to the grey value of the center pixel (xc, yc), ln to the grey values of the
(6)
res at different scales, the Local Binary Pattern operator was extended to use
nd bilinear interpolation of
d can be treated. Hence, the
In (4,1) LBP case, the four points selected correspond to vertical and horizontal ones, because that
horizontal edges than diagonal ones. When computing pixel
, a portion of the NXN
generally used such as
on to define an image
, in LBP operator case, the critical boundary, defined by the radius R of the circular
image pixel (R,
BP labels histogram will be not influenced by the borders, as
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
3. FEATURE VECTOR
Texture features are a sort of internal visual features which do not based on brightness
These features comprise the both
Texture features can also describe the
al. defined 14 feature parameters of gray level co
study found that only 4 features are not related, namel
energy, moment of inertia also
feature parameters; they are energy, entropy and contrast.
3.1 Energy:
Energy is also known as uniformity or the angular second moment.
elements in the Gray Level Co-occurrence Matrix.
given by:
Energy =
3.2 Entropy:
The entropy of an image can be calculated as
3.3 Contrast:
Measures the local variations in the gray
texture grooves and image clarity. Contrast is 0 for a constant image. The contrast is given by
4. DISTANCE MEASURES:
In image analysis, the distance transform measures the distance of each object point from the
nearest boundary and is an important tool in
distance transform, binary image specifies the distance from each pixel to the nearest non
pixel. The distance transform provides a metric or measure of the separation of points in the
image. The distance metrics used in this retrieving of images are Euclidean distance, Manhattan
distance and Canberra distance.
2
( , )
i j
Pd i j∑ ∑
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
PARAMETERS:
Texture features are a sort of internal visual features which do not based on brightness
both surface information and surrounding environment of the image.
features can also describe the spatial information of an image quantitatively. Haralick et
ed 14 feature parameters of gray level co-occurrence matrix for analyzing texture
study found that only 4 features are not related, namely angular second moment also called
energy, moment of inertia also called contrast, entropy and correlation. In our work we use 3
feature parameters; they are energy, entropy and contrast.
lso known as uniformity or the angular second moment. It provides the sum of squared
occurrence Matrix. Energy is 1 for a constant image. The energy is
can be calculated as
the local variations in the gray-level co-occurrence matrix. It reflects the depth of
texture grooves and image clarity. Contrast is 0 for a constant image. The contrast is given by
MEASURES:
In image analysis, the distance transform measures the distance of each object point from the
portant tool in image processing and pattern recognition. In the
distance transform, binary image specifies the distance from each pixel to the nearest non
pixel. The distance transform provides a metric or measure of the separation of points in the
mage. The distance metrics used in this retrieving of images are Euclidean distance, Manhattan
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
218
Texture features are a sort of internal visual features which do not based on brightness or color.
unding environment of the image.
quantitatively. Haralick et
analyzing texture , the
y angular second moment also called
. In our work we use 3
It provides the sum of squared
Energy is 1 for a constant image. The energy is
(7)
(8)
occurrence matrix. It reflects the depth of
texture grooves and image clarity. Contrast is 0 for a constant image. The contrast is given by
(9)
In image analysis, the distance transform measures the distance of each object point from the
image processing and pattern recognition. In the
distance transform, binary image specifies the distance from each pixel to the nearest non-zero
pixel. The distance transform provides a metric or measure of the separation of points in the
mage. The distance metrics used in this retrieving of images are Euclidean distance, Manhattan
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
4.1 Euclidean Distance:
The Euclidean distance of two images is given as:
4.2 Manhattan Distance:
The Manhattan distance of two images is given as:
4.3 Canberra Distance:
The Canberra distance of two images is given as:
5. EXPERIMENTAL RESULTS:
The above mentioned three algorithms are validated
MATLAB. The Corel image database is used for experimentation; choose
associated with busses, horses, elephants,
beaches, and food. Twenty images are randomly selected from each of the ten kinds of images
regarded as query images. The above three methods are respectively used to retrieve images.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
The Euclidean distance of two images is given as:
The Manhattan distance of two images is given as:
The Canberra distance of two images is given as:
5. EXPERIMENTAL RESULTS:
algorithms are validated through simulation experiments using
Corel image database is used for experimentation; choose 1000 images which are
horses, elephants, buildings, mountains, flowers, African peop
beaches, and food. Twenty images are randomly selected from each of the ten kinds of images
regarded as query images. The above three methods are respectively used to retrieve images.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
219
(10)
(11)
(12)
through simulation experiments using
1000 images which are
African people,
beaches, and food. Twenty images are randomly selected from each of the ten kinds of images
regarded as query images. The above three methods are respectively used to retrieve images.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
AVERAGE VALUES OF IMAGES USING 3 DISTANCE METRICS
Category
Distance
Metric
GLCM
Euclidean
Manhattan
Canberra
GLCM & SVD
Euclidean
Manhattan
Canberra
LBP RADIUS 1
Euclidean
Manhattan
Canberra
LBP RADIUS 2
Euclidean
Manhattan
Canberra
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
AVERAGE VALUES OF IMAGES USING 3 DISTANCE METRICS
Distance
Metric
Retrieved
Images
Precision Recall
Euclidean 23.410 0.234 0.023
Manhattan 23.410 0.234 0.023
Canberra 13.070 0.133 0.013
Euclidean 22.900 0.229 0.022
Manhattan 23.610 0.234 0.023
Canberra 22.960 0.229 0.022
Euclidean 14.130 0.141 0.014
Manhattan 14.480 0.141 0.014
Canberra 20.280 0.201 0.020
Euclidean 13.321 0.133 0.013
Manhattan 13.380 0.216 0.021
Canberra 19.433 0.194 0.019
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
220
AVERAGE VALUES OF IMAGES USING 3 DISTANCE METRICS
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
6. CONCULSION:
The CBIR technology can be used in several applications such as social networking sites, forensic
labs and image search. CBIR system is a computationally an expensive task. Also it requires a lot
of accuracy in the output. The accuracy in this paper has b
metrics such as Canberra distan
algorithms such as GLCM, GLCM & SVD, LBP radius1 and LBP radius2 based on feature vector
parameters such as energy, contrast, and entropy.
7. REFERENCES:
[1] G.H.Liu, L.Zhang, Y.K.Hou, Z.Y. Li, J.Y. Yang,
Pattern Recognition vol.43, Issue No.7, pp. 2380
[2] G.H.Liu, Z.Y.Li, L.Zhang, Y.Xu, Image retrieval based on micro
Recognition Vol.44 , Issue 9, 2011.pp.
[3] R.Kwitt, P.Meerwald, A.Uhl,
framework”, IEEE Transactions on Image Processing
[4] C.H.Lin, D.C.Huang, Y.K.Chan, K.H.Chen, Y.J.Chang,
retrieval methods”, Expert Systems with Applications
[5] Z. Konstantinos, E. Kavallieratou, P. Nikos,
descriptor and relevance feedback information
Representation Vol. 22 No.5, pp.378
[6] A. El-ghazal, O. Basir, S. Belkas
Visual Communication and Image Representation
[7] T. Celik, T. Tjahjadi, “Baye
vector”, Pattern Recognition Letters
[8] S. Murala, R.P. Maheshwari, R. Balasubramanian,
content-based image retrieval”
2012.
[9] X.F. He, “Laplacian regularized D
retrieval”, IEEE Transactions on Image Processing
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
can be used in several applications such as social networking sites, forensic
labs and image search. CBIR system is a computationally an expensive task. Also it requires a lot
of accuracy in the output. The accuracy in this paper has been increased by using various
distance, Manhattan distance and Euclidean distance on different
algorithms such as GLCM, GLCM & SVD, LBP radius1 and LBP radius2 based on feature vector
parameters such as energy, contrast, and entropy.
G.H.Liu, L.Zhang, Y.K.Hou, Z.Y. Li, J.Y. Yang, “Image retrieval based on multitexton histogram
vol.43, Issue No.7, pp. 2380–2389, 2010.
G.H.Liu, Z.Y.Li, L.Zhang, Y.Xu, Image retrieval based on micro-structure descriptor, Pattern
Vol.44 , Issue 9, 2011.pp. 2123–2133.
R.Kwitt, P.Meerwald, A.Uhl, “Efficient texture image retrieval using copulas in Bayesian
ansactions on Image Processing Vol. 20 , Issue.7, 2011.
C.H.Lin, D.C.Huang, Y.K.Chan, K.H.Chen, Y.J.Chang, “Fast color-spatial featurebased image
, Expert Systems with Applications V ol.38, 2011, pp. 11412–11420.
nos, E. Kavallieratou, P. Nikos, “Image retrieval systems based on compact shape
descriptor and relevance feedback information”, Journal of Visual Communication and Image
Vol. 22 No.5, pp.378–390, 2011.
ghazal, O. Basir, S. Belkasim, “Invariant curvature-based Fourier shape descriptors
Visual Communication and Image Representation. Vol. 23, no. 4, pp. 622–633, 2012.
eesian texture classification and retrieval based on multiscale
, Pattern Recognition Letters.Vol.32, Issue no.2, pp.159–67, 2011.
S. Murala, R.P. Maheshwari, R. Balasubramanian, “Local tetra patterns: a new feature descriptor for
”, IEEE Transactions on Image Processing Vol. 21, no.5, pp.2874
Laplacian regularized D-optimal design for active learning and its application to image
, IEEE Transactions on Image Processing. Vol. 19, pp.254–263, 2010.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
221
can be used in several applications such as social networking sites, forensic
labs and image search. CBIR system is a computationally an expensive task. Also it requires a lot
g various distance
distance on different
algorithms such as GLCM, GLCM & SVD, LBP radius1 and LBP radius2 based on feature vector
Image retrieval based on multitexton histogram”,
structure descriptor, Pattern
Efficient texture image retrieval using copulas in Bayesian
spatial featurebased image
11420.
Image retrieval systems based on compact shape
, Journal of Visual Communication and Image
based Fourier shape descriptors”, Journal of
esian texture classification and retrieval based on multiscale feature
Local tetra patterns: a new feature descriptor for
Vol. 21, no.5, pp.2874–2886,
application to image
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
222
[10] D.S.Zhang, M.M.Islam, G.J.Lu, “A review on automatic image annotation techniques”, Pattern
Recognition. Vol.45, No.1, pp.346–362, 2012.
[11] Z.Q.Hong, “Algebraic Feature Extraction of Image for Recognition”, Pattern Recognition, Vol.24,
No.3, pp.211-219, 1991.
[12] Ch.S.Rao and S.S.Kumar, “Content Based Image Retrieval using Singular Value Decomposition and
Fuzzy Set Theoretic Technique,” International Journal of Intelligent Information Processing, Vol.2,
No.2, pp. 187-201, 2008.
[13] H.S.Prashanta, H.L.Shashidhara, and K.N.B.Murty, “Image Compression using SVD,” Proc.of the
international Conference on Computational Intelligence and Multimedia Applications (ICCIMA
2007), Vol.03,pp.143-145,2007.
AUTHORS:
D. Kishore received the B.Tech degree from JNTU, AP, India in Electronics & Communication
Engineering and Masters degree in Communications and Signal Processing from Bapatla
Engineering College, Bapatla, AP, India in 2009. He is currently pursuing his Ph.D in Digital
Image Processing at JNTUK, Kakinada.
Dr.S.Srinivas Kumar is currently working as Director (Research & Development) and Professor of
Electronics & Communication Engineering at JNTUK, Kakinada, AP, India. He obtained his Ph.D
from IIT, Karaghpur India. He received M.Tech degree from the same institute. He published 50
research papers in reputed International Journals and Conferences.
Dr. Ch. Srinivasa rao is currently working as Professor of ECE at JNTUK University College of
Engineering, Vizianagaram, AP, India. He obtained his Ph.D. in Digital Image Processing area
from University College of Engineering, JNTUK, Kakinada, A.P, India. He received M. Tech
degree from the same institute. He published 20 Research papers in reputed International Journals
and Conferences.

More Related Content

What's hot

A Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCAA Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCAEditor Jacotech
 
4 image segmentation through clustering
4 image segmentation through clustering4 image segmentation through clustering
4 image segmentation through clusteringIAEME Publication
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464IJRAT
 
PDE BASED FEATURES FOR TEXTURE ANALYSIS USING WAVELET TRANSFORM
PDE BASED FEATURES FOR TEXTURE ANALYSIS USING WAVELET TRANSFORMPDE BASED FEATURES FOR TEXTURE ANALYSIS USING WAVELET TRANSFORM
PDE BASED FEATURES FOR TEXTURE ANALYSIS USING WAVELET TRANSFORMIJCI JOURNAL
 
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURESGREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURESijcseit
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and ExtactionAli A Jalil
 
Evaluation of Texture in CBIR
Evaluation of Texture in CBIREvaluation of Texture in CBIR
Evaluation of Texture in CBIRZahra Mansoori
 
Noise tolerant color image segmentation using support vector machine
Noise tolerant color image segmentation using support vector machineNoise tolerant color image segmentation using support vector machine
Noise tolerant color image segmentation using support vector machineeSAT Publishing House
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisIOSR Journals
 
OTSU Thresholding Method for Flower Image Segmentation
OTSU Thresholding Method for Flower Image SegmentationOTSU Thresholding Method for Flower Image Segmentation
OTSU Thresholding Method for Flower Image Segmentationijceronline
 
Performance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsPerformance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsCSCJournals
 
Digital image classification22oct
Digital image classification22octDigital image classification22oct
Digital image classification22octAleemuddin Abbasi
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Zahra Mansoori
 
Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentationHaitham Ahmed
 

What's hot (18)

A Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCAA Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCA
 
4 image segmentation through clustering
4 image segmentation through clustering4 image segmentation through clustering
4 image segmentation through clustering
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
 
PDE BASED FEATURES FOR TEXTURE ANALYSIS USING WAVELET TRANSFORM
PDE BASED FEATURES FOR TEXTURE ANALYSIS USING WAVELET TRANSFORMPDE BASED FEATURES FOR TEXTURE ANALYSIS USING WAVELET TRANSFORM
PDE BASED FEATURES FOR TEXTURE ANALYSIS USING WAVELET TRANSFORM
 
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURESGREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and Extaction
 
Evaluation of Texture in CBIR
Evaluation of Texture in CBIREvaluation of Texture in CBIR
Evaluation of Texture in CBIR
 
Noise tolerant color image segmentation using support vector machine
Noise tolerant color image segmentation using support vector machineNoise tolerant color image segmentation using support vector machine
Noise tolerant color image segmentation using support vector machine
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and Analysis
 
I1803026164
I1803026164I1803026164
I1803026164
 
OTSU Thresholding Method for Flower Image Segmentation
OTSU Thresholding Method for Flower Image SegmentationOTSU Thresholding Method for Flower Image Segmentation
OTSU Thresholding Method for Flower Image Segmentation
 
Performance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsPerformance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position Vectors
 
Ijetr011917
Ijetr011917Ijetr011917
Ijetr011917
 
Digital image classification22oct
Digital image classification22octDigital image classification22oct
Digital image classification22oct
 
Watershed
WatershedWatershed
Watershed
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
 
Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentation
 

Viewers also liked

Secure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFTSecure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFTijcisjournal
 
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...ijcisjournal
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner ijcisjournal
 
Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna ijcisjournal
 
Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images ijcisjournal
 
128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder 128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder ijcisjournal
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishingijcisjournal
 
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...ijcisjournal
 
Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...ijcisjournal
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsijcisjournal
 
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square AlgorithmImpedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithmijcisjournal
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...ijcisjournal
 
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...ijcisjournal
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryptionijcisjournal
 
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...ijcisjournal
 
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...ijcisjournal
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes ijcisjournal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)ijcisjournal
 

Viewers also liked (19)

Secure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFTSecure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFT
 
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
 
Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna
 
Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images
 
128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder 128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishing
 
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
 
Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systems
 
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square AlgorithmImpedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
 
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryption
 
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
 
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
 

Similar to Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD and Local Binary Pattern

A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUEScscpconf
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray ImagesA Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray ImagesIJERA Editor
 
Paper id 2420148
Paper id 2420148Paper id 2420148
Paper id 2420148IJRAT
 
An Experiment with Sparse Field and Localized Region Based Active Contour Int...
An Experiment with Sparse Field and Localized Region Based Active Contour Int...An Experiment with Sparse Field and Localized Region Based Active Contour Int...
An Experiment with Sparse Field and Localized Region Based Active Contour Int...CSCJournals
 
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...CSCJournals
 
search engine for images
search engine for imagessearch engine for images
search engine for imagesAnjani
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationHabibur Rahman
 
Multimodal Medical Image Fusion Based On SVD
Multimodal Medical Image Fusion Based On SVDMultimodal Medical Image Fusion Based On SVD
Multimodal Medical Image Fusion Based On SVDIOSR Journals
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Color Image Watermarking Application for ERTU Cloud
Color Image Watermarking Application for ERTU CloudColor Image Watermarking Application for ERTU Cloud
Color Image Watermarking Application for ERTU CloudCSCJournals
 

Similar to Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD and Local Binary Pattern (20)

C1803011419
C1803011419C1803011419
C1803011419
 
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
 
Ct31628631
Ct31628631Ct31628631
Ct31628631
 
Av4301248253
Av4301248253Av4301248253
Av4301248253
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray ImagesA Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray Images
 
Paper id 2420148
Paper id 2420148Paper id 2420148
Paper id 2420148
 
Lec-3 DIP.pptx
Lec-3 DIP.pptxLec-3 DIP.pptx
Lec-3 DIP.pptx
 
An Experiment with Sparse Field and Localized Region Based Active Contour Int...
An Experiment with Sparse Field and Localized Region Based Active Contour Int...An Experiment with Sparse Field and Localized Region Based Active Contour Int...
An Experiment with Sparse Field and Localized Region Based Active Contour Int...
 
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
 
search engine for images
search engine for imagessearch engine for images
search engine for images
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentation
 
A1804010105
A1804010105A1804010105
A1804010105
 
Multimodal Medical Image Fusion Based On SVD
Multimodal Medical Image Fusion Based On SVDMultimodal Medical Image Fusion Based On SVD
Multimodal Medical Image Fusion Based On SVD
 
Ijcatr04041016
Ijcatr04041016Ijcatr04041016
Ijcatr04041016
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Color Image Watermarking Application for ERTU Cloud
Color Image Watermarking Application for ERTU CloudColor Image Watermarking Application for ERTU Cloud
Color Image Watermarking Application for ERTU Cloud
 
E018212935
E018212935E018212935
E018212935
 

Recently uploaded

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD and Local Binary Pattern

  • 1. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 DOI: 10.5121/ijci.2016.5424 213 CONTENT BASED IMAGE RETRIEVAL USING GRAY LEVEL CO-OCCURRENCE MATRIX WITH SVD AND LOCAL BINARY PATTERN D.Kishore1 , S.Srinivas Kumar2 , Ch.Srinivasa Rao3 1 Research scholar, ECE Dept., JNTUK, Kakinada, A.P, India. 2 R&D Director, Professor of ECE, JNTUK, Kakinada , A.P, India. 3 Professor, ECE Dept, JNTUCE, Vizianagaram, A.P, India. ABSTRACT In this paper, gray level co-occurrence matrix, gray level co-occurrence matrix with singular value decomposition and local binary pattern are presented for content based image retrieval. Based upon the feature vector parameters of energy, contrast, entropy and distance metrics such as Euclidean distance, Canberra distance, Manhattan distance the retrieval efficiency, precision, and recall of the images are calculated. The retrieval results of the proposed method are tested on Corel-1k database. The results after being investigated shows a significant improvement in terms of average retrieval rate, average retrieval precision and recall of different algorithms such as GLCM, GLCM & SVD, LBP with radius one and LBP with radius two based on different distance metrics. Keywords CBIR, GLCM, SVD and LBP. 1. INTRODUCTION: The image database is increasing fast recently. The capturing of useful images is difficult in the large image database and we obtain frequently useful images, which is widely extending through the Internet. It is not easy to change the situation by using existing methods, so it is a new way to find retrieve images accurately as urgent as possible. Thus image retrieval becomes an essential topic in pattern recognition domain and image processing. Images can be retrieved in three ways generally: content based, text based and semantic based[1–4]. Text based retrieval approach is widely used, such as Google and Baidu, and images can retrieved by using keywords that are annotated on images. However, with this method we have obtained that images are not related to our expected results. The two drawbacks of this approach are firstly, images in the database were manually annoted by annotators and secondly, the retrieval results are poor, because they are similar to the understanding of the query images. The ordinal approach, example, content based image retrieval (CBIR) had been proposed in the early 1990’s [4–7]. This approach is based on retrieving the images by using low level features like colour, shape and texture that can represent
  • 2. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 214 an image. By using this method, we first extract the low level features on an example image, and then compute the similarity between the database images and the query image, finally images are sorted by similarity and the top images will be displayed. CBIR has been shown more subjectively and effectively compared to text based approach [8–9]. The final approach is semantic based method. CBIR has also failed to describe the semantic concepts, so some methods are proposed by researchers for image retrieval by using relevance feedback algorithms. The relevance feedback algorithms capture user’s preferences and bridge the semantic gap [10], and the results are closer to human perception. In CBIR, color, shape and texture are the most significant features. 2. FEATURE EXTRACTION METHODS: 2.1 Gray Level Co-occurrence Matrix (GLCM): The approach, which is the easiest, for texture description is to use statistical moments of the histogram based on intensity of region or image. Gray Level Co-occurrence Matrix is a one of the statistical approach, help to give important information about the relevant position of the neighboring pixels in an image. The gray level co-occurrence matrix P can be defined for an image I of size NxN as P(i, j) = Nx=1 Ny=1 , if I(x, y) = i and I(x + ∆x, y + ∆y) = j, 0 otherwise. Here, the offset (∆x, ∆y), is representing the distance between the neighbor and its pixel of interest. Note that the offset (∆x, ∆y) parameterization makes the gray level co-occurrence matrix sensitive to rotation. Choosing an offset vector, such that the rotation of an image is not equal to 180 degrees, will result in a different gray level co-occurrence matrix for the same (rotated) image. This can be avoided by forming the gray co-occurrence matrix using statistical features of Co-occurrence matrix, of offsets sweeping through 180 degrees at the same distance parameter ∆ to achieve a degree of invariant rotation (i.e., [0 ∆] for 0◦: P horizontal, [-∆, ∆] for 45◦: P right diagonal, [-∆ 0] for 90◦: P vertical, and [-∆ − ∆] for 135◦: P left diagonal). Figure 1 illustrates the details to generate the four co-occurrence matrices using Ng =5 levels for the offsets {[0 1], [-1 1], [-1 0], [-1 -1]} that are defined as one neighboring pixel in the possible four directions. We can observe that two neighboring pixels (2, 1) of the input image is reflected in PH concurrence matrix as 3, because there are 3 occurrences of the pixel intensity value 2 and pixel intensity value 1 adjacent to each other in the input image. The neighboring pixels (1, 2) will occur again 3 times in PH, which makes these matrices symmetric. In the same manner, the other three matrices PV, PLD, PRD are calculated.
  • 3. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 2.2 Singular Value Decomposition: Singular Value Decomposition (SVD) is one of the powerful mathematical tools in linear algebra used in many image processing application and image watermarking [12]. SVD is an optimal mat square sense that it packs the maximum signal energy into few coefficients. Singular value decomposition (SVD) of an image results in three matrices (U, D and V) of same size as that of the original image. U and V represents the left and right singular vectors of the image matrix and D is a diagonal matrix with singular values. Further, sin good performance for shape description. In the SVD of an image, each singular value in the decomposed matrix (D) specifies the luminance of an image layer providing geometrical invariance, while the corresponding pair of singular vectors (U,V) specifies the geometry (structural details) of image layer. According to it, every real matrix product of three matrices, If A is represented in matrix format: The SVD of matrix A can be written as Where r is the rank of matrix A which is less than or equal to N are zero. U and V are orthogonal matrices, satisfying the condition (λ1, λ2, ...). The diagonal entries of A = International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 Decomposition: Singular Value Decomposition (SVD) is one of the powerful mathematical tools in linear algebra used in many image processing applications such as image compression, object recognition [11], 2]. SVD is an optimal matrix decomposition technique in a least square sense that it packs the maximum signal energy into few coefficients. Singular value decomposition (SVD) of an image results in three matrices (U, D and V) of same size as that of resents the left and right singular vectors of the image matrix and D is a diagonal matrix with singular values. Further, singular values extracted by SVD [1 good performance for shape description. In the SVD of an image, each singular value in the decomposed matrix (D) specifies the luminance of an image layer providing geometrical invariance, while the corresponding pair of singular vectors (U,V) specifies the geometry (structural details) of image layer. According to it, every real matrix A can be decomposed into a A=UΣVT If A is represented in matrix format: can be written as which is less than or equal to N. The singular values above rank r are orthogonal matrices, satisfying the condition UT U= I, VT V = I, and diagonal entries of Σ are called the singular values of A, the columns of [ ] 1 2 1, 2, 1 2 . 0 0 0 0 0 0 . 0 0 0 0 0 0 T N N N u u u v v v λ λ λ       × ×        rrr VUVUVU λλλ ........222111 ++= International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 215 Singular Value Decomposition (SVD) is one of the powerful mathematical tools in linear algebra s such as image compression, object recognition [11], rix decomposition technique in a least square sense that it packs the maximum signal energy into few coefficients. Singular value decomposition (SVD) of an image results in three matrices (U, D and V) of same size as that of resents the left and right singular vectors of the image matrix and gular values extracted by SVD [11] have good performance for shape description. In the SVD of an image, each singular value in the SVD decomposed matrix (D) specifies the luminance of an image layer providing geometrical invariance, while the corresponding pair of singular vectors (U,V) specifies the geometry n be decomposed into a (1) (2) (3) . The singular values above rank r , and Σ = diag , the columns of U are
  • 4. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 called the left singular vectors of A. 2.2.1 Properties of Singular Value Decomposition: 1. Existence and Uniqueness: Every matrix A, with real or complex values has singular valued decomposition. .If A is a square matrix and its singular values are distinct, than the left and right singular vectors are determined uniquely up to sign, i.e., a coordinate reflect singular values. 2. Energy: The largest singular values is related to spectral norm of the matrix A., i.e., , while the square root of sum of its squared SVs is equal to Frobenius norm, i.e. 3. Stability: The SVs have a strong stability since the variation of both original and disturbed SVs cannot exceed 2-norm of the difference between the original and 4. Invariance to geometric distortions: The SVD exhibits the geometric invariance can be expressed in: Translational invariance: Both the matrix A and its translated counterpart has same singular values. 2.3 Local Binary Pattern: The Local Binary Pattern initially gives a label for each pixel of an image by value and assuming the result as a binary number. In various output values are read either clockwise or computed by reading the values clockwise, starting from the top left neighbor, as Figure2. LBP labeling: binary In other words, given a pixel position (xc, yc), LBP is defined as an ordered set of binary Comparisons of pixel intensities between the central pixel and its surrounding pixels. The resulting decimal label value of the 8 International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 called the left singular vectors of A, and the columns of V are called the right singular vectors of 2.2.1 Properties of Singular Value Decomposition: niqueness: Every matrix A, with real or complex values has singular valued decomposition. .If A is a square matrix and its singular values are distinct, than the left and right singular vectors are determined uniquely up to sign, i.e., a coordinate reflection of each set of 2. Energy: The largest singular values is related to spectral norm of the matrix A., i.e., , while the square root of sum of its squared SVs is equal to Frobenius norm, i.e. 3. Stability: The SVs have a strong stability since the variation of both original and disturbed SVs norm of the difference between the original and modified matrices. 4. Invariance to geometric distortions: The SVD exhibits the geometric invariance can be expressed in: Translational invariance: Both the matrix A and its translated counterpart has same initially appeared as a generic texture descriptor. The LBP operator each pixel of an image by limiting a 3x3 neighborhood with the as a binary number. In various publications, the circular 0 and 1 values are read either clockwise or anti clockwise. In this research, the binary result will be by reading the values clockwise, starting from the top left neighbor, as shown below: Figure2. LBP labeling: binary label is read clockwise starting from top left neighbor. In other words, given a pixel position (xc, yc), LBP is defined as an ordered set of binary Comparisons of pixel intensities between the central pixel and its surrounding pixels. The al label value of the 8-bit word can be expressed as follows: 2 1 1 2       = ∑= r i iF A σ International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 216 are called the right singular vectors of niqueness: Every matrix A, with real or complex values has singular valued decomposition. .If A is a square matrix and its singular values are distinct, than the left and right ion of each set of 2. Energy: The largest singular values is related to spectral norm of the matrix A., i.e., (4) 3. Stability: The SVs have a strong stability since the variation of both original and disturbed SVs 4. Invariance to geometric distortions: The SVD exhibits the geometric invariance can be expressed in: Translational invariance: Both the matrix A and its translated counterpart has same LBP operator a 3x3 neighborhood with the center pixel , the circular 0 and 1 e binary result will be shown below: label is read clockwise starting from top left neighbor. In other words, given a pixel position (xc, yc), LBP is defined as an ordered set of binary Comparisons of pixel intensities between the central pixel and its surrounding pixels. The 21 A=σ
  • 5. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 Where lc corresponds to the grey value of the center pixel (xc, yc), ln to the grey values of the 8surrounding pixels, and function s (k) is defined as: LBP can be extended as follows: In order to treat textures at different scales, the Local Binary Pattern operator was extended to use neighborhoods of various sizes. By u pixel values, any radius and number of samples in following notation is defined: (P, R) which means P sampling points on a circle of The following figure shows some examples of different sampling points and radius: Figure3. LBP different sampling point and radius examples. In (4,1) LBP case, the four points selected correspond to vertical and horizontal ones, faces contain more vertical and operations considering the NXN neighborhoods at an mask is off the image edge. In these cases repeating border elements, zero border. Also, in LBP operator case, the critical boundary, defined by the radius R of operation, cannot be solved padding technique, so R). The benefit of this is the final L the resulting LBP labels image size will be reduced to Width International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 Where lc corresponds to the grey value of the center pixel (xc, yc), ln to the grey values of the pixels, and function s (k) is defined as: LBP can be extended as follows: res at different scales, the Local Binary Pattern operator was extended to use By using the circular neighborhoods and bilinear interpolation of pixel values, any radius and number of samples in the neighborhood can be treated sampling points on a circle of radius R. The following figure shows some examples of different sampling points and radius: Figure3. LBP different sampling point and radius examples. In (4,1) LBP case, the four points selected correspond to vertical and horizontal ones, vertical and horizontal edges than diagonal ones. When computing pixe operations considering the NXN neighborhoods at an image boundary, a portion these cases, various padding techniques are generally repeating border elements, zero-padding or applying a mirror reflection to define an image , in LBP operator case, the critical boundary, defined by the radius R of dding technique, so the operation is started at an image pix the final LBP labels histogram will be not influenced by the borders, image size will be reduced to Width-R X Height-R pixels. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 217 (5) Where lc corresponds to the grey value of the center pixel (xc, yc), ln to the grey values of the (6) res at different scales, the Local Binary Pattern operator was extended to use nd bilinear interpolation of d can be treated. Hence, the In (4,1) LBP case, the four points selected correspond to vertical and horizontal ones, because that horizontal edges than diagonal ones. When computing pixel , a portion of the NXN generally used such as on to define an image , in LBP operator case, the critical boundary, defined by the radius R of the circular image pixel (R, BP labels histogram will be not influenced by the borders, as
  • 6. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 3. FEATURE VECTOR Texture features are a sort of internal visual features which do not based on brightness These features comprise the both Texture features can also describe the al. defined 14 feature parameters of gray level co study found that only 4 features are not related, namel energy, moment of inertia also feature parameters; they are energy, entropy and contrast. 3.1 Energy: Energy is also known as uniformity or the angular second moment. elements in the Gray Level Co-occurrence Matrix. given by: Energy = 3.2 Entropy: The entropy of an image can be calculated as 3.3 Contrast: Measures the local variations in the gray texture grooves and image clarity. Contrast is 0 for a constant image. The contrast is given by 4. DISTANCE MEASURES: In image analysis, the distance transform measures the distance of each object point from the nearest boundary and is an important tool in distance transform, binary image specifies the distance from each pixel to the nearest non pixel. The distance transform provides a metric or measure of the separation of points in the image. The distance metrics used in this retrieving of images are Euclidean distance, Manhattan distance and Canberra distance. 2 ( , ) i j Pd i j∑ ∑ International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 PARAMETERS: Texture features are a sort of internal visual features which do not based on brightness both surface information and surrounding environment of the image. features can also describe the spatial information of an image quantitatively. Haralick et ed 14 feature parameters of gray level co-occurrence matrix for analyzing texture study found that only 4 features are not related, namely angular second moment also called energy, moment of inertia also called contrast, entropy and correlation. In our work we use 3 feature parameters; they are energy, entropy and contrast. lso known as uniformity or the angular second moment. It provides the sum of squared occurrence Matrix. Energy is 1 for a constant image. The energy is can be calculated as the local variations in the gray-level co-occurrence matrix. It reflects the depth of texture grooves and image clarity. Contrast is 0 for a constant image. The contrast is given by MEASURES: In image analysis, the distance transform measures the distance of each object point from the portant tool in image processing and pattern recognition. In the distance transform, binary image specifies the distance from each pixel to the nearest non pixel. The distance transform provides a metric or measure of the separation of points in the mage. The distance metrics used in this retrieving of images are Euclidean distance, Manhattan International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 218 Texture features are a sort of internal visual features which do not based on brightness or color. unding environment of the image. quantitatively. Haralick et analyzing texture , the y angular second moment also called . In our work we use 3 It provides the sum of squared Energy is 1 for a constant image. The energy is (7) (8) occurrence matrix. It reflects the depth of texture grooves and image clarity. Contrast is 0 for a constant image. The contrast is given by (9) In image analysis, the distance transform measures the distance of each object point from the image processing and pattern recognition. In the distance transform, binary image specifies the distance from each pixel to the nearest non-zero pixel. The distance transform provides a metric or measure of the separation of points in the mage. The distance metrics used in this retrieving of images are Euclidean distance, Manhattan
  • 7. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 4.1 Euclidean Distance: The Euclidean distance of two images is given as: 4.2 Manhattan Distance: The Manhattan distance of two images is given as: 4.3 Canberra Distance: The Canberra distance of two images is given as: 5. EXPERIMENTAL RESULTS: The above mentioned three algorithms are validated MATLAB. The Corel image database is used for experimentation; choose associated with busses, horses, elephants, beaches, and food. Twenty images are randomly selected from each of the ten kinds of images regarded as query images. The above three methods are respectively used to retrieve images. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 The Euclidean distance of two images is given as: The Manhattan distance of two images is given as: The Canberra distance of two images is given as: 5. EXPERIMENTAL RESULTS: algorithms are validated through simulation experiments using Corel image database is used for experimentation; choose 1000 images which are horses, elephants, buildings, mountains, flowers, African peop beaches, and food. Twenty images are randomly selected from each of the ten kinds of images regarded as query images. The above three methods are respectively used to retrieve images. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 219 (10) (11) (12) through simulation experiments using 1000 images which are African people, beaches, and food. Twenty images are randomly selected from each of the ten kinds of images regarded as query images. The above three methods are respectively used to retrieve images.
  • 8. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 AVERAGE VALUES OF IMAGES USING 3 DISTANCE METRICS Category Distance Metric GLCM Euclidean Manhattan Canberra GLCM & SVD Euclidean Manhattan Canberra LBP RADIUS 1 Euclidean Manhattan Canberra LBP RADIUS 2 Euclidean Manhattan Canberra International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 AVERAGE VALUES OF IMAGES USING 3 DISTANCE METRICS Distance Metric Retrieved Images Precision Recall Euclidean 23.410 0.234 0.023 Manhattan 23.410 0.234 0.023 Canberra 13.070 0.133 0.013 Euclidean 22.900 0.229 0.022 Manhattan 23.610 0.234 0.023 Canberra 22.960 0.229 0.022 Euclidean 14.130 0.141 0.014 Manhattan 14.480 0.141 0.014 Canberra 20.280 0.201 0.020 Euclidean 13.321 0.133 0.013 Manhattan 13.380 0.216 0.021 Canberra 19.433 0.194 0.019 International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 220 AVERAGE VALUES OF IMAGES USING 3 DISTANCE METRICS
  • 9. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 6. CONCULSION: The CBIR technology can be used in several applications such as social networking sites, forensic labs and image search. CBIR system is a computationally an expensive task. Also it requires a lot of accuracy in the output. The accuracy in this paper has b metrics such as Canberra distan algorithms such as GLCM, GLCM & SVD, LBP radius1 and LBP radius2 based on feature vector parameters such as energy, contrast, and entropy. 7. REFERENCES: [1] G.H.Liu, L.Zhang, Y.K.Hou, Z.Y. Li, J.Y. Yang, Pattern Recognition vol.43, Issue No.7, pp. 2380 [2] G.H.Liu, Z.Y.Li, L.Zhang, Y.Xu, Image retrieval based on micro Recognition Vol.44 , Issue 9, 2011.pp. [3] R.Kwitt, P.Meerwald, A.Uhl, framework”, IEEE Transactions on Image Processing [4] C.H.Lin, D.C.Huang, Y.K.Chan, K.H.Chen, Y.J.Chang, retrieval methods”, Expert Systems with Applications [5] Z. Konstantinos, E. Kavallieratou, P. Nikos, descriptor and relevance feedback information Representation Vol. 22 No.5, pp.378 [6] A. El-ghazal, O. Basir, S. Belkas Visual Communication and Image Representation [7] T. Celik, T. Tjahjadi, “Baye vector”, Pattern Recognition Letters [8] S. Murala, R.P. Maheshwari, R. Balasubramanian, content-based image retrieval” 2012. [9] X.F. He, “Laplacian regularized D retrieval”, IEEE Transactions on Image Processing International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 can be used in several applications such as social networking sites, forensic labs and image search. CBIR system is a computationally an expensive task. Also it requires a lot of accuracy in the output. The accuracy in this paper has been increased by using various distance, Manhattan distance and Euclidean distance on different algorithms such as GLCM, GLCM & SVD, LBP radius1 and LBP radius2 based on feature vector parameters such as energy, contrast, and entropy. G.H.Liu, L.Zhang, Y.K.Hou, Z.Y. Li, J.Y. Yang, “Image retrieval based on multitexton histogram vol.43, Issue No.7, pp. 2380–2389, 2010. G.H.Liu, Z.Y.Li, L.Zhang, Y.Xu, Image retrieval based on micro-structure descriptor, Pattern Vol.44 , Issue 9, 2011.pp. 2123–2133. R.Kwitt, P.Meerwald, A.Uhl, “Efficient texture image retrieval using copulas in Bayesian ansactions on Image Processing Vol. 20 , Issue.7, 2011. C.H.Lin, D.C.Huang, Y.K.Chan, K.H.Chen, Y.J.Chang, “Fast color-spatial featurebased image , Expert Systems with Applications V ol.38, 2011, pp. 11412–11420. nos, E. Kavallieratou, P. Nikos, “Image retrieval systems based on compact shape descriptor and relevance feedback information”, Journal of Visual Communication and Image Vol. 22 No.5, pp.378–390, 2011. ghazal, O. Basir, S. Belkasim, “Invariant curvature-based Fourier shape descriptors Visual Communication and Image Representation. Vol. 23, no. 4, pp. 622–633, 2012. eesian texture classification and retrieval based on multiscale , Pattern Recognition Letters.Vol.32, Issue no.2, pp.159–67, 2011. S. Murala, R.P. Maheshwari, R. Balasubramanian, “Local tetra patterns: a new feature descriptor for ”, IEEE Transactions on Image Processing Vol. 21, no.5, pp.2874 Laplacian regularized D-optimal design for active learning and its application to image , IEEE Transactions on Image Processing. Vol. 19, pp.254–263, 2010. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 221 can be used in several applications such as social networking sites, forensic labs and image search. CBIR system is a computationally an expensive task. Also it requires a lot g various distance distance on different algorithms such as GLCM, GLCM & SVD, LBP radius1 and LBP radius2 based on feature vector Image retrieval based on multitexton histogram”, structure descriptor, Pattern Efficient texture image retrieval using copulas in Bayesian spatial featurebased image 11420. Image retrieval systems based on compact shape , Journal of Visual Communication and Image based Fourier shape descriptors”, Journal of esian texture classification and retrieval based on multiscale feature Local tetra patterns: a new feature descriptor for Vol. 21, no.5, pp.2874–2886, application to image
  • 10. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 222 [10] D.S.Zhang, M.M.Islam, G.J.Lu, “A review on automatic image annotation techniques”, Pattern Recognition. Vol.45, No.1, pp.346–362, 2012. [11] Z.Q.Hong, “Algebraic Feature Extraction of Image for Recognition”, Pattern Recognition, Vol.24, No.3, pp.211-219, 1991. [12] Ch.S.Rao and S.S.Kumar, “Content Based Image Retrieval using Singular Value Decomposition and Fuzzy Set Theoretic Technique,” International Journal of Intelligent Information Processing, Vol.2, No.2, pp. 187-201, 2008. [13] H.S.Prashanta, H.L.Shashidhara, and K.N.B.Murty, “Image Compression using SVD,” Proc.of the international Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007), Vol.03,pp.143-145,2007. AUTHORS: D. Kishore received the B.Tech degree from JNTU, AP, India in Electronics & Communication Engineering and Masters degree in Communications and Signal Processing from Bapatla Engineering College, Bapatla, AP, India in 2009. He is currently pursuing his Ph.D in Digital Image Processing at JNTUK, Kakinada. Dr.S.Srinivas Kumar is currently working as Director (Research & Development) and Professor of Electronics & Communication Engineering at JNTUK, Kakinada, AP, India. He obtained his Ph.D from IIT, Karaghpur India. He received M.Tech degree from the same institute. He published 50 research papers in reputed International Journals and Conferences. Dr. Ch. Srinivasa rao is currently working as Professor of ECE at JNTUK University College of Engineering, Vizianagaram, AP, India. He obtained his Ph.D. in Digital Image Processing area from University College of Engineering, JNTUK, Kakinada, A.P, India. He received M. Tech degree from the same institute. He published 20 Research papers in reputed International Journals and Conferences.