Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Theoretical Solution for Identifying and Creating Digital Camouflage Images by Two Scale Decomposition

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 106 - Number 5
Year of Publication: 2014
Authors:
Tushar C. Muley
Sanjay S. Gharde
10.5120/18514-9599

Tushar C Muley and Sanjay S Gharde. Article: Theoretical Solution for Identifying and Creating Digital Camouflage Images by Two Scale Decomposition. International Journal of Computer Applications 106(5):8-13, November 2014. Full text available. BibTeX

@article{key:article,
	author = {Tushar C. Muley and Sanjay S. Gharde},
	title = {Article: Theoretical Solution for Identifying and Creating Digital Camouflage Images by Two Scale Decomposition},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {106},
	number = {5},
	pages = {8-13},
	month = {November},
	note = {Full text available}
}

Abstract

Camouflage is the mixture of resources, design or information for camouflage, either by making animals or objects tough to see or by hiding them. Camouflage follows human perception instinct to create digital camouflage images and complies with the physical creation procedure of the artist. The very first job of proposed system is creation of camouflaged image and then extraction of foreground object and background image from a created camouflaged image. After performing survey and analysis of various existing techniques for identification and creation of digital camouflaged image, a proposed solution is introduced for creation and identification of digital camouflage image by using two scale decomposition technique and threshold adjustment phenomenon for visually pleasing camouflage images and then extraction of foreground object and background image from a camouflaged image.

References

  • H. -K. Chu, W. -H. Hsu, N. J. Mitra, D. Cohen-Or, T. -T. Wong, and T. -Y. Lee, "Camouflage images," ACM Transactions on Graphics, vol. 29, no. 4, pp. 51:1-51:8, 2010.
  • J. H. Elder and R. M. Goldberg, "Image editing in the contour domain," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 23, pp. 291-296, 1998.
  • J. Lopez-Moreno, J. Jimenez, S. Hadap, K. Anjyo, E. Reinhard, and D. Gutierrez, "Non-photorealistic, depth-based image editing," Computers and Graphics In press, 2011.
  • A. Oliva, A. Torralba, and P. G. Schyns, "Hybrid Images," ACM Transactions on Graphics, vol. 25, no. 3, pp. 527-532, 2006.
  • J. Kim and F. Pellacini, "Jigsaw image mosaics," ACM Transactions on Graphics, vol. 21, no. 3, pp. 657-664, 2002.
  • J. -C. Yoon, I. -K. Lee, and H. Kang, "A hidden-picture puzzles generator," Computer Graphics Forum, vol. 27, no. 7, pp. 1869- 1877, 2008.
  • N. J. Mitra, H. -K. Chu, T. -Y. Lee, L. Wolf, H. Yeshurun, and D. Cohen-Or, "Emerging images," ACM Transactions on Graphics, vol. 28, no. 5, pp. 163:1-163:8, 2009.
  • T. -P. WU, C. -W. FU, S. -K. YEUNG, J. JIA, and C. -K. TANG, "Modeling and rendering of impossible figures," ACM Transactions on Graphics, vol. 29, no. 2, pp. 13:1-13:15, 2010.
  • D. Pavic, U. Ceumern, and L. Kobbelt, "Gizmos: Genuine image mosaics with adaptive tiling," Computer Graphics Forum, vol. 28, no. 8, pp. 2244-2254, 2009.
  • J. Jia, J. Sun, C. -K. Tang, and H. -Y. Shum, "Drag-and-drop pasting," ACM Transactions on Graphics, vol. 25, no. 3, pp. 631-637, 2006.
  • T. Chen, Ming-Ming, C. Ping, T. A. Shamir, and S. -M. Hu, "Sketch2photo: Internet image montage," p. 1124:1124:10, 2008.
  • Z. Farbman, G. Hoffer, Y. Lipman, D. Cohen-Or, and D. Lischinski, "Coordinates for instant image cloning," ACM Transactions on Graphics, vol. 28, no. 3, pp. 67:1-67:9, 2009.
  • M. W. Tao, M. K. Johnson, and S. Paris, "Error tolerant image compositing," Europian Conference on Computer Vision, 2010.
  • K. Sunkavalli, M. K. Johnson, W. Matusik, and H. Pfister, "Multi- scale image harmonization," ACM Transactions on Graphics, vol. 29, no. 4, pp. 125:1-125:10, 2010.
  • M. Ding and R. -F. Tong, "Content-aware copying and pasting in images," The Visual Computer, vol. 26, no. 6-8, pp. 721-729, 2010.
  • TONG Q. , ZHANG S. -H. ,HU S. -M. ,MARTIN R. R. :Hidden images. In NPAR '11: Proceedings of the ACM SIGGRAPH/Eurographics Symposium on Non-Photorealistic Animationand Rendering (2011), pp. 27–34. 1, 2, 7.
  • E. S. L. Gastal and M. M. Oliveira, "Domain transform for edge- aware image and video processing," ACM Transactions on Graphics, vol. 30, no. 4, pp. 69:1-69:12, 2011.
  • A. Orzan, A. Bousseau, P. Barla, and J. Thollot, "Structure preserving manipulation of photographs," International Symposium on Non- Photorealistic Animation and Rendering(NPAR), 2007.