Special Notice
IEEE Xplore is transitioning to HTTPS on 9 April 2018. Customer access via EZproxy will require version 6 or higher with TLS 1.1 or 1.2 enabled.
Review our EZproxy Upgrade Checklist to ensure uninterrupted access.

# IET Image Processing

Includes the top 50 most frequently accessed documents for this publication according to the usage statistics for the month of

• ### License number plate recognition system using entropy-based features selection approach with SVM

Publication Year: 2018, Page(s):200 - 209
| | PDF (5272 KB)

License plate recognition (LPR) system plays a vital role in security applications which include road traffic monitoring, street activity monitoring, identification of potential threats, and so on. Numerous methods were adopted for LPR but still, there is enough space for a single standard approach which can be able to deal with all sorts of problems such as light variations, occlusion, and multi-... View full abstract»

• ### Hue preserving-based approach for underwater colour image enhancement

Publication Year: 2018, Page(s):292 - 298
| | PDF (4509 KB)

In this study, a novel underwater colour image enhancement approach based on hue preserving is presented by combining hue-saturation-intensity (HSI) and HS-value (HSV) colour models. In this study, the proposed wavelet-domain filtering (WDF) and constrained histogram stretching (CHS) algorithms are operated on HSI and HSV colour models, respectively. The degraded image is first converted from red-... View full abstract»

• ### Improved particle swarm optimisation to estimate bone age

Publication Year: 2018, Page(s):179 - 187
| | PDF (4564 KB)

This paper automatizes the process of bone age maturity assessment by applying three versions of particle swarm optimization (PSO) along with image processing methods to the left hand X-ray images. PSO versions were adopted to enhance the segmentation accuracy. The proposed method was compared to the conventional visual inspection method in terms of three segmentation criteria, classification accu... View full abstract»

• ### Efficient fingerprint matching using GPU

Publication Year: 2018, Page(s):274 - 284
| | PDF (4624 KB)

Graphical processing unit (GPU) has proven a beneficial tool in handling computationally intensive algorithms, by introducing massive parallelism in the calculations. In this study, an effective and low-cost fingerprint identification (FI) solution is proposed that can exploit the parallel computational power of GPU proficiently. It is achieved by mapping a generalised minutia neighbour-based nove... View full abstract»

• ### Model for smoothing and segmentation of texture images using $L_0$L0 norm

Publication Year: 2018, Page(s):285 - 291
| | PDF (5476 KB)

Segmentation of texture images is always a challenging problem in image processing. The authors propose a novel model for segmentation of texture images based on L0 gradient norm. The model will do smoothing of texture in image and segmentation jointly. It is well known that L0 gradient norm smooths the image and preserve the edges. Keeping this in view, the pro... View full abstract»

• ### Effective and adaptive algorithm for pepper-and-salt noise removal

Publication Year: 2017, Page(s):709 - 716
| | PDF (8537 KB)

According to the characteristic of pepper-and-salt noise, the authors first classify pixels in a polluted image into two classes: suspected noise and noise-free pixels. For a suspected noisy pixel, by counting the number of closed grey-level and noise-free pixels in a neighbourhood, one can correctly determine a noise or a noise-free pixel. Noise filtering does not process noise-free pixels. For t... View full abstract»

• ### Non-invasive detection of alcohol concentration based on photoplethysmogram signals

Publication Year: 2018, Page(s):188 - 193
| | PDF (3751 KB)

Sobriety test, which commonly uses a breathalyser for estimating blood alcohol content (BAC) from a breath sample, is commonly used to detect drunk driving. The detection often gives rise to sanitary concern and violation of human right. This research proposes a new method that employs non-invasive measurement of photoplethysmography (PPG) signal for detecting BAC of the test subject under the sob... View full abstract»

• ### Recognition of complex static hand gestures by using the wristband-based contour features

Publication Year: 2018, Page(s):80 - 87
| | PDF (4381 KB)

Recognition of complex static hand gestures is a challenging problem due to the complexity of hand gestures, which are rich in diversities because of high degrees of freedom involved by the human hand. It is more difficult especially when gestures are represented by two hands. This study proposes a framework that can recognise complex static hand gestures by using the wristband-based contour featu... View full abstract»

• ### CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection

Publication Year: 2018, Page(s):167 - 178
| | PDF (2216 KB)

With the advancement of image editing tools in today's world, the manipulation of images like cropping, cloning, resizing, etc., becomes an easy proposition and on the other end, checking or determining whether an image has been manipulated or not, becomes a great challenge. Copy-move forgery in images is the most popular tampering method in which a portion of an image is copied and pasted in some... View full abstract»

• ### Guided filter-based images fusion algorithm for CT and MRI medical images

Publication Year: 2018, Page(s):138 - 148
| | PDF (6208 KB)

A novel fusion algorithm based on guided filter (GF) for computed tomography (CT) and magnetic resonance imaging (MRI) medical images is proposed. In this algorithm: approximation coefficient and three wavelet coefficients of CT and MRI are obtained by the wavelet transform, respectively. Two weight maps are obtained by comparison of the pixel values of the two approximation coefficients. A GF is ... View full abstract»

• ### Improved partial differential equation-based enhancement for underwater images using local–global contrast operators and fuzzy homomorphic processes

Publication Year: 2017, Page(s):1059 - 1067
| | PDF (7816 KB)

This study describes improved partial differential equation (PDE)-based formulations for combined global and local contrast operators for underwater image enhancement. The algorithms remove the limitations of conventional closed-form approaches and the problem of optimal stopping time of earlier PDE-based approaches. Main features include improved simultaneous combination, augmentation and control... View full abstract»

• ### Comprehensive survey of 3D image steganography techniques

Publication Year: 2018, Page(s):1 - 10
| | PDF (2970 KB)

This study presents an overview of various three-dimensional (3D) image steganography techniques from survey point of view. The authors present taxonomy of 3D image steganography techniques and identify the recent advances in this field. Steganalysis and attacks on 3D image steganography algorithms have also been studied. 3D image steganography techniques in all the three domains: geometrical, top... View full abstract»

• ### Image compression and encryption scheme using fractal dictionary and Julia set

Publication Year: 2015, Page(s):173 - 183
| | PDF (1046 KB)

An efficient and secure environment is necessary for data transmission and storage, especially for large-column multimedia data. In this study, a novel compression-encryption scheme is presented using a fractal dictionary and Julia set. For the compression in this scheme, fractal dictionary encoding not only reduces time consumption, but also gives good quality image reconstruction. For the encryp... View full abstract»

• ### Active Canny: edge detection and recovery with open active contour models

Publication Year: 2017, Page(s):1325 - 1332
| | PDF (5362 KB)

The authors introduce an edge detection and recovery framework based on open active contour models (snakelets) to mitigate the problem of noisy or broken edges produced by classical edge detection algorithms, like Canny. The idea is to utilise the local continuity and smoothness cues provided by strong edges and grow them to recover the missing edges. This way, the strong edges are used to recover... View full abstract»

• ### Optimisation of HEVC motion estimation exploiting SAD and SSD GPU-based implementation

Publication Year: 2018, Page(s):243 - 253
| | PDF (3736 KB)

The new High-Efficiency Video Coding (HEVC) standard doubles the video compression ratio compared to the previous H.264/AVC at the same video quality and without any degradation. However, this important performance is achieved by increasing the encoder computational complexity. That's why HEVC complexity is a crucial subject. The most time consuming and the most intensive computing part of HEVC is... View full abstract»

• ### Image noise types recognition using convolutional neural network with principal components analysis

Publication Year: 2017, Page(s):1238 - 1245
| | PDF (3423 KB)

This study presents a model to effectively recognise image noise of different types and levels: impulse, Gaussian, Speckle and Poisson noise, and a mixture of multiple types of the noise. To classify image noise type, the convolutional neural network (CNN) method with backpropagation algorithm and stochastic gradient descent optimisation techniques are implemented. In order to reduce the training ... View full abstract»

• ### Image smoothing via truncated $ell _0$ℓ0 gradient regularisation

Publication Year: 2018, Page(s):226 - 234
| | PDF (5288 KB)

Edge-preserving image smoothing aims at maintaining the fundamental constituents, i.e. salient edges of a given image, while removing the noise and insignificant details in the meantime. It is often employed at the pre-processing step of many image processing tasks, including reconstruction, segmentation, recognition and three-dimensional content generation, to name just a few. Recently, a sparse ... View full abstract»

• ### Digital image watermarking method based on DCT and fractal encoding

Publication Year: 2017, Page(s):815 - 821
| | PDF (2804 KB)

With the rapid development of computer science, problems with digital products piracy and copyright dispute become more serious; therefore, it is an urgent task to find solutions for these problems. In this study, the authors' develop a digital watermarking algorithm based on a fractal encoding method and the discrete cosine transform (DCT). The proposed method combines fractal encoding method and... View full abstract»

• ### High discriminative SIFT feature and feature pair selection to improve the bag of visual words model

Publication Year: 2017, Page(s):994 - 1001
| | PDF (5646 KB)

The bag of visual words (BOW) model has been widely applied in the field of image recognition and image classification. However, all scale-invariant feature transform (SIFT) features are clustered to construct the visual words which result in a substantial loss of discriminative power for the visual words. The corresponding visual phrases will further render the generated BOW histogram sparse. In ... View full abstract»

• ### Combined imaging matching method of side scan sonar images with prior position knowledge

Publication Year: 2018, Page(s):194 - 199
| | PDF (1736 KB)

Side scan sonar (SSS) image matching plays an important role in underwater applications, such as combining images to form wide range relief images, underwater simultaneous location and mapping, and construction of images of underwater terrain and objects. Because there are differences between the imaging mechanisms of SSS images and optical images, current matching algorithms for optical images do... View full abstract»

• ### Single image-based HDR image generation with camera response function estimation

Publication Year: 2017, Page(s):1317 - 1324
| | PDF (4436 KB)

The high performance of high dynamic range (HDR) image and the limitations of sensors impel to acquire HDR images from low dynamic range (LDR) ones. The most popular methods use multiple LDR images with different exposures of the same scene as input. However, it is difficult to have multiple exposures for most of LDR images. The authors propose a single image-based method to generate HDR image bas... View full abstract»

• ### Fast pedestrian detection and dynamic tracking for intelligent vehicles within V2V cooperative environment

Publication Year: 2017, Page(s):833 - 840
| | PDF (4129 KB)

Pedestrian detection has become one of the hottest topics in intelligent traffic system because of its potential applications in driver assistance and automatic driving. In this study, a fast pedestrian detection and dynamic tracking method within vehicle-to-vehicle (V2V) cooperative environment is proposed. A dynamic tracking-by-detection framework for real-time pedestrian detection is developed.... View full abstract»

• ### Secure chaotic dual encryption scheme for H.264/AVC video conferencing protection

Publication Year: 2018, Page(s):42 - 52
| | PDF (5410 KB)

This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. The... View full abstract»

• ### Robust hypothesis generation method using binary blob analysis for multi-lane detection

Publication Year: 2017, Page(s):1210 - 1218
| | PDF (6302 KB)

The vision-based lane detection is an important component of advanced driver assistance systems and it is essential for lane departure warning, lane keeping, and vehicle localisation. However, it is a challenging problem to improve the robustness of multi-lane detection due to factors, such as perspective effect, possible low visibility of lanes, and partial occlusions. To deal with these issues, ... View full abstract»

• ### Perceptual hash algorithm-based adaptive GOP selection algorithm for distributed compressive video sensing

Publication Year: 2018, Page(s):210 - 217
| | PDF (5302 KB)

Distributed compressive video sensing (DCVS) is a novel video coding technique that shifts sophisticated motion estimation and compensation from the encoder to the decoder and is suitable for resource-limited communication, namely wireless video sensor networks (WVSNs). In DCVS, key frames serve as the reference for subsequent non-key frames in a given group of pictures (GOP). However, in fast-mot... View full abstract»

• ### Lung field segmentation in chest radiographs: a historical review, current status, and expectations from deep learning

Publication Year: 2017, Page(s):937 - 952
| | PDF (3307 KB)

Lung field defines a region-of-interest in which specific radiologic signs such as septal lines, pulmonary opacities, cavities, consolidations, and lung nodules are searched by a chest radiographic computer-aided diagnostic system. Thus, its precise segmentation is extremely important. To precisely segment it, numerous methods have been developed during the last four decades. However, no exclusive... View full abstract»

• ### Small target detection based on reweighted infrared patch-image model

Publication Year: 2018, Page(s):70 - 79
| | PDF (6252 KB)

To further improve the effect of infrared small target detection, a reweighted infrared patch-image model is proposed. First, the authors point out that the nuclear norm in the infrared patch-image model could easily leave some sparse background edges in the target patch-image, leading to an inaccurate background estimation. Then, to overcome this defect, the reweighted nuclear norm is adopted to ... View full abstract»

• ### AC coefficient and K-means cuckoo optimisation algorithm-based segmentation and compression of compound images

Publication Year: 2018, Page(s):218 - 225
| | PDF (2955 KB)

Compound images are containing palletise regions including text or graphics and continuous tone images. The compression of compound images is a challenging function and which is complicated to achieve it without degrading the quality of the images. This document is mainly used to improve the compression ratio and an efficient segmentation method is created to separate the background image, text an... View full abstract»

• ### Low-complexity face recognition using contour-based binary descriptor

Publication Year: 2017, Page(s):1179 - 1187
| | PDF (5316 KB)

Face recognition has become a popular topic due to its applications in security, surveillance and so on. Current local methods such as the local binary pattern (LBP) or local derivative pattern (LDP) perform better than holistic methods since they are more stable on local changes such as misalignment, expression or occlusion, but their high computational complexity limit their applications. While ... View full abstract»

• ### Crowd counting considering network flow constraints in videos

Publication Year: 2018, Page(s):11 - 19
| | PDF (2990 KB)

The growth of the number of people in the monitoring scene may increase the probability of security threat, which makes crowd counting more and more important. Most of the existing approaches estimate the number of pedestrians within one frame, which results in inconsistent predictions in terms of time. This study, for the first time, introduces a quadratic programming (QP) model with the network ... View full abstract»

• ### Evaluation of shape descriptors for shape-based image retrieval

Publication Year: 2011, Page(s):493 - 499
Cited by:  Papers (19)  |  Patents (1)
| | PDF (333 KB)

This article presents a comparative study between scale, rotation and translation invariant descriptors for shape representation and retrieval. Since shape is one of the most widely used image feature exploited in content-based image retrieval systems, the authors studied for each descriptor, the number of coefficients needed for indexing and their retrieval performance. Specifically, the authors ... View full abstract»

• ### Anomaly detection and localisation in the crowd scenes using a block-based social force model

Publication Year: 2018, Page(s):133 - 137
| | PDF (2255 KB)

A novel approach to detect and localise anomalous events in crowed scenes by processing surveillance videos is introduced in this study. Unusual events are those that significantly differ from current dominated behaviours. The proposed approach both detects pixel-level and block-level anomalies. In pixel level, Gaussian mixture models are used to detect abnormalities. Block-level detection segment... View full abstract»

• ### Haze removal for unmanned aerial vehicle aerial video based on spatial-temporal coherence optimisation

Publication Year: 2018, Page(s):88 - 97
| | PDF (16633 KB)

Haze removal is a non-trivial work for unmanned aerial vehicle (UAV) aerial video processing, and challenges are mainly attributed to spatial-temporal coherence and computational efficiency. The authors propose a novel dehazing algorithm for hazy UAV aerial video and improve the classical dark channel prior approach with a bright region filling process to alleviate colour distortion in the recover... View full abstract»

• ### Guest Editorial: Advances in Big Data Methods for Image Processing

Publication Year: 2017, Page(s):803 - 804
| PDF (639 KB)
• ### Restoring highly corrupted images by impulse noise using radial basis functions interpolation

Publication Year: 2018, Page(s):20 - 30
| | PDF (12738 KB)

Preserving details while restoring images highly corrupted by impulsive salt and pepper noise remains a challenging problem. The authors proposed an algorithm based on radial basis functions (RBFs) interpolation which estimates the intensities of corrupted pixels by their neighbours. In this algorithm, intensity values of noisy pixels in the corrupted image are first estimated using RBFs. Next, th... View full abstract»

• ### Image decomposition and texture analysis via combined bi-dimensional Bedrosian's principles

Publication Year: 2018, Page(s):262 - 273
| | PDF (4761 KB)

Image decomposition is an important issue in image processing. The existing approaches including the bi-dimensional empirical mode decomposition (BEMD) still fail to separate monocomponents in multicomponents in many cases. To solve this problem, this study proposes a new image decomposition method based on the new derived combined bi-dimensional Bedrosian's principle that has not been reported an... View full abstract»

• ### Collaborative filtering model for enhancing fingerprint image

Publication Year: 2018, Page(s):149 - 157
| | PDF (8594 KB)

Fingerprint enhancement plays a very important role in automatic fingerprint identification system. In order to ensure reliable fingerprint identification and improve fingerprint ridge structure, a novel method based on the collaborative filtering model for fingerprint enhancement is proposed. The proposed method consists of two stages. First, the original fingerprint is pre-enhanced by using Gabo... View full abstract»

• ### Review, analysis and parameterisation of techniques for copy–move forgery detection in digital images

Publication Year: 2017, Page(s):746 - 759
| | PDF (9164 KB)

Copy-move forgery is one of the most preliminary and prevalent forms of modification attack on digital images. In this form of forgery, region(s) of an image is(are) copied and pasted onto itself, and subsequently the forged image is processed appropriately to hide the effects of forgery. State-of-the-art copy-move forgery detection techniques for digital images are primarily motivated toward find... View full abstract»

• ### Reversible data hiding scheme based on significant-bit-difference expansion

Publication Year: 2017, Page(s):1002 - 1014
| | PDF (6543 KB)

This study presents a lossless robust data hiding scheme based on significance-bit-difference expansion. The original cover image can be recovered without any distortion after the hidden data have been extracted if the stego image remains intact, on the other hand, the hidden data can be robust against unintentional changes applying to the stego image, such as image compression and sometimes unavo... View full abstract»

• ### Optimised blind image watermarking method based on firefly algorithm in DWT-QR transform domain

Publication Year: 2017, Page(s):406 - 415
| | PDF (3342 KB)

Firefly algorithm (FA) is one of the newly developed nature inspired optimisation algorithm, inspired by the flashing behaviour of fireflies that a firefly tends to be attracted towards other fireflies with higher brightness. Thus FA has two advantages: local attractions and automatic regrouping. Based on these good properties, a novel image watermarking method based on FA in discrete wavelet tran... View full abstract»

• ### Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map

Publication Year: 2018, Page(s):158 - 167
| | PDF (10404 KB)

In the literature, different types of algorithms that are organised to encrypt and decrypt images have been introduced. Some of these depend on chaotic systems where bifurcation routes to chaos exist. Those algorithms have advantages and disadvantages so far as their security level and computational speed are concerned. This study proposes a robust algorithm based on a pixel shuffling and a one-di... View full abstract»

• ### Chaos-based fast colour image encryption scheme with true random number keys from environmental noise

Publication Year: 2017, Page(s):324 - 332
| | PDF (7140 KB)

The paper proposes a chaos-based colour image encryption scheme, the highlight is that the randomly sampled noise signal is applied to serve as the initial values of a chaotic system. The 256-bit hash value of noise is transformed into the one-time initial values of the Liu system. The sequences generated by Liu system are subjected to three batteries of TestU01. Exclusive OR, the only operation, ... View full abstract»

• ### Improved BM3D denoising method

Publication Year: 2017, Page(s):1197 - 1204
| | PDF (4324 KB)

Block matching 3D denoising (BM3D) is an excellent single-image denoising method. However, it still needs to be improved for solving practical problems. In this study, the authors attempt to improve the method of BM3D. First, one of the problems of BM3D is that some of its references cannot perform self-adaption when the noise intensity of the images is changed. Therefore, they propose a method us... View full abstract»

• ### Splicing image forgery detection using textural features based on the grey level co-occurrence matrices

Publication Year: 2017, Page(s):44 - 53
| | PDF (7101 KB)

To further improve the detection rate with relatively low dimension feature vector, a novel passive splicing detection method using textural features based on the grey level co-occurrence matrices, namely TF-GLCM, is proposed in this study. In the TF-GLCM, the GLCM are calculated based on the difference block discrete cosine transform arrays to capture the textural information and the spatial rela... View full abstract»

• ### Multiscale adaptive regularisation Savitzky–Golay method for speckle noise reduction in ultrasound images

Publication Year: 2018, Page(s):105 - 112
| | PDF (5460 KB)

Speckle noise is one of the major artefacts in ultrasound images. The denoising faces the trade-off between noise suppression and structural preservation. In this study, multiscale adaptive regularisation Savitzky-Golay (MARSG) method, the new filter for removing speckle noise, is proposed. The proposed method combines the benefit of the multiscale analysis and the outstanding noise removing capab... View full abstract»

• ### Logarithmical hopping encoding: a low computational complexity algorithm for image compression

Publication Year: 2015, Page(s):643 - 651
| | PDF (865 KB)

LHE (logarithmical hopping encoding) is a computationally efficient image compression algorithm that exploits the Weber-Fechner law to encode the error between colour component predictions and the actual value of such components. More concretely, for each pixel, luminance and chrominance predictions are calculated as a function of the surrounding pixels and then the error between the predictions a... View full abstract»

• ### Diagnosis of diabetic retinopathy by employing image processing technique to detect exudates in retinal images

Publication Year: 2014, Page(s):601 - 609
Cited by:  Papers (5)
| | PDF (294 KB)

Diabetic retinopathy (DR) is a microvascular complication of long-term diabetes and it is the major cause of visual impairment because of changes in blood vessels of the retina. Major vision loss because of DR is highly preventable with regular screening and timely intervention at the earlier stages. The presence of exudates is one of the primitive signs of DR and the detection of these exudates i... View full abstract»

• ### Iterative weighted sparse representation for X-ray cardiovascular angiogram image denoising over learned dictionary

Publication Year: 2018, Page(s):254 - 261
| | PDF (4044 KB)

Non-local self-similar patch-based denoising techniques have been viewed as the most popular denoising approaches in computer vision. This study has proposed a novel iterative weighted sparse representation (IWSR) scheme for X-ray cardiovascular angiogram image denoising. The main procedures of this scheme include four parts. First, a maximum a posterior (MAP) distribution by the Bayes' theory is ... View full abstract»

• ### Image denoising using generalised Cauchy filter

Publication Year: 2017, Page(s):767 - 776
| | PDF (7517 KB)

In many image processing analysis, it is important to significantly reduce the noise level. This study aims at introducing an efficient method for this purpose based on generalised Cauchy (GC) distribution. Therefore, some characteristics of GC distribution is considered. In particular, the characteristic function of a GC distribution is derived by using the theory of positive definite densities a... View full abstract»

• ### Robust multi-feature visual tracking via multi-task kernel-based sparse learning

Publication Year: 2017, Page(s):1172 - 1178
| | PDF (4287 KB)

Feature selection and fusion is of crucial importance in multi-feature visual tracking. This study proposes a multi-task kernel-based sparse learning method for multi-feature visual tracking. The proposed sparse learning method can discriminate the reliable and unreliable features for optimal multi-feature fusion through using a Fisher discrimination criterion-based multi-objective model to adapti... View full abstract»

## Aims & Scope

The range of topics covered by IET Image Processing includes areas related to the generation, processing and communication of visual information.

Full Aims & Scope

## Meet Our Editors

Publisher
IET Research Journals
iet_ipr@theiet.org