Connected Component Analysis and Change Detection for Images

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© May to June Issue 2011 by IJCTT Journal
Volume-1 Issue-2                          
Year of Publication : 2011
Authors : Prasad S.Halgaonkar

MLA

Prasad S.Halgaonkar "Connected Component Analysis and Change Detection for Images"International Journal of Computer Trends and Technology (IJCTT),V1(2):224-227 May to June Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: Detection of the region of change in images of a particular scene or object taken at different time gap is of widespread interest due to a large number of applications in various disciplines. Some of the important applications of change detection include Video surveillance, medical diagnosis and treatment, civil infrastruct ure, underwater sensing etc. In this paper, describe d is a two - scan labeling algorithm whereby, unlike the classical approach, equivalences are processed during the first pass in order to determine the correct state of equivalence classes at each time of t he scan. This is obtained by merging classes as soon as a new equivalence is found, the data structure used to support the merging being a simple 1D array. This approach allows the check for a conflict to be carried out on class identifiers rather than on labels, as instead it is mandatory with the classical algorithm. It has been show that this significantly improves the efficiency of the labeling process

References-

[1] Fumiko Satoh, Takayuki Itoh, "Single Sign On Architecture W ith Dynamic Tokens," 2004 Symposium on Applications and t he Internet (SAINT`04), 2004, pp.197.
[2] Cheng Yang, Jianbo Liu, Jiayin Tian, Yichun Zhang, "Authentication Scheme and Simplified CAS in Mobile M ultimedia Broadcast," icmecg, 2009 International Conference o n Management of e - Commerce and e - Government, 2009, pp.517 - 521.
[3] J.S. Park, R. Sandhu, "Binding identities and attributes using digitally signed certificates," acsac, 16th Annual Computer Security Applications Conference (ACSAC`00), 2000, pp.120.
[4] Jeremy Goold, Mark Clement, "Improving Routing Security Using a Decentralized Public Key Distribution Algorithm," icimp, Second Inte rnational Conference on Internet Monitoring and protection (ICIMP 2007), 2007, pp.8.
[5] Fei Zhu, Qiang Lv, "ACEAC: A Novel Access Control Model for Cooperative Editing with Workflow," isecs, 2008 International Symposium on Electronic Commerc e and Security, 2008, pp.1010 - 1014.
[6] Enrique de la Hoz, Antonio García, Iván Marsá - Maestre, Miguel Ángel López - Carmona, Bernardo Alarcos, "An Infocard - Based Proposal for Unified Single Sign on," saint, 2009 Ninth Annual International Symposium on Ap plications and the Internet, 2009, pp.231 - 234.
[7] Fumiko Satoh, Takayuki Itoh, "Single Sign On Architecture W ith Dynamic Tokens," saint, 2004 Symposium on Applications and t he Internet (SAINT`04), 2004, pp.197.
[8] Wei Huang, Jinhua Xu, “M4WebGIS: A Mobile Agent - Based Middleware for WebGIS”, wcse, Second International Workshop on Computer Science and Engineering, 2009, pp.234 - 238.
[9] Fang Ying - lan, Han Bing, Li Ye - bai, "Research and Implementation of K ey Technology Based on Internet Encryptio n and Authentication," 2009 International Conference on Networking and Digital Society, 2009, vol. 1, pp.179 - 182.
[10] Yan - zhi Hu, Da - wei Ma, Xiao - fei Li, "An Improved Authentication Protocol with Less Delay for UMTS Mobile Networks," 2009 Inte rnational Conference on Networking and Digital Society, 2009, vol. 2, pp.111 - 115.

Keywordssingle sign - on ; authenticatio n; security; SS O; plug in