Detection of Camouflaged Objects Using Convolutional Neural Network

Authors

  • Khandave Vaishali Ramdas Research Scholar, MET’s Institute of Engineering Nashik, India, Savitribai Phule Pune University, Pune
  • Shyamrao Gumaste Professor, MET’s Institute of Engineering Nashik, India Savitriba iPhule Pune University, Pune

Keywords:

Camouflage detection, decamouflaging

Abstract

The goal of camouflage is to blend a foreground object's texture into the background image frame’s texture. Camouflage detection methods, also known as decamouflaging methods, are typically used to locate foreground objects that are concealed in the background image. One of the key uses of machine vision in this field is the identification of camouflaged objects in photographs for both military and non-military applications. The camouflage detection technique put forth in this study can be utilized to find one or more target objects in camouflaged pictures. In this study, a neural network is employed to recognize the item in the image of camouflage. Images with naturally occurring and man-made camouflaged objects are used in experiments. Naturally camouflaged objects are equivalent to animals and artificially, that is, man-made camouflaged objects are equivalent to people in the actual world. The performance of the proposed technique is validated using precision and recall.

Downloads

Download data is not yet available.

References

Meirav Galun, Eitan Sharon, Ronen Basri, Achi Brandt, “Texture Segmentation by Multiscale Aggregation of Filter Responses and Shape Elements”, Proceedings of the Ninth IEEE International Conference on Computer Vision (ICCV’03), 2003 IEEE

Sable, N.P., Rathod, V.U. (2023). Rethinking Blockchain and Machine Learning for Resource-Constrained WSN. In: Neustein, A., Mahalle, P.N., Joshi, P., Shinde, G.R. (eds) AI, IoT, Big Data and Cloud Computing for Industry 4.0. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-29713-7_17.

Nagappa U. Bhajantri and P Nagabhusan, “Camouflage Defect Identification: A Novel Approach”, 9th International Conference on Information Technology (ICIT'06)0-7695-2635-7/06 2006 IEEE

V. U. Rathod and S. V. Gumaste, “Role of Deep Learning in Mobile Ad-hoc Networks”, IJRITCC, vol. 10, no. 2s, pp. 237–246, Dec. 2022.

I. Huerta, D. Rowe, M. Mozerov, and J. Gonzalez, “Improving Background Subtraction Based on a Casuistry of Color-Motion Segmentation Problems”, IbPRIA '07 Proceedings of the 3rd Iberian conference on Pattern Recognition and Image Analysis, Part II Pages 475 - 482 Springer-Verlag Berlin, Heidelberg 2007

N. P. Sable, V. U. Rathod, R. Sable and G. R. Shinde, "The Secure E-Wallet Powered by Blockchain and Distributed Ledger Technology," 2022 IEEE Pune Section International Conference (PuneCon), Pune, India, 2022, pp. 1-5, doi: 10.1109/PuneCon55413.2022.10014893.

P. Sengottuvelan, Amitabh Wahi, A. Shanmugam, “Performance of Decamouflaging Through Exploratory Image Analysis”, ICETET 2008 IEEE.

Hongxing Guo, Yaling Dou, Ting Tian, Jingli Zhou, Shegsheng Yu, “ A Robust Foreground Segmentation Method by Temporal Averaging Multiple Video Frames”, ICALIP 2008 IEEE

P. Siricharon, S. Aramvith, T.H. Chalidabhongse and S. Siddhichai, “Robust Outdoor Human Segmentation based on Color- based Statistics Approach and Edge Combination”, 978-1-4244-6878-2/10 2010 IEEE

R. E. Ch.Kavitha, B.Prabhakara Rao, A.Govardhan, “An Efficient Content Based Image Retrieval Using Color and Texture Of Image Sub blocks”, International Journal of Engineering Science and Technology (IJEST) ISSN: 0975-5462 Vol. 3 No. 2 Feb 2011

Zhou Liu, Kaiqi Huang and Tieniu Tan, “Foreground Object Detection Using Top-down Information Based on EM Framework”, IEEE Transactions on Image Processing 2011

Song Liming and Geng Weidong, “A new camouflage Texture Evaluation Method Based on WSSIM and Nature Image Features Multimedia Technology (ICMT)”, International Conference Page(s): 1 – 4 Cited by 1 IEEE 2010

Yuxin Pan, Yiwang Chen, Qiang Fu, Ping Zhang, and Xin Xu, “Study on the Camouflaged Target Detection Method Based on 3D Convexity”, Modern Applied science, Vol 5, No 4, 2011 Canadian Center of science and education

Jianqin Yin Yanbin Han Wendi Hou Jinping Li, “Detection of the Mobile Object with Camouflage Color under Dynamic Background Based on Optical Flow”, Advanced in control Engineering and Information Science, Elsevier 2011

V. U. Rathod and S. V. Gumaste, "Role of Routing Protocol in Mobile Ad-Hoc Network for Performance of Mobility Models," 2023 IEEE 8th International Conference for Convergence in Technology (I2CT), Lonavla, India, 2023, pp. 1-6, doi: 10.1109/I2CT57861.2023.10126390.

Sujit K Singh ,Chitra A Dhawale and Sanjay Misra, “Survey of Object Detection Methods in Camouflaged Image”, 2013 International Conference on Electronic Engineering and Computer Science, IERI Procedia 4 ( 2013 ) 351 – 357, doi: 10.1016/j.ieri.2013.11.050

Trung-Nghia Le, Tam V. Nguyen, Zhongliang Nie, Minh-Triet Tran, Akihiro Sugimoto, “Anabranch network for camouflaged object segmentation”, Computer Vision and Image Understanding 184 (2019), 45–56

Ajeet Ram Pathak, Manjusha Pandey, Siddharth Rautaray, “Application of Deep Learning for Object Detection”, International Conference on Computational Intelligence and Data Science (ICCIDS 2018), Procedia Computer Science 132 (2018), 1706–1717

N. P. Sable, V. U. Rathod, P. N. Mahalle and D. R. Birari, "A Multiple Stage Deep Learning Model for NID in MANETs," 2022 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 2022, pp. 1-6, doi: 10.1109/ESCI53509.2022.9758191.

Mohana, HV Ravish Aradhya, “Object Detection and Tracking using Deep Learning and Artificial Intelligence for Video Surveillance Applications”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 10, No. 12, 2019

Rathod, V.U. and Gumaste, S.V., 2022. Role of Neural Network in Mobile Ad Hoc Networks for Mobility Prediction. International Journal of Communication Networks and Information Security, 14(1s), pp.153-166.

Mr. Abhijeet Tanaji Khot, Mr. Chetan J. Awati, Ms. Sonam S. Kharade, “Image Transmutation in Reversible Manner for Camouflage Image”, Third International Conference on Computing, Communication, Control And Automation (ICCUBEA, 2017 IEEE

Shuai Li, Dinei Florencio, Yaqin Zhao, Chris Cook, Wanqing Li, “Foreground Detection In Camouflaged Scenes”, ICIP, 2017 IEEE

N. P. Sable, M. D. Salunke, V. U. Rathod and P. Dhotre, "Network for Cross-Disease Attention to the Severity of Diabetic Macular Edema and Joint Retinopathy," 2022 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON), Bangalore, India, 2022, pp. 1-7, doi: 10.1109/SMARTGENCON56628.2022.10083936.

N. P. Sable, V. U. Rathod, P. N. Mahalle, and P. N. Railkar, “An Efficient and Reliable Data Transmission Service using Network Coding Algorithms in Peer-to-Peer Network”, IJRITCC, vol. 10, no. 1s, pp. 144–154, Dec. 2022.

Vijay U. Rathod* & Shyamrao V. Gumaste, “Effect Of Deep Channel To Improve Performance On Mobile Ad-Hoc Networks”, J. Optoelectron. Laser, vol. 41, no. 7, pp. 754–756, Jul. 2022.

Heng Yao, Xiaokai Liu, Zhenjun Tang, Yu-Chen Hu, Chuan Qin, “An Improved Image Camouflage Technique Using Color Difference Channel Transformation and Optimal Prediction-Error Expansion”, Volume 6, 2018

Przemysław Skurowski, Paweł Kasprowski, “Evaluation of Saliency Maps in a Hard Case – Images of Camouflaged Animals”, International Conference on Image Processing, Applications and Systems (IPAS), 2018 IEEE

Piyush K. Sharma, Adrienne Raglin, “Image-Audio Encoding for Information Camouflage and Improving Malware Pattern Analysis”, 17th IEEE International Conference on Machine Learning and Applications, 2018

N. P. Sable, R. Sonkamble, V. U. Rathod, S. Shirke, J. Y. Deshmukh, and G. T. Chavan, “Web3 Chain Authentication and Authorization Security Standard (CAA)”, IJRITCC, vol. 11, no. 5, pp. 70–76, May 2023.

Mr. Kaustubh Patil, Promod Kakade. (2014). Self-Sustained Debacle Repression Using Zig-Bee Communication. International Journal of New Practices in Management and Engineering, 3(04), 05 - 10. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/32

G, A. ., K, S. ., S, B. ., M, B. ., & M, P. . (2023). Power Consumption and Carbon Emission Equivalent for Virtualized Resources – An Analysis: Virtual Machine and Container Analysis for Greener Data Center. International Journal on Recent and Innovation Trends in Computing and Communication, 11(1), 110–116. https://doi.org/10.17762/ijritcc.v11i1.6057

Dhingra, M., Dhabliya, D., Dubey, M. K., Gupta, A., & Reddy, D. H. (2022). A review on comparison of machine learning algorithms for text classification. Paper presented at the Proceedings of 5th International Conference on Contemporary Computing and Informatics, IC3I 2022, 1818-1823. doi:10.1109/IC3I56241.2022.10072502 Retrieved from www.scopus.com

Downloads

Published

16.08.2023

How to Cite

Ramdas, K. V. ., & Gumaste, S. . (2023). Detection of Camouflaged Objects Using Convolutional Neural Network. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 798–810. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3334

Issue

Section

Research Article