Detection of Camouflaged Objects Using Convolutional Neural Network
Keywords:
Camouflage detection, decamouflagingAbstract
The goal of camouflage is to blend a foreground object's texture into the background image frame’s texture. Camouflage detection methods, also known as decamouflaging methods, are typically used to locate foreground objects that are concealed in the background image. One of the key uses of machine vision in this field is the identification of camouflaged objects in photographs for both military and non-military applications. The camouflage detection technique put forth in this study can be utilized to find one or more target objects in camouflaged pictures. In this study, a neural network is employed to recognize the item in the image of camouflage. Images with naturally occurring and man-made camouflaged objects are used in experiments. Naturally camouflaged objects are equivalent to animals and artificially, that is, man-made camouflaged objects are equivalent to people in the actual world. The performance of the proposed technique is validated using precision and recall.
Downloads
References
Meirav Galun, Eitan Sharon, Ronen Basri, Achi Brandt, “Texture Segmentation by Multiscale Aggregation of Filter Responses and Shape Elements”, Proceedings of the Ninth IEEE International Conference on Computer Vision (ICCV’03), 2003 IEEE
Sable, N.P., Rathod, V.U. (2023). Rethinking Blockchain and Machine Learning for Resource-Constrained WSN. In: Neustein, A., Mahalle, P.N., Joshi, P., Shinde, G.R. (eds) AI, IoT, Big Data and Cloud Computing for Industry 4.0. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-29713-7_17.
Nagappa U. Bhajantri and P Nagabhusan, “Camouflage Defect Identification: A Novel Approach”, 9th International Conference on Information Technology (ICIT'06)0-7695-2635-7/06 2006 IEEE
V. U. Rathod and S. V. Gumaste, “Role of Deep Learning in Mobile Ad-hoc Networks”, IJRITCC, vol. 10, no. 2s, pp. 237–246, Dec. 2022.
I. Huerta, D. Rowe, M. Mozerov, and J. Gonzalez, “Improving Background Subtraction Based on a Casuistry of Color-Motion Segmentation Problems”, IbPRIA '07 Proceedings of the 3rd Iberian conference on Pattern Recognition and Image Analysis, Part II Pages 475 - 482 Springer-Verlag Berlin, Heidelberg 2007
N. P. Sable, V. U. Rathod, R. Sable and G. R. Shinde, "The Secure E-Wallet Powered by Blockchain and Distributed Ledger Technology," 2022 IEEE Pune Section International Conference (PuneCon), Pune, India, 2022, pp. 1-5, doi: 10.1109/PuneCon55413.2022.10014893.
P. Sengottuvelan, Amitabh Wahi, A. Shanmugam, “Performance of Decamouflaging Through Exploratory Image Analysis”, ICETET 2008 IEEE.
Hongxing Guo, Yaling Dou, Ting Tian, Jingli Zhou, Shegsheng Yu, “ A Robust Foreground Segmentation Method by Temporal Averaging Multiple Video Frames”, ICALIP 2008 IEEE
P. Siricharon, S. Aramvith, T.H. Chalidabhongse and S. Siddhichai, “Robust Outdoor Human Segmentation based on Color- based Statistics Approach and Edge Combination”, 978-1-4244-6878-2/10 2010 IEEE
R. E. Ch.Kavitha, B.Prabhakara Rao, A.Govardhan, “An Efficient Content Based Image Retrieval Using Color and Texture Of Image Sub blocks”, International Journal of Engineering Science and Technology (IJEST) ISSN: 0975-5462 Vol. 3 No. 2 Feb 2011
Zhou Liu, Kaiqi Huang and Tieniu Tan, “Foreground Object Detection Using Top-down Information Based on EM Framework”, IEEE Transactions on Image Processing 2011
Song Liming and Geng Weidong, “A new camouflage Texture Evaluation Method Based on WSSIM and Nature Image Features Multimedia Technology (ICMT)”, International Conference Page(s): 1 – 4 Cited by 1 IEEE 2010
Yuxin Pan, Yiwang Chen, Qiang Fu, Ping Zhang, and Xin Xu, “Study on the Camouflaged Target Detection Method Based on 3D Convexity”, Modern Applied science, Vol 5, No 4, 2011 Canadian Center of science and education
Jianqin Yin Yanbin Han Wendi Hou Jinping Li, “Detection of the Mobile Object with Camouflage Color under Dynamic Background Based on Optical Flow”, Advanced in control Engineering and Information Science, Elsevier 2011
V. U. Rathod and S. V. Gumaste, "Role of Routing Protocol in Mobile Ad-Hoc Network for Performance of Mobility Models," 2023 IEEE 8th International Conference for Convergence in Technology (I2CT), Lonavla, India, 2023, pp. 1-6, doi: 10.1109/I2CT57861.2023.10126390.
Sujit K Singh ,Chitra A Dhawale and Sanjay Misra, “Survey of Object Detection Methods in Camouflaged Image”, 2013 International Conference on Electronic Engineering and Computer Science, IERI Procedia 4 ( 2013 ) 351 – 357, doi: 10.1016/j.ieri.2013.11.050
Trung-Nghia Le, Tam V. Nguyen, Zhongliang Nie, Minh-Triet Tran, Akihiro Sugimoto, “Anabranch network for camouflaged object segmentation”, Computer Vision and Image Understanding 184 (2019), 45–56
Ajeet Ram Pathak, Manjusha Pandey, Siddharth Rautaray, “Application of Deep Learning for Object Detection”, International Conference on Computational Intelligence and Data Science (ICCIDS 2018), Procedia Computer Science 132 (2018), 1706–1717
N. P. Sable, V. U. Rathod, P. N. Mahalle and D. R. Birari, "A Multiple Stage Deep Learning Model for NID in MANETs," 2022 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 2022, pp. 1-6, doi: 10.1109/ESCI53509.2022.9758191.
Mohana, HV Ravish Aradhya, “Object Detection and Tracking using Deep Learning and Artificial Intelligence for Video Surveillance Applications”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 10, No. 12, 2019
Rathod, V.U. and Gumaste, S.V., 2022. Role of Neural Network in Mobile Ad Hoc Networks for Mobility Prediction. International Journal of Communication Networks and Information Security, 14(1s), pp.153-166.
Mr. Abhijeet Tanaji Khot, Mr. Chetan J. Awati, Ms. Sonam S. Kharade, “Image Transmutation in Reversible Manner for Camouflage Image”, Third International Conference on Computing, Communication, Control And Automation (ICCUBEA, 2017 IEEE
Shuai Li, Dinei Florencio, Yaqin Zhao, Chris Cook, Wanqing Li, “Foreground Detection In Camouflaged Scenes”, ICIP, 2017 IEEE
N. P. Sable, M. D. Salunke, V. U. Rathod and P. Dhotre, "Network for Cross-Disease Attention to the Severity of Diabetic Macular Edema and Joint Retinopathy," 2022 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON), Bangalore, India, 2022, pp. 1-7, doi: 10.1109/SMARTGENCON56628.2022.10083936.
N. P. Sable, V. U. Rathod, P. N. Mahalle, and P. N. Railkar, “An Efficient and Reliable Data Transmission Service using Network Coding Algorithms in Peer-to-Peer Network”, IJRITCC, vol. 10, no. 1s, pp. 144–154, Dec. 2022.
Vijay U. Rathod* & Shyamrao V. Gumaste, “Effect Of Deep Channel To Improve Performance On Mobile Ad-Hoc Networks”, J. Optoelectron. Laser, vol. 41, no. 7, pp. 754–756, Jul. 2022.
Heng Yao, Xiaokai Liu, Zhenjun Tang, Yu-Chen Hu, Chuan Qin, “An Improved Image Camouflage Technique Using Color Difference Channel Transformation and Optimal Prediction-Error Expansion”, Volume 6, 2018
Przemysław Skurowski, Paweł Kasprowski, “Evaluation of Saliency Maps in a Hard Case – Images of Camouflaged Animals”, International Conference on Image Processing, Applications and Systems (IPAS), 2018 IEEE
Piyush K. Sharma, Adrienne Raglin, “Image-Audio Encoding for Information Camouflage and Improving Malware Pattern Analysis”, 17th IEEE International Conference on Machine Learning and Applications, 2018
N. P. Sable, R. Sonkamble, V. U. Rathod, S. Shirke, J. Y. Deshmukh, and G. T. Chavan, “Web3 Chain Authentication and Authorization Security Standard (CAA)”, IJRITCC, vol. 11, no. 5, pp. 70–76, May 2023.
Mr. Kaustubh Patil, Promod Kakade. (2014). Self-Sustained Debacle Repression Using Zig-Bee Communication. International Journal of New Practices in Management and Engineering, 3(04), 05 - 10. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/32
G, A. ., K, S. ., S, B. ., M, B. ., & M, P. . (2023). Power Consumption and Carbon Emission Equivalent for Virtualized Resources – An Analysis: Virtual Machine and Container Analysis for Greener Data Center. International Journal on Recent and Innovation Trends in Computing and Communication, 11(1), 110–116. https://doi.org/10.17762/ijritcc.v11i1.6057
Dhingra, M., Dhabliya, D., Dubey, M. K., Gupta, A., & Reddy, D. H. (2022). A review on comparison of machine learning algorithms for text classification. Paper presented at the Proceedings of 5th International Conference on Contemporary Computing and Informatics, IC3I 2022, 1818-1823. doi:10.1109/IC3I56241.2022.10072502 Retrieved from www.scopus.com
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.