Free Essay

Lab 4: Edge Detection in Images

In:

Submitted By kek93kek
Words 2189
Pages 9
Lab 4: Edge Detection in Images

A. Background Information

Edge detection is a common, but very important method for analyzing images. It can be used to help identify objects in a scene or features of an object. It is widely used in biometrics security applications to identify facial features or fingerprints. The example below shows the process of edge detection applied to a picture of a bike next to a brick wall. As can be seen, edge detection easily shows the outline of the bike, the bricks in the wall, and even the writing on the bike.

| | Edge Detection Example: Original Image (left) and Edge Detected Image (right) | So how does edge detection work? The first step in understanding the process is to understand what an edge is in an image. If you were to look at the values of in an image along a single row or column, you would see something that looks like this:
Bricks
Bricks
Grout Lines
Grout Lines

This is actually the graph of the pixel values from the first row of the original picture shown above. What you are seeing here are the individual dark colored bricks that make up the top border of the image. The bricks themselves are the lower and relatively flat sections, while the lighter colored grout between the bricks is represented by the sharp peaks. With this understanding, we can see that an edge (a sharp change in color) is represented by a large change in the pixel value.

In order to locate the areas that have these drastic changes in color, we need to apply a mathematical operation to the image. In this case, since we want to know the change in the color values, we will be using a derivative, since a derivative is large when there is a drastic change (an edge) and small when there is little change (not an edge).

So far, we’ve only been applying derivatives to 1-dimensional data using the 2 point and 3 point derivative estimates. So how do we apply a derivative to a 2-dimensional image? The process is essentially the same. However, in this case, we will be applying the 3 point derivative estimate to three rows (or columns) and adding the results together to determine whether there is an edge at the location in the image. The next section describes the process by which we will apply the derivative to an image.

B. Understand the Process

The process we will use to perform edge detection is what is called 2-D filtering, but in essence, we will be applying the 3 point derivative estimate over a 3x3 section of our image to check and see if there is an edge present. The filter that we will be using is called a Prewitt Filter, and looks like this:

Prewittx=-101-101-101 Prewitty=-1-1-1000111

The filter is applied as follows: 1) Access a 3x3 portion of the image 2) Multiply each value in the filter by the corresponding value from the image 3) Add up the results of the multiplications and take the absolute value (this is done because all image values are positive, but we want to find any large change, be it from low to high or high to low pixel values) 4) Store the resulting value into a new image at the location of the center of the portion from the original image

Assume we have the image portion shown below, which was taken from rows 4-6 and columns 3-5 of the full image. If we were to look at what is happening mathematically when applying the Prewittx filter, we would calculate a value for NewImage(5,4) as follows:

image4:6,3:5=507515052741545176149

P=507515052741545176149.*-101-101-101 = -500150-520154-510149

NewImage5,4=|Sum of Values in P|=150-50+154-52+149-51
This is the same thing as the sum of three 3 point derivative estimates (with 2Δt = 1). To apply this filter to the whole image, we simply pull out a different part of the image and apply the filter, storing the result into the new image. The one thing to note is that the filter cannot be applied to border of the image, since you cannot pull out a 3x3 matrix centered along the border. Typically, the border of an edge-detected image is simply left black (value = 0).
Assume that we have an image as shown below. Complete the table by applying the edge detection algorithm described above, using the Prewittx filter and the Prewitty filter.

Original Image: 0 | 0 | 255 | 0 | 0 | 0 | 0 | 255 | 0 | 0 | 0 | 0 | 255 | 0 | 0 | 0 | 0 | 255 | 0 | 0 | 0 | 0 | 255 | 0 | 0 |

Prewittx: 0 | 0 | 0 | 0 | 0 | 0 | 765 | 0 | 765 | 0 | 0 | 765 | 0 | 765 | 0 | 0 | 765 | 0 | 765 | 0 | 0 | 0 | 0 | 0 | 0 |

Prewitty: 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |

What do you notice about the values when you use the Prewittx and Prewitty filters? What effect do you think this will have when you apply this to an actual image? The Prewittx filters the image to be black apart from some parts where it is at a different value whereas Prewitty turns everything black |

C. Implementation of Edge Detection

Write a script that implements edge detection using the Prewittx filter. Your script should follow the procedure outlined below:

1. Load an image into MATLAB using the imread command. 2. Check to see whether the image is a color image or a grayscale image by checking the number of planes along the third dimension (i.e. 1 plane is grayscale, 3 planes is color). 3. If the image is a color image, convert it to grayscale using the conversion shown below where X is the original color image and Pic is the resulting grayscale image.

Pic = 0.299*X(:,:,1) + 0.587*X(:,:,2) + 0.114*X(:,:,3);

4. Display the grayscale image using the imshow command. 5. Convert Pic to a double. 6. Create a new array filled with zeros that is the same size as your image. 7. Apply the Prewittx filter to the image as follows: a. Pull out a section of the original image. b. Multiply each value in the section of the image by the corresponding values in the filter. c. Add all of the values together. d. Take the absolute value of the final value. e. Store the final value into your new image array at the center of the section you just filtered. f. Repeat for all possible sections of the original image (remember, you cannot do this for the border values!). 8. Scale the new image so that the minimum value is 0 and the maximum value is 255. 9. Display your edge-detected image using the imshow command. You will first need to convert the image back into uint8 format using the uint8 command.

Once you have your script written and working, select one of the two provided images. The Arm_Fracture.jpg image is an x-ray image of a broken arm. As you can see, this person has a transverse fracture of the radius. It is fairly easy to identify where the fracture is, but it would be very difficult for a computer to identify this fracture in an automated way. Applying edge detection will help to show the outline of the bones and make it easier for a computer to automatically locate the fracture, making the job easier for the physician.

The Schockwave.jpg image shows the pattern produced by an object moving at a high rate of speed through a medium. As you can see from the image, there is quite a complicated pattern produced as the object moves, but there is also some noise in the picture (horizontal repeating lines) that might make it difficult to analyze. Again, by applying edge detection, we can emphasize the pattern produced by the object as it travels through the medium and remove some of the unwanted noise.

Run your script using your selected image and paste a copy of your results below:

Paste your script file here:

clear all; clc; Z = imread('Arm_Fracture.jpg');
Pic = 0.299*Z(:,:,1) + 0.587*Z(:,:,2) + 0.114*Z(:,:,3); figure(1); imshow(Pic);
NewPic = double(Pic);
PicSize = size(NewPic);
NewImageX = zeros(PicSize);
NewImageY = zeros(PicSize);
X = [-1 0 1; -1 0 1; -1 0 1];
Y = [-1 -1 -1; 0 0 0; 1 1 1]; for row = 1:PicSize(1)-2 for col = 1:PicSize(2)-2 Px = NewPic(row:row+2,col:col+2).*X; Py = NewPic(row:row+2,col:col+2).*Y; NewImageX(row,col) = abs(sum(sum(Px))); NewImageY(row,col) = abs(sum(sum(Py))); end end NewImageX = (255)/max(max(NewImageX))*NewImageX;
NewImageY = (255)/max(max(NewImageY))*NewImageY;
NewImageX = uint8(NewImageX);
NewImageY = uint8(NewImageY); figure(2); imshow(NewImageX); figure(3); imshow(NewImageY);

Looking at the image you produced, which types of edges were you able to find? White Edges |

What do you think you should do in order to find other edges in your image? Use different filters |

D. Improved Edge Detection

Modify your script file so that it applies three more filters to the image and adds the results together as follows:

1. Add code to create three additional arrays filled with zeros that are the same size as your original image. 2. Add code to apply the Prewitty filter shown previously and two diagonal Prewitt filters, shown below:
Prewittd1=-1-10-101011 Prewittd2=011-101-1-10 3. Add code to scale the three new images so that the minimum value in each image is 0 and the maximum value is 255. 4. Add code to display your new edge-detected images using the imshow command. You can either display all four images in separate figures or use subplot to display them all in one window. Don’t forget to convert to uint8 first. 5. Add code to add each of the four edge-detected images together. 6. Add code to scale the summed image so that it again within the range of 0 to 255. 7. Add code to display the summed image using the imshow command.

Run your new script using your selected image and paste a copy of your results for the four individual and the final summed edge-detected images below:

Paste your improved script file here:

clear all; clc; Z = imread('Arm_Fracture.jpg');
Pic = 0.299*Z(:,:,1) + 0.587*Z(:,:,2) + 0.114*Z(:,:,3); figure(1); imshow(Pic);
NewPic = double(Pic);
PicSize = size(NewPic);
NewImageX = zeros(PicSize);
NewImageY = zeros(PicSize);
NewImageD1 = zeros(PicSize);
NewImageD2 = zeros(PicSize);
X = [-1 0 1; -1 0 1; -1 0 1];
Y = [-1 -1 -1; 0 0 0; 1 1 1];
D1 = [-1 -1 0; -1 0 1; 0 1 1];
D2 = [0 1 1; -1 0 1; -1 -1 0]; for row = 1:PicSize(1)-2 for col = 1:PicSize(2)-2 Px = NewPic(row:row+2,col:col+2).*X; Py = NewPic(row:row+2,col:col+2).*Y; PD1 = NewPic(row:row+2,col:col+2).*D1; PD2 = NewPic(row:row+2,col:col+2).*D2; NewImageX(row,col) = abs(sum(sum(Px))); NewImageY(row,col) = abs(sum(sum(Py))); NewImageD1(row,col) = abs(sum(sum(PD1))); NewImageD2(row,col) = abs(sum(sum(PD2))); end end NewImageX = (255)/max(max(NewImageX))*NewImageX;
NewImageY = (255)/max(max(NewImageY))*NewImageY;
NewImageD1 = (255)/max(max(NewImageD1))*NewImageD1;
NewImageD2 = (255)/max(max(NewImageD2))*NewImageD2;
NewImageX = uint8(NewImageX);
NewImageY = uint8(NewImageY);
NewImageD1 = uint8(NewImageD1);
NewImageD2 = uint8(NewImageD2); figure(2); subplot(2,2,1); imshow(NewImageX); subplot(2,2,2); imshow(NewImageY); subplot(2,2,3); imshow(NewImageD1); subplot(2,2,4); imshow(NewImageD2);

Looking at the results of the four individual Prewitt filters, what do you notice about the types of edges found? What is it about these filters that allow them to find these types of edges? The types of edges found are more like the surroundings or the borders of the element in the picture |

How does the summed image compare to the individual images?

|

If you chose the Arm_Fracture.jpg image and you are designing a computer system to identify the fracture automatically, what procedure might you use now that you have the edge-detected image?

OR

If you chose the Shockwave.jpg image, now that you have the edge-detected image, what features might you want to investigate if you are trying to analyze the pattern produced?

|

E. For Fun!

As was mentioned in the introduction, one of the applications for edge detection is to identify facial features for the purposes of biometric security and facial recognition. Take a selfie and run the image through your edge detection code.

Paste a copy of your original (grayscale) and edge-detected selfie below:

F. To be turned in: * You will need to upload this word document with all requested tables, questions, and figures included and the m-file for your final script.

Similar Documents

Premium Essay

Advertisement Detection 2

...finest audio feature to spot advertisement border for the video along background music. Taking this process further it is extremely important to detect the border, novel method is used to serve this purpose, this method is generally used for detection of logo video frames this is important to indicate the beginning and finish of the advertisement at the borders detected by audio. Investigations display that merging audio and visual traces is an effective way to detect advertisements. INTRODUCTION Recognition based algorithms play important role in detecting advertisements in the personal recordings of a program on TV. Many algorithms are used to detect the commercials. For many consumers facilities such as recording of television program have proved highly convenient, this can be achieved through combination of technologies such as set top box and digital media storage, this facility is getting highly popular because of decrease in costs (Sadlier et al, 2002). In this framework, audio visual investigation gears that aid the user to accomplish the huge amount of data play important role for such recording devices (Lienhart, Kuhmnch, & Effelsberg, 1996). There are many other benefits of this system also can be seen such as detection of TV advertisements and some other investigation tools. For example, if the perspective of the end user is taken into the account, it...

Words: 2191 - Pages: 9

Free Essay

Robotics

...that fasten it to the airframe. The resulting strain, exacerbated by corrosion, drives the growth of initially microscopic cracks. To avoid catastrophe, aircraft are inspected periodically for cracks and corrosion. The inspection technology employed is ~90% naked-eye vision. We have developed and demonstrated robotic deployment of both remote enhanced 3D-stereoscopic video instrumentation for visual inspection and remote eddy current probes for instrumented inspection. This article describes the aircraft skin inspection application, how robotic deployment may alleviate human performance problems and workplace hazards during inspection, practical robotic deployment systems, their instrumentation packages, and our progress toward developing image enhancement and understanding techniques that could help aircraft inspectors to find cracks, corrosion, and other visually detectable damage. KEYWORDS: automated robot visual NDI inspection enhanced remote stereoscopic multiresolution 1. INTRODUCTION Pressurization and de-pressurization of an airplane during each takeoff and landing cycle causes its body to expand and contract like an inflating and deflating balloon. Cycling thus induces stress fatigue at the rivets that hold the aircraft surface skin to its frame, resulting in the growth of radial cracks. On April 28, 1988 Aloha Airlines flight 243, flying at 24,000 feet near Maui, abruptly lost a section of its upper fuselage skin from the floorline on the left side to the windowline...

Words: 10694 - Pages: 43

Free Essay

Self Navigating Bot

...award of Degree of Bachelor of Technology in Electronics and Communication Engineering from National Institute of Technology, Calicut. Dr. S. M. Sameer (Project Advisor) Assistant Professor Dr. P S Sathidevi Professor & Head April 2012 NIT Calicut i ACKNOWLEDGEMENT We would like to thank Dr. S. M. Sameer, Assistant Professor, Department of Electronics and Communication Engineering for his guidance and inspiration in helping us complete this project. We are also grateful to Dr. P S Sathidevi, Professor and Head, Department of Electronics and Communication Engineering, for providing us with this opportunity to work on our project and also for permitting access to the required facilities. We would also like to thank the lab staff for their technical support and providing us assistance. Arjun Surendran Deepak Venga Nandu Raj Priyanka G Das Sanjay George ii Abstract Autonomous navigation of a mobile robot in outdoor...

Words: 13508 - Pages: 55

Free Essay

Self-Driving Mobile Platform

...learning. Billions of dollars are assigned to create self-driving car. Google lead the movement with their Google Car created from their lab Google X, followed by Tesla who manage to quickly catch up with their big fleet of cars driving on the roads at each instant. Uber just created a research center for this work, GM partner with Lyft, George Hotz, an americain car made his own home-made simple self-driving car and even Nvidea created a demo. In this sense, this work is not really original or innovative. We however thought this work was not yet popularized to students projects. This works is also interesting because it’s not ’achieved’ even by the current state-of-the-art, there are still lots of works to be done. II. T HEORY will be very hard to distinguish between them and not useful for a long-term solution. Additionally we would encounter a major problem when defining the color and shape of a car. So instead we design an machine-learning algorithm which uses a similar approach like Google and Tesla does. By training our own classifier for each element in traffic signs, which requires most of the computation, it allows our mobile platform to detect traffic signs and differentiate between them. Once the parameters are available, we can computationally cheap detect our classified objects. The result of our very fast image processing allows us to integrate the method...

Words: 3460 - Pages: 14

Free Essay

A Fusion Approach for EffiCient Human Skin Detection

...for Efficient Human Skin Detection Wei Ren Tan, Chee Seng Chan, Member, IEEE, Pratheepan Yogarajah, and Joan Condell Abstract—A reliable human skin detection method that is adaptable to different human skin colors and illumination conditions is essential for better human skin segmentation. Even though different human skin-color detection solutions have been successfully applied, they are prone to false skin detection and are not able to cope with the variety of human skin colors across different ethnic. Moreover, existing methods require high computational cost. In this paper, we propose a novel human skin detection approach that combines a smoothed 2-D histogram and Gaussian model, for automatic human skin detection in color image(s). In our approach, an eye detector is used to refine the skin model for a specific person. The proposed approach reduces computational costs as no training is required, and it improves the accuracy of skin detection despite wide variation in ethnicity and illumination. To the best of our knowledge, this is the first method to employ fusion strategy for this purpose. Qualitative and quantitative results on three standard public datasets and a comparison with state-of-the-art methods have shown the effectiveness and robustness of the proposed approach. Index Terms—Color space, dynamic threshold, fusion strategy, skin detection. I. INTRODUCTION W ITH the progress of information society today, images have become more and more...

Words: 5432 - Pages: 22

Free Essay

Digital Image Processing

...Digital Image Processing: PIKS Inside, Third Edition. William K. Pratt Copyright © 2001 John Wiley & Sons, Inc. ISBNs: 0-471-37407-5 (Hardback); 0-471-22132-5 (Electronic) DIGITAL IMAGE PROCESSING DIGITAL IMAGE PROCESSING PIKS Inside Third Edition WILLIAM K. PRATT PixelSoft, Inc. Los Altos, California A Wiley-Interscience Publication JOHN WILEY & SONS, INC. New York • Chichester • Weinheim • Brisbane • Singapore • Toronto Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or all capital letters. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. Copyright  2001 by John Wiley and Sons, Inc., New York. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic or mechanical, including uploading, downloading, printing, decompiling, recording or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ @ WILEY.COM. This publication is designed...

Words: 173795 - Pages: 696

Premium Essay

Hai, How Are U

...UNIVERSITY OF KERALA B. TECH. DEGREE COURSE 2008 ADMISSION REGULATIONS and I  VIII SEMESTERS SCHEME AND SYLLABUS of COMPUTER SCIENCE AND ENGINEERING B.Tech Comp. Sc. & Engg., University of Kerala 2 UNIVERSITY OF KERALA B.Tech Degree Course – 2008 Scheme REGULATIONS 1. Conditions for Admission Candidates for admission to the B.Tech degree course shall be required to have passed the Higher Secondary Examination, Kerala or 12th Standard V.H.S.E., C.B.S.E., I.S.C. or any examination accepted by the university as equivalent thereto obtaining not less than 50% in Mathematics and 50% in Mathematics, Physics and Chemistry/ Bio- technology/ Computer Science/ Biology put together, or a diploma in Engineering awarded by the Board of Technical Education, Kerala or an examination recognized as equivalent thereto after undergoing an institutional course of at least three years securing a minimum of 50 % marks in the final diploma examination subject to the usual concessions allowed for backward classes and other communities as specified from time to time. 2. Duration of the course i) The course for the B.Tech Degree shall extend over a period of four academic years comprising of eight semesters. The first and second semester shall be combined and each semester from third semester onwards shall cover the groups of subjects as given in the curriculum and scheme of examination ii) Each semester shall ordinarily comprise of not less than 400 working periods each of 60 minutes duration...

Words: 34195 - Pages: 137

Free Essay

Brain Controled Wheel Chair

...Brain-Controlled Wheelchairs A Robotic Architecture By Tom Carlson and José del R. Millán © photodisc & techpool studios I ndependent mobility is central to being able to perform activities of daily living by oneself. However, power wheelchairs are not an option for many people who, due to severe motor disabilities, are unable to use conventional controls. For some of these people, noninvasive brain– computer interfaces (BCIs) offer a promising solution to this interaction problem. Brain-Actuated Wheelchairs Millions of people around the world suffer from mobility impairments, with hundreds of thousands of them relying on power wheelchairs for activities of daily living [1]. However, many patients are not prescribed power wheelchairs either because they are physically unable to control the chair using a conventional interface or because they are deemed incapable of safely operating them [2]. Consequently, it has been estimated that between 1.4 and 2.1 million wheelchair users might benefit from a smart-powered wheelchair if it were able to provide a degree of additional assistance to the driver [3]. Digital Object Identifier 10.1109/MRA.2012.2229936 Date of publication: 8 March 2013 In our research with brain-actuated wheelchairs, we target a population that is or will become unable to use conventional interfaces due to severe motor disabilities. Noninvasive BCIs offer a promising new interaction modality that does not rely on a fully functional peripheral nervous...

Words: 7037 - Pages: 29

Free Essay

Software

...JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. TECH (REAL TIME SYSTEMS) COURSE STRUCTURE AND SYLLABUS I YEAR I SEMESTER Code Group Subject L P Credits Advanced Computer Architecture 3 0 3 Advanced Micro Controllers 3 0 3 Fundamentals of Real Time Systems 3 0 3 Design & Development of Real Time Systems 3 0 3 Elective -I Digital Control Systems Distributed Operating Systems Cloud Computing 3 0 3 Elective -II Digital Systems Design Fault Tolerant Systems Advanced Computer Networks 3 0 3 Lab Micro Processors and Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel...

Words: 3183 - Pages: 13

Free Essay

Tp Tp Tp Tp

...The Future of Cardiovascular Diagnostics THE MARKET, TRENDS & FUTURE DIRECTIONS Extracted on: 20 Apr 2011 Reference Code: BI00021-008 Publication Date: 02 Mar 2010 Publisher: Datamonitor © Datamonitor This content is a licensed product, no part of this publication shall be reproduced, sold, modified or stored in a retrieval system or transmitted in any form by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of Datamonitor. The information in this document has been extracted from published research by a registered user of the Datamonitor360 platform. Datamonitor shall not be responsible for any loss of original context and for any changes made to information following its extraction. All information was current at the time of extraction although the original content may have been subsequently updated. Please refer back to the website http://360.datamonitor.com/ to view the most recent content and the original source of the information. To the maximum extent permitted by applicable law we exclude all representations, warranties and conditions relating to the facts of all publications. At time of publication no guarantee of accuracy or suitability, whether express or implied, shall attach to this publication (including, without limitation, any warranties implied by law of satisfactory quality, fitness for purpose and/or the use of reasonable care and skill). Please note that the findings, conclusions and recommendations...

Words: 9155 - Pages: 37

Premium Essay

Wgu Itsecurity Capstone

...Michael Wakefield Degree Program: BS- IT Security Mentor Name: Dave Huff Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Summary 3 Review of Other Work 13 Rationale and Systems Analysis 19 Goals and Objectives 25 Project Deliverables 28 Project Plan and Timelines 30 Project Development…………………………………………………………………………………………………………………………….31 Additional Deliverables………………………………………………………………………………………………………………………….35 Conclusion…………………………………………………………………………………………………………………………………………….35 References 37 Appendix 1: Competency Matrix 38 Appendix 2: Cisco ASA 5555-X Firewall Specifications…………………………………………………………….40 Appendix 3: ABC Inc. Project Schedule…………………………………………………………………………………….44 Appendix 4: High-Availability Design Screenshots……………………………………………………………………45 Appendix 5: Screenshots of inside to outside access; outside to DMZ access; NAT rules and configurations; and performance graphs and performance results….........................................51 Capstone Report Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: In February 2013, Cisco released a study predicting that $14.4 trillion of value (net profit) will be at stake...

Words: 9337 - Pages: 38

Premium Essay

Create

...The Design Space of Metamorphic Malware Andrew Walenstein†, Rachit Mathur‡, Mohamed R. Chouchane†, and Arun Lakhotia† University of Louisiana at Lafayette, Lafayette, LA, U.S.A. McAfee Avert Labs, Beaverton, OR, U.S.A. arun@louisiana.edu rachit_mathur@avertlabs.com mohamed@louisiana.edu walenste@ieee.org ‡ † Abstract: A design space is presented for metamorphic malware. Metamorphic malware is the class of malicious self-replicating programs that are able to transform their own code when replicating. The raison d'etre for metamorphism is to evade recognition by malware scanners; the transformations are meant to defeat analysis and decrease the number of constant patterns that may be used for recognition. Unlike prior treatments, the design space is organized according to the malware author's goals, options, and implications of design choice. The advantage of this design space structure is that it highlights forces acting on the malware author, which should help predict future developments in metamorphic engines and thus enable a proactive defence response from the community. In addition, the analysis provides effective nomenclature for classifying and comparing malware and scanners. Keywords: Metamorphic Malware, Virus Scanner. 1. Introduction Metamorphism is the ability of malware to transform its code. This ability was first introduced in viruses and was later used by worms, Trojans, and other malware. There now exist several metamorphic engines—programs that implement...

Words: 5825 - Pages: 24

Free Essay

Computer Vision

...Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com. Editor: Mike Loukides Production Editor: Rachel Monaghan Production Services: Newgen Publishing and Data Services Cover Designer: Karen Montgomery Interior Designer: David Futato Illustrator: Robert Romano Printing History: September 2008: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Learning OpenCV, the image of a giant peacock moth, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. This book uses Repkover,™ a durable and flexible lay-flat binding. ISBN: 978-0-596-51613-0 [M] Contents Preface . . . . . . . . . . . . . . . . . . ...

Words: 150684 - Pages: 603

Free Essay

Idrivesa

... |C | | |English |2+1 |- |4 | | |Mathematics - I |3+1 |- |6 | | |Mathematical Methods |3+1 |- |6 | | |Applied Physics |2+1 |- |4 | | |C Programming and Data Structures |3+1 |- |6 | | |Network Analysis |2+1 |- |4 | | |Electronic Devices and Circuits |3+1 |- |6 | | |Engineering Drawing |- |3 |4 | | |Computer Programming Lab. |- |3 |4 | | |IT Workshop |- |3 |4 | | |Electronic Devices and Circuits Lab |- |3 |4 | | |English Language Communication Skills Lab. |- |3 |4 | | |Total |25 |15 |56 ...

Words: 26947 - Pages: 108

Premium Essay

New Medical Devices in the Us

...New Medical Devices in the US August 13 2010 Table of Contents 1. Introduction……………………………………………………………………………………………………………………………………2 2. Background and Framework……………………………………………………………………………………………………………4 2.1 Priority Medical Devices for the Netherlands…..……………………………………………………………………4 2.2 The US Vision: From see and treat to predict and prevent……………………………………………………6 2.3 Conclusions…………………………………………………………………………………………………………………………..7 3. Medical device sector in the US………………………………………………………………………………………………………8 3.1 Economic Impact…..………………………………………………………………………………………………………………8 3.2 The Sector by State…..…………………………………………………………………………………………………………10 3.3 Key Institutes: Patent Applications in the Cluster Areas…..………………………………………………….13 3.4 Conclusions…..…………………………………………………………………………………………………………………….20 4. Turning research into novel medical devices………………………………………………………………………………….22 4.1 The Medical Device Development Process…..……………………………………………………………………..22 4.2 CIMIT: A Structure for Medical Device Innovation…..………………………………………………………….23 4.3 Stanford Biodesign: Innovation as a Discipline…..………………………………………………………………..26 4.4 Conclusions and Recommendations…..……………………………………………………………………………….28 5. Summary and Conclusions…………………………………………………………………………………………………………….30 6. Acknowledgements……………………………………………………………………………………………………………………….32 7. References…………………………………………………………………………………………………………………………………….33 Appendices A1 Selection of Key Institutes A2 Results Patent Analysis A3 Research...

Words: 34578 - Pages: 139