IEVC2017 
  The 5th IIEEJ International Workshop on Image Electronics and Visual Computing
                FPT Complex / FPT City Da Nang ,   Da Nang, Vietnam  /  Feb.28-Mar.3, 2017
 
 
  Home
 |  About  |  Introduction of the IIEEJ  |  Call for Papers  |  Sponsors  |  Paper Submission  |  Registration  
   
  Keynote Speech  |  Program  |  Presentation  |  Workshop Committee  |  Venue  |  Accomodation and Tours  
 

October 20/2017 06:46     

Keynote Speech


1.  `` Recent Advances in Computer Vision for Detecting and Counting Objects in traffic video''
Prof. LE Thanh Sach
Department of Computer Science, Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology

Abstract:
Traffic is an essential aspect of modern society. As people crowd into huge cities over time, traffic grows to be more difficult to control. Intelligent surveillance systems have been developed to ease this growing concern. One of the most common tasks assigned to these systems is analyzing or retrieving useful information such as vehicle count or density. Clearly, many approaches have been proposed to tackle the problem, but computer vision usually remains as an intuitive choice. Apart from the cheaper and stronger hardware, the reasons computer vision is chosen mostly come from recent advances in the field itself.
Object counting methods using computer vision can be grouped into two categories: indirect and direct. For indirect approach, locations of object are usually unknown upon counting. Generally, methods follow this approach compromise location information in exchange for speed and counting accuracy. In contrast, direct methods involve finding boundaries or locations of objects. They can be slower but the information they provide are very useful for advanced applications such as tracking or accident detection. Each approach comes with its own strengths and weaknesses, one needs to find the optimal solution to integrate either of them, or both, into their surveillance system.
Over the years, a multitude of methods have been proposed in the literature using a wide range of approaches, from texture analysis to deep learning. Recently, state-of-the-art methods have achieved a steep rise in performance that has never been seen before. They will be discussed here as well as the reasons for why they work better and how they are readily to be integrated in real traffic systems. Additionally, insight into remaining problems will also be provided as they are meaningful in shaping future research interests of the community.
 
 
2.  ``An Overview of Medical Image Processing''
Prof. PHAM The Bao
Faculty of Mathematics and Computer Sciences, University of Science, Vietnam

Abstract:
Nowadays medical images play an important role in clinical diagnosis, therapy of doctor and researching etc. The overall objective of medical imaging is to acquire useful information about physiological processes or organs of the body by using external or internal sources of energy that can be in the form of radiation, magnetic or electric fields, or acoustic energy. Medical imaging not only provides useful information for diagnosis but also serves to assist in planning and monitoring the treatment of malignant disease. With the development of computer science and image processing technology medical imaging has significantly influenced medical field. This study gives an overview of the medical image processing and repository techniques appeared in the literature. We also provide an overview of most of the popular imaging modalities currently in clinical use.

 
 
3.  ``A Study of Easy Search Method of illegally Copy Image Using Correlation Coefficient''
Prof. Hideo Kuroda
FPT University

Abstract:
Due to the remarkable popularization of mobile phones with built-in high-function camera and the speedup of the network, creation of content on personal basis and uploading and downloading of created contents are performed frequently. In such a situation, the content of others can also be seen freely. As a result, infringement of copyright such as illegal copying occurs frequently irrespective of the presence or absence of malice. Therefore, countermeasures against copyright infringement are extremely important. One of the countermeasures is a digital watermark. In the digital watermarking method, the rights holder registers his own copyright information into the certificate authority, and embeds the copyright information in own content in an invisible form. Then, copyright is asserted by extracting own copyright information from currently distributed images. Generally, complicated processing is used for embedding / extracting copyright information. On the other hand, image compression such as JPEG or MPEG is performed from the viewpoint of reducing the image transmission speed and compressing the file storage memory amount. In these, the pixel value changes by quantization and the high frequency component compression. In addition, geometric processing such as enlargement / reduction and rotation of images, decorative processing such as border decoration may also be performed. As described above, the types of attacks on images are extremely varied, and it is extremely difficult for the copyright holder to identify and extract their own copyright information from a large amount of images subjected to various kinds of attacks. In joint research by FPT University, Nagasaki University, and Kanazawa University, we propose a candidate image retrieval method for illegal copies without any digital watermarking technology. By this, the copyright holder using own digital watermarking technique may only check a quite small number of illegal copy candidate images identified by pre-searching. The proposed method by the universities is simple and robust for various attacked images.

 

Copyright (c) IIEEJ   All rights reserved.     Site by Mei Kodama.