Abstract
This paper presents a method based on contour let transform for the purpose of art authentication. The sample digital images from the different artist are converted to the gray scale images. The background patches from the gray scale images are extracted. The extracted patches are transformed using Contourelet transform and modeled using Hidden Markov Tree (HMT). The fisher distance information is calculated to measure for stylistic similarity between the brushwork of the artist. The result obtained is analyzed to determine the authenticity of the paintings. In this method we have analyzed different current existing solutions determine their limitations and propose a new hybrid method that can overcome those limitations. It is tested on the sample of twenty images of the paintings, consisting of the paintings from the Van Gog and other artist separated as the Van Gog and Non Van Gog paintings.
Original language | English |
---|---|
Title of host publication | 2016 7th International conference on information and communication systems, ICICS 2016 |
Place of Publication | United States |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 213-216 |
Number of pages | 4 |
ISBN (Electronic) | 9781467386142 |
DOIs | |
Publication status | Published - 23 May 2016 |
Event | 7th International Conference on Information and Communication Systems, ICICS 2016 - Jordan University of Science and Technology, Irbid, Jordan Duration: 05 Apr 2016 → 07 Apr 2016 https://web.archive.org/web/20160305231301/http://www.icics.info/icics2016/ (conference website) http://toc.proceedings.com/30459webtoc.pdf (proceedings TOC) https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7468594 (full conference proceedings) |
Conference
Conference | 7th International Conference on Information and Communication Systems, ICICS 2016 |
---|---|
Country/Territory | Jordan |
City | Irbid |
Period | 05/04/16 → 07/04/16 |
Other | The International Conference on Information and Communication Systems (ICICS 2016) is a forum for scientists, engineers, and practitioners to present their latest research results, ideas, developments, and applications in all areas of Computer and Information Sciences. The topics that will be covered in the ICICS 2016 include, but are not limited to: Artificial Intelligence, Mobile Computing, Networking, Information Security and Cryptography, Intrusion Detection and Computer Forensics, Web Content Mining, Bioinformatics and IT Applications, Database Technology, Systems Integration, Information Systems Analysis and Specification, Communications, and Human-Computer Interaction. |
Internet address |
|