Detection of cracked digitized paintings and manuscripts based on threshold techniques
Ancient paintings are cultural heritages that requireextensive and intricate preservation undertakings. With the passage of time, paintings can be damaged, and common deteriorations found in the ancient paintings include cracking. Cracks can be caused by many factors, such as aging, drying, and mec...
| Main Authors: | abdulwahab, Nawafil, Taha Alshaikhli, Imad Fakhri, Hassan, Raini, Ismail, Amelia Ritahani |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
American Scientific Publishers
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/76755/ http://irep.iium.edu.my/76755/12/76755_Detection%20of%20Cracked%20Digitized%20Paintings_article%20%20for%20myra.pdf http://irep.iium.edu.my/76755/7/76755_Detection%20of%20cracked%20digitized%20paintings%20and%20manuscripts%20based%20on%20threshold%20techniques_Scopus.pdf |
Similar Items
Detection and restoration of cracked digitized paintings and
manuscripts using image processing
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2018)
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2018)
Detection and restoration of cracked digitized paintings and
manuscripts using image processing - a survey
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017)
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
The use of genetic algorithm in improving medical image segmentation techniques
by: Hassan, Raini, et al.
Published: (2011)
by: Hassan, Raini, et al.
Published: (2011)
A new fragile digital watermarking technique for a PDF digital Holy Quran
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Online feature selection based on input significance analysis (ISA) for evolving connectionist systems (ECos)
by: Hassan, Raini, et al.
Published: (2017)
by: Hassan, Raini, et al.
Published: (2017)
The use of genetic algorithm in autonomous robot navigation
by: Hassan, Raini, et al.
Published: (2011)
by: Hassan, Raini, et al.
Published: (2011)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
A new algorithm for human face detection using skin color tone
by: Zangana, Hewa Majeed, et al.
Published: (2013)
by: Zangana, Hewa Majeed, et al.
Published: (2013)
Image enhancement background for high damage Malay manuscripts using adaptive threshold binarization
by: Yahya, Sitti Rachmawati, et al.
Published: (2018)
by: Yahya, Sitti Rachmawati, et al.
Published: (2018)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Digital Paleography: Using the Digital
Representation of Jawi Manuscripts to Support
Paleographic Analysis
by: Mohd Sanusi, Azmi, et al.
Published: (2011)
by: Mohd Sanusi, Azmi, et al.
Published: (2011)
Application of Contrast Enhancement Bilateral Closing Tophat Otsu Thresholding Technique on Crack Images
by: K. S., Sim, et al.
Published: (2008)
by: K. S., Sim, et al.
Published: (2008)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
Preventive and curative personality profiling based on EEG, ERP, and big five personality traits: a literature review
by: Saffiera, Cut Amalia, et al.
Published: (2020)
by: Saffiera, Cut Amalia, et al.
Published: (2020)
A scientific review of soft-computing techniques and methods
for stock market prediction
by: Islam, Muhammad Rabiul, et al.
Published: (2018)
by: Islam, Muhammad Rabiul, et al.
Published: (2018)
Old Jawi manuscript: Digital recognition / Zaidi Razak
by: Zaidi, Razak
Published: (2016)
by: Zaidi, Razak
Published: (2016)
Shamir’s threshold scheme
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Designing a smart city in Kuwait: an initial study
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
Historical and scientific analysis of Iranian illuminated manuscripts and miniature paintings
by: Barkeshli, Mandana
Published: (2009)
by: Barkeshli, Mandana
Published: (2009)
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
Analysis of confidentiality algorithms in different mobile generations
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
Statistical analysis of the eSTREAM competition winners
by: Mohamed Eljadi, Fardous, et al.
Published: (2016)
by: Mohamed Eljadi, Fardous, et al.
Published: (2016)
Mobile technology generations and cryptographic algorithms: analysis study
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
Similar Items
-
Detection and restoration of cracked digitized paintings and
manuscripts using image processing
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2018) -
Detection and restoration of cracked digitized paintings and
manuscripts using image processing - a survey
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017) -
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017) -
The use of genetic algorithm in improving medical image segmentation techniques
by: Hassan, Raini, et al.
Published: (2011) -
A new fragile digital watermarking technique for a PDF digital Holy Quran
by: Alahmad, Mohammad, et al.
Published: (2013)