Automatic Detection of Pectoral Muscle Using Average Gradient and Shape Based Feature
نویسندگان
چکیده
منابع مشابه
Shape-based Automatic Detection of Pectoral Muscle Boundary in Mammograms
The detection of the pectoral muscle boundary in the medio-lateral oblique view of mammograms is essential to improving the computer-aided diagnosis of breast cancer. In this study, a shape-based detection method is proposed for accurately extracting the boundary of the pectoral muscle in mammograms. A shape-based enhancement mask is applied to the mammogram and the initial boundary is then def...
متن کاملAutomatic Detection of Pectoral Muscle Region for Computer-Aided Diagnosis Using MIAS Mammograms
The computer-aided detection (CAD) systems have been developed to help radiologists with the early detection of breast cancer. This system provides objective and accurate information to reduce the misdiagnosis of the disease. In mammography, the pectoral muscle region is used as an index to compare the symmetry between the left and right images in the mediolateral oblique (MLO) view. The pector...
متن کاملextremal region detection guided by maxima of gradient magnitude
a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...
Automatic Identification and Elimination of Pectoral Muscle in Digital Mammograms
Computer aided detection/diagnosis aims at assisting radiologist in the analysis of digital mammograms. Digital mammogram has emerged as the most popular screening technique for early detection of breast cancer and other abnormalities in human breast tissue. The pectoral muscle represents a predominant density region in most mammograms and can affect/bias the results of image processing methods...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Digital Imaging
سال: 2011
ISSN: 0897-1889,1618-727X
DOI: 10.1007/s10278-011-9421-y