Image Processing and Pattern Recognition: Fundamentals and Techniques / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $59.95
Usually ships in 1-2 business days
(Save 61%)
Other sellers (Hardcover)
  • All (10) from $59.95   
  • New (8) from $87.34   
  • Used (2) from $59.95   


A comprehensive guide to the essential principles of image processing and pattern recognition

Techniques and applications in the areas of image processing and pattern recognition are growing at an unprecedented rate. Containing the latest state-of-the-art developments in the field, Image Processing and Pattern Recognition presents clear explanations of the fundamentals as well as the most recent applications. It explains the essential principles so readers will not only be able to easily implement the algorithms and techniques, but also lead themselves to discover new problems and applications.

Unlike other books on the subject, this volume presents numerous fundamental and advanced image processing algorithms and pattern recognition techniques to illustrate the framework. Scores of graphs and examples, technical assistance, and practical tools illustrate the basic principles and help simplify the problems, allowing students as well as professionals to easily grasp even complicated theories. It also features unique coverage of the most interesting developments and updated techniques, such as image watermarking, digital steganography, document processing and classification, solar image processing and event classification, 3-D Euclidean distance transformation, shortest path planning, soft morphology, recursive morphology, regulated morphology, and sweep morphology. Additional topics include enhancement and segmentation techniques, active learning, feature extraction, neural networks, and fuzzy logic.

Featuring supplemental materials for instructors and students, Image Processing and Pattern Recognition is designed for undergraduate seniors and graduate students, engineering and scientific researchers, and professionals who work in signal processing, image processing, pattern recognition, information security, document processing, multimedia systems, and solar physics.

Read More Show Less

Product Details

  • ISBN-13: 9780470404614
  • Publisher: Wiley
  • Publication date: 5/3/2010
  • Edition number: 1
  • Pages: 552
  • Sales rank: 1,414,751
  • Product dimensions: 6.40 (w) x 9.30 (h) x 1.20 (d)

Meet the Author

Frank Y. Shih is a professor jointly appointed in the Department of Computer Science, the Department of Electrical and Computer Engineering, and the Department of Biomedical Engineering at New Jersey Institute of Technology, Newark, New Jersey. He is also Director of Computer Vision Laboratory. He is an internationally renowned scholar and serves as the Editor-in-Chief for the International Journal of Multimedia Intelligence and Security (IJMIS). Dr. Shih is currently on the editorial boards of Pattern Recognition, Pattern Recognition Letters, the International Journal of Pattern Recognition and Artificial Intelligence, Journal of Information Hiding and Multimedia Signal Processing, Recent Patents on Engineering, Recent Patents on Computer Science, The Open Nanoscience Journal, the International Journal of Internet Protocol Technology, and the Journal of Internet Technology. The recipient of several awards for distinguished research, Dr. Shih has also made significant contributions to information hiding, focusing on the security and robustness of digital steganography and watermarking.

Read More Show Less

Table of Contents



1.1 The World of Signals.

1.2 Digital Image Processing.

1.3 Elements of an Image Processing System.

Appendix 1.A Selected List of Books on Image Processing and Computer Vision from Year 2000.



2.1 Laplace Transform.

2.2 Fourier Transform.

2.3 Z-Transform.

2.4 Cosine Transform.

2.5 Wavelet Transform.


3.1 Grayscale Transformation.

3.2 Piecewise Linear Transformation.

3.3 Bit Plane Slicing.

3.4 Histogram Equalization.

3.5 Histogram Specification.

3.6 Enhancement by Arithmetic Operations.

3.7 Smoothing Filter.

3.8 Sharpening Filter.

3.9 Image Blur Types and Quality Measures.


4.1 Binary Morphology.

4.2 Opening and Closing.

4.3 Hit-or-Miss Transform.

4.4 Grayscale Morphology.

4.5 Basic Morphological Algorithms.

4.6 Morphological Filters.


5.1 Thresholding.

5.2 Object (Component) Labeling.

5.3 Locating Object Contours by the Snake Model.

5.4 Edge Operators.

5.5 Edge Linking by Adaptive Mathematical Morphology.

5.6 Automatic Seeded Region Growing.

5.7 A Top-Down Region Dividing Approach.


6.1 General Concept.

6.2 Distance Transformation by Mathematical Morphology.

6.3 Approximation of Euclidean Distance.

6.4 Decomposition of Distance Structuring Element.

6.5 The 3D Euclidean Distance.

6.6 The Acquiring Approaches.

6.7 The Deriving Approaches.

6.8 The Shortest Path Planning.

6.9 Forward and Backward Chain Codes for Motion Planning.

6.10 A Few Examples.


7.1 Run-Length Coding.

7.2 Binary Tree and Quadtree.

7.3 Contour Representation.

7.4 Skeletonization by Thinning.

7.5 Medial Axis Transformation.

7.6 Object Representation and Tolerance.


8.1 Fourier Descriptor and Moment Invariants.

8.2 Shape Number and Hierarchical Features.

8.3 Corner Detection.

8.4 Hough Transform.

8.5 Principal Component Analysis.

8.6 Linear Discriminate Analysis.

8.7 Feature Reduction in Input and Feature Spaces.


9.1 The Unsupervised Clustering Algorithm.

9.2 Bayes Classifier.

9.3 Support Vector Machine.

9.4 Neural Networks.

9.5 The Adaptive Resonance Theory Network.

9.6 Fuzzy Sets in Image Analysis.



10.1 Face and Facial Feature Extraction.

10.2 Extraction of Head and Face Boundaries and Facial Features.

10.3 Recognizing Facial Action Units.

10.4 Facial Expression Recognition in JAFFE Database.


11.1 Block Segmentation and Classification.

11.2 Rule-Based Character Recognition System.

11.3 Logo Identification.

11.4 Fuzzy Typographical Analysis for Character Preclassification.

11.5 Fuzzy Model for Character Classification.


12.1 Watermarking Classification.

12.2 Spatial Domain Watermarking.

12.3 Frequency-Domain Watermarking.

12.4 Fragile Watermark.

12.5 Robust Watermark.

12.6 Combinational Domain Digital Watermarking.


13.1 Types of Steganography.

13.2 Applications of Steganography.

13.3 Embedding Security and Imperceptibility.

13.4 Examples of Steganography Software.

13.5 Genetic Algorithm-Based Steganography.


14.1 Automatic Extraction of Filaments.

14.2 Solar Flare Detection.

14.3 Solar Corona Mass Ejection Detection.


Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)