際際滷

際際滷Share a Scribd company logo
Faculty of Electronics Engineering (ECE),UNSIET, VBSPU
PROJECT ROGRESS REVISED REPORT- I
PROJECTTITLE: Color Detection & Segmentation based Invisible Cloak
AREAOF WORK:Digital Image Processing
TYPE OF MODEL:Software [Python 3.11 (64bit)]
 MODULES USED IN PYTHON: Open CV, NumPy, PIL, Socket, Tkinter
PROJECTAIM & OBJECTIVES:
AIM: This project aims to creates a magical experience by using an Image Processing
technique called Color Detection & Segmentation resulting in false sense of Invisibility in the
frame.
PROJECT OBJECTIVES: The main objective of the invisibility cloak project is to develop
a cloak or material that can render objects invisible to the human eye.
Objective#1: Initializing, Capturing & storing the background frame through a digital camera.
Objective#2: Detect the cloth using Color Detection by choosing appropriate HSV color space.
Objective#3: Segment out the colored cloth by generating a mask.
Objective#4: Applying Mask on frame & Combine mask frames together.
PROPOSED DESIGN METHODOLOGY: Overall, the Proposed Design
methodology involves capturing images, processing them using Image Processing operations
and testing the Invisibility Cloak in real-time using digital web camera. Proposed Design is
depicted in the Fig.1.
PROGRESS IN WORK: During this course of time Objective#1, Objective# 2 and
Objective#3 are completed & Objective#4 is under progress as detailed below,
Faculty of Electronics Engineering (ECE),UNSIET, VBSPU
a) We need to capture the background image of the scene without the object you want to hide.
This can be done using a camera or by selecting an image of the background.
b) Using OpenCV, generate a mask that will separate the object from the background. This
can be done by applying image thresholding, (segmentation) that will allow you to isolate
the object.
c) Once we have generated a mask, you can apply image processing techniques to the object
such as morphological transformations. This will make the object appear invisible.
d) Once the processing is complete, test the invisibility cloak in real-time. This can be done
using a webcam.
e) Redefine the Design:Make any necessary modifications to the design to improve its
overall performance, such as implementing on GUI for smooth interface.
PROPOSED DESIGN EVALUATION METRICS
we can utilize several evaluation metrics to
measure the quality of our color detection and
segmentation techniques. We will evaluate
Accuracy & Precision for our proposed model.
Accuracy is a widely used evaluation metric,
especially in classification tasks, to assess the
overall performance of a model or system. To
measure accuracy, you compare the number of
correct predictions made by your system to the
total number of predictions made. Here's the
formula for calculating accuracy:
Accuracy = (Number of Correct Predictions) /
(Total Number of Predictions)
Precision measures the proportion of correctly
detected colors among all detected colors,
indicating how precise our system is in identifying
the person and background colors. Calculate the
true positives (TP), which are the colors correctly
detected as belonging to the person's clothing &
calculate the false positives (FP), which are the
colors incorrectly detected as belonging to the
person's clothing.
Precision = TP / (TP + FP)
Segment out the defined
colored part bygenerating
mask & applying it on frame
Capture & Storebackground
frame using Image Acquisition
by Store a single frame before
startingthe infinite loop.
Generatethe finaloutput to
create a magical effect by
combining frames together, &
remove the unnecessarynoise
from masks.
Detect the definedcolor using
color detection & segmentation
algorithm
Using HSV Model
Faculty of Electronics Engineering (ECE),UNSIET, VBSPU
COMPARATIVE ANALYSIS
FUNCTIONALITYOF THE SYSTEM
Correct Predictions Total Processed Frame Accuracy Precision
85 100 0.85 0.83
98 100 0.98 0.96
89 100 0.89 0.86
93 100 0.93 0.91
81 100 0.81 0.82
93 100 0.93 0.92
Choose Webcam:
Stream Web Cam:
If you want to connect with System Webcam (Inbuilt or Connected Directly To
System)
0 for your inbuilt webcam in system and goes like 1,2,3.... according to webcam
connected.
1 for webcam connected externally to your system.
To connect to CCTV, Android Camera or to any other camera having IP Address
IP Address: IP Address of Your Camera (Example: 192.168.43.1)
Port: Port of Connection (Example: 1111)
Refresh: To Refresh the page to show valid options (always refresh when you change the
source)
Connect: To Connect to Camera
Change
Background:
Show
Background:
To Change The background (This Background is used to create the invisibility)
To Show Current using Background
Calibrate To Set HSV Values
(Keep in Mind: The White Part In calibrating window will become invisible)
Start Magic: To Start the Magic (That Make You Invisible)
Stop Magic: To Stop Magic
Disconnect
Exit:
To Disconnect from current Source
To Exit the Program
Faculty of Electronics Engineering (ECE),UNSIET, VBSPU
EVALUATION REMARKS BYPROJECTCOORDINATOR(S):
PROJECTREPORTED:
NAME & SIGNATURE OF TEAM MEMBERS:
Aviral Chaurasia (195209)
Ayush Singh (195206)
Prashant Rai(195231)
(APPROVED/NOT-APPROVED)
______________________________
NAME & SIGNATURE OF PROJECT SUPERVISOR (With Date)
Mr. PC Yadav
(Assistant Professor)
Department of Electronics Engineering, UNSIET, VBSPU.
100%

More Related Content

Similar to Color Detection & Segmentation based Invisible Cloak (20)

Mirko Lucchese - Deep Image Processing
Mirko Lucchese - Deep Image ProcessingMirko Lucchese - Deep Image Processing
Mirko Lucchese - Deep Image Processing
MeetupDataScienceRoma
HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVMHANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
sipij
Handwritten Digit Recognition System based on CNN and SVM
Handwritten Digit Recognition System based on CNN and SVMHandwritten Digit Recognition System based on CNN and SVM
Handwritten Digit Recognition System based on CNN and SVM
sipij
slide-171212080528.pptx
slide-171212080528.pptxslide-171212080528.pptx
slide-171212080528.pptx
SharanrajK22MMT1003
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
AROCKIAJAYAIECW
Color Detection & Segmentation based Invisible Claok
Color Detection & Segmentation based Invisible ClaokColor Detection & Segmentation based Invisible Claok
Color Detection & Segmentation based Invisible Claok
Aviral Chaurasia
Real-Time Color Detection Using Python and OpenCV
Real-Time Color Detection Using Python and OpenCVReal-Time Color Detection Using Python and OpenCV
Real-Time Color Detection Using Python and OpenCV
IRJET Journal
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problems
PetteriTeikariPhD
ppt 20BET1024.pptx
ppt 20BET1024.pptxppt 20BET1024.pptx
ppt 20BET1024.pptx
ManeetBali
Smart Face Recognition System Analysis
Smart Face Recognition System AnalysisSmart Face Recognition System Analysis
Smart Face Recognition System Analysis
Vishal Aditya
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition
Vidyut Singhania
patil.pptx.deep fake image on ppt slide share
patil.pptx.deep fake image on ppt slide sharepatil.pptx.deep fake image on ppt slide share
patil.pptx.deep fake image on ppt slide share
nikhiltoni59
Python Project.pptx
Python Project.pptxPython Project.pptx
Python Project.pptx
TimePass720676
Makine renmesi ile G旦r端nt端 Tan脹ma | Image Recognition using Machine Learning
Makine renmesi ile G旦r端nt端 Tan脹ma | Image Recognition using Machine LearningMakine renmesi ile G旦r端nt端 Tan脹ma | Image Recognition using Machine Learning
Makine renmesi ile G旦r端nt端 Tan脹ma | Image Recognition using Machine Learning
Ali Alkan
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
cscpconf
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
csandit
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNNAutomatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
Zihao(Gerald) Zhang
Computer_Vision_ItsHistory_Advantages_and Uses.pptx
Computer_Vision_ItsHistory_Advantages_and Uses.pptxComputer_Vision_ItsHistory_Advantages_and Uses.pptx
Computer_Vision_ItsHistory_Advantages_and Uses.pptx
YashikaTanwar11
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGESA DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
PNandaSai
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
Antoinette Williams
Mirko Lucchese - Deep Image Processing
Mirko Lucchese - Deep Image ProcessingMirko Lucchese - Deep Image Processing
Mirko Lucchese - Deep Image Processing
MeetupDataScienceRoma
HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVMHANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
HANDWRITTEN DIGIT RECOGNITION SYSTEM BASED ON CNN AND SVM
sipij
Handwritten Digit Recognition System based on CNN and SVM
Handwritten Digit Recognition System based on CNN and SVMHandwritten Digit Recognition System based on CNN and SVM
Handwritten Digit Recognition System based on CNN and SVM
sipij
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
AROCKIAJAYAIECW
Color Detection & Segmentation based Invisible Claok
Color Detection & Segmentation based Invisible ClaokColor Detection & Segmentation based Invisible Claok
Color Detection & Segmentation based Invisible Claok
Aviral Chaurasia
Real-Time Color Detection Using Python and OpenCV
Real-Time Color Detection Using Python and OpenCVReal-Time Color Detection Using Python and OpenCV
Real-Time Color Detection Using Python and OpenCV
IRJET Journal
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problems
PetteriTeikariPhD
ppt 20BET1024.pptx
ppt 20BET1024.pptxppt 20BET1024.pptx
ppt 20BET1024.pptx
ManeetBali
Smart Face Recognition System Analysis
Smart Face Recognition System AnalysisSmart Face Recognition System Analysis
Smart Face Recognition System Analysis
Vishal Aditya
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition
Vidyut Singhania
patil.pptx.deep fake image on ppt slide share
patil.pptx.deep fake image on ppt slide sharepatil.pptx.deep fake image on ppt slide share
patil.pptx.deep fake image on ppt slide share
nikhiltoni59
Python Project.pptx
Python Project.pptxPython Project.pptx
Python Project.pptx
TimePass720676
Makine renmesi ile G旦r端nt端 Tan脹ma | Image Recognition using Machine Learning
Makine renmesi ile G旦r端nt端 Tan脹ma | Image Recognition using Machine LearningMakine renmesi ile G旦r端nt端 Tan脹ma | Image Recognition using Machine Learning
Makine renmesi ile G旦r端nt端 Tan脹ma | Image Recognition using Machine Learning
Ali Alkan
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
CORROSION DETECTION USING A.I. : A COMPARISON OF STANDARD COMPUTER VISION TEC...
cscpconf
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
csandit
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNNAutomatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
Automatic Detection of Window Regions in Indoor Point Clouds Using R-CNN
Zihao(Gerald) Zhang
Computer_Vision_ItsHistory_Advantages_and Uses.pptx
Computer_Vision_ItsHistory_Advantages_and Uses.pptxComputer_Vision_ItsHistory_Advantages_and Uses.pptx
Computer_Vision_ItsHistory_Advantages_and Uses.pptx
YashikaTanwar11
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGESA DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
PNandaSai
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
Image Processing In Open CV. Image Processing In Open CV. Image Processing In...
Antoinette Williams

More from Aviral Chaurasia (11)

IIIgshas shgasha shghasghagsTDM PPT.pptx
IIIgshas shgasha shghasghagsTDM PPT.pptxIIIgshas shgasha shghasghagsTDM PPT.pptx
IIIgshas shgasha shghasghagsTDM PPT.pptx
Aviral Chaurasia
Tips to Prepare Your Exams Newsletter by 際際滷sgo.pptx
Tips to Prepare Your Exams Newsletter by 際際滷sgo.pptxTips to Prepare Your Exams Newsletter by 際際滷sgo.pptx
Tips to Prepare Your Exams Newsletter by 際際滷sgo.pptx
Aviral Chaurasia
SOLAR TECH th of the day hai NOLOGY.pptx
SOLAR TECH th of the day hai NOLOGY.pptxSOLAR TECH th of the day hai NOLOGY.pptx
SOLAR TECH th of the day hai NOLOGY.pptx
Aviral Chaurasia
minor.pptx
minor.pptxminor.pptx
minor.pptx
Aviral Chaurasia
13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt
Aviral Chaurasia
13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt
Aviral Chaurasia
arun paper.pptx
arun paper.pptxarun paper.pptx
arun paper.pptx
Aviral Chaurasia
B-Tech Project.pptx
B-Tech Project.pptxB-Tech Project.pptx
B-Tech Project.pptx
Aviral Chaurasia
Lung Tumour Detection using Image Processing
 Lung Tumour Detection using Image Processing Lung Tumour Detection using Image Processing
Lung Tumour Detection using Image Processing
Aviral Chaurasia
Draw in Air | Open CV Project
Draw in Air | Open CV ProjectDraw in Air | Open CV Project
Draw in Air | Open CV Project
Aviral Chaurasia
Lung Tumour Detection using Image Processing
Lung Tumour Detection using Image Processing Lung Tumour Detection using Image Processing
Lung Tumour Detection using Image Processing
Aviral Chaurasia
IIIgshas shgasha shghasghagsTDM PPT.pptx
IIIgshas shgasha shghasghagsTDM PPT.pptxIIIgshas shgasha shghasghagsTDM PPT.pptx
IIIgshas shgasha shghasghagsTDM PPT.pptx
Aviral Chaurasia
Tips to Prepare Your Exams Newsletter by 際際滷sgo.pptx
Tips to Prepare Your Exams Newsletter by 際際滷sgo.pptxTips to Prepare Your Exams Newsletter by 際際滷sgo.pptx
Tips to Prepare Your Exams Newsletter by 際際滷sgo.pptx
Aviral Chaurasia
SOLAR TECH th of the day hai NOLOGY.pptx
SOLAR TECH th of the day hai NOLOGY.pptxSOLAR TECH th of the day hai NOLOGY.pptx
SOLAR TECH th of the day hai NOLOGY.pptx
Aviral Chaurasia
13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt
Aviral Chaurasia
13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt13_fuel_and_combustion_1.ppt
13_fuel_and_combustion_1.ppt
Aviral Chaurasia
Lung Tumour Detection using Image Processing
 Lung Tumour Detection using Image Processing Lung Tumour Detection using Image Processing
Lung Tumour Detection using Image Processing
Aviral Chaurasia
Draw in Air | Open CV Project
Draw in Air | Open CV ProjectDraw in Air | Open CV Project
Draw in Air | Open CV Project
Aviral Chaurasia
Lung Tumour Detection using Image Processing
Lung Tumour Detection using Image Processing Lung Tumour Detection using Image Processing
Lung Tumour Detection using Image Processing
Aviral Chaurasia

Recently uploaded (20)

Cloudera Partner Network Enablement Full.pdf
Cloudera Partner Network Enablement Full.pdfCloudera Partner Network Enablement Full.pdf
Cloudera Partner Network Enablement Full.pdf
Nguy畛n H畉i
Production Planning & Control and Inventory Management.pptx
Production Planning & Control and Inventory Management.pptxProduction Planning & Control and Inventory Management.pptx
Production Planning & Control and Inventory Management.pptx
VirajPasare
Distributed renewable energy in Colombia.OECD2023.pdf
Distributed renewable energy in Colombia.OECD2023.pdfDistributed renewable energy in Colombia.OECD2023.pdf
Distributed renewable energy in Colombia.OECD2023.pdf
SantiagoCardonaGallo
Knowledge-Based Agents in AI: Principles, Components, and Functionality
Knowledge-Based Agents in AI: Principles, Components, and FunctionalityKnowledge-Based Agents in AI: Principles, Components, and Functionality
Knowledge-Based Agents in AI: Principles, Components, and Functionality
Rashmi Bhat
Introduction to Forensic Research Digital Forensics
Introduction to Forensic Research Digital ForensicsIntroduction to Forensic Research Digital Forensics
Introduction to Forensic Research Digital Forensics
SaanviMisar
02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf
ruioliveira1921
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
ssuserb91a20
Telehealth technology A new horizon in health care
Telehealth technology  A new horizon in health careTelehealth technology  A new horizon in health care
Telehealth technology A new horizon in health care
Dr INBAMALAR T M
Water Industry Process Automation & Control Monthly - April 2025
Water Industry Process Automation & Control Monthly - April 2025Water Industry Process Automation & Control Monthly - April 2025
Water Industry Process Automation & Control Monthly - April 2025
Water Industry Process Automation & Control
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Priyanka Dange
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal buildingAirport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Priyanka Dange
GRAPHS AND DISCONTINUITIES POWERPOINT.pptx
GRAPHS AND DISCONTINUITIES POWERPOINT.pptxGRAPHS AND DISCONTINUITIES POWERPOINT.pptx
GRAPHS AND DISCONTINUITIES POWERPOINT.pptx
ChrisPuyoc1
Airport Components Part1 ppt.pptx-Site layout,RUNWAY,TAXIWAY,TAXILANE
Airport Components Part1 ppt.pptx-Site layout,RUNWAY,TAXIWAY,TAXILANEAirport Components Part1 ppt.pptx-Site layout,RUNWAY,TAXIWAY,TAXILANE
Airport Components Part1 ppt.pptx-Site layout,RUNWAY,TAXIWAY,TAXILANE
Priyanka Dange
Industry 4.0: Transforming Modern Manufacturing and Beyond
Industry 4.0: Transforming Modern Manufacturing and BeyondIndustry 4.0: Transforming Modern Manufacturing and Beyond
Industry 4.0: Transforming Modern Manufacturing and Beyond
GtxDriver
Hackathon-Problem-Statements-Technology-Track-with-Link.pptx
Hackathon-Problem-Statements-Technology-Track-with-Link.pptxHackathon-Problem-Statements-Technology-Track-with-Link.pptx
Hackathon-Problem-Statements-Technology-Track-with-Link.pptx
datahiverecruitment
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptxUnit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Kirankumar Jagtap
applicationof differential equation.pptx
applicationof differential equation.pptxapplicationof differential equation.pptx
applicationof differential equation.pptx
PPSTUDIES
e-health to improve the effectiveness of the Healthcare system
e-health to improve the  effectiveness of the Healthcare systeme-health to improve the  effectiveness of the Healthcare system
e-health to improve the effectiveness of the Healthcare system
Dr INBAMALAR T M
Software security: Security a Software Issue
Software security: Security a Software IssueSoftware security: Security a Software Issue
Software security: Security a Software Issue
Dr Sarika Jadhav
UHV UNIT-5 IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
UHV UNIT-5    IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...UHV UNIT-5    IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
UHV UNIT-5 IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
ariomthermal2031
Cloudera Partner Network Enablement Full.pdf
Cloudera Partner Network Enablement Full.pdfCloudera Partner Network Enablement Full.pdf
Cloudera Partner Network Enablement Full.pdf
Nguy畛n H畉i
Production Planning & Control and Inventory Management.pptx
Production Planning & Control and Inventory Management.pptxProduction Planning & Control and Inventory Management.pptx
Production Planning & Control and Inventory Management.pptx
VirajPasare
Distributed renewable energy in Colombia.OECD2023.pdf
Distributed renewable energy in Colombia.OECD2023.pdfDistributed renewable energy in Colombia.OECD2023.pdf
Distributed renewable energy in Colombia.OECD2023.pdf
SantiagoCardonaGallo
Knowledge-Based Agents in AI: Principles, Components, and Functionality
Knowledge-Based Agents in AI: Principles, Components, and FunctionalityKnowledge-Based Agents in AI: Principles, Components, and Functionality
Knowledge-Based Agents in AI: Principles, Components, and Functionality
Rashmi Bhat
Introduction to Forensic Research Digital Forensics
Introduction to Forensic Research Digital ForensicsIntroduction to Forensic Research Digital Forensics
Introduction to Forensic Research Digital Forensics
SaanviMisar
02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf
ruioliveira1921
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
ssuserb91a20
Telehealth technology A new horizon in health care
Telehealth technology  A new horizon in health careTelehealth technology  A new horizon in health care
Telehealth technology A new horizon in health care
Dr INBAMALAR T M
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Priyanka Dange
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal buildingAirport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Priyanka Dange
GRAPHS AND DISCONTINUITIES POWERPOINT.pptx
GRAPHS AND DISCONTINUITIES POWERPOINT.pptxGRAPHS AND DISCONTINUITIES POWERPOINT.pptx
GRAPHS AND DISCONTINUITIES POWERPOINT.pptx
ChrisPuyoc1
Airport Components Part1 ppt.pptx-Site layout,RUNWAY,TAXIWAY,TAXILANE
Airport Components Part1 ppt.pptx-Site layout,RUNWAY,TAXIWAY,TAXILANEAirport Components Part1 ppt.pptx-Site layout,RUNWAY,TAXIWAY,TAXILANE
Airport Components Part1 ppt.pptx-Site layout,RUNWAY,TAXIWAY,TAXILANE
Priyanka Dange
Industry 4.0: Transforming Modern Manufacturing and Beyond
Industry 4.0: Transforming Modern Manufacturing and BeyondIndustry 4.0: Transforming Modern Manufacturing and Beyond
Industry 4.0: Transforming Modern Manufacturing and Beyond
GtxDriver
Hackathon-Problem-Statements-Technology-Track-with-Link.pptx
Hackathon-Problem-Statements-Technology-Track-with-Link.pptxHackathon-Problem-Statements-Technology-Track-with-Link.pptx
Hackathon-Problem-Statements-Technology-Track-with-Link.pptx
datahiverecruitment
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptxUnit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Kirankumar Jagtap
applicationof differential equation.pptx
applicationof differential equation.pptxapplicationof differential equation.pptx
applicationof differential equation.pptx
PPSTUDIES
e-health to improve the effectiveness of the Healthcare system
e-health to improve the  effectiveness of the Healthcare systeme-health to improve the  effectiveness of the Healthcare system
e-health to improve the effectiveness of the Healthcare system
Dr INBAMALAR T M
Software security: Security a Software Issue
Software security: Security a Software IssueSoftware security: Security a Software Issue
Software security: Security a Software Issue
Dr Sarika Jadhav
UHV UNIT-5 IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
UHV UNIT-5    IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...UHV UNIT-5    IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
UHV UNIT-5 IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
ariomthermal2031

Color Detection & Segmentation based Invisible Cloak

  • 1. Faculty of Electronics Engineering (ECE),UNSIET, VBSPU PROJECT ROGRESS REVISED REPORT- I PROJECTTITLE: Color Detection & Segmentation based Invisible Cloak AREAOF WORK:Digital Image Processing TYPE OF MODEL:Software [Python 3.11 (64bit)] MODULES USED IN PYTHON: Open CV, NumPy, PIL, Socket, Tkinter PROJECTAIM & OBJECTIVES: AIM: This project aims to creates a magical experience by using an Image Processing technique called Color Detection & Segmentation resulting in false sense of Invisibility in the frame. PROJECT OBJECTIVES: The main objective of the invisibility cloak project is to develop a cloak or material that can render objects invisible to the human eye. Objective#1: Initializing, Capturing & storing the background frame through a digital camera. Objective#2: Detect the cloth using Color Detection by choosing appropriate HSV color space. Objective#3: Segment out the colored cloth by generating a mask. Objective#4: Applying Mask on frame & Combine mask frames together. PROPOSED DESIGN METHODOLOGY: Overall, the Proposed Design methodology involves capturing images, processing them using Image Processing operations and testing the Invisibility Cloak in real-time using digital web camera. Proposed Design is depicted in the Fig.1. PROGRESS IN WORK: During this course of time Objective#1, Objective# 2 and Objective#3 are completed & Objective#4 is under progress as detailed below,
  • 2. Faculty of Electronics Engineering (ECE),UNSIET, VBSPU a) We need to capture the background image of the scene without the object you want to hide. This can be done using a camera or by selecting an image of the background. b) Using OpenCV, generate a mask that will separate the object from the background. This can be done by applying image thresholding, (segmentation) that will allow you to isolate the object. c) Once we have generated a mask, you can apply image processing techniques to the object such as morphological transformations. This will make the object appear invisible. d) Once the processing is complete, test the invisibility cloak in real-time. This can be done using a webcam. e) Redefine the Design:Make any necessary modifications to the design to improve its overall performance, such as implementing on GUI for smooth interface. PROPOSED DESIGN EVALUATION METRICS we can utilize several evaluation metrics to measure the quality of our color detection and segmentation techniques. We will evaluate Accuracy & Precision for our proposed model. Accuracy is a widely used evaluation metric, especially in classification tasks, to assess the overall performance of a model or system. To measure accuracy, you compare the number of correct predictions made by your system to the total number of predictions made. Here's the formula for calculating accuracy: Accuracy = (Number of Correct Predictions) / (Total Number of Predictions) Precision measures the proportion of correctly detected colors among all detected colors, indicating how precise our system is in identifying the person and background colors. Calculate the true positives (TP), which are the colors correctly detected as belonging to the person's clothing & calculate the false positives (FP), which are the colors incorrectly detected as belonging to the person's clothing. Precision = TP / (TP + FP) Segment out the defined colored part bygenerating mask & applying it on frame Capture & Storebackground frame using Image Acquisition by Store a single frame before startingthe infinite loop. Generatethe finaloutput to create a magical effect by combining frames together, & remove the unnecessarynoise from masks. Detect the definedcolor using color detection & segmentation algorithm Using HSV Model
  • 3. Faculty of Electronics Engineering (ECE),UNSIET, VBSPU COMPARATIVE ANALYSIS FUNCTIONALITYOF THE SYSTEM Correct Predictions Total Processed Frame Accuracy Precision 85 100 0.85 0.83 98 100 0.98 0.96 89 100 0.89 0.86 93 100 0.93 0.91 81 100 0.81 0.82 93 100 0.93 0.92 Choose Webcam: Stream Web Cam: If you want to connect with System Webcam (Inbuilt or Connected Directly To System) 0 for your inbuilt webcam in system and goes like 1,2,3.... according to webcam connected. 1 for webcam connected externally to your system. To connect to CCTV, Android Camera or to any other camera having IP Address IP Address: IP Address of Your Camera (Example: 192.168.43.1) Port: Port of Connection (Example: 1111) Refresh: To Refresh the page to show valid options (always refresh when you change the source) Connect: To Connect to Camera Change Background: Show Background: To Change The background (This Background is used to create the invisibility) To Show Current using Background Calibrate To Set HSV Values (Keep in Mind: The White Part In calibrating window will become invisible) Start Magic: To Start the Magic (That Make You Invisible) Stop Magic: To Stop Magic Disconnect Exit: To Disconnect from current Source To Exit the Program
  • 4. Faculty of Electronics Engineering (ECE),UNSIET, VBSPU EVALUATION REMARKS BYPROJECTCOORDINATOR(S): PROJECTREPORTED: NAME & SIGNATURE OF TEAM MEMBERS: Aviral Chaurasia (195209) Ayush Singh (195206) Prashant Rai(195231) (APPROVED/NOT-APPROVED) ______________________________ NAME & SIGNATURE OF PROJECT SUPERVISOR (With Date) Mr. PC Yadav (Assistant Professor) Department of Electronics Engineering, UNSIET, VBSPU. 100%