{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:37:12Z","timestamp":1759333032181,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T00:00:00Z","timestamp":1597968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T00:00:00Z","timestamp":1597968000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T00:00:00Z","timestamp":1597968000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8,21]]},"DOI":"10.1109\/ickii50300.2020.9318922","type":"proceedings-article","created":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T21:04:10Z","timestamp":1615842250000},"page":"128-131","source":"Crossref","is-referenced-by-count":10,"title":["Edge Detection Technique by Histogram Processing with Canny Edge Detector"],"prefix":"10.1109","author":[{"given":"Md. Atiqur","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Md Faizul Ibne","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Hamada","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(98)00163-0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767769"},{"key":"ref12","first-page":"187","article-title":"Theory of edge detection. Proceedings of the Royal Society of London. Series B","volume":"207","author":"marr","year":"0","journal-title":"Biological Sciences"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.3390\/sym12101654","article-title":"Burrows-Wheeler Transform Based Lossless Text Compression Using Keys and Huffman Coding","volume":"12","author":"rahman","year":"2020","journal-title":"Symmetry"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1117\/12.24111"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/1049-9660(91)90065-W"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(00)00023-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.2001.0931"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1997.0587"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(03)00194-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374457-9.00019-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1996.517142"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/b15731"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1987.4767894"},{"key":"ref7","first-page":"660","article-title":"Isotropic processing for gradient estimation","author":"ziou","year":"0","journal-title":"Proceedings CVPR IEEE Computer Society Conference on Computer Vision and Pattern Recognition"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1987.4767980"},{"journal-title":"Digital Signal Processing Fundamentals and Applications","year":"2018","author":"tan","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/83.469938"},{"key":"ref20","first-page":"97","article-title":"A descriptive algorithm for sobel image edge detection","volume":"40","author":"vincent","year":"2009","journal-title":"Proceedings of Informing Science & IT Education Conference (InSITE)"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1274","DOI":"10.3390\/sym11101274","article-title":"Lossless Image Compression Techniques: A State-of-the-Art Survey","volume":"11","author":"rahman","year":"2019","journal-title":"Symmetry"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CEEICT.2018.8628092"},{"journal-title":"Forgery Database Raw Image Database Raw Audio Database","article-title":"Never-Compressed Image Database, Steganogrpahy","year":"2020","key":"ref24"},{"key":"ref23","first-page":"15","article-title":"Object enhancement and extraction","volume":"10","author":"prewitt","year":"1970","journal-title":"Picture Processing and Psychopictorics"}],"event":{"name":"2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII)","start":{"date-parts":[[2020,8,21]]},"location":"Kaohsiung, Taiwan","end":{"date-parts":[[2020,8,23]]}},"container-title":["202020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9318770\/9318813\/09318922.pdf?arnumber=9318922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:47:34Z","timestamp":1656452854000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9318922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,21]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ickii50300.2020.9318922","relation":{},"subject":[],"published":{"date-parts":[[2020,8,21]]}}}