Brain Tumordetectionusing SVM
Brain Tumordetectionusing SVM
net/publication/320649812
CITATIONS READS
57 5,420
5 authors, including:
SEE PROFILE
All content following this page was uploaded by Sathies kumar Thangarajan on 17 March 2021.
Abstract— Magnetic Resonance Imaging is a standard non-invasive Primary tumor: The origin of the tumor cell is brain
methodology used in medical field for the analysis, diagnosis and itself.
treatment of brain tissues. The early diagnosis of brain tumor helps
in saving the patients’ life by providing proper treatment. The
accurate detection of tumors in the MRI slices becomes a fastidious Secondary tumor: It is known as metastatic brain
task to perform and therefore, by this proposed system, the tumor. The origins of the tumor cell are other parts of
classification and segmentation the tumor region can be done the body where it finally reaches the brain. This is the
accurately. Segmentation and 3D reconstruction also uses the most common type of brain tumor.
detection of tumor from an MR image. The manual tracing and
visual exploration by doctors will be restrained in order to avoid time Based on the malignancy, it is classified as given below
consumption. The brain tumor detection allows localizing a mass of
abnormal cells in a slice of Magnetic Resonance (MR) using SVM
Benign tumor: The tumor cells are noncancerous that
Classifier and segmentation of the tumor cells to know about the size
of the tumor present in that segmented area. The extracted features are normal in size and growth. They don’t generally
of the segmented portion will be trained using artificial neural invade the other parts of the body.
network to display the type of the tumor. These features will also be Malignant tumor: The tumor cells are cancerous cells
used for comparing the accuracy of different classifiers in that are abnormal in size and growth. They tend to
Classification learner app. The scope of this project is helpful in post invade the neighboring healthy cells.
processing of the extracted region like the tumor segmentation.
Based on the appearance, the tumor cells are graded.
During the period of treatment, this grade measurement gives
Keywords— Segmentation; Brain tumor; SVM Classifier; the information about the rate of growth of tumor [2].
artificial neural network; Magnetic Resonance Imaging;
Classification learner app. TABLE 1. Grades of brain tumor
978-1-5090-4929-5©2017 IEEE
318
2017 IEEE 3rd International Conference on Sensing, Signal Processing and Security (ICSSS)
Processing of image based on shapes is called morphology. It builds a hyper plane based on a kernel function (K). As
Structuring element is applied to the preprocessed input image shown in Figue.1, feature vectors on left side of hyper plane
which creates output image of the same size. Every pixel of the belong to class -1 and the feature vectors on the right side of
input image is compared with all the neighboring pixels and the hyper plane belong to class +1.
compared result is the values of the corresponding output pixel.
In neural network, the dataset of MRI images are trained
Dilation and erosion are the basic operations of by iteration method. Therefore, when a new image is given to
morphology. Pixels are added to the boundaries of the objects the neural network, it is trained by neural network by
in dilation operation while they are removed in the erosion comparing the iteration value of the previously trained image.
operation depending on the size and shape of the structuring After the training is complete, if any changes need to be made
elements. During the comparing process, dilation operation to the training process, the network architecture, or the data
returns the highest value of the surrounding nearby pixels to sets can be determined using the network performance. The
the output whereas the erosion operation returns the lowest Fig. 2 shows that the test curves and the validation curves are
value of the surrounding nearby pixels to the output. very similar. If the test curve gets increased significantly
before the validation curve is increased, then it is evident that
There are different types of clustering that includes an over fitting might have occurred. The relationship between
mountain, K- means, fuzzy C- means and subtractive the targets and the resulting output of the network can be
clustering method. The k-means clustering is the common compared by plotting the regression plot [6]. If the training
clustering technique that is used. It is a simple, straightforward was perfect, the network output and the target would be equal
and quicker than the hierarchical clustering that can work for as shown in Fig. 3.
large number of variables [4].
978-1-5090-4929-5©2017 IEEE
319
2017 IEEE 3rd International Conference on Sensing, Signal Processing and Security (ICSSS)
B. Convolution filtering:
Classification Learner app is used to train the database for 2) Edge detection: The edges present in the gray scale image are
classifying the obtained data by supervised machine learning. detected using canny method. The Canny edge detector
The tasks involved in this app includes: smoothens the gray scale image by convoluting it with a Gaussian
filter. Both the x and y direction derivatives are computed based
• uploading the data on the resulting smoothed image. The gradient magnitude of the
• selecting the features image is computed with these derivatives. If they do not
• training the database constitute a local maximum, then the pixels of the image are
• obtaining the results suppressed. The final step is performed using the hysteresis
operator, where the pixels are marked as either edges, non-edges
Types of classification includes SVM (Support Vector or between the edges and non- edges, based upon the threshold
values. If the in-between pixels are connected with the edged
Machine), K-nearest neighbors (k-NN), decision tree. This app
performs model assessment and comparisons using confusion pixels, they are also considered as edge pixels. A binary image is
matrix and scattering plots. There are two types of classifier obtained as the result, where the white pixels closely approximate
training: the true edges of the original image.
The flowchart of various steps involved in the proposed g=1/(1+(x/k)^2) .*a (3)
system is shown in Fig. 4. g=exp(-(x/k)/2).*a (4)
A. Acquisition of input image :
PDE Direct Method:
The dataset of MRI Images are acquired from publicly
Img= Img + dt*(CN.*GN + Cs.*Gs + Ce.*Ge + Cw.*Gw) (5)
available sources such as hospitals, laboratories and medical
institutions and colleges which is saved in .jpg format.
The ‘Result 1’ and ‘Result 2’ in the Fig. 4
respectively refer to the type of the tumor and the comparison
result of classifiers.
978-1-5090-4929-5©2017 IEEE
320
2017 IEEE 3rd International Conference on Sensing, Signal Processing and Security (ICSSS)
C. Neural Training:
III. EXPERIMENTALRESULTS
After the pre-process operation on the image, the dataset of The GUI menu option opens as in Fig. 5.
the image along with its extracted features are trained using
the neural network. The performance of the training operation
is validated and is plotted in a graph with mean square error in
y-axis and iteration values in x-axis.
D. Morphology:
The morphed image is then clustered using the same ‘disk’ Fig. 5 GUI menu
structuring element. The clustering includes the process of
dilation and erosion followed by ‘open’ operation. After all The options are selected in order. On selecting the option
these operations, the connected components found on the “TESTING INPUT”, the input image can be choosen from any
image are returned. number of images. The input image is displayed as in Fig. 6.
F. Segmentation:
On selecting the option “NEURAL NETWORK AND
A signed distance map (SDF) is created for masking
PREPROCESSING”, the unknown input image is preprocessed
purpose. Interior and exterior points of the mask are found and
when it is simultaneously added as a dataset to the neural
using these points, their mean values are calculated. The kappa
value is then calculated by setting a threshold point. The
978-1-5090-4929-5©2017 IEEE
321
2017 IEEE 3rd International Conference on Sensing, Signal Processing and Security (ICSSS)
network. The neural network training dailog box opens and “RESULT”, the result of the tumor either being normal,
the iterations starts as shown in Fig. 7. benign or malignant is displayed as in Fig. 9.
978-1-5090-4929-5©2017 IEEE
322
2017 IEEE 3rd International Conference on Sensing, Signal Processing and Security (ICSSS)
References
[1] Saptalakar. B. K, Rajeshwari. H, “Segmenttion Based Detection of Brain
Tumor,” International Journal of computer and Electronics Research,
Vol. 2, pp.20-23, February 2013.
978-1-5090-4929-5©2017 IEEE
View publication stats 323