The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Vector quantisation (VQ) shows a good performance for image coding with high-compression ratios. However, there are many difficulties for image coding with VQ, especially the edge degradation and high-computational complexity. To resolve these two problems, the authors propose a new coding method based on edge orientation patterns (EOPs) by classifying image blocks into nine classes according to their...
A new feature for image retrieval based on edge orientation patterns (EOPs) by classifying image blocks into nine classes according to their EOs. Each input colour image is decomposed into Y, Cb and Cr components, and each component image is divided into non-overlapping 4 × 4 blocks. For each block, eight EO templates of size 4 × 4 are performed to determine its EO. On the other hand, vector quantisation...
A novel two-stage scheme of pornographic image detection is proposed in this paper. Specifically, we first apply the content-based image retrieval technique to find out whether human are present in the images. Then a detailed skin color analysis is performed to affirm the presence of pornographic content in the images. Experimental results show that the proposed algorithm performs well and fast in...
This paper proposes a method to encrypt an image in two shares with following properties. (1) The method is suitable for binary, gray level or color image encryption. (2) The bit error rates are adjustable, and thus the secret image can be recovered to different extents including lossless and nearly lossless. (3) Sizes of the share images are flexible to be changed, and thus the method can be used...
This paper proposes a visual secret sharing scheme for color image encryption with robust and progressive decryption abilities. Robust decryption means the secret content can be still decrypted from shares even the shares are corrupted with intentional or unintentional alterations. In progressive decryption, three levels quality of secret images can be decrypted with the same shares. A lower visual...
In this paper, we mainly research three aspects content, that is 1) The intelligent sensing system for chemical gas leak, which consists of three units. Many sensors are installed on the twelve different areas of easily leaking, if there are leak, will transmit the leaking area to the main computer of manipulator. 2) According to the 1)' information, a navigation system of mobile manipulator is designed,...
Nowadays, face detection plays an important role in many applications. Despite of the notable successes achieved in the past decades, making a tradeoff between computational complexity and detection efficiency is the main challenge. The ultimate goal is to develop fast detection algorithms with high practicalities. Among the proposed face detection algorithms, those based on skin color form an important...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.