The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a novel VLSI architecture for one dimensional Walsh-Hadamard transform (WHT) is proposed. The core of the architecture is the HVMA (Hadamard Vector Merging Adder) that adds the products of input data words and transform (Hadamard) matrix elements in parallel using a (4:2) compressor based carry-save tree structure. The core also exploits the Hadamard matrix's property of equal distribution...
Choroidal Neo-Vascularization (CNV) is a form of Age related Macular Degeneration (AMD) which leads to severe central vision loss. Therefore, it is needed to analyze the alterations that occur during CNV by quantification of the changing parameters. In CNV, the Retinal Pigment Epithelium (RPE) layer undergoes many changes and could be recorded by Optical Coherence Tomography (OCT). The highly reflective...
The land use or land cover map depicts the physical coverage of the Earth's terrestrial surface according to its use (viz. vegetation, habitation, water body, bare soil, artificial structures etc.). Land use map generation from remotely sensed images is one of the challenging task of remote sensing technology. In this article, motivated from group forming behaviour of real ants, we have proposed two...
Segmentation, or partitioning images into internally homogeneous regions, is an important first step in many computer vision tasks. In this paper, we attack the segmentation problem using an ensemble of low cost image segmentations. These segmentations are reconciled by applying recent techniques from the consensus clustering literature which exploit a non-negative matrix factorization (NMF) framework...
This paper presents a bottom-up tracking algorithm for surveillance applications where speed and reliability in the case of multiple matches and occlusions are major concerns. The algorithm is divided into four steps. First, moving objects are detected using an accurate hybrid scheme with selective Gaussian modeling. Simple object features balancing speed, reliability, and complexity are then extracted...
Object detection is receiving a growing attention with the emergence of surveillance systems. This paper presents a hybrid adaptive scheme based on selective Gaussian modeling for detecting objects in complex outdoor scenes with gradual illumination changes and dense, moving background objects like swinging tree branches. The proposed technique combines simple frame difference (FD), simple adaptive...
In recent time watermarking technique becomes a potential solution for copyright protection, authentication and integrity verification of digital media. Among the widely used watermarking techniques, spread spectrum modulation based method becomes appealing due to its inherent advantage of greater robustness and is used widely for various applications. Some watermarking applications, for example,...
The paper presents an image authentication and secures message transmission technique by embedding message/image into color images. Authentication is done by embedding message/image by choosing image blocks of size 3 times 3 called mask from the source image in row major order. The position of insertion is chosen within the mask according to the formula k % s and (k + 1) % s + 1 where k and s are...
In this paper two fuzzy clustering algorithms, namely fuzzy C-means (FCM) and Gustafson Kessel clustering (GKC), have been used for detecting changes in multitemporal remote sensing images. Change detection maps are obtained by separating the pixel-patterns of the difference image into two groups. To show the effectiveness of the proposed technique, experiments are conducted on three multispectral...
In this paper a masking based data hiding and image authentication technique (MDHIAT) has been proposed by embedding a message/image into a colour image. Bits from authenticating message/image are embedded in single bit position under each byte of the source image by choosing a standard 3 times 3 mask in row major order. Point of insertion of a bit is obtained by computing modulus operation of the...
This paper presents a new hybrid image fusion scheme that combines features of pixel and region based fusion, to be integrated in a surveillance system. In such systems, objects can be extracted from the different set of images due to background availability, and transferred to the new composite image with no additional processing usually imposed by other fusion approaches. The background information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.