The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the generalized circular Hilbert transform with arbitrary phase shift is defined, furthermore, the related generalized circular analytic signal is discussed in terms of the property of the negative-Fourier frequency vanishing. By Cayley transform, we get the generalized analytic signal on the whole time range. Some examples are presented.
A new person-independent facial expression recognition algorithm based on fusion of Gabor and LBP Features with OLPP is presented. Aiming at the deficiency of common Gabor feature extraction method, a new Gabor feature extraction method is proposed. Each Gabor wavelet representation of an image is divided into small subblocks, then the mean value and standard deviation in each subblock are calculated,...
Combined with diagonal image transform, two-dimensional discrete cosine transform (2DDCT) is used in face and iris image for feature compression; then Kernel Fisher Discriminant Analysis (KFDA) is chosen as feature fusion; finally, Nearest Neighbor (NN) classifier is selected to perform recognition. Experimental results on ORL (Olivetti Research Laboratory) face database and CASIA (Chinese Academy...
Majority voting in classifier combination treats all base classifiers equally without considering their performance differences. By analyzing the constraints imposed by the margins of an ensemble classifier, a set of weights can be computed to give better prediction than the majority voting. We propose a regularized classifier combination strategy that maximize the entropy of probability weights assigned...
The research intends to develop the vehicle detection and counting system using image processing. Overall works are software development of a system that requires a video stream and capture to a video frame. They consist of the following components: background road without any moving vehicle and the frame with moving vehicles. The system is designed to find the differentiation which is the moving...
Face recognition has been of interest to a growing number of researchers, and many algorithms are presented. However, the recognition rate will be significantly reduced in the case of large sample size and greater facial expression changes. In this paper, 2DPCA algorithm is used for features extraction and Boosting by filtering method is used to choose training samples. Then, the expert systems of...
In this paper, a novel wavelet image coding algorithm based on human visual system characteristics is proposed. After dividing the original image into sub-blocks, including smooth block, edge block and texture block, different perceptual weights and compression algorithms are applied to each sub-block. Optimal coding of the whole image is achieved by choosing perceptual weights and compression algorithms...
In current common salient regions-based image retrieval schemes, salient regions are individually disposed, and one could not retrieve the objects with distinct indispensable regions. Herein, we propose one multiple salient regions combined (MSRC) image retrieval scheme, which uses all the salient regions of target object images to search the implicit objects in querying images for their counterparts...
In digital management, multimedia content and data can easily be used in an illegal way - being copied, modified and distributed again. Copyright protection, intellectual and material rights protection for authors, owners, buyers, distributors and the authenticity of content are crucial factors in solving an urgent and real problem. In this paper, we describe an algorithm of watermark-embedding in...
In this paper, we present a VQ-based fast face recognition algorithm using an optimized codebook. Previously, Chen et al. [2006] proposed a novel codebook design method based on the systematic classification and organization of code patterns abstracted from facial images for reliable face recognition. In this paper, an improved codebook design method is proposed. Combined by a systematically organized...
In the paper, we propose a new method for ear recognition. Firstly, we extract global features using kernel principal component analysis (KPCA) technique and extract local features using independent component analysis (ICA) technique. Then we establish a correlation criterion function between two groups of feature vectors, extract their canonical correlation features according to this criterion, and...
In this paper, we present an improved face recognition algorithm based on adjacent pixel intensity difference quantization (APIDQ) histogram method proposed by Kotani et al. [12]. We optimize the quantization method of APIDQ according to the maximum entropy principle (MEP), and determine the best parameters for APIDQ. Experimental results show maximum average recognition rate of 97.2% for 400 images...
This paper addresses incremental learning and time-consuming problems in non-negative matrix factorization (NMF) of face recognition. When the training samples or classes are incremental, almost all existing NMF based methods must implement repetitive learning. Also, they are usually very time-consuming. To overcome these limitations, we proposed a novel constraint block NMF (CBNMF) method, which...
We propose and evaluate a novel method for enhancing performance of lip contours detection, which is based on the concept of Active Shape Models and optimization of multi features. A single feature-based ASM presents good performance only in particular conditions but gets stuck in local minima for noisy conditions (like beard, wrinkle, poor texture, low contrast between lip and skin, etc). To enhance...
Based on quadratic stability and by means of linear matrix inequality, memory state feedback robust H-infinity controller design is considered for time-varying delay systems with nonlinear uncertainties. By solving a linear matrix inequality, the H-infinity state feedback controller is obtained. Finally, an illustrative example is presented to prove the correctness of this method.
Early detection and rapid resolution network congestion can considerably improve network capacity. Consequently, much research has been carried out on predicting traffic patterns in 3G networks. This paper introduces an access point centric approach that is implemented by two kinds of predictors, the WPML predictor and the order-k Markov predictor. The feasibility of this approach is evaluated, and...
Currently transferring streaming media over Internet has become a hot research topic. But much more attentions are paid on applications of RTSP rather than its security. With the rapid development of RTSP applications, the security issues will become a bottleneck in the future. In this paper, we detailed analyze the attacks against RTSP, such as malicious eavesdropping /modifying /terminating stream...
Relevance feedback has been developed for several years and becomes an effective method for capturing userpsilas concepts to improve the performance of content-based image retrieval (CBIR). In contrast to fully labeled training dataset in supervised learning, semi-supervised learning and active learning deal with training dataset with only a small portion of labeled samples. This is more realistic...
An adaptive control method and a structural acceleration method are introduced for estimating the unknown parameter when a time series for a scalar function of the variables of a nonlinear dynamical model is given. The methods are shown to work when the scalar function explicitly depends on a variable with the evolution equation in which the parameter appears explicitly, and the structural acceleration...
A wavelet packets-based robust blind watermark scheme using chaotic encryption is proposed in this paper. Two chaotic sequences are modulated according characters of chaotic system, using for sub image extraction and watermark encryption. The binary watermark information is changed into one dimension sequence by module arithmetic. An encrypted watermark sequence can get after do XOR arithmetic with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.