The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Local Feature Extraction (LFE) algorithm is an effective feature extraction method developed in recent years. One of the shortcomings of the current LFE algorithm is that it can only process labeled data, and does not work well when the amount of the labeled data is limited. However, it is usually easy to obtain large amount of unlabeled data but only a few labeled data. In this paper, we propose...
In this paper, we propose unconstrained handwritten Kannada character recognition based on Fisher linear discriminant analysis (FLD). The proposed system extracts features from well known FLD, Two dimensional FLD (2D-FLD) and diagonal FLD. In order to classify the characters, we explore different distance measure techniques and compare their results. The proposed system is tested on unconstrained...
In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt another...
When we generate an intermediate viewpoint image using multi-view images and their depth maps, we may have very annoying boundary noises in the background due to depth value errors around depth discontinuities. In this paper, we propose a boundary filtering method for synthesized images. After defining the boundary noise area using depth map, we replace them with corresponding texture information...
A lossless information hiding scheme based on neighboring correlation is proposed in this paper. The scheme hides secret information into gray-level images according to the correlation between neighboring pixels. The performance of the proposed scheme has been evaluated in terms of payload capacity, image distortion, as well as embedding rate, and the experimental results show that the proposed lossless...
A new parameter estimation method for linear chirp signal is proposed. This method utilizes the Discrete Fractional Fourier Transform (DFRFT) along with Bowtie Chirplet Transform to estimate the amplitude and phase parameters of multi-component chirp signals. DFRFT is used for estimating amplitude parameter whereas the chirp rate and initial frequency are estimated using Chirplet Transform. Performance...
A denoising algorithm for point-sampled geometry is proposed based on noise intensity. The noise intensity of each point on point-sampled geometry (PSG) is first measured by using a combined criterion. Based on mean shift clustering, the PSG is then clustered in terms of the local geometry-features similarity. According to the cluster to which a sample point belongs, a moving least squares surface...
Depth image based rendering (DIBR) is one of the key technologies to realize future three dimensional television (3DTV) systems. In this paper, we propose a novel depth image based rendering system for stereoscopic view generation. Existing method of parallax calculation based on uniform scaling of depth values can lead to artifacts in the 3D view. We propose a method of parallax estimation based...
This paper proposes a retrieval system for three dimensional objects using reflective symmetry. For the retrieval method, a reflective symmetric axis with a projector is used. The symmetric plane is calculated by the reflection symmetry, and the depth buffer is calculated for the symmetric plane. Then, by applying the Fourier transform to the depth buffer, the feature vector for the object is generated...
In this paper we show two modifications of the gpICA (geometric post non-linear independent component analysis) algorithm. gpICA algorithm is a novel method to solve the PNL (post non-linear) scheme. We propose these modifications to improve the mean squared error, the correlation of the recovered signals and algorithm reliability. The first improvement, called compensation, takes advantage from the...
Disparity is an important feature of multiview video applications, which can be used in coding techniques, synthesis of views, among others. The disparity estimation, however, is very complex and requires high processing capabilities to produce precise results. This paper presents an estimation method that uses segmentation and disparity information in an iterative cycle. In each cycle the frames...
In this paper, a method to estimate and track the distance and velocity of an obstacle on the road based on a stereo vision system is presented. The distance and velocity can be calculated using the disparity in the stereo vision system. However, the quantization error of the pixels causes a deterioration in accuracy. The sub-pixel interpolation is used to compensate for the error, and then, the distance...
In this paper, we propose an entropy coding method to further compress quantized mel-frequency cepstral coefficients (MFCCs) extracted for distributed speech recognition (DSR). In the ETSI extended DSR standard, MFCCs are compressed with additional parameters such as pitch and voicing class. It is observed that the distribution of MFCCs varies according to the voicing class, thereby enabling the design...
Inspired by the keyword-based text filter, this paper proposes an image filter which detects the spam image by matching with user-specified image content. In this way, detecting image spam e-mail is converted into image matching process. Stable local feature detection and representation is a fundamental component of image matching algorithms. SIFT has been proven to be the most robust local invariant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.