The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cervix cancer is the most common gynecological malignancy and second most common cancer among female in Malaysia after breast cancer. The objective of this study is to extract the size of nucleus and cytoplasm, as well as gray level values of cervical cells from ThinPrep images so that accurate value of those parameters can easily be obtained. An alternative approach of extracting features for Pap...
Based on RS and GIS, took 1993, 2000, 2007 and 2009 TM images as the data source, classic area (CA), pieces of Percent of landscape (PLAND), plaque number (NP), patch density (PD), largest patch index (LPI), shape index (LSI), fractal dimension (PAFRAC) were used to analyze the change of landscape from the types of Tangshan coal mining subsidence landscape. Landscape characteristics and dynamics change...
The IR-MAD components show changes in the agricultural areas as well as in the mine, and the kMAF components focus on extreme changes in the mine. Due to lack of change in the spectral signal (the change occurs in the height of the surface only) excavation of material (here brown coal) leaving the same material behind is not detected.
Corner points are interesting as they are formed from two or more edges and edges usually define the boundary between two different objects or parts of the same objects. In this paper we discuss the theory of the Harris corner detection and point out its disadvantage. Then it proposes an adaptive algorithm for Harris corner detection based on the neighboring point eliminating method. It reduces the...
We present an approach for learning models that obtain accurate classification of large scale data objects, collected in spatiotemporal domains. The model generation is structured in three phases: pixel selection (spatial dimension reduction), spatiotemporal features extraction and feature selection. Novel techniques for the first two phases are presented, with two alternatives for the middle phase...
The transmission of remote sensed images across communication paths is becoming a very expensive process because of the recent advances towards the satellite technologies that enable to download of terabytes of data every day. Image compression is an option for reducing the number of bits in transmission and various compression techniques have been developed; including predictive coding, transform...
This paper proposes a new image registration method using no reference image. The proposed method embeds a two dimensional tracking pattern to the Fourier magnitude domain of an image to generate a stego image, by data hiding scheme based on a log-polar mapping. Once a stego image is geometrically deformed, this method estimates rotation angle and resizing scale by correlation between the original...
This paper proposes an image registration method in which a geometrical deformed image is geometrically compensated without using its corresponding reference image. The proposed method hides a simple two-dimensional matrix into an original image in the spatial domain to generate a stego image. Once a stego image is geometrically deformed, this method estimates the geometric parameters by correlation...
In this paper, we present an application-specific LSI that is designed using a run-time reconfiguration technique. The implemented algorithm is phase correlation. The calculation of phase correlation includes Fast Fourier Transform (FFT) followed by Inverse Fast Fourier Transform (IFFT). We have developed a dual-decimation butterfly module that can be self-reconfigured, at run-time, to be either decimation-in-time...
Image stitching is one of important technologies in image processing field. It implements a seamless connection with two or more images which have overlapping part to get higher resolution or wider viewing angle image. As the amount of tedious calculation, a new image stitching method based on feature pixels is proposed in this paper. We extracted the edge feature pixels of images based on Canny operator...
This paper discusses three performance measures that can handle fusion techniques, using which; multiple input images can be fused. The evaluation methods are based on the degree of correlation and the deviation of information between the source images and the fused image. The performance measures are: Nonlinear Correlation Coefficient (NCC), Nonlinear Correlation Information Entropy (NCIE) and Information...
This paper presents a novel depth recovery technique of bifocus imaging system which may produce two focus images by independent focal lengths. Depth information can be extracted from the disparity between two focus images. This paper will propose the depth recovery formula and related algorithms such as feature extraction, sub-pixel matching, and center estimation. Experiments on real scene images...
A pyramid approach for remote sensing image registration based on mutual information and grey relational analysis is presented. The methodology applies edge information of image extracted using grey relational analysis and combines with mutual information regarding as similarity measure. First, the image pyramid is constructed by wavelet transform, and then coarse-to-fine multi-resolution search approaches...
We proposed a CPMF (combinative probability mass function) model for universal steganalysis to images from nature images and forged images, which can present statistic divergence between cover or forged image and steg image prominently. Based on the two features of images and CPMF mode, we discussed the affection of steg process and forged process on the nature images. This model relied most on the...
A novel method of watermarking in image spatial domains is proposed in this paper. The level transformation previously proposed for embedding watermark bits into each pixel of a source image is used adaptively with estimating the resulting subjective image quality. Thus, a desired subjective quality can be achieved on the watermarked image. First, the measurements of image quality by subjective evaluations...
In this paper, we present a method for digital image stabilization based on Fourier-Mellin transform and phase correlation. We acquire the rotating angle and scaling factor firstly by phase correlation between Fourier-Mellin transform images of the reference and observed images. After rotating and scaling the observed image, implement the phase correlation again to compute the spacial translation...
Image classification methods using unbalanced data can produce results with a performance bias. If the class representing important objects-of-interest is in the minority class, learning methods can produce the deceptive appearance of ??good looking?? results while recognition ability on the important minority class can be poor. This paper develops and compares two genetic programming (GP) methods...
For intelligent video surveillance application, the problem of ghosts that appears on motion detection may impose adverse impact on target identification. Based on the spatial-temporal correlations at pixels of the contour area of foreground blobs (PCFB), an efficient method for detecting ghost and left objects is proposed in this paper. This method contains three main steps: firstly, the average...
A reversible data hiding scheme, which can restore the original image completely after data extraction, is presented in this paper. In the proposed method, a cover image is reordered into a sequence using space filling curves. For each pixel (except the first pixel) in the sequence, a pixel difference is generated between the pixel and its neighbor pixel. Due to the inherent structure of images causes...
Corner points are formed from two or more edges and edges usually define the boundary between two different objects or parts of the same objects. In this novel we discuss the theory of the Harris corner detection and indicate its disadvantage. Then it proposes an improved algorithm of Harris detection algorithm based on the neighboring point eliminating method. It reduces the time of the detection,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.