The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the Chinese classical gardens, the pavilion is one of the most representative classical garden architectures, in order to reflect the aesthetic values of city landscape pavilion, this paper uses the main city in China's classical Pavilion as the research object and selects 90 representative samples for quantitative evaluation of the classical Pavilion by SBE method. By using correlation analysis,...
With the development of displaying techniques, free viewpoint video (FVV) system shows its potential to provide immersive perceptual feeling by changing viewpoints. To provide this luxury, a large number of high quality views have to be synthesised from limited number of viewpoints. However, in this process, a portion of the background is occluded by the foreground object in the generated synthesised...
Color and texture have been proven to be very discriminant attributes in image analysis across many works. This paper proposes a color texture analysis method based on the graph theory, in which we convert the texture in question into an undirected weighted graph and explore the shortest paths between four pairs of pixels according to different scales and orientations of the image. Basically, we extend...
Image is usually taken for expressing some kinds of emotions or purposes, such as love, celebrating Christmas. There is another better way that combines the image and relevant song to amplify the expression, which has drawn much attention in the social network recently. Hence, the automatic selection of songs should be expected. In this paper, we propose to retrieve semantic relevant songs just by...
Information security is crucial to data storage and transmission, which is necessary to protect information under various hostile environments. Cryptography serves as a major element to ensure confidentiality in both communication and information technology, where the encryption and decryption schemes are implemented to scramble the pure plaintext and descramble the secret ciphertext using security...
In the paper, we propose an effective long-term real-time tracking method to address the problem of robustness and tracking failure in visual tracking with UAVs. Most existing trackers only consider short-term tracking, therefore are unable to cope with partial and complete occlusion, which finally leads to object drifting or loss. Our method still follows the tracking-by-detection framework. However,...
Aesthetic quality assessment plays an important role in how people organize large image collections. Many studies on aesthetic quality assessment are based on design of hand-crafted features without considering whether attributes conveyed by images can actually affect image aesthetics. This paper presents an aesthetic quality assessment method which uses new visual features. The proposed method utilizes...
The paper is devoted to development of the computer-based specialized processing the meteorological data in order to analyze and visualize changes in local climate dynamics. In particular, we focus on local seasonal temperature evolution. The peculiarity of the discussed viewpoint is connected with the attempt to take into account variability of seasonal temperature compositions in correlation with...
Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of social media like Twitter and Facebook. The aim of this paper is to evaluate the security of block scrambling-based encryption schemes, which have been proposed to construct EtC systems. Even though this scheme has enough key spaces for protecting brute-force attacks, each block in encrypted...
AbstractłIn order to enhance the robustness of kernel correlation filters(KCF) in complex background environment, this paper proposes a mean shift method with adaptive local object tracking algorithm. KCF algorithm has speed advantage by using the single template, we introduce the confidence map in the process of the tracking to determine the result of the current frame. If the result of confidence...
A key issue in fruit export is classification and sorting for marketing. In this work image processing techniques are used to grad Thompson orange fruit. For this purpose, fourteen parameters were extracted, comprising area, eccentricity, perimeter, length/area, blue value, green value, red value, width, contrast, texture, width/area, width/length, roughness, and length. Adaptive neuro fuzzy inference...
Cucumber downy mildew is a kind of disease which spreads very fast and isdangerous, in order to prevent the disease, peoplealways spray plenty of pesticides indiscriminately. Accurate assessment of the level of cucumber downy mildew is very important to the disease prevention and control. In a cucumber growing season, this paper collected the typical cucumber downy mildew leaf samples, and developed...
Multi-object tracking is an important computer vision task with wide variety of real-life applications from surveillance and monitoring to biomedical video analysis. Multi-object tracking is a challenging problem due to complications such as partial or full occlusions, factors affecting object appearance, object interaction dynamics, etc. and computational cost. In this paper, we propose a detection-based...
Colorization is a coloring process in the image or video, which is done to provide detail and clarity to the image or video. This study used image gray scale to be colored by matching both color image pixel blocks and grayscale images based on GLCM texture feature (gray level co-occurance matrix) using a sum of absolute difference. Color image blocks are used as templates and grayscale image blocks...
The notion of complexity is widely-known and used. Various definitions of complexity exist: the Hausdorff dimension, fractal dimension, Kolmogorov complexity, Krohn-Rhodes complexity, Lyapunov exponents or the entropy, some of them with several definitions. All these measures were defined strictly for mathematical objects, but they may apply to real signals like texture images in particular. We are...
In this work, we explore the problem of generating fantastic special-effects for the typography. It is quite challenging due to the model diversities to illustrate varied text effects for different characters. To address this issue, our key idea is to exploit the analytics on the high regularity of the spatial distribution for text effects to guide the synthesis process. Specifically, we characterize...
We present a novel, purely affinity-based natural image matting algorithm. Our method relies on carefully defined pixel-to-pixel connections that enable effective use of information available in the image and the trimap. We control the information flow from the known-opacity regions into the unknown region, as well as within the unknown region itself, by utilizing multiple definitions of pixel affinities...
In this paper, we propose a multiple line extraction method from multimodal data points in high dimensional space. It can sparsely represent multimodal sensor network data by utilizing high correlation among channels in the data. We exploit the idea of Color Lines, which is a model using high correlation among RGB channels in computer vision. It represents real color images as a collection of multiple...
Predicting upcoming bands of hyperspectral images is an important task in modern image compression algorithms. This paper proposes a new algorithm to predict the band-wise correlation of hyperspectral images based on a generalized regression neural network (GRNN). The proposed algorithm uses the intensity values of the previous bands to train the GRNN and approximates the correlation between them...
The aim of this paper is to adapt automatic jigsaw puzzle solvers, which are methods of assembling jigsaw puzzles, to the field of information security. Encryption-then-Compression (ETC) systems have been considered for the user-controllable privacy protection of digital images in social network services. Block scrambling-based encryption schemes, which have been proposed to construct ETC systems,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.