Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Object tracking in real time is one of the most important topics in the field of computer Vision. The work undertaken in this dissertation is mainly focused on development of a reliable and robust real time tracking system that can track the object of interest in the video acquired from a stationary or moving camera. The proposed algorithm is a real time algorithm that operates in 25 frames per second...
Communication between devices and data through networks have been increasing drastically in the past few decades. Encryption of data provides high level of security. This paper presents a median based technique for selective encryption where partial data of image is encrypted based on pixel values. An encrypted mask of the image is also appended with the image that specifies the pixels that are encrypted...
This paper presents a new architecture and circuit design for colour x-ray pixel array detector read-out electronics, based on two circuit designs; the Bayer method of pixel arrangement and the full energy and special resolution circuit design, a simulation of the sub sampling architecture was made in MATLAB Simulink and the results shows that the propose architecture produces images with an image...
Image Histogram is useful in wide range of applications, it shows the image intensity distribution which is used in many image processing techniques. The processing time is very critical in real time applications, so the optimized and robust techniques are preferred. This paper is discussing a simple method for calculating histogram of the image with sampled Histogram which is similar to the histogram...
In order to minimize the processing time and maintain the color palette, simplify the processing of, our research category the available colors into primary color the colors from the photographic processing by Error Diffusion, the research will use the color space HSL as color model to build the error diffusion application which designed for available and limited colors to making fine arts such as...
Possibility of application of a recurrent neural network for segmentation of full-color images based on a clustering of color components is considered. Questions of multi-step segmentation of such images in different color models are discussed. Experimental results on multi-step segmentation of images are presented in the RGB and YUV color spaces.
The application of recurrent neural network for image segmentation is considered. The described method allows to perform clustering of the image parameters without the a priori information about the clusters number. Calculation of network parameters for segmentation is discussed. The experiments results of multi-step segmentation are given.
By compiling computer program, the plane map of torpedo searching trajectory and the data of target spread probability density can be synthesized and a tridimensional map can be produced. The tridimensional map can illustrate not only the target spread probability density, but also the searching process and searching effect, and can be used to calculate the finding probability of specified searching...
Gastrointestinal hemorrhage has always been a difficult problem in clinical practice. The use of wireless capsule was a breakthrough in endoscopic diagnosis of the source of bleeding in small intestine. However, inspection of the capsule record data is a time-consuming process, and its reduction is a very important aspect in urgent cases. This paper provides the method of the hemorrhage recognition...
In the paper we introduce three methods for image processing, they are pixel extraction method, memory method and pointer method. With the same condition of data structure and algorithm, the three methods are used in edge detection for the digital images. In order to compare the actual operation efficiency of these three kinds of methods, we use C# to write a Windows Form Application program in the...
Blood related invasive pathological investigations play a major role in diagnosis of diseases. But in India and other third world countries there are not enough pathological infrastructures for medical diagnosis. Moreover, most of the remote places of those countries have neither pathologists nor physicians. Telemedicine partially solves the lack of physicians. But the pathological investigation infrastructure...
This paper presents a new vision-based vehicle detection method for Forward Collision Warning System (FCWS) at nighttime. Also, lane detection is performed for assistance. To effectively extract the bright objects of interest, an essential image preprocessing including the tone mapping, contrast enhancement and adaptive binaryzation is applied in the nighttime road scenes. The characteristics of taillights...
Visual secret sharing scheme (for short the VSS scheme) with access structure based on graph \cite{ABSS96} has been proposed and this can be considered as an extension of $(2, n) $-threshold VSS scheme. Ateniese et al. showed a decomposition method that we decompose star graphs from a given graph which edges are specified by qualified sets. Namely, two participants (vertices in a given graph) has...
This paper proposes a novel scheme to save the usage of ink or toner by an approximate-K algorithm for color printers. Existing printers use the mixtures of three color toners(C, M and Y) to print all the pixels for color images, and it makes color printing cost 4-4.5 times more expensive than monochromic printing. Since human eyes are not sensitive to distinguish neighboring colors in the color space,...
Traditional window-based color indexing techniques have been widely used in image analysis and retrieval systems. In the existing approaches, all the image regions are treated with equal importance. However, some image areas carry more information about their content (e.g. the scene foreground). The human visual system bases indeed the categorization process on such set of perceptually salient region...
Content-Based Copy Detection (CBCD) is an emergent research topic and has been extensively studied recently. Color is one of the most important and easily recognizable features of visual content. To address efficiency and effectiveness issues of CBCD systems, in this article a compact and computationally inexpensive CBCD scheme using MPEG-7 Dominant Color Descriptor is proposed. This paper proposes...
In this paper, we have proposed an accurate and an efficient text detection model for document images and video frames. The proposed model is based on the Moravec operator to localize text in a document image and horizontal and vertical mask convolution is performed to identify the actual text blocks. In order to exhibit the performance of the proposed model, we have conducted experimentation on the...
Image retrieval is an active research area in numerous applications. Color and Texture is an important Low Level features for content based image retrieval and this paper proposes a method for extracting color feature using Discrete Wavelet transform and Auto-Correlogram. The Weighted Wavelet Auto-Correlogram is applied on the High frequency sub bands such as LH, HL and HH of the Y, Cb, and Cr channel...
Cryptography is the art of securing information by making sure that the secret can be understood only by the right person. Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods could be combined, it would provide a fool-proof security to information being communicated over a network...
This paper deals with a novel steganographic technique which demonstrates the colour image authentication technique in frequency domain based on the Discrete Fourier Transform (DFT). The DFT is applied on sub-image block called mask of size 2 × 2 for frequency components of corresponding spatial component. This transforms process done from beginning to end mask in row major order of the carrier image...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.