The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduced a data embedding technology different from traditions. The study is based on visual C++ programming with interface. For convenience of users, It got over traditional defect of embedding technology. This study also produces new ideas in the aspect of precise correction. A more precise TIN-based method is assumed. Using this method, the errors of the corrected image is about one...
The grain size is an important quality index of granular materials. The accurate measurement of it has a guiding significance for technical performances and application of subsequent processing. Currently most of particle detection are done by manual operation such as screening method, which causes many problems as time-consuming measurement and lengthy testing steps. The particle size detection technology...
Aiming at the computational complexity and accuracy of the global motion estimation algorithm, a fast algorithm for global motion estimation is proposed. the algorithm eliminates the adverse effect of foreground object in global estimation and only fully search the particular regions in image to get initial optimal motion vector, then through the improved three-level pyramid multi-resolution model,...
Background subtraction is a traditional method for detecting objects in stationary background. However, this traditional method is difficult to detect objects accurately in the real world, because the background is usually cluttered and not completely static. In this paper, we propose an object detection approach using Ant Colony System (ACS) in a MAP-MRF framework. For object segmentation, a MAP-MRF...
Texture segmentation by Pseudo Jacobi -Fourier moments is presented in this paper. Given a window size, moments for each pixel in the image are computed within small local windows, and then texture feature images be obtained by using a nonlinear transducer. Finally, each pixel in the image is classified by K-mean clustering algorithm.
This article describes the optimization real-time implementation of Viola & Jones face detection algorithm, based adaboost, on RISC processor combined with a genetic approach (called AdaBoost/GA). This algorithm detects the faces in image or video sequences, with rate detection about 97% on the basis of image CMU & MIT. In this work we present a study of the algorithm in terms of complexity...
An attempt has been made in the paper to find globally optimal cluster centers for remote-sensed images with the proposed Rapid Genetic k-Means algorithm. The idea is to avoid the expensive crossover or fitness to produce valid clusters in pure GA and to improve the convergence time. The drawback of using pure GA in the problem is the usage of an expensive crossover or fitness to produce valid clusters...
This paper proposed a chaotic image scrambling scheme based on sorting transformation. The algorithm calculates the permuting address codes by sorting the chaotic sequence. Therefore, the scheme does not require knowing the probability density function of the chaotic orbits in advance, thus not only facilitating the choice of chaotic systems but also reducing the complexity of the scheme. The paper...
Based on isosceles triangle segmentation, a new approach of color image compression has been proposed by using correlation among RGB components and fractal image compression algorithm in this paper. The encoding process in this paper is composed of two steps: transforming color image into gray-level image according to correlation among RGB and compressing fractal image based on isosceles triangle...
The central idea of this paper is to propose an innovative watermarking scheme for digital image authentication which withstands common image processing attacks. Some pixels are randomly selected from original image, so that all of them have a valid 3 × 3 neighborhoods. A binary sequence is constructed from those pixels by comparing them against average values of neighborhoods. The binary sequence...
There is an improvement to the Bicubic interpolation enlargement algorithm based on the hardware parallel processing in this article. Search table method used in this paper has avoided massive cubic and the floating numbers multiply operation. It reduces the computation load greatly. Convolution operation in tow directions, level and vertical, of the 4x4 picture element matrix on FPGA has been realized...
Data/image compression is a significant application of linear algebra. The need to minimize the amount of digital information stored and transmitted is an ever growing concern in the modern world. Singular Value Decomposition (SVD) is an effective tool for minimizing data storage and data transfer. The proposed work explores image compression through the use of SVD on image matrices. The performance...
A novel permutation-substitution scheme, which is based on chaotic standard map, for the image encryption is proposed. It is loss-less symmetric block cipher and specifically designed for the colour images. The initial condition & system parameter of the chaotic standard map, number of iterations and number of rounds constitute the secret key of the algorithm. Firstly we mix all three colour layers...
As an important field in information security, image encryption algorithm has been a research focus. At the same time there are few works on fractal set as the encryption key among various encryption algorithms. In the paper, Mandelbrot set (abbreviated as M set) and the Hilbert transformation are utilized to generate the random key. Since M set can be iterated from only a few parameters, it can reduce...
Intelligent Computer Aided Diagnosis (CAD) Systems can be used for detecting Microcalcification (MC) clusters in digital mammograms at the early stage. CAD systems help radiologists in identifying tumor patterns in an efficient and faster manner than other detection methods. In this paper, we propose a new approach for detecting tumors in mammograms using Radial Basis Function Networks (RBFNN). Prior...
This paper analyzes a new image encryption scheme proposed in "A new encryption based on Henon mapping" and proves that this encryption algorithm is insecure in the image-known attack. By analyzing the properties of the round function, there are two weaknesses: on the one hand, the confusing process will not completely destroy the correlation of image pixels, on the other hand, because of...
Recently, road detection technique is a very important part of vision navigation, which is the key technique of intelligent vehicle guidance. The detection result is seriously affected by the quality of noise and image. Road edge detection is help to analyze the direction of the road extension and the specific location of obstacles, size and speed of obstacles in the road. In this paper, several typical...
In this paper, a multifractal approach to the classification of unknown self affine signals is presented as an improvement over traditional traffic signal. The fundamental advantages of using multifractal measures include normalization and a very high compression ratio of a signature of the traffic, thereby leading to faster implementations, and the abiliiy to add new traffic classes without redesigning...
Palmprint identification is a subcategory of biometrics identification, which can be efficiently used to identify the people. Palmprint-based identification is currently a potential alternative to human identification method of a well known fingerprint-based identification. For example, if the hand of the identified person is dirty, the accuracy of fingerprint-based identification is distorted, while...
Current video and image systems are typically of limited use in poor visibility conditions such as in poor illumination, rain, fog, smoke, and haze. These conditions severely limit the range and effectiveness of imaging systems because of the severe reduction in contrast. The contrast of any image is a very important characteristic which decides the quality of image. Our chief goal in this paper is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.