Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Encryption is used to transmit data in open networks with security. Each type of image has its own features, therefore different techniques can be adopted to protect the image from unauthorized access. Most of the available encryption algorithms are mainly used for large devices. There is no such image encryption algorithm with smallest key for smaller devices like cell phone, smart card etc. In this...
This paper proposes a distortionless image data hiding algorithm based on integer wavelet transform that can hide data into the original image .The data can be retrieved and the original image can be recovered without any distortion after the hidden data are extracted. This algorithm hides data into one or more middle bitplane(s) of the integer wavelet transform coefficients in the LH, HL and HH frequency...
We present a markerless human motion capture system that estimates the 3D positions of the body joints over time. The system uses a dynamic bayesian network and a factored particle filtering algorithm. In this paper we evaluate the impact of using different observation functions for the bayesian state estimation: chamfer distance, a pixel intersection and finally a pseudo-observation of the subject...
This paper presents an off-line signature verification system composed of a combination of several different classifiers. Identity authentication is a very important characteristics specially in systems that requires a high degree of security such as in bank transactions. In our experiments, one-class classifier was used to create a signature verification system, consequently only genuine signatures...
Thanks to the exceptionally good properties, chaotic systems have been widely studied and developed in image scrambling and watermarking algorithms in recent years. In this paper, the chaotic standard Baker map is improved and employed to scramble the pixel positions of host image and watermark image in the preprocessing of watermarking. Experimental results show that the scrambling algorithm based...
Multiscale Geometry Analysis consistent with the best features of the image representation, is effective for high dimensional function approximation and can use the image of the geometric regularity. In this article, we will mainly discuss the transformation of the Beam let based on Multiscale Geometry Analysis, formulate its theoretical basis, and by Matlab simulation results show the advantages...
Nonnegative Matrix Factorization (NMF) has been widely used in dimensionality reduction, machine learning, and data mining, etc. It aims to find two nonnegative matrices whose product can well approximate the nonnegative data matrix, which naturally lead to parts-based representation. In this paper, we present a family of projective nonnegative matrix factorization algorithm, PNMF with Bregman divergence...
It is need to carry on the compression to the remote sensing image for the speedy transmission and the effective memory remote sensing image. The multi-spectrum remote sensing image has the very strong relevance among spectrums. In multi-wave band image compression, to eliminate the spectrum relevance, both must consider to eliminate the statistical dependence, and to eliminate the structure relevance...
Distributed video coding is a new paradigm for video compression based on the Slepian-Wolf and Wyner-Ziv theorems. Wyner-Ziv video coding, a lossy compression with receiver side information, enables low-complexity video encoding at the expense of a complex decoder. Most of the existing distributed video coding techniques require a feedback channel to determine the number of parity bits for decoding...
Many consumer digital cameras support dual shooting mode of both low-resolution (LR) video and high-resolution (HR) image. By periodically switching between the video and image modes, this type of cameras make it possible to super-resolve the LR video with the assistance of neighboring HR still images. We propose a model-based video super-resolution (VSR) technique for the above dual-mode cameras...
In this paper we present a novel method for high quality real-time video enhancement; it improves the sharpness and the contrast of video streams, and simultaneously suppresses noise. The method is comprised of three main modules: (1) noise analysis, (2) spatial processing, based on a new multi-scale pseudo-bilateral filter, and (3) temporal processing that includes robust motion detection and recursive...
Transmission of compressed video over error prone channels may result in packet losses or errors, which can significantly degrade the image quality. Such degradation even becomes worse in 1Seg video broadcasting, which is widely used in Japan and Brazil for mobile phone TV service recently, where errors are drastically increased and lost areas are contiguous. Therefore the errors in earlier concealed...
Particle Swarm Optimization (PSO) modified to solve image processing problem with reference to enhancement technique is proposed in this paper. The enhancement process is an optimization problem with several constraints. The objective of the proposed PSO is to maximize an objective fitness criterion in order to improve the contrast and detail in an image by adapting the parameters of a novel extension...
Matching of partial fingerprints has important applications in both biometrics and forensics. It is well-known that the accuracy of minutiae-based matching algorithms dramatically decreases as the number of available minutiae decreases. When singular structures such as core and delta are unavailable, extended features can be utilized. The current Fingerprint matching technology is quite mature for...
With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the multimedia. This paper considers the problem of embedding a binary watermark in a gray-level image using the concept of Visual Cryptography (VC). This paper proposes a watermarking scheme which offers better security than Hwang's method, so that, attackers will not be able to...
In this paper, a new face detection algorithm based on fractal theory and complexion model is proposed. On the basis of the traditional face detection, the new algorithm estimated the fractal dimension of face area to exclude the non-face area and extract the face area fast and accurately. Furthermore, its calculation is simple and it can realize multi-angle detection in the complex background. As...
The paper presents a novel multi-factorial approach for robust real-time object tracking. The target object is modeled using joint features of color (Intensity) histogram bins, texture, shape. In subsequent frames of a video, target localization is done by generating a confidence-map (a binary image) which discriminates foreground and background using K-means clustering algorithm. Random samples (sample...
The rapid development of networks such as internet, intranet, wireless communication etc., and multimedia techniques has emphasized on the need for copyright protection, authentication and identification and secret sharing of information. Visual cryptography is a secret sharing scheme where a secret binary image (SI) is encoded into n shares of random binary patterns. If the shares are xeroxed onto...
Basketball court detection is the key step of video annotation, however the court present different color when using different camera or in different play court. In this paper the adaptive Gaussian Mixture Model (GMM) is used to build the model of the basketball court, which is used in the basketball video annotation. The proposed algorithm extracts the main color of the court's main color using the...
This paper mainly introduces the edge extraction algorithm of thenar palm print image based on wavelet modulus maxima multi-scale. First, some classical edge detection operators and the Hough transform are introduced. And then the paper focuses on the wavelet modulus maxima multi-scale edge detection algorithm. In this algorithm, a multi-scale Gaussian edge detector is constructed. According to cross-scale...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.