The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a novel robust grayscale watermarking algorithm based on Two-Levels DCT and Two-Levels SVD is proposed. The watermark signal is (32× 32 × 8) bit gray image. First, the original image is divided into blocks according to the size of the watermark, each block corresponds to each pixel value of watermark. Second, the DCT is applied in each block twice and form new blocks. Then, SVD on the...
Sub-Rayleigh resolution by a factor proportional to [ln(Nmax/N)]1/2 is demonstrated through unstructured scanning of a focused classical beam across an object and dynamic application of a threshold N less than the maximum count level Nmax.
A reversible data hiding technique with high capacity of data embedding is presented in this paper. Using both difference expansion and histogram shifting methods at the same time we have improved Luo et al.'s method to increase the amount of data that can be embedded into the host image. First the image is examined for possible overflow/underflow problem that might occur during embedding; then if...
In this paper, we propose a (2, n) secret image sharing scheme with precise reconstruction for binary, grayscale and color image. In sharing phase, XOR-based secret sharing scheme is utilized and each participant is required to hold a certain number of shares, each having the same size as the secret image. In revealing phase, each two participants can recover the original secret image precisely by...
Security of a cryptographic system depends much on the randomness of random number used in the system. In this paper, a true random number generator based on the data of fingerprint (FPTRNG) is designed which extracts the random information from image data of fingerprint to generate random number. The random number generated by the generator is tested using the statistical test suite for random and...
Over the years significant research has been performed for automated, i.e. machine vision based fabric inspection systems in order to replace manual inspection, which is time consuming and not accurate enough. Automated fabric inspection systems mainly involve two challenging problems, one of which is defect classification. The amount of research done to date to solve the defect classification problem...
In this paper, a simple and robust watermarking algorithm is presented by using the third and the fourth least significant bits (LSB) technique. The proposed algorithm is more robust than the traditional LSB technique in hiding the data inside the image. Using the proposed algorithm, we will embed two bits in the third and fourth LSB. Experimental results show that the quality of the watermarked image...
Intravascular ultrasound can provide clear real-time cross-sectional images, including lumen and plaque. In practice, to identify the plaques tissues in different pathological changes is very important. However, the grayscale differences of them are not so apparent. In this paper a new textural characteristic space vector was formed by the combination of Co-occurrence Matrix and fraction methods....
In this paper, we will propose a data hiding method to embed the color information into the grayscale image and then only authorized users can recover the original color image. At the same time, according to the viewer's reliability, image owners can distribute the different embedding color image information. In other words, they will assign the more closer to the original image color information...
This paper presents an automatic speed sign detection and recognition for providing the visual driving-assistance of speed limits awareness. To reduce the influence of digital noise caused by lighting condition and pollution, a segmentation based on pan-red color information is applied to extract the shape of speed sign. Based on the edge-phase information of a circle shape, a novel edge-voting principle...
Image Matching is a fundamental tasks in image processing used to match two or more images, for example, at different time, from different viewpoints, Registration is the foundation of many image processing and applications such as object recognition, change detection, 3-D modeling. The paper researches Image Matching based on characteristic point, such as Harris Operator, and introduces corner point...
In this paper,a novel grayscale watermarking algorithm based on Two-Level Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) is proposed. The watermark signal is (32 × 32 × 8) bit gray image.First,The original image is divided into blocks according to the size of the watermark;each block corresponds to each pixel value of watermark.Second,the DCT is applied in each block twice...
Matching region selection is one of the bases of underwater terrain-aided navigation technology. Boundary division of topographic statistical map, which provides convenience to matching region selection and route planning, can be accomplished quickly when using image edge detection on it. This article firstly introduced the characteristics of edge detection operators; the grayscale image was transformed...
Currently, it is an effective means of collecting diseases information from mural collections by using edge detection and manual interpretation. But it is hard to extract better edges of mural diseases with existing edge detection algorithms. Therefore, a new K-Means Sobel algorithm is proposed. Firstly, we process a gray orthophoto map with K-means clustering algorithm to obtain a gray value matrix...
Halftone visual cryptography is an encryption mechanism that a secret image is encoded into halftone shares for showing meaningful images. You only need to superimpose part of these share images. Then, images can be shown the original confidential. In this paper, we propose an encoding scheme to improve the efficiency of visual secret sharing technology. We use the relative location information of...
The objective of this paper is to evaluate the classification performance of several feature extraction and classification methods for exotic wood texture images as dataset. The Gray Level Co-occurrence Matrix, Local Binary Patterns, Wavelet, Ranklet, Granulometry, and Laws' Masks will be used to extract features from the images. The extracted features are then fed into five classification techniques:...
An image matching algorithm is presented in order to get an accurate matching for dense image points. The main idea is using multiple constrains including affine transformation, epipolar geometry, gray-scale correlation and RGB correlation to do step by step approximation for the matching points. Affine transformation constrain is used for getting the regional similarity of the image points, and then...
The main objective of this paper is to verify bank cheques by using account number and account holder's signature present on the cheque image. Main problem is to exact localization of active regions among non-active contours in the image. Here, we locate the regions based on the prior knowledge of Cartesian coordinate space. It further involves various steps such as Gray-Scale conversion, Segmenting...
Analysis of fertile material such as flowers and fruit is a key factor in the proper identification of plant species. Despite object recognition being a mature research area, the use of it in automated plant identification is still relatively new. This paper describes a novel method of detecting fertile material in plant images using rectangular features. Rectangular features are obtained for the...
Rank and census transforms provide high resistance to radiometric distortion, vignette, and noise because they are based on the relative ordering of local pixel intensity values rather than the pixel values themselves. These transforms are widely used in many computer vision applications. An important step of computing these transforms is to compare or rank two grayscale values, which is very much...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.