The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new method for the detection and recognition of objects was developed for grayscale images. Obstacle detection is based on an efficient binarization and enhancement techniques followed by a suitable connected component analysis procedure. The grayscale object corresponding to the object identified in the binary image is then extracted. The second step deals with the recognition of these extracted...
Modern night-vision systems like image intensifiers and thermal cameras enable operations at night and in adverse weather conditions. Modern night vision camera provides false-colored fused image as an output which is unnatural in appearance and it is therefore hard to interpret. In this paper, a region-based natural color mapping method for night vision imagery is presented. The proposed method colorizes...
There are many uncertainties in image segmentation, which should be handled by theories and methods with uncertainty. Cloud model is a kind of effective method to handle uncertainty, which considers fuzziness, randomness and the connection of them. Image segmentation based on one-dimensional cloud model processes the one-dimensional grayscale histogram, and segments images using one-dimensional cloud...
This paper presents a robust motion detection technique using unit gradient vectors (UGVs). UGVs carry only gradient orientation information that is remarkably invariant to changes of image intensities. Hence, UGVs can be used as a stable textural feature in place of conventional image features intensities and gradients. We propose to detect motions in image sequences using the pixel-wise variations...
This paper presents a high DR, high temporal resolution, frame-free image/video camera that encodes and processes visual information in asynchronous spikes. The event-driven optical sensor features 9.3-bit grayscale imaging at up to 143dB DR and <;0.25% FPN with hardware-based lossless video compression and time-domain correlated double sampling. The main components of the camera - the asynchronous,...
Generally hiding information destroys the host image, however, some sensitive images for which any embedding distortion of the image is intolerable, such as military images, medical images, or artwork preservation etc. Reversible data hiding techniques are designed to solve the problem of Lossless embedding of large messages in digital images so that after the embedded message is extracted, the image...
Due to the development of internet rapidly, the secure transmission of information has become more and more importance. Until now, there are many scholars study in the topic of data hiding. Specially, the reversible data hiding scheme catch the researcher's attention. No matter how the researchers use the different technology to embed the secret information, they always try to increase the hide space...
The descriptive capability of color images for a scene is better than that of grayscale images. Traditional registration methods to register color images convert them to grayscale ones, in which the registration precision is decreased due to the loss of color information. By extending some properties of the discrete Fourier transform to the quaternion domain, a discrete-quaternion-Fourier-transform-based...
This paper describes a Time-Space mix-modulation drive method of TFT-LCD for high gray scale display. The method includes the time-domain frame modulation and the spatial domain digital-analog converter (DAC) gray-scale modulation. The time-domain frame modulation completed the digital image high-level gray-scale scan-drive, using multi-screen subspace scanning frame modulation. The spatial domain...
In this paper, we propose an approach to preserve a crucial visual cue in color to grayscale transformation: attention. The main contributions are three folds: 1) preserving visual attention is more biological plausible than preserving other low level cues, which makes our method more reasonable in theory from both biological and psychological aspects, 2) We treat the saliency map from visual attention...
Ant Colony Optimization (ACO) is a group of algorithms inspired by the foraging behavior of ant colonies in nature. Like their biological counterparts, a colony of artificial ants is able to adapt to the changes in their environment, such as exhaustion of a food source and discovery of a new one. In this paper, one of the basic ACO algorithms, the Ant System algorithm, was applied for edge detection...
Automated systems based on optical inspection are widely used in the production of electronic systems, mainly on the printed circuit board level. Detection of defects in the early stages of production, reduce costs by lowering the number of scraps and elevate overall quality standards. One of the main areas where defects arise, are in the solders of the components on printed circuit boards. This paper...
This paper presents a new image segmentation approach by suing automatic threshold selection. This approach divides the image into 2 class. The best threshold is got when the separation between the interclass variance and the variance between clasters is the maximal. Experimental results show this new approach can segment images automatically and quickly.
In many image processing systems, an input grayscale image is reformed to make a clear image. After this reformation, the obtained gray-scale image is transformed into a binary image. Some gray-scale and binary image processing programs are implemented onto a linearly connected parallel processor. After partitioning an image into rectangular regions, each region is loaded in the main memory of a processing...
This work presents an extension of morphological operators for color images. The morphological operations require that the set items to be analyzed are completely ordered, thus it is necessary to find a maximum and a minimum values in order to obtain such an ordering. In this paper a new lexicographical and distance criteria for the pixels ordering in color images are proposed. These criteria have...
Mammography is currently the most effective imaging modality used by radiologists for the screening of breast cancer. Finding an accurate, robust and efficient breast profile segmentation technique still remains a challenging problem in digital mammography. Extraction of the breast profile region and the pectoral muscle is an essential pre-processing step in the process of computer-aided detection...
Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by...
The grain size is an important quality index of granular materials. The accurate measurement of it has a guiding significance for technical performances and application of subsequent processing. Currently most of particle detection are done by manual operation such as screening method, which causes many problems as time-consuming measurement and lengthy testing steps. The particle size detection technology...
Color constancy (CC) or white balance (WB) is an important image processing step in digital camera and machine vision. This paper presents a robust computational algorithm that offers an accurate solution for CC. The proposed CC measure exploits the scanning strategy of RGB channel gain adjustment. In addition, the suppressing mechanism of grayscale pixel maximization (GPM) is used to locate potential...
With the ubiquitous deployment and rapid growth of electronic information systems in today's society, personal or identity verification is now a critical key problem. Due to this fact, biometric authentication has emergently gaining popularity as it provides a high security and reliable approach for personal authentication. However, authentication using ones biometric features has not been widely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.