The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper a lossless compression scheme is presented. In this scheme we have compared our newly proposed model with lossless predictive code (LPC) and differential pulse code modulation (DPCM) and we have shown how our model is more advantageous than LPC and DPCM. This newly proposed scheme for Huffman coding will achieve higher compression as we have reduced the mean value of the pixel in the...
The extraction of disparity data by means of stereo matching has well known issues in regions of low texture. This paper proposes a method which employs texture classification metrics in order to make predictions on the quality of the stereo matching output. Such predictions can then be used to alter the way the disparity data is used in further processing, or to even cancel processing of a pixel...
In 1973, Haralick, Shanmugam, and Dinstein published a paper in the IEEE Transactions on Systems, Man, and Cybernetics which proposed using Gray-Level Co-occurrence Matrices (GLCM) as a basis to define 2-D texture. Over 14 different texture measures were defined using GLCM. In images with n × n grey levels, the size of the GLCM would be n × n which, for large n such as n=256, put a large computational...
Distributed video coding (DVC) is an interesting research topic for emerging application scenarios requiring low complexity video encoding. The central Slepian-Wolf (SW) coding, in a DVC system, exploits the cross correlation between the side information and the original frame. But, it does not exploit the source entropy of the input symbols, which is exploited by entropy coding in conventional video...
Palmprint identification is a subcategory of biometrics identification, which can be efficiently used to identify the people. Palmprint-based identification is currently a potential alternative to human identification method of a well known fingerprint-based identification. For example, if the hand of the identified person is dirty, the accuracy of fingerprint-based identification is distorted, while...
A new pre-processing method through a newly proposed image transform scheme is presented in this paper. It enhances the efficiency of entropy encoders in the compression of images. Before an entropy encoder encodes a stream of pixel values in an image, the proposed method adaptively performs the new image transform under various transform patterns and then selects the transformed image with the least...
On Image registration, it is intuitive to orientate images by matching corresponding pixels being considered idealistically identical on overlapping region. Based on this concept, the present paper proposes an image registration method that applies the information theorem to the corresponding intensity data. An entropy-based objective function is designed upon the histogram of the intensity differences...
This paper proposes an Adaptive Fuzzy Classifier Approach (AFCA) to local edge detection in order to address the challenges of detecting latent fingerprint in severely degraded images. The proposed approach adapts classifier parameters to different parts of input images using the concept of reference neighborhood. Three variants of AFCAs, namely K-means-clustering AFCA, Entropy-based AFCA, and Statistical...
In this paper, a new QR code binarization method is presented according to the QR code characteristic to improve the accuracy of QR code decoding in mobile image processing. The Sauvola's thresholding algorithm is modified to solve QR code image binarization which is the threshold decision in the uneven light condition. Experiments show that the proposed algorithm has better correctness of recognition...
Edges in images are considered to be basic low-level features in image processing and pattern recognition. In this paper, we propose a new method for edge detection using the exponential function. The pixel values within a mask are normalized so that they can be regarded as probabilities. Then, the sum of the exponential or the reciprocal of exponential functions of the probabilities is calculated...
In order to improve the capability of scrambling encryption, an novel image encryption scheme was presented to achieve higher security in the paper. And a large number of simulations were carried out to evaluate the performance of the proposed image encryption system. The experimental results show that the presented method can resist various kinds of attacks and provide an effective way for high security...
In this paper, a novel image thresholding based on Two-Dimensional Arimoto Entropy (TDAE), called Ellipsoid Region Search Strategy (ERSS), is proposed. The basic idea is to search the optimal threshold from the reference point obtained by one-dimensional OTSU algorithm. Different from existing approaches, our approach provides a scheme to reduce the number of samples through the existing relatively...
Histogram Equalization (HE) is a very popular algorithm in the field of image enhancement. Its theory is very simple but effective and easy to implement. However, this algorithm can not get good result in some special cases. Furthermore, it will change the mean brightness of original image significantly. According to these drawbacks of HE, some novel algorithms have been proposed. The main target...
This paper proposes an improved discrete wavelet framework based image fusion algorithm, after studying the principles and characteristics of the discrete wavelet framework. The improvement is the careful consideration of the high frequency subband image region characteristic. The algorithms can efficiently synthesis the useful information of the each source image retrieved from the multi sensor....
Humans do not process the entire area of an input visual image uniformly, but usually focus their visual attention on a limited area. But where does a human focus that attention? Psychological phenomena indicate that attention is attracted to features that differ from its surroundings or the one that are unfamiliar. On the bases of this we developed a saliency map model, which predicts where attention...
Edge detection is a commonly performed operation in image processing. In this paper, we propose a new method for edge detection using the logarithm function. The pixel values within a mask are normalized so that they can be regarded as probabilities. A positive constant is added to the probabilities to avoid zero values. Then, the sum of the logarithms of the adjusted probabilities is calculated....
Bilateral filtering has been a popular denoising technique that smooths images while preserving edges by means of a nonlinear combination of adjacent pixel values. We propose an entropy-based trilateral (EnTri) filter that extends the classical bilateral filter for noise removal in digital images. A new median-metric weighting function is incorporated into the geometric and radiometric components,...
In order to improve the capability of encryption scheme, we first extended the two dimensional Arnold transformation to three dimensional, and designed one kind of new diffusion equation of the digital image pixel gray value, then introduced a novel digital image encryption algorithm in the paper, which was based on the three-dimensional Arnold transformation and the new diffusion transformation....
In this paper, a new technique for the moving targets detection combining incoherent and coherent information of the Synthetic Aperture Radar (SAR) images is proposed based on the measure of a two-dimensional (2-D) fuzzy entropy principle. Firstly, it extracts incoherent and coherent information from images in pixel and builds a 2-D histogram. Secondly, according to 2-D fuzzy function, image pixels...
Traditional methods to extract water regions in SAR images usually rely on image binarization with a specified threshold. However, because of the inherent speckles in SAR images, finding an appropriate threshold is very difficult. In the paper, we propose a new method for water region extraction in SAR images using GLCM (gray-level co-occurrence matrix) based features combined with SVM (Supported...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.