The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Registration of 3-D aortic model onto X-ray images provides anatomical details for optimal valve deployment in Trans-catheter aortic valve implantation (TAVI) procedures. Fast and automatic contrast detection in the aortic root in fluoroscopic sequences facilitates a seamless workflow by triggering 2-D/3-D registration automatically when necessary. In this paper, we propose an integrated spatial and...
Broadcast sports video report is expected be the generated player data in real time. Therefore, uniform number recognition need to fast computing. Covariance feature has possibilities to do it in real time. We present a method for uniform number recognition using the covariance feature as a region descriptor. The covariance feature is represented by the covariance matrix of image features such as...
We propose a novel Histogram Equalization (HE) to improve contrast of images. As most existing HE methods still suffer from over-enhancement caused by a quantum jump, the proposed method focuses on robustness to deal with the problem in various image conditions. To achieve the goal, we adjust the curve shape of the output mapping function by properly combining the curve shape of the null mapping function...
The hand jitter usually has a negative effect on recorded video, but combined with intentional camera motion, it forms a unique global motion pattern intrinsic to the video sequence. Therefore a useful application that involves hand jitter would be to identify videos taken by hand-held devices by extracting and matching a compact descriptor entirely based on global motion. We confirm this idea via...
This paper presents adaboost based disguised face discrimination method on embedded devices. The introduced method is simple and fast method for face detection and disguised face discrimination for security purpose.
In this paper, a novel robust grayscale watermarking algorithm based on Two-Levels DCT and Two-Levels SVD is proposed. The watermark signal is (32× 32 × 8) bit gray image. First, the original image is divided into blocks according to the size of the watermark, each block corresponds to each pixel value of watermark. Second, the DCT is applied in each block twice and form new blocks. Then, SVD on the...
Unmanned airship-based remote sensing is widely used in agriculture, remote sensing, environmental monitoring and detection of military camouflage works. A multi-spectral remote sensing image mosaic technique with SIFT feature matching is proposed to deal with images from weak wind, poor stability unmanned airship. Firstly, the characteristics of multi-spectrum image from unmanned airship are analyzed...
Background subtraction involves processing of a video sequence from a static camera to detect the foreground objects in all frames. This paper introduces a robust background subtraction technique, the Adaptive Local Threshold (ALT) algorithm, which it is based on the Approximate Median Filter (AMF). It has been applied to accurately extract the moving vehicles on complex weather traffic videos (i...
A new robust adaptive data hiding method in the wavelet transform domain of an image is introduced in this paper. The proposed steganography method embeds the secret data in the blocks of an image that seems to be noisy based on the bit plane complexity of each block and does not destroy the co-occurrence matrix of wavelet coefficient. Most of the steganalysis methods are based on the moments of histogram...
Growth of the Internet and networked multimedia systems has emphasized the need for copyright protection of the media. Media can be images, audio clips, videos and etc. Digital watermarking is today extensively used for many applications such as authentication of ownership or identification of illegal copies. Digital watermark is an invisible or maybe visible structure added to the original media...
Video text information plays an important role in semantic-based video analysis, indexing, and retrieval. In this paper we proposed a novel text detection approach based on intrinsic characteristics of Farsi text lines, which is more robust to complex backgrounds and various font styles. First, a Gaussian pyramid with two levels is created from input I-frame images. Then, corner histogram analysis...
In this paper a new way for hiding message in digital images is proposed, that is robust against ALE and past other steganalysis methods. It has high capacity and good perceptual transparency and robustness. Proposed steganography method uses 2D int2int wavelet transform and based on Ramani's idea, divides sub bands to 8×8 blocks and constructs bit planes of each block, uses the cawagushi criteria...
The local binary pattern (LBP) method has been widely used in texture analysis because it is excellent property of gray scale invariant. Following the basic idea of the LBP method, many robust versions of the LBP are proposed to class textures, especially the rotational textures. Conventional local binary pattern methods for texture classification are only good for common illumination changes, and...
In this paper, robust descriptors are extracted to detect video copies generated by complicated transformations. The main contribution of the proposed method lies in three aspects. Firstly, the complicated transformations on video copies are identified and tackled to guarantee the extraction of robust descriptors. Secondly, a motion classification approach is proposed to divide the video into video...
This paper proposes a novel algorithm for simultaneous estimation of the bias field and segmentation of tissues for magnetic resonance images. The algorithm formulated by modifying the objective function in the fuzzy C-means algorithm to include a bias field which is modeled as a linear combination of a set of basis functions. Bias field estimation and image segmentation are simultaneously achieved...
Accurate alignment of electron tomographic images without using embedded gold particles as fiducial markers is still a challenge. Here we propose a new markerless alignment method that employs Scale Invariant Feature Transform features (SIFT) as virtual markers. It differs from other types of feature in a way the sufficient and distinctive information it represents. This characteristic makes the following...
This paper presents a novel method for automated thickness measurements of nacre from optical coherence tomography (OCT) using polar transform and probability density projection. Our method detects the upper boundary of nacre and the raw boundary is fitted to a circle by a priori. Then polar transform is applied to the image according to the fitted circle. At the following stage, we extract the lower...
In this paper, we propose a robust video super-resolution reconstruction method based on spatial-temporal orientation-adaptive kernel regression. First, we propose a robust registration efficiency model to reflect the temporal information reliability. Second, we propose a spatial-temporal steering kernel considering motions between frames and structures in each low resolution frame. Simulation results...
In this paper, a simple and robust watermarking algorithm is presented by using the third and the fourth least significant bits (LSB) technique. The proposed algorithm is more robust than the traditional LSB technique in hiding the data inside the image. Using the proposed algorithm, we will embed two bits in the third and fourth LSB. Experimental results show that the quality of the watermarked image...
This paper proposes a reversible visible watermarking method which are contour style. According to the fact that it has informational redundancy in a nature images usually, it is possible to embed watermarking image in the corresponding area of original image. Based on the cryptography method, users can view the original image after remove the visible watermarking by the proposed method. The proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.