The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data Matrix barcode is one of the most extensively used 2D barcodes. During the flow process of Data Matrix barcode decoding, barcode localization is the first and non-trivial step for the latter steps, like affine transformation adjustment, fine-level foreground region extraction etc. In this paper, an innovative method for Data Matrix barcode localization based on boundary tracking and Radon transform...
This paper gives a new method to measure the speed of strip based on linear CCD. For the surface of any strip, the image signal collected by linear CCD can be seen as image with strip feature by accumulating for a while, and the directivity of the strip relate to the speed of the strip. The power spectrum of the strip image can reflect the degree of thickness and the directivity of the strip. So the...
2D barcode recognition technique and system play an important role in the industry application. It is extremely challenging to locate and recognize barcodes when the background is cluttered and the illumination is uneven. In this paper, we propose a hierarchical framework for 2D Data Matrix recognition and further introduce the 2D barcode recognition system based on the proposed method. The superiority...
By the preprocessing method of the integration with the median filter and the linear transform of gray value, and the evaluation function based on power spectrum, an auto-focusing model is built. From the character of the image focusing algorithm based on power spectrum, the paper has designed the structural frame and algorithm flow of the image processing module, and proposed the pipelining structure,...
Dependable 3D perception modules are essential for safe operation of autonomous systems. Therefore, we present a highly compact stereo vision system that gets along without a dedicated processing platform, having the DSPs integrated in the cameras. To enable the computation of dense and accurate depth maps, we implement a Sparse Census Transform, reducing the complexity of the stereo matching procedure...
The Hough transform is a feature extraction technique used in image analysis, computer vision and digital image processing. Usually it is used for detecting straight lines and curves. The purpose of the technique is to find imperfect instances of patterns within a certain class of shapes by a voting procedure. An improved Hough transform is proposed by using interval arithmetics in the accumulation...
The grain size is an important quality index of granular materials. The accurate measurement of it has a guiding significance for technical performances and application of subsequent processing. Currently most of particle detection are done by manual operation such as screening method, which causes many problems as time-consuming measurement and lengthy testing steps. The particle size detection technology...
This paper uses the open source computer vision library (OpenCV for short) as basic library and calls library functions to achieve real-time video capture and output. We narrate the process of making the matrix interpretable as an image through analyzing the data structure of IplImage and meaning of its member variable. The library functions to read video take the video frame for unit and the storage...
We present a novel blind digital watermarking algorithm using the quantization for Jaguwen rubbing image based on Contourlet transform in this paper. After Contourlet transform, original image is decomposed into a series of multiscale, local and directional subimages. Select the low frequency subband as the watermarking embedding domain. At the same time, the original binary watermark is firstly scrambled...
Thinning is a process of reducing an object in a digital image to the minimum size necessary for machine recognition of that object. Efficient and reliable thinning of image patterns is essential to a variety of applications in the field of image analysis and recognition system. In this paper we propose two new iterative algorithms for thinning binary images. In the first algorithm, thinning is accomplished...
This paper presents a novel approach for recognition of unconstrained handwritten Marathi characters. The recognition is carried out using multistage feature extraction and classification scheme. The initial stages of feature extraction are based upon the structural features and the classification of the characters is done according to their parameters. The final stage of feature extraction employs...
One of the major issues in document image processing is the efficient creation of ground truth in order to be used for training and evaluation purposes. Since a large number of tools have to be trained and evaluated in realistic circumstances, we need to have a quick and low cost way to create the corresponding ground truth. Moreover, the specific need for having the correct text correlated with the...
An approach for the detection of decorative elements - such as initials and headlines - and text regions, focused on ancient manuscripts, is presented. Due to their age, ancient manuscripts suffer from degradation and staining as well as ink is faded-out over the time. Identifying decorative elements and text regions allows indexing a manuscript and serves as input for Optical Character Recognition...
Document image segmentation to text lines is a critical stage towards unconstrained handwritten document recognition. Although morphological operations proved to be effective in processing machine-printed documents for several issues, similar methods for unconstraint-handwritten documents lack accuracy. We propose an efficient method based on binary morphology for text-line segmentation in such documents...
We propose a method for the creation of object markers used in watershed segmentation of rock images. First, we use adaptive thresholding to segment the rock image since rock particles local background is often different from surrounding particle regions. Object markers are then extracted using the compactness of objects and adaptive morphological reconstruction. The choice of the feature compactness...
In this paper, a blind video watermarking algorithm based on 3D wavelet transform and Human Visual System (HVS) model is proposed. The proposed method is based on extracting temporal characteristics of video signal and using it to adjust spatial features of each frame. These frames are designed based on HVS model embed the message. Then the message will be extracted from video watermarked through...
As an important field in information security, image encryption algorithm has been a research focus. At the same time there are few works on fractal set as the encryption key among various encryption algorithms. In the paper, Mandelbrot set (abbreviated as M set) and the Hilbert transformation are utilized to generate the random key. Since M set can be iterated from only a few parameters, it can reduce...
This paper analyzes a new image encryption scheme proposed in "A new encryption based on Henon mapping" and proves that this encryption algorithm is insecure in the image-known attack. By analyzing the properties of the round function, there are two weaknesses: on the one hand, the confusing process will not completely destroy the correlation of image pixels, on the other hand, because of...
Multiscale Geometry Analysis consistent with the best features of the image representation, is effective for high dimensional function approximation and can use the image of the geometric regularity. In this article, we will mainly discuss the transformation of the Beam let based on Multiscale Geometry Analysis, formulate its theoretical basis, and by Matlab simulation results show the advantages...
A new pre-processing method through a newly proposed image transform scheme is presented in this paper. It enhances the efficiency of entropy encoders in the compression of images. Before an entropy encoder encodes a stream of pixel values in an image, the proposed method adaptively performs the new image transform under various transform patterns and then selects the transformed image with the least...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.