Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
To maintain the secrecy of information, various information hiding techniques are used. Steganography is one of them, which means hide information inside another digital media like text, image, audio, video etc. without being detected by human visual system (HVS). Recently Video steganography has become a strong tool to hide large amount of data rather than image steganography. This paper is proposing...
Conventional unsupervised image segmentation methods return many superpixels or object parts and thus tend to over-segmentation. In this paper, we present a novel post-processing approach for unsupervised object-level image segmentation (UnOLIS). Starting with the results of any conventional unsupervised segmentation method, we first combine a global region-based saliency and a robust background feature...
In this paper, an effective approach for dehazing and enhancing outdoor images is proposed. The dark channel prior is used to estimate a raw transmission map. This transmission map is then refined using guided image filtering under the guidance of the hazy image. For colors and details enhancement, the adaptive manifolds high-dimensional filtering is applied to the recovered scene radiance. The proposed...
Error tolerant graph matching is required not only in many realistic object recognition scenarios, but also in different domains such as document analysis and mechanical drawings. This paper presents such a technique using a distortion-free graph embedding, reformulating the problem as that of finding errortolerant point matching in the geometric space. The embedding works by finding the distance...
Most of latest-generation multimedia systems are equipped with increasingly-effective object detection algorithms (e.g., intelligent video surveillance systems, augmented reality applications, sharing platforms for multimedia data, etc.). Unfortunately, image and video compression makes object detection more difficult since such operations erase most of the computed visual features. In this paper...
Layout pattern classification has been utilized in recent years in integrated circuit design towards various goals such as design space analysis, design rule generation, and systematic yield optimization. There is a need for open source or academic solutions as very limited vendors are available to provide this functionality. Speed and accuracy are key aspects to target in the solutions. Given a circuit...
Excessive temperature rise leads to majority of failures in electrical equipment. Therefore, the thermal monitoring always plays a significant role for identifying incipient faults. Now a days cost effective, reliable and non contact type infrared thermographic inspection system is being widely utilized for monitoring and fault diagnosis. In this paper, thermal images of some electrical equipment...
Online Social Networks have emerged as an interesting area for analysis where each user having a personalized user profile interact and share information with each other. Apart from analyzing the structural characteristics, detection of abnormal and anomalous activities in social networks has become need of the hour. These anomalous activities represent the rare and mischievous activities that take...
In today's computerized field digital image processing needs the efficient images with less distortions and the main process occurs through it is image fusion. Image Fusion is a procedure of converging of two images or more than two images or mixing of the corresponding and also the basic components of set of comparative bended, inadequate or noised images, to create a resultant image. The prioritic...
The main emphasis of this paper is to develop an approach able to detect and assess blindly the perceptual blur degradation in images. The idea deals with a statistical modelling of perceptual blur degradation in the frequency domain using the discrete cosine transform (DCT) and the Just Noticeable Blur (JNB) concept. A machine learning system is then trained using the considered statistical features...
We propose a new framework for evaluating image enhancement methods. In this work, we focus on contrast enhancement, and use the joint probability and the mutual information derived from the image co-occurrence matrix to determine the proposed index. We show that the second order entropy and the mutual information can be used jointly for tracking and evaluating the effect of contrast enhancement....
As a very valuable cultural heritage, palm leaf manuscripts offer a new challenge in document analysis system due to the specific characteristics on physical support of the manuscript. With the aim of finding an optimal binarization method for palm leaf manuscript images, creating a new ground truth binarized image is a necessary step in document analysis of palm leaf manuscript. But, regarding to...
Social networks play an important role in the dissemination of information and the spread of influence. Identifying the most influential individuals spreading information or infectious diseases can assist or hinder information dissemination, product exposure, and contagious disease detection. The leader or influential members may be even more critical to product diffusion and the formation of widespread...
Graph partitioning, or graph cut, has been studied by several authors as a tool for image segmentation. It refers to partitioning a graph into several subgraphs such that each of them represents a meaningful object of interest in the image. In this work we propose a hierarchical agglomerative clustering algorithm driven by the cut and mean cut criteria. Some preliminary experiments were performed...
Bokeh is a popular photograph technique that aesthetically highlights the image subject by properly blurring the background contents. While a large number of bokeh images can be found in our albums, the impacts of bokeh on visual saliency has not been studied yet. Our study shows that traditional saliency models do not perform well on bokeh images in that the foreground/background cannot be efficiently...
Images acquired and processed in communication and multimedia systems are often noisy. Thus, pre-filtering is a typical stage to remove noise. At this stage, a special attention has to be paid to image visual quality. This paper analyzes denoising efficiency from the viewpoint of visual quality improvement using metrics that take into account human vision system (HVS). Specific features of the paper...
Evaluating influential nodes is one of the fundamental problems in large scale networks having wide range of applications. The centrality metric, in particular betweenness centrality plays a significant role in ranking influential nodes. Existing exact algorithms for evaluating betweenness centrality metric consider the entire network and hence incur high computational cost. In this paper, we reduce...
A novel no-reference video quality assessment is proposed in this paper. The proposed metric is based on the combination of two-pass edge analysis and background subtraction. The two-pass edge analysis is a blur metric we proposed in our previous work, which has gain an efficient performance in image blur assessment and other image processing applications. We apply the two-pass edge analysis to the...
In this paper, a novel similar background components connection algorithm is presented to detect colorful texts. Before, the components were extracted accurately according to a color-based stroke width extraction rule proposed in the paper. In the stage of filtering non-text components, a specially designed metric is presented to adjust the parameter values of the filter, so that the filter is more...
Existed methods of code clones detection have some restrictions. Textual and lexical approaches cannot detect strongly modified fragments of code. Syntactic and metrics based approaches detect strong modifications with low accuracy. On the contrary, semantic approach accurately detects the cloned fragments of code with small changes as well as the strongly modified ones. Methods based on this approach...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.