Much work has been done on the assessment of texture descriptors for image retrieval in many domains. In this work, we evaluate the accuracy and performance of three well-known texture descriptors - Gabor Filters, GLC...
详细信息
ISBN:
(纸本)9781538622193
Much work has been done on the assessment of texture descriptors for image retrieval in many domains. In this work, we evaluate the accuracy and performance of three well-known texture descriptors - Gabor Filters, GLCM, and LBP - for seismic image retrieval. These subsurface images pose challenges yet not thoroughly investigated in previous works, which are addressed and evaluated in our experiments. We asked for domain experts to annotate two seismic cubes, Penobscot 3D and Netherlands F3, and used them to evaluate texture descriptors, corresponding parameters, and similarity metrics with the potential to retrieve visually similar regions of the considered datasets. While GLCM is used in the vast majority of works in this area, our findings indicate that LBP has the potential to produce satisfying results with lower computational cost.
The popularity of applications using Augmented Reality, especially due to the dissemination of smartphones with high processing power, introduces the need for Fiducial Markers that can be detected quickly, with good a...
详细信息
ISBN:
(纸本)9781538622193
The popularity of applications using Augmented Reality, especially due to the dissemination of smartphones with high processing power, introduces the need for Fiducial Markers that can be detected quickly, with good accuracy and can deal with partial occlusion. Fiducial Markers can have different shapes, sizes, structure and colors, and are inserted into a scene to facilitate the detection and consequent projection of virtual objects. In particular, this paper proposes a new Color-based and Recursive Fiducial Marker (CRFM), which is constructed by square-based geometric forms and uses different colors to produce a recursive structure that was designed to still work under partial occlusion. We describe the CRFM design and how its detection mechanism works. Our evaluation results show that CRFM achieves a good level of accuracy. Moreover, we show that the detection of the CRFM can be as fast as a board of ArUco, where only black and white colors are used.
The acquisition and distribution of child sexual content are some of the most important concerns for legislative systems and law enforcement agencies around the world. There is a great demand for automatic detection o...
详细信息
The acquisition and distribution of child sexual content are some of the most important concerns for legislative systems and law enforcement agencies around the world. There is a great demand for automatic detection of child pornography, mainly due to the large amount of existent data and the facility someone can share this content over the internet. Although there are some proposed methods to automatically detect child pornography content in the literature, there is no available dataset to assess and compare the performance of these methods due to legal restrictions, considering that in many countries the distribution or possession of this material is a crime by Law. To mitigate this problem, we work with the brazilian Federal Police to structure and organize a benchmark methodology for child pornography to make it possible the comparison of distinct categories of child pornography detectors. Therefore, we present in this paper the used methodology for the creation of a new annotated dataset of images of child pornography. We also propose a child pornography detection step-wise methodology based on automatic age estimation combined with a pornography detector, which is evaluated using the described benchmark dataset. The proposed approach achieved results (79.84% accuracy) that overcome two tools currently used by the brazilian Federal Police.
Dark silicon is pushing processor vendors to add more specialized units such as accelerators to commodity processor chips. Unfortunately this is done without enough care to security. In this paper we look at the secur...
详细信息
ISBN:
(纸本)9781538643532
Dark silicon is pushing processor vendors to add more specialized units such as accelerators to commodity processor chips. Unfortunately this is done without enough care to security. In this paper we look at the security implications of integrated Graphical Processor Units (GPUs) found in almost all mobile processors. We demonstrate that GPUs, already widely employed to accelerate a variety of benign applications such as image rendering, can also be used to "accelerate" microarchitectural attacks (i.e., making them more effective) on commodity platforms. In particular, we show that an attacker can build all the necessary primitives for performing effective GPU-based microarchitectural attacks and that these primitives are all exposed to the web through standardized browser extensions, allowing side-channel and Rowhammer attacks from JavaScript. These attacks bypass state-of-the-art mitigations and advance existing CPU-based attacks: we show the first end-to-end microarchitectural compromise of a browser running on a mobile phone in under two minutes by orchestrating our GPU primitives. While powerful, these GPU primitives are not easy to implement due to undocumented hardware features. We describe novel reverse engineering techniques for peeking into the previously unknown cache architecture and replacement policy of the Adreno 330, an integrated GPU found in many common mobile platforms. This information is necessary when building shader programs implementing our GPU primitives. We conclude by discussing mitigations against GPU-enabled attackers.
Structured lighting is a computer vision technique that projects illumination patterns onto the scene to facilitate feature extraction from the captured images. The use of low-cost cameras is avoided not only due to t...
详细信息
ISBN:
(纸本)9781538622193
Structured lighting is a computer vision technique that projects illumination patterns onto the scene to facilitate feature extraction from the captured images. The use of low-cost cameras is avoided not only due to their low image quality but mostly due to the lack of a synchronization mechanism for the illuminators. In this paper we propose a method to synchronize low-cost cameras and illuminators based on the dynamic estimation of the camera sensor exposure and number of lines. At the same time, the use of structured stroboscopic lighting is used to enhance the image quality. Starting with a coarse estimation of the sensor parameters, we developed computer vision algorithms that detect image artifacts created by the structured lighting when the illuminators are not correctly synchronized with the camera frames. The detected artifacts are used to refine the estimation of the sensor parameters and to adjust the firing of the illuminators until a clear picture is obtained. Our technique requires a simple external circuit to control the firing of the illuminators, that is adjusted by software, and allows virtually any modern digital camera to be used in structured lighting applications. We demonstrate the use of this technique in a fast 187 fps robust pupil detector that can be used for gaze interaction applications.
The proceedings contain 45 papers. The topics discussed include: meta-relief texture mapping with dynamic texture-space ambient occlusion;accurate volume rendering based on adaptive numerical integration;a comparison ...
ISBN:
(纸本)9781467379625
The proceedings contain 45 papers. The topics discussed include: meta-relief texture mapping with dynamic texture-space ambient occlusion;accurate volume rendering based on adaptive numerical integration;a comparison of global illumination methods using perceptual quality metrics;BMAX: A bag of features based method for image classification;embedding color watermarks into halftoning images using minimum-distance binary patterns;selection of windows for w-operator combination from entropy based ranking;finger spelling recognition using kernel descriptors and depth images;a highly accurate level set approach for segmenting green microalgae images;BoWFire: detection of fire in still images by integrating pixel color and texture analysis;fast and effective geometric k-nearest neighbors multi-frame super-resolution;streaming graph-based hierarchical video segmentation by a simple label propagation;and histograms of optical flow orientation and magnitude to detect anomalous events in videos.
The advances of the graphics programing unit (GPU) architecture and its rapidly evolving towards general purpose GPU make a series of applications adopt a general purpose (GPGPU) and a graphics computing interoperabil...
详细信息
ISBN:
(纸本)9781538622193
The advances of the graphics programing unit (GPU) architecture and its rapidly evolving towards general purpose GPU make a series of applications adopt a general purpose (GPGPU) and a graphics computing interoperability approach in which the first is used for heavy calculations and the second for 3D graphics rendering. Because GPGPU exposes several hardware features, such as shared memory and thread synchronization mechanism, it allows a developer to write more efficient code. Nevertheless, we conjecture that such hardware features are also available in the graphics computing interface OpenGL 4.5 or later through the graphics concepts: blending, transform feedback, tessellation and instancing. In this paper we assess our conjecture by implementing an N-body simulation with both approaches. We indeed devise a novel non-graphics application to the tessellation hardware and the instanced rendering circuit. Instead of refining a mesh, we use the abstract patch for gaining direct accesses to shared memory. In the place of drawing multiple objects, we apply the instanced rendering technology for improving sequential data accesses. Comparative timing analysis is provided. We believe that these results provide better understanding of the graphics features that are useful for closing the performance gap between OpenGL and a GPGPU architecture, and open a new perspective on implementing solely with the OpenGL graphics applications that require both intense, but pre-specified, memory accesses and 3D graphics rendering.
This paper presents a new technique to solve the single image super resolution reconstruction problem based on multiple extreme learning machine regressors, called here MELM. The MELM employs a feature space of low re...
详细信息
ISBN:
(纸本)9781538622193
This paper presents a new technique to solve the single image super resolution reconstruction problem based on multiple extreme learning machine regressors, called here MELM. The MELM employs a feature space of low resolution images, divided in subspaces, and one regressor is trained for each one. In the training task, we employ a color dataset containing 91 images, with approximately 5.3 million pixels, and PSNR and SSIM as metric evaluation. For the experiments we use two datasets, Set 5 and Set 14, to evaluate the results. We observe MELM improves reconstruction quality in about 0.44 dB PSNR in average for Set 5, when compared with a global ELM regressor (GELM), trained for the entire feature space. The proposed method almost reaches deep learning reconstruction quality, without depending on large datasets and long training times, giving a competitive trade off between performance and computational costs.
In this work we propose an implementation approach to a feature-based algorithm that stitch images which comes form MicroScanner, a low cost digital microscope created at Mogai Information Technology. This program sol...
详细信息
ISBN:
(纸本)9781538622193
In this work we propose an implementation approach to a feature-based algorithm that stitch images which comes form MicroScanner, a low cost digital microscope created at Mogai Information Technology. This program solve the trade-off problem between field of view and resolution. These codes were developed in C++ language, with help of OpenCV library. The sequence of pictures taken is used by the program to reduce computing costs and increase reliability of the resulting mosaic. In addition, the results achieved maintain the quality from original images, and presents better quality and more effective results than previous related works.
Handwriting synthesis generates renderings of text which look like they were written by a human but are in fact synthesized by a model. From an input sample of the desired handwriting, we introduce an algorithm that f...
详细信息
ISBN:
(纸本)9781538622193
Handwriting synthesis generates renderings of text which look like they were written by a human but are in fact synthesized by a model. From an input sample of the desired handwriting, we introduce an algorithm that finds the best match between characters using as source for the output text the large collection of publicly available fonts designed to look like handwriting. For each character in the desired output text, we find the best match among the public fonts using a metric that matches both the shape and appearance of the input real character. Once we have the set of best characters we build the output sentence or paragraph by concatenation of individual characters. Our results show that even though human calligraphy is highly individual and specialized, visually similar renderings are possible for many applications that do not demand full similarity. On a user study with 12 subjects, our synthesis results were considered, on average, 71% similar to the input samples.
暂无评论