In contemporary times, one of the most crucial requirements for digital signal processing is high power efficiency. Realizing different multimedia applications, such as processingimages and videos, requires digital s...
详细信息
During the development of machine vision setups for industrial applications, namely automatic visual inspection systems, the type of required lighting and correct illumination position and intensity are often not know...
详细信息
ISBN:
(纸本)9783031662706;9783031662713
During the development of machine vision setups for industrial applications, namely automatic visual inspection systems, the type of required lighting and correct illumination position and intensity are often not known in advance. In order to solve a specific machine vision task, an engineer needs to propose and implement a suitable imageprocessing algorithm and design the accompanying lighting system. Testing different illumination concepts, especially "in the field", using off-the-shelf lighting systems is time consuming. The paper presents a custom-made, cost effective, transportable and flexible system which may be used for testing different illumination techniques and simultaneously control multiple lighting modules. In addition to the hardware part, the developed software used for control the system is presented in the paper. The proposed device usefulness is demonstrated by solving a suitable multi-light digitalimageprocessing task.
Mathematical methods for restoration of multidimensional signals and images distorted and noisy during their processing by linear stationary systems using test trials of these systems are considered. The use of test s...
详细信息
At present, the widespread practice for image watermarking involves using handheld devices in unstructured conditions for image authentication. Print-cam watermarking specifically employs a smartphone camera to captur...
详细信息
In the era of cloud computing and data-driven applications, it is crucial to protect sensitive information to maintain data privacy, ensuring truly reliable systems. As a result, preserving privacy in deep learning sy...
详细信息
ISBN:
(纸本)9798350344868;9798350344851
In the era of cloud computing and data-driven applications, it is crucial to protect sensitive information to maintain data privacy, ensuring truly reliable systems. As a result, preserving privacy in deep learning systems has become a critical concern. Existing methods for privacy preservation rely on image encryption or perceptual transformation approaches. However, they often suffer from reduced task performance and high computational costs. To address these challenges, we propose a novel Privacy-Preserving framework that uses a set of deformable operators for secure task learning. Our method involves shuffling pixels during the analog-to-digital conversion process to generate visually protected data. Those are then fed into a well-known network enhanced with deformable operators. Using our approach, users can achieve equivalent performance to original images without additional training using a secret key. Moreover, our method enables access control against unauthorized users. Experimental results demonstrate the efficacy of our approach, showcasing its potential in cloud-based scenarios and privacy-sensitive applications.
Scanning electron microscopy (SEM) has emerged as a pivotal tool in scientific research and engineering, offering unparalleled insights into the micro- and nano-scale world. However, traditional SEM systems often enta...
详细信息
This paper presents a novel approach to computational art focusing on mandalas-an iconic heritage of Indian art that has proliferated significantly in recent times. Our innovative software allows users to input a hand...
详细信息
ISBN:
(纸本)9798400710759
This paper presents a novel approach to computational art focusing on mandalas-an iconic heritage of Indian art that has proliferated significantly in recent times. Our innovative software allows users to input a handcrafted mandala and select specific motifs for error rectification. The rectification leverages vector information for geometric discretization alongside a simple GCD rule, adhering to traditional mandala principles. The rectified image, being in vector form, allows various real-time operations in the vector space, such as insertion, deletion, or modification of motifs or layers, facilitating enhancements, enlargements, or creation of new compositions. We demonstrate the software's merit and versatility through various examples, highlighting its potential for special applications such as digital artistry with mandalas, including teaching and training. This work not only advances the field of computational art but also promises to preserve and enhance the rich tradition of mandala art through modern technology.
Compressed sensing (CS) is a method for accelerating MRI acquisition by acquiring less data through undersampling of Fourier space (k-space). Existing deep learning-based CSMRI methods are commonly concerned with opti...
详细信息
ISBN:
(纸本)9798350349405;9798350349399
Compressed sensing (CS) is a method for accelerating MRI acquisition by acquiring less data through undersampling of Fourier space (k-space). Existing deep learning-based CSMRI methods are commonly concerned with optimizing datadriven network models with input undersampled data points and an efficient learning framework. Generative modelling is a learning framework employed in different applications for learning an abstract distribution of observed data and thereby generating new data points similar to the true features. In this regard, the current work proposes a Generative Adversarial Network (GAN) based Cross Domain Extrapolation Generative Adversarial Network (CdE-GAN) that incorporates an extrapolation mechanism through decoder-type architectural design to represent the fine details with a large set of pixels. The results obtained from the experiments show that the extrapolation network enables robust and accurate estimation of missing frequencies, alleviating the structural artifacts at higher acceleration/downsampling factors compared to state-of-the-art methods.
With the advent of the digital age, as a key medium for information dissemination, the security and privacy protection of sensitive information carried by images have become increasingly important. This study conducte...
详细信息
ISBN:
(纸本)9798350375343;9798350375336
With the advent of the digital age, as a key medium for information dissemination, the security and privacy protection of sensitive information carried by images have become increasingly important. This study conducted in-depth research on the recognition and protection mechanism of sensitive information in image samples, and proposed a comprehensive technical solution. By constructing a multi-level convolutional neural network (CNN) architecture and combining multimodal information such as EXIF data and text descriptions, this study achieved comprehensive recognition of sensitive content in images. In addition, the study also designed a series of protection mechanisms, including encryption technology, anonymization processing, and emphasized the importance of complying with laws, regulations, and ethical guidance. The research results not only improve the accuracy and efficiency of sensitive information recognition, but also provide solid technical and legal support for image privacy protection.
This paper presents a novel comparative study between two prominent compressed sensing algorithms - Orthogonal Matching Pursuit (OMP) and Iterative Hard Thresholding (IHT) - within the context of digital holography, s...
详细信息
ISBN:
(纸本)9781510673151;9781510673144
This paper presents a novel comparative study between two prominent compressed sensing algorithms - Orthogonal Matching Pursuit (OMP) and Iterative Hard Thresholding (IHT) - within the context of digital holography, specifically focusing on their efficacy in handling phase discontinuities. Previous research has predominantly centered on Gibbs ringing artifacts in image reconstruction and their mitigation. However, the aspect of phase discontinuities, which are critical in holographic imaging, has not been extensively explored. Our study implement both OMP and IHT algorithms in a simulated digital holographic environment, where phase discontinuities are inherent due to the nature of holographic imaging. We analyze how these algorithms perform in the presence of phase discontinuities. We quantitatively analyze the performance of each algorithm in handling phase discontinuities. Additionally, our study delves into the computational efficiency of both algorithms, considering their practical applicability in real-time holographic imaging systems. The results of our comparative analysis provide insights into the advantages and limitations of OMP and IHT in the context of phase discontinuities. Our findings have significant implications for advancing digital holography, particularly in applications requiring precise phase information, such as medical imaging, microscopy, and non-destructive testing.
暂无评论