Recently, 3D model reconstruction becomes a reality. That is because of using many algorithms that are implemented as automated tools and the ability to process dozens of images which might be calibrated or uncalibrat...
详细信息
A complete framework for automatic calibration of camera systems with an arbitrary number of image sensors is presented. This new approach is superior to other methods in that it obtains both the internal and external...
详细信息
ISBN:
(纸本)081945379X
A complete framework for automatic calibration of camera systems with an arbitrary number of image sensors is presented. This new approach is superior to other methods in that it obtains both the internal and external parameters of camera systems with arbitrary resolutions, focal lengths, pixel sizes, positions and orientations from calibration rigs printed on paper. The only requirement on the placement of the cameras is an overlapping field of view. Although the basic algorithms are suitable for a very wide range of camera models (including OmniView and fish eye lenses) we concentrate on the camera model by Bouguet (http://***/bouguetj/). The most important part of the calibration process is the search for the calibration rig, a checkerboard. Our approach is based on the topological analysis of the corner candidates. It is suitable for a wide range of sensors, including OmniView cameras, which is demonstrated by finding the rig in images of such a camera. The internal calibration of each camera is performed as proposed by Bouguet, although this may be replaced with a different model. The calibration of all cameras into a common coordinate system is an optimization process on the spatial coordinates of the calibration rig. This approach shows significant advantages compared to the method of Bouguet, esp. for cameras with a large field of view. A comparison of our automatic system with the camera calibration toolbox for MATLAB, which contains an implementation of the Bouguet calibration, shows its increased accuracy compared to the manual approach.
The objects detection results are marked with bounding boxes in image. There are lots of redundant bounding boxes in detection results. Generally, the non-maximum suppression (NMS) method is used to remove redundant b...
详细信息
ISBN:
(纸本)9781538668122;9781538668115
The objects detection results are marked with bounding boxes in image. There are lots of redundant bounding boxes in detection results. Generally, the non-maximum suppression (NMS) method is used to remove redundant bounding boxes in detection results to improve accuracy of detection. Opencv is usually used to complete visualization of objects bounding boxes. We compare time of NMS and bounding boxes visualization implemented in FPGA and software in server. The results in hardware performs better. Objects detection has high requirements for real-time performance. Parallel computing capabilities of hardware makes it better than software to implement object detection algorithm and related peripheral algorithms in FPGA. FPGA is a good solution for embedded applications of objects detection. In this paper, we build a FPGA based objects detection system on YOLO, which is a kind of object detection algorithm based on deep learning and we complete the design and verification of hack-end processing module in the system, including NMS module to remove redundant objects bounding boxes and bounding boxes visualization module. We make some changes for the NMS algorithm implementation in hardware. Two modules work together to process 100x61 images including 98x20 object bounding boxes. The remaining bounding boxes what we want after removing redundant hounding boxes are used for display, which ultimately takes 680 s.
This paper presents a surveillance system that is capable of transmitting its geo location and the information from real time images to a central unit in no network zone. The system is further configured for using ima...
详细信息
It is impossible to imagine an industry without a machine. Huge number of machines are working together in industry. Many times if the failure occurs in machine it becomes a challenging task to identify it. Fault may ...
详细信息
A novel image content protection (ICP) method is proposed in this paper. To satisfy the fundamental requirement for ICP, i.e. being robust to non-content operations and sensitive to content tampers simultaneously, a p...
详细信息
ISBN:
(纸本)0780384032
A novel image content protection (ICP) method is proposed in this paper. To satisfy the fundamental requirement for ICP, i.e. being robust to non-content operations and sensitive to content tampers simultaneously, a pixel-level image content map (PICM) is extracted by dynamic weighted averaging. Then, a regional image content map (RICM) is derived through segmentation of PICM and its invariant moments are converted to watermarking bit stream that is embedded in the source image robustly to achieve protection of the content. Various experiments show that the hierarchical content representation, i.e. P-RICM, and its invariant moments have excellent performance in ICP, and our method meets the fundamental criterion well.
This paper describes the design and LSI implementation of a dynamic SIMD/MIMD mode switching processor core (the XC core) for embedded real-time image recognition systems. The XC core supports both a highly parallel S...
详细信息
The development of portable devices such as digital cameras and mobile phones led to higher amount of research being dedicated to image and video processingsystems. In particular, video processing coding technique su...
详细信息
ISBN:
(数字)9781538692790
ISBN:
(纸本)9781538692790
The development of portable devices such as digital cameras and mobile phones led to higher amount of research being dedicated to image and video processingsystems. In particular, video processing coding technique such as High Efficiency Video Coding (HEVC) requires low power consumption for the multimedia applications, this leads to extensive development in low area and high speed algorithms. The log time Discrete Cosine Transform (DCT) is increasingly employed for compression standards, since it has remarkable energy compaction properties. Pipelined and MAC based DCT have been implemented in digital hardware to offer better compression at very low circuit complexity. In this paper, a Time division multiplexing (TDM) based DCT architecture is implemented using the concept of resource sharing principle which possess low computational complexity and high speed. This hardware implementation results in reduced area and increased speed compared to the conventional DCT architectures implemented in Field Programmable Gate Array (FPGA) devices.
This paper proposes a patch-based method to address two of the core problems in imageprocessing: denoising and inpainting. The approach is based on a Gaussian mixture model estimated exclusively from the observed ima...
详细信息
ISBN:
(纸本)9789897580772
This paper proposes a patch-based method to address two of the core problems in imageprocessing: denoising and inpainting. The approach is based on a Gaussian mixture model estimated exclusively from the observed image via the expectation-maximization algorithm, based on which the minimum mean squared error estimate is computed in closed form. The results show that this simple method is able to perform on the same level as other state-of-the-art algorithms.
Mac-Cormack's scheme is elaborated to approximate the solution of shock filtering equation in image enhancement. This scheme is in second order approximation of spatial and time variables. Here, the comparison res...
详细信息
ISBN:
(数字)9783030198077
ISBN:
(纸本)9783030198077;9783030198060
Mac-Cormack's scheme is elaborated to approximate the solution of shock filtering equation in image enhancement. This scheme is in second order approximation of spatial and time variables. Here, the comparison results of upwind and Mac-Cormack's scheme are given. The results show that Mac-Cormack's scheme is able to preserve the edge discontinuity. For evaluating the performance of numerical results, the discrete L-2 norm error for both numerical schemes is given. From several experiments, along the increasing of image sizes, the error of Mac-Cormack's scheme is observed getting smaller. For instance, using image sizes (64,64) the error is obtained 0.13762, meanwhile using (512,512) the error is observed 0.06640.
暂无评论