With rapid development in mobile devices with high quality image and video processing capabilities, it is desirable or necessary to implement steganography technology within such devices in some applications such as s...
详细信息
ISBN:
(纸本)9781509003051
With rapid development in mobile devices with high quality image and video processing capabilities, it is desirable or necessary to implement steganography technology within such devices in some applications such as source authentication. In this paper, we propose a method of implementing information hiding within a video with less processing time and memory requirement. The message to be secretly communicated is hidden in the video by modifying blocks of Discrete Wavelet Transform coefficients of feature regions. We choose corners as specific features. The localizable capability of both corner detection algorithm and the Discrete Wavelet Transform makes it possible for the entire embedding method to be localized. This makes the entire process of steganography computationally faster and memory efficient. Our simulations show that the proposed method has a processing time that is up to 2.6 times more efficient, in average, than other traditional methods without incurring memory overhead.
AprilTags and other passive fiducial markers require specialized algorithms to detect markers among other features in a natural scene. The vision processing steps generally dominate the computation time of a tag detec...
详细信息
ISBN:
(纸本)9781509037636
AprilTags and other passive fiducial markers require specialized algorithms to detect markers among other features in a natural scene. The vision processing steps generally dominate the computation time of a tag detection pipeline, so even small improvements in marker detection can translate to a faster tag detection system. We incorporated lessons learned from implementing and supporting the AprilTag system into this improved system. This work describes AprilTag 2, a completely redesigned tag detector that improves robustness and efficiency compared to the original AprilTag system. The tag coding scheme is unchanged, retaining the same robustness to false positives inherent to the coding system. The new detector improves performance with higher detection rates, fewer false positives, and lower computational time. Improved performance on small images allows the use of decimated input images, resulting in dramatic gains in detection speed.
Texture synthesis is a fast growing technique in imageprocessing, and has been widely used in real time processes. During this process a texture is taken as sample input and various methods and techniques are applied...
详细信息
ISBN:
(纸本)9781467384384
Texture synthesis is a fast growing technique in imageprocessing, and has been widely used in real time processes. During this process a texture is taken as sample input and various methods and techniques are applied to synthesis that texture to produce a large synthesized texture with user defined size and similar texture characteristics. Methods and techniques used are tiling and synthesis based on patches, pixels and exemplar. Quality of the synthesized texture and synthesis time is one of the major concerns during the process. A survey is taken on various techniques used to improve the quality and synthesis time of the texture.
Sophisticated computational imaging algorithms require both high performance and good energy-efficiency when executed on mobile devices. Recent trend has been to exploit the abundant data-level parallelism found in ge...
详细信息
Sophisticated computational imaging algorithms require both high performance and good energy-efficiency when executed on mobile devices. Recent trend has been to exploit the abundant data-level parallelism found in general purpose programmable GPUs. However, for low-power mobile use cases, generic GPUs consume excessive amounts of power. This paper proposes a programmable computational imaging processor with 16-bit half-precision SIMD floating point vector processing capabilities combined with power efficiency of an exposed datapath. In comparison to traditional VLIW architectures with similar computational resources, the exposed datapath reduces the register file traffic and complexity. These and the specific optimizations enabled by the explicit programming model enable extremely good power-performance. When synthesized on a 28nm ASIC technology, the accelerator consumes 71mW of power while running a state-of-the-art denoising algorithm, and occupies only 0.2mm 2 of chip area. For the algorithm, energy usage per frame is 7mJ, which is 10x less than the best found GPU-based implementation.
Compressed sensing is a technique that is suitable for compressing and recovering signals having sparse representations in certain bases. Compressed sensing has been widely used to optimize the measurement process of ...
详细信息
ISBN:
(纸本)9791092279115
Compressed sensing is a technique that is suitable for compressing and recovering signals having sparse representations in certain bases. Compressed sensing has been widely used to optimize the measurement process of power and bandwidth constrained systems like wireless body sensor network. The central issues with compressed sensing are mainly the construction of measurement matrices and the development of efficient recovery algorithms. In this paper, we proposed a simple and fast recovery algorithm which performed a thresholding in the discrete cosine transform domain. We validated it by recovering electrocardiogram and electromyogram signals taken from the Phyiobank database. The simulation and experimental results have shown that the proposed recovery algorithm was 25 and 12 times faster than orthogonal matching pursuit and stagewise orthogonal matching pursuit, respectively. In addition, depending on the compression ratio, the signal-to-noise ratio of recovered signals were improved up to 2 dB.
Early forest fire alarm systems are critical in making prompt response in the event of unexpected *** cameras,improvements in memory,and enhanced computation power have all enabled the design and real-time application...
详细信息
ISBN:
(纸本)9781467383196
Early forest fire alarm systems are critical in making prompt response in the event of unexpected *** cameras,improvements in memory,and enhanced computation power have all enabled the design and real-time application of fire detecting algorithms using light and smallsize embedded surveillance *** is vital in situations where the performance of traditional forest fire monitoring and detection techniques are *** paper presents a forest fire monitoring and detection method with visual sensors onboard unmanned aerial vehicle(UAV).Both color and motion features of fire are adopted for the design of the studied forest fire detection *** is for the purpose of improving fire detection performance,while reducing false alarm *** experiments are conducted to demonstrate the effectiveness of the studied forest fire detection methodologies.
Automatic object recognition for texture-less objects using computer vision is a difficult task in comparison of textured one since class discriminative information is rarely available. Herein, an algorithm to count s...
详细信息
Automatic object recognition for texture-less objects using computer vision is a difficult task in comparison of textured one since class discriminative information is rarely available. Herein, an algorithm to count such objects using shape and color attributes for recognition with scale, rotation and illumination invariance is proposed. Initially, the algorithm extracts shape and color features of the prototype image to find its instance in the real-time pre-processed scene image captured by the vision interface. The pre-processing is achieved by morphological boundary extraction and segmentation techniques. Color and shape features are extracted based on mean hue value and Hu-moments respectively from the obtained segments. SVM, kNN, neural network and tree-bagging are then applied for classification. Tree-bagging is found to eclipse over the other classifiers in terms of accuracy. Finally, the classified objects are counted and localized in the image by drawing bounding boxes around them. A desktop application of the proposed algorithm is also developed. To assess the performance of the proposed algorithm, experimentation has been carried out for various objects having different shapes and colors. The algorithm proved out to be robust and effective for recognition and counting of the texture-less objects.
Compare with the infra-ray light gaze tracking systems, the visible light gaze tracking (VLGT) design provides new applications to consumer electronics. However, the VLGT suffers from the technical difficulties of acc...
详细信息
ISBN:
(纸本)9781467383653
Compare with the infra-ray light gaze tracking systems, the visible light gaze tracking (VLGT) design provides new applications to consumer electronics. However, the VLGT suffers from the technical difficulties of accommodating various illumination conditions and unstable image features. These system design issues lead to the problem of low accuracy in estimating iris center location and high computational complexity. Leveraging from our previous work, we further improve the algorithm of ellipse matching for the iris region and the mapping function, whereas the average angular errors are less than 0.45° for both horizontal and vertical directions.
An important element of the modern automated control systems, monitoring and remote access is to obtain primary information about the state and behavior of static or moving objects. To obtain such information we propo...
详细信息
ISBN:
(纸本)9781467383844
An important element of the modern automated control systems, monitoring and remote access is to obtain primary information about the state and behavior of static or moving objects. To obtain such information we propose to use photo and video detectors, which could provide images of objects with high resolution in the system. Thus, the possibility of determining the geometric and kinematic parameters of the moving object are significantly reduced because of the different aspects of producing an image, one of these aspects is the blur. The geometric parameters of the object are determined by analyzing the blur of its images obtained at different settings of the photodetector. In this paper, algorithms of processing of primary information are improved by the use of methods and procedures of statistical analysis and probabilistic approach. It increases the accuracy of determined characteristics, the applicability of procedures for the calculation of state parameters (size, shape, distance from observer) and behavior parameters of the object (speed and direction) and reduces the computational complexity of the final algorithm. The research allows not only determine the geometric parameters of the object, but also to evaluate their accuracy and to develop elements of the algorithm that can be used in real systems of video monitoring
In this paper, it is shown that the Enhanced Unified Camera Model, which is used to model fisheye cameras, projects straight lines into conic sections. Then a way to find equations of straight line projections is prop...
详细信息
ISBN:
(纸本)9781509035502
In this paper, it is shown that the Enhanced Unified Camera Model, which is used to model fisheye cameras, projects straight lines into conic sections. Then a way to find equations of straight line projections is proposed. The method is applied to epipolar curves to adapt the Semi-Global Matching algorithm to fisheye stereo systems to compute a dense direct stereo correspondence without undistortion and rectification of fisheye images. It is done by efficient image sampling along an epipolar curve, using an algorithm for rasterization of implicit curves. A C++ implementation is available online.
暂无评论