Predicting/estimating the 6DoF pose parameters for multi-instance objects accurately in a fast manner is an important issue in robotic and computer vision. Even though some bottom-up methods have been proposed to be a...
详细信息
ISBN:
(纸本)9781728185514
Predicting/estimating the 6DoF pose parameters for multi-instance objects accurately in a fast manner is an important issue in robotic and computer vision. Even though some bottom-up methods have been proposed to be able to estimate multiple instance poses simultaneously, their accuracy cannot be considered as good enough when compared to other state-of-the-art top-down methods. Their processing speed still cannot respond to practical applications. In this paper, we present a faster and finer bottom-up approach of deep convolutional neural network to estimate poses of the object pool even multiple instances of the same object category present high occlusion/overlapping. Several techniques such as prediction of semantic segmentation map, multiple keypoint vector field, and 3D coordinate map, and diagonal graph clustering are proposed and combined to achieve the purpose. Experimental results and ablation studies show that the proposed system can achieve comparable accuracy at a speed of 24.7 frames per second for up to 7 objects by evaluation on the well-known Occlusion LINEMOD dataset.
Depth acquisition for moving objects becomes increasingly critical for some applications such as human facial expression recognition. This paper presents a method for capturing the depth maps of moving objects that us...
详细信息
ISBN:
(纸本)9781479902880
Depth acquisition for moving objects becomes increasingly critical for some applications such as human facial expression recognition. This paper presents a method for capturing the depth maps of moving objects that uses a one-shot black-and-white stripe pattern with the features of simplicity and easily generation. Considering the accuracy of a matching is crucial for a precise depth map but the matching of variant-width stripes is sparse and rough, the phase differences extracted by Gabor filter to achieve a pixel-wise matching with sub-pixel accuracy are used. The details of the derivation are presented to prove that this method based on the phase difference calculated by Gabor filter is valid. In addition, the periodic ambiguity of the encoded stripe is eliminated by the epipolar segment covering a given depth range at a camera-projector calibrating stage to decrease the calculation complexity. Experimental results show that our method can get a dense and accurate depth map of a moving object.
This paper deals with the joint use of connected operators and image inpainting for image filtering. Connected operators filter the image by merging its flat zones while preserving contour information. image inpaintin...
详细信息
ISBN:
(纸本)9780819466211
This paper deals with the joint use of connected operators and image inpainting for image filtering. Connected operators filter the image by merging its flat zones while preserving contour information. image inpainting restores the values of an image for a destroyed or consciously masked subregion of the image domain. In the present paper, it will be shown that image inpainting can be combined with connected operators to perform an efficient geometrical filtering technique. First, connected operators are presented and their drawbacks for certain applications are highlighted. Second, image inpainting methodology is introduced and a structural image inpainting algorithm is described. Finally, a general filtering scheme is proposed to show how the drawbacks of connected operators can be efficiently solved by structural image inpainting.
This paper describes an attack on semi-fragile image authentication schemes proposed in papers In this attack, the adversary manipulates an authentic image and queries a verifier with the corrupted image. According to...
详细信息
ISBN:
(纸本)0819450235
This paper describes an attack on semi-fragile image authentication schemes proposed in papers In this attack, the adversary manipulates an authentic image and queries a verifier with the corrupted image. According to the answers from the verifier, the adversary can disclose the secret relationship graphs used to produce a signature. With the disclosed relationship graphs, the adversary can impersonate an innocent person to forge authentic images easily. A countermeasure to this attack is to change scheme parameters with the relationship edges so that the relationship graphs reconstructed by the attacker are different from the original one. Sequentially, the attacker is hard to forge an authentic image without correct relationship graphs.
Medical images generate enormous amounts of data and therefore, efficient image compression techniques need to be employed in order to save on cost and time of storage and transmission respectively. In this research w...
详细信息
ISBN:
(纸本)9781467355636;9781467355629
Medical images generate enormous amounts of data and therefore, efficient image compression techniques need to be employed in order to save on cost and time of storage and transmission respectively. In this research work, we propose a new lossy compression technique by using singular value decomposition (SVD) followed by Huffman coding. In the proposed technique firstly the image is decomposed by using SVD and then the rank is being reduced by ignoring some of the lower singular values as well as rows of hanger and aligner matrices. Then the reconstructed lossy image is being compressed again by using Huffman coding. The compression ratio is obtained by multiplication of the compression ratio achieved by using SVD with the compression ratio achieved by using Huffman coding. The proposed technique is tested on several medical images. The obtained results were also compared with those of conventional Huffman coding and JPEG2000. The quantitative and visual results are showing the superiority of the proposed compression technique over the aforementioned compression technique.
Human faces are always the focus of visual attention since faces can provide plenty of information. Although some visual attention models incorporating face cues work better in scenes containing faces, no visual atten...
详细信息
ISBN:
(纸本)9781467373142
Human faces are always the focus of visual attention since faces can provide plenty of information. Although some visual attention models incorporating face cues work better in scenes containing faces, no visual attention model is particularly designed for faces. On faces, many high-level factors will influence visual attention distribution. In practice, there are many visual communication systems in which faces occupy the scenes, such as video calls. Specific visual attention model designed for face images will be of great value in these circumstances. In this paper, we conduct research on visual attention analysis and modelling on human faces. To facilitate this research, we collect 120 face images and perform eye-tracking experiments with these images. Eye-movement data shows that detailed visual attention allocation exists on faces. Using face detection and facial landmark localization, we find that some facial features are highly effective for visual attention prediction. The performance of many visual attention models can be improved by incorporating those facial features.
With the ease of distribution of digital images, there is a growing concern for copyright control and authentication. While there are many existing watermarking and data hiding methods for natural images, almost none ...
详细信息
ISBN:
(纸本)0819437034
With the ease of distribution of digital images, there is a growing concern for copyright control and authentication. While there are many existing watermarking and data hiding methods for natural images, almost none can be applied to halftone images. In this paper, we proposed a novel data hiding method, Modified Data Hiding Ordered Dithering (MDHED) for halftone images. MDHED is an effective method to hide a relative amount of data while yielding halftone images with good visual quality Besides, the amount of hidden data is easy to control and the security depends on the key not the system itself.
The great potential of `foveated imaging' lies in the entropy reduction relative to the original image while minimizing the loss of visual information. Utilizing human foveation combined with video compression, as...
详细信息
The great potential of `foveated imaging' lies in the entropy reduction relative to the original image while minimizing the loss of visual information. Utilizing human foveation combined with video compression, as well as communication and human-machine interface techniques, more efficient multimedia services are expected to be provided in the near future. In this paper, we introduce a prototype for foveated visualcommunications as one of future human interactive multimedia applications, and demonstrate the benefit of the foveation over fading statistics in the downtown area of Austin, Texas. In order to compare the performance with regular video, we use spatial/temporal resolution and source transmission delay as the evaluation criteria.
This paper proposes a new image steganography method of hiding multiple secret images (2 bit binary image) in a single cover image (24 bit cover image). According to the proposed method, one of the secret images is em...
详细信息
ISBN:
(纸本)9781479980819
This paper proposes a new image steganography method of hiding multiple secret images (2 bit binary image) in a single cover image (24 bit cover image). According to the proposed method, one of the secret images is embedded in a randomized nature in one of the primary color matrix of the color cover image using the least significant bit substitution technique. The other secret images are encrypted using the first secret image. From the stego-image, the first secret image embedded randomly in the cover image is extracted and then this extracted image is used to decode the remaining secret images. The focus is to secure the transmitted information even if the channel is revealed, to recognize the authenticity of the extracted images and increase the hiding capacity in a single 24-bit image maintaining the visual quality of the stego-image. Results reveal that the proposed method has low error, comparatively fast computational speed and satisfactory visual quality of the stego-image.
visual cryptography scheme is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. In t...
详细信息
ISBN:
(纸本)9783642227134
visual cryptography scheme is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. In this article, we propose a novel scheme for copyright protection for digital images based on visual cryptography. The proposed method employs encoding of Most Significant bits of host image which is to be copyrighted, to form a master image share. The master share is encoded with a copyright image to form another share called ownership share. The master share is kept with a central authority and ownership share is kept by the copyright owner. In case of any dispute, the master shares and ownership shares can be stacked together to give the copyright image verifying the ownership about the host image. The important feature of our procedure is that we don not disturb the host image either during copyright generation nor during copyright verification. The proposed method is also independent of the size of secret image.
暂无评论