The watershed transform is a well established tool for the segmentation of images. However, watershed segmentation is often not effective for textured regions that are perceptually homogeneous. Such regions are usuall...
详细信息
The watershed transform is a well established tool for the segmentation of images. However, watershed segmentation is often not effective for textured regions that are perceptually homogeneous. Such regions are usually inaccurately over-segmented with no reference to any texture changes. We now introduce a novel concept of “texture gradient” implemented using a non-decimated complex wavelet transform. A novel marker location algorithm is subsequently used to locate significant homogeneous textured or non textured regions. A marker driven watershed transform is then used to properly segment the identified regions. The combined algorithm produces effective texture and intensity based segmentation for the application to content based retrieval of images.
A novel model of a normal vector sphere is proposed in this paper. Two 3D object morphological addition can be calculated by merging two corresponding normal vector spheres. The important property of convex object mor...
详细信息
ISBN:
(纸本)0780374908
A novel model of a normal vector sphere is proposed in this paper. Two 3D object morphological addition can be calculated by merging two corresponding normal vector spheres. The important property of convex object morphological addition is proved based on integral geometry, which can le popularized to a concave set, then the two objects' morphological operator can be calculated using the two point sets' Minkowsky addition which have the same normal vector. A unified model of graphics morphological operators is developed; this model unifies the morphological addition, subtraction of 2D and 3D objects in algorithm theory, which lays a solid foundation for morphological operator in computer graphics.
Watermarking is a technique used to label digital media, to protect copyright ownership, by hiding information into the signal. Watermarks must be imperceptible and robust against attacks. Besides, watermark robustnes...
详细信息
Watermarking is a technique used to label digital media, to protect copyright ownership, by hiding information into the signal. Watermarks must be imperceptible and robust against attacks. Besides, watermark robustness against several signal processing techniques can be ensured by exploiting a technique related to spread spectrum communications. In this paper, we propose a procedure based on frequential substitution using a BPSK modulation with an adaptive carrier frequency, the choice of which depends on the original signal features. A secret key, generated during the watermarking process, is used for retrieving hidden information.
This paper presents a color interpolation algorithm for a single sensor color camera. The proposed algorithm is especially designed to solve the problem of pixel crosstalk among the pixels of different color channels....
详细信息
This paper presents a color interpolation algorithm for a single sensor color camera. The proposed algorithm is especially designed to solve the problem of pixel crosstalk among the pixels of different color channels. Interchannel cross-talk gives rise to blocking effects on the interpolated green plane, and also spreading of false colors into detailed structures. The proposed algorithm separates the green channel into two planes, one highly correlated with the red channel and the other with the blue channel. These separate planes are used for red and blue channel interpolation. Experiments conducted on McBeth color chart and natural images have shown that the proposed algorithm can eliminate or suppress blocking and color artifacts to produce better quality images.
In this paper, we present a new discrete cosine transform (DCT) processor architecture using computation sharing multiplication (CSHM). We introduce a computation sharing multiplier based DCT architecture to achieve i...
详细信息
In this paper, we present a new discrete cosine transform (DCT) processor architecture using computation sharing multiplication (CSHM). We introduce a computation sharing multiplier based DCT architecture to achieve image quality and hardware complexity trade-off and analyze the performance. Comparison of the performance, area and power consumption with a DA (distributed arithmetic) based DCT architecture is performed. The result shows that the proposed architecture improves power consumption by 14% and area by 41% with acceptable image quality degradation.
Many spectrum domain watermarking schemes have been proposed in recent years, but they seldom deal with the problem of progressively detecting the embedded watermark, which is desirable in some situations. This paper ...
详细信息
Many spectrum domain watermarking schemes have been proposed in recent years, but they seldom deal with the problem of progressively detecting the embedded watermark, which is desirable in some situations. This paper addresses this problem by embedding the watermark in the DCT domain of an image in a multi-resolution way. The DCT coefficients are treated as wavelet transform coefficients, and each watermark bit is embedded repeatedly into a block of coefficients, layer by layer, using a wavelet watermarking scheme, so that the embedded watermark can be detected progressively. Furthermore, for the scheme to be robust against geometric transformations, a second spread spectrum circular watermark is embedded in the DFT domain. Experimental results show that this scheme is robust against common signal processing procedures such as compression, median filtering and additive noise, as well as geometric transformations such as rotation and translation.
This paper presents a novel idea of combining the content-based image retrieval (CBIR) and concept of security together into the traditional CBIR systems, and a sample system based on digital watermarking can be built...
详细信息
This paper presents a novel idea of combining the content-based image retrieval (CBIR) and concept of security together into the traditional CBIR systems, and a sample system based on digital watermarking can be built for special grade queries. Using this kind of digital watermarking-based systems, the administrators, high-level users, middle-level users and low-level users may retrieve different results under the same query image, because dissimilar digital information has been embedded in the images as digital watermarks. We build a test bed (as a simple sample only) on 56,600 images, and parts of them are watermarked. The experimental result shows our algorithms work well for image database security, while it can be extended for copyright protection in visual information retrieval systems and data packet filters in the network.
A sensory mapping method, called staggered hierarchical mapping (SHM), and its developmental algorithm are described in this paper SHM is a model motivated by human early, visual pathways including processing performe...
详细信息
A sensory mapping method, called staggered hierarchical mapping (SHM), and its developmental algorithm are described in this paper SHM is a model motivated by human early, visual pathways including processing performed by the retina, lateral geniculate nucleus (LGN) and the primary visual cortex. The work reported here concerns not only the design of such a series of processors but also their autonomous development. A new incremental principal component analysis (IPCA) method is used to automatically develop orientation sensitive and other needed filters. A set of staggered receptive fields model the pattern of positioning of processing cells. From sequentially sensed video frames, the proposed algorithm develops a hierarch, of filters, whose outputs are uncorrelated within each layer but with increasing scale of receptive fields from low to high layers. To study, the completeness of the representation generated by, the SHM, we experimentally, show that the response produced at any layer is sufficient to reconstruct the corresponding "retinal" image to a great degree. In our experiment, we show that SHM can be used to perform local analysis.
The video signature method has previously been proposed as a technique to summarize video efficiently for visual similarity measurements (see Cheung, S.-C. and Zakhor, A., Proc. SPIE, vol.3964, p.34-6, 2000; ICIP2000,...
详细信息
The video signature method has previously been proposed as a technique to summarize video efficiently for visual similarity measurements (see Cheung, S.-C. and Zakhor, A., Proc. SPIE, vol.3964, p.34-6, 2000; ICIP2000, vol.1, p.85-9, 2000; ICIP2001, vol.1, p.649-52, 2001). We now develop the necessary theoretical framework to analyze this method. We define our target video similarity measure based on the fraction of similar clusters shared between two video sequences. This measure is too computationally complex to be deployed in database applications. By considering this measure geometrically on the image feature space, we find that it can be approximated by the volume of the intersection between Voronoi cells of similar clusters. In the video signature method, sampling is used to estimate this volume. By choosing an appropriate distribution to generate samples, and ranking the samples based upon their distances to the boundary between Voronoi cells, we demonstrate that our target measure can be well approximated by the video signature method. Experimental results on a large dataset of Web video and a set of MPEG-7 test sequences with artificially generated similar versions are used to demonstrate the retrieval performance of our proposed techniques.
Multiple description coding (MDC) schemes have become popular as robustness tools in packet switched networks where multiple paths with varying packet loss rates are available. The descriptions are designed so that th...
详细信息
Multiple description coding (MDC) schemes have become popular as robustness tools in packet switched networks where multiple paths with varying packet loss rates are available. The descriptions are designed so that the quality of the reconstructed image depends on the number of descriptions received and not on which descriptions are actually received. We propose a new MDC framework for the EBCOT algorithm used in the current JPEG 2000 standard for still image compression. The inherent block coding in EBCOT allows for more flexibility in the formation of basic groups that are then combined in different ways to form descriptions. The bit allocation problem (between the different groups in a description) is formulated and optimized for good rate-distortion performance. Optimization of the bit allocation between the primary and secondary positions in each description is obtained using the generalized BFOS algorithm. Experiments using the Kakadu software (for JPEG 2000) show that the performance of the proposed framework degrades gracefully with increase in the number of descriptions lost.
暂无评论