With the development of image processing and artificial intelligence technology, image key information extraction algorithm has become an indispensable tool and technology in many fields. By comparing traditional algo...
详细信息
In the era of the internet, various visual media convey various information to people. visualcommunication is a new discipline that uses visual language as a means of communication. In visualcommunication, image is ...
详细信息
To diminish the limitations of the visual and thermal face images, a fusion of them is carried out in order to upgrade the performance. This paper presents fusion based on maximum selection of DB4 wavelet coefficients...
详细信息
ISBN:
(纸本)9781509056200
To diminish the limitations of the visual and thermal face images, a fusion of them is carried out in order to upgrade the performance. This paper presents fusion based on maximum selection of DB4 wavelet coefficients of visual and thermal images. The dimensions of these fused images are reduced using ICA and these low dimension fused images are classified with the help of SVM. The experimental result of fusion gives approximately 2% and 6% more accuracy than the visual and thermal images respectively for both expression and illumination of IRIS datasets. Further this work is extended with a comparative study of fusion methods based on some other wavelet decompositions such as Haar/DB2, Coiflets, and Symlets. In addition to that, a comparison between two ICA architectures and PCA is also carried out over wavelet fusion methods. It has been noticed that maximum information, classification accuracy, and less error acheieved for haar/db2 fused images.
This paper studies the effect of exploiting temporal dependency of successive weight updates on compressing communications in Federated Learning (FL). For this, we propose residual coding for FL, which utilizes tempor...
详细信息
ISBN:
(纸本)9781665475921
This paper studies the effect of exploiting temporal dependency of successive weight updates on compressing communications in Federated Learning (FL). For this, we propose residual coding for FL, which utilizes temporal dependencies by communicating compressed residuals of the weight updates whenever they are beneficial to bandwidth. We further consider Temporal Context Adaptation (TCA) which compares co-located elements of consecutive weight updates to select optimal setting for compression of bitstream in DeepCABAC encoder. Following experimental settings of MPEG standard on Neural Network Compression (NNC), we demonstrate that both temporal dependency based technologies reduce communication overhead, where the maximum reduction is obtained using both technologies, simultaneously.
Traditional visualcommunication image processing is done manually, which is not only time-consuming and labor-intensive, but also not very effective. Therefore, this article adopted an AI (Artificial Intelligence) ba...
详细信息
In this paper, an innovative method of HEVC video pre-processing is proposed. The method applies a simple linear iterative clustering (SLIC), which adapts a k-means clustering to group pixels into perceptually meaning...
详细信息
ISBN:
(纸本)9781628415001
In this paper, an innovative method of HEVC video pre-processing is proposed. The method applies a simple linear iterative clustering (SLIC), which adapts a k-means clustering to group pixels into perceptually meaningful atomic regions of superpixels. By calculating the average of weighted average of luminance differences around each pixel in the superpixel, a suitable parameter of Gaussian filter for the superpixel is determined. Experimental results show that bit rate can be reduced up to 29% without loss in visual quality.
visual Cryptography is an encryption method which shares secret information into n shares and decrypted into original image without any cryptographic technique. Existing visual cryptography does not provide good visua...
详细信息
ISBN:
(纸本)9781509025527
visual Cryptography is an encryption method which shares secret information into n shares and decrypted into original image without any cryptographic technique. Existing visual cryptography does not provide good visual quality reconstructed image. Hence a novel visual cryptography is introduced along with additional post processing technique which preserves good quality recovered image. Experimental results on this technique show that recovered image has competitive visual quality compared with input binary image.
In recent years, the field of visualcommunication has developed rapidly, and computer graphics and image technology have been fully applied in it. Based on this, this article first expounds the relationship between c...
详细信息
Digital image processing techniques are commonly used to enhance an image to extract the useful information from it. Images acquired by a visual system are seriously degraded under hazy and foggy weather, which will a...
详细信息
ISBN:
(纸本)9781509037162
Digital image processing techniques are commonly used to enhance an image to extract the useful information from it. Images acquired by a visual system are seriously degraded under hazy and foggy weather, which will affect the detection, tracking, and recognition of targets. The degraded images have reduced contrast and the local information is lost. Thus, restoring the true scene from such a foggy image is of significance. The paper focuses on enhancing the contrast and visibility of the foggy image by using various enhancement techniques. The performance of the proposed techniques are analyzed based on standard parameters
We study the ability to derive meaningful information from decompressed imaging spectrometer data. Each hyperspectral band is linearly predicted by a previously transmitted band. The residual, formed by subtracting th...
详细信息
ISBN:
(纸本)9780819484192
We study the ability to derive meaningful information from decompressed imaging spectrometer data. Each hyperspectral band is linearly predicted by a previously transmitted band. The residual, formed by subtracting the prediction from the original data is compressed either with a near-lossless bit plane coder or with the lossy JPEG2000 algorithm. We investigate the effects of these two compression methods on hyperspectral image processing using whole-and mixed-pixel analysis techniques. Surprisingly, the lossy coder outperforms near-lossless method in terms of its impact on final hyperspectral data applications.
暂无评论