Inscriptions are important carriers of Chinese calligraphy which has high calligraphic, artistic and cultural value. Segmentation of Chinese inscription images play a fundamental role in processing of Chinese characte...
详细信息
This paper presents a new binary image lossless compression algorithm for Digital Light processing (DLP) printers. Considering the continuity of 3D model slicing images and the features of the pixels in slicing images...
详细信息
ISBN:
(纸本)9789881563903
This paper presents a new binary image lossless compression algorithm for Digital Light processing (DLP) printers. Considering the continuity of 3D model slicing images and the features of the pixels in slicing images, this algorithm is characterized by delta-encoding and two-stage compression to facilitate image compression, which is simple to implement. Compared with other algorithms used for image compression, the proposed one achieves the best performance when the same test cases are treated.
Data dimension reduction (DDR) is all about mapping data from high dimensions to low dimensions, various techniques of DDR are being used for image dimension reduction like Random Projections, Principal Component Anal...
详细信息
Data dimension reduction (DDR) is all about mapping data from high dimensions to low dimensions, various techniques of DDR are being used for image dimension reduction like Random Projections, Principal Component Analysis (PCA), the Variance approach, LSA-Transform, the Combined and Direct approaches, and the New Random Approach. Auto-encoders (AE) are used to learn end-to-end mapping. In this paper, we demonstrate that pre-processing not only speeds up the algorithms but also improves accuracy in both supervised and unsupervised learning. In pre-processing of DDR, first PCA based DDR is used for supervised learning, then we explore AE based DDR for unsupervised learning. In PCA based DDR, we first compare supervised learning algorithms accuracy and time before and after applying PCA. Similarly, in AE based DDR, we compare unsupervised learning algorithm accuracy and time before and after AE representation learning. Supervised learning algorithms including support-vector machines (SVM), Decision Tree with GINI index, Decision Tree with entropy and Stochastic Gradient Descent classifier (SGDC) and unsupervised learning algorithm including K-means clustering, are used for classification purpose. We used two datasets MNIST and FashionMNIST Our experiment shows that there is massive improvement in accuracy and time reduction after pre-processing in both supervised and unsupervised learning.
image quality assessment is widely used in many imageprocessing tasks, which can help researchers adjust imageprocessingalgorithms, design imaging systems, and evaluate imageprocessingsystems. Generally, CT image...
详细信息
Digital watermarking is a key technology to solve copyright protection and content authentication. Most existing watermarking algorithms are based on global embedding, which cannot well balance the imperceptibility an...
详细信息
ISBN:
(纸本)9781450388627
Digital watermarking is a key technology to solve copyright protection and content authentication. Most existing watermarking algorithms are based on global embedding, which cannot well balance the imperceptibility and robustness of watermarking. This paper proposes an adaptive robust watermarking algorithm based on image texture, which mainly includes: (1) color image is converted from RGB space to Lab space and the stable scale invariant feature transform(SIFT) points are extracted based on L component as the embedding position of watermark;(2)the structured forest edge is extracted using machine learning as the watermark image which is decomposed by using lifting wavelet transform (LWT) and then encrypted using logical chaos transform;(3)in consideration of human visual system, the strength factor is adaptively selected by using the brightness information and texture complexity of the L component. Experimental results show that the proposed algorithm in Lab space has the better visual invisibility and robustness to resist various attacks, especially for cropping, noise and JPEG compression attacks in comparison with other related algorithms.
暂无评论