Content basedimage retrieval (CBIR) is a promising way to address image retrieval based on the visual features of an image like color, texture and shape. Every visual feature will address a specific property of the i...
详细信息
Content basedimage retrieval (CBIR) is a promising way to address image retrieval based on the visual features of an image like color, texture and shape. Every visual feature will address a specific property of the image, so the state of the art focuses on combination of multiple visual features for content basedimage retrieval. In this paper we have devised a content basedimage retrieval system based on the combination of local and global features. The local features used are Bidirectional Empirical Mode Decomposition (BEMD) technique for edge detection and Harris corner detector to detect the corner points of an image. The global feature used is HSV colorfeature. For the experimental purpose the COIL-100 database has been used. The result show significant improvement in the retrieval accuracy when compared to the existing systems.
This paper deals with the concept of Maintenance Free Operating Period (MFOP). This MFOP is defined as a period of operation during which the system should be able with a given level of confidence to carry out all its...
详细信息
This paper deals with the concept of Maintenance Free Operating Period (MFOP). This MFOP is defined as a period of operation during which the system should be able with a given level of confidence to carry out all its assigned missions without system fault or performance limitation. based on this concept, a dynamic maintenance policy for a multi-component system is implemented. The main objective of this paper is to propose a method to integrate the usage information of the system components in order to optimize the implemented policy. The method is evaluated considering the Total Maintenance Cost (TMC) value.
SAO estimation is the process of determining SAO parameters in video encoding. There are two difficulties for VLSI implementation of SAO estimation. The first is that there are huge amount of samples to deal with in s...
详细信息
The proceedings contain 227 papers. The special focus in this conference is on Advanced Developments of CAx, Modelling and Simulation Technologies in Manufacturing, Information System Design and Development, Networks ...
ISBN:
(纸本)9783038351528
The proceedings contain 227 papers. The special focus in this conference is on Advanced Developments of CAx, Modelling and Simulation Technologies in Manufacturing, Information System Design and Development, Networks Applications, Modern Methods of Intelligent Automation, Data Mining and Processing and Methodologies, Devices and Embedded Tools, Technologies of Measurement, Diagnosis and Testing. The topics include: Solid modeling and optimization design of crank rocking flying shear;research on modeling design in composite molding;research on integrated simulation of space robot mission;emergency supplies demand forecasting model;research on service capability based on data mining;design of new double-wing product drop test machine;mechanical industrial design in product development;mobile network application engine design based on android system;research on audio retrieval based on content;design of laboratory management system based on web;research of data exchange model among information systems;study on the architecture of mobile campus digital library system;image edge detection based on solitary wave algorithm;research on computer network security and prevention strategy;analysis and dispose of deviation of mine belt conveyor;research on reservoir heterogeneity of complex region;study on process and defect of arc welding;frequency measurement method based on signal delay detection;analysis on voltage and reactive power in civil lighting;research of ITO transparent conductive;application of carbon capture and sequestration in clean energy cycle technology;analysis of meteorological data sharing system;study on earthquake of fault based on GIS and study on sedimentary characteristics and models of river group sequence.
In this paper, a new image processing filter is proposed. In order to construct this image smoothing filter, one dimensional discrete Fourier invariant signal generated by an iterative design principle based on gradie...
详细信息
In this paper, a new image processing filter is proposed. In order to construct this image smoothing filter, one dimensional discrete Fourier invariant signal generated by an iterative design principle based on gradient descent method is used. The filter shape and values in spatial and frequency domain is almost the same. The proposed filter can be used as a kernel matrix in image processing to perform blurring as well as high frequency noise suppression. Also it can be used as an optimal two dimensional window for spatial-frequency spectral analysis of images.
A new image authentication technique using random sequence based secret sharing scheme with a data repair capability is proposed. For each block of image, an authentication signal is generated together with the binari...
详细信息
A new image authentication technique using random sequence based secret sharing scheme with a data repair capability is proposed. For each block of image, an authentication signal is generated together with the binarized block content, which is transformed into several shares using the secret sharing scheme. The parameters which have been involved in the algorithm, are carefully selected so that the maximum number of shares can be generated to generate stego-image. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match with that extracted from the embedded shares. There after the data repairing is applied to each tampered block by the scheme of reverse secret sharing.
The following topics are dealt with: token-based source code clone detection; multilingual real-time spoken dialogue agents; ontology; mobile phones; signal reconstruction; logistics transportation system; ITS technol...
详细信息
The following topics are dealt with: token-based source code clone detection; multilingual real-time spoken dialogue agents; ontology; mobile phones; signal reconstruction; logistics transportation system; ITS technology; 3D image measurement system; rule-based methodology; context-aware privacy; fuzzy logic decision making; autonomous robotic; neural network; feature point detection; and image morphing.
image stitching is used to combine several individual images having some overlap into a composite image. In this paper, a novel wavelet based seamless image stitching algorithm is introduced, where the dissimilarity i...
详细信息
image stitching is used to combine several individual images having some overlap into a composite image. In this paper, a novel wavelet based seamless image stitching algorithm is introduced, where the dissimilarity is defined in the gradient and curvature domain. In order to reduce the artifacts in image stitching due to the misalignment of image registration, we design a new energy function combining different norm function for different frequency subbands of wavelet transform according to the priors of multiresolution image representation. The good stitched image will optimize the energy function by efficient convex optimization algorithm. The experimental results show that our method can produce visually pleasant results when trivial misalignment exists.
The quality of finger vein images is a critical factor in affecting the performance of finger vein recognition systems. In this paper, a novel finger vein image evaluation method is proposed to reduce the influence of...
详细信息
The quality of finger vein images is a critical factor in affecting the performance of finger vein recognition systems. In this paper, a novel finger vein image evaluation method is proposed to reduce the influence of low quality images on recognition performance. Firstly, the gradient, image contrast, and information entropy of a finger vein image are extracted as image quality scores. Secondly, the score fusion approach based on Triangular norm is proposed to discriminate image quality. Finally, experimental results show that the proposed approach can effectively identify low quality finger vein images and help to improve finger vein recognition performance.
Data hiding process embeds data into digital media for the purpose of security. Digital image is one of the best media to store data. It provides large capacity for hiding secret information which results into stego-i...
详细信息
ISBN:
(纸本)9781479921041
Data hiding process embeds data into digital media for the purpose of security. Digital image is one of the best media to store data. It provides large capacity for hiding secret information which results into stego-image imperceptible to human vision, a novel steganographic approach based on data hiding method such as pixel-value differencing. This method provides both high embedding capacity and outstanding imperceptibility for the stego-image. In this paper, different image processing techniques are described for data hiding related to pixel value differencing. Pixel Value Differencing based techniques is carried out to produce modified data hiding method. Hamming is an error correcting method which is useful to hide some information where lost bit are detected and corrected. OPAP is used to minimize embedding error thus quality of stego-image is improved without disturbing secret data. ZigZag method enhances security and quality of image. In modified method Hamming, OPAP and ZigZag methods are combined. In adaptive method image is divided into blocks and then data will be hidden. Objective of the proposed work is to increase the stego -image quality as well as increase capacity of secret data. Result analysis compared for BMP images only, with calculation of evaluation metrics i.e. MSE, PSNR and SSIM.
暂无评论