A new theory is presented about subjective images. The subjective image is generated by the visual system, and is the reflection of the objective image in the brain. First, the relation between the objective grayscale...
详细信息
ISBN:
(纸本)9781509037117
A new theory is presented about subjective images. The subjective image is generated by the visual system, and is the reflection of the objective image in the brain. First, the relation between the objective grayscale and the subjective grayscale is built by visual experiment, and thus a representation of the subjective image is found. Next, a histogram matching algorithm is developed to optimize the subjective image. If it has a uniform histogram, the subjective image is assumed to be optimal. This histogram is used to derive the optimal histogram of the objective image. The objective image is then transformed such that its histogram has the optimal form. This algorithm is shown to have better visual effect than the histogram equalization.
This paper presents a local feature descriptor based on Local Binary Patterns (LBP). This descriptor uses binary bit string to represent the local region of images and the integral image to mean filter that makes desc...
详细信息
ISBN:
(纸本)9781509037117
This paper presents a local feature descriptor based on Local Binary Patterns (LBP). This descriptor uses binary bit string to represent the local region of images and the integral image to mean filter that makes descriptor building faster. Compared to Scale-invariant feature transform (SIFT)that the calculation is large and the process is time consuming in the description of the characteristics, the descriptor based on LBP speeds about 1 orders of magnitude. In the matching effect for blurred image, illumination changes, and different JPEG compression ratio, the matching results are better than descriptors based on SIFT.
Central Venous Blood Temperature-based Adaptive Algorithms are easy-to-implement, stable, specific, and directly correspond to the overall metabolic rate of the body. Some are already in use in commercial rate-adaptiv...
详细信息
ISBN:
(纸本)9781509037117
Central Venous Blood Temperature-based Adaptive Algorithms are easy-to-implement, stable, specific, and directly correspond to the overall metabolic rate of the body. Some are already in use in commercial rate-adaptive cardiac pacemakers. In this paper, numerical simulations corresponding to different situations are performed and compared.
3D reconstruction of image sequences is an important application in computer graphics and imageprocessing, especially in biomedicalengineering. 3D reconstruction of elastin second harmonic generation (SHG) sequences...
详细信息
ISBN:
(纸本)9781509037117
3D reconstruction of image sequences is an important application in computer graphics and imageprocessing, especially in biomedicalengineering. 3D reconstruction of elastin second harmonic generation (SHG) sequences images can offer much more spatial structure information to improve the diagnostic accuracy significantly. In the paper, we designed a reconstruction pipeline of normal scar samples based on three reconstruction algorithms including Marching cubes, Ray casting volume rendering and Contours algorithm and compared their results. The results show that contours algorithm is more effective and has better performance than the other two methods.
In this paper, we proposed a novel optical encryption and decryption method of gray image based on the Fourier computer-generated hologram (CGH) and logical modulation. Since the encryption method using the CGH or the...
详细信息
ISBN:
(纸本)9781509037117
In this paper, we proposed a novel optical encryption and decryption method of gray image based on the Fourier computer-generated hologram (CGH) and logical modulation. Since the encryption method using the CGH or the logical modulation alone has a shortness of low security, the proposed novel encryption combines the two methods together. In our encryption processing, the hologram, which is gotten by Fourier transform from the original image, is encrypted by logical modulation with the chaotic sequence. Simulation results and analysis show that the security and robustness of the proposed approach has a satisfactory performance.
Recently, Gait recognition has gained significant attention. It is the identification of individuals in a video sequences, the recognition method is by the way they walk. Active Energy image (AEI) is a more efficient ...
详细信息
ISBN:
(纸本)9781509037117
Recently, Gait recognition has gained significant attention. It is the identification of individuals in a video sequences, the recognition method is by the way they walk. Active Energy image (AEI) is a more efficient represent method than Gait Energy image (GEI), Gabor wavelet is used in face recognition successfully, so we use the Gabor wavelet to extract the amplitude spectral of AEI, research the recognition ability of amplitude feature. The algorithm is tested in the CASIA Datasets B and gain high correct recognition rates.
In recent years, a dramatically increasing number of surveillance cameras have been installed to monitor private and public spaces and areas. Video surveillance is seen as an effective way to ensure our security. Ther...
详细信息
ISBN:
(纸本)9781509037117
In recent years, a dramatically increasing number of surveillance cameras have been installed to monitor private and public spaces and areas. Video surveillance is seen as an effective way to ensure our security. Therefore, modeling activity patterns and human behaviors for detection or recognition of peculiar event is a critical technology which has attracted remarkable research interest in the last few years. Various methods have been developed to build intelligent vision systems, this article extensively explain the current improvement made toward video-based human abnormal activity detection and wide applications in various fields range from monitoring in public spaces to personal health rehabilitation.
In this paper, a novel encryption and decryption method for color images based on the Hadamard transform (HT) and logical modulation has been proposed. Firstly, considering security and efficiency, together, our crypt...
详细信息
ISBN:
(纸本)9781509037117
In this paper, a novel encryption and decryption method for color images based on the Hadamard transform (HT) and logical modulation has been proposed. Firstly, considering security and efficiency, together, our cryptosystem combined with image compression can reduce encryption time and promote real-time secure image transmission and storage. Then the compressed image is encrypted by logical modulation with chaotic sequence in HT domain. Furthermore, the validity and feasibility of proposed method is demonstrated by experimental simulation results in the case of ensuring good quality of recovered image.
Traditional digital watermarking in transform domain computes complex and has limited anti-attack. Different ways of signal sparsity of compressed sensing represent different domains, which expands the embeddable spac...
详细信息
ISBN:
(纸本)9781509037117
Traditional digital watermarking in transform domain computes complex and has limited anti-attack. Different ways of signal sparsity of compressed sensing represent different domains, which expands the embeddable space of watermarking. To take advantage of its multi-direction and multi-resolution characteristics to sparse image, Contourlet transform was analyzed. For the limitation of traditional block decision, we adopt the interleaving extraction to reduce the block artifacts. Furthermore, we presented the watermarking algorithm based on interleaving extraction block compressed sensing in Contourlet domain, simulation results verifies that the algorithm enhances the peak signal to noise ratio. Attack tests show that the proposed digital watermarking has better robustness against JPEG compression, noising, cutting etc.
The development of imageprocessing methods based on partial differential equations, such as denoising, restoration, segmentation and so on, is an emerging field in the last decade, where a large number of models are ...
详细信息
ISBN:
(纸本)9781509037117
The development of imageprocessing methods based on partial differential equations, such as denoising, restoration, segmentation and so on, is an emerging field in the last decade, where a large number of models are second order nonlinear diffusion equations. In this article, we present a two level finite volume method to solve the Perona and Malik (P-M) equation. The method involves solving one small implicit Perona and Malik problem on the coarse mesh system, and an explicit Perona and Malik problem on the fine mesh. The numerical results demonstrate that the two level method is efficient and can save a large amount of computational time than the standard FVM method.
暂无评论