The ROI regions in JPEG2000 coding system mostly are defined artificially but it will decrease working efficiency a lot. This paper proposed a new fast face detection method based on AdaBoost and skin color detection,...
详细信息
ISBN:
(纸本)9781424467303
The ROI regions in JPEG2000 coding system mostly are defined artificially but it will decrease working efficiency a lot. This paper proposed a new fast face detection method based on AdaBoost and skin color detection, and introduced it into the JPEG2000 coding system. The experiments show that the false alarm rate of the human face detection is obviously lower than AdaBoost.
We present a novel method for finding more good feature pairs between two sets of features. We first select matched features by Bi-matching method as seed points, then organize these seed points by adopting the Delaun...
详细信息
ISBN:
(纸本)9781424475421
We present a novel method for finding more good feature pairs between two sets of features. We first select matched features by Bi-matching method as seed points, then organize these seed points by adopting the Delaunay triangulation algorithm. Finally, we use Triangle-Constraint (T-C) to increase both number of correct matches and matching score (the ratio between number of correct matches and total number of matches). Delaunay triangulation *** experimental evaluation shows that our method is robust to most of geometric and photometric transformations including rotation, scale change, blur, viewpoint change, JPEG compression and illumination change, and significantly improves both number of correct matches and matching score.
This paper focuses on shape description for machine printed Farsi/Arabic subwords retrieval. Fourier descriptor (FD) has been used frequently for shape retrieval applications. In this paper we proposed a simple and ef...
详细信息
This paper focuses on shape description for machine printed Farsi/Arabic subwords retrieval. Fourier descriptor (FD) has been used frequently for shape retrieval applications. In this paper we proposed a simple and effective FD based technique for subwords retrieval. In this method, the small number of global parameters is used to eliminate dissimilar subwords. To investigate the efficiency of the proposed method, it is compared with six common FD signatures on a database including Farsi subwords of 4 fonts and 3 sizes. Experimental results show that the proposed method outperforms the others.
In telemedicine applications, patient medical records are linked to the medical secrecy. Hence confidentiality of patient's data can be achieved by hiding Electronic Patient's Report (EPR) data in correspondin...
详细信息
In telemedicine applications, patient medical records are linked to the medical secrecy. Hence confidentiality of patient's data can be achieved by hiding Electronic Patient's Report (EPR) data in corresponding medical images. However, medical images require extreme care when embedding additional data within them because the additional information must not affect the image quality and readability. This paper proposes high capacity; robust blind lossless reversible data hiding technique along with Region of Interest (ROI) tamper detection. A new coding technique called Class Dependent coding Scheme (CDCS) is used to increase the embedding capacity. The original image is recovered without any distortion from the marked medical image following the extraction of the hidden data. As the statistical quantity related to the correlation among the pixel values is used for embedding the data, the system becomes robust to JPEG compression to certain extent. The embedding scheme also takes care of sensitive part of the medical image responsible for accurate diagnosis called ROL For detecting any tamper in ROI region, a secure hash function is calculated on ROI region and embedded in Region of Non-Interest (RONI) along with EPR data bits. Experimental results show that the proposed scheme exhibits high imperceptibility as well as low perceptual variations in stego images. Even a slight modification in ROI gets detected at receiver side. Imperceptibility and robustness have been tested against various image manipulation attacks.
High-level synthesis has been envisaged as a suitable methodology to design and deliver on time, at least large parts of today's complex IC systems. This paper describes a unified and integrated HLS framework, to ...
详细信息
ISBN:
(纸本)9781424473212
High-level synthesis has been envisaged as a suitable methodology to design and deliver on time, at least large parts of today's complex IC systems. This paper describes a unified and integrated HLS framework, to automatically produce custom and massively-parallel hardware, including its memory and system interfaces from high-level sequential program code. Using compiler-generators and logic programming techniques, provably-correct hardware compilation flow is achieved. The utilized hardware optimization inference engine is driven by a set of resource constraints, which limit to a certain boundary the number of available hardware operators to function in parallel during each control step. This optimization reduces drastically the number of different control steps (states) of the implemented application. The hardware compilation runs are completed in orders-of-magnitude less time than that which would be needed by even very experienced HDL designers to implement the same applications in RTL code. Implementation results from synthesis of a number of control-dominated, linear and repetitive, applications including a MPEG video compression engine with up to a few hundred states, are presented. In all cases the HLS framework delivers quickly provably-correct, implementable RTL code and the optimized schedule is reduced at up to 30% in comparison with the initial schedule.
It is shown that images can be subject to lossy compression in such a way that introduced distortions are not visible. For this purpose, two modern visual quality metrics, MSSIM and PSNR-HVS-M, can be used. Their valu...
详细信息
It is shown that images can be subject to lossy compression in such a way that introduced distortions are not visible. For this purpose, two modern visual quality metrics, MSSIM and PSNR-HVS-M, can be used. Their values are to be provided not less than 0.99 and 40 dB, respectively, and the corresponding lossy compression is to be carried out. Attained compression ratio (CR) depends upon image properties and a coder used. The proposed methodology of lossy compression can be successfully exploited in remote sensing and medical imaging with producing CR by several times larger than the best lossless image compression techniques.
Binary images (Bi-level images; Bi-Color images, Two-tone images or Monochrome images) have been widely used in image processing, such as facsimile, letters, map archives, digital libraries, fingerprint databases, and...
详细信息
Binary images (Bi-level images; Bi-Color images, Two-tone images or Monochrome images) have been widely used in image processing, such as facsimile, letters, map archives, digital libraries, fingerprint databases, and those documents that could not be recognized by OCR. In order to reduce the storage space of binary images, there are many researchers attempted to propose more efficient algorithms for binary image compression. In general, they can be divided into two kinds of methods which are `lossless' and `lossy'. In this research, we base on a lossy image compression method, to propose a compression Algorithm called “Skip-Line Encoding with Threshold” (SLETA). Our results of experiments show that SLETA not only achieve high compression ratio but also keep good recognizability: encoded images are not difficult to recognize after decompressions.
Many recommendations are proposed for accommodating multimedia content into wireless media with lower bandwidth. These formats of the content have been developed with different objectives. Now it has become really cha...
详细信息
Many recommendations are proposed for accommodating multimedia content into wireless media with lower bandwidth. These formats of the content have been developed with different objectives. Now it has become really challenging to compare all these diversified formats. In this paper, we proposed an algorithm to compare the FLV, MPEG4 and 3GP format of multimedia content using the parameters that determines their performance in wireless network. Finally, exhaustive experiments are done and the results are shown to demonstrate the merits and capabilities of the different file formats.
Improving the robustness of watermark in withstanding attacks has been one of the main research objectives in digital image watermarking. In this paper we propose a novel region-adaptive watermarking technique that ca...
详细信息
Improving the robustness of watermark in withstanding attacks has been one of the main research objectives in digital image watermarking. In this paper we propose a novel region-adaptive watermarking technique that can provide improvements in both robustness and visual quality of the watermarks when compared to the original, non-region-adaptive, embedding technique. The proposed technique, which is derived from our previously published research finding, shows that the relative difference in spectral distributions between the watermark data and the host image plays an important role in improving the watermark robustness and transparency.
A vehicular digital video recorder system acts as the flight recorder of a vehicle which used to record the behavior of a running vehicle. In this paper, a designed vehicular digital video recorder system was reported...
详细信息
ISBN:
(纸本)9781424497799
A vehicular digital video recorder system acts as the flight recorder of a vehicle which used to record the behavior of a running vehicle. In this paper, a designed vehicular digital video recorder system was reported. The hardware system was based on an embedded platform. The system also supports an online real-time navigator and an offline video data viewer. To consider data security, the recorded video data was water-marked to prevent tampered. The offline video data viewer is used to play the recorded video and display the recorded related vehicle's parameters accompanied with the video which represented the instant status of the running vehicle. With the viewer system, it can be used to analysis the recorded data and find the facts for the status of the vehicle when a traffic accident occurred.
暂无评论