In automatic image annotation, it is often extracting low-level visual features from original image for the purpose of mapping to high level image semantic information. In this paper, we propose a novel method which i...
详细信息
This paper presents a copy-paste block detection method based on characteristics of double JPEG compress. The JPEG compress will bring JPEG compression characteristics to the DCT coefficients, these characteristics ar...
详细信息
Two medieval manuscripts are recorded, investigated and analyzed by philologists in collaboration with computer scientists. Due to mold, air humidity and water the parchment is partially damaged and consequently hard ...
详细信息
Two medieval manuscripts are recorded, investigated and analyzed by philologists in collaboration with computer scientists. Due to mold, air humidity and water the parchment is partially damaged and consequently hard to read. In order to enhance the readability of the text, the manuscript pages are imaged in different spectral bands ranging from 360 to 1000nm. A registration process is necessary for further imageprocessing methods which combine the information gained by the different spectral bands. Therefore, the images are coarsely aligned using rotationally invariant features and an affine transformation. Afterwards, the similarity of the different images is computed by means of the normalized cross correlation. Finally, the images are accurately mapped to each other by the local weighted mean transformation. The algorithms used for the registration and results in enhancing the texts using Multivariate Spatial Correlation are presented in this paper. copyright by EURASIP.
In classification of multispectral remote sensing image, it is usually difficult to obtain higher classification accuracy if only consider image's spectral feature or texture feature alone. In this paper ,we prese...
详细信息
Multivariate calibration is a classic problem in the analytical chemistry field and frequently solved by partial least squares method in the previous work. Unfortunately there are so many redundant features in the pro...
详细信息
The safety operation of steel cable is vital and the cable should be maintained through regular inspection. Magnetic flux leakage (MFL) method is a popular inspection technique. For the online nondestructive testing (...
详细信息
In order to preserve our cultural heritage and for automated document processing libraries and national archives have started digitizing historical documents. In the case of degraded manuscripts (e.g. by mold, humidit...
详细信息
At present, many chaos-based image encryption algorithms have proved to be unsafe, few encryption schemes permute the plain images as three-dimensional(3D) bit matrices, and thus bits cannot move to any position, th...
详细信息
At present, many chaos-based image encryption algorithms have proved to be unsafe, few encryption schemes permute the plain images as three-dimensional(3D) bit matrices, and thus bits cannot move to any position, the movement range of bits are limited, and based on them, in this paper we present a novel image encryption algorithm based on 3D Brownian motion and chaotic systems. The architecture of confusion and diffusion is adopted. Firstly, the plain image is converted into a 3D bit matrix and split into sub blocks. Secondly, block confusion based on 3D Brownian motion(BCB3DBM)is proposed to permute the position of the bits within the sub blocks, and the direction of particle movement is generated by logistic-tent system(LTS). Furthermore, block confusion based on position sequence group(BCBPSG) is introduced, a four-order memristive chaotic system is utilized to give random chaotic sequences, and the chaotic sequences are sorted and a position sequence group is chosen based on the plain image, then the sub blocks are confused. The proposed confusion strategy can change the positions of the bits and modify their weights, and effectively improve the statistical performance of the algorithm. Finally, a pixel level confusion is employed to enhance the encryption effect. The initial values and parameters of chaotic systems are produced by the SHA 256 hash function of the plain image. Simulation results and security analyses illustrate that our algorithm has excellent encryption performance in terms of security and speed.
In order to improve the classifier performance in semantic image annotation, we propose a novel method which adopts learning vector quantization (LVQ) technique to optimize low level feature data extracted from given ...
详细信息
The restoration of rotational motion blurred image involves a lot of interpolations operators in rectangular-to-polar transformation and its inversion of polar-to-rectangular. The technique of interpolation determines...
详细信息
暂无评论