作者:
Wu, FZhang, TXHuazhong Univ Sci & Technol
Inst Pattern Recognit & Artificial Intelligence State Key Lab Image Proc & Intelligent Control Wuhan 430074 Peoples R China
General algorithms of contour tracing are just for binary image, and fail in some complicated images. These algorithms are correct just in some ordinary cases. The reasons of failing are always the lack of theory and ...
详细信息
ISBN:
(纸本)0819442801
General algorithms of contour tracing are just for binary image, and fail in some complicated images. These algorithms are correct just in some ordinary cases. The reasons of failing are always the lack of theory and the pixel is not enough for contour tracing. The theory of crack brought by *** is very useful for contour tracing. But the crack is not intuitionistic. So, a new pixel-based algorithm of contour tracing for multi-value segmented image is presented by using the character of crack. After analyzing all cases that maybe occur in contour tracing, this paper summarized a succinct theory. As we know, the contours maybe superpose and intersect, so the same pixel maybe occurs several times in contour tracing, but the corresponding crack is unique, if we find the crack, then the corresponding pixel is found. That is the idea of the paper. The new algorithm is easy and accurate compared the traditional algorithms. In addition, this paper analyzed all relations that maybe occur between regions, pointed a effective algorithm of analyzing the inclusion relations among the regions to build the tree structure. The former algorithms fail in analyzing the tree structure of multi-value segmented image, but the algorithm is effective in all case. Experiments show that these algorithms are correct and high-effective.
作者:
Wang, GYHu, JHuazhong Univ Sci & Technol
State Key Lab Image Proc & Intelligent Control Inst Pattern Recognit & Artificial Intelligence Wuhan 430074 Peoples R China
Autonomous real-time fingerprint verification, how to judge whether two fingerprints come from the same finger or not, is an important and difficult problem in AFIS (Automated Fingerprint Identification system). In ad...
详细信息
ISBN:
(纸本)0819442801
Autonomous real-time fingerprint verification, how to judge whether two fingerprints come from the same finger or not, is an important and difficult problem in AFIS (Automated Fingerprint Identification system). In addition to the nonlinear deformation, two fingerprints from the same finger may also be dissimilar due to translation or rotation, all these factors do make the dissimilarities more great and lead to misjudgment, thus the correct verification rate highly depends on the deformation degree. In this paper, we present a new fast simple algorithm for fingerprint matching, derived from the Chang et al.'s method, to solve the problem of optimal matches between two fingerprints under nonlinear deformation. The proposed algorithm uses not only the feature points of fingerprints but also the multiple information of the ridge to reduce the computational complexity in fingerprint verification. Experiments with a number of fingerprint images have shown that this algorithm has higher efficiency than the existing of methods due to the reduced searching operations.
The scene matching between side-looking real aperture radar (SLAR) image and synthetic aperture radar (SAR) image is influenced by the terrain height variance because radar imaging in the direction of slanting range. ...
详细信息
ISBN:
(纸本)0819442801
The scene matching between side-looking real aperture radar (SLAR) image and synthetic aperture radar (SAR) image is influenced by the terrain height variance because radar imaging in the direction of slanting range. The match algorithm investigated on this paper between real aperture radar image and SAR is based on normalize cross correlation match. In this paper, through analysis the geometric model of side-looking real aperture radar imaging, we propose a method of vertical projection adjust the geometric distortion of side-looking real aperture radar image, and discuss the relation between match performance and the height difference in reference region, which is useful for the evaluation of radar image matching reliability. The simulation experiments of real aperture radar imaging at different altitude proves that the matching precision and robust are improved distinctly after the vertical projection adjustment of the real aperture radar image geometric distortion.
In this paper. a new method is proposed to hide watermark image based on the discrete integer Haar wavelet transform. This method utilizes excellent properties of the discrete integer Haar wavelet transform and some c...
详细信息
ISBN:
(纸本)0819442798
In this paper. a new method is proposed to hide watermark image based on the discrete integer Haar wavelet transform. This method utilizes excellent properties of the discrete integer Haar wavelet transform and some characteristies of human visual system(HSV). The watermark are processed the discrete Haar wavelet transforms as a grey-value image, and are decomposed and synthesized the image of the watermark and hiding. The algorithm of the discrete integer Haar wavelet is simple and viable. Algorithmic operation is also small The speed of algorithmic operation is quick. The algorithm is of parallel structure. The experimental results using this algorithm shows that the method of this paper implement that be added watermark and be hidden processing to image. This method can improve robustness of watermarking.
Rough sets theory is a new mathematical tool to deal with vagueness and uncertainty. It is a promising soft computation method of intellective information processing. A method for speckle intelligent filtering of SAR ...
详细信息
ISBN:
(纸本)0819442763
Rough sets theory is a new mathematical tool to deal with vagueness and uncertainty. It is a promising soft computation method of intellective information processing. A method for speckle intelligent filtering of SAR image based on rough sets theory is presented in this paper, This method is proved to be practical and efficient by the experiments.
Knowledge is one of the most important elements in production and the first resource in enterprise. By introducing knowledge to decision making, this paper presents a kind of know1edge decision- making model (KDM for ...
详细信息
Knowledge is one of the most important elements in production and the first resource in enterprise. By introducing knowledge to decision making, this paper presents a kind of know1edge decision- making model (KDM for short) based on generalized computing.
This paper proposes an integrated set of solution blue print on computer aided automatic form processing. By using the linear whole block moving method in each vertical segment, a new fast algorithm is put forth to de...
详细信息
ISBN:
(纸本)0819442801
This paper proposes an integrated set of solution blue print on computer aided automatic form processing. By using the linear whole block moving method in each vertical segment, a new fast algorithm is put forth to detect and rectify the slanting image. To distinguish the different form types, which is the foundation of steps of locating the form fields, filtering the form lines, and so forth, several representative form features are discussed. Based on the bank bill image feature, a mutual rectification mechanism based on the recognition results of financial Chinese characters and Arabic numerals is put forward to raise the recognition rate. At last, it presents experiment results and conclusions.
A dynamic segment designate lossless coding (DSDC for short) method for sparse binary patterns is proposed in this paper. First of all, in order to reduce the correlation of the binary image, we carry out peculiar dif...
详细信息
ISBN:
(纸本)0819442798
A dynamic segment designate lossless coding (DSDC for short) method for sparse binary patterns is proposed in this paper. First of all, in order to reduce the correlation of the binary image, we carry out peculiar difference in row and column on the white/black (0/1) binary image successively, the resultant image is also binary, but commonly it is sparser than before, that is to say, the proportion of non-zero element will decrease. Afterwards we join rows of the simpler image by linking their heads and tails correspondingly into a long one-dimensional array. Scan the one-dimensional array from left to right step by step and divide the array into a number of non-all-zero segments (I and 0 included) of fixed length and all-zero segments (only 0 included) of varying length according to a certain rule. In the algorithm, we always encode a subsection as often as we divide it from the one-dimensional array. After that, perform distinct coding method for the two kinds of segments of non-all-zero segments and all-zero segments respectively. For non-all-zero segment, we encode each non-all-zero element with its segment-relative address code and skip over the zero elements in each segment. As for all-zero segment, we designate the length of the all-zero segment with bin tree code, which represents the number of contiguous zero element contained in it. The Decoding method is the back-ward process of coding. Read out the bit stream from the code file and reconstruct the segment by using the corresponding method every time. Finally, if differential operation is carried out at the course of encoding, perform reverse difference on the current binary image and we will reconstruct the original binary image. The whole process is lossless. The encoding process and the decoding process are nearly balance in computational time or in computational complexity. In this paper, the eight binary images CCITT 1-8 have been tested by some methods mentioned in this paper. It has been demonstrat
作者:
Shi, YZhang, TXHuazhong Univ Sci & Technol
State Key Lab Image Proc & Intelligent Control Inst Pattern Recognit & Artificial Intelligence Wuhan 430074 Peoples R China
This paper demonstrates a novel criterion for both feature ranking and feature selection using Support Vector Machines (SVMs). The method analyses the importance of feature subset using the bound on the expected error...
详细信息
ISBN:
(纸本)081944278X
This paper demonstrates a novel criterion for both feature ranking and feature selection using Support Vector Machines (SVMs). The method analyses the importance of feature subset using the bound on the expected error probability of an SVM. In addition a scheme for feature ranking based on SVMs is presented. Experiments show that the proposed schemes perform well in feature ranking/selection, and risk bound based criterion is superior to some other criterions.
The generative technique of the dynamic infrared image was discussed in this paper. Because infrared sensor differs from CCD camera in imaging mechanism, it generates the infrared image by incepting the infrared radia...
详细信息
ISBN:
(纸本)081944281X
The generative technique of the dynamic infrared image was discussed in this paper. Because infrared sensor differs from CCD camera in imaging mechanism, it generates the infrared image by incepting the infrared radiation of scene (including target and background). The infrared imaging sensor is affected deeply by the atmospheric radiation, the environmental radiation and the attenuation of atmospheric radiation transfers. Therefore at first in this paper the imaging influence of all kinds of the radiations was analyzed and the calculation formula of radiation was provided, in addition, the passive scene and the active scene were analyzed separately. Then the methods of calculation in the passive scene were provided, and the functions of the scene model, the atmospheric transmission model and the material physical attribute databases were explained. Secondly based on the infrared imaging model, the design idea, the achievable way and the software frame for the simulation software of the infrared image sequence were introduced in SGI workstation. Under the guidance of the idea above, in the third segment of the paper an example of simulative infrared image sequences was presented, which used the sea and sky as background and used the warship as target and used the aircraft as eye point. At last the simulation synthetically was evaluated and the betterment scheme was presented.
暂无评论