As the development of CG industry and online games, the requirements of efficient texture synthesis methods are more and more exigent. It is one of the toughest problems while rendering the huge scenes efficiently and...
详细信息
As the development of CG industry and online games, the requirements of efficient texture synthesis methods are more and more exigent. It is one of the toughest problems while rendering the huge scenes efficiently and effectively. In this paper we propose an efficient texture synthesis algorithm by using wavelet technique. Much different from former texture synthesis methods, the method in this paper synthesizes high resolution texture by using lower resolution component decomposed by wavelet transform, which can improve the synthesis efficiency greatly for either stochastic texture or structural one. By using this method, we can also supply an effective control mechanism especially for the structural texture samples. The result shows that we make improvements both on efficiency and effect.
As a kind of powerful anti-counterfeiting device, diffractive optically variable image (DOVI) has been developed and widely used in information security field. However, the identification of DOVI today by bare eyes is...
详细信息
As a kind of powerful anti-counterfeiting device, diffractive optically variable image (DOVI) has been developed and widely used in information security field. However, the identification of DOVI today by bare eyes is not reliable. In this paper we investigate the recognition of DOVI with machine learning method, and five kinds of algorithms, namely quadratic discriminate analysis (QDA), linear discriminate analysis (LDA), regularized discriminate analysis (RDA), leave-one-out covariance matrix estimate (LOOC), and Kullback-Leibler information measure based method (KLIM) are applied to the recognition of DOVI. Considering both time cost and correct classification rate, KLIM classifier exceeds others.
Eye blink detection is useful in many applications, such as human-computer interface, driver awareness detection, and so on. Here we consider eye blink as an evidence of liveness to exclude using some fakes, mainly 2D...
详细信息
Eye blink detection is useful in many applications, such as human-computer interface, driver awareness detection, and so on. Here we consider eye blink as an evidence of liveness to exclude using some fakes, mainly 2D photographs, to spoof face recognition systems. The detection of eye blink is done by signal analysis of multi-scale and multi-orientation Gabor responses of eye images. First, based on Gabor decomposition, we derive multiple Gabor response waves (GRW) and show some of them are homo-responsive to the behavior of eye blink. Second, probable blinking signals contained in GRWs are segmented out and reshaped into pulses. Third, the ratio of the union to the intersection (RUI) of the reshaped pulses is proposed as the indicator of the extent of eye blink. Our method has successfully detected eye blink under various conditions and can be applied to liveness detection in video-based face recognition system.
Combining bottom-up and top-down attention influences, a novel region extraction model which based on object-accumulated visual attention mechanism is proposed in this paper. Compared with early research, the new appr...
详细信息
Combining bottom-up and top-down attention influences, a novel region extraction model which based on object-accumulated visual attention mechanism is proposed in this paper. Compared with early research, the new approach brings in prior information at the proper time, updates scan path dynamically, needs less computational resources and reduces the probability to direct the attention to a less-meaning area. The application to search an airport target in remote sensing image was provided, through which the novel mechanism that how visual attention chose the area was described. Compared with another two region extraction models, experimental results confirm the effectiveness of the approach proposed in this paper.
A novel approach for walking people detection is proposed in this paper, which is inspired by the idea of gait energy image (GEI). Unlike most of common human detection methods where usually a trained detector scans a...
详细信息
ISBN:
(纸本)9781424422944;9781424422951
A novel approach for walking people detection is proposed in this paper, which is inspired by the idea of gait energy image (GEI). Unlike most of common human detection methods where usually a trained detector scans a single image and then generates a detection result, the proposed method detects people on a sequence of silhouettes which contain both appearance characteristics and motion characteristics. Thus, our method is more robust. Encouraging experimental results are obtained based on CASIA gait database and the additional non-human objects data.
Finding a new position for each landmark is a crucial step in active shape model (ASM). Mahalanobis distance minimization is used for this finding, provided there are enough training data such that the grey-level prof...
详细信息
Finding a new position for each landmark is a crucial step in active shape model (ASM). Mahalanobis distance minimization is used for this finding, provided there are enough training data such that the grey-level profiles for each landmark follow a multivariate Gaussian distribution. However, this condition could not be satisfied in most cases. In this paper, a new method support vector machine (SVM) based ASM (SVMBASM) is proposed. It approaches the finding task as a small sample size classification problem, and uses SVM classifier to deal with this problem. Moreover, considering imbalanced dataset which contains more negative instances (incorrect candidates for new position) than positive instances (correct candidates for new position), a multi-class classification framework is adopted. Performance evaluation on SJTU face database show that the proposed SVMBASM outperforms the original ASM in terms of the average error as well as the average frequency of convergence.
In this paper, we propose two effective methods to perform automatic template selection where the goal is to select prototype signature templates for a user from a given set of online signatures. The first method empl...
详细信息
ISBN:
(纸本)9781424421749
In this paper, we propose two effective methods to perform automatic template selection where the goal is to select prototype signature templates for a user from a given set of online signatures. The first method employs a clustering strategy to choose a template set that best represents the intra-class variations, while the second method selects templates that exhibit maximum similarity with the rest of the signatures. In the experiment, two typical online signature verification have been employed, respectively based on global and local features, and the verifying results on a database Task2 of SVC2004 (First Signature Verification Competition 2004), with 20 genuine signatures and 20 skilled forgeries for each set, indicate that two proposed selection procedures as presented here results in better performance than random template selection.
Two medieval manuscripts are recorded, investigated and analyzed by philologists in collaboration with computer scientists. Due to mold, air humidity and water the parchment is partially damaged and consequently hard ...
详细信息
Two medieval manuscripts are recorded, investigated and analyzed by philologists in collaboration with computer scientists. Due to mold, air humidity and water the parchment is partially damaged and consequently hard to read. In order to enhance the readability of the text, the manuscript pages are imaged in different spectral bands ranging from 360 to 1000nm. A registration process is necessary for further imageprocessing methods which combine the information gained by the different spectral bands. Therefore, the images are coarsely aligned using rotationally invariant features and an affine transformation. Afterwards, the similarity of the different images is computed by means of the normalized cross correlation. Finally, the images are accurately mapped to each other by the local weighted mean transformation. The algorithms used for the registration and results in enhancing the texts using Multivariate Spatial Correlation are presented in this paper.
In this paper, we describe four important indirect methods which be used to extract the fetal Electrocardiogram (FECG) signal from an ECG recorded on the mother's abdomen. These methods include the following ones:...
详细信息
In this paper, we describe four important indirect methods which be used to extract the fetal Electrocardiogram (FECG) signal from an ECG recorded on the mother's abdomen. These methods include the following ones: singular value decomposition (SVD) method, independent component analysis (ICA) method, wavelet based methods and adaptive filtering method. The mentioned methods use signal processing techniques for extracting FECG from abdominal electrocardiogram (AECG). We have explained advantages and disadvantages of each method. The methods have also applied on both synthetic and real ECG signals. Efficiencies of the methods compared together based on three important criterions and results are stated and best method based on three criterions is selected.
This paper considers the combination of face and gait biometrics from the same walking sequence to carry out gender recognition. A camera is capturing the side view of a person, while another camera is placed to recor...
详细信息
This paper considers the combination of face and gait biometrics from the same walking sequence to carry out gender recognition. A camera is capturing the side view of a person, while another camera is placed to record the face of the same person at the front view. After these videos are acquired, we extract the silhouette images from the gait videos and normalized frame images decomposed from the face videos. Then, for face classification, we introduce PCA to reduce the image dimension and SVM to classify gender, for gait classification, we divide the silhouette into seven parts and extract features from each and also employ SVM to classify gender. On the decision level, the sum rule is applied to implement the fusion of these two classification results. The final fusion results show an improvement on correct classification rate.
暂无评论