Guided by a building concept model, which interprets building into different levels and scales, this paper presents a method to extract buildings in monocular urban aerial images without priori illuminating or orienta...
详细信息
ISBN:
(纸本)0780381939
Guided by a building concept model, which interprets building into different levels and scales, this paper presents a method to extract buildings in monocular urban aerial images without priori illuminating or orientation knowledge. By using a shadow context model, a method was proposed to estimate the direction of shadow cast to verify the raw segmentations. Building extractions are refined by context, and a method of partial snake with the aid of the shadow cast direction is proposed, which can sharply reduce the iteration complexity and the influence caused by illumination. The extraction of self-shadow on gable roof with a proposed mathematical roof model is also discussed in this paper.
This work presents a face detection method based on kernel Fisher discriminant analysis (KFD). Kernel based methods have been extensively investigated both in theories and applications, such as SVM and kernel PCA. Usi...
详细信息
ISBN:
(纸本)0769521223
This work presents a face detection method based on kernel Fisher discriminant analysis (KFD). Kernel based methods have been extensively investigated both in theories and applications, such as SVM and kernel PCA. Using the kernel trick, linear Fisher discriminant can be extended to non-linear case. Since the distribution of face patterns is very complex and highly nonlinear, using non-linear classification tools can hopefully tackle the problem of face detection. We explore the application of KFD in the task of frontal face detection. The experimental results prove the effectiveness of KFD in the face detection problem.
Text that appears in a scene or graphically added to video can provide an important supplemental source of index information as well as clues for decoding the video's structure and for classification, and we call ...
详细信息
ISBN:
(纸本)0780384032
Text that appears in a scene or graphically added to video can provide an important supplemental source of index information as well as clues for decoding the video's structure and for classification, and we call them closed caption. In this work, a novel algorithm is presented for detecting and locating caption in digital video. The first module of the system divides an image into small blocks featured by pixel value that is fed to SVM (support vector machine) to classify whether they are text blocks or not. The other module is to do post-processing on the classified text blocks to identify the rectangle region of them and OCR can be used further and easily. Experiments conducted with a variety of video sources show that our method could detect and locate caption region successfully by SVM with comparatively less samples.
This paper discusses a new algorithm of sub-pixels image matching and analyzes the characteristics of resampling and surface fitting methods. In order to meet the matching demands and to alleviate the computation work...
详细信息
This paper discusses a new algorithm of sub-pixels image matching and analyzes the characteristics of resampling and surface fitting methods. In order to meet the matching demands and to alleviate the computation workload, the following improvement algorithms are used. First, resample the model n-times, putt out (2n-1) sub-models, and calculate the NCs between each sub-model and image. Then choose the maximum between the sub-model and the displacement corresponding to this sub-model which requires the sub-pixel displacement. Finally, put forward a new algorithm that combines the resampling with surface fitting methods. Experimental results show the validity of the algorithm.
This paper proposes a novel approach for image lossless compression based on fuzzy logic and adaptive prediction. By a flexible strategy, the method can acquire a set of original predictors describing the more detail ...
详细信息
This paper proposes a novel approach for image lossless compression based on fuzzy logic and adaptive prediction. By a flexible strategy, the method can acquire a set of original predictors describing the more detail characteristic. Using a neural network, the proposed method can more efficiently organize the training of original predictors and implement adaptive prediction in fuzzy style. In entropy coding phase, the context-based conditional adaptive arithmetic encoding is adopted. The experiments demonstrate the characteristics make the approach achieve good tradeoff between computational complexity and efficiency of prediction and good performance for lossless compression.
The morphological top-hat operator for grayscale images is part of the basic toolbox of mathematical morphology operators. We discuss two ways of generalising the top-hat operator to multi-channel images, such as colo...
详细信息
The morphological top-hat operator for grayscale images is part of the basic toolbox of mathematical morphology operators. We discuss two ways of generalising the top-hat operator to multi-channel images, such as colour images. The first method presented is the use of a vectorial order in the relevant vector space. The second is based on the demonstration that the top-hat operator can be rewritten in terms of increments. These increments can be replaced by any vectorial distance function, removing the requirement to first impose an order on the vectors. We present examples of the use of the suggested top-hat operators in feature detection in colour images and defect detection in texture.
A segmentation model that combines the Mumford-Shah (M-S) model and narrow band scheme of level set is presented. The M-S model is a desirable model for image segmentation, but computationally time-consuming. This pap...
详细信息
A segmentation model that combines the Mumford-Shah (M-S) model and narrow band scheme of level set is presented. The M-S model is a desirable model for image segmentation, but computationally time-consuming. This paper introduces a fast segmentation model, which combines the M-S model and narrow band scheme using new initialization method. The new initialization method is based on fast marching method, and the computing time is O(n). In each iteration step, the new segmentation model only deals with the data in narrow band instead of the whole image. Comparing M-S model and new narrow band M-S, experiments show that the two models can obtain almost the same segmentation result, but the computing time of new narrow band M-S model is much less than M-S model.
In this paper, a novel binarization algorithm for color text images is presented. This algorithm effectively integrates color clustering and binary texture analysis, and is capable of handling situations with complex ...
详细信息
ISBN:
(纸本)0780384849
In this paper, a novel binarization algorithm for color text images is presented. This algorithm effectively integrates color clustering and binary texture analysis, and is capable of handling situations with complex backgrounds. In this algorithm, dimensionality reduction and graph theoretical clustering are first employed. As a result, binary images related to clusters can be obtained. Binary texture analysis is then performed on each candidate binary image. Two kinds of effective texture features, run-length histogram and spatial-size distribution related, respectively, are extracted and explored. Cooperating with a linear discriminant analysis classifier, the optimal candidate for the best binarization effect is obtained. Experiments with images collected from the Internet have been carried out and compared with existing techniques. Both show the effectiveness of the algorithm.
This paper proposes a novel fast architecture for two-dimensional discrete wavelet transform by using lifting scheme. The parallel and embedded decimation techniques are employed to optimize the architecture, which is...
详细信息
We present a method for personal authentication bsed on deformable matching of hand appearance. Authentication systems are already employed in komains that require some sort of user verification. In this work, active ...
详细信息
暂无评论