The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present a novel way of applying Zernike moments for image matching. Zernike moments are obtained from projecting image information under a circumscribed circle to Zernike basis function. However, the problem is that the power of discrimination may be reduced because hand images include lots of overlapped information due to their shape characteristic. On the other hand, in the pose...
Most target tracking algorithms work with data at the plot or detection level; that is, after an initial signal processing step of thresholding and centroiding that delivers point “hits” for data association and filtering. The GFMT (general frequency modulation tracker) and HPMHT (histogram probabilistic multi-hypothesis tracker), on the other hand, work directly with pixellated observation data,...
The change detection and diagnosis methods have gained considerable attention in scientif c research and appears to be the central issue in various application areas. These applications need some robust change detection schemes to work well and separate the changes in the experimental conditions from the real changes in the system, especially for systems with arbitrary and non-stationary known or...
For image segmentation, methods based on Markov random field (MRF) have been widely used due to the capability of incorporating contextual information into account. Among these methods, the recently proposed Triplet Markov fields (TMF) model enhances the image nonstationary modeling by introducing an auxiliary field. According to the introduced auxiliary field, TMF can partition the nonstationary...
We present an approach to learn relative photometric differences between pairs of cameras, which have partially overlapping fields of views. This is an important problem, especially in appearance based methods to correspondence estimation or object identification in multi-camera systems where grey values observed by different cameras are processed. We model intensity differences among pairs of cameras...
this paper presents a new approach to extract image features for texture classification. The extracted features are obtained by a dominant-completed modeling of the traditional local binary pattern (LBP) operator, which is robust to image rotation, grey scale changing and insensitive to noise and histogram equalization. The main idea of this texture classification approach is that a dominant center...
A novel, efficient image processing method is proposed here for extraction of pavement cracks from fuzzy and discontinuous pavement images. Pavement surface images obtained by CCD array, where pavement cracks are often blurry and discontinuous due to particle materials of pavement surface, crack degradation and unreliable crack shadows. Firstly, A series of preprocessing including using histogram...
Text detection in complex real images, such as panorama images, remains great challenging in Computer Vision. A general method often focuses on the small test images with single background which makes it easier to do the detection and recognition. In this paper, we find a novel approach, as it can automatically deal with the indoor panorama images which contains distortion and illumination problems...
Median filtering forensics and its anti-forensic attack have received considerable attention since median filtering can be used for both image enhancement and anti-forensic purposes. A median filtering anti-forensic attack method by adding uniformly distributed noise was proposed in an image pixel domain. However, we observe that this attack method leaves visible traces in the histogram of its median...
In this paper, we present a complete framework for video-based age and gender classification which performs accurately on embedded systems in real-time and under unconstrained conditions. We propose a segmental dimensionality reduction technique using Enhanced Discriminant Analysis (EDA) to reduce the memory requirements up to 99.5%. A non-linear Support Vector Machine (SVM) along with a discriminative...
Procedural textures have been widely used as they can be easily generated from various mathematical models. However, the model parameters are not perceptually meaningful or uniform for non-expert users. In this paper, we proposed a system that can generate procedural textures interactively along certain perceptual dimensions. We built a procedural texture dataset and measured twelve perceptual properties...
In recent years, the local feature descriptor called SHOT (Signature of Histograms of OrienTations) has achieved excellent performance in 3D vision. However, there still exists room for improvement: on the one hand, the convexity and concavity information is still ambiguous; on the other hand, it is not consistent and unique enough for constructing histograms with just angle information between normals...
Cracks are the most requiring type of pavement distresses to detect and classify automatically. Due to its nature are easily absorbed by other types of pavement surface damages. Moreover, the diversity of pavement surface makes the image detection system requiring efficient computer algorithms. The paper presents the solutions tested on surface distress data which were collected automatically using...
Registration is a fundamental problem in a myriad of applications ranging from heritage reconstruction to industrial applications. Descriptors are an important part of the registration pipeline as well as a very active research field. However, the sets used to illustrate descriptor performance have often undergone several preprocessing steps such as noise filtering, hole filling or outlier removal...
An improved method of testing ADCs with a sine wave histogram is combined with an improved compression algorithm to accurately test the INL and DNL of ADCs. The accuracy of the compression algorithm is demonstrated with actual and simulated results. The role of THD and noise in the accuracy of the measurements is demonstrated. A previously reported method for reducing THD in an ac source is introduced...
Recent years have shown increases in virtual 3D perception and applications, many of these applications require 3D model reconstruction from high quality LIDAR scans. High quality 3D models may be acquired from a collection of overlapping LIDAR scans which need to be registered or aligned to a common coordinate system. This paper investigates the use of a novel implementation of trilateration for...
Time-frequency manifold (TFM) is learned from the time-frequency distribution (TFD) of an analyzed signal by addressing manifold learning on multiple TFDs in a reconstructed phase space. This paper explores the probability distribution property of the TFM by using the image histogram concept, and proposes a TFM histogram matching method to build a relationship between the original TFD and the learned...
Despite recent advances, robust automatic segmentation for vertebrae computed tomography (CT) image still presents considerable challenges, mainly due to its inherent limitations, such as topological variation, irregular boundaries (double boundary, weak boundary) and image noises, etc. Therefore, this paper proposes a novel automatically initialized level set approach based on region correlation,...
These days there is an increased risk of copyright violation of multimedia data that has become an important issue for content owners and service providers. Watermarking technology aims at asserting Intellectual Property Rights (IPR) of digital images by inserting a copyright identifier in the contents of the image, to achieve copyright protection. The dual scrambled watermark is embedded on the elements...
Different methods employed for object detection are widely exploited covering application areas such as traffic monitoring, video surveillance and capturing various human activities and motion. The traditional methods that have earlier been proposed for detection are found to be beneficial if the detected object is properly identified. Moreover, minimizing the effect of dynamic changes as well as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.