The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Obstacle removal is a classic problem in image processing. Because the content behind obstacle can't be deduced only from one image, we introduce a motion obstacle removal problem from an image sequence. It is regarded as a sparse problem with the obstacles as noise. First we match the images with image features to transform the images to the same camera coordinate system. The features of motion objects...
In January 2016 the U.S. National Library of Medicine announced a challenge competition calling for the development and discovery of high-quality algorithms and software that rank how well consumer images of prescription pills match reference images of pills in its authoritative RxIMAGE collection. This challenge was motivated by the need to easily identify unknown prescription pills both by healthcare...
In this paper we introduce a shape descriptor known as Self Similar Affine Invariant (SSAI) descriptor for shape retrieval. The SSAI descriptor is based on the property that two sets of points are transformed by an affine transform, then subsets of each set of points are also related by the same affine transformation. Also, the SSAI descriptor is insensitive to local shape distortions. We use multiple...
This paper proposes a quality detection method of LED surface defects in dispensing back-end based on computer vision library HALCON. The key steps mainly include image preprocessing, image matching and defect detection, etc. Firstly, to choose the matching area automatically according to the regional characteristics of the LED chip. Secondly, image matching with standard template. Finally, complete...
Human thumbprints are rich in details called minutiae, which can be used as recognition marks for thumbprint verification. Therefore attacker can track our fingerprints and use them for their purpose. Hence, to provide security to the fingerprints is an important issue. Here, system is designed to provide protection and to maintain the privacy of fingerprints. To provide privacy protection to the...
Near duplicate image detection needs the matching of a bit altered images to the original image. This will help in the detection of forged images. A great deal of effort has been dedicated to visual applications that need efficient image similarity metrics and signature. Digital images can be easily edited and manipulated owing to the great functionality of image processing software. This leads to...
Now a day's fingerprint database can be stolen. Therefore attacker can track our fingerprints and use them for their purpose. Hence, to provide security to the fingerprints is an important issue. Here, system is designed to provide protection and to maintain the privacy of fingerprints. To provide privacy protection to the fingerprints, system combines two distinct thumbprints into a new virtual Individuality...
Automatic matching of optical and SAR images could be challenging due to the significant non-linear intensity differences caused by radiometric variations among such images. To address this problem, this paper utilize the Shape Property to detect the correspondences between images. A new shape descriptor is first built on the basis of the local self-similarity descriptor. Then, the normalized correlation...
In this paper, we propose a shape code based wordimage matching (word-spotting) technique for word retrieval in multilingual documents, written in Indian languages. Each query word image to be searched is represented by a sequence of shape codes that corresponds to primitives. Then an inexact string matching technique is applied for measuring the similarity between the codes generated from the query...
Growth of the image mining arena calls for the need of quality image retrieval techniques in par with the human perception which are invariant to scale and rotation. An optimized content based image retrieval system based on local visual attention features to bridge the semantic gap problem is proposed. The approach involves the salient point detection using Scale Up Robust Features (SURF) detector...
This paper describes a method to recognize a Quick Response Code (QR) a novel. The QR Code is a two-dimensional code, which is currently used in various fields. According to the salient growth smartphone market, the recognition distance of QR Code is increased but the recognition angle is still limited. To tackle the issue, we propose a QR Code recognition method using ‘cloud-based pre-generated image...
This paper proposes the image matching method that can match rigid object image and non-rigid object image by utilizing the same feature. To this end, first determines the matching of a rigid object image through geometric verification and then discriminate the non-rigid deformable image from the verified result by using supervised learning. Lastly, this paper proposes the method to match a non-rigid...
This paper proposes a robust minutiae based fingerprint image hashing technique. The idea is to incorporate the orientation and descriptor in the minutiae of fingerprint images using SIFT-Harris feature points. A recent shape context based perceptual hashing method has been compared against the proposed technique. Experimentally, the proposed technique has been shown to deliver better robustness against...
we propose a hybrid method that integrates the minutiae and their local neighborhood information. This contribution can be seen as a validation step of the minutiae triplets matching performed in a recent algorithm: M3gl. We aim to improve the result of the minutiae triplets matching stage. The characterization of the neighborhood of each triplet is established by a unique feature vector. This descriptor...
Image matching is a key issue in Vision-Based UAV navigation problems. This paper presents an affine and rotation-invariant SIFT features descriptor for matching UAV image with satellite images. The SIFT and ASIFT algorithm are nowadays widely applied for robust image matching, but it also has a high computational complexity. SURF is used for real-time UAV position estimation but is not satisfied...
Picking of parts loaded in bulk is an industrial need. Thus bin-picking systems for various objects have ever been studied by various ways. However, it is difficult to recognize coil springs randomly placed in a pile by conventional machine vision techniques because of their shape characteristics. In this paper, we propose a method of recognition and pose estimation of coil springs. This method uses...
Biologists collect and analyze phenomic (e.g., anatomical or non-genomic) data to discover relationships among species in the Tree of Life. The domain is seeking to modernize this very time-consuming and largely manual process. We have developed an approach to detect and localize object parts in standardized images of bat skulls. This approach has been further developed for unannotated images by leveraging...
Image matching based on contour is an important issue in computer vision, navigation and pattern recognition. The image matching methods like curvature-based methods and corner-based methods have poor robustness to the contour's noise and distortion, and some matching methods are applied only to closed contours. A novel contour representation and matching algorithm, based on local curvature scale,...
In this paper we propose a point matching algorithm that computes correspondences between images and/or 3D objects in affine camera settings. We formulate the point correspondence problem by minimizing an error function over the set of all binary decisions. This function has two components: a geometric error (akin to retro-projection error) and an image dissimilarity component. Originally a combinatorial...
Tattoos on human body provide important clue to the identity of a suspect. While a tattoo is not an unique identifier, it narrows down the list of identities for the suspect. For these reasons, law enforcement agencies have been collecting tattoo images of the suspects at the time of booking. A few successful attempts have been made to design an automatic system to search a tattoo database to identify...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.