共查询到20条相似文献,搜索用时 254 毫秒
1.
A two-stage method for image segmentation based on edge and region information is proposed. Different deformation schemes are used at two stages for segmenting the object correctly in image plane. At the first stage, the contour of the model is divided into several segments hierarchically that deform respectively using affine transformation. After the contour is deformed to the approximate boundary of object, a fine match mechanism using statistical information of local region to redefine the external energy of the model is used to make the contour fit the object's boundary exactly. The algorithm is effective, as the hierarchical segmental deformation makes use of the globe and local information of the image, the affine transformation keeps the consistency of the model, and the reformative approaches of computing the internal energy and external energy are proposed to reduce the algorithm complexity. The adaptive method of defining the search area at the second stage makes the model converge quickly. The experimental results indicate that the proposed model is effective and robust to local minima and able to search for concave objects. 相似文献
2.
A Novel and Efficient Method for Iris Automatic Location 总被引:1,自引:0,他引:1
XU Guang-zhu ZHANG Zai-feng MA Yi-de 《中国矿业大学学报(英文版)》2007,17(3):441-446
An efficient and robust iris location algorithm plays a very important role in a real iris recognition system. A novel and efficient iris automatic location method is presented in this study. It includes following two steps mainly: pu- pil location and iris outer boundary location. A digital eye image was divided into many small rectangular blocks with fixed size in the pupil location, and the block with the smallest average intensity was selected as a reference area. Then image binarization was implemented taking the average intensity of the reference area as a threshold. At last the center coordinates and radius of pupil were estimated by extending the reference area to the pupil's boundaries in the binary iris image. In the iris outer location, two local parts of the eye image were selected and transformed into polar coordinates from Cartesian reference. In order to detect the fainter outer boundary of the iris quickly, a novel edge detector was used to locate boundaries of the two parts. The center coordinates and radius of the iris outer boundary can be estimated using the fusion of the locating results of the two local parts and the location information of the pupil. The algorithm was tested on CASIA vl.0 and MMU vl.0 digital eye image databases and experimental results show that the proposed method has satisfying performance and good robustness. 相似文献
3.
The main methods of the second phase quantitative analysis in current material science researches are manual recognition and extracting by using software such as Image Tool and Nano Measurer. The weaknesses such as high labor intensity and low accuracy statistic results exist in these methods. In order to overcome the shortcomings of the current methods, the Ω phase in A1-Cu-Mg-Ag alloy is taken as the research object and an algorithm based on the digital image processing and pattern recognition is proposed and implemented to do the A1 alloy TEM (transmission electron microscope) digital images process and recognize and extract the information of the second phase in the result image automatically. The top-hat transformation of the mathematical morphology, as well as several imaging processing technologies has been used in the proposed algorithm. Thereinto, top-hat transformation is used for elimination of asymmetric illumination and doing Multi-layer filtering to segment Ω phase in the TEM image. The testing results are satisfied, which indicate that the Ω phase with unclear boundary or small size can be recognized by using this method. The omission of these two kinds of Ω phase can be avoided or significantly reduced. More Ω phases would be recognized (growing rate minimum to 2% and maximum to 400% in samples), accuracy of recognition and statistics results would be greatly improved by using this method. And the manual error can be eliminated. The procedure recognizing and making quantitative analysis of information in this method is automatically completed by the software. It can process one image, including recognition and quantitative analysis in 30 min, but the manual method such as using Image Tool or Nano Measurer need 2 h or more. The labor intensity is effectively reduced and the working efficiency is greatly improved. 相似文献
4.
In order to stabilize the video image sequence, a method of using inertial measurement module to build digital image stabilization system is proposed. Through applying realtime attitude information of the camera that obtained by highprecision attitude sensor to estimate the image motion vector and then to compensate for image, the purpose of stabilizing the image sequence can be achieved. Experiments demonstrate that this method has a high image stabilization precision, and the up to 16 frame/s video output rate completely meets the realtime requirements. 相似文献
5.
As the basic work of image stitching and object recognition, image registration played an important part in the image processing field. Much previous work in registration accuracy and real-time performance progressed very slowly, especially in registrating images with line feature. An innovative method for image registration based on lines is proposed, it can effectively improve the accuracy and real-time performance of image registration. The line feature can deal with some registration problems where point feature does not work. Our registration process is divided into two parts. The first part determines the rough registration transformation relation between reference image and test image. Then the similarity degree among different transformation and modified non-maximum suppression (MNMS) algorithms are obtained, which produce local optimal solution to optimize the rough registration transformation. The final optimal registration relation can be obtained from two registration parts according to the match scores. The experimental results show that the proposed method makes a more accurate registration relation and performs better in real-time situation. 相似文献
6.
DCT based multipurpose watermarking technique for image copyright notification and protection 总被引:1,自引:0,他引:1
A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided into two parts for embedding the visible and invisible watermarks. The visible watermark is embedded in each DC DCT coefficient and most of the AC DCT coefficients of every block, and the invisible watermark in the rest. Based on the characteristics of Human Visual System ( HVS), the embedding strength of the visible watermark is varied in accordance with the underlying content of the host image. The invisible watermark is embedded in a quaternity of midrange frequencies. Experimental results show that the visible watermark is hard to remove and the invisible watermark is robust to common digital signal processing operations. 相似文献
7.
The achievement in optical/digital color photography based on white-light information processing including the color-encoding camera, the color image decoder, the integral window Fourier algorithm of the Fourier transform in digital decoding, the color correction of the retrieval color image and the fusion of zero order diffraction is reported. This technique has found its important applications in the fields of aerial reconnaissance photography and far-distance ground photography due to its features of large information capacity, convenience in archival storage, the capability of color enhancement, particularly easy transportation by Internet. 相似文献
8.
The performances of repaired image depend on the local information in the repaired area and the consistency between the repair directions with structural content. Image repair algorithm with texture information performs well in repairing seriously damaged images, but it has bad performances when the images have the abundant structure information. The dual optimization image repair algorithm based on the linear structure and the optimal texture is proposed. The algorithm uses the double-constraint sparse model to reconstruct the missed information in large area in order to improve the clarity of repaired images. After adopting the preference of Criminisi priority, the image repair algorithm of self-similarity characteristics is proposed to improve the fault and fuzzy distortion phenomena in the repaired image. The results show that the proposed algorithm has more clarity in the image texture and structure and better effectiveness, and the peak signal-to-noise ratio of the repaired images by proposed algorithm is superior to that by other algorithms. 相似文献
9.
XU Bin TANG Linxin SHI Hanmin 《武汉理工大学学报》2006,28(Z2)
The reconstruction of free-form surface is a fundamental problem in digital manufacture.This article presents a novel solution to reconstructing free-form surface from an intensity image under the Lambertian reflection model,that is a method called shape from shading (SFS).Our approach is based on the two-dimensional cellular automata (CA),and fully uses the local information of both image and the reconstructed surface.After several iterations,the free-form surface corresponding to the input image is obtained.The encouraging results on both synthetic and real-world images are provided in this paper,and the perfor- mance of our algorithm is analyzed on synthetic images using mean and standard deviation of depth (Z) errors. 相似文献
10.
LIU Quan WANG Jin 《武汉理工大学学报》2006,28(Z2)
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn't need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on. 相似文献
11.
数字图像的仿射模变换及其周期性 总被引:1,自引:1,他引:0
以图像信息安全问题为研究背景 ,提出了一类数字图像的仿射模变换 ,讨论了该类变换的周期并给出了证明 ,用实例说明了该类变换在数字图像置乱中的作用 相似文献
12.
幻方变换加密数字全息图 总被引:1,自引:0,他引:1
幻方变换加密数字图像,在某些迭代次数时会泄露原图像的信息.因此,一种改进的方法是将其与其它加密技术结合在一起,如用幻方变换加密数字全息图像.该方法先用信息光学原理将原图生成傅立叶数字全息图,再经幻方变换得到加密图像.在MATLAB上的实验结果表明,幻方变换全息图方法,生成一些类似数字全息图的图像,生成的图像彻底隐去原图的信息.相比单纯使用幻方变换的加密方法,新方法有双重因素控制,有更高的安全性. 相似文献
13.
红外成像在军事、工业及日常生活中都有广泛的应用,而二维离散余弦变换(DCT)是数字信号图像处理中被运用得最广泛的算法。提出了一种以FPGA为硬件载体的二维离散余弦变换对红外图像预处理的硬件设计方法。该设计方法重点在于根据FPGA灵活的特性及红外图像的特点,选择一种比较适合的混合DCT变换方法,通过降低周期内乘法器的使用量提高速率,实现以速率至上的变换系统,并且通过控制信号完成DCT或者IDCT的选择,以满足不同需求的变换。 相似文献
14.
基于拉伸空间变换算法在DSA配准中的应用 总被引:3,自引:0,他引:3
提出一种基于拉伸的空间变换算法, 首次将其应用于数字减影血管造影术(DSA) 图像配准中以消除运动伪影. 实验结果表明, 与传统线性空间变换算法相比, 采用基于拉伸的空间变换算法配准后的减影图像质量显著改善. 为提高计算速度, 仅对选定的控制点进行块匹配操作, 图像其余像素点基于相邻像素运动位移的连续性, 均由找到的运动位移点经空间变换和灰度插值计算得到. 基于拉伸的空间变换算法可避免采用传统线性空间变换算法所产生的病态解, 属于非线性有理变换. 提出的基于拉伸的空间变换算法简单实用, 可准确有效地确定需估算的运动位移点位置, 且配准后的减影图像质量优于采用线性空间变换算法配准的减影图像质量. 相似文献
15.
提出了一个基于小波变换的数字水印嵌入算法,将YIQ色彩空间的Y分量进行1,2,…,M级小波变换,提取出各级小波变换后近似图像的鲁棒系数构造水印,使构造的水印可包含RGB三个通道的特征信息。并根据小波零树结构的原理,将消费者指定的授权信息嵌入到M级小波变换后HL、LH子带的重要系数中,利用密钥保护与代理中心CA实现版权保护与跟踪,保护版权人与消费者的合法权益。实验证明,所提出的解决方案计算简单,安全性高.检测时不需要原始图像,很容易应用于电子商务中实现数字图像产品的版权保护与跟踪。 相似文献
16.
基于光学变换和经典置乱变换的图像复合加密方法 总被引:1,自引:0,他引:1
图像加密已成为信息安全领域关注的焦点。本文提出了基于光学变换和经典置乱变换相结合的复合加密方法。首先介绍了光学变换中的双随机相位加密方法,其次描述了几何变换中的Arnold变换和混沌变换两种经典置乱加密方法,最后将这三大类加密方法进行组合实现图像复合加密。实验结果表明,本文方法具有更强的安全性。 相似文献
17.
以图像信息安全问题为研究背景,讨论了三维Arnold逆变换和n维Arnold逆变换的周期性,给出了周期的上界估值定理,并用实例说明了三维Arnold逆变换在数字图像置乱中的应用. 相似文献
18.
0 INTRODUCTIONThesuccessoftheInternetintroducesanewsetofchallengingproblemsregardingsecurity .Oneofmanyissuesthathavearisenistheproblemofcopyrightpro tectionofelectronicinformation .Digitalwatermarkinghasbeenproposedasawaytoclaimtheownershipofthesourcea… 相似文献
19.
With the security problem of image information as the background, some more properties of the period of Arnold transformation of two-dimension were studied by means of introducing a integer sequence. Some new resuits are obtained. Two interesting conjectures on the period of Arnold transformation are given. When making digital images scrambling by Arnold transformation, it is important to know the period of the transformation for the image. As the application of the theory, a new method for computing the periods at last are proposed. 相似文献
20.
以ConstantinidesA.G提出的数字频带变换法基础,推导了了表示数字滤波器多频变换式中系数与给定设计参数之间的非线性方程组,采用变尺度法求解非线性方程组,使得用多频我法设计多玩限冲激,响应数字滤波器成为现实。 相似文献