首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 23 毫秒
1.
基于目标提取的红外与可见光图像融合算法   总被引:7,自引:3,他引:4       下载免费PDF全文
分析红外图像与可见光图像融合时,目标信息丢失或减弱的潜在原因,提出一种红外与可见光图像融合算法。该算法根据红外图像与可见光图像的特点,利用灰色关联理论检测并提取红外图像目标,采用替代法对获得的目标信息与可见光图像的背景和细节信息进行融合。实验结果表明,该算法得到的融合图像具有与红外图像相同的目标,且具备可见光图像的细节信息。  相似文献   

2.
Once segmentation of 3D surface data of a rock pile has been performed, the next task is to determine the visibility of the surface rocks. A region boundary-following algorithm that accommodates irregularly spaced 3D coordinate data is presented for determining this visibility. We examine 3D surface segmentations of laboratory rock piles and determine which regions in the segmentation correspond to entirely visible rocks, and which correspond to overlapped or partially visible rocks. This is a significant distinction as it allows accurate size determination of entirely visible rocks, separate handling of partially visible rocks, and prevents erroneous bias resulting from mishandling partially visible rocks as smaller entirely visible rocks. Literature review indicates that other rock pile sizing techniques fail to make this distinction. The rock visibility results are quantified by comparison to manual surface classifications of the laboratory piles and the size results are quantified by comparison to the sieve size.  相似文献   

3.
Recently, a number of studies have demonstrated that thermal infrared (IR) imagery offers a promising alternative to visible imagery in face recognition problems due to its invariance to visible illumination changes. However, thermal IR has other limitations such as being opaque to glass. As a result, thermal IR imagery is very sensitive to facial occlusion caused by eyeglasses. Fusion of the visible and thermal IR images is an effective way to solve this problem. In this paper, using the face reconstruction information of the visible images, we propose two thermal image reconstruction algorithms, called the visible information aided eyeglasses removing algorithm (VIAER) and the refined visible information aided eyeglasses removing algorithm (refined VIAER). Experiments on publicly available data set show the excellent performance of our algorithms.  相似文献   

4.
Infrared images can distinguish targets from their backgrounds based on the radiation difference, which works well in all-weather and all-day/night conditions. By contrast, visible images can provide texture details with high spatial resolution and definition in a manner consistent with the human visual system. Therefore, it is desirable to fuse these two types of images, which can combine the advantages of thermal radiation information in infrared images and detailed texture information in visible images. In this work, we comprehensively survey the existing methods and applications for the fusion of infrared and visible images. First, infrared and visible image fusion methods are reviewed in detail. Meanwhile, image registration, as a prerequisite of image fusion, is briefly introduced. Second, we provide an overview of the main applications of infrared and visible image fusion. Third, the evaluation metrics of fusion performance are discussed and summarized. Fourth, we select eighteen representative methods and nine assessment metrics to conduct qualitative and quantitative experiments, which can provide an objective performance reference for different fusion methods and thus support relative engineering with credible and solid evidence. Finally, we conclude with the current status of infrared and visible image fusion and deliver insightful discussions and prospects for future work. This survey can serve as a reference for researchers in infrared and visible image fusion and related fields.  相似文献   

5.
A fast display method for volumetric data   总被引:2,自引:0,他引:2  
Presented is a fast display method for volumetric data sets, which involves a slicebased method for extracting potentially visible voxels to represent visible surfaces. For a given viewing direction, the number of visible voxels can be trimmed further by culling most of the voxels not visible from that direction. The entire 3D array of voxels is also present for invasive operations and direct access to interior structures. This approach has been integrated on a low-cost graphic engine as an interactive system for craniofacial surgical planning that is currently in clinical use.  相似文献   

6.
Li  Wuxin  Chen  Qian  Gu  Guohua  Sui  Xiubao 《Applied Intelligence》2022,52(7):7734-7746
Applied Intelligence - In this study, we propose a method for object matching between visible and infrared images. We consider object matching between visible and infrared images as a computational...  相似文献   

7.
快速高精度的可见面选择   总被引:3,自引:0,他引:3  
魏峰  王文成  吴恩华 《软件学报》2006,17(10):2199-2210
高效地选取可见面,对于复杂场景的快速绘制是非常重要的.提出一种可见面的选择方法,能将基于图像空间或基于物体空间的可见面选择进行高效的结合,实现可见面的快速高精度的选取.首先,它对场景中的面片进行基于法向的分类,并根据面片的空间位置,为每一类面片分别建立一种层次形式的索引结构进行管理;然后在绘制过程中,基于像素驱动对可见面片进行由近及远的选取.由于索引结构对面片进行了有序的管理,这种选取计算很快,并能将可见面都选取出来,而已绘制的可见面的集合又能自动地成为遮挡者,隐含地剔除了大量的不可见面.与目前国际上关于可见性处理的方法相比,新方法对可见面的选取具有很高的精度,速度很快,并且能够方便地处理带有动态物体的场景.  相似文献   

8.
This paper proposes a removable visible watermarking system based on a dual watermark technique and blind removal. A visible watermark pattern is embedded in the cosine discrete transform (DCT) domain, taking into consideration the texture and luminance features of the watermark and host images to create a visible watermarked image. To prevent illegal visible watermark removal, the original watermark is embedded in an invisible manner in the visible watermarked image by employing the Quantization Index Modulation-Dither Modulation (QIM-DM) technique, thus ensuring that the original watermark cannot be obtained by malicious attacks. The visible watermark removal process is carried out using only the correct user’s keys, without the need for additional information, such as the original watermark or the original host image, which allows a high-quality image to be obtained; however, if the user’s keys used in the removal process are wrong, the visible watermarked image suffers higher distortion in its content, even in non-visible watermarked regions. The experimental results show that the proposed system outperforms previous related works in terms of blind removal, preservation of the quality of the unmarked recovered image, and higher visual degradation of the content in the recovered image if an illegal removal attempt is performed.  相似文献   

9.
现代化工设备三维可视化设计   总被引:4,自引:0,他引:4  
介绍了三维可视化设计应用于现代化工设备设计的优越性和可行性,重点介绍三维可视化设计在塔板、填料、液体分布器、气体分布器和支撑结构等精馏塔内件中的应用。实践证明:三维可视化可以和强度、刚度、二维、重量、流体力学、数字化设计和制造相结合,从而,化工设备的设计过程从单一平面图转变为可视化的三维实体,使得设计过程更接近生产实际,缩短了产品设计周期,有效地降低成本。这项工作的推广将促进我国化工设备制造行业的信息化建设。  相似文献   

10.
In this paper, we propose a framework for urban visualization using a conservative from-region visibility algorithm based on occluder shrinking. The visible geometry in a typical urban walkthrough mainly consists of partially visible buildings. Occlusion-culling algorithms, in which the granularity is buildings, process these partially visible buildings as if they are completely visible. To address the problem of partial visibility, we propose a data structure, called slice-wise data structure, that represents buildings in terms of slices parallel to the coordinate axes. We observe that the visible parts of the objects usually have simple shapes. This observation establishes the base for occlusion-culling where the occlusion granularity is individual slices. The proposed slice-wise data structure has minimal storage requirements. We also propose to shrink general 3D occluders in a scene to find volumetric occlusion. Empirical results show that significant increase in frame rates and decrease in the number of processed polygons can be achieved using the proposed slice-wise occlusion-culling as compared to an occlusion-culling method where the granularity is individual buildings.  相似文献   

11.
一种用于版权通知和保护的遥感图像水印算法   总被引:1,自引:0,他引:1  
本文提出了一种用于版权通知和保护的遥感图像数字水印算法。算法以灰度图像作为可见水印及不可见水印,首先在空域中对遥感图像进行可见水印的嵌入,以实现版权通知功能;然后对图像进行小波变换,在小波域中嵌入不可见水印,以实现版权保护功能。水印提取采用与嵌入相同的逆过程,得到置乱的水印图像,采用一种新的Arnold反变换方法对水印进行反置乱,最终得到嵌入的水印图像。实验表明,嵌入的可见水印很难去除,不可见水印对图像的质量影响很小,并对常规处理具有较好的鲁棒性。  相似文献   

12.
简单多边形可见核的扫描线填充算法   总被引:1,自引:0,他引:1  
简单多边形的可见核是位于多边形内部的一个点集,可见核内的任意一点与多边形边界上的任意一点的连线都处于该多边形的内部。由于可见核具有这一性质,对简单多边形的可见核的计算在很多方面都有着适用。本文考察了简单多边形的核的性质与特点,在结合了其他相关的可见核顶点的算法之后,提出了一个对可见核进行填充的快速算法。这一算法由于通过避免在填充多边形的核之前进行计算可见核的顶点的过程,从而可以较快地对可见核进行填充。这一算法不仅容易理解,而且便于实现。  相似文献   

13.
In this paper, a stochastic model of episodic hormone secretion is used to quantify the effect of the sampling rate on the frequency of pulses that can be detected by objective computer methods in time series of plasma hormone concentrations. Occurrence times of secretion pulses are modeled as recurrent events, with interpulse intervals described by Erlang distributions. In this way, a variety of secretion patterns, ranging from Poisson events to periodic pulses, can be studied. The notion of visible and invisible pulses is introduced and the relationship between true pulses frequency and mean visible pulse frequency is analytically derived. It is shown that a given visible pulse frequency can correspond to two distinct true frequencies. In order to compensate for the 'invisibility error', an algorithm based on the analysis of the original series and its undersampled subsets is proposed and the derived computer program is tested on simulated and clinical data.  相似文献   

14.
In this paper, we propose the general procedures for generating a visible RSA public key for overcoming the drawback of people (without cryptographic background) not understanding what is meant by public key. Instead of generating a randomlike public key, a visible public key system allows the user to use a predefined image (e.g., picture, photo, signet, or handwriting signature) as his/her visible public key such that other users can decode the image as the receivers/signers public key directly for encrypting a message or verifying a signature. Of course, our procedures can also be applied to a predefined sound and/or video to generate an audible or audio-visual public key. Two algorithms for generating visible RSA public keys based on generating RSA moduli with a predetermined portion are proposed. One is suitable for the environment where all users use a common exponent, and the other is for different exponents. The constructions are almost as efficient as the generation of RSA moduli with a predetermined portion. The quality of the resulting visible public keys is almost the same as the original image, without compromising security. Experimental results show that the size and quality of visible public keys can be accepted by human eyes for practical applications.  相似文献   

15.
由于可见光和红外的成像机理、成像波段不同,获取的遥感影像之间存在复杂的非线性辐射畸变,传统的配准方法难以实现两者的高精度配准。本文提出一种基于VoxelMorph的可见光和红外遥感影像配准方法,利用卷积神经网络对可见光和红外异源图像进行分步的精细化形变场计算,从而实现快速高精度配准。将可见光图像作为参考图像,利用U-Net网络计算待配准红外图像和参考(可见光)图像的形变场,实现全局对齐的仿射变换,然后通过空间转换网络进一步实现更高自由度变形。采用WHU-OPT-SAR数据集的实验结果表明,与基于尺度不变特征变换(SIFT)算法的传统配准方法相比,本文提出的基于VoxelMorph配准方法可以获得更好的配准效果,验证了基于VoxelMorph的配准方法在多源遥感影像领域的有效性。  相似文献   

16.
This paper uses genetic algorithms to model the solution to a coordination problem through learning. The coordination problem arises out of the following two stage game. At core of the two stage game is a model of social interaction in which players use visible goods as signals about the identity of other players. If these signals are informative enough, players use them to condition their social interaction. Importantly, accurate signals are mutually beneficial. This game is then wrapped in another in which players choose their visible goods. There are many types of players and many visible goods that could be used to signal type. There are many equilibria of the two stage game, some of which allow individuals to perfectly signal their type in all social interactions, and others of which do not. The perfect signaling equilibria Pareto dominate the others, but since there are many of them, the players face a difficult coordination problem. We approach this coordination problem using genetic algorithms to simulate learning in this game. A player is a genetic code that evolves via selection.Questions of primary interest concern the set of parameter values such that the players manage to solve the coordination problem. The results of simulations indicate that the convergence of the genetic algorithm to a perfect signaling equilibrium depends on the values of the parameters that determine players' payoffs.We analyze two different scenarios. In one scenario, each player makes one (unconditional) decision to either use the visible goods displayed by other players as type signals, or to ignore the visible goods they display. In the other scenario, the decision to regard a player's visible good as a type signal is conditional on the good displayed. Our results indicate that it is easier for players to solve the coordination problem under the second scenario.  相似文献   

17.
针对井下现有通信网络存在有线网络易损坏、无线网络通信质量较差等问题,设计了一种井下LED可见光通信系统。该系统利用煤矿井下现有的照明电力线作为传输介质,通过改造LED照明系统,建立可见光通信基站,并配合矿灯移动节点,构成了覆盖巷道和工作面的通信网络,实现了照明和通信双重功能。与井下现有的通信系统相比,该系统无自然光的干扰,且不受电磁波干扰,在安全性、可靠性和稳定性等方面具有明显优势,同时成本相对较低,在井下具有较高的实用价值。  相似文献   

18.
Ocular biometrics encompasses the imaging and use of characteristic features extracted from the eyes for personal recognition. Ocular biometric modalities in visible light have mainly focused on iris, blood vessel structures over the white of the eye (mostly due to conjunctival and episcleral layers), and periocular region around eye. Most of the existing studies on iris recognition use the near infrared spectrum. However, conjunctival vasculature and periocular regions are imaged in the visible spectrum. Iris recognition in the visible spectrum is possible for light color irides or by utilizing special illumination. Ocular recognition in the visible spectrum is an important research area due to factors such as recognition at a distance, suitability for recognition with regular RGB cameras, and adaptability to mobile devices. Further these ocular modalities can be obtained from a single RGB eye image, and then fused together for enhanced performance of the system. Despite these advantages, the state-of-the-art related to ocular biometrics in visible spectrum is not well known. This paper surveys this topic in terms of computational image enhancement, feature extraction, classification schemes and designed hardware-based acquisition set-ups. Future research directions are also enumerated to identify the path forward.  相似文献   

19.
为实现简单多边形内的线燃烧轨迹计算,首先提出线视下方向可视的概念,指出8种可视的直线类型,并总结出7种桥结构模型。通过方向投影把多边形区域分成两个点可视区和两个方向可视区,利用主线和从线的遮挡关系来找桥头和桥尾以完成桥的构造,并实现多边形边界的方向可视剖分。其次,结合点可视剖分算法实现多边形的深度方向可视剖分,并进一步推导出多边形内任意点到任意线段的最短路径。最后,把该算法应用到多边形的线燃烧轨迹计算,取得良好的效果。  相似文献   

20.
Most present research of gender recognition focuses on visible facial images, which are sensitive to illumination changes. In this paper, we proposed hybrid methods for gender recognition by fusing visible and thermal infrared images. First, the active appearance model is used to extract features from visible images, as well as local binary pattern features and several statistical temperature features are extracted from thermal infrared images. Then, feature selection is performed by using the F-test statistic. Third, we propose using Bayesian Networks to perform explicit and implicit fusion of visible and thermal infrared image features. For explicit fusion, we propose two Bayesian Networks to perform decision-level and feature-level fusion. For implicit fusion, we propose using features from one modality as privileged information to improve gender recognition by another modality. Finally, we evaluate the proposed methods on the Natural Visible and Infrared facial Expression spontaneous database and the Equinox face database. Experimental results show that both feature-level and decision-level fusion improve the gender recognition performance, compared to that achieved from one modality. The proposed implicit fusion methods successfully capture the role of privileged information of one modality, thus enhance the gender recognition from another modality.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号