首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
The probability density functions (PDFs) of the wavelet coefficients play a key role in many wavelet-based image processing algorithms, such as denoising. The conventional PDFs usually have a limited number of parameters that are calculated from the first few moments only. Consequently, such PDFs cannot be made to fit very well with the empirical PDF of the wavelet coefficients of an image. As a result, the shrinkage function utilizing any of these density functions provides a substandard denoising performance. In order for the probabilistic model of the image wavelet coefficients to be able to incorporate an appropriate number of parameters that are dependent on the higher order moments, a PDF using a series expansion in terms of the Hermite polynomials that are orthogonal with respect to the standard Gaussian weight function, is introduced. A modification in the series function is introduced so that only a finite number of terms can be used to model the image wavelet coefficients, ensuring at the same time the resulting PDF to be non-negative. It is shown that the proposed PDF matches the empirical one better than some of the standard ones, such as the generalized Gaussian or Bessel K-form PDF. A Bayesian image denoising technique is then proposed, wherein the new PDF is exploited to statistically model the subband as well as the local neighboring image wavelet coefficients. Experimental results on several test images demonstrate that the proposed denoising method, both in the subband-adaptive and locally adaptive conditions, provides a performance better than that of most of the methods that use PDFs with limited number of parameters.   相似文献   

2.
为了解决电子产品印刷盗版的问题,提出了基于LAB色彩空间和DWT的彩色图像数字水印算法,算法将水印置乱后嵌入到LAB色彩空间的亮度L分量的小波分解系数,实验证明,所提出的算法对常用的图像处理如JPEG压缩、加噪、剪切和滤波等攻击具有较好的鲁棒性、不可见性和安全性.  相似文献   

3.
A scheme jointly exploring the rational dither modulation (RDM) and auditory masking properties in the discrete wavelet transform (DWT) domain is proposed to achieve effective blind audio watermarking. The embedding of binary information is carried out by modulating coefficient vectors in the 5th-level approximation subband using the quantization steps estimated from past watermarked vectors. The robustness and payload capacity of the proposed scheme are maneuverable by varying vector dimensions, while the imperceptibility is ensured by constraining quantization noise below the auditory masking threshold. Furthermore, the periodic characteristic inherited in the RDM formulation can be used to re-establish synchronization for accurate watermark extraction. Experimental results show that the proposed DWT–RDM approach renders a near-zero objective difference grade in the perceptual evaluation of audio quality even when the signal-to-noise ratio maintains at a level near 20 dB. In most digital signal processing attacks, the bit error rates of retrieved watermarks are sufficiently low as compared to other recently developed methods with fewer payload capacities.  相似文献   

4.
Breast-cancer screening using microwave imaging is emerging as a new promising technique as a supplement to X-ray mammography. To create tomographic images from microwave measurements, it is necessary to solve a nonlinear inversion problem, for which an algorithm based on the iterative Gauss-Newton method has been developed at Dartmouth College. This algorithm determines the update values at each iteration by solving the set of normal equations of the problem using the Tikhonov algorithm. In this paper, a new algorithm for determining the iteration update values in the Gauss-Newton algorithm is presented which is based on the conjugate gradient least squares (CGLS) algorithm. The iterative CGLS algorithm is capable of solving the update problem by operating on just the Jacobian and the regularizing effects of the algorithm can easily be controlled by adjusting the number of iterations. The new algorithm is compared to the Gauss-Newton algorithm with Tikhonov regularization and is shown to reconstruct images of similar quality using fewer iterations.  相似文献   

5.
In this paper, we propose the block-coordinate Gauss-Newton/regression method in order to conduct a correlation-based registration considering the intensity difference between images in the presence of outlier objects. In the proposed method, the parameters are decomposed into two blocks, one of which is for the spatial registration and the other for the intensity compensation. The two blocks are sequentially updated by the Gauss-Newton update and the polynomial regression, respectively. Because of the separated blocks, we can perform a joint optimization with low computational complexity and high implementation flexibility. For example, we apply separately appropriate scaling techniques to the parameter blocks for a stable and fast convergence of the algorithm. Furthermore, we apply the constrained monotone regression with a robust outlier detection scheme for the intensity compensation block. From numerical results, it is shown that the proposed algorithm more effectively performs a correlation-based registration considering the intensity difference alleviating the influence of the outlier objects compared to the traditional registration algorithms that perform the joint optimization.  相似文献   

6.
毛京湘  王忆锋 《红外》2009,30(3):43-45
红外焦平面探测器的盲元分布对红外图像有很大影响.介绍了用MATLAB图像处理工具箱提供的命令实现红外焦平面探测器盲元统计分析的方法.该方法可以很容易得到探测器相连成块盲元的分布情况,具有程序实现简单、工作量小等优点.举例说明了该方法在实际中的应用.  相似文献   

7.
Transmission of block-coded images through error-prone wireless channels often results in lost blocks. In this study, we investigate a novel error concealment method for covering up these high packet losses and reconstructing a close approximation. Our scheme is a modified discrete wavelet transform (DWT) technique (namely, subbands based image error concealment (SIEC)) for embedding downsized replicas of original image into itself. We propose that this technique can be implemented for wireless channels to combat degradations in a backward-compatible scheme. We show that the proposed error concealment technique is promising, especially for the erroneous channels causing a wider range of packet losses, at the expense of computational burden  相似文献   

8.
For original paper, see Nikolaidis and Pitas (IEEE Trans. Image Process., vol.12, no.5, p.563-71, May 2003). Explicit expressions are derived for the Fisher information for the generalized Gaussian noise model considered by Nikolaidis and Pitas  相似文献   

9.
传统的线性检测算法对于弱线性和噪声往往效果不佳,其原因是没有充分利用到象素点之间的潜在线性关系。从脊波(Ridgelet)分析出发,提出了一种基于分块离散脊波变换的SAR图像线性特征提取算法。这样首先对SAR图像进行分块离散脊波变换,在变换域进行阈值选取。这样既可以精确定位线性特征,还可以获得线性特征的斜率。仿真试验表明该方法对线性特征比较明显的SAR图像非常有效。  相似文献   

10.
在图像中嵌入可逆水印时,为了提高水印算法的安全性,采用参数化整数小波并利用位于细节子带整数小波系数的特点,提出了一种安全性高的可逆水印算法.实验结果表明,算法具有水印不可见性好、安全性高及篡改定位准确的特点.  相似文献   

11.

Intentional illegitimate modification in any digital image data is one of the general malversations in the existing digital domain. Therefore in this work, the authors have devised a fragile watermarking technique for the localization of illegitimate modifications in the digital image content effectually. The proposed technique detects forged digital image content strongly in the block-level of two successive pixels. This scheme is performed at the block level, where the actual image is partitioned into non-overlapping blocks of size (1?×?2) pixels. Afterward, the block-level authentication code is generated from the MSB of two successive pixels of each block using averaging and modulus operations. The generated authentication code/watermark is encrypted using a logistic-map-based chaotic key series. The encrypted authentication code is embedded into two successive pixels of the corresponding block. Further, any form of forgery in the watermarked image can be detected by comparing its extracted authentication code and regenerated authentication code. The proposed procedure is successfully experienced on a variety of grayscale images, and the experimental results exhibit that watermarked images generated by this scheme are of considerably high quality in terms of PSNR, IF, and SSIM. The proposed method is capable of efficient forgery detection by achieving very high accuracy, NC, and true positive rate while maintaining considerably low false-positive and false-negative rates.

  相似文献   

12.
Multiplicative noise is often present in medical and biological imaging, such as magnetic resonance imaging (MRI), Ultrasound, positron emission tomography (PET), single photon emission computed tomography (SPECT), and fluorescence microscopy. Noise reduction in medical images is a difficult task in which linear filtering algorithms usually fail. Bayesian algorithms have been used with success but they are time consuming and computationally demanding. In addition, the increasing importance of the 3-D and 4-D medical image analysis in medical diagnosis procedures increases the amount of data that must be efficiently processed. This paper presents a Bayesian denoising algorithm which copes with additive white Gaussian and multiplicative noise described by Poisson and Rayleigh distributions. The algorithm is based on the maximum a posteriori (MAP) criterion, and edge preserving priors which avoid the distortion of relevant anatomical details. The main contribution of the paper is the unification of a set of Bayesian denoising algorithms for additive and multiplicative noise using a well-known mathematical framework, the Sylvester–Lyapunov equation, developed in the context of the Control theory.   相似文献   

13.
基于计算全息图编码的水印技术是一种脆弱水印技术,由于其极容易被破坏的特性,非常适合用于图像内容的认证,在图像的认证鉴定的时候,通过比较提取的水印和初始水印的相关性鉴定图像内容的完整性,可以有效防止篡改和对修改图像的欺骗性应用。同时,图像的内容被篡改时,水印信息应该提供图像被伪造的证据。利用计算全息图作为水印,嵌入的水印可能被使用傅里叶变换恢复,进而,宿主图像也能被利用同样的全息模式进行篡改和嵌入水印,为了避免这种弊端,还需要引入加密方法。  相似文献   

14.
一种面向内容认证的文档图像半脆弱数字水印算法   总被引:1,自引:0,他引:1  
提出了一种面向内容认证的文档图像半脆弱数字水印算法,该算法利用DCT变换域低频系数之间的关系生成水印信息,并将水印信息嵌入到矩阵的奇异值中,对文档图像进行认证时,不需要原始载体图像,也不需要额外存储水印信息,是一个完全的盲水印算法.实验表明,该算法具有较好的透明性,对JPEG有损压缩具有较好的鲁棒性;对剪切、替换等恶意篡改表现出脆弱性.该算法达到了半脆弱水印的基本要求,是一个安全且实用的半脆弱数字水印算法.  相似文献   

15.
Wireless Personal Communications - This article describes the basic information hiding technique that is most commonly used nowadays. As evolution in the communication media has made information...  相似文献   

16.
In video communication over lossy packet networks (e.g., the Internet), packet loss errors can severely damage the transmitted video. The damaged video can largely be repaired with passive error concealment, where neighboring information is used to estimate missing information. We address the problem of passive error concealment for wavelet coded data with dispersive packetization. The reported techniques of this kind have many problems and usually fail in the reconstruction of high-frequency content. This paper presents a novel locally adaptive error concealment method for subband coded I-frames based on an inhomogeneous Gaussian Markov random field model. We estimate the parameters of this model from a local context of each lost coefficient, and we interpolate the lost coefficients accordingly. The results demonstrate a significant improvement over the reported related methods both in terms of objective performance measures and visually. The biggest improvement of the proposed method compared to the state-of-the-art in the field is the correct reconstruction of high-frequency information such as textures and edges.   相似文献   

17.
电子签章为公文在网络间的安全传输提供了一种安全的保障,其为确保公文的完整性和权威性提供了一种有效的途径。本文针对电子签章系统中的关键算法——数字水印算法,提出了一种基于电子签章的二值图像盲数字水印算法;算法结合电子签章系统,通过在印章图像中嵌入可见水印以提高印章图像隐藏信息的能力,而后将公文的摘要信息嵌入到印章图像中。通过实验看出,算法对常见的水印攻击具有较好的稳健性,是一种有效的二值图像盲数字水印算法。  相似文献   

18.
针对小波变换缺乏平移不变性产生的伪吉布斯现象(Gibbs-like phenomena)和Donoho阈值去噪方法阈值单一的缺陷,提出了基于Cycle Spinning的图像自适应阈值去噪方法,Cycle Spinning能抑制伪吉布斯现象,并且给出了阈值自适应因子,阈值能根据不同高频子带自适应改变。实验显示,该方法提高了去噪图像峰值信噪比(PSNR),降低了均方误差(MSE),去噪图像清晰,获得较好的视觉效果。  相似文献   

19.
A study of the possibility of approximating the Neyman-Pearson detector using supervised learning machines is presented. Two error functions are considered for training: the sum-of-squares error and the Minkowski error with R = 1. The study is based on the calculation of the function the learning machine approximates to during training, and the application of a sufficient condition previously formulated. Some experiments about signal detection using neural networks are also presented to test the validity of the study. Theoretical and experimental results demonstrate, on one hand, that only the sum-of-squares error is suitable to approximate the Neyman-Pearson detector and, on the other hand, that the Minkowski error with R = 1 is suitable to approximate the minimum probability of error classifier.  相似文献   

20.
一种基于离散余弦变换与奇异值分解的数字图像水印算法   总被引:2,自引:1,他引:2  
刘俊景  蒋华 《微电子学与计算机》2007,24(10):111-114,117
结合奇异值分解(SVD)和离散余弦变换(OCT)的特点,提出了一种基于离散余弦交换与奇异值分解的数字图像水印算法.该算法能够很好地解决透明性和鲁棒性之间的矛盾.算法中采用经过置乱变换的灰度图作为水印,不仅增加了嵌入的信息量,而且提高了水印的安全性.实验结果表明,该算法不仅具有较好的透明性,而且对常见攻击如:叠加噪声、JPEG压缩、滤波以及几何攻击等具有较好的鲁棒性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号