共查询到20条相似文献,搜索用时 328 毫秒
1.
提出了一种小波局部特征结合LDA(线性判别分析)的人脸识别算法。首先对图像分块,选取包含图像信息量多的区域进行小波变换并提取特征,将小波分解得到的低频部分利用LDA投影求得人脸识别特征,最后利用最近邻分类器对图像进行分类。在ORL和Yale人脸数据库上进行实验,结果表明使用小波局部特征结合LDA的方法可达到较高的识别率。 相似文献
2.
3.
离散小波变换的一种硬件实现 总被引:1,自引:0,他引:1
利用带状矩阵乘法技术 ,完成了新型的离散小波变换的一种硬件实现 ,并用 Verilog语言验证了设计方法。利用该方法可以大大增加设计的通用性。 相似文献
4.
JPEG2000小波变换器的VLSI结构设计 总被引:3,自引:1,他引:2
新一代静止图像压缩标准JPEG2000将离散小波变换(DWT)作为其核心变换技术,并推荐采用推举体制(lifting)快速算法来实现.空间组合推举体制算法(SCLA)大大降低了lifting的运算量.当选用9/7小波滤波器时,SCLA的乘法运算量只有lifting的7/12.本文提出了一种实现SCLA算法的VLSI结构,降低了基于lifting实现的运算量, 加快了变换的速度,减小了电路的规模.本文的二维正反小波变换器已经作为单独的IP核应用于我们目前正在开发的JPEG2000图像编解码芯片中. 相似文献
5.
提出了一种将离散小波变化与离散余弦变换相结合的音频数字水印技术。利用离散小波变换的多分辨率特性和离散余弦变换的能量压缩能力,通过修改变换域的低中频系数,把降维后的二值图像嵌入到原始数字音频信号中。该算法可同时应用两种变换,而且嵌入和提取水印的方法简单。实验结果表明该算法水印不易破坏,对数字音频信号的低通滤波、叠加噪声等攻击均具有很好的隐蔽性和稳健性。 相似文献
6.
文中提出了一种基于离散小波变换的同步数字音频盲水印算法.嵌入的水印为视觉上可辨的二值图像.算法中引入了嵌入同步信号的思想,利用同步信号定位水印的嵌入位置,为了提高信号的鲁棒性,把同步信号与水印隐藏在DWT域的低频系数中;同时,检测水印时不需要原始音频.仿真实验表明:所提出的方法具有较强的鲁棒性和不可感知性,并能有效抵御各种常见攻击. 相似文献
7.
本文提出了一种基于离散小波变换的同步数字音频盲水印算法。嵌入的水印为视觉上可辨的二值图像。算法中引入了嵌入同步信号的思想,利用同步信号定位水印的嵌入位置。为了提高信号的鲁棒性,把同步信号与水印隐藏在DWT域的低频系数中。同时,检测水印时不需要原始音频。仿真实验表明,所提出的方法具有较强的鲁棒性和不可感知性,并能有效抵御各种常见攻击。 相似文献
8.
双树复小波变换及其应用综述 总被引:2,自引:0,他引:2
双树复小波变换是为克服通常的离散小波变换的缺陷而提出的。当对应小波基(近似)满足Hilbert变换关系时,双树复小波变换能够极大地减小通常的实小波变换中的平移敏感性,改善方向选择性。这些优点使双树复小波变换成为有效的图像配准融合工具,能够显著提高配准融合质量。 相似文献
9.
嵌入水印对音频信号波形的影响受到的关注不多.分析得出改变采样序列离散余弦变换(Discrete Cosine Transform,DCT)域某个交流系数时,逆DCT后幅值变化服从余弦曲线,改变离散小波变换(Discrete Wavelet Transform,DWT)域某个近似系数时,重构后采样序列幅值变化呈现为所选小波的尺度函数.并对在DWT-DCT混合域嵌入水印做了讨论.通过推导和实验,得到采样点的改变量与DCT域低频系数的改变量、DWT域近似系数的改变量及混合域低频系数的改变量成线性关系.所得结论有助于发现嵌入算法带给采样点序列的不连续变化而使含水印音频产生可听噪声,也有助于提高水印的嵌入效率. 相似文献
10.
在同一音频作品中先后加入稳健水印和脆弱水印,通过对小波变换系数模2取余方法嵌入稳健水印,通过对离散小波变换系数采取适当的量化处理嵌入脆弱水印。讨论了嵌入参数对水印不可知性、稳健性和脆弱性的影响。 相似文献
11.
Fast text location based on discrete wavelet transform 总被引:2,自引:0,他引:2
LiXiaohua ShenLansun 《电子科学学刊(英文版)》2005,22(4):385-394
The paper describes a texture-based fast text location scheme which operates directly in the Discrete Wavelet Transform (DWT) domain. By the distinguishing texture characteristics encoded in wavelet transform domain, the text is fast detected from complex background images stored in the compressed format such as JPEG2000 without full decompress. Compared with some traditional character location methods, the proposed scheme has the advantages of low computational cost, robust to size and font of characters and high accuracy. Preliminary experimental results show that the proposed scheme is efficient and effective. 相似文献
12.
13.
Maurizio Martina Guido Masera Gianluca Piccinini Maurizio Zamboni 《The Journal of VLSI Signal Processing》2003,35(2):137-153
This paper proposes two JPEG 2000 compliant architectures: one for DWT (Discrete Wavelet Transform) and one for IWT (Integer Wavelet Transform) implementation. First of all some theoretical issues about DWT and IWT are discussed, then, starting from transforms characteristics, the architectures are presented showing both performance and cost. In the literature many DWT architectures have been proposed; our implementation is a new architecture that computes the DWT using filters of interest for the forthcoming JPEG 2000 standard. Moreover, we propose a Lifting Scheme based architecture for IWT, JPEG 2000 compliant too. The proposed architectures are able to support real-time streams: the DWT one, which is made of 20,000 cells, with an input throughput of 160 Msamples per second and a clock frequency of 160 MHz, the IWT one, consisting of 50,000 cells, with an input throughput of 4.5 Msamples per second and an internal clock frequency of 108 MHz. 相似文献
14.
基于奇异值分解的小波域水印算法 总被引:2,自引:0,他引:2
结合奇异值分解(SVD)和离散小渡变换(DWT)的特点,提出一种基于SVD的小波域数字图像水印算法。该算法将二值水印图像经过取反置乱后嵌入到原始图像小波中频子带的奇异值中,具有较高的抗攻击能力。仿真实验证明,该算法不仅具有良好的透明性,而且对常见攻击,如:叠加噪声、JPEG压缩、滤波及几何攻击具有较好的鲁棒性。 相似文献
15.
目前的多聚焦图像融合方法对于融合模型的建立主要依赖于经验,其参数配置存在主观性.提出了一种基于IMOPSO算法的多目标多聚焦图像融合方法,简化了多聚焦图像融合模型,克服了参数配置对经验的依赖性.首先给出了多聚焦图像融合有效的评价指标,然后构造了统一的小波域多聚焦图像融合模型,最后以模型参数作为决策变量,采用IMOPSO算法进行多目标优化搜索.IMOPSO算法不但引入变异算子以避免早熟,而且引入拥挤算子,使Pareto优解尽可能均匀分布于Pareto前端,并采用一种新的自适应惯性权重提高寻优能力.实验结果表明,IMOPSO算法具有更快的收敛速度和更好的寻优能力,同时基于该算法的融合方法也实现了Pareto最优多聚焦图像融合. 相似文献
16.
Osama S. Faragallah 《AEUE-International Journal of Electronics and Communications》2013,67(3):189-196
This paper presents an efficient, robust, and imperceptible video watermarking technique based on singular value decomposition (SVD) performed in the Discrete Wavelet Transform (DWT) domain. In the proposed DWT-based SVD video watermarking method, the video frames are transformed with the DWT using two resolution levels. The high frequency band HH and the middle frequency bands LH and HL are SVD transformed and the watermark is hidden in them. The proposed DWT-based SVD video watermarking method is characterized by two improvements: (1) a cascade of two powerful mathematical transforms; the Discrete Wavelet Transform (DWT)-based SVD using additive method, and (2) an error correction code is applied and embeds the watermark with spatial and temporal redundancy. The aim of these improvements is to increase robustness against attacks based on video characteristics and the robustness against image processing attacks, realize high security level, protect the watermark against bit errors and obtain good perceptual quality. The proposed DWT-based SVD video watermarking method has been tested in the presence of video and image processing attacks and experimental results proved that the proposed DWT-based SVD video watermarking method survives attacks based on video characteristics and image processing techniques. 相似文献
17.
18.
19.
20.
Due to the demand for real time wavelet processors in applications such as video compression [1], Internet communications compression [2], object recognition [3], and numerical analysis, many architectures for the Discrete Wavelet Transform (DWT) systems have been proposed. This paper surveys the different approaches to designing DWT architectures. The types of architectures depend on whether the application is 1-D, 2-D, or 3-D, as well as the style of architecture: systolic, semi-systolic, folded, digit-serial, etc. This paper presents an overview and evaluation of the architectures based on the criteria of latency, control, area, memory, and number of multipliers and adders. This paper will give the reader an indication of the advantages and disadvantages of each design. 相似文献