首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6篇
  免费   0篇
无线电   2篇
自动化技术   4篇
  2019年   2篇
  2014年   2篇
  2012年   2篇
排序方式: 共有6条查询结果,搜索用时 15 毫秒
1
1.
2.
Multidimensional Systems and Signal Processing - A probabilistic video content analysis method called extended histogram (EH) is proposed for modelling temporal evolutions of a set of histograms...  相似文献   
3.
Multimedia Tools and Applications - A novel class-dependent joint weighting method is proposed to mine the key skeletal joints for human action recognition. Existing deep learning methods or those...  相似文献   
4.

Automatic extraction of blood vessels is an important step in computer-aided diagnosis in ophthalmology. The blood vessels have different widths, orientations, and structures. Therefore, the extracting of the proper feature vector is a critical step especially in the classifier-based vessel segmentation methods. In this paper, a new multi-scale rotation-invariant local binary pattern operator is employed to extract efficient feature vector for different types of vessels in the retinal images. To estimate the vesselness value of each pixel, the obtained multi-scale feature vector is applied to an adaptive neuro-fuzzy inference system. Then by applying proper top-hat transform, thresholding, and length filtering, the thick and thin vessels are highlighted separately. The performance of the proposed method is measured on the publicly available DRIVE and STARE databases. The average accuracy 0.942 along with true positive rate (TPR) 0.752 and false positive rate (FPR) 0.041 is very close to the manual segmentation rates obtained by the second observer. The proposed method is also compared with several state-of-the-art methods. The proposed method shows higher average TPR in the same range of FPR and accuracy.

  相似文献   
5.
This paper proposes a statistically optimum adaptive wavelet packet (WP) thresholding function for image denoising based on the generalized Gaussian distribution. It applies computationally efficient multilevel WP decomposition to noisy images to obtain the best tree or optimal wavelet basis, utilizing Shannon entropy. It selects an adaptive threshold value which is level and subband dependent based on analyzing the statistical parameters of subband coefficients. In the utilized thresholding function, which is based on a maximum a posteriori estimate, the modified version of dominant coefficients was estimated by optimal linear interpolation between each coefficient and the mean value of the corresponding subband. Experimental results, on several test images under different noise intensity conditions, show that the proposed algorithm, called OLI-Shrink, yields better peak signal noise ratio and superior visual image quality-measured by universal image quality index-compared to standard denoising methods, especially in the presence of high noise intensity. It also outperforms some of the best state-of-the-art wavelet-based denoising techniques.  相似文献   
6.
In this paper a data hiding method is proposed based on the combination of a secret sharing technique and a novel steganography method using integer wavelet transform. In this method in encoding phase, first a secret image is shared into n shares, using a secret sharing technique. Then, the shares and Fletcher-16 checksum of shares are hidden into n cover images using proposed wavelet based steganography method. In decoding phase, t out of n stego images are required to recover the secret image. In this phase, first t shares and their checksums are extracted from t stego images. Then, by using the Lagrange interpolation the secret image is revealed from the t shares. The proposed method is stable against serious attacks, including RS and supervisory training steganalysis methods, it has the lowest detection rate under global feature extraction classifier examination compared to the state-of-the-art techniques. Experimental results on a set of benchmarks showed that this method outperforms conventional methods in offering a high secure and robust mechanism for joining secret image sharing and steganography.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号