首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
IntroductionSegmentation and registration are two impor-tant problems in the field of medical image analy-sis. Traditionally, solutions have been developedfor each of these two problems in relative isolationfrom the other, but with increasing dependence onthe existence of a solution for the other. For exam-ple, model-based segmentation methods[1,2]need toregister individual data sets to a common frame ofreference, so that statistics about the models canbe gathered to guide the evolution of the…  相似文献   

2.
采用面向对象影像分析方法对试验区Quick Bird影像进行了主干道目标的提取,通过影像多尺度分割、影像类规则库的建立以及面向对象的编辑,提取出试验区主干道目标,取得了不错的效果。  相似文献   

3.
IntroductionThere are many methods to perform imagesegmentation and edge detection tasks that incor-porate region- growing and edge detection tech-niques,for example,it is applying edge detectiontechniques to obtain Difference In Strength( DIS)map then employ region growing techniques towork on the map as in Refs.[1 ,2 ]. In the others,combining both special and intensity information inimage segmentation approach based on multi- reso-lution edge detection,region selection and intensi-ty thre…  相似文献   

4.
在基于颜色的图像相似比较中,传统的处理方法大多采用各子空间的概率作为特征,在此基础上定义图像的距离和相似度.但这些方法可能导致色彩比对失真的情况出现;在同一类的石材中颜色和纹理有很大的差异,甚至会出现两张分属异类的石材图像在单纯从颜色、纹理等特征上进行判断比同类很多石材图像更为"相似".文中引入了先对石材的样本图像进行分类,定义图像与各大类的相似度.在类内定义较为一般性的相似度.综合二者给出图像的整体相似度定义,实验表明该方法具有较好的分类效果和较合理的石材图像相似度.  相似文献   

5.
IntroductionEdges are pixels where brightness changesabruptly and often used in image analysis for find-ing region boundaries.It locates sharp changes inthe intensity function.Edges detection is basic im-age features.They carry useful information aboutobject boundaries.Edges can be used for object i-dentification,image analysis and image filteringapplications as well.We shall consider as an edgethe border between two homogeneous image re-gions having different illumination.This definitionimp…  相似文献   

6.
在实际显微系统中,由于样本的折射率和透镜折射率不匹配,致使不同深度的PSF是不一样的.为了实现三维显微图像的复原,提出了基于三维高斯PSF的复原算法,将Hopfield神经网络用于三维图像序列的复原中,实验证明连续Hopfield网络能够恢复深度变化图像模型的模糊图像.  相似文献   

7.
为提高在雾霾天气条件下获取的城市交通图像的对比度和清晰度,本文提出了一种基于引导滤波平滑约束和分数阶积分的改进Retinex的图像增强方法.Retinex理论把一幅图像视为照射分量与反射分量乘积的形式.首先,利用引导滤波作为Retinex算法的目标函数的平滑约束项,通过最小化该目标函数获取照射分量;反射分量为原始图像与照射分量的比值,其主要体现图像的局部细节,对反射分量进行分数阶积分掩膜,在去除噪声干扰的同时保留图像的细节信息;最后,将处理后的反射分量与照射分量相乘,得到最终的增强图像.实验结果表明,本文方法在图像平滑和细节保持方面得到了很好的平衡,有效地提高了雾霾天气条件下城市交通图像的对比度和清晰度,使得增强后的图像更加真实自然.  相似文献   

8.
交通图像处理系统需要存储或上传非正常交通状况的图像,而图像数据量大难以存储或上传,对此本文设计了一种基于FPGA的交通图像压缩系统.针对交通图像压缩的特点,采用算法复杂度相对较低的JPEG算法,并对算法进行并行化处理,使系统内各个模块并行运行,增强了系统的实时性;采用两个基于Loeffler快速算法的一维DCT变换(1D DCT)模块实现二维DCT变换(2D DCT),并在对大量交通图像进行实验的基础上给出一套适合交通图像压缩同时适合FPGA处理的量化表,大大降低了系统对FPGA资源的占用.外场实验分析表明,系统工作稳定,压缩图像质量好,压缩比较高,实时性强,对分辨率为720×576的彩色图像具有30帧/s的处理能力,可以作为交通图像处理系统的重要组成模块.  相似文献   

9.
A semiautomatic segmentation method based on active contour is proposed for computed tomography (CT) image series. First, to get initial contour, one image slice was segmented exactly by C-V method based on Mumford-Shah model. Next, the computer will segment the nearby slice automatically using the snake model one by one. During segmenting of image slices, former slice boundary, as next slice initial contour, may cross over next slice real boundary and never return to right position. To avoid contour skipping over, the distance variance between two slices is evaluated by an threshold, which decides whether to initiate again. Moreover, a new improved marching cubes (MC) algorithm based on 2D images series segmentation boundary is given for 3D image reconstruction. Compared with the standard method, the proposed algorithm reduces detecting time and needs less storing memory. The effectiveness and capabilities of the algorithm were illustrated by ,experimental results.  相似文献   

10.
给出了评价图像变形效果的新方法.首先,计算中间帧之间的相似度,由这些相似度值生成一条曲线;然后,在图像计算机动画领域首次提出图像变形真实感度的概念.它通过计算曲线与坐标轴,曲线插值点处的曲率和其他一些衡量标准得到.试验表明,它是一有效的度量图像变形效果的客观方法.  相似文献   

11.
IntroductionAnedgeinanimagemaybedefinedasarapidgraychangeintheregisteredintensityvalues.Themostnaturalwaytodetectchangesinthe...  相似文献   

12.
精密光学元件表面洁净度成像检测系统   总被引:1,自引:0,他引:1  
为解决精密光学元件表面洁净度检测面临疵病干扰及测量精度不理想的问题,提出了基于机器视觉方法的图像检测系统,没计了适用于多种尺寸待检测元件的活动夹具和三维电控平台.利用Canny边缘检测算子分割出被检对象边缘,用凸壳的方法得到被检对象的封闭区域,采用关联向量机法,对待检测对象封闭区域的几何空间、灰度空间和变换域空间参数构成的待检测向量进行分析,识别出固体颗粒残蹦物和非同体颗粒残留物,最终得到精密光学元件表面的洁净度等级.  相似文献   

13.
IntroductionBlock truncation coding( BTC) [1] is a simple andfast lossy image coding technique,which has theadvantage of being easy to implement comparedto transform coding and vector quantization[2 ] .Its simplicity,performance and channel error re-sisting capability make it attractive in the real-time image transmission.BTC is a one- bit adap-tive moment- preserving quantizer that preservescertain statistical moments of small blocks of theinput image in the quantized output.The origi-nal …  相似文献   

14.
将数字图像处理技术应用于受电弓滑板状态监测,给出了受电弓无线图像监测系统的工作原理和组成结构,设计了图像目标的提取算法,将受电弓滑板图像的提取划分为粗提取和精提取2个步骤.该图像目标提取算法结合边缘提取、形态学图像处理、投影变换、聚类分析和Hough变换等方法,完成复杂目标图像的提取,并实现较高精度的定位.实验结果表明,所提出的算法对复杂背景、不均匀光照和噪声等影响因素不敏感,正确识别率能达到85%.  相似文献   

15.
介绍了JPEG图像压缩算法,并对含有噪声的数字图像去除相关性差的问题,提出了先滤波再进行JPEG压缩的方法。在Matlab数学分析工具环境下仿真了该算法。实验结果表明,在图像客观保真度优于经典JPEG压缩方法的情况下,也能减小平均码长。同时也体现了Matlab用来实现JPEG的图像编解码过程,具有方法简单、速度快和误差小的优点。  相似文献   

16.
Moment-Based Method to Estimate Image Affine Transform   总被引:1,自引:0,他引:1  
The estimation of affine transform is a crucial problem in the image recognition field. This paper resorted to some invariant properties under translation, rotation and scaling, and proposed a simple method to estimate the affine transform kernel of the two-dimensional gray image. Maps, applying to the original, produce some correlative points that can accurately reflect the affine transform feature of the image. Furthermore, unknown variables existing in the kernel of the transform are calculated. The whole scheme only refers to one-order moment,therefore, it has very good stability.  相似文献   

17.
电容层析成像技术(ECT)作为一种多相流参数检测技术,具有快速、非侵入、结构简单、无辐射、成本低等特点,而图像重建质量和速度是阻碍电容层析成像技术工业应用的关键性问题,本文讨论了影响图像重建的因素,在采用线性反投影算法、正则化求逆算法以及迭代法的基础上,研究了单元划分数目、有限元形状、极板数以及介电常数四种因素对成像质量的影响.研究结果对获得最佳成像效果具有一定的指导意义.  相似文献   

18.
真实路况中的运动车辆图像进行图像分割时,图像中往往存在多个车辆车牌信息,且这些车牌信息具有尺度不一,位置随机等特点,加之光照及复杂背景的影响,如何兼顾多个车辆车牌的分割效果是车辆检测和跟踪领域亟待解决的问题.为了解决这类工程应用中的问题,需要在尺度空间下对多目标图像进行分析.因本文在前期多尺度分割模型的基础上引入视觉注意机制,利用不变性特征实现多目标的定位及最优分割尺度的选取.经大量实验测试结果表明,该算法较好地实现了图像中多个车牌图像的分割并且具有较好的分割效果.  相似文献   

19.
A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform (WT) is presented in this paper. It is tolerant to the embedded wavelet image compression methods based on WT such as embedded zerotree wavelet (EZW), set partitioning in hierarchical trees (SPIHT) and embedded block coding with optimized truncation (EBCOT) in JPEG2000 to a pre-determined bit-plane, but is sensitive to all other malicious attacks. The image features are generated from the lowest-frequency (LF) subband of the original image as the embedded watermark. The watermark is embedded into the pre-determined bit-plane by adjusting the corresponding values in the given subband. In the process of watermarking authentication, we compare the image features generated from the LF subband of the received image with the embedded watermarking information (the image features of the original image) extracted from the pre-determined bit-plane in the given subband of the received image to decide whether the image is attacked maliciously or processed acceptably (the embedded wavelet compression). The most important advantage of our watermarking scheme is that the watermark information can be extracted from the watermarked image when detecting watermark, so the received image authentication needs no information about the original image or watermark. Experimental results prove the effectiveness of our proposed watermarking scheme.  相似文献   

20.
Fragile watermarking is a method to verify the integrity and authenticity of multimedia data. A new fragile watermark for image was proposed, which can be used in image verification applications. The paper first described the above two techniques, some of which will be used in the method. Then it described the embedding and authentication process and also analyzed the method to show how it can survive some attacks. The experimental results show that the proposed method doesn‘t need the watermark or original image on authentication side. It provides more security against attack, and can localize where the temoerinlz has occurred.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号