Loading...
Search for: original-images
0.01 seconds

    Histogram based reflection detection

    , Article 2011 7th Iranian Conference on Machine Vision and Image Processing, MVIP 2011 - Proceedings, 16 November 2011 through 17 November 2011 ; November , 2011 , Page(s): 1 - 5 ; 978-1457715334 ; 9781457715358 (ISBN) Ahmadi, A ; Ahani, S ; Khalilian, H ; Gholampour, I ; Sharif University of Technology
    2011
    Abstract
    Reflection appears as a layer that partly covers the original image. This phenomenon may cause failure in extracting information from images of reflecting objects. This work presents an automated technique for determining of reflection area as well as its severity to define reliability of extracted information. This is done by analyzing histogram and objects found in the image. We present a strong detector based on combining the results of these two procedures. We presented new reflection detection algorithm and a new method to find a good threshold value for converting any image into a binary image. The average reflection detection accuracy of the proposed algorithm is more than 95% for... 

    A robust zero-watermark copyright protection scheme based on DWT and image normalization

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 20 November 2011 through 23 November 2011 ; Volume 7088 LNCS, Issue PART 2 , November , 2011 , Pages 359-370 ; 03029743 (ISSN) ; 9783642253454 (ISBN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Recently, protecting the copyright of digital media has become an imperative issue due to the growing illegal reproduction and modification of digital media. A large number of digital watermarking algorithms have been proposed to protect the integrity and copyright of images. Traditional watermarking schemes protect image copyright by embedding a watermark in the spatial or frequency domain of an image. However, these methods degrade the quality of the original image in some extend. In recent years, a new approach called zero-watermarking algorithms is introduced. In these methods, the watermark does not require to be embedded into the protected image but is used to generate a verification... 

    Watermarking based on independent component analysis in spatial domain

    , Article Proceedings - 2011 UKSim 13th International Conference on Modelling and Simulation, UKSim 2011, 30 March 2011 through 1 April 2011, Cambridge ; 2011 , Pages 299-303 ; 9780769543765 (ISBN) Hajisami, A ; Rahmati, A ; Babaie Zadeh, M ; Sharif University of Technology
    2011
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, embedding is carried out in cumulative form in spatial domain and ICA is used for watermark extraction. For extraction there is no need to access the original image or the watermark, and extraction is carried out only with two watermarked images. Experimental results show that the new method has better quality than famous methods [1], [2], [3] in spatial or frequency domain and is robust against various attacks. Noise addition, resizing, low pass filtering, multiple marks, gray-scale reduction, rotation, JPEG compression, and cropping are some... 

    Impulsive noise removal from images using sparse representation and optimization methods

    , Article 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010, 10 May 2010 through 13 May 2010 ; May , 2010 , Pages 480-483 ; 9781424471676 (ISBN) Beygi Harchegani, S ; Kafashan, M ; Marvasti, F ; Sharif University of Technology
    2010
    Abstract
    In this paper, we propose a new method for impulsive noise removal from images. It uses the sparsity of natural images when they are expanded by mean of a good learned dictionary. The zeros in sparse domain give us an idea to reconstruct the pixels that are corrupted by random-value impulse noises. This idea comes from this reality that noisy image in sparse domain of original image will not have a sparse representation as much as original image sparsity. In this method we assume that the proper dictionary to achieve image in sparse domain is available  

    Robust image watermarking using independent component analysis

    , Article Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, 12 November 2010 through 14 November 2010, Qingdao ; 2010 , Pages 363-367 ; 9780769542614 (ISBN) Hajisami, A ; Ghaemmaghami, S ; Sharif University of Technology
    2010
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark extraction. The extraction process could be either non-blind, through a straightforward procedure, or blind, via a tricky method we propose. Experimental results show that the new method outperforms some well-known image watermarking methods [1], [2], [3] in spatial or frequency domain and... 

    High capacity image steganography in wavelet domain

    , Article 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010, 9 January 2010 through 12 January 2010, Las Vegas, NV ; 2010 ; 9781424451760 (ISBN) Sarreshtedari, S ; Ghaemmaghami, S ; Sharif University of Technology
    2010
    Abstract
    A new high capacity method for transform domain image steganography is introduced in this paper. The proposed steganography algorithm works on the wavelet transform coefficients of the original image to embed the secret data. As compared to current transform domain data hiding methods, this scheme can provide a larger capacity for data hiding without sacrificing the cover image quality. This is achieved through retaining integrity of the wavelet coefficients at high capacity embedding. This improvement to capacity-quality trading-off interrelation is analyzed in detailed and experimentally illustrated in the paper  

    Salt and pepper noise removal for image signals

    , Article 2008 International Conference on Telecommunications, ICT, St. Petersburg, 16 June 2008 through 19 June 2008 ; October , 2008 ; 9781424420360 (ISBN) Feizi, S ; Zahedpour, S ; Soltanolkotabi, M ; Amini, A ; Marvasti, F ; Sharif University of Technology
    2008
    Abstract
    In this paper we propose a new method to recover images corrupted with salt and pepper noise. The proposed method uses ordered statistics filtering and soft-decisioning in successive approximations to find the locations and amplitudes of all the impulses. In our method we use soft-decision to generate a mask which is based on histogram distributions in local windows to distinguish impulsive noise from legitimate pixels. This mask is used to obtain an estimate of the original image by an iterative method. The result of the aforementioned algorithm can be fed back into the system to improve the image reconstruction process. This algorithm is analyzed and verified by simulation results.... 

    Fine logarithmic adaptive soft morphological algorithm for synthetic aperture radar image segmentation

    , Article IET Image Processing ; Volume 8, Issue 2 , 2014 , Pages 90-102 ; ISSN: 17519659 Koosha, M ; Hajsadeghi, K ; Koosha, M ; Sharif University of Technology
    Abstract
    Synthetic aperture radar (SAR) appropriate image processing in conjunction with noise reduction is crucial in proper image segmentation. The authors present a new algorithm, logarithmic adaptive soft morphological (LASM) filter, utilising collectivity and flexibility of order-statistic soft morphological filters. This method not only reduces the speckle noise of the single-look SAR imagery considerably, but it significantly enhances the segmentation results. To verify the performance, a simulated SAR image is first created by applying an imagery method to an original noiseless image. The resulting image has characteristics identical to a real SAR image. The LASM method, as well as several... 

    Three-dimensional modular discriminant analysis (3DMDA): A new feature extraction approach for face recognition

    , Article Computers and Electrical Engineering ; Volume 37, Issue 5 , 2011 , Pages 811-823 ; 00457906 (ISSN) Safayani, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    Abstract
    In this paper, we present a novel multilinear algebra based feature extraction approach for face recognition which preserves some implicit structural or locally-spatial information among elements of the original images. We call this method three-dimensional modular discriminant analysis (3DMDA). Our approach uses a new data model called third-order tensor model (3TM) for representing the face images. In this model, each image is partitioned into the several equal size local blocks, and the local blocks are combined to represent the image as a third-order tensor. Then, a new optimization algorithm called direct mode (d-mode) is introduced for learning three optimal projection axes. Extensive... 

    Matrix-variate probabilistic model for canonical correlation analysis

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2011 , 2011 ; 16876172 (ISSN) Safayani, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    Abstract
    Motivated by the fact that in computer vision data samples are matrices, in this paper, we propose a matrix-variate probabilistic model for canonical correlation analysis (CCA). Unlike probabilistic CCA which converts the image samples into the vectors, our method uses the original image matrices for data representation. We show that the maximum likelihood parameter estimation of the model leads to the two-dimensional canonical correlation directions. This model helps for better understanding of two-dimensional Canonical Correlation Analysis (2DCCA), and for further extending the method into more complex probabilistic model. In addition, we show that two-dimensional Linear Discriminant... 

    Adaptive watermarking scheme based on ICA and RDWT

    , Article IET Seminar Digest, 3 December 2009 through 3 December 2009 ; Volume 2009, Issue 2 , 2009 ; 9781849192071 (ISBN) Ghaedi Oskooei, S ; Dadgostar, M ; Rezai Rad, G ; Fatemizadeh, E ; Sharif University of Technology
    Abstract
    This paper proposes a new approach to watermarking multimedia products based on the combination of redundant discrete wavelet transform and independent component analysis. The original image is decomposed by RDWT, and watermark is embedded in to LL sub-band frequency according mixing model of the ICA, after that for enhancing the robustness of the watermark, the perceptual model is applied via stochastic approach for watermark adapting. This is based on computation of a noise visibility function (NVF) which has local image properties so the strength of watermarking is controllable. Principal component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind...