期刊文献+

基于迭代分形解码和边缘扩展的图像修复算法 被引量:3

Image Inpainting Algorithm Based on Iterative Fractal Decoding and Edge Expansion
下载PDF
导出
摘要 根据分形码的高压缩性,提出一种基于迭代分形解码和边缘扩展的图像修复算法。在信息嵌入阶段,运用1-D变换算法、2次推操作和换操作获取索引表,对照索引表将分形码和奇偶校验码存入图像的最低2位有效位中。在图像修复阶段,对接收到的图像进行3层篡改检测,迭代地采用提取的有效分形码和边缘扩展算法对篡改图像进行修复。实验结果表明,该算法能够获得较好的图像修复效果。 Based on the high compressibility of the fractal code,an effective watermark scheme using the iterative fractal decoding and inpainting for image tamper detection and recovery is proposed.In watermark insertion section,it gets a look-up index table,and inserts the fractal code and the parity-check bits into the original image according to the look-up index table to obtain the watermarked image.By watermark extraction,it can automatically localize the altered region,and iteratively apply the fractal decoding and image inpainting for image recovery.Experimental results show the effectiveness of the proposed algorithm.
出处 《计算机工程》 CAS CSCD 2012年第2期218-220,共3页 Computer Engineering
基金 国家自然科学基金资助项目(61073116 61003038) 安徽省高校自然科学研究基金资助重点项目(KJ2010A006)
关键词 分形图像编码 迭代解码 篡改检测 边缘扩展 图像修复 fractal image coding iterative decoding tampering detection edge expansion image inpainting
  • 相关文献

参考文献11

  • 1Yang Chun-Wei, Shen Jau-Ji. Recover the Tampered Image Based on VQ Indexing[J]. Signal Processing, 2010, 90(1): 331-343.
  • 2Wu Chia-Hao. Image Vector Quantization Code Indices Recovery Using Lagrange Interpolation[J]. Image and Vision Computing, 2008, 26(8): 1171-1177.
  • 3Lee Tien-You. Dual Watermarking for Image Tamper Detection and Recovery[J]. Pattern Recognition, 2008, 41(11): 3497-3506.
  • 4Chaluvadi B, Munaga P. Efficient Image Tamper Detection and Recovery Technique Using Dual Watermarking[M]. Coimbatore, India: [s. n.] , 2009.
  • 5Lin Phen-Lan, Huang Po-Whei, Peng An-Wei. A Fragile Water- marking Scheme for Image Authentication with Localization and Recovery[C] //Proc. of IEEE Int’l Symp. on Multimedia Software Engineering. Miami, USA: [s. n.] , 2004.
  • 6Lin Phen-Lan, Huang Po-Whei. A Hierarchical Digital Water- marking Method for Image Tamper Detection and Recovery[J]. Pattern Recognition, 2005, 38(12): 2519-2529.
  • 7Celik M U, Sharma G. Hierarchical Watermarking for Secure Image Authentication with Localization[J]. IEEE Trans. on Image Processing, 2002, 11(6): 585-595.
  • 8Tsai Sung-Lin. Automatic Image Authentication and Recovery Using Fractal Code Embedding and Image Inpainting[J]. Pattern Recognition, 2008, 41(2): 701-712.
  • 9Jacquin A E. Image Coding Based on a Fractal Theory of Iterated Contractive Image Transformations[J]. IEEE Trans. on Image Processing, 1992, 1(1): 18-30.
  • 10何川江. 分形图像编码技术的算法研究[D]. 重庆: 重庆大学, 2004.

二级参考文献6

  • 1何传江,李高平.分形图像编码的改进算法[J].计算机仿真,2004,21(8):62-65. 被引量:16
  • 2林洪文,杨绍清,夏志军,康春玉.基于分形图像编码的海空目标检测方法研究[J].计算机工程,2007,33(11):199-200. 被引量:1
  • 3Barnsley M F, Sloan A D. A Better Way to Compress Images[J]. Byte Magazine, 1988, 13(1): 215-223.
  • 4Jacquin A E. A Fractal Theory of Iterated Markov Operators with Applications to Digital Image Coding[D]. Atlanta, GA, USA:Georgia Institute of Technology, 1989.
  • 5Jacquin A E. Image Coding Based on a Fractal Theory of Iterated Contractive Image Transformations[J]. IEEE Transactions on Image Processing, 1992, 1(1): 18-30.
  • 6Hartenstein H, Saupe D. Lossless Acceleration of Fractal Image Encoding via the Fast Fourier Transform[J]. Signal Processing: Image Communication, 2000, 16(4): 383-394.

共引文献8

同被引文献32

引证文献3

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部