A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete...A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.展开更多
Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for...Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for this process is to combine inertial navigation system sensor information with the global navigation satellite system(GNSS)signal.However,some factors can interfere with the GNSS signal,such as ionospheric scintillation,jamming,or spoofing.One alternative method to avoid using the GNSS signal is to apply an image processing approach by matching UAV images with georeferenced images.But a high effort is required for image edge extraction.Here a support vector regression(SVR)model is proposed to reduce this computational load and processing time.The dynamic partial reconfiguration(DPR)of part of the SVR datapath is implemented to accelerate the process,reduce the area,and analyze its granularity by increasing the grain size of the reconfigurable region.Results show that the implementation in hardware is 68 times faster than that in software.This architecture with DPR also facilitates the low power consumption of 4 mW,leading to a reduction of 57%than that without DPR.This is also the lowest power consumption in current machine learning hardware implementations.Besides,the circuitry area is 41 times smaller.SVR with Gaussian kernel shows a success rate of 99.18%and minimum square error of 0.0146 for testing with the planning trajectory.This system is useful for adaptive applications where the user/designer can modify/reconfigure the hardware layout during its application,thus contributing to lower power consumption,smaller hardware area,and shorter execution time.展开更多
The“memory wall”of traditional von Neumann computing systems severely restricts the efficiency of data-intensive task execution,while in-memory computing(IMC)architecture is a promising approach to breaking the bott...The“memory wall”of traditional von Neumann computing systems severely restricts the efficiency of data-intensive task execution,while in-memory computing(IMC)architecture is a promising approach to breaking the bottleneck.Although variations and instability in ultra-scaled memory cells seriously degrade the calculation accuracy in IMC architectures,stochastic computing(SC)can compensate for these shortcomings due to its low sensitivity to cell disturbances.Furthermore,massive parallel computing can be processed to improve the speed and efficiency of the system.In this paper,by designing logic functions in NOR flash arrays,SC in IMC for the image edge detection is realized,demonstrating ultra-low computational complexity and power consumption(25.5 fJ/pixel at 2-bit sequence length).More impressively,the noise immunity is 6 times higher than that of the traditional binary method,showing good tolerances to cell variation and reliability degradation when implementing massive parallel computation in the array.展开更多
Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application t...Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application to edge detection.An MCM-CNN is designed by adopting a memristor crossbar composed of a pair of memristors.MCM-CNN based on the memristor crossbar with changeable weight is suitable for edge detection of a binary image and a color image considering its characteristics of programmablization and compactation.Figure of merit(FOM)is introduced to evaluate the proposed structure and several traditional edge detection operators for edge detection results.Experiment results show that the FOM of MCM-CNN is three times more than that of the traditional edge detection operators.展开更多
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Develop...Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Developers fuse and carry out face identification as an access authority into these applications.Still,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user.In the existing spoofing detection algorithm,there was some loss in the recreation of images.This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said problems.This research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused structure.First,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)dataset.This database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video attacks.The images are taken with three different quality cameras:low,average,and high-quality real and spoofed images.An extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms.展开更多
Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Mo...Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression.展开更多
A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the sur...A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the surroundings of this pixel.This connection is for each RGB component color of the input image.Once the image edges are detected for the three primary colors:red,green,and blue,these colors are merged using the combination rule.Then,the final decision is applied to obtain the segmentation.This process allows different data sources to be combined,which is essential to improve the image information quality and have an optimal image segmentation.Finally,the segmentation results of the proposed model are validated.Moreover,the classification accuracy of the tested data is assessed,and a comparison with other current models is conducted.The comparison results show that the proposed model outperforms the existing models in image segmentation.展开更多
Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and ...Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%.展开更多
Combining beamlet transform with steerable filters, a new edge detection method based on line gradient is proposed. Compared with operators based on point local properties, the edge-detection results with this method ...Combining beamlet transform with steerable filters, a new edge detection method based on line gradient is proposed. Compared with operators based on point local properties, the edge-detection results with this method achieve higher SNR and position accuracy, and are quite helpful for image registration, object identification, etc. Some edge-detection experiments on optical and SAR images that demonstrate the significant improvement over classical edge operators axe also presented. Moreover, the template matching result based on edge information of optical reference image and SAR image also proves the validity of this method.展开更多
To cope with the problems that edge detection operators are liable to make the detected edges too blurry for synthetic aperture radar(SAR)images,an edge detection method for detecting river in SAR images is proposed b...To cope with the problems that edge detection operators are liable to make the detected edges too blurry for synthetic aperture radar(SAR)images,an edge detection method for detecting river in SAR images is proposed based on contourlet modulus maxima and improved mathematical morphology.The SAR image is firstly transformed to a contourlet domain.According to the directional information and gradient information of directional subband of contourlet transform,the modulus maximum and the improved mathematical morphology are used to detect high frequency and low frequency sub-image edges,respectively.Subsequently,the edges of river in SAR image are obtained after fusing the high frequency sub-image and the low frequency sub-image.Experimental results demonstrate that the proposed edge detection method can obtain more accurate edge location and reduce false edges,compared with the Canny method,the method based on wavelet and Canny,the method based on contourlet modulus maxima,and the method based on improved(ROEWA).The obtained river edges are complete and clear.展开更多
A novel feature fusion method is proposed for the edge detection of color images. Except for the typical features used in edge detection, the color contrast similarity and the orientation consistency are also selected...A novel feature fusion method is proposed for the edge detection of color images. Except for the typical features used in edge detection, the color contrast similarity and the orientation consistency are also selected as the features. The four features are combined together as a parameter to detect the edges of color images. Experimental results show that the method can inhibit noisy edges and facilitate the detection for weak edges. It has a better performance than conventional methods in noisy environments.展开更多
In order to solve the problems of local maximum modulus extraction and threshold selection in the edge detection of finite resolution digital images, a new wavelet transform based adaptive dual threshold edge detec...In order to solve the problems of local maximum modulus extraction and threshold selection in the edge detection of finite resolution digital images, a new wavelet transform based adaptive dual threshold edge detection algorithm is proposed. The local maximum modulus is extracted by linear interpolation in wavelet domain. With the analysis on histogram, the image is filtered with an adaptive dual threshold method, which effectively detects the contours of small structures as well as the boundaries of large objects. A wavelet domain's propagation function is used to further select weak edges. Experimental results have shown the self adaptivity of the threshold to images having the same kind of histogram, and the efficiency even in noise tampered images.展开更多
A new edge detection method combining the scanning window central edge (SWCE) detector and an improved active contour model is proposed. The method first emploies the SWCE detector based on the difference of area pi...A new edge detection method combining the scanning window central edge (SWCE) detector and an improved active contour model is proposed. The method first emploies the SWCE detector based on the difference of area pixel value means to perform an optimal edge detection, and then proposes an improved active contour model with modified energy functions to refine the location of the edges. The initial nodes of the improved active contour model are automatically found from the vectorised results of the SWCE detector. Tests on simulated speckled images and real airborne SAR images show that the combined method can benefit from the advantages of the both techniques and get satisfactory edge detection and localization abilities at the same time.展开更多
Craters are salient terrain features on planetary surfaces, and provide useful information about the relative dating of geological unit of planets. In addition, they are ideal landmarks for spacecraft navigation. Due ...Craters are salient terrain features on planetary surfaces, and provide useful information about the relative dating of geological unit of planets. In addition, they are ideal landmarks for spacecraft navigation. Due to low contrast and uneven illumination, automatic extraction of craters remains a challenging task. This paper presents a saliency detection method for crater edges and a feature matching algorithm based on edges informa- tion. The craters are extracted through saliency edges detection, edge extraction and selection, feature matching of the same crater edges and robust ellipse fitting. In the edges matching algorithm, a crater feature model is proposed by analyzing the relationship between highlight region edges and shadow region ones. Then, crater edges are paired through the effective matching algorithm. Experiments of real planetary images show that the proposed approach is robust to different lights and topographies, and the detection rate is larger than 90%.展开更多
To preserve the sharp features and details of the synthetic aperture radar (SAR) image effectively when despeckling, a despeckling algorithm with edge detection in nonsubsampled second generation bandelet transform ...To preserve the sharp features and details of the synthetic aperture radar (SAR) image effectively when despeckling, a despeckling algorithm with edge detection in nonsubsampled second generation bandelet transform (NSBT) domain is proposed. First, the Canny operator is utilized to detect and remove edges from the SAR image. Then the NSBT which has an optimal approximation to the edges of images and a hard thresholding rule are used to approximate the details while despeckling the edge-removed image. Finally, the removed edges are added to the reconstructed image. As the edges axe detected and protected, and the NSBT is used, the proposed algorithm reaches the state-of-the-art effect which realizes both despeckling and preserving edges and details simultaneously. Experimental results show that both the subjective visual effect and the mainly objective performance indexes of the proposed algorithm outperform that of both Bayesian wavelet shrinkage with edge detection and Bayesian least square-Gaussian scale mixture (BLS-GSM).展开更多
Due to the disturbances of spatters, dusts and strong arc light, it is difficult to detect the molten pool edge and the weld line location in CO_2 welding processes. The median filtering and self-multiplication was em...Due to the disturbances of spatters, dusts and strong arc light, it is difficult to detect the molten pool edge and the weld line location in CO_2 welding processes. The median filtering and self-multiplication was employed to preprocess the image of the CO_2 welding in order to detect effectively the edge of molten pool and the location of weld line. The B-spline wavelet algorithm has been investigated, the influence of different scales and thresholds on the results of the edge detection have been compared and analyzed. The experimental results show that better performance to extract the edge of the molten pool and the location of weld line can be obtained by using the B-spline wavelet transform. The proposed edge detection approach can be further applied to the control of molten depth and the seam tracking.展开更多
Pests detecting is an important research subject in grain storage field.In the past decades,many edge detection methods have been applied to the edge detection of stored grain pests.Although some of them can realize t...Pests detecting is an important research subject in grain storage field.In the past decades,many edge detection methods have been applied to the edge detection of stored grain pests.Although some of them can realize the stored grain pests detecting,precision and robustness are not good enough.Spectral residual(SR)saliency edge detection defines the logarithmic spectrumof image as novelty part of the image information.The remaining spectrumis converted to the airspace to obtain edge detection results.SR algorithm is completely based on frequency domain processing.It not only can effectively simplify the target detection algorithm,but also can improve the effectiveness of target recognition.The experimental results show that the edge results of stored grain pests detected by SR method are effective and stable.展开更多
This paper proposes a mem-computing model of memristive network-based genetic algorithm(MNGA)by building up the relationship between the memristive network(MN)and the genetic algorithm(GA),and a new edge detection alg...This paper proposes a mem-computing model of memristive network-based genetic algorithm(MNGA)by building up the relationship between the memristive network(MN)and the genetic algorithm(GA),and a new edge detection algorithm where image pixels are defined as individuals of population.First,the computing model of MNGA is designed to perform mem-computing,which brings new possibility of the hardware implementation of GA.Secondly,MNGA-based edge detection integrating image filter and GA operator deployed by MN is proposed.Finally,simulation results demonstrate that the figure of merit(FoM)of our model is better than the latest memristor-based swarm intelligence.In summary,a new way is found to build proper matching of memristor to GA and aid image edge detection.展开更多
AIM:To select the optimal edge detection methods to identify the corneal surface,and compare three fitting curve equations with Matlab software. METHODS:Fifteen subjects were recruited. The corneal images from optic...AIM:To select the optimal edge detection methods to identify the corneal surface,and compare three fitting curve equations with Matlab software. METHODS:Fifteen subjects were recruited. The corneal images from optical coherence tomography(OCT)were imported into Matlab software. Five edge detection methods(Canny,Log,Prewitt,Roberts,Sobel)were used to identify the corneal surface. Then two manual identifying methods(ginput and getpts)were applied to identify the edge coordinates respectively. The differences among these methods were compared. Binomial curve(y=Ax2+Bx+C),Polynomial curve [p(x)=p1xn+p2x(n-1)+....+pnx+pn+1] and Conic section(Ax2+Bxy+Cy2+Dx+Ey+F=0)were used for curve fitting the corneal surface respectively. The relative merits among three fitting curves were analyzed. Finally,the eccentricity(e)obtained by corneal topography and conic section were compared with paired t-test. RESULTS:Five edge detection algorithms all had continuous coordinates which indicated the edge of the corneal surface. The ordinates of manual identifying were close to the inside of the actual edges. Binomial curve was greatly affected by tilt angle. Polynomial curve was lack of geometrical properties and unstable. Conic section could calculate the tilted symmetry axis,eccentricity,circle center,etc. There were no significant differences between 'e' values by corneal topography and conic section(t=0.9143,P=0.3760 〉0.05).CONCLUSION:It is feasible to simulate the corneal surface with mathematical curve with Matlab software. Edge detection has better repeatability and higher efficiency. The manual identifying approach is an indispensable complement for detection. Polynomial and conic section are both the alternative methods for corneal curve fitting. Conic curve was the optimal choice based on the specific geometrical properties.展开更多
基金supported by the Key Area R&D Program of Guangdong Province (Grant No.2022B0701180001)the National Natural Science Foundation of China (Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China (Grant Nos.2019B010140002 and 2020B111110002)the Guangdong-Hong Kong-Macao Joint Innovation Field Project (Grant No.2021A0505080006)。
文摘A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.
基金financially supported by the National Council for Scientific and Technological Development(CNPq,Brazil),Swedish-Brazilian Research and Innovation Centre(CISB),and Saab AB under Grant No.CNPq:200053/2022-1the National Council for Scientific and Technological Development(CNPq,Brazil)under Grants No.CNPq:312924/2017-8 and No.CNPq:314660/2020-8.
文摘Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for this process is to combine inertial navigation system sensor information with the global navigation satellite system(GNSS)signal.However,some factors can interfere with the GNSS signal,such as ionospheric scintillation,jamming,or spoofing.One alternative method to avoid using the GNSS signal is to apply an image processing approach by matching UAV images with georeferenced images.But a high effort is required for image edge extraction.Here a support vector regression(SVR)model is proposed to reduce this computational load and processing time.The dynamic partial reconfiguration(DPR)of part of the SVR datapath is implemented to accelerate the process,reduce the area,and analyze its granularity by increasing the grain size of the reconfigurable region.Results show that the implementation in hardware is 68 times faster than that in software.This architecture with DPR also facilitates the low power consumption of 4 mW,leading to a reduction of 57%than that without DPR.This is also the lowest power consumption in current machine learning hardware implementations.Besides,the circuitry area is 41 times smaller.SVR with Gaussian kernel shows a success rate of 99.18%and minimum square error of 0.0146 for testing with the planning trajectory.This system is useful for adaptive applications where the user/designer can modify/reconfigure the hardware layout during its application,thus contributing to lower power consumption,smaller hardware area,and shorter execution time.
基金supported by the National Natural Science Foundation of China(Nos.62034006,91964105,61874068)the China Key Research and Development Program(No.2016YFA0201802)+1 种基金the Natural Science Foundation of Shandong Province(No.ZR2020JQ28)Program of Qilu Young Scholars of Shandong University。
文摘The“memory wall”of traditional von Neumann computing systems severely restricts the efficiency of data-intensive task execution,while in-memory computing(IMC)architecture is a promising approach to breaking the bottleneck.Although variations and instability in ultra-scaled memory cells seriously degrade the calculation accuracy in IMC architectures,stochastic computing(SC)can compensate for these shortcomings due to its low sensitivity to cell disturbances.Furthermore,massive parallel computing can be processed to improve the speed and efficiency of the system.In this paper,by designing logic functions in NOR flash arrays,SC in IMC for the image edge detection is realized,demonstrating ultra-low computational complexity and power consumption(25.5 fJ/pixel at 2-bit sequence length).More impressively,the noise immunity is 6 times higher than that of the traditional binary method,showing good tolerances to cell variation and reliability degradation when implementing massive parallel computation in the array.
基金supported by the Research Fund for International Young Scientists of the National Natural Science Foundation of China(61550110248)the Research on Fundamental Theory of Shared Intelligent Street Lamp for New Scene Service(H04W200495)+1 种基金Sichuan Science and Technology Program(2019YFG0190)the Research on Sino-Tibetan Multi-source Information Acquisition,Fusion,Data Mining and its Application(H04W170186).
文摘Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application to edge detection.An MCM-CNN is designed by adopting a memristor crossbar composed of a pair of memristors.MCM-CNN based on the memristor crossbar with changeable weight is suitable for edge detection of a binary image and a color image considering its characteristics of programmablization and compactation.Figure of merit(FOM)is introduced to evaluate the proposed structure and several traditional edge detection operators for edge detection results.Experiment results show that the FOM of MCM-CNN is three times more than that of the traditional edge detection operators.
文摘Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Developers fuse and carry out face identification as an access authority into these applications.Still,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user.In the existing spoofing detection algorithm,there was some loss in the recreation of images.This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said problems.This research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused structure.First,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)dataset.This database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video attacks.The images are taken with three different quality cameras:low,average,and high-quality real and spoofed images.An extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms.
文摘Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression.
文摘A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the surroundings of this pixel.This connection is for each RGB component color of the input image.Once the image edges are detected for the three primary colors:red,green,and blue,these colors are merged using the combination rule.Then,the final decision is applied to obtain the segmentation.This process allows different data sources to be combined,which is essential to improve the image information quality and have an optimal image segmentation.Finally,the segmentation results of the proposed model are validated.Moreover,the classification accuracy of the tested data is assessed,and a comparison with other current models is conducted.The comparison results show that the proposed model outperforms the existing models in image segmentation.
基金supported by the National Natural Science Foundation of China(62072475)the Fundamental Research Funds for the Central Universities of Central South University(CX20230356)。
文摘Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%.
文摘Combining beamlet transform with steerable filters, a new edge detection method based on line gradient is proposed. Compared with operators based on point local properties, the edge-detection results with this method achieve higher SNR and position accuracy, and are quite helpful for image registration, object identification, etc. Some edge-detection experiments on optical and SAR images that demonstrate the significant improvement over classical edge operators axe also presented. Moreover, the template matching result based on edge information of optical reference image and SAR image also proves the validity of this method.
基金Supported by the CRSRI Open Research Program(CKWV2013225/KY)the Open Project Foundation of Key Laboratory of the Yellow River Sediment of Ministry of Water Resource(2014006)+2 种基金the Open Project Foundation of Key Lab of Port,Waterway and Sedimentation Engineering of the Ministry of Transportthe State Key Lab of Urban Water Resource and Environment(HIT)(ES201409)the Priority Academic Program Development of Jiangsu Higher Education Institution
文摘To cope with the problems that edge detection operators are liable to make the detected edges too blurry for synthetic aperture radar(SAR)images,an edge detection method for detecting river in SAR images is proposed based on contourlet modulus maxima and improved mathematical morphology.The SAR image is firstly transformed to a contourlet domain.According to the directional information and gradient information of directional subband of contourlet transform,the modulus maximum and the improved mathematical morphology are used to detect high frequency and low frequency sub-image edges,respectively.Subsequently,the edges of river in SAR image are obtained after fusing the high frequency sub-image and the low frequency sub-image.Experimental results demonstrate that the proposed edge detection method can obtain more accurate edge location and reduce false edges,compared with the Canny method,the method based on wavelet and Canny,the method based on contourlet modulus maxima,and the method based on improved(ROEWA).The obtained river edges are complete and clear.
基金supported partly by the National Basic Research Program of China (2005CB724303)the National Natural Science Foundation of China (60671062) Shanghai Leading Academic Discipline Project (B112).
文摘A novel feature fusion method is proposed for the edge detection of color images. Except for the typical features used in edge detection, the color contrast similarity and the orientation consistency are also selected as the features. The four features are combined together as a parameter to detect the edges of color images. Experimental results show that the method can inhibit noisy edges and facilitate the detection for weak edges. It has a better performance than conventional methods in noisy environments.
文摘In order to solve the problems of local maximum modulus extraction and threshold selection in the edge detection of finite resolution digital images, a new wavelet transform based adaptive dual threshold edge detection algorithm is proposed. The local maximum modulus is extracted by linear interpolation in wavelet domain. With the analysis on histogram, the image is filtered with an adaptive dual threshold method, which effectively detects the contours of small structures as well as the boundaries of large objects. A wavelet domain's propagation function is used to further select weak edges. Experimental results have shown the self adaptivity of the threshold to images having the same kind of histogram, and the efficiency even in noise tampered images.
文摘A new edge detection method combining the scanning window central edge (SWCE) detector and an improved active contour model is proposed. The method first emploies the SWCE detector based on the difference of area pixel value means to perform an optimal edge detection, and then proposes an improved active contour model with modified energy functions to refine the location of the edges. The initial nodes of the improved active contour model are automatically found from the vectorised results of the SWCE detector. Tests on simulated speckled images and real airborne SAR images show that the combined method can benefit from the advantages of the both techniques and get satisfactory edge detection and localization abilities at the same time.
基金supported by the National Natural Science Foundation of China(61210012)
文摘Craters are salient terrain features on planetary surfaces, and provide useful information about the relative dating of geological unit of planets. In addition, they are ideal landmarks for spacecraft navigation. Due to low contrast and uneven illumination, automatic extraction of craters remains a challenging task. This paper presents a saliency detection method for crater edges and a feature matching algorithm based on edges informa- tion. The craters are extracted through saliency edges detection, edge extraction and selection, feature matching of the same crater edges and robust ellipse fitting. In the edges matching algorithm, a crater feature model is proposed by analyzing the relationship between highlight region edges and shadow region ones. Then, crater edges are paired through the effective matching algorithm. Experiments of real planetary images show that the proposed approach is robust to different lights and topographies, and the detection rate is larger than 90%.
基金supported by the National Natural Science Foundation of China(6067309760702062)+3 种基金the National HighTechnology Research and Development Program of China(863 Program)(2008AA01Z1252007AA12Z136)the National ResearchFoundation for the Doctoral Program of Higher Education of China(20060701007)the Program for Cheung Kong Scholarsand Innovative Research Team in University(IRT 0645).
文摘To preserve the sharp features and details of the synthetic aperture radar (SAR) image effectively when despeckling, a despeckling algorithm with edge detection in nonsubsampled second generation bandelet transform (NSBT) domain is proposed. First, the Canny operator is utilized to detect and remove edges from the SAR image. Then the NSBT which has an optimal approximation to the edges of images and a hard thresholding rule are used to approximate the details while despeckling the edge-removed image. Finally, the removed edges are added to the reconstructed image. As the edges axe detected and protected, and the NSBT is used, the proposed algorithm reaches the state-of-the-art effect which realizes both despeckling and preserving edges and details simultaneously. Experimental results show that both the subjective visual effect and the mainly objective performance indexes of the proposed algorithm outperform that of both Bayesian wavelet shrinkage with edge detection and Bayesian least square-Gaussian scale mixture (BLS-GSM).
文摘Due to the disturbances of spatters, dusts and strong arc light, it is difficult to detect the molten pool edge and the weld line location in CO_2 welding processes. The median filtering and self-multiplication was employed to preprocess the image of the CO_2 welding in order to detect effectively the edge of molten pool and the location of weld line. The B-spline wavelet algorithm has been investigated, the influence of different scales and thresholds on the results of the edge detection have been compared and analyzed. The experimental results show that better performance to extract the edge of the molten pool and the location of weld line can be obtained by using the B-spline wavelet transform. The proposed edge detection approach can be further applied to the control of molten depth and the seam tracking.
基金financially supported by National Natural Science Foundation of China(No.61871176)Key Scientific and Technological Project of Science and Technology Department of Henan Province(No.172102210030,182102110099)+2 种基金Key Scientific Research Project Program of Universities of Henan Province(No.18B520025)Open Fund of Key Laboratory of Grain Information Processing and Control(No.KFJJ-2018-102)supported by Collaborative Innovation Center of Grain Storage and Security of Henan Province
文摘Pests detecting is an important research subject in grain storage field.In the past decades,many edge detection methods have been applied to the edge detection of stored grain pests.Although some of them can realize the stored grain pests detecting,precision and robustness are not good enough.Spectral residual(SR)saliency edge detection defines the logarithmic spectrumof image as novelty part of the image information.The remaining spectrumis converted to the airspace to obtain edge detection results.SR algorithm is completely based on frequency domain processing.It not only can effectively simplify the target detection algorithm,but also can improve the effectiveness of target recognition.The experimental results show that the edge results of stored grain pests detected by SR method are effective and stable.
基金This work was supported by the National Natural Science Foundation of China(61550110248)the Sichuan Science and Technology Department project(2019YFG0190)the University of Electronic Science and Technology of China project(H04W170186).
文摘This paper proposes a mem-computing model of memristive network-based genetic algorithm(MNGA)by building up the relationship between the memristive network(MN)and the genetic algorithm(GA),and a new edge detection algorithm where image pixels are defined as individuals of population.First,the computing model of MNGA is designed to perform mem-computing,which brings new possibility of the hardware implementation of GA.Secondly,MNGA-based edge detection integrating image filter and GA operator deployed by MN is proposed.Finally,simulation results demonstrate that the figure of merit(FoM)of our model is better than the latest memristor-based swarm intelligence.In summary,a new way is found to build proper matching of memristor to GA and aid image edge detection.
基金Supported by the National Natural Science Foundation of China(No.81400428)Science and Technology Commission of Shanghai Municipality(No.134119b1600)
文摘AIM:To select the optimal edge detection methods to identify the corneal surface,and compare three fitting curve equations with Matlab software. METHODS:Fifteen subjects were recruited. The corneal images from optical coherence tomography(OCT)were imported into Matlab software. Five edge detection methods(Canny,Log,Prewitt,Roberts,Sobel)were used to identify the corneal surface. Then two manual identifying methods(ginput and getpts)were applied to identify the edge coordinates respectively. The differences among these methods were compared. Binomial curve(y=Ax2+Bx+C),Polynomial curve [p(x)=p1xn+p2x(n-1)+....+pnx+pn+1] and Conic section(Ax2+Bxy+Cy2+Dx+Ey+F=0)were used for curve fitting the corneal surface respectively. The relative merits among three fitting curves were analyzed. Finally,the eccentricity(e)obtained by corneal topography and conic section were compared with paired t-test. RESULTS:Five edge detection algorithms all had continuous coordinates which indicated the edge of the corneal surface. The ordinates of manual identifying were close to the inside of the actual edges. Binomial curve was greatly affected by tilt angle. Polynomial curve was lack of geometrical properties and unstable. Conic section could calculate the tilted symmetry axis,eccentricity,circle center,etc. There were no significant differences between 'e' values by corneal topography and conic section(t=0.9143,P=0.3760 〉0.05).CONCLUSION:It is feasible to simulate the corneal surface with mathematical curve with Matlab software. Edge detection has better repeatability and higher efficiency. The manual identifying approach is an indispensable complement for detection. Polynomial and conic section are both the alternative methods for corneal curve fitting. Conic curve was the optimal choice based on the specific geometrical properties.