期刊文献+
共找到9,473篇文章
< 1 2 250 >
每页显示 20 50 100
Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding
1
作者 王一铭 黄树锋 +2 位作者 陈煌 杨健 蔡述庭 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期287-302,共16页
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete... A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality. 展开更多
关键词 visual security image encryption parallel compressive sensing edge detection embedding
下载PDF
Optimized Binary Neural Networks for Road Anomaly Detection:A TinyML Approach on Edge Devices
2
作者 Amna Khatoon Weixing Wang +2 位作者 Asad Ullah Limin Li Mengfei Wang 《Computers, Materials & Continua》 SCIE EI 2024年第7期527-546,共20页
Integrating Tiny Machine Learning(TinyML)with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level.Constrained devices efficiently implement a Binary Neural N... Integrating Tiny Machine Learning(TinyML)with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level.Constrained devices efficiently implement a Binary Neural Network(BNN)for road feature extraction,utilizing quantization and compression through a pruning strategy.The modifications resulted in a 28-fold decrease in memory usage and a 25%enhancement in inference speed while only experiencing a 2.5%decrease in accuracy.It showcases its superiority over conventional detection algorithms in different road image scenarios.Although constrained by computer resources and training datasets,our results indicate opportunities for future research,demonstrating that quantization and focused optimization can significantly improve machine learning models’accuracy and operational efficiency.ARM Cortex-M0 gives practical feasibility and substantial benefits while deploying our optimized BNN model on this low-power device:Advanced machine learning in edge computing.The analysis work delves into the educational significance of TinyML and its essential function in analyzing road networks using remote sensing,suggesting ways to improve smart city frameworks in road network assessment,traffic management,and autonomous vehicle navigation systems by emphasizing the importance of new technologies for maintaining and safeguarding road networks. 展开更多
关键词 edge computing remote sensing TinyML optimization BNNs road anomaly detection QUANTIZATION model compression
下载PDF
Machine learning algorithm partially reconfigured on FPGA for an image edge detection system
3
作者 Gracieth Cavalcanti Batista Johnny Oberg +3 位作者 Osamu Saotome Haroldo F.de Campos Velho Elcio Hideiti Shiguemori Ingemar Soderquist 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第2期48-68,共21页
Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for... Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for this process is to combine inertial navigation system sensor information with the global navigation satellite system(GNSS)signal.However,some factors can interfere with the GNSS signal,such as ionospheric scintillation,jamming,or spoofing.One alternative method to avoid using the GNSS signal is to apply an image processing approach by matching UAV images with georeferenced images.But a high effort is required for image edge extraction.Here a support vector regression(SVR)model is proposed to reduce this computational load and processing time.The dynamic partial reconfiguration(DPR)of part of the SVR datapath is implemented to accelerate the process,reduce the area,and analyze its granularity by increasing the grain size of the reconfigurable region.Results show that the implementation in hardware is 68 times faster than that in software.This architecture with DPR also facilitates the low power consumption of 4 mW,leading to a reduction of 57%than that without DPR.This is also the lowest power consumption in current machine learning hardware implementations.Besides,the circuitry area is 41 times smaller.SVR with Gaussian kernel shows a success rate of 99.18%and minimum square error of 0.0146 for testing with the planning trajectory.This system is useful for adaptive applications where the user/designer can modify/reconfigure the hardware layout during its application,thus contributing to lower power consumption,smaller hardware area,and shorter execution time. 展开更多
关键词 Dynamic partial reconfiguration(DPR) Field programmable gate array(FPGA)implementation Image edge detection Support vector regression(SVR) Unmanned aerial vehicle(UAV) pose estimation
下载PDF
A Distributed Ant Colony Optimization Applied in Edge Detection
4
作者 Min Chen 《Journal of Computer and Communications》 2024年第8期161-173,共13页
With the rise of image data and increased complexity of tasks in edge detection, conventional artificial intelligence techniques have been severely impacted. To be able to solve even greater problems of the future, le... With the rise of image data and increased complexity of tasks in edge detection, conventional artificial intelligence techniques have been severely impacted. To be able to solve even greater problems of the future, learning algorithms must maintain high speed and accuracy through economical means. Traditional edge detection approaches cannot detect edges in images in a timely manner due to memory and computational time constraints. In this work, a novel parallelized ant colony optimization technique in a distributed framework provided by the Hadoop/Map-Reduce infrastructure is proposed to improve the edge detection capabilities. Moreover, a filtering technique is applied to reduce the noisy background of images to achieve significant improvement in the accuracy of edge detection. Close examinations of the implementation of the proposed algorithm are discussed and demonstrated through experiments. Results reveal high classification accuracy and significant improvements in speedup, scaleup and sizeup compared to the standard algorithms. 展开更多
关键词 Distributed System Ant Colony Optimization edge detection MAPREDUCE SPEEDUP
下载PDF
Flash-based in-memory computing for stochastic computing in image edge detection 被引量:1
5
作者 Zhaohui Sun Yang Feng +6 位作者 Peng Guo Zheng Dong Junyu Zhang Jing Liu Xuepeng Zhan Jixuan Wu Jiezhi Chen 《Journal of Semiconductors》 EI CAS CSCD 2023年第5期145-149,共5页
The“memory wall”of traditional von Neumann computing systems severely restricts the efficiency of data-intensive task execution,while in-memory computing(IMC)architecture is a promising approach to breaking the bott... The“memory wall”of traditional von Neumann computing systems severely restricts the efficiency of data-intensive task execution,while in-memory computing(IMC)architecture is a promising approach to breaking the bottleneck.Although variations and instability in ultra-scaled memory cells seriously degrade the calculation accuracy in IMC architectures,stochastic computing(SC)can compensate for these shortcomings due to its low sensitivity to cell disturbances.Furthermore,massive parallel computing can be processed to improve the speed and efficiency of the system.In this paper,by designing logic functions in NOR flash arrays,SC in IMC for the image edge detection is realized,demonstrating ultra-low computational complexity and power consumption(25.5 fJ/pixel at 2-bit sequence length).More impressively,the noise immunity is 6 times higher than that of the traditional binary method,showing good tolerances to cell variation and reliability degradation when implementing massive parallel computation in the array. 展开更多
关键词 in-memory computing stochastic computing NOR flash memory image edge detection
下载PDF
Color Edge Detection Using Multidirectional Sobel Filter and Fuzzy Fusion 被引量:1
6
作者 Slim Ben Chaabane Anas Bushnag 《Computers, Materials & Continua》 SCIE EI 2023年第2期2839-2852,共14页
A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the sur... A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the surroundings of this pixel.This connection is for each RGB component color of the input image.Once the image edges are detected for the three primary colors:red,green,and blue,these colors are merged using the combination rule.Then,the final decision is applied to obtain the segmentation.This process allows different data sources to be combined,which is essential to improve the image information quality and have an optimal image segmentation.Finally,the segmentation results of the proposed model are validated.Moreover,the classification accuracy of the tested data is assessed,and a comparison with other current models is conducted.The comparison results show that the proposed model outperforms the existing models in image segmentation. 展开更多
关键词 SEGMENTATION edge detection second derivative operators data fusion technique fuzzy fusion CLASSIFICATION
下载PDF
Design of multilayer cellular neural network based on memristor crossbar and its application to edge detection 被引量:1
7
作者 YU Yongbin TANG Haowen +2 位作者 FENG Xiao WANG Xiangxiang HUANG Hang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第3期641-649,共9页
Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application t... Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application to edge detection.An MCM-CNN is designed by adopting a memristor crossbar composed of a pair of memristors.MCM-CNN based on the memristor crossbar with changeable weight is suitable for edge detection of a binary image and a color image considering its characteristics of programmablization and compactation.Figure of merit(FOM)is introduced to evaluate the proposed structure and several traditional edge detection operators for edge detection results.Experiment results show that the FOM of MCM-CNN is three times more than that of the traditional edge detection operators. 展开更多
关键词 edge detection figure of merit(FOM) memristor crossbar synaptic circuit memristor crossbar-based cellular neural network(MCM-CNN)
下载PDF
Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security
8
作者 Amal H.Alharbi S.Karthick +2 位作者 K.Venkatachalam Mohamed Abouhawwash Doaa Sami Khafaga 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2773-2787,共15页
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Develop... Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Developers fuse and carry out face identification as an access authority into these applications.Still,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user.In the existing spoofing detection algorithm,there was some loss in the recreation of images.This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said problems.This research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused structure.First,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)dataset.This database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video attacks.The images are taken with three different quality cameras:low,average,and high-quality real and spoofed images.An extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms. 展开更多
关键词 Image processing edge detection edge net auto-encoder face authentication digital security
下载PDF
An Active Image Forgery Detection Approach Based on Edge Detection
9
作者 Hüseyin Bilal Macit Arif Koyun 《Computers, Materials & Continua》 SCIE EI 2023年第4期1603-1619,共17页
Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Mo... Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression. 展开更多
关键词 Image forgery image tampering edge detection
下载PDF
Edge enhanced depth perception with binocular meta-lens 被引量:2
10
作者 Xiaoyuan Liu Jingcheng Zhang +5 位作者 Borui Leng Yin Zhou Jialuo Cheng Takeshi Yamaguchi Takuo Tanaka Mu Ku Chen 《Opto-Electronic Science》 2024年第9期4-13,共10页
The increasing popularity of the metaverse has led to a growing interest and market size in spatial computing from both academia and industry.Developing portable and accurate imaging and depth sensing systems is cruci... The increasing popularity of the metaverse has led to a growing interest and market size in spatial computing from both academia and industry.Developing portable and accurate imaging and depth sensing systems is crucial for advancing next-generation virtual reality devices.This work demonstrates an intelligent,lightweight,and compact edge-enhanced depth perception system that utilizes a binocular meta-lens for spatial computing.The miniaturized system comprises a binocular meta-lens,a 532 nm filter,and a CMOS sensor.For disparity computation,we propose a stereo-matching neural network with a novel H-Module.The H-Module incorporates an attention mechanism into the Siamese network.The symmetric architecture,with cross-pixel interaction and cross-view interaction,enables a more comprehensive analysis of contextual information in stereo images.Based on spatial intensity discontinuity,the edge enhancement eliminates illposed regions in the image where ambiguous depth predictions may occur due to a lack of texture.With the assistance of deep learning,our edge-enhanced system provides prompt responses in less than 0.15 seconds.This edge-enhanced depth perception meta-lens imaging system will significantly contribute to accurate 3D scene modeling,machine vision,autonomous driving,and robotics development. 展开更多
关键词 metasurfaces meta-lenses deep learning depth perception edge detection
下载PDF
Robust edge detection based on stationary wavelet transform 被引量:3
11
作者 章国宝 刘泉 《Journal of Southeast University(English Edition)》 EI CAS 2006年第2期218-221,共4页
By combining multiscale stationary wavelet analysis with fuzzy c-means, a robust edge detection algorithm is presented. Based on the translation invafiance built in multiscale stationary wavelet transform, components ... By combining multiscale stationary wavelet analysis with fuzzy c-means, a robust edge detection algorithm is presented. Based on the translation invafiance built in multiscale stationary wavelet transform, components in different transformed sub-images corresponding to a pixel are employed to form a feature vector of the pixel. All the feature vectors are classified with unsupervised fuzzy c-means to segment the image, and then the edge pixels are checked out by the Canny detector. A series of images contaminated with different intensive Gaussian noises are used to test the novel algorithm. Experiments show that fairly precise edges can be checked out robustly from those images with fairly intensive noise by the proposed algorithm. 展开更多
关键词 edge detection stationary wavelet multiscale analysis fuzzy c-means
下载PDF
Normalized edge detection, and the horizontal extent and depth of geophysical anomalies 被引量:2
12
作者 李丽丽 韩立国 黄大年 《Applied Geophysics》 SCIE CSCD 2014年第2期149-157,252,253,共11页
Edge detection is an image processing technique for finding the boundaries of objects within images. It is typically used to interpret gravity and magnetic data, and find the horizontal boundaries of geological bodies... Edge detection is an image processing technique for finding the boundaries of objects within images. It is typically used to interpret gravity and magnetic data, and find the horizontal boundaries of geological bodies. Large deviations between model and true edges are common because of the interference of depth and errors in computing the derivatives; thus, edge detection methods cannot provide information about the depth of the source. To simultaneously obtain the horizontal extent and depth of geophysical anomalies, we use normalized edge detection filters, which normalize the edge detection function at different depths, and the maxima that correspond to the location of the source. The errors between model and actual edges are minimized as the depth of the source decreases and the normalized edge detection method recognizes the extent of the source based on the maxima, allowing for reliable model results. We demonstrate the applicability of the normalized edge detection filters in defining the horizontal extent and depth using synthetic and actual aeromagnetic data. 展开更多
关键词 geophysical anomalies normalized edge detection normalized total horizontal derivative regularization tilt angle theta map
下载PDF
AN ALGORITHM OF EDGE DETECTION BASED ON ENTROPY OPERATOR 被引量:3
13
作者 王晖 张基宏 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 1999年第1期21-25,共5页
This paper presents an algorithm of edge detection in image processing. A new entropy operator and threshold estimation technique are effectively proposed. The algorithm overcomes some drawbacks of Shiozaki operator. ... This paper presents an algorithm of edge detection in image processing. A new entropy operator and threshold estimation technique are effectively proposed. The algorithm overcomes some drawbacks of Shiozaki operator. It not only has higher speed but also can extract the edge better. Finally, an example of 2D image is given to demonstrate the usefulness and advantages of the algorithm. 展开更多
关键词 image processing edge detection entropy operator
下载PDF
A new fuzzy edge detection algorithm 被引量:1
14
作者 孙伟 夏良正 《Journal of Southeast University(English Edition)》 EI CAS 2003年第2期132-135,共4页
Based upon the maximum entropy theorem of information theory, a novel fuzzy approach for edge detection is presented. Firstly, a definition of fuzzy partition entropy is proposed after introducing the concepts of fu... Based upon the maximum entropy theorem of information theory, a novel fuzzy approach for edge detection is presented. Firstly, a definition of fuzzy partition entropy is proposed after introducing the concepts of fuzzy probability and fuzzy partition. The relation of the probability partition and the fuzzy c-partition of the image gradient are used in the algorithm. Secondly, based on the conditional probabilities and the fuzzy partition, the optimal thresholding is searched adaptively through the maximum fuzzy entropy principle, and then the edge image is obtained. Lastly, an edge-enhancing procedure is executed on the edge image. The experimental results show that the proposed approach performs well. 展开更多
关键词 edge detection fuzzy entropy image segmentation fuzzy partition
下载PDF
Application of Tobacco Leaf Edge Detection with Tracking Bug Method
15
作者 李彰 毛鹏军 +3 位作者 王俊 张伏 邱兆美 杜东亮 《Agricultural Science & Technology》 CAS 2010年第4期10-11,120,共3页
Tobacco leaf shapes including the length,width,area,perimeter and roundness parameters and so on,Only obtain exact boundaries of the leaf information to calculate a large number of leaf parameters.This paper introduce... Tobacco leaf shapes including the length,width,area,perimeter and roundness parameters and so on,Only obtain exact boundaries of the leaf information to calculate a large number of leaf parameters.This paper introduces the classical edge detection Methods,bug method is used to track the boundaries of tobacco leaf extractly.The test shows that the algorithm has a good edge extraction capability. 展开更多
关键词 Tobacco leaf edge detection Bug method
下载PDF
An intelligent active probing and trace-back scheme for IoT anomaly detection
16
作者 Luying Wang Lingyi Chen +3 位作者 Neal N.Xiong Anfeng Liu Tian Wang Mianxiong Dong 《Digital Communications and Networks》 SCIE CSCD 2024年第1期168-181,共14页
Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and ... Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%. 展开更多
关键词 Anomaly detection Internet of things Integrating data collection Mobile edge users INTELLIGENT
下载PDF
PHOTO-ELECTRIO MEASURING SYSTEM FOR TOOL EDGE DETECTION BY THE TEOHNOLOGY OF COMPUTER DYNAMIO DISPLAY MOVING IMAGE
17
作者 孙旭东 林玉池 张国雄 《Transactions of Tianjin University》 EI CAS 1999年第1期47-51,共5页
This paper describes a technology of dynamic display moving image by computer monitor,which is initially used in the design of tool detection system. The paper presents the hardware and software principie and edge det... This paper describes a technology of dynamic display moving image by computer monitor,which is initially used in the design of tool detection system. The paper presents the hardware and software principie and edge detection process. The way of marking edge point coordinates and stability of moving image also is analyzed. The method reforms the conventional design of the 2-D vision detection system. Moreover,it facilitates the design of the systematic mechanical construction,is convenient to compile instrument systemsoftware,and realizes to detect and track display image simultaneously. By the work,the tool detection system is improved to practical application. 展开更多
关键词 edge detection dynamic display tool detection instrument
下载PDF
Edge detection in the potential field using the correlation coefficients of multidirectional standard deviations 被引量:5
18
作者 徐梦龙 杨长保 +2 位作者 吴燕冈 陈竞一 郇恒飞 《Applied Geophysics》 SCIE CSCD 2015年第1期23-34,120,121,共14页
Most edge-detection methods rely on calculating gradient derivatives of the potential field, a process that is easily affected by noise and is therefore of low stability. We propose a new edge-detection method named c... Most edge-detection methods rely on calculating gradient derivatives of the potential field, a process that is easily affected by noise and is therefore of low stability. We propose a new edge-detection method named correlation coefficient of multidirectional standard deviations(CCMS) that is solely based on statistics. First, we prove the reliability of the proposed method using a single model and then a combination of models. The proposed method is evaluated by comparing the results with those obtained by other edge-detection methods. The CCMS method offers outstanding recognition, retains the sharpness of details, and has low sensitivity to noise. We also applied the CCMS method to Bouguer anomaly data of a potash deposit in Laos. The applicability of the CCMS method is shown by comparing the inferred tectonic framework to that inferred from remote sensing(RS) data. 展开更多
关键词 edge detection Correlation coefficient multidirectional standard deviation Bouguer anomaly
下载PDF
Image edge detection based on nonsubsampled contourlet transform and mathematical morphology 被引量:1
19
作者 何坤贤 王庆 +1 位作者 肖彦昌 王晓兵 《Journal of Southeast University(English Edition)》 EI CAS 2012年第4期445-450,共6页
A novel algorithm for image edge detection is presented. This algorithm combines the nonsubsampled contourlet transform and the mathematical morphology. First, the source image is decomposed by the nonsubsampled conto... A novel algorithm for image edge detection is presented. This algorithm combines the nonsubsampled contourlet transform and the mathematical morphology. First, the source image is decomposed by the nonsubsampled contourlet transform into multi-scale and multi-directional subbands. Then the edges in the high-frequency and low-frequency sub-bands are respectively extracted by the dualthreshold modulus maxima method and the mathematical morphology operator. Finally, the edges from the high- frequency and low-frequency sub-bands are integrated to the edges of the source image, which are refined, and isolated points are excluded to achieve the edges of the source image. The simulation results show that the proposed algorithm can effectively suppress noise, eliminate pseudo-edges and overcome the adverse effects caused by uneven illumination to a certain extent. Compared with the traditional methods such as LoG, Sobel, and Carmy operators and the modulus maxima algorithm, the proposed method can maintain sufficient positioning accuracy and edge details, and it can also make an improvement in the completeness, smoothness and clearness of the outline. 展开更多
关键词 image edge detection nonsubsampled contourlet transform NSCT modulus maxima DUAL-THRESHOLD mathematical morphology structural elements
下载PDF
Image edge detection based on beamlet transform 被引量:10
20
作者 Li Jing Huang Peikang Wang Xiaohu Pan Xudong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第1期1-5,共5页
Combining beamlet transform with steerable filters, a new edge detection method based on line gradient is proposed. Compared with operators based on point local properties, the edge-detection results with this method ... Combining beamlet transform with steerable filters, a new edge detection method based on line gradient is proposed. Compared with operators based on point local properties, the edge-detection results with this method achieve higher SNR and position accuracy, and are quite helpful for image registration, object identification, etc. Some edge-detection experiments on optical and SAR images that demonstrate the significant improvement over classical edge operators axe also presented. Moreover, the template matching result based on edge information of optical reference image and SAR image also proves the validity of this method. 展开更多
关键词 edge detection beamlet transform steerable filters optical image SAR image.
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部