A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete...A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.展开更多
Integrating Tiny Machine Learning(TinyML)with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level.Constrained devices efficiently implement a Binary Neural N...Integrating Tiny Machine Learning(TinyML)with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level.Constrained devices efficiently implement a Binary Neural Network(BNN)for road feature extraction,utilizing quantization and compression through a pruning strategy.The modifications resulted in a 28-fold decrease in memory usage and a 25%enhancement in inference speed while only experiencing a 2.5%decrease in accuracy.It showcases its superiority over conventional detection algorithms in different road image scenarios.Although constrained by computer resources and training datasets,our results indicate opportunities for future research,demonstrating that quantization and focused optimization can significantly improve machine learning models’accuracy and operational efficiency.ARM Cortex-M0 gives practical feasibility and substantial benefits while deploying our optimized BNN model on this low-power device:Advanced machine learning in edge computing.The analysis work delves into the educational significance of TinyML and its essential function in analyzing road networks using remote sensing,suggesting ways to improve smart city frameworks in road network assessment,traffic management,and autonomous vehicle navigation systems by emphasizing the importance of new technologies for maintaining and safeguarding road networks.展开更多
Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for...Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for this process is to combine inertial navigation system sensor information with the global navigation satellite system(GNSS)signal.However,some factors can interfere with the GNSS signal,such as ionospheric scintillation,jamming,or spoofing.One alternative method to avoid using the GNSS signal is to apply an image processing approach by matching UAV images with georeferenced images.But a high effort is required for image edge extraction.Here a support vector regression(SVR)model is proposed to reduce this computational load and processing time.The dynamic partial reconfiguration(DPR)of part of the SVR datapath is implemented to accelerate the process,reduce the area,and analyze its granularity by increasing the grain size of the reconfigurable region.Results show that the implementation in hardware is 68 times faster than that in software.This architecture with DPR also facilitates the low power consumption of 4 mW,leading to a reduction of 57%than that without DPR.This is also the lowest power consumption in current machine learning hardware implementations.Besides,the circuitry area is 41 times smaller.SVR with Gaussian kernel shows a success rate of 99.18%and minimum square error of 0.0146 for testing with the planning trajectory.This system is useful for adaptive applications where the user/designer can modify/reconfigure the hardware layout during its application,thus contributing to lower power consumption,smaller hardware area,and shorter execution time.展开更多
With the rise of image data and increased complexity of tasks in edge detection, conventional artificial intelligence techniques have been severely impacted. To be able to solve even greater problems of the future, le...With the rise of image data and increased complexity of tasks in edge detection, conventional artificial intelligence techniques have been severely impacted. To be able to solve even greater problems of the future, learning algorithms must maintain high speed and accuracy through economical means. Traditional edge detection approaches cannot detect edges in images in a timely manner due to memory and computational time constraints. In this work, a novel parallelized ant colony optimization technique in a distributed framework provided by the Hadoop/Map-Reduce infrastructure is proposed to improve the edge detection capabilities. Moreover, a filtering technique is applied to reduce the noisy background of images to achieve significant improvement in the accuracy of edge detection. Close examinations of the implementation of the proposed algorithm are discussed and demonstrated through experiments. Results reveal high classification accuracy and significant improvements in speedup, scaleup and sizeup compared to the standard algorithms.展开更多
The“memory wall”of traditional von Neumann computing systems severely restricts the efficiency of data-intensive task execution,while in-memory computing(IMC)architecture is a promising approach to breaking the bott...The“memory wall”of traditional von Neumann computing systems severely restricts the efficiency of data-intensive task execution,while in-memory computing(IMC)architecture is a promising approach to breaking the bottleneck.Although variations and instability in ultra-scaled memory cells seriously degrade the calculation accuracy in IMC architectures,stochastic computing(SC)can compensate for these shortcomings due to its low sensitivity to cell disturbances.Furthermore,massive parallel computing can be processed to improve the speed and efficiency of the system.In this paper,by designing logic functions in NOR flash arrays,SC in IMC for the image edge detection is realized,demonstrating ultra-low computational complexity and power consumption(25.5 fJ/pixel at 2-bit sequence length).More impressively,the noise immunity is 6 times higher than that of the traditional binary method,showing good tolerances to cell variation and reliability degradation when implementing massive parallel computation in the array.展开更多
Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application t...Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application to edge detection.An MCM-CNN is designed by adopting a memristor crossbar composed of a pair of memristors.MCM-CNN based on the memristor crossbar with changeable weight is suitable for edge detection of a binary image and a color image considering its characteristics of programmablization and compactation.Figure of merit(FOM)is introduced to evaluate the proposed structure and several traditional edge detection operators for edge detection results.Experiment results show that the FOM of MCM-CNN is three times more than that of the traditional edge detection operators.展开更多
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Develop...Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Developers fuse and carry out face identification as an access authority into these applications.Still,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user.In the existing spoofing detection algorithm,there was some loss in the recreation of images.This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said problems.This research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused structure.First,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)dataset.This database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video attacks.The images are taken with three different quality cameras:low,average,and high-quality real and spoofed images.An extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms.展开更多
Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Mo...Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression.展开更多
A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the sur...A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the surroundings of this pixel.This connection is for each RGB component color of the input image.Once the image edges are detected for the three primary colors:red,green,and blue,these colors are merged using the combination rule.Then,the final decision is applied to obtain the segmentation.This process allows different data sources to be combined,which is essential to improve the image information quality and have an optimal image segmentation.Finally,the segmentation results of the proposed model are validated.Moreover,the classification accuracy of the tested data is assessed,and a comparison with other current models is conducted.The comparison results show that the proposed model outperforms the existing models in image segmentation.展开更多
By combining multiscale stationary wavelet analysis with fuzzy c-means, a robust edge detection algorithm is presented. Based on the translation invafiance built in multiscale stationary wavelet transform, components ...By combining multiscale stationary wavelet analysis with fuzzy c-means, a robust edge detection algorithm is presented. Based on the translation invafiance built in multiscale stationary wavelet transform, components in different transformed sub-images corresponding to a pixel are employed to form a feature vector of the pixel. All the feature vectors are classified with unsupervised fuzzy c-means to segment the image, and then the edge pixels are checked out by the Canny detector. A series of images contaminated with different intensive Gaussian noises are used to test the novel algorithm. Experiments show that fairly precise edges can be checked out robustly from those images with fairly intensive noise by the proposed algorithm.展开更多
Edge detection is an image processing technique for finding the boundaries of objects within images. It is typically used to interpret gravity and magnetic data, and find the horizontal boundaries of geological bodies...Edge detection is an image processing technique for finding the boundaries of objects within images. It is typically used to interpret gravity and magnetic data, and find the horizontal boundaries of geological bodies. Large deviations between model and true edges are common because of the interference of depth and errors in computing the derivatives; thus, edge detection methods cannot provide information about the depth of the source. To simultaneously obtain the horizontal extent and depth of geophysical anomalies, we use normalized edge detection filters, which normalize the edge detection function at different depths, and the maxima that correspond to the location of the source. The errors between model and actual edges are minimized as the depth of the source decreases and the normalized edge detection method recognizes the extent of the source based on the maxima, allowing for reliable model results. We demonstrate the applicability of the normalized edge detection filters in defining the horizontal extent and depth using synthetic and actual aeromagnetic data.展开更多
This paper presents an algorithm of edge detection in image processing. A new entropy operator and threshold estimation technique are effectively proposed. The algorithm overcomes some drawbacks of Shiozaki operator. ...This paper presents an algorithm of edge detection in image processing. A new entropy operator and threshold estimation technique are effectively proposed. The algorithm overcomes some drawbacks of Shiozaki operator. It not only has higher speed but also can extract the edge better. Finally, an example of 2D image is given to demonstrate the usefulness and advantages of the algorithm.展开更多
Based upon the maximum entropy theorem of information theory, a novel fuzzy approach for edge detection is presented. Firstly, a definition of fuzzy partition entropy is proposed after introducing the concepts of fu...Based upon the maximum entropy theorem of information theory, a novel fuzzy approach for edge detection is presented. Firstly, a definition of fuzzy partition entropy is proposed after introducing the concepts of fuzzy probability and fuzzy partition. The relation of the probability partition and the fuzzy c-partition of the image gradient are used in the algorithm. Secondly, based on the conditional probabilities and the fuzzy partition, the optimal thresholding is searched adaptively through the maximum fuzzy entropy principle, and then the edge image is obtained. Lastly, an edge-enhancing procedure is executed on the edge image. The experimental results show that the proposed approach performs well.展开更多
Tobacco leaf shapes including the length,width,area,perimeter and roundness parameters and so on,Only obtain exact boundaries of the leaf information to calculate a large number of leaf parameters.This paper introduce...Tobacco leaf shapes including the length,width,area,perimeter and roundness parameters and so on,Only obtain exact boundaries of the leaf information to calculate a large number of leaf parameters.This paper introduces the classical edge detection Methods,bug method is used to track the boundaries of tobacco leaf extractly.The test shows that the algorithm has a good edge extraction capability.展开更多
Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and ...Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%.展开更多
This paper describes a technology of dynamic display moving image by computer monitor,which is initially used in the design of tool detection system. The paper presents the hardware and software principie and edge det...This paper describes a technology of dynamic display moving image by computer monitor,which is initially used in the design of tool detection system. The paper presents the hardware and software principie and edge detection process. The way of marking edge point coordinates and stability of moving image also is analyzed. The method reforms the conventional design of the 2-D vision detection system. Moreover,it facilitates the design of the systematic mechanical construction,is convenient to compile instrument systemsoftware,and realizes to detect and track display image simultaneously. By the work,the tool detection system is improved to practical application.展开更多
Most edge-detection methods rely on calculating gradient derivatives of the potential field, a process that is easily affected by noise and is therefore of low stability. We propose a new edge-detection method named c...Most edge-detection methods rely on calculating gradient derivatives of the potential field, a process that is easily affected by noise and is therefore of low stability. We propose a new edge-detection method named correlation coefficient of multidirectional standard deviations(CCMS) that is solely based on statistics. First, we prove the reliability of the proposed method using a single model and then a combination of models. The proposed method is evaluated by comparing the results with those obtained by other edge-detection methods. The CCMS method offers outstanding recognition, retains the sharpness of details, and has low sensitivity to noise. We also applied the CCMS method to Bouguer anomaly data of a potash deposit in Laos. The applicability of the CCMS method is shown by comparing the inferred tectonic framework to that inferred from remote sensing(RS) data.展开更多
A novel algorithm for image edge detection is presented. This algorithm combines the nonsubsampled contourlet transform and the mathematical morphology. First, the source image is decomposed by the nonsubsampled conto...A novel algorithm for image edge detection is presented. This algorithm combines the nonsubsampled contourlet transform and the mathematical morphology. First, the source image is decomposed by the nonsubsampled contourlet transform into multi-scale and multi-directional subbands. Then the edges in the high-frequency and low-frequency sub-bands are respectively extracted by the dualthreshold modulus maxima method and the mathematical morphology operator. Finally, the edges from the high- frequency and low-frequency sub-bands are integrated to the edges of the source image, which are refined, and isolated points are excluded to achieve the edges of the source image. The simulation results show that the proposed algorithm can effectively suppress noise, eliminate pseudo-edges and overcome the adverse effects caused by uneven illumination to a certain extent. Compared with the traditional methods such as LoG, Sobel, and Carmy operators and the modulus maxima algorithm, the proposed method can maintain sufficient positioning accuracy and edge details, and it can also make an improvement in the completeness, smoothness and clearness of the outline.展开更多
Combining beamlet transform with steerable filters, a new edge detection method based on line gradient is proposed. Compared with operators based on point local properties, the edge-detection results with this method ...Combining beamlet transform with steerable filters, a new edge detection method based on line gradient is proposed. Compared with operators based on point local properties, the edge-detection results with this method achieve higher SNR and position accuracy, and are quite helpful for image registration, object identification, etc. Some edge-detection experiments on optical and SAR images that demonstrate the significant improvement over classical edge operators axe also presented. Moreover, the template matching result based on edge information of optical reference image and SAR image also proves the validity of this method.展开更多
To cope with the problems that edge detection operators are liable to make the detected edges too blurry for synthetic aperture radar(SAR)images,an edge detection method for detecting river in SAR images is proposed b...To cope with the problems that edge detection operators are liable to make the detected edges too blurry for synthetic aperture radar(SAR)images,an edge detection method for detecting river in SAR images is proposed based on contourlet modulus maxima and improved mathematical morphology.The SAR image is firstly transformed to a contourlet domain.According to the directional information and gradient information of directional subband of contourlet transform,the modulus maximum and the improved mathematical morphology are used to detect high frequency and low frequency sub-image edges,respectively.Subsequently,the edges of river in SAR image are obtained after fusing the high frequency sub-image and the low frequency sub-image.Experimental results demonstrate that the proposed edge detection method can obtain more accurate edge location and reduce false edges,compared with the Canny method,the method based on wavelet and Canny,the method based on contourlet modulus maxima,and the method based on improved(ROEWA).The obtained river edges are complete and clear.展开更多
基金supported by the Key Area R&D Program of Guangdong Province (Grant No.2022B0701180001)the National Natural Science Foundation of China (Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China (Grant Nos.2019B010140002 and 2020B111110002)the Guangdong-Hong Kong-Macao Joint Innovation Field Project (Grant No.2021A0505080006)。
文摘A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.
基金supported by the National Natural Science Foundation of China(61170147)Scientific Research Project of Zhejiang Provincial Department of Education in China(Y202146796)+2 种基金Natural Science Foundation of Zhejiang Province in China(LTY22F020003)Wenzhou Major Scientific and Technological Innovation Project of China(ZG2021029)Scientific and Technological Projects of Henan Province in China(202102210172).
文摘Integrating Tiny Machine Learning(TinyML)with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level.Constrained devices efficiently implement a Binary Neural Network(BNN)for road feature extraction,utilizing quantization and compression through a pruning strategy.The modifications resulted in a 28-fold decrease in memory usage and a 25%enhancement in inference speed while only experiencing a 2.5%decrease in accuracy.It showcases its superiority over conventional detection algorithms in different road image scenarios.Although constrained by computer resources and training datasets,our results indicate opportunities for future research,demonstrating that quantization and focused optimization can significantly improve machine learning models’accuracy and operational efficiency.ARM Cortex-M0 gives practical feasibility and substantial benefits while deploying our optimized BNN model on this low-power device:Advanced machine learning in edge computing.The analysis work delves into the educational significance of TinyML and its essential function in analyzing road networks using remote sensing,suggesting ways to improve smart city frameworks in road network assessment,traffic management,and autonomous vehicle navigation systems by emphasizing the importance of new technologies for maintaining and safeguarding road networks.
基金financially supported by the National Council for Scientific and Technological Development(CNPq,Brazil),Swedish-Brazilian Research and Innovation Centre(CISB),and Saab AB under Grant No.CNPq:200053/2022-1the National Council for Scientific and Technological Development(CNPq,Brazil)under Grants No.CNPq:312924/2017-8 and No.CNPq:314660/2020-8.
文摘Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for this process is to combine inertial navigation system sensor information with the global navigation satellite system(GNSS)signal.However,some factors can interfere with the GNSS signal,such as ionospheric scintillation,jamming,or spoofing.One alternative method to avoid using the GNSS signal is to apply an image processing approach by matching UAV images with georeferenced images.But a high effort is required for image edge extraction.Here a support vector regression(SVR)model is proposed to reduce this computational load and processing time.The dynamic partial reconfiguration(DPR)of part of the SVR datapath is implemented to accelerate the process,reduce the area,and analyze its granularity by increasing the grain size of the reconfigurable region.Results show that the implementation in hardware is 68 times faster than that in software.This architecture with DPR also facilitates the low power consumption of 4 mW,leading to a reduction of 57%than that without DPR.This is also the lowest power consumption in current machine learning hardware implementations.Besides,the circuitry area is 41 times smaller.SVR with Gaussian kernel shows a success rate of 99.18%and minimum square error of 0.0146 for testing with the planning trajectory.This system is useful for adaptive applications where the user/designer can modify/reconfigure the hardware layout during its application,thus contributing to lower power consumption,smaller hardware area,and shorter execution time.
文摘With the rise of image data and increased complexity of tasks in edge detection, conventional artificial intelligence techniques have been severely impacted. To be able to solve even greater problems of the future, learning algorithms must maintain high speed and accuracy through economical means. Traditional edge detection approaches cannot detect edges in images in a timely manner due to memory and computational time constraints. In this work, a novel parallelized ant colony optimization technique in a distributed framework provided by the Hadoop/Map-Reduce infrastructure is proposed to improve the edge detection capabilities. Moreover, a filtering technique is applied to reduce the noisy background of images to achieve significant improvement in the accuracy of edge detection. Close examinations of the implementation of the proposed algorithm are discussed and demonstrated through experiments. Results reveal high classification accuracy and significant improvements in speedup, scaleup and sizeup compared to the standard algorithms.
基金supported by the National Natural Science Foundation of China(Nos.62034006,91964105,61874068)the China Key Research and Development Program(No.2016YFA0201802)+1 种基金the Natural Science Foundation of Shandong Province(No.ZR2020JQ28)Program of Qilu Young Scholars of Shandong University。
文摘The“memory wall”of traditional von Neumann computing systems severely restricts the efficiency of data-intensive task execution,while in-memory computing(IMC)architecture is a promising approach to breaking the bottleneck.Although variations and instability in ultra-scaled memory cells seriously degrade the calculation accuracy in IMC architectures,stochastic computing(SC)can compensate for these shortcomings due to its low sensitivity to cell disturbances.Furthermore,massive parallel computing can be processed to improve the speed and efficiency of the system.In this paper,by designing logic functions in NOR flash arrays,SC in IMC for the image edge detection is realized,demonstrating ultra-low computational complexity and power consumption(25.5 fJ/pixel at 2-bit sequence length).More impressively,the noise immunity is 6 times higher than that of the traditional binary method,showing good tolerances to cell variation and reliability degradation when implementing massive parallel computation in the array.
基金supported by the Research Fund for International Young Scientists of the National Natural Science Foundation of China(61550110248)the Research on Fundamental Theory of Shared Intelligent Street Lamp for New Scene Service(H04W200495)+1 种基金Sichuan Science and Technology Program(2019YFG0190)the Research on Sino-Tibetan Multi-source Information Acquisition,Fusion,Data Mining and its Application(H04W170186).
文摘Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application to edge detection.An MCM-CNN is designed by adopting a memristor crossbar composed of a pair of memristors.MCM-CNN based on the memristor crossbar with changeable weight is suitable for edge detection of a binary image and a color image considering its characteristics of programmablization and compactation.Figure of merit(FOM)is introduced to evaluate the proposed structure and several traditional edge detection operators for edge detection results.Experiment results show that the FOM of MCM-CNN is three times more than that of the traditional edge detection operators.
文摘Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Developers fuse and carry out face identification as an access authority into these applications.Still,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user.In the existing spoofing detection algorithm,there was some loss in the recreation of images.This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said problems.This research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused structure.First,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)dataset.This database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video attacks.The images are taken with three different quality cameras:low,average,and high-quality real and spoofed images.An extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms.
文摘Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression.
文摘A new model is proposed in this paper on color edge detection that uses the second derivative operators and data fusion mechanism.The secondorder neighborhood shows the connection between the current pixel and the surroundings of this pixel.This connection is for each RGB component color of the input image.Once the image edges are detected for the three primary colors:red,green,and blue,these colors are merged using the combination rule.Then,the final decision is applied to obtain the segmentation.This process allows different data sources to be combined,which is essential to improve the image information quality and have an optimal image segmentation.Finally,the segmentation results of the proposed model are validated.Moreover,the classification accuracy of the tested data is assessed,and a comparison with other current models is conducted.The comparison results show that the proposed model outperforms the existing models in image segmentation.
文摘By combining multiscale stationary wavelet analysis with fuzzy c-means, a robust edge detection algorithm is presented. Based on the translation invafiance built in multiscale stationary wavelet transform, components in different transformed sub-images corresponding to a pixel are employed to form a feature vector of the pixel. All the feature vectors are classified with unsupervised fuzzy c-means to segment the image, and then the edge pixels are checked out by the Canny detector. A series of images contaminated with different intensive Gaussian noises are used to test the novel algorithm. Experiments show that fairly precise edges can be checked out robustly from those images with fairly intensive noise by the proposed algorithm.
基金supported by the China Postdoctoral Science Foundation (No.2014M551188)the Deep Exploration in China Sinoprobe-09-01 (No.201011078)
文摘Edge detection is an image processing technique for finding the boundaries of objects within images. It is typically used to interpret gravity and magnetic data, and find the horizontal boundaries of geological bodies. Large deviations between model and true edges are common because of the interference of depth and errors in computing the derivatives; thus, edge detection methods cannot provide information about the depth of the source. To simultaneously obtain the horizontal extent and depth of geophysical anomalies, we use normalized edge detection filters, which normalize the edge detection function at different depths, and the maxima that correspond to the location of the source. The errors between model and actual edges are minimized as the depth of the source decreases and the normalized edge detection method recognizes the extent of the source based on the maxima, allowing for reliable model results. We demonstrate the applicability of the normalized edge detection filters in defining the horizontal extent and depth using synthetic and actual aeromagnetic data.
文摘This paper presents an algorithm of edge detection in image processing. A new entropy operator and threshold estimation technique are effectively proposed. The algorithm overcomes some drawbacks of Shiozaki operator. It not only has higher speed but also can extract the edge better. Finally, an example of 2D image is given to demonstrate the usefulness and advantages of the algorithm.
文摘Based upon the maximum entropy theorem of information theory, a novel fuzzy approach for edge detection is presented. Firstly, a definition of fuzzy partition entropy is proposed after introducing the concepts of fuzzy probability and fuzzy partition. The relation of the probability partition and the fuzzy c-partition of the image gradient are used in the algorithm. Secondly, based on the conditional probabilities and the fuzzy partition, the optimal thresholding is searched adaptively through the maximum fuzzy entropy principle, and then the edge image is obtained. Lastly, an edge-enhancing procedure is executed on the edge image. The experimental results show that the proposed approach performs well.
基金Supported by Key Technologies R & D Program of Henan Province(082102210065)Natural Science Research Project of Henan Educational Committee(2007210005)~~
文摘Tobacco leaf shapes including the length,width,area,perimeter and roundness parameters and so on,Only obtain exact boundaries of the leaf information to calculate a large number of leaf parameters.This paper introduces the classical edge detection Methods,bug method is used to track the boundaries of tobacco leaf extractly.The test shows that the algorithm has a good edge extraction capability.
基金supported by the National Natural Science Foundation of China(62072475)the Fundamental Research Funds for the Central Universities of Central South University(CX20230356)。
文摘Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%.
文摘This paper describes a technology of dynamic display moving image by computer monitor,which is initially used in the design of tool detection system. The paper presents the hardware and software principie and edge detection process. The way of marking edge point coordinates and stability of moving image also is analyzed. The method reforms the conventional design of the 2-D vision detection system. Moreover,it facilitates the design of the systematic mechanical construction,is convenient to compile instrument systemsoftware,and realizes to detect and track display image simultaneously. By the work,the tool detection system is improved to practical application.
基金supported by the National Hi-Tech Research and Development Program of China(863 Program)(No.2006AA06Z107)the National Natural Science Foundation of China(No.40930314)
文摘Most edge-detection methods rely on calculating gradient derivatives of the potential field, a process that is easily affected by noise and is therefore of low stability. We propose a new edge-detection method named correlation coefficient of multidirectional standard deviations(CCMS) that is solely based on statistics. First, we prove the reliability of the proposed method using a single model and then a combination of models. The proposed method is evaluated by comparing the results with those obtained by other edge-detection methods. The CCMS method offers outstanding recognition, retains the sharpness of details, and has low sensitivity to noise. We also applied the CCMS method to Bouguer anomaly data of a potash deposit in Laos. The applicability of the CCMS method is shown by comparing the inferred tectonic framework to that inferred from remote sensing(RS) data.
基金The National Key Technologies R&D Program during the 12th Five-Year Period of China(No.2012BAJ23B02)Science and Technology Support Program of Jiangsu Province(No.BE2010606)
文摘A novel algorithm for image edge detection is presented. This algorithm combines the nonsubsampled contourlet transform and the mathematical morphology. First, the source image is decomposed by the nonsubsampled contourlet transform into multi-scale and multi-directional subbands. Then the edges in the high-frequency and low-frequency sub-bands are respectively extracted by the dualthreshold modulus maxima method and the mathematical morphology operator. Finally, the edges from the high- frequency and low-frequency sub-bands are integrated to the edges of the source image, which are refined, and isolated points are excluded to achieve the edges of the source image. The simulation results show that the proposed algorithm can effectively suppress noise, eliminate pseudo-edges and overcome the adverse effects caused by uneven illumination to a certain extent. Compared with the traditional methods such as LoG, Sobel, and Carmy operators and the modulus maxima algorithm, the proposed method can maintain sufficient positioning accuracy and edge details, and it can also make an improvement in the completeness, smoothness and clearness of the outline.
文摘Combining beamlet transform with steerable filters, a new edge detection method based on line gradient is proposed. Compared with operators based on point local properties, the edge-detection results with this method achieve higher SNR and position accuracy, and are quite helpful for image registration, object identification, etc. Some edge-detection experiments on optical and SAR images that demonstrate the significant improvement over classical edge operators axe also presented. Moreover, the template matching result based on edge information of optical reference image and SAR image also proves the validity of this method.
基金Supported by the CRSRI Open Research Program(CKWV2013225/KY)the Open Project Foundation of Key Laboratory of the Yellow River Sediment of Ministry of Water Resource(2014006)+2 种基金the Open Project Foundation of Key Lab of Port,Waterway and Sedimentation Engineering of the Ministry of Transportthe State Key Lab of Urban Water Resource and Environment(HIT)(ES201409)the Priority Academic Program Development of Jiangsu Higher Education Institution
文摘To cope with the problems that edge detection operators are liable to make the detected edges too blurry for synthetic aperture radar(SAR)images,an edge detection method for detecting river in SAR images is proposed based on contourlet modulus maxima and improved mathematical morphology.The SAR image is firstly transformed to a contourlet domain.According to the directional information and gradient information of directional subband of contourlet transform,the modulus maximum and the improved mathematical morphology are used to detect high frequency and low frequency sub-image edges,respectively.Subsequently,the edges of river in SAR image are obtained after fusing the high frequency sub-image and the low frequency sub-image.Experimental results demonstrate that the proposed edge detection method can obtain more accurate edge location and reduce false edges,compared with the Canny method,the method based on wavelet and Canny,the method based on contourlet modulus maxima,and the method based on improved(ROEWA).The obtained river edges are complete and clear.