Background A medical content-based image retrieval(CBIR)system is designed to retrieve images from large imaging repositories that are visually similar to a user′s query image.CBIR is widely used in evidence-based di...Background A medical content-based image retrieval(CBIR)system is designed to retrieve images from large imaging repositories that are visually similar to a user′s query image.CBIR is widely used in evidence-based diagnosis,teaching,and research.Although the retrieval accuracy has largely improved,there has been limited development toward visualizing important image features that indicate the similarity of retrieved images.Despite the prevalence of 3D volumetric data in medical imaging such as computed tomography(CT),current CBIR systems still rely on 2D cross-sectional views for the visualization of retrieved images.Such 2D visualization requires users to browse through the image stacks to confirm the similarity of the retrieved images and often involves mental reconstruction of 3D information,including the size,shape,and spatial relations of multiple structures.This process is time-consuming and reliant on users'experience.Methods In this study,we proposed an importance-aware 3D volume visualization method.The rendering parameters were automatically optimized to maximize the visibility of important structures that were detected and prioritized in the retrieval process.We then integrated the proposed visualization into a CBIR system,thereby complementing the 2D cross-sectional views for relevance feedback and further analyses.Results Our preliminary results demonstrate that 3D visualization can provide additional information using multimodal positron emission tomography and computed tomography(PETCT)images of a non-small cell lung cancer dataset.展开更多
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete...A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.展开更多
The task of indoor visual localization, utilizing camera visual information for user pose calculation, was a core component of Augmented Reality (AR) and Simultaneous Localization and Mapping (SLAM). Existing indoor l...The task of indoor visual localization, utilizing camera visual information for user pose calculation, was a core component of Augmented Reality (AR) and Simultaneous Localization and Mapping (SLAM). Existing indoor localization technologies generally used scene-specific 3D representations or were trained on specific datasets, making it challenging to balance accuracy and cost when applied to new scenes. Addressing this issue, this paper proposed a universal indoor visual localization method based on efficient image retrieval. Initially, a Multi-Layer Perceptron (MLP) was employed to aggregate features from intermediate layers of a convolutional neural network, obtaining a global representation of the image. This approach ensured accurate and rapid retrieval of reference images. Subsequently, a new mechanism using Random Sample Consensus (RANSAC) was designed to resolve relative pose ambiguity caused by the essential matrix decomposition based on the five-point method. Finally, the absolute pose of the queried user image was computed, thereby achieving indoor user pose estimation. The proposed indoor localization method was characterized by its simplicity, flexibility, and excellent cross-scene generalization. Experimental results demonstrated a positioning error of 0.09 m and 2.14° on the 7Scenes dataset, and 0.15 m and 6.37° on the 12Scenes dataset. These results convincingly illustrated the outstanding performance of the proposed indoor localization method.展开更多
Exploration of artworks is enjoyable but often time consuming.For example,it is not always easy to discover the favorite types of unknown painting works.It is not also always easy to explore unpopular painting works w...Exploration of artworks is enjoyable but often time consuming.For example,it is not always easy to discover the favorite types of unknown painting works.It is not also always easy to explore unpopular painting works which looks similar to painting works created by famous artists.This paper presents a painting image browser which assists the explorative discovery of user-interested painting works.The presented browser applies a new multidimensional data visualization technique that highlights particular ranges of particular numeric values based on association rules to suggest cues to find favorite painting images.This study assumes a large number of painting images are provided where categorical information(e.g.,names of artists,created year)is assigned to the images.The presented system firstly calculates the feature values of the images as a preprocessing step.Then the browser visualizes the multidimensional feature values as a heatmap and highlights association rules discovered from the relationships between the feature values and categorical information.This mechanism enables users to explore favorite painting images or painting images that look similar to famous painting works.Our case study and user evaluation demonstrates the effectiveness of the presented image browser.展开更多
A novel method combining visualization particle tracking with image-based dynamic light scattering was developed to achieve the in situ and real-time size measurement of nanobubbles(NBs).First,the in situ size distrib...A novel method combining visualization particle tracking with image-based dynamic light scattering was developed to achieve the in situ and real-time size measurement of nanobubbles(NBs).First,the in situ size distribution of NBs was visualized by dark-field microscopy.Then,real-time size during the preparation was measured using image-based dynamic light scattering,and the longitudinal size distribution of NBs in the sample cell was obtained in a steady state.Results show that this strategy can provide a detailed and accurate size of bubbles in the whole sample compared with the commercial ZetaSizer Nano equipment.Therefore,the developed method is a real-time and simple technology with excellent accuracy,providing new insights into the accurate measurement of the size distribution of NBs or nanoparticles in solution.展开更多
The advantages and disadvantages of two existing methods for explosive field visualization are analyzed in this paper. And a new method based on image fusion is proposed to integrate their complementary advantages. Wi...The advantages and disadvantages of two existing methods for explosive field visualization are analyzed in this paper. And a new method based on image fusion is proposed to integrate their complementary advantages. With the method, two source images built by equal mapping and modulus mapping are individually decomposed into two Gauss-Laplacian pyramid sequences. Then, the two individual sequences are used to make a composite one according to the process of fusion. Finally, a new image is reconstructed from the composite sequence. Experimental results show that the new images integrate the advantages of sources, effectively improve the visualization, and disclose more information about explosive field.展开更多
In this paper, with the general retrospect to the research on surface reconstruction and the marching cubes algorithm, we gave detailed description of an algorithm on the construction of object surfaces. The possible ...In this paper, with the general retrospect to the research on surface reconstruction and the marching cubes algorithm, we gave detailed description of an algorithm on the construction of object surfaces. The possible ambiguity problem in the original marching cubes algorithm was eliminated by its index mechanism. Some results on the MRI images were presented. Based on extracting and clipping contours from a set of medial slice images and setting the patch vertices values according to the gray images, this algorithm may be applied to form the arbitrary section images with three dimensional effects. It can also enhance the visual effect and interpretation of medical data.展开更多
Three-dimensional medical image visualization becomes an essential part for medical field, including computer aided diagnosis, surgery planning and simulation, artificial limb surgery, radiotherapy planning, and teach...Three-dimensional medical image visualization becomes an essential part for medical field, including computer aided diagnosis, surgery planning and simulation, artificial limb surgery, radiotherapy planning, and teaching etc. In this paper, marching cubes algorithm is adopted to reconstruct the 3-D images for the CT image sequence in DICOM format under theVC++6.0 and the visual package VTK platform. The relatively simple interactive operations such as rotation and transfer can be realized on the platform. Moreover, the normal vector and interior point are calculated to form the virtual clipping plane, which is then used to incise the 3-D object. Information of the virtual slice can be obtained, in the mean while the virtual slice images are displayed on the screen. The technique can realize the real time interaction extraction of virtual slice on 3-D CT image. The cuboids structured can be zoomed, moved and eircumrotated by operating mouse to incise the 3-D reconstruction object. Real time interaction can be realized by clipping the reconstruction object. The coordinates can be acquired by the mouse clicking in the 3D space, to realize the point mouse pick-up as well angle and distance interactive measurement. We can get quantitative information about 3-D images through measurement.展开更多
SQL Server 2005的image型数据不能通过INSERT和UPDATE等语句进行插入和更新,这给处理image型数据带来十分不便。讨论了在Visual Basic中处理SQL Server 2005的image型数据的一般方法,即利用ADO数据对象的Fields集合的AppendChunk方法和...SQL Server 2005的image型数据不能通过INSERT和UPDATE等语句进行插入和更新,这给处理image型数据带来十分不便。讨论了在Visual Basic中处理SQL Server 2005的image型数据的一般方法,即利用ADO数据对象的Fields集合的AppendChunk方法和GetChunk方法及ADO Data控件进行数据的填充和读取。展开更多
Methods of arc length control and visual image based weld detection for precision pulse TIG welding were investigated. With a particular all hardware circuit, arc voltage during peak current stage is sampled and inte...Methods of arc length control and visual image based weld detection for precision pulse TIG welding were investigated. With a particular all hardware circuit, arc voltage during peak current stage is sampled and integrated to indicate arc length, deviation of arc length and adjusting parameters are calculated and output to drive a step motor directly. According to the features of welding image grabbed with CCD camera, a special algorithm was developed to detect the central line of weld fast and accurately. Then an application system were established, whose static arc length error is ±0.1 mm with 20 A average current and 1 mm given arc length, static detection precision of weld is 0.01 mm , processing time of each image is less than 120 ms . Precision pulse TIG welding of some given thin stainless steel components with complicated curved surface was successfully realized.展开更多
To overcome the shortcomings of the Lee image enhancement algorithm and its improvement based on the logarithmic image processing(LIP) model, this paper proposes what we believe to be an effective image enhancement al...To overcome the shortcomings of the Lee image enhancement algorithm and its improvement based on the logarithmic image processing(LIP) model, this paper proposes what we believe to be an effective image enhancement algorithm. This algorithm introduces fuzzy entropy, makes full use of neighborhood information, fuzzy information and human visual characteristics.To enhance an image, this paper first carries out the reasonable fuzzy-3 partition of its histogram into the dark region, intermediate region and bright region. It then extracts the statistical characteristics of the three regions and adaptively selects the parameter αaccording to the statistical characteristics of the image’s gray-scale values. It also adds a useful nonlinear transform, thus increasing the ubiquity of the algorithm. Finally, the causes for the gray-scale value overcorrection that occurs in the traditional image enhancement algorithms are analyzed and their solutions are proposed.The simulation results show that our image enhancement algorithm can effectively suppress the noise of an image, enhance its contrast and visual effect, sharpen its edge and adjust its dynamic range.展开更多
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selec...A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.展开更多
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s...Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks.展开更多
The key to the wavelet based denoising teehniquea is how to manipulate the wavelet coefficients. By referring to the idea of Inclusive-OR in the design of circuits, this paper proposes a new algorithm called wavelet d...The key to the wavelet based denoising teehniquea is how to manipulate the wavelet coefficients. By referring to the idea of Inclusive-OR in the design of circuits, this paper proposes a new algorithm called wavelet domain Inclusive-OR denoising algorithm(WDIDA), which distinguishes the wavelet coefficients belonging to image or noise by considering their phases and modulus maxima simultaneously. Using this new algorithm, the denoising effects are improved and the computation time is reduced. Furthermore, in order to enhance the edges of the image but not magnify noise, a contrast nonlinear enhancing algorithm is presented according to human visual properties. Compared with traditional enhancing algorithms, the algorithm that we proposed has a better noise reducing performanee , preserving edges and improving the visual quality of images.展开更多
The dynamic multichannel binocular visual image modeling is studied based on Internet of Things (IoT) Perception Layer, using mobile robot self-organizing network. By employing multigroup mobile robots with binocular ...The dynamic multichannel binocular visual image modeling is studied based on Internet of Things (IoT) Perception Layer, using mobile robot self-organizing network. By employing multigroup mobile robots with binocular visual system, the real visual images of the object will be obtained. Then through the mobile self-organizing network, a three-dimensional model is rebuilt by synthesizing the returned images. On this basis, we formalize a novel algorithm for multichannel binocular visual three-dimensional images based on fast three-dimensional modeling. Compared with the method based on single binocular visual system, the new algorithm can improve the Integrity and accuracy of the dynamic three-dimensional object modeling. The simulation results show that the new method can effectively accelerate the modeling speed, improve the similarity and not increase the data size.展开更多
Visual cortical prostheses have the potential to restore partial vision. Still limited by the low-resolution visual percepts provided by visual cortical prostheses, implant wearers can currently only "see" pixelized...Visual cortical prostheses have the potential to restore partial vision. Still limited by the low-resolution visual percepts provided by visual cortical prostheses, implant wearers can currently only "see" pixelized images, and how to obtain the specific brain responses to different pixelized images in the primary visual cortex(the implant area) is still unknown. We conducted a functional magnetic resonance imaging experiment on normal human participants to investigate the brain activation patterns in response to 18 different pixelized images. There were 100 voxels in the brain activation pattern that were selected from the primary visual cortex, and voxel size was 4 mm × 4 mm × 4 mm. Multi-voxel pattern analysis was used to test if these 18 different brain activation patterns were specific. We chose a Linear Support Vector Machine(LSVM) as the classifier in this study. The results showed that the classification accuracies of different brain activation patterns were significantly above chance level, which suggests that the classifier can successfully distinguish the brain activation patterns. Our results suggest that the specific brain activation patterns to different pixelized images can be obtained in the primary visual cortex using a 4 mm × 4 mm × 4 mm voxel size and a 100-voxel pattern.展开更多
A visual sensing system was developed. The system is suitable for titanium-alloy electron-beam welding, and senses and detects molten-pool dynamic processes. A suite of processing programs for colored molten-pool imag...A visual sensing system was developed. The system is suitable for titanium-alloy electron-beam welding, and senses and detects molten-pool dynamic processes. A suite of processing programs for colored molten-pool images in titanium-alloy electron-beam welding was developed using Matlab software; molten-pool edge images are completely obtained using the program. The Matlab software was used to write a program which could extract the molten-pool width. The functional relationship between the molten-pool width and penetration under the experimental conditions was obtained by a curve-fitting method, and provided the theoretical basis for further penetration control.展开更多
Rapid and accurate identification of potential structural deficiencies is a crucial task in evaluating seismic vulnerability of large building inventories in a region. In the case of multi-story structures, abrupt ver...Rapid and accurate identification of potential structural deficiencies is a crucial task in evaluating seismic vulnerability of large building inventories in a region. In the case of multi-story structures, abrupt vertical variations of story stiffness are known to significantly increase the likelihood of collapse during moderate or severe earthquakes. Identifying and retrofitting buildings with such irregularities—generally termed as soft-story buildings—is, therefore, vital in earthquake preparedness and loss mitigation efforts. Soft-story building identification through conventional means is a labor-intensive and time-consuming process. In this study, an automated procedure was devised based on deep learning techniques for identifying soft-story buildings from street-view images at a regional scale. A database containing a large number of building images and a semi-automated image labeling approach that effectively annotates new database entries was developed for developing the deep learning model. Extensive computational experiments were carried out to examine the effectiveness of the proposed procedure, and to gain insights into automated soft-story building identification.展开更多
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi...Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.展开更多
文摘Background A medical content-based image retrieval(CBIR)system is designed to retrieve images from large imaging repositories that are visually similar to a user′s query image.CBIR is widely used in evidence-based diagnosis,teaching,and research.Although the retrieval accuracy has largely improved,there has been limited development toward visualizing important image features that indicate the similarity of retrieved images.Despite the prevalence of 3D volumetric data in medical imaging such as computed tomography(CT),current CBIR systems still rely on 2D cross-sectional views for the visualization of retrieved images.Such 2D visualization requires users to browse through the image stacks to confirm the similarity of the retrieved images and often involves mental reconstruction of 3D information,including the size,shape,and spatial relations of multiple structures.This process is time-consuming and reliant on users'experience.Methods In this study,we proposed an importance-aware 3D volume visualization method.The rendering parameters were automatically optimized to maximize the visibility of important structures that were detected and prioritized in the retrieval process.We then integrated the proposed visualization into a CBIR system,thereby complementing the 2D cross-sectional views for relevance feedback and further analyses.Results Our preliminary results demonstrate that 3D visualization can provide additional information using multimodal positron emission tomography and computed tomography(PETCT)images of a non-small cell lung cancer dataset.
基金supported by the Key Area R&D Program of Guangdong Province (Grant No.2022B0701180001)the National Natural Science Foundation of China (Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China (Grant Nos.2019B010140002 and 2020B111110002)the Guangdong-Hong Kong-Macao Joint Innovation Field Project (Grant No.2021A0505080006)。
文摘A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.
文摘The task of indoor visual localization, utilizing camera visual information for user pose calculation, was a core component of Augmented Reality (AR) and Simultaneous Localization and Mapping (SLAM). Existing indoor localization technologies generally used scene-specific 3D representations or were trained on specific datasets, making it challenging to balance accuracy and cost when applied to new scenes. Addressing this issue, this paper proposed a universal indoor visual localization method based on efficient image retrieval. Initially, a Multi-Layer Perceptron (MLP) was employed to aggregate features from intermediate layers of a convolutional neural network, obtaining a global representation of the image. This approach ensured accurate and rapid retrieval of reference images. Subsequently, a new mechanism using Random Sample Consensus (RANSAC) was designed to resolve relative pose ambiguity caused by the essential matrix decomposition based on the five-point method. Finally, the absolute pose of the queried user image was computed, thereby achieving indoor user pose estimation. The proposed indoor localization method was characterized by its simplicity, flexibility, and excellent cross-scene generalization. Experimental results demonstrated a positioning error of 0.09 m and 2.14° on the 7Scenes dataset, and 0.15 m and 6.37° on the 12Scenes dataset. These results convincingly illustrated the outstanding performance of the proposed indoor localization method.
文摘Exploration of artworks is enjoyable but often time consuming.For example,it is not always easy to discover the favorite types of unknown painting works.It is not also always easy to explore unpopular painting works which looks similar to painting works created by famous artists.This paper presents a painting image browser which assists the explorative discovery of user-interested painting works.The presented browser applies a new multidimensional data visualization technique that highlights particular ranges of particular numeric values based on association rules to suggest cues to find favorite painting images.This study assumes a large number of painting images are provided where categorical information(e.g.,names of artists,created year)is assigned to the images.The presented system firstly calculates the feature values of the images as a preprocessing step.Then the browser visualizes the multidimensional feature values as a heatmap and highlights association rules discovered from the relationships between the feature values and categorical information.This mechanism enables users to explore favorite painting images or painting images that look similar to famous painting works.Our case study and user evaluation demonstrates the effectiveness of the presented image browser.
基金The National Key Research and Development Program of China(No.2017YFA0104302)the National Natural Science Foundation of China(No.51832001,61821002,81971750).
文摘A novel method combining visualization particle tracking with image-based dynamic light scattering was developed to achieve the in situ and real-time size measurement of nanobubbles(NBs).First,the in situ size distribution of NBs was visualized by dark-field microscopy.Then,real-time size during the preparation was measured using image-based dynamic light scattering,and the longitudinal size distribution of NBs in the sample cell was obtained in a steady state.Results show that this strategy can provide a detailed and accurate size of bubbles in the whole sample compared with the commercial ZetaSizer Nano equipment.Therefore,the developed method is a real-time and simple technology with excellent accuracy,providing new insights into the accurate measurement of the size distribution of NBs or nanoparticles in solution.
基金Sponsored by the National Natural Science Foundation of China(10625208)the Basic Research Foundation of Beijing Institute of Technology(20061242005)the Foundation of State Key Laboratory of Explosion Science and Technology(ZDKT08-02)
文摘The advantages and disadvantages of two existing methods for explosive field visualization are analyzed in this paper. And a new method based on image fusion is proposed to integrate their complementary advantages. With the method, two source images built by equal mapping and modulus mapping are individually decomposed into two Gauss-Laplacian pyramid sequences. Then, the two individual sequences are used to make a composite one according to the process of fusion. Finally, a new image is reconstructed from the composite sequence. Experimental results show that the new images integrate the advantages of sources, effectively improve the visualization, and disclose more information about explosive field.
文摘In this paper, with the general retrospect to the research on surface reconstruction and the marching cubes algorithm, we gave detailed description of an algorithm on the construction of object surfaces. The possible ambiguity problem in the original marching cubes algorithm was eliminated by its index mechanism. Some results on the MRI images were presented. Based on extracting and clipping contours from a set of medial slice images and setting the patch vertices values according to the gray images, this algorithm may be applied to form the arbitrary section images with three dimensional effects. It can also enhance the visual effect and interpretation of medical data.
基金National 973 Basic Research Program of Chinagrant number:2010CB732600+4 种基金Major Research Equipment Fund of the Chinese Academy of Sciences and Knowledge Innovation Project of the Chinese Academy of Sciences,2008 Shenzhen Controversial Technology Innovation Research Projectsgrant number:FG200805230224AConcentration plan of innovation sources of Shenzhen-R&D projects of international cooperation on science and technologygrant number:ZYA200903260065ANatural Science Foundation of Guangdong Province,China 8478922035-X0007007
文摘Three-dimensional medical image visualization becomes an essential part for medical field, including computer aided diagnosis, surgery planning and simulation, artificial limb surgery, radiotherapy planning, and teaching etc. In this paper, marching cubes algorithm is adopted to reconstruct the 3-D images for the CT image sequence in DICOM format under theVC++6.0 and the visual package VTK platform. The relatively simple interactive operations such as rotation and transfer can be realized on the platform. Moreover, the normal vector and interior point are calculated to form the virtual clipping plane, which is then used to incise the 3-D object. Information of the virtual slice can be obtained, in the mean while the virtual slice images are displayed on the screen. The technique can realize the real time interaction extraction of virtual slice on 3-D CT image. The cuboids structured can be zoomed, moved and eircumrotated by operating mouse to incise the 3-D reconstruction object. Real time interaction can be realized by clipping the reconstruction object. The coordinates can be acquired by the mouse clicking in the 3D space, to realize the point mouse pick-up as well angle and distance interactive measurement. We can get quantitative information about 3-D images through measurement.
文摘SQL Server 2005的image型数据不能通过INSERT和UPDATE等语句进行插入和更新,这给处理image型数据带来十分不便。讨论了在Visual Basic中处理SQL Server 2005的image型数据的一般方法,即利用ADO数据对象的Fields集合的AppendChunk方法和GetChunk方法及ADO Data控件进行数据的填充和读取。
文摘Methods of arc length control and visual image based weld detection for precision pulse TIG welding were investigated. With a particular all hardware circuit, arc voltage during peak current stage is sampled and integrated to indicate arc length, deviation of arc length and adjusting parameters are calculated and output to drive a step motor directly. According to the features of welding image grabbed with CCD camera, a special algorithm was developed to detect the central line of weld fast and accurately. Then an application system were established, whose static arc length error is ±0.1 mm with 20 A average current and 1 mm given arc length, static detection precision of weld is 0.01 mm , processing time of each image is less than 120 ms . Precision pulse TIG welding of some given thin stainless steel components with complicated curved surface was successfully realized.
基金supported by the National Natural Science Foundation of China(61472324)
文摘To overcome the shortcomings of the Lee image enhancement algorithm and its improvement based on the logarithmic image processing(LIP) model, this paper proposes what we believe to be an effective image enhancement algorithm. This algorithm introduces fuzzy entropy, makes full use of neighborhood information, fuzzy information and human visual characteristics.To enhance an image, this paper first carries out the reasonable fuzzy-3 partition of its histogram into the dark region, intermediate region and bright region. It then extracts the statistical characteristics of the three regions and adaptively selects the parameter αaccording to the statistical characteristics of the image’s gray-scale values. It also adds a useful nonlinear transform, thus increasing the ubiquity of the algorithm. Finally, the causes for the gray-scale value overcorrection that occurs in the traditional image enhancement algorithms are analyzed and their solutions are proposed.The simulation results show that our image enhancement algorithm can effectively suppress the noise of an image, enhance its contrast and visual effect, sharpen its edge and adjust its dynamic range.
文摘A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.
基金supported by the National Key R&D Program of China(Grant Number 2021YFB2700900)the National Natural Science Foundation of China(Grant Numbers 62172232,62172233)the Jiangsu Basic Research Program Natural Science Foundation(Grant Number BK20200039).
文摘Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks.
文摘The key to the wavelet based denoising teehniquea is how to manipulate the wavelet coefficients. By referring to the idea of Inclusive-OR in the design of circuits, this paper proposes a new algorithm called wavelet domain Inclusive-OR denoising algorithm(WDIDA), which distinguishes the wavelet coefficients belonging to image or noise by considering their phases and modulus maxima simultaneously. Using this new algorithm, the denoising effects are improved and the computation time is reduced. Furthermore, in order to enhance the edges of the image but not magnify noise, a contrast nonlinear enhancing algorithm is presented according to human visual properties. Compared with traditional enhancing algorithms, the algorithm that we proposed has a better noise reducing performanee , preserving edges and improving the visual quality of images.
基金supported by HiTech Researchand Development Program of China under Grant No.2007AA10Z235
文摘The dynamic multichannel binocular visual image modeling is studied based on Internet of Things (IoT) Perception Layer, using mobile robot self-organizing network. By employing multigroup mobile robots with binocular visual system, the real visual images of the object will be obtained. Then through the mobile self-organizing network, a three-dimensional model is rebuilt by synthesizing the returned images. On this basis, we formalize a novel algorithm for multichannel binocular visual three-dimensional images based on fast three-dimensional modeling. Compared with the method based on single binocular visual system, the new algorithm can improve the Integrity and accuracy of the dynamic three-dimensional object modeling. The simulation results show that the new method can effectively accelerate the modeling speed, improve the similarity and not increase the data size.
基金supported by the National Natural Science Foundation of China,No.31070758,31271060the Natural Science Foundation of Chongqing in China,No.cstc2013jcyj A10085
文摘Visual cortical prostheses have the potential to restore partial vision. Still limited by the low-resolution visual percepts provided by visual cortical prostheses, implant wearers can currently only "see" pixelized images, and how to obtain the specific brain responses to different pixelized images in the primary visual cortex(the implant area) is still unknown. We conducted a functional magnetic resonance imaging experiment on normal human participants to investigate the brain activation patterns in response to 18 different pixelized images. There were 100 voxels in the brain activation pattern that were selected from the primary visual cortex, and voxel size was 4 mm × 4 mm × 4 mm. Multi-voxel pattern analysis was used to test if these 18 different brain activation patterns were specific. We chose a Linear Support Vector Machine(LSVM) as the classifier in this study. The results showed that the classification accuracies of different brain activation patterns were significantly above chance level, which suggests that the classifier can successfully distinguish the brain activation patterns. Our results suggest that the specific brain activation patterns to different pixelized images can be obtained in the primary visual cortex using a 4 mm × 4 mm × 4 mm voxel size and a 100-voxel pattern.
文摘A visual sensing system was developed. The system is suitable for titanium-alloy electron-beam welding, and senses and detects molten-pool dynamic processes. A suite of processing programs for colored molten-pool images in titanium-alloy electron-beam welding was developed using Matlab software; molten-pool edge images are completely obtained using the program. The Matlab software was used to write a program which could extract the molten-pool width. The functional relationship between the molten-pool width and penetration under the experimental conditions was obtained by a curve-fitting method, and provided the theoretical basis for further penetration control.
基金supported by the US National Science Foundation under Grant No. 1612843. NHERI Design Safe (Rathje et al., 2017)Texas Advanced Computing Center (TACC)。
文摘Rapid and accurate identification of potential structural deficiencies is a crucial task in evaluating seismic vulnerability of large building inventories in a region. In the case of multi-story structures, abrupt vertical variations of story stiffness are known to significantly increase the likelihood of collapse during moderate or severe earthquakes. Identifying and retrofitting buildings with such irregularities—generally termed as soft-story buildings—is, therefore, vital in earthquake preparedness and loss mitigation efforts. Soft-story building identification through conventional means is a labor-intensive and time-consuming process. In this study, an automated procedure was devised based on deep learning techniques for identifying soft-story buildings from street-view images at a regional scale. A database containing a large number of building images and a semi-automated image labeling approach that effectively annotates new database entries was developed for developing the deep learning model. Extensive computational experiments were carried out to examine the effectiveness of the proposed procedure, and to gain insights into automated soft-story building identification.
基金Project supported by the National Natural Science Foundation of China(Grant No.62061014)the Natural Science Foundation of Liaoning province of China(Grant No.2020-MS-274).
文摘Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.