首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 66 毫秒
1.
<正>The problem considered in this paper is how to detect the degree of similarity in the content of digital images useful in image retrieval,i.e.,to what extent is the content of a query image similar to content of other images.The solution to this problem results from the detection of subsets that are rough sets contained in covers of digital images determined by perceptual tolerance relations(PTRs).Such relations are defined within the context of perceptual representative spaces that hearken back to work by J.H.Poincare on representative spaces as models of physical continua.Classes determined by a PTR provide content useful in content-based image retrieval(CBIR).In addition,tolerance classes provide a means of determining when subsets of image covers are tolerance rough sets(TRSs).It is the nearness of TRSs present in image tolerance spaces that provide a promising approach to CBIR,especially in cases such as satellite images or aircraft identification where there are subtle differences between pairs of digital images,making it difficult to quantify the similarities between such images.The contribution of this article is the introduction of the nearness of tolerance rough sets as an effective means of measuring digital image similarities and,as a significant consequence,successfully carrying out CBIR.  相似文献   

2.
Adaptive Image Digital Watermarking with DCT and FCM   总被引:2,自引:0,他引:2  
A novel adaptive digital image watermark algorithm is proposed. Fuzzy c-means clustering (FCM) is used to classify the original image blocks into two classes based on several characteristic parameters of human visual system (HVS). One is suited for embedding a digital watermark, the other is not. So the appropriate blocks in an image are selected to embed the watermark. The wetermark is embedded in the middle-frequency part of the host image in conjunction with HVS and discrete cosine transform (DCT). The maximal watermark strength is fixed according to the frequency masking. In the same time, for the good performance, the watermark is modulated into a fractal modulation array. The simulation results show that we can remarkably extract the hiding watermark and the algorithm can achieve good robustness with common signal distortion or geometric distortion and the quality of the watermarked image is guaranteed.  相似文献   

3.
As a composition of rockmass,structural planes are one of the chief factors that can largely control the mechanical response of rockmass and its models of deformation and failure under the action of engineering load.Rock joints are a typical sort of structural planes,which are numerous,random and universal in the rockmass.So the measurement and statistics of rock joints are the basics for classifying rockmass grades,evaluating rockmass quality,and selecting physico-mechanical parameters of rockmass.However,the traditional in situ investigation using manual measuring tools is inefficient and costly.In order to improve the above-mentioned status,new methods to measure joints should be developed,which should be efficient,simple and convenient.The rapid developments of modern digital photography and digital image processing make it possible that digital photograph devices such as digital cameras or digital videos can be used to measure joints.So based on theories and methods of pattern recognition and image processing,the intelligent interpretation of digital images of rock joints is studied,and the corresponding computational method is also put forward for the first time.The procedure and results of intelligent interpretation of a joint image have been discussed in detail.  相似文献   

4.
The need for firearm identification systems by police services continues to increase with greater accessibility to weapons in the national and international contexts. The difficulties associated with traditional imaging of ballistics specimens are numerous, and include the smallness of the samples, the nature of the surfaces and shapes for the cartridge cases and projectiles. The digital holography has been introduced to create the 3D image of the fired bullets in order to identify firearms. In digital holography a CCD camera records optically generated holograms which is then reconstructed numerically by a calculation of scalar diffraction in the Fresnel approximation. The digital photography facilitates real time transmission of the message via traditional communication methods. In this paper the principle of digital holography and its application to the 3D image encryptiondecryption were reviewed. The experimental results of firearm identification recording using digital holography and their numerical reconstruction were presented.  相似文献   

5.
The mixed effect analysis of polymeric mixture by means of image processing technology is discussed here. Since the integration of image and digital analysis, this method has the advantages of both perceptibility and objectivity. With pixel distribution as the main measurement of mixed effect, it indicates that the method of image pro-cessing technology is a new way to assess the mixed effect of polymeric mixture and the properties of all kinds of mixers.  相似文献   

6.
It is essential to measure the stitch length of weft knitted fabric in a static environment for economy and improving productivity. The image inputted was dealt with the digital image processing techniques: the paper carried out the transformation of grey scale; then removed impurities with filtering; the characteristic of the stitch structure was abstracted by using the Fourier transform technique. To obtain the stitch length more accurately, we should establish ageometric medal of the stitch lined on the digital image processing, which provides a way to transform the stitch length in the two-dimenslon space into a three-dimension space. This study provides a new methed for measuring the stitch length without damaging the fabric.  相似文献   

7.
Digital watermarking technology is a very good method for protecting copyright. A novel image watermarking scheme based on contourlet transform is proposed. The original carrier image was executed in contourlet transform and four directions of the second level subband were marked, afterwards, the scrambled digital watermarking is embedded in them. The experimental results show that the proposed watermarking scheme is feasible and simple. The embedded watermarking images have tiny difference with the original images and the extracted watermarking is accurate. It is imperceptible and robust against various signals processing such as noise adding, rotating, altering, cropping, compression, brightness variations and mosaic, etc.  相似文献   

8.
In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID, which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2class UID codes. The trained classifications will be the models used for identifying unreadable UID codes. Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images aad to keep track of users to prevent collaborative piracies.  相似文献   

9.
In this paper, we propose a semi-fragile watermarking technology for copyright protection and image authentication. We transform the image into wavelet domain and group the four adjacent wavelet coefficients. Utilizing the characteristics of tile human visual system, we embed a digital signal into the average of the four adjacent wavelet coefficients since the mean has better ,stability than single wavelet coefficient. This method needn‘t original image when extracts the watermark. Experimental results show the effectiveness of this method which is robust to common image process and fragile to malicious attack.  相似文献   

10.
Human's real life is within a colorful world. Compared to the gray images, color images contain more information and have better visual effects. In today's digital image processing, image segmentation is an important section for computers to "understand" images and edge detection is always one of the most important methods in the field of image segmentation. Edges in color images are considered as local discontinuities both in color and spatial domains. Despite the intensive study based on integration of single-channel edge detection results, and on vector space analysis, edge detection in color images remains as a challenging issue.  相似文献   

11.
基于SNR的数字图像置乱程度评价方法   总被引:22,自引:0,他引:22  
数字图像置乱在信息隐藏和数字水印中具有广泛的应用,对图像置乱程度的评价尤为重要.由于置乱图像的"乱"是相对的视觉效果,基于此,本文将均方信噪比(SNR)与图像的最优分块处理相结合,提出了一种基于SNR的数字图像置乱程度的评价方法.实验结果表明,该方法能够较好地刻划图像的置乱程度及反映加密次数与置乱程度的关系,与人的视觉基本相符.  相似文献   

12.
基于Baker映射迭路的图像加密算法   总被引:1,自引:0,他引:1  
提出一种基于Baker映射迭路的数字图像空间域的编码新方法,利用Baker映射迭路所得的有限符号串对图像像素位置编码,从而对数字图像进行置乱,并计算置乱周期和置乱度.在此基础上,利用Logistic映射的混沌性质对置乱图像作了进一步的加密.  相似文献   

13.
对DCT(离散余弦变换)域的图像水印技术进行了研究,实现了非盲水印和盲水印两种方案.为保证数字水印的安全性,在水印嵌入之前,采用Arnold置乱技术对水印进行预处理.实验结果表明,两种方法都具有较好的不可见性,能够抵御JPEG压缩、剪切和噪声攻击等常用的图像攻击技术,具有较好的鲁棒性,是较为实用的图像水印方案.  相似文献   

14.
采用iSPLSI完成了视频加解扰处理,并将视频行内分割点数目增加到8个,使图像加扰效果更佳.同时采用数字补偿技术很好地解决了图像恢复时视频切割点存在裂缝的问题.  相似文献   

15.
在图象分级的基础上,利用小波变换的原理,对小波变换后的每个子图象进行置乱操作,这样在逆变换还原图象时,图象中的每个点不仅位置发生了改变,而且灰度值也发生了改变,使算法达到很好的置乱效果.通过将随机选用的置乱矩阵与迭代的次数作为密钥,提高了算法的安全性.实验证明,置乱后还原的图象清晰度高,算法抗攻击能力强,可适用于图象加密和图象隐藏的预处理过程.  相似文献   

16.
提出了一种基于位置置乱和交叉换位相结合的加密算法,该算法首先利用新构造的位置置乱方法将二维矩阵中行和列映射到一维向量中,然后将一维向量中的亮度值转换为8位二进制数,按照交叉换位的方式将8位二进制数进行位置转换;最后交叉换位之后的8位二进制数重新组合成新的亮度值,同时将一维向量按顺序扫描方式还原成二维图像(图像大小可根据实际加密需要而定)。另外本文还将此构造的新算法扩展到彩色图像R、G、B三个分量中,实现了基于彩色图像像素位置和亮度值双重置乱效果。实验结果表明:该算法具有密钥空间大,加密后的图像直方图分布具有白噪声的特性,而且图像相邻像素的相关性更小,这样大大提高了抵抗不法攻击的能力,增加了图像的安全性。  相似文献   

17.
数字图像置乱技术是数字图像加密、信息隐蔽、数字水印的常用方法,如何衡量一种置乱变换的好坏是近年来的研究热点.论文根据置乱前后数字图像表面积随像素点位置变化而改变的原理,提出一种基于图像表面积的置乱度评价算法.实验结果表明:该算法能够较好地反映置乱次数与置乱度的关系,与人的视觉基本相符.  相似文献   

18.
基于用数字全息对图像进行置乱及复原的基本原理,提出了一种基于数字全息的图像置乱方法,并通过实验证明了本方法的置乱和复原效果.  相似文献   

19.
针对目前加密图像单一以及加密算法安全性不高的问题,提出基于行列异或的Arnold双置乱图像加密方法。实施过程:首先根据Arnold变换公式对图像进行灰度空间置乱和位置空间置乱,然后进行行按位异或操作,其次,将上述结果再进行一次位置空间置乱,最后再进行列按位异或运算。该方法有效增强了传统Arnold双置乱的置乱效果,使图像得到充分扩散,最终得到密文图像。实验结果表明,本方法能实现等长和不等长图像的置乱,改善了常规Arnold方法的置乱效果,有效降低了图像相邻像素间的相关性,保证了图像传输过程中的安全性和鲁棒性要求。  相似文献   

20.
Arnold变换在图像置乱中的应用研究   总被引:2,自引:0,他引:2  
作为一种重要的图像加密技术,数字图像置乱近年来已成为信息安全领域的研究热点.对基于Arnold变换在数字图像置乱中的应用进行了研究,实现了Arnold置乱算法和置乱度,利用其周期性对数字图像进行了置乱和恢复,并且对该算法进行了攻击实验,最后实验验证.结果表明,应用Amold置乱方法对图像加密,可以有效地提高图像的安全性...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号