نتایج جستجو برای: key image

تعداد نتایج: 909039  

2013
Stefan Skare

Conventional Cartesian non-diffusion pulse sequences acquire k-space in multiple excitations (a.k.a. shots). As the phase errors originating from motion during the diffusion preparation time are random in nature and large compared to the phase used to spatially encode the image, the use of multi-shot sequences with diffusion gradients is not straightforward, and in most cases severe image ghost...

2009
Martin Drahanský

The exact definition of the quality of a fingerprint image [3][4][5] is difficult and nearly impossible. Different types of information are important for various cases – e.g. once it is the contrast, another time the continuality of trajectory of some papillary lines or resulting minutiae quality, etc. In general, it is impossible to formulate one definition covering all cases. But in case of f...

Journal: :IJPRAI 2005
Adrian Ilie Ramesh Raskar Jingyi Yu

We propose a class of enchancement techniques suitable for scenes captured by fixed cameras. The basic idea is to increase the information density in a set of low quality images by exploiting the context from a higher-quality image captured under different illumination from the same view. For example, a nighttime surveillance video can be enriched with information available in daytime images. W...

2012
Yu Tang Jungpil Shin Hsien-Chou Liao

Ghosting artifact in the field of image stitching is a common problem and the elimination of it is not an easy task. In this paper, we propose an intuitive technique according to a stitching line based on a novel energy map which is essentially a combination of gradient map which indicates the presence of structures and prominence map which determines the attractiveness of a region. We consider...

2014
Bala Suyambu Jeyaram Rama Raghavan

The wide use of digital images leads to the necessity of securing them when they enter into an insecure channel. Image cryptography plays a vital role in the modern communication. In this paper we propose a new image encryption scaling scheme, which will do both, image scaling and encryption. Cellular automata is used for key generation and wavelet transformation is used for image scaling. Encr...

2008
Hung-Tao Lu Chien-Ping Chang Yu Su Jyh-Chian Chang Te-Ming Tu

Two decorrelation stretch techniques called Direct Decorrelation Stretch (DDS) and Intensity Conservation DDS (ICDDS) have been recommended for applications on highly correlated multispectral images. This work examines the approaches of DDS and ICDDS in more details and seeks to clarity some apparent misconceptions in saturation stretching. To describe the misconceptions, an IHS substitution (I...

1999
Shawn Arseneau Jeremy R. Cooperstock

In order to recognize actions of a human properly, an algorithm must be able to detect a person accurately in any given image. This data will be used to ascertain what action the user is performing. Many methods have been proposed that use a difference picture technique in which the image of the user is subtracted from a previously known image with the same background, without the user. These m...

Journal: :CoRR 2012
M. S. Sreelakshmi D. Venkataraman

A large number of image forensics methods are available which are capable of identifying image tampering. But these techniques are not capable of addressing the anti-forensics method which is able to hide the trace of image tampering. In this paper anti-forensics method for digital image compression has been proposed. This anti-forensics method is capable of removing the traces of image compres...

Journal: :معماری و شهرسازی 0
آرین قلی پور دانشیار گروه مدیریت دولتی، دانشکده مدیریت، دانشگاه تهران محمد ابویی اردکان دانشیارگروه مدیریت دولتی، دانشکده مدیریت، دانشگاه تهران الهه پیدایش کارشناس ارشد مدیریت امور شهری، دانشکده مدیریت، دانشگاه تهران

creating a clear purposeful image of a city in the minds of its stakeholders –especially its residents- could attract more investors, tourists and immigrants. urban management has received a remarkable attention in recent years. one of the most interesting topics in urban management is the concept of identity and especially image. as well as organizations and persons we can depict images for ci...

2015
Junming Ma

This paper puts forward a novel image encryption scheme based on ordinary differential equation system. Firstly, a hyper-chaotic differential equation system is used to generate two hyper-chaotic orbit sequences. Introducing the idea of hybrid orbit, two orbits are mixed to generate a hybrid hyper-chaotic sequence which is used to be the initial chaotic key stream. Secondly, the final encryptio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید