Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (4)

Search Parameters:
Keywords = block-based color moment

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 4608 KiB  
Article
Petroleum Pipeline Interface Recognition and Pose Detection Based on Binocular Stereo Vision
by Wuwei Feng, Zirong Liang, Jie Mei, Shujie Yang, Bo Liang, Xi Zhong and Jie Xu
Processes 2022, 10(9), 1722; https://doi.org/10.3390/pr10091722 - 30 Aug 2022
Cited by 6 | Viewed by 2226
Abstract
Liquified natural gas (LNG) manipulator arms have been widely used in natural gas transportation. However, the automatic docking technology of LNG manipulator arms has not yet been realized. The first step of automatic docking is to identify and locate the target and estimate [...] Read more.
Liquified natural gas (LNG) manipulator arms have been widely used in natural gas transportation. However, the automatic docking technology of LNG manipulator arms has not yet been realized. The first step of automatic docking is to identify and locate the target and estimate its pose. This work proposes a petroleum pipeline interface recognition and pose judgment method based on binocular stereo vision technology for the automatic docking of LNG manipulator arms. The proposed method has three main steps, including target detection, 3D information acquisition, and plane fitting. First, the target petroleum pipeline interface is segmented by using a color mask. Then, color space and Hu moment are used to obtain the pixel coordinates of the contour and center of the target petroleum pipeline interface. The semi-global block matching (SGBM) algorithm is used for stereo matching to obtain the depth information of an image. Finally, a plane fitting and center point estimation method based on a random sample consensus (RANSAC) algorithm is proposed. This work performs a measurement accuracy verification experiment to verify the accuracy of the proposed method. The experimental results show that the distance measurement error is not more than 1% and the angle measurement error is less than one degree. The measurement accuracy of the method meets the requirements of subsequent automatic docking, which proves the feasibility of the proposed method and provides data support for the subsequent automatic docking of manipulator arms. Full article
Show Figures

Figure 1

21 pages, 13563 KiB  
Article
A Watermarking Scheme for Color Image Using Quaternion Discrete Fourier Transform and Tensor Decomposition
by Li Li, Rui Bai, Jianfeng Lu, Shanqing Zhang and Ching-Chun Chang
Appl. Sci. 2021, 11(11), 5006; https://doi.org/10.3390/app11115006 - 28 May 2021
Cited by 17 | Viewed by 3632
Abstract
To protect the copyright of the color image, a color image watermarking scheme based on quaternion discrete Fourier transform (QDFT) and tensor decomposition (TD) is presented. Specifically, the cover image is partitioned into non-overlapping blocks, and then QDFT is performed on each image [...] Read more.
To protect the copyright of the color image, a color image watermarking scheme based on quaternion discrete Fourier transform (QDFT) and tensor decomposition (TD) is presented. Specifically, the cover image is partitioned into non-overlapping blocks, and then QDFT is performed on each image block. Then, the three imaginary frequency components of QDFT are used to construct a third-order tensor. The third-order tensor is decomposed by Tucker decomposition and generates a core tensor. Finally, an improved odd–even quantization technique is employed to embed a watermark in the core tensor. Moreover, pseudo-Zernike moments and multiple output least squares support vector regression (MLS–SVR) network model are used for geometric distortion correction in the watermark extraction stage. The scheme utilizes the inherent correlations among the three RGB channels of a color image, and spreads the watermark into the three channels. The experimental results indicate that the proposed scheme has better fidelity and stronger robustness for common image-processing and geometric attacks, can effectively resist each color channel exchange attack. Compared with the existing schemes, the presented scheme achieves better performance. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

17 pages, 2542 KiB  
Article
Data Hiding Method for Color AMBTC Compressed Images Using Color Difference
by Cheonshik Kim, Dongkyoo Shin, Chingnung Yang and Lu Leng
Appl. Sci. 2021, 11(8), 3418; https://doi.org/10.3390/app11083418 - 11 Apr 2021
Cited by 7 | Viewed by 3084
Abstract
Image compression technology and copyright protection are certainly the important technologies for free exchange of multimedia. For compression of an image, we propose a color Absolute Moment Block Trucation Coding (AMBTC) method using a common bit-plane created by k-means. In addition, a data [...] Read more.
Image compression technology and copyright protection are certainly the important technologies for free exchange of multimedia. For compression of an image, we propose a color Absolute Moment Block Trucation Coding (AMBTC) method using a common bit-plane created by k-means. In addition, a data hiding method based on a color AMBTC using Optimal Pixel Adjustment Process (OPAP) was proposed for copyright protection and confidential secret communication. The number of quantization levels of the proposed color AMBTC is nine per block. Therefore, the edge of the compressed color image can be expressed more delicately. As a result of the simulation, it can be seen that the edge of the image of the color AMBTC is close to the original image. Moreover, the data hiding performance of the proposed method also obtained excellent results. For the experiment, we measured the quality of the image using the Color Difference (CD) we proposed, and the measurement result was very satisfactory. Full article
(This article belongs to the Special Issue Research on Multimedia Systems)
Show Figures

Figure 1

18 pages, 4801 KiB  
Article
Face Liveness Detection Based on Skin Blood Flow Analysis
by Shun-Yi Wang, Shih-Hung Yang, Yon-Ping Chen and Jyun-We Huang
Symmetry 2017, 9(12), 305; https://doi.org/10.3390/sym9120305 - 7 Dec 2017
Cited by 27 | Viewed by 12572
Abstract
Face recognition systems have been widely adopted for user authentication in security systems due to their simplicity and effectiveness. However, spoofing attacks, including printed photos, displayed photos, and replayed video attacks, are critical challenges to authentication, and these spoofing attacks allow malicious invaders [...] Read more.
Face recognition systems have been widely adopted for user authentication in security systems due to their simplicity and effectiveness. However, spoofing attacks, including printed photos, displayed photos, and replayed video attacks, are critical challenges to authentication, and these spoofing attacks allow malicious invaders to gain access to the system. This paper proposes two novel features for face liveness detection systems to protect against printed photo attacks and replayed attacks for biometric authentication systems. The first feature obtains the texture difference between red and green channels of face images inspired by the observation that skin blood flow in the face has properties that enable distinction between live and spoofing face images. The second feature estimates the color distribution in the local regions of face images, instead of whole images, because image quality might be more discriminative in small areas of face images. These two features are concatenated together, along with a multi-scale local binary pattern feature, and a support vector machine classifier is trained to discriminate between live and spoofing face images. The experimental results show that the performance of the proposed method for face spoof detection is promising when compared with that of previously published methods. Furthermore, the proposed system can be implemented in real time, which is valuable for mobile applications. Full article
(This article belongs to the Special Issue Information Technology and Its Applications)
Show Figures

Figure 1

Back to TopTop