Current Issue : July - September Volume : 2014 Issue Number : 3 Articles : 6 Articles
An overview of very large scale integrated (VLSI) implementations of multimedia processing systems is given with particular emphasis on architectures for image and video processing. Today, speed and power are most important parameters in any technological discovery. This can be achieved with the implementation of the VLSI in Image Processing. Recently, image processing technology has been widely used in vision system, multimedia processor and consumer electronics. Rapid developing technology requires high performance image processor with fast computation speed, small chip size and low power consumption. Alternative design approaches are discussed for dedicated image and video processing circuits and for programmable multimedia processors. Current design aspects of dedicated and programmable architectures are reviewed and the techniques employed to improve the performance for multimedia processing are suggested. Future trends in multimedia processing systems are anticipated with respect to current developments in emerging image and video multimedia applications....
Copy-move is a simple and effective operation to create image forgeries where a continuous part of pixels are copied and pasted to a different location in the same image, after possible geometrical adjustment and illumination adjustment. Most existing copy-move forgery detection methods are based on directly matching blocks of image pixels or transform coefficient, but not are effective when the copy-move regions have geometrical or illumination distortions. There are various types of forgeries possible on the digital image tampering, copy-move forgery and image compositing. In this paper, we describe a new copy-move forgery detection method that is robust to distortions of the duplicated regions. Our methods starts from estimation the transform between matched scale invariant feature transform (SIFT) keypoint, which are effective to geometrical and illumination and then find all pixels within the duplicated regions. The propose method shows robust detection on an automatically synthesized forgery image database with duplicated and distorted regions....
This paper presents an algorithm for the detection of micro-crack defects in the multicrystalline solar cells. This\ndetection goal is very challenging due to the presence of various types of image anomalies like dislocation clusters,\ngrain boundaries, and other artifacts due to the spurious discontinuities in the gray levels. In this work, an algorithm\nfeaturing an improved anisotropic diffusion filter and advanced image segmentation technique is proposed. The methods\nand procedures are assessed using 600 electroluminescence images, comprising 313 intact and 287 defected samples.\nResults indicate that the methods and procedures can accurately detect micro-crack in solar cells with sensitivity,\nspecificity, and accuracy averaging at 97%, 80%, and 88%, respectively....
Video delivering over Internet protocol (IP)-based communication networks is widely used in the actual information\nsharing scenario. As well known, the best-effort Internet architecture cannot guarantee an errorless data delivering. In\nthis paper, an objective no-reference video quality metric for assessing the impact of the degradations introduced by\nvideo transmission over heterogeneous IP networks is presented. The proposed approach is based on the analysis of\nthe inter-frame correlation measured at the output of the rendering application. It does not require any information\non errors, delays, and latencies affecting the links and on the countermeasures introduced by decoders in order to\nface the potential quality loss. Experimental results show the effectiveness of the proposed algorithm in\napproximating the assessments obtained by using human visual system (HVS)-inspired full reference metrics....
We find shadows in many images and videos. Traditionally, shadows are considered as noises because they make\nhurdles for visual tasks such as detection and tracking. In this work, we show that shadows are helpful in pedestrian\ndetection instead. Occlusions make pedestrian detection difficult. Existing shape-based detection methods can have\nfalse-positives on shadows since they have similar shapes with foreground objects. Appearance-based detection\nmethods cannot detect heavily occluded pedestrians. To deal with these problems, we use appearance, shadow, and\nmotion information simultaneously in our method. We detect pedestrians using appearance information of\npedestrians and shape information of shadow regions. Then, we filter the detection results based on motion\ninformation if available. The proposed method gives low false-positives due to the integration of different features.\nMoreover, it alleviates the problem brought by occlusions since shadows can still be observable when foreground\nobjects are occluded. Our experimental results show that the proposed algorithm provides good performance in\nmany difficult scenarios....
Biometric identification systems can be attacked at many vulnerable points. One of the vulnerable points is biometric database. Biometric authentication system can be easily spoofed by applying stolen protected template at matcher sub-system of biometric identification systems. This type of malicious manipulation is termed as replay attack. We proposed an application of visual cryptography technique in biometric authentication system which provide security against replay attack and also generate trustable biometric authentication system. Visual cryptography concept can be used to generate two shares based on protected template. One share (share 1) will be stored in database and another (share 2) is in secondary memory (RF ID card). So, stolen share 1 is not useful for replay attack. Also without use of share 2 one cannot generate original protected template. Therefore, system provides security against replay attack and it is trustable....
Loading....