Out of Focus Blur Estimation Using Genetic Algorithm
نویسندگان
چکیده
منابع مشابه
Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode Value
Mobile cameras are being used now-a-days to scan barcodes to retrieve the product details. But the drawback is mobile cameras are made by a charge coupled device which is does not have the ability to handle out of focus and blur images. In this project, out of focus and blur images are restored using a dynamic template matching algorithm using directed graphical model. The directed graphical mo...
متن کاملOut-of-focus Blur: Image De-blurring
Image de-blurring is important in many cases of imaging a real scene or object by a camera. This project focuses on de-blurring an image distorted by an out-of-focus blur through a simulation study. A pseudo-inverse filter is first explored but it fails because of severe noise amplification. Then Tikhonov regularization methods are employed, which produce greatly improved results compared to th...
متن کاملImpact of out-of-focus blur on iris recognition
Iris recognition has expanded from controlled settings to uncontrolled settings (on the move, from a distance) where blur is more likely to be present in the images. More research is needed to quantify the impact of blur on iris recognition. In this paper we study the effect of out-of-focus blur on iris recognition performance from images captured with out-of-focus blur produced at acquisition....
متن کاملPartially Blind Deblurring of Barcode from Out-of-Focus Blur
This paper addresses the nonstationary out-of-focus (OOF) blur removal in the application of barcode reconstruction. We propose a partially blind deblurring method when partial knowledge of the clean barcode is available. In particular, we consider an image formation model based on geometrical optics, which involves the point-spread function (PSF) for the OOF blur. With the known information, w...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Science
سال: 2008
ISSN: 1549-3636
DOI: 10.3844/jcssp.2008.298.304