نتایج جستجو برای: الگوریتم sift

تعداد نتایج: 25636  

Journal: :IJSDA 2015
Ramesh Chand Pandey Sanjay Kumar Singh Kaushal K. Shukla

Copy-Move is one of the most common technique for digital image tampering or forgery. Copy-Move in an image might be done to duplicate something or to hide an undesirable region. In some cases where these images are used for important purposes such as evidence in court of law, it is important to verify their authenticity. In this paper the authors propose a novel method to detect single region ...

Journal: :Elektronìka ta ìnformacìjnì tehnologìï 2023

This paper investigates the effectiveness of image description using detectors and keypoint descriptors for similarity evaluation. SIFT, SURF, ORB, BRISK methods are compared detection matching procedures. Similarity coefficients computed each pair, corresponding coefficient matrices constructed analysis. An evaluation speed was conducted. It found that SIFT yielded he SURF method performed bet...

Journal: :Drug metabolism letters 2009
Ya-He Liu Chun Guang Li Shu-Feng Zhou

The nuclear receptor (NR) superfamily represents an important group of regulating factors that control the expression of a number of target genes including those encoding important drug metabolizing enzymes and drug transporters. Single nucleotide polymorphism (SNP) is the most common mutation in the human genome and a large number of SNPs have been identified to date. It is unlikely to examine...

2015
Koen Griffioen

Feature extraction is a widely used technique in the field of image recognition, multimedia information retrieval. known techniques for this feature extractions are ORB, SIFT, SURF, Wavelets and many more. One part of MIR is object recognition, and with object recognition comes object finding, or homograph finding. This uses a method called RANSAC to determine where an object is in a scene, usi...

Journal: :Image Vision Comput. 2014
Junaid Baber Matthew N. Dailey Shin'ichi Satoh Nitin V. Afzulpurkar Maheen Bakhtyar

a r t i c l e i n f o Extracting local keypoints and keypoint descriptions from images is a primary step for many computer vision and image retrieval applications. In the literature, many researchers have proposed methods for representing local texture around keypoints with varying levels of robustness to photometric and geometric transformations. Gradient-based descriptors such as the Scale In...

2010

Copy-Move Forgery (CMF) is a simple and effective operation to generate forged digital images. Recent, techniques on Scale Invariant Features Transform (SIFT) are commonly used to detect CMF. Various approaches under the SIFTframework are the most acceptable ways to CMF detection due to the robust performance of SIFT. However, for some CMF images, these approaches cannot produce satisfactory de...

2008
Faraj Alhwarin Chao Wang Danijela Ristic-Durrant Axel Gräser

The SIFT algorithm (Scale Invariant Feature Transform) proposed by Lowe [1] is an approach for extracting distinctive invariant features from images. It has been successfully applied to a variety of computer vision problems based on feature matching including object recognition, pose estimation, image retrieval and many others. However, in real-world applications there is still a need for impro...

Journal: :Medical physics 2016
Yan Xu Chenchao Xu Xiao Kuang Hongkai Wang Eric I-Chao Chang Weimin Huang Yubo Fan

PURPOSE In this paper, the authors proposed a new 3D registration algorithm, 3D-scale invariant feature transform (SIFT)-Flow, for multiatlas-based liver segmentation in computed tomography (CT) images. METHODS In the registration work, the authors developed a new registration method that takes advantage of dense correspondence using the informative and robust SIFT feature. The authors comput...

2005
Konstantinos Psounis Arpita Ghosh Balaji Prabhakar Gang Wang

The past ten years have seen the discovery of a number of “power laws” in networking. When applied to network trafic, these laws imply the following 80-20 rule: 80% of the work is brought by 20% of the flows; in particular, 80% of Internet packets are generated by 20% of the flows. Heavy advantage could be taken of such a statistic if we could identify the packets of these dominant flows with m...

Journal: :Journal of molecular biology 2002
Christopher T Saunders David Baker

Methods for automated prediction of deleterious protein mutations have utilized both structural and evolutionary information but the relative contribution of these two factors remains unclear. To address this, we have used a variety of structural and evolutionary features to create simple deleterious mutation models that have been tested on both experimental mutagenesis and human allele data. W...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید