نتایج جستجو برای: pixel value differencing

تعداد نتایج: 775448  

Journal: :International journal of electrical and computer engineering systems 2021

Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users load their image as password. PVAC extracts the obtain three-octet 8-bits Red-Green-Blue (RGB) its authenticate user. The pixel must be matched with record stored in database or otherwise, user is failed authenticate. However, which prefer store images on cloud stora...

2007
Jinzi Mao David Mould Sriram Subramanian

In this paper we investigate real-time tracking of a tennis-ball using various image differencing techniques. First, we considered a simple background subtraction method with subsequent ball verification (BS). We then implemented two variants of our initial background subtraction method. The first is an image differencing technique that considers the difference in ball position between the curr...

Journal: :Remote Sensing 2010
Greg Easson Scott DeLozier Henrique G. Momm

Moving Target Indicators (MTI) are systems used to distinguish movement from stationary scenes and sometimes to derive the spatial attributes of these objects. These systems are currently used in many sectors such as traffic studies, border surveillance, and military applications. The proposed MTI reveals vehicles and their velocities using commercial imagery from a passive optical satellite-mo...

2004
D. C. Wu W. H. Tsai

A method to embed a secret image into a cover image is proposed. The method is based on the similarity among the grey values of consecutive image pixels as well as the human visual system’s variation insensitivity from smooth to contrastive. A stego-image is produced by replacing the grey values of a differencing result obtained from the cover image with those of a differencing result obtained ...

2008
K. Johansen L. A. Arroyo S. Phinn C. Witte

The objectives of this research were to: (1) develop rule sets in Definiens Developer 7® for mapping and monitoring riparian zone land-cover classes within two QuickBird images; and (2) compare the results of four object-oriented and pixel-based change detection approaches. Two QuickBird images, atmospherically corrected to at-surface reflectance, were captured in May and August 2007 for a sava...

2007
Yuzhen Li Mingying Fan Ghoneim Mohamed Jianming Lu Hiroo Sekiya Takashi Yahagi

Video surveillance has been used in many monitoring security sensitive areas such as banks, department stores, highways, crowded public places and borders. Detecting moving regions such as vehicles and people is the first basic step of almost every vision system, because it provides a focus of attention and simplifies the processing on subsequent analysis steps. It is one of the most difficult ...

Journal: :ITC 2017
Khalid A. Darabkh

Steganographic techniques can be utilized to conceal data within digital images with small or invisible changes in the perceived appearance of the image. Generally, five main objectives are used to assess the performance of steganographic algorithms which include embedding capacity, imperceptibility, security, robustness and complexity. However, steganographic algorithms hardly take all of thes...

2008
Patrick Lichtsteiner

This paper describes a 128 128 pixel CMOS vision sensor. Each pixel independently and in continuous time quantizes local relative intensity changes to generate spike events. These events appear at the output of the sensor as an asynchronous stream of digital pixel addresses. These address-events signify scene reflectance change and have sub-millisecond timing precision. The output data rate dep...

Journal: :CoRR 2017
G. Umamaheswari C. P. Sumathi

Steganography involves hiding a secret message or image inside another cover image. Changes are made in the cover image without affecting visual quality of the image. In contrast to cryptography, Steganography provides complete secrecy of the communication. Security of very sensitive data can be enhanced by combining cryptography and steganography. A new technique that uses the concept of Stega...

Journal: :Pattern Recognition Letters 2009
Plinio Moreno Alexandre Bernardino José Santos-Victor

Several approaches to object recognition make extensive use of local image information extracted in interest points, known as local image descriptors. State-of-the-art methods perform a statistical analysis of the gradient information around the interest point, which often relies on the computation of image derivatives with pixel differencing methods. In this paper we show the advantages of usi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید