• Title/Summary/Keyword: Exact Image

Search Result 519, Processing Time 0.027 seconds

Sparse-View CT Image Recovery Using Two-Step Iterative Shrinkage-Thresholding Algorithm

  • Chae, Byung Gyu;Lee, Sooyeul
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1251-1258
    • /
    • 2015
  • We investigate an image recovery method for sparse-view computed tomography (CT) using an iterative shrinkage algorithm based on a second-order approach. The two-step iterative shrinkage-thresholding (TwIST) algorithm including a total variation regularization technique is elucidated to be more robust than other first-order methods; it enables a perfect restoration of an original image even if given only a few projection views of a parallel-beam geometry. We find that the incoherency of a projection system matrix in CT geometry sufficiently satisfies the exact reconstruction principle even when the matrix itself has a large condition number. Image reconstruction from fan-beam CT can be well carried out, but the retrieval performance is very low when compared to a parallel-beam geometry. This is considered to be due to the matrix complexity of the projection geometry. We also evaluate the image retrieval performance of the TwIST algorithm -sing measured projection data.

A new fractal image decoding algorithm with fast convergence speed (고속 수렴 속도를 갖는 새로운 프랙탈 영상 복호화 알고리듬)

  • 유권열;문광석
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.8
    • /
    • pp.74-83
    • /
    • 1997
  • In this paper, we propose a new fractal image decoding algorithm with fast convergence speed by using the data dependence and the improved initial image estimation. Conventional method for fractal image decoding requires high-degrdd computational complexity in decoding process, because of iterated contractive transformations applied to whole range blocks. On proposed method, Range of reconstruction imagte is divided into referenced range and data dependence region. And computational complexity is reduced by application of iterated contractive transformations for the referenced range only. Data dependence region can be decoded by one transformations when the referenced range is converged. In addition, more exact initial image is estimated by using bound () function in case of all, and an initial image more nearer to a fixed point is estimated by using range block division estimation. Consequently, the convergence speed of reconstruction iamge is improved with 40% reduction of computational complexity.

  • PDF

Direct Measurement of Distortion of Optical System of Lithography (노광 광학계의 왜곡수차 측정에 관한 연구)

  • Joo, WonDon;Lee, JiHoon;Chae, SungMin;Kim, HyeJung;Jung, Mee Suk
    • Korean Journal of Optics and Photonics
    • /
    • v.23 no.3
    • /
    • pp.97-102
    • /
    • 2012
  • In general, one of the methods used to measure distortion is to use the full image of the regular pattern. However, because of low accuracy, this method is mainly used for an optical system such as a camera.. In order to measure distortion with high accuracy less than 1um, one can use the method of measuring the exact position of a mask image. In this case, a high accuracy stage with a laser encoder is required. In this paper, we investigate measurement of the distortion of high accuracy with a simple manual stage. The main idea is that we split and measure the mask image with the overlapping area by using CCD or CMOS, and then we get an exact position of the mask image by integrating the adjacent split images. We use the Canny Edge Detection method to get the position information of the mask image and we researched the process to exactly calculate distortion by using coordinate transformations and a least square method.

A Study on the Image Processing Technique for Measurement of Nugget Geometry (용융부 형상 판독을 위한 영상처리기법)

  • 김상필;신현옥;최덕준;장희석
    • Proceedings of the KWS Conference
    • /
    • 1993.05a
    • /
    • pp.132-134
    • /
    • 1993
  • The conventional way of molten nugget size measurement in welding process have utilized the metal-microscope by examining the micro sectioned weld specimen after micro-etching procedure. This paper proposes a new method for exact measurement of molten nugget size with the aid of the digital image processing unit and some developed software. This method proved to be convenient and precise in that resulting resolution and accuracy are as good as that of the conventional method.

  • PDF

Image Coding of Visually Weighted t Discrete Cosine Transform (시각 하중 이산여현변환 영상부호화)

  • 이문호;박주용
    • Journal of the Korean Professional Engineers Association
    • /
    • v.22 no.2
    • /
    • pp.19-25
    • /
    • 1989
  • Utilizing a cosine transform in image compression has several recognized performance benefits, resulting in the ability to attain large compression ratio with small quality loss. Also, various models incorporating Human Visual System (HVS) to Discrete Cosine Trans-form (DCT) scheme are considered. Using the exact frequency components of DCT basis function, the optimum modulation transfer function (MTF) is obtained analytically. The errors at a block boundary which is important factor in transform coder are criteria for error measurement. The HVS weight coding results in perceptually higher quality images compared with the unweighted scheme.

  • PDF

Three-dimensional crack analysis by fractional linear mapping (선형분수사상을 이용한 3차원 균열해석)

  • 안득만
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.19 no.1
    • /
    • pp.61-78
    • /
    • 1995
  • In this study the method of analysis for three-dimensional plane crack problem by fractional linear mapping is given. Using this method we can obtain the exact solutions of significantly different configurations of the crack. In the example image crack configurations by mapping of elliptic crack are illustrated. And the stress intensity factors along the image crack tips are calculated.

Robust Digital Image Watermarking Algorithm Using RBF Neural Networks in DWT domain

  • Piao, Cheng-Ri;Guan, Qiang;Choi, Jun-Rim;Han, Seung-Soo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.143-147
    • /
    • 2007
  • This paper proposes a new watermarking scheme in which a logo watermark is embedded into the discrete wavelet transform (DWT) domain of the original image using exact radial basis function neural networks (RBF). RBF will learn the characteristics of the image, and then watermark is embedded and extracted by the trained RBF. A watermark is added to the coefficients at the low frequency band of the DWT of an image and a watermark is embedded into the DWT domain using the trained RBF. The trained RBF also used in watermark extracting process. Experimental results show that the proposed method has good imperceptibility and high robustness to common image processing attacks.

Investigation of the Validity of the Image Model for the Analysis of Spherical Wave Reflection

  • Suh, Jin-Sung;Cheung, Wan-Sup
    • The Journal of the Acoustical Society of Korea
    • /
    • v.17 no.3E
    • /
    • pp.27-34
    • /
    • 1998
  • The validity of the image model is investigated both analytically and experimentally in a half space with an infinite single reflecting surface present. This paper exploits the Sommerfeld integral that represents the exact solution for the reflected field in the half space. The solution is shown to be obtained by direct numerical integration which yields more accurate and stable results. The predicted results from the image model are compared to those from the direct numerical integration of the Sommerfeld integral. It is also experimentally demonstrated that the image model gives acceptably accurate results. It is of significance that this paper reveals analytical and experimental validation of using the image model except near-grazing incidence.

  • PDF

Design of INS/Image Sensor Integrated Navigation System (INS/영상센서 결합 항법시스템 설계)

  • Oh Seung-Jin;Kim Woo-Hyun;Lee Jang-Gyu;Lee Hyung-Keun;Park Chan-Gook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.10
    • /
    • pp.982-988
    • /
    • 2006
  • The errors of INS (Inertial Navigation System) are known to grow in time. To compensate the accumulated errors, measurements of external or onboard sensors are extensively utilized to form an integrated navigation system. Recently, INS/GPS integrated navigation systems have become popular since exact position and velocity information can be utilized by low cost GPS receivers. Unfortunately, this configuration cannot be trusted at all times especially when there are intentional or unexpected jammings and interruptions. To aid INS irrespectively of these cases, an INS/Image sensor integrated navigation system configuration is designed only based on the information of image sensor gimble angles. The performance of the INS/Image sensor integrated navigation system is evaluated by Monte Carlo simulation.

Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting

  • Chang, Ya-Fen;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3100-3116
    • /
    • 2012
  • Reversible data hiding enables the embedding of messages in a host image without any loss of host content, which is proposed for image authentication that if the watermarked image is deemed authentic, we can revert it to the exact copy of the original image before the embedding occurred. In this paper, we present an improved histogram-based reversible data hiding scheme based on prediction and sorting. A rhombus prediction is employed to explore the prediction for histogram-based embedding. Sorting the prediction has a good influence on increasing the embedding capacity. Characteristics of the pixel difference are used to achieve large hiding capacity while keeping low distortion. The proposed scheme exploits a two-stage embedding strategy to solve the problem about communicating peak points. We also present a histogram shifting technique to prevent overflow and underflow. Performance comparisons with other existing reversible data hiding schemes are provided to demonstrate the superiority of the proposed scheme.