• Title/Summary/Keyword: Median filtering

Search Result 184, Processing Time 0.024 seconds

Image-based Extraction of Histogram Index for Concrete Crack Analysis

  • Kim, Bubryur;Lee, Dong-Eun
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.912-919
    • /
    • 2022
  • The study is an image-based assessment that uses image processing techniques to determine the condition of concrete with surface cracks. The preparations of the dataset include resizing and image filtering to ensure statistical homogeneity and noise reduction. The image dataset is then segmented, making it more suited for extracting important features and easier to evaluate. The image is transformed into grayscale which removes the hue and saturation but retains the luminance. To create a clean edge map, the edge detection process is utilized to extract the major edge features of the image. The Otsu method is used to minimize intraclass variation between black and white pixels. Additionally, the median filter was employed to reduce noise while keeping the borders of the image. Image processing techniques are used to enhance the significant features of the concrete image, especially the defects. In this study, the tonal zones of the histogram and its properties are used to analyze the condition of the concrete. By examining the histogram, the viewer will be able to determine the information on the image through the number of pixels associated and each tonal characteristic on a graph. The features of the five tonal zones of the histogram which implies the qualities of the concrete image may be evaluated based on the quality of the contrast, brightness, highlights, shadow spikes, or the condition of the shadow region that corresponds to the foreground.

  • PDF

A Study on the Detection of Small Cavity Located in the Hard Rock by Crosswell Seismic Survey (경암 내 소규모 공동 탐지를 위한 시추공간 탄성파탐사 기법의 적용성 연구)

  • Ko, Kwang-Beom;Lee, Doo-Sung
    • Geophysics and Geophysical Exploration
    • /
    • v.6 no.2
    • /
    • pp.57-63
    • /
    • 2003
  • For the dectection of small cavity in the hard rock, we investigated the feasibility of crosswell travel-time tomography and Kirchhoff migration technique. In travel-time tomography, first arrival anomaly caused by small cavity was investigated by numerical modeling based on the knowledge of actual field information. First arrival delay was very small (<0.125 msec) and detectable receiver offset range was limited to 4m with respect to $1\%$ normalized first arrival anomaly. As a consequence, it was turned out that carefully designed survey array with both sufficient narrow spatial spacing and temporal (<0.03125 msec) sampling were required for small cavity detection. Also, crosswell Kirchhoff migration technique was investigated with both numerical and real data. Stack section obtained by numerical data shows the good cavity image. In crosswell seismic data, various unwanted seismic events such as direct wave and various mode converted waves were alto recorded. To remove these noises und to enhance the diffraction signal, combination of median and bandpass filtering was applied and prestack and stacked migration images were created. From this, we viewed the crosswell migration technique as one of the adoptable method for small cavity detection.

Low Complexity Video Encoding Using Turbo Decoding Error Concealments for Sensor Network Application (센서네트워크상의 응용을 위한 터보 복호화 오류정정 기법을 이용한 경량화 비디오 부호화 방법)

  • Ko, Bong-Hyuck;Shim, Hyuk-Jae;Jeon, Byeung-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.1
    • /
    • pp.11-21
    • /
    • 2008
  • In conventional video coding, the complexity of encoder is much higher than that of decoder. However, as more needs arises for extremely simple encoder in environments having constrained energy such as sensor network, much investigation has been carried out for eliminating motion prediction/compensation claiming most complexity and energy in encoder. The Wyner-Ziv coding, one of the representative schemes for the problem, reconstructs video at decoder by correcting noise on side information using channel coding technique such as turbo code. Since the encoder generates only parity bits without performing any type of processes extracting correlation information between frames, it has an extremely simple structure. However, turbo decoding errors occur in noisy side information. When there are high-motion or occlusion between frames, more turbo decoding errors appear in reconstructed frame and look like Salt & Pepper noise. This severely deteriorates subjective video quality even though such noise rarely occurs. In this paper, we propose a computationally extremely light encoder based on symbol-level Wyner-Ziv coding technique and a new corresponding decoder which, based on a decision whether a pixel has error or not, applies median filter selectively in order to minimize loss of texture detail from filtering. The proposed method claims extremely low encoder complexity and shows improvements both in subjective quality and PSNR. Our experiments have verified average PSNR gain of up to 0.8dB.

Geometrically Invariant Image Watermarking Using Connected Objects and Gravity Centers

  • Wang, Hongxia;Yin, Bangxu;Zhou, Linna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2893-2912
    • /
    • 2013
  • The design of geometrically invariant watermarking is one of the most challenging work in digital image watermarking research area. To achieve the robustness to geometrical attacks, the inherent characteristic of an image is usually used. In this paper, a geometrically invariant image watermarking scheme using connected objects and gravity center is proposed. First, the gray-scale image is converted into the binary one, and the connected objects according to the connectedness of binary image are obtained, then the coordinates of these connected objects are mapped to the gray-scale image, and the gravity centers of those bigger objects are chosen as the feature points for watermark embedding. After that, the line between each gravity center and the center of the whole image is rotated an angle to form a sector, and finally the same version of watermark is embedded into these sectors. Because the image connectedness is topologically invariant to geometrical attacks such as scaling and rotation, and the gravity center of the connected object as feature points is very stable, the watermark synchronization is realized successfully under the geometrical distortion. The proposed scheme can extract the watermark information without using the original image or template. The simulation results show the proposed scheme has a good invisibility for watermarking application, and stronger robustness than previous feature-based watermarking schemes against geometrical attacks such as rotation, scaling and cropping, and can also resist common image processing operations including JPEG compression, adding noise, median filtering, and histogram equalization, etc.

A Study on the NC Embedding of Vision System for Tool Breakage Detection (공구파손감지용 비젼시스템의 NC실장에 관한 연구)

  • 이돈진;김선호;안중환
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.369-372
    • /
    • 2002
  • In this research, a vision system for detecting tool breakage which is hardly detected by such indirect in-process measurement method as acoustic emission, cutting torque and motor current was developed and embedded into a PC-NC system. The vision system consists of CMOS image sensors, a slit beam laser generator and an image grabber board. Slit beam laser was emitted on the tool surface to separate the tool geometry well from the various obstacles surrounding the tool. An image of tool is captured through two steps of signal processing, that is, median filtering and thresholding and then the tool is estimated normal or broken by use of change of the centroid of the captured image. An air curtain made by the jetting high-pressure air in front of the lens was devised to prevent the vision system from being contaminated by scattered coolant, cutting chips in cutting process. To embed the vision system to a Siemens PC-NC controller 840D NC, an HMI(Human Machine Interface) program was developed under the Windows 95 operating system of MMC103. The developed HMI is placed in a sub window of the main window of 840D and this program can be activated or deactivated either by a soft key on the operating panel or M codes in the NC part program. As the tool breakage is detected, the HMI program emit a command for automatic tool change or send alarm to the NC kernel. Evaluation test in a high speed tapping center showed the developed system was successful in detection of the small-radius tool breakage.

  • PDF

Comparing of Blind Watermarking Method using DWT and CAT (DWT와 셀룰라 오토마타 변환을 이용한 블라인드 워터마킹 비교)

  • Gong, Hui;Shin, Jin-Wook;Yoon, Sook;Park, Dong-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.92-100
    • /
    • 2011
  • In this paper, we propose a novel blind digital watermarking method based on a cellular automata transform (CAT). CAT is based on dynamic systems known as cellular automata(CA) and uses transform bases which are differently defined by a rule number, the number of neighbors, the number of cells, and an initial state, etc. The proposed CAT based method is compared with a blind watermarking method based on DWT which is commonly used for a domain transform in signal processing. We analyse properties on changes of DWT coefficients and CAT coefficients under various attacks and determine optimal parameters for a watermarking method robust to attacks. The simulations show that the watermarked images with high PSNR and MSSIM look visually identical to originals and are robust against most of typical image processing attacks. Moreover, the proposed CAT based watermarking method is superior to the DWT based one in robustness to most of typical image processing attacks including JPEG compression, median and average filtering, scaling, cropping, and histogram equalization.

Pedestrian crosswalk fused sensor data and time information in the Safety Assistive systems research (센서 데이터 및 시간 정보를 융합한 횡단보도 내 보행자 안전 보행 보조 시스템 연구)

  • Lim, Shin-Teak;Park, Jong-Ho;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6040-6045
    • /
    • 2012
  • In this study, by utilizing the information fusion of multi sensor data and time within the crosswalk safety Assistive gait secondary to the safety of pedestrians on the system design and system performance verification through support to. Environmental awareness, and time information in addition to leveraging the default behavior for pedestrian safety design of the secondary system performed a study on the scenario and the behavior of a system for fuzzy control was performed for each sensor data processing, median filtering, including filters processing leveraging, and was attached by the time we complete the final algorithm, the system behavior. In addition, taking advantage of the sensor measurements, so basically uncertainties and sensor results, and you want to give at least the reliability of the data fusion experiment equipment using this simple verification.

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.

A Study on Image Restoration for Removing Mixed Noise while Considering Edge Information (에지정보를 고려한 복합잡음 제거를 위한 영상복원에 관한 연구)

  • Gao, Yinyu;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2239-2246
    • /
    • 2011
  • In image signal processing, image signal is corrupted by various noises and caused the degradation phenomenon. And Images often corrupted by AWGN(additive white gaussian noise) and impulse noise which called mixed noise. In this paper, the algorithm is proposed to remove mixed noise while keeping edge information. The proposed algorithm first classifies the noise type, if the classify result is AWGN, then the mean of the output after using self-adaptive weighted mean filter and median value will be the outfiltering value. And if the noise type is impulse noise, then the noise is removed by a modified nonlinear filter. Also we compare existing methods through the simulation and using PSNR(peak signal to noise ratio) as the standard of judgement of improvement effect. The result of computer simulation on test images indicates that the proposed method is superior to traditional filtering algorithms.

Autonomous Battle Tank Detection and Aiming Point Search Using Imagery (영상정보에 기초한 전차 자율탐지 및 조준점탐색 연구)

  • Kim, Jong-Hwan;Jung, Chi-Jung;Heo, Mira
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2018
  • This paper presents an autonomous detection and aiming point computation of a battle tank by using RGB images. Maximally stable extremal regions algorithm was implemented to find features of the tank, which are matched with images extracted from streaming video to figure out the region of interest where the tank is present. The median filter was applied to remove noises in the region of interest and decrease camouflage effects of the tank. For the tank segmentation, k-mean clustering was used to autonomously distinguish the tank from its background. Also, both erosion and dilation algorithms of morphology techniques were applied to extract the tank shape without noises and generate the binary image with 1 for the tank and 0 for the background. After that, Sobel's edge detection was used to measure the outline of the tank by which the aiming point at the center of the tank was calculated. For performance measurement, accuracy, precision, recall, and F-measure were analyzed by confusion matrix, resulting in 91.6%, 90.4%, 85.8%, and 88.1%, respectively.