• Title/Summary/Keyword: key image

Search Result 1,422, Processing Time 0.031 seconds

Simultaneous Estimation of Spatial Frequency and Phase Based on an Improved Component Cross-Correlation Algorithm for Structured Illumination Microscopy

  • Zhang, Yinxin;Deng, Jiajun;Liu, Guoxuan;Fei, Jianyang;Yang, Huaidong
    • Current Optics and Photonics
    • /
    • v.4 no.4
    • /
    • pp.317-325
    • /
    • 2020
  • Accurate estimation of spatial frequencies and phases for illumination patterns are essential to reconstructing super-resolution images in structured illumination microscopy (SIM). In this manuscript, we propose the improved component cross-correlation (ICC) algorithm, which is based on optimization of the cross-correlation values of the overlapping information between various spectral components. Compared to other algorithms for spatial-frequency and phase determination, the results calculated by the ICC algorithm are more accurate when the modulation depths of the illumination patterns are low. Moreover, the ICC algorithm is able to calculate the spatial frequencies and phases simultaneously. Simulation results indicate that even if the modulation depth is lower than 0.1, the ICC algorithm still estimates the parameters precisely; the images reconstructed by the ICC algorithm are much clearer than those reconstructed by other algorithms. In experiments, our home-built SIM system was used to image bovine pulmonary artery endothelial (BPAE) cells. Drawing support from the ICC algorithm, super-resolution images were reconstructed without artifacts.

3D Reconstruction using the Key-frame Selection from Reprojection Error (카메라 재투영 오차로부터 중요영상 선택을 이용한 3차원 재구성)

  • Seo, Yung-Ho;Kim, Sang-Hoon;Choi, Jong-Soo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.1
    • /
    • pp.38-46
    • /
    • 2008
  • Key-frame selection algorithm is defined as the process of selecting a necessary images for 3D reconstruction from the uncalibrated images. Also, camera calibration of images is necessary for 3D reconstuction. In this paper, we propose a new method of Key-frame selection with the minimal error for camera calibration. Using the full-auto-calibration, we estimate camera parameters for all selected Key-frames. We remove the false matching using the fundamental matrix computed by algebraic deviation from the estimated camera parameters. Finally we obtain 3D reconstructed data. Our experimental results show that the proposed approach is required rather lower time costs than others, the error of reconstructed data is the smallest. The elapsed time for estimating the fundamental matrix is very fast and the error of estimated fundamental matrix is similar to others.

Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator

  • Panduranga, H.T.;Naveen, Kumar S.K.;Sharath, Kumar H.S.
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.499-510
    • /
    • 2013
  • Hardware-Software co-simulation of a multiple image encryption technique shall be described in this paper. Our proposed multiple image encryption technique is based on the Latin Square Image Cipher (LSIC). First, a carrier image that is based on the Latin Square is generated by using 256-bits of length key. The XOR operation is applied between an input image and the Latin Square Image to generate an encrypted image. Then, the XOR operation is applied between the encrypted image and the second input image to encrypt the second image. This process is continues until the nth input image is encrypted. We achieved hardware co-simulation of the proposed multiple image encryption technique by using the Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. We validated our proposed technique by using the hardware software co-simulation method.

A Secret Key Watermarking for Authentication and Integrity (인증과 무결성을 위한 비밀키 워터마킹)

  • Woo, Chan-Il;Shin, In-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3576-3583
    • /
    • 2000
  • Digital watermarks have recently been proposed for the purposes of copyright ptotechtion and autheutication for multimedia contents. A watermarking technique consists of an algorithm that incorporates a watermarking structure into an image in the spatial or frequency domains. In this paper we proposed a new watermarking method for authentication and integrity of digital images and the proposed algorithm uses the MD5 hash funiction and a symmetric key encryption algorithm. To decide the position of embedding watermark and the bit pasitionin the original image, the secret key is used as an input of the MD5 hash function. The simulation results show that the proposed algorithm has the advantage of difficulty to find positions of inserted watermarks, and keep the similar watermarked image quabty with Wong's method.

  • PDF

Study on Body Constitution and Disease Symptoms and Signs (논체질여병증(论体质与病证))

  • Cui, Zheng-Zhi;Cui, Ming-Hua
    • Journal of Korean Medical classics
    • /
    • v.22 no.4
    • /
    • pp.241-247
    • /
    • 2009
  • Body constitution research in Korean traditional medicine adopt the diagnosis and treatment theory of "image-differentiation[body constitution differentiation, disease differentiation] in combination with syndrome differentiation diagnostic model and symptoms and signs of herbal property belong to image" as its core, which is key national medical science research project of State Administration of Traditional Chinese Medicine, the project brought up 4 key scientific problem ? body constitution differentiation theory, correlation theory of body constitution and disease, body constitution adjustable theory and symptoms and signs of herbal property belong to image theory. In body constitution pathology, it brought up "correlation between body constitution and symptoms", "differentiation between body constitution and symptoms" which increase the diagnostic level and diagnostic accuracy rate. In the condition of pathology, it obviously has low reliability according to body constitution differentiation, sometimes happen the description not comply with body constitution and disease symptoms, which lead to decrease the clinic diagnostic and treatment level, treatment effect not satisfying too. Now taking 4 key scientific achievement as criterion to illustrate the body constitution and disease symptoms.

  • PDF

A High Efficiency Two-stage Inverter for Photovoltaic Grid-connected Generation Systems

  • Liu, Jiang;Cheng, Shanmei;Shen, Anwen
    • Journal of Power Electronics
    • /
    • v.17 no.1
    • /
    • pp.200-211
    • /
    • 2017
  • Conventional boost-full-bridge and boost-hybrid-bridge two-stage inverters are widely applied in order to adapt to the wide dc input voltage range of photovoltaic arrays. However, the efficiency of the conventional topology is not fully optimized because additional switching losses are generated in the voltage conversion so that the input voltage rises and then falls. Moreover, the electrolytic capacitors in a dc-link lead to a larger volume combined with increases in both weight and cost. This paper proposes a higher efficiency inverter with time-sharing synchronous modulation. The energy transmission paths, wheeling branches and switching losses for the high-frequency switches are optimized so that the overall efficiency is greatly improved. In this paper, a contrastive analysis of the component losses for the conventional and proposed inverter topologies is carried out in MATLAB. Finally, the high-efficiency under different switching frequencies and different input voltages is verified by a 3 kW prototype.

ACA Based Image Steganography

  • Sarkar, Anindita;Nag, Amitava;Biswas, Sushanta;Sarkar, Partha Pratim
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.266-276
    • /
    • 2013
  • LSB-based steganography is a simple and well known information hiding technique. In most LSB based techniques, a secret message is embedded into a specific position of LSB in the cover pixels. On the other hand, the main threat of LSB-based steganography is steganalysis. This paper proposes an asynchronous-cellular-automata(ACA)-based steganographic method, where secret bits are embedded into the selected position inside the cover pixel by ACA rule 51 and a secret key. As a result, it is very difficult for malicious users to retrieve a secret message from a cover image without knowing the secret key, even if the extraction algorithm is known. In addition, another layer of security is provided by almost random (rule-based) selection of a cover pixel for embedding using ACA and a different secret key. Finally, the experimental results show that the proposed method can be secured against the well-known steganalysis RS-attack.

  • PDF

CRT-Based Color Image Zero-Watermarking on the DCT Domain

  • Kim, HyoungDo
    • International Journal of Contents
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2015
  • When host images are watermarked with CRT (Chinese Remainder Theorem), the watermark images are still robust in spite of the damage of the host images by maintaining the remainders in an unchanged state within some range of the changes that are incurred by the attacks. This advantage can also be attained by "zero-watermarking," which does not change the host images in any way. This paper proposes an improved zero-watermarking scheme for color images on the DCT (Discrete Cosine Transform) domain that is based on the CRT. In the scheme, RGB images are converted into YCbCr images, and one channel is used for the DCT transformation. A key is then computed from the DC and three low-frequency AC values of each DCT block using the CRT. The key finally becomes the watermark key after it is combined four times with a scrambled watermark image. When watermark images are extracted, each bit is determined by majority voting. This scheme shows that watermark images are robust against a number of common attacks such as sharpening, blurring, JPEG lossy compression, and cropping.

Single DLP Optical Engine for Solid Volumetric True 3D Display

  • Huaxia, Wu;Qibin, Feng;Guoqiang, Lv;Dongdai, Dongdai
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2009.10a
    • /
    • pp.1371-1374
    • /
    • 2009
  • According to depth cues of an image, the optical engine of the solid volumetric true 3D display can project a sequence of slices of a 2D image to corresponding display at a set of liquid shutters (LC) locating at different depth. A single DLP optical engine developed for a solid volumetric true 3D display consists of a lamp, reflector, color wheel, hollow integrator, relays, DMD, and projection lens. The simulation results show that the optical engine designed for single DLP volumetric true 3D display satisfies the requirements.

  • PDF

Contrast Enhancement using Histogram Equalization with a New Neighborhood Metrics

  • Sengee, Nyamlkhagva;Choi, Heung-Kook
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.6
    • /
    • pp.737-745
    • /
    • 2008
  • In this paper, a novel neighborhood metric of histogram equalization (HE) algorithm for contrast enhancement is presented. We present a refinement of HE using neighborhood metrics with a general framework which orders pixels based on a sequence of sorting functions which uses both global and local information to remap the image greylevels. We tested a novel sorting key with the suggestion of using the original image greylevel as the primary key and a novel neighborhood distinction metric as the secondary key, and compared HE using proposed distinction metric and other HE methods such as global histogram equalization (GHE), HE using voting metric and HE using contrast difference metric. We found that our method can preserve advantages of other metrics, while reducing drawbacks of them and avoiding undesirable over-enhancement that can occur with local histogram equalization (LHE) and other methods.

  • PDF