Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (412)
  • Open Access

    ARTICLE

    Methods to Automatically Build Point Distribution Models for Objects like Hand Palms and Faces Represented in Images

    Maria João M. Vasconcelos1, João Manuel R. S. Tavares1

    CMES-Computer Modeling in Engineering & Sciences, Vol.36, No.3, pp. 213-242, 2008, DOI:10.3970/cmes.2008.036.213

    Abstract In this work we developed methods to automatically extract significant points of objects like hand palms and faces represented in images that can be used to build Point Distribution Models automatically. These models are further used to segment the modelled objects in new images, through the use of Active Shape Models or Active Appearance Models. These models showed to be efficient in the segmentation of objects, but had as drawback the fact that the labelling of the landmark points was usually manually made and consequently time consuming. Thus, in this paper we describe some methods capable to extract significant points… More >

  • Open Access

    ARTICLE

    Numerical Analysis of Concrete Composites at the Mesoscale Based on 3D Reconstruction Technology of X-ray CT Images

    C.B. Du1,2, S.Y Jiang2, W. Qin3, Y.M. Zhang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.81, No.3&4, pp. 229-248, 2011, DOI:10.3970/cmes.2011.081.229

    Abstract A numerical analysis of concrete composites at the mesoscale based on three-dimensional (3D) reconstruction technology of X-ray computed tomography (CT) images is presented in this paper. For X-ray CT images of concrete, morphology processing was used to recover complete image information, including borders, and the median filtering method was applied to eliminate potential impurities in the images. The final X-ray CT images obtained after processing for a concrete section were composed of three-value pixels that indicated aggregate particles, mortar matrix and air voids, and the 3D structure of the concrete specimen was reconstructed using the volume data method. The mapping… More >

  • Open Access

    ARTICLE

    Matching Contours in Images through the use of Curvature, Distance to Centroid and Global Optimization with Order-Preserving Constraint

    Francisco P. M. Oliveira1, João Manuel R. S. Tavares1

    CMES-Computer Modeling in Engineering & Sciences, Vol.43, No.1, pp. 91-110, 2009, DOI:10.3970/cmes.2009.043.091

    Abstract This paper presents a new methodology to establish the best global match of objects' contours in images. The first step is the extraction of the sets of ordered points that define the objects' contours. Then, by using the curvature value and its distance to the corresponded centroid for each point, an affinity matrix is built. This matrix contains information of the cost for all possible matches between the two sets of ordered points. Then, to determine the desired one-to-one global matching, an assignment algorithm based on dynamic programming is used. This algorithm establishes the global matching of the minimum global… More >

  • Open Access

    ARTICLE

    Segmentation and Simulation of Objects Represented in Images using Physical Principles

    Patrícia C.T. Gonçalves1,2, João Manuel R.S. Tavares1,2, R.M. Natal Jorge1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.32, No.1, pp. 45-56, 2008, DOI:10.3970/cmes.2008.032.045

    Abstract The main goals of the present work are to automatically extract the contour of an object and to simulate its deformation using a physical approach. In this work, to segment an object represented in an image, an initial contour is manually defined for it that will then automatically evolve until it reaches the border of the desired object. In this approach, the contour is modelled by a physical formulation using the finite element method, and its temporal evolution to the desired final contour is driven by internal and external forces. The internal forces are defined by the intrinsic characteristics of… More >

  • Open Access

    ARTICLE

    A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain

    Jialing Liu1, Jingbing Li1,2,*, Yenwei Chen3, Xiangxi Zou1, Jieren Cheng1,2, Yanlin Liu1, Uzair Aslam Bhatti1,2

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 363-378, 2019, DOI:10.32604/cmc.2019.06037

    Abstract Remote medical diagnosis can be realized by using the Internet, but when transmitting medical images of patients through the Internet, personal information of patients may be leaked. Aim at the security of medical information system and the protection of medical images, a novel robust zero-watermarking based on SIFT-DCT (Scale Invariant Feature Transform-Discrete Cosine Transform) for medical images in the encrypted domain is proposed. Firstly, the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images. Then, the SIFT-DCT is used to extract the feature sequences of encrypted medical images.… More >

  • Open Access

    ARTICLE

    Text Detection and Recognition for Natural Scene Images Using Deep Convolutional Neural Networks

    Xianyu Wu1, Chao Luo1, Qian Zhang2, Jiliu Zhou1, Hao Yang1, 3, *, Yulian Li1

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 289-300, 2019, DOI:10.32604/cmc.2019.05990

    Abstract Words are the most indispensable information in human life. It is very important to analyze and understand the meaning of words. Compared with the general visual elements, the text conveys rich and high-level moral information, which enables the computer to better understand the semantic content of the text. With the rapid development of computer technology, great achievements have been made in text information detection and recognition. However, when dealing with text characters in natural scene images, there are still some limitations in the detection and recognition of natural scene images. Because natural scene image has more interference and complexity than… More >

  • Open Access

    ARTICLE

    A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem

    Qi He1, Shui Yu2, Huifang Xu3,*, Jia Liu4, Dongmei Huang5, Guohua Liu6, Fangqin Xu3, Yanling Du1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 349-361, 2019, DOI:10.32604/cmc.2019.03703

    Abstract The recent advances in remote sensing and computer techniques give birth to the explosive growth of remote sensing images. The emergence of cloud storage has brought new opportunities for storage and management of massive remote sensing images with its large storage space, cost savings. However, the openness of cloud brings challenges for image data security. In this paper, we propose a weighted image sharing scheme to ensure the security of remote sensing in cloud environment, which takes the weights of participants (i.e., cloud service providers) into consideration. An extended Mignotte sequence is constructed according to the weights of participants, and… More >

  • Open Access

    ARTICLE

    Coverless Steganography for Digital Images Based on a Generative Model

    Xintao Duan1,*, Haoxian Song1, Chuan Qin2, Muhammad Khurram Khan3

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 483-493, 2018, DOI: 10.3970/cmc.2018.01798

    Abstract In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the secret image. The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image. Thus, we only need to transmit the meaning-normal image which is not related to the secret image, and we can achieve the same effect as the transmission of the secret image.… More >

  • Open Access

    ARTICLE

    Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification

    Yang Du1, Zhaoxia Yin1,2,*, Xinpeng Zhang3

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 495-507, 2018, DOI: 10.3970/cmc.2018.02440

    Abstract This paper proposes a lossless and high payload data hiding scheme for JPEG images by histogram modification. The most in JPEG bitstream consists of a sequence of VLCs (variable length codes) and the appended bits. Each VLC has a corresponding RLV (run/length value) to record the AC/DC coefficients. To achieve lossless data hiding with high payload, we shift the histogram of VLCs and modify the DHT segment to embed data. Since we sort the histogram of VLCs in descending order, the filesize expansion is limited. The paper’s key contribution includes: Lossless data hiding, less filesize expansion in identical pay-load and… More >

  • Open Access

    ARTICLE

    Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography

    Yangyang Wang1, Rongrong Ni1,*, Yao Zhao1, Min Xian2

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 255-265, 2018, DOI:10.3970/cmc.2018.01732

    Abstract In this paper, two methods are proposed to embed visual watermark into direct binary search (DBS) halftone images, which are called Adjusted Direct Binary Search (ADBS) and Dual Adjusted Direct Binary Search (DADBS). DADBS is an improved version of ADBS. By using the proposed methods, the visual watermark will be embedded into two halftone images separately, thus, the watermark can be revealed when these two halftone images are overlaid. Experimental results show that both methods can achieve excellent image visual quality and decoded visual patterns. More >

Displaying 401-410 on page 41 of 412. Per Page