首页 > 最新文献

2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)最新文献

英文 中文
Speaker weight estimation from speech signals using a fusion of the i-vector and NFA frameworks 基于i向量和NFA框架的语音信号的说话人权重估计
A. H. Poorjam, M. H. Bahari, H. Van hamme
In this paper, a novel approach for automatic speaker weight estimation from spontaneous telephone speech signals is proposed. In this method, each utterance is modeled using the i-vector framework which is based on the factor analysis on Gaussian Mixture Model (GMM) mean supervectors, and the Non-negative Factor Analysis (NFA) framework which is based on a constrained factor analysis on GMM weights. Then, the available information in both Gaussian means and Gaussian weights is exploited through a feature-level fusion of the i-vectors and the NFA vectors. Finally, a least-squares support vector regression (LS-SVR) is employed to estimate the weight of speakers from given utterances. The proposed approach is evaluated on the telephone speech signals of National Institute of Standards and Technology (NIST) 2008 and 2010 Speaker Recognition Evaluation (SRE) corpora. Experimental results over 2339 utterances show that the correlation coefficients between actual and estimated weights of male and female speakers are 0.56 and 0.49, respectively, which indicate the effectiveness of the proposed method in speaker weight estimation.
本文提出了一种基于自发语音信号的自动估计扬声器权重的新方法。该方法采用基于高斯混合模型(GMM)均值超向量因子分析的i向量框架和基于高斯混合模型(GMM)权值约束因子分析的非负因子分析(NFA)框架对每个话语建模。然后,通过i向量和NFA向量的特征级融合,利用高斯均值和高斯权值中的可用信息。最后,采用最小二乘支持向量回归(LS-SVR)从给定的话语中估计说话者的权重。在美国国家标准与技术研究院(NIST) 2008年和2010年语音识别评估(SRE)语料库的电话语音信号上对该方法进行了评估。2339个语音的实验结果表明,男性和女性说话人的实际权值与估计权值的相关系数分别为0.56和0.49,表明该方法在估计说话人权值方面是有效的。
{"title":"Speaker weight estimation from speech signals using a fusion of the i-vector and NFA frameworks","authors":"A. H. Poorjam, M. H. Bahari, H. Van hamme","doi":"10.1109/AISP.2015.7123494","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123494","url":null,"abstract":"In this paper, a novel approach for automatic speaker weight estimation from spontaneous telephone speech signals is proposed. In this method, each utterance is modeled using the i-vector framework which is based on the factor analysis on Gaussian Mixture Model (GMM) mean supervectors, and the Non-negative Factor Analysis (NFA) framework which is based on a constrained factor analysis on GMM weights. Then, the available information in both Gaussian means and Gaussian weights is exploited through a feature-level fusion of the i-vectors and the NFA vectors. Finally, a least-squares support vector regression (LS-SVR) is employed to estimate the weight of speakers from given utterances. The proposed approach is evaluated on the telephone speech signals of National Institute of Standards and Technology (NIST) 2008 and 2010 Speaker Recognition Evaluation (SRE) corpora. Experimental results over 2339 utterances show that the correlation coefficients between actual and estimated weights of male and female speakers are 0.56 and 0.49, respectively, which indicate the effectiveness of the proposed method in speaker weight estimation.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126446721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel video watermarking algorithm based on chaotic maps in the transform domain 一种基于变换域混沌映射的视频水印算法
S. Mohammadi
A novel video watermarking algorithm based on wavelet transform and chaotic maps is here introduced. We apply the two dimensional wavelet transform on I-frames and then insert the chaotic watermark into part of the sub-band coefficients. Since chaotic maps are sensitive to initial values, initial values of the chaotic maps and their chaotic parameters are exploited as secret keys in our algorithm. Results are presented to reveal the usefulness of the algorithm. Comparisons are made with the latest video watermarking schemes.
提出了一种基于小波变换和混沌映射的视频水印算法。我们对i帧进行二维小波变换,然后在部分子带系数中插入混沌水印。由于混沌映射对初始值很敏感,因此在算法中利用混沌映射的初始值及其混沌参数作为密钥。实验结果表明了该算法的有效性。并与最新的视频水印方案进行了比较。
{"title":"A novel video watermarking algorithm based on chaotic maps in the transform domain","authors":"S. Mohammadi","doi":"10.1109/AISP.2015.7123520","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123520","url":null,"abstract":"A novel video watermarking algorithm based on wavelet transform and chaotic maps is here introduced. We apply the two dimensional wavelet transform on I-frames and then insert the chaotic watermark into part of the sub-band coefficients. Since chaotic maps are sensitive to initial values, initial values of the chaotic maps and their chaotic parameters are exploited as secret keys in our algorithm. Results are presented to reveal the usefulness of the algorithm. Comparisons are made with the latest video watermarking schemes.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133423186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An efficient content-based image retrieval with ant colony optimization feature selection schema based on wavelet and color features 一种基于小波和颜色特征的蚁群优化图像检索方法
A. Rashno, S. Sadri, Hossein SadeghianNejad
A novel content-based image retrieval (CBIR) schema with wavelet and color features followed by ant colony optimization (ACO) feature selection has been proposed in this paper. A new feature extraction schema including texture features from wavelet transformation and color features in RGB and HSV domain is proposed as representative feature vector for images in database. Also, appropriate similarity measure for each feature is presented. Retrieving results are so sensitive to image features used in content-based image retrieval. We address this problem with selection of most relevant features among complete feature set by ant colony optimization based feature selection. To evaluate the performance of our proposed CBIR schema, it has been compared with older proposed systems, results show that the precision and recall of our proposed schema are higher than older ones for the majority of image categories.
提出了一种基于小波和颜色特征的基于内容的图像检索(CBIR)模式,并结合蚁群优化(ACO)特征选择。提出了一种基于小波变换的纹理特征和RGB和HSV域的颜色特征作为数据库中图像的代表性特征向量的特征提取方法。同时,对每个特征给出了适当的相似度度量。在基于内容的图像检索中,检索结果对图像特征非常敏感。我们通过基于蚁群优化的特征选择,在完整的特征集中选择最相关的特征来解决这一问题。为了评价本文提出的CBIR模式的性能,将其与已有的系统进行了比较,结果表明,对于大多数图像类别,本文提出的模式的准确率和召回率都高于已有的系统。
{"title":"An efficient content-based image retrieval with ant colony optimization feature selection schema based on wavelet and color features","authors":"A. Rashno, S. Sadri, Hossein SadeghianNejad","doi":"10.1109/AISP.2015.7123522","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123522","url":null,"abstract":"A novel content-based image retrieval (CBIR) schema with wavelet and color features followed by ant colony optimization (ACO) feature selection has been proposed in this paper. A new feature extraction schema including texture features from wavelet transformation and color features in RGB and HSV domain is proposed as representative feature vector for images in database. Also, appropriate similarity measure for each feature is presented. Retrieving results are so sensitive to image features used in content-based image retrieval. We address this problem with selection of most relevant features among complete feature set by ant colony optimization based feature selection. To evaluate the performance of our proposed CBIR schema, it has been compared with older proposed systems, results show that the precision and recall of our proposed schema are higher than older ones for the majority of image categories.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116738207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Cloud authentication based on encryption of digital image using edge detection 基于边缘检测的数字图像加密云认证
A. Yassin, A. Hussain, Keyan Abdul-Aziz Mutlaq
The security of cloud computing is the most important concerns that may delay its well-known adoption. Authentication is the central part of cloud security, targeting to gain valid users for accessing to stored data in cloud computing. There are several authentication schemes that based on username/password, but they are considered weak methods of cloud authentication. In the other side, image's digitization becomes highly vulnerable to malicious attacks over cloud computing. Our proposed scheme focuses on two-factor authentication that used image partial encryption to overcome above aforementioned issues and drawbacks of authentication schemes. Additionally, we use a fast partial image encryption scheme using Canny's edge detection with symmetric encryption is done as a second factor. In this scheme, the edge pixels of image are encrypted using the stream cipher as it holds most of the image's data and then we applied this way to authenticate valid users. The results of security analysis and experimental results view that our work supports a good balance between security and performance for image encryption in cloud computing environment.
云计算的安全性是最重要的问题,可能会推迟其众所周知的采用。身份验证是云安全的核心部分,旨在获得访问云计算中存储数据的有效用户。有几种基于用户名/密码的身份验证方案,但它们被认为是云身份验证的弱方法。另一方面,通过云计算,图像数字化极易受到恶意攻击。我们提出的方案侧重于使用图像部分加密的双因素身份验证,以克服上述认证方案的问题和缺点。此外,我们使用了一种快速的局部图像加密方案,使用Canny的边缘检测和对称加密作为第二个因素。在该方案中,图像的边缘像素使用流密码进行加密,因为它包含了图像的大部分数据,然后我们应用这种方式来验证有效用户。安全性分析结果和实验结果表明,我们的工作支持云计算环境下图像加密的安全性和性能之间的良好平衡。
{"title":"Cloud authentication based on encryption of digital image using edge detection","authors":"A. Yassin, A. Hussain, Keyan Abdul-Aziz Mutlaq","doi":"10.1109/AISP.2015.7123517","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123517","url":null,"abstract":"The security of cloud computing is the most important concerns that may delay its well-known adoption. Authentication is the central part of cloud security, targeting to gain valid users for accessing to stored data in cloud computing. There are several authentication schemes that based on username/password, but they are considered weak methods of cloud authentication. In the other side, image's digitization becomes highly vulnerable to malicious attacks over cloud computing. Our proposed scheme focuses on two-factor authentication that used image partial encryption to overcome above aforementioned issues and drawbacks of authentication schemes. Additionally, we use a fast partial image encryption scheme using Canny's edge detection with symmetric encryption is done as a second factor. In this scheme, the edge pixels of image are encrypted using the stream cipher as it holds most of the image's data and then we applied this way to authenticate valid users. The results of security analysis and experimental results view that our work supports a good balance between security and performance for image encryption in cloud computing environment.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117045127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Multiple soccer players tracking 多名足球运动员跟踪
Nima Najafzadeh, Mehran Fotouhi, S. Kasaei
This paper, describes a solution for tracking multiple soccer players, simultaneously, in soccer ground. It adapts Kalman filter for tracking multiple players. Adapting Kalman filter is divided to four main tasks. The first task is defining the state vector for multiple object tracking. The second task is determining a motion model for estimating the position of soccer players in the next frame. The third task is defining an observation method for detecting soccer players in each frame. Finally, the fourth task is tuning the measurement noise covariance and estimating noise covariance. In the third task, a novel observation method for detecting soccer players is proposed. This method divides the player body into three parts and calculates the histogram of each part, separately. Also, an algorithm for updating the reference object patch is introduced in observation method. Each task is discussed in detail and the promising performance of the proposed method for tracking soccer players when run on the Azadi dataset is shown.
本文介绍了一种在足球场上同时跟踪多名足球运动员的解决方案。它采用卡尔曼滤波来跟踪多个玩家。自适应卡尔曼滤波分为四个主要任务。第一个任务是定义用于多目标跟踪的状态向量。第二个任务是确定一个运动模型来估计下一帧中足球运动员的位置。第三个任务是定义一种在每帧中检测足球运动员的观察方法。最后,第四项工作是测量噪声协方差的调整和噪声协方差的估计。在第三个任务中,提出了一种新的检测足球运动员的观察方法。该方法将球员身体分成三个部分,分别计算每个部分的直方图。同时,在观测方法中引入了一种更新参考目标patch的算法。详细讨论了每个任务,并展示了在Azadi数据集上运行时所提出的跟踪足球运动员的方法的良好性能。
{"title":"Multiple soccer players tracking","authors":"Nima Najafzadeh, Mehran Fotouhi, S. Kasaei","doi":"10.1109/AISP.2015.7123503","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123503","url":null,"abstract":"This paper, describes a solution for tracking multiple soccer players, simultaneously, in soccer ground. It adapts Kalman filter for tracking multiple players. Adapting Kalman filter is divided to four main tasks. The first task is defining the state vector for multiple object tracking. The second task is determining a motion model for estimating the position of soccer players in the next frame. The third task is defining an observation method for detecting soccer players in each frame. Finally, the fourth task is tuning the measurement noise covariance and estimating noise covariance. In the third task, a novel observation method for detecting soccer players is proposed. This method divides the player body into three parts and calculates the histogram of each part, separately. Also, an algorithm for updating the reference object patch is introduced in observation method. Each task is discussed in detail and the promising performance of the proposed method for tracking soccer players when run on the Azadi dataset is shown.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An efficient hardware implementation of few lightweight block cipher 少量轻量级分组密码的高效硬件实现
Ali Nemati, S. Feizi, A. Ahmadi, Saeed Haghiri, M. Ahmadi, S. Alirezaee
Radio-frequency identification (RFID) are becoming a part of our everyday life with a wide range of applications such as labeling products and supply chain management and etc. These smart and tiny devices have extremely constrained resources in terms of area, computational abilities, memory, and power. At the same time, security and privacy issues remain as an important problem, thus with the large deployment of low resource devices, increasing need to provide security and privacy among such devices, has arisen. Resource-efficient cryptographic incipient become basic for realizing both security and efficiency in constrained environments and embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a significant role as a building block for security systems. In 2014 Manoj Kumar et al proposed a new Lightweight block cipher named as FeW, which are suitable for extremely constrained environments and embedded systems. In this paper, we simulate and synthesize the FeW block cipher. Implementation results of the FeW cryptography algorithm on a FPGA are presented. The design target is efficiency of area and cost.
射频识别技术(RFID)正逐渐成为我们日常生活的一部分,在产品标签、供应链管理等方面有着广泛的应用。这些智能和微型设备在面积、计算能力、内存和功率方面的资源极其有限。与此同时,安全和隐私问题仍然是一个重要的问题,因此随着低资源设备的大量部署,越来越需要在这些设备之间提供安全和隐私。资源高效的加密初期成为在受限环境和嵌入式系统(如RFID标签和传感器节点)中实现安全和效率的基础。在这些原语中,轻量级分组密码作为安全系统的构建块起着重要的作用。2014年Manoj Kumar等人提出了一种新的轻量级分组密码,命名为FeW,它适用于极度受限的环境和嵌入式系统。本文对FeW分组密码进行了仿真和合成。给出了FeW密码算法在FPGA上的实现结果。设计目标是面积效益和成本效益。
{"title":"An efficient hardware implementation of few lightweight block cipher","authors":"Ali Nemati, S. Feizi, A. Ahmadi, Saeed Haghiri, M. Ahmadi, S. Alirezaee","doi":"10.1109/AISP.2015.7123493","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123493","url":null,"abstract":"Radio-frequency identification (RFID) are becoming a part of our everyday life with a wide range of applications such as labeling products and supply chain management and etc. These smart and tiny devices have extremely constrained resources in terms of area, computational abilities, memory, and power. At the same time, security and privacy issues remain as an important problem, thus with the large deployment of low resource devices, increasing need to provide security and privacy among such devices, has arisen. Resource-efficient cryptographic incipient become basic for realizing both security and efficiency in constrained environments and embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a significant role as a building block for security systems. In 2014 Manoj Kumar et al proposed a new Lightweight block cipher named as FeW, which are suitable for extremely constrained environments and embedded systems. In this paper, we simulate and synthesize the FeW block cipher. Implementation results of the FeW cryptography algorithm on a FPGA are presented. The design target is efficiency of area and cost.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127191758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrated single image super resolution based on sparse representation 基于稀疏表示的集成单幅图像超分辨率
Mehdi Khademloo, M. Rezghi
This paper presents a new and efficient approach for single-image super-resolution based on sparse signal recovery. This approach uses a co-occurrence trained dictionary of image patches that obtained from a set of observed low- and high-resolution images. The linear combination of the dictionary patches can recover every patch, then each patch that used on the low-resolution image, can be recovered by the dictionary patches. Since the recovered patch is a linear combination of some patches, the noise of every patch, aggregated in the recovered patch, then we prefer a linear combination which is more sparse rather than other combinations. So the sparse representation of patches can filter the noise in the solution. Recently this approach has been used in single image super-resolution problem. These methods calculate the sparse representation of every patches separately and set it to the recovered high-resolution image. So the complexity of such methods are very high and for suitable solution the parameters of algorithm must be estimated, therefore, this process (recover all patch with an iterative algorithm and parameter estimation for each iterate) is very time consuming. This paper presents an integrated method for recovering a low-resolution image based on sparse representation of patches with one step and recover whole image together.
提出了一种基于稀疏信号恢复的单幅图像超分辨新方法。该方法使用从一组观察到的低分辨率和高分辨率图像中获得的图像补丁共现训练字典。字典补丁的线性组合可以恢复每个补丁,然后字典补丁可以恢复低分辨率图像上使用的每个补丁。由于恢复的patch是一些patch的线性组合,每个patch的噪声都聚集在恢复的patch中,因此我们更倾向于选择一个更稀疏的线性组合而不是其他组合。因此,斑块的稀疏表示可以滤除解中的噪声。近年来,该方法已被用于解决单幅图像的超分辨率问题。这些方法分别计算每个斑块的稀疏表示,并将其设置为恢复后的高分辨率图像。因此,这种方法的复杂度很高,并且为了得到合适的解,必须估计算法的参数,因此,这个过程(用迭代算法恢复所有的patch,每次迭代估计参数)非常耗时。提出了一种基于小块稀疏表示的低分辨率图像一步恢复与全图像恢复的集成方法。
{"title":"Integrated single image super resolution based on sparse representation","authors":"Mehdi Khademloo, M. Rezghi","doi":"10.1109/AISP.2015.7123523","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123523","url":null,"abstract":"This paper presents a new and efficient approach for single-image super-resolution based on sparse signal recovery. This approach uses a co-occurrence trained dictionary of image patches that obtained from a set of observed low- and high-resolution images. The linear combination of the dictionary patches can recover every patch, then each patch that used on the low-resolution image, can be recovered by the dictionary patches. Since the recovered patch is a linear combination of some patches, the noise of every patch, aggregated in the recovered patch, then we prefer a linear combination which is more sparse rather than other combinations. So the sparse representation of patches can filter the noise in the solution. Recently this approach has been used in single image super-resolution problem. These methods calculate the sparse representation of every patches separately and set it to the recovered high-resolution image. So the complexity of such methods are very high and for suitable solution the parameters of algorithm must be estimated, therefore, this process (recover all patch with an iterative algorithm and parameter estimation for each iterate) is very time consuming. This paper presents an integrated method for recovering a low-resolution image based on sparse representation of patches with one step and recover whole image together.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131640752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Despeckling algorithm for remote sensing synthetic aperture radar images using multi-scale curvelet transform 基于多尺度曲线变换的遥感合成孔径雷达图像去斑算法
M. Kooshesh, G. Akbarizadeh
The goal of the present research is to despeckle SAR images, which is critical for segmentation and target recognition in satellite SAR images. When a despeckling algorithm is applied to a SAR image, important information such as the edges, corners, textures, and object parts will degrade. Curvelet transform is a recently proposed form of multi-scale analysis that achieves better performance of wavelet and Gabor transforms in edge and curve detection. This is a geometric transform that is useful for SAR image processing. For unsupervised texture images, segmentation is different and distinct from the textures, so the textures at the boundary noises will disappear. Curvelet transform has produced good results in the detection of curved edges with higher accuracy in finding the orientation than wavelet transforms. The present study uses fast discrete curvelet transform (FDCT) based on wresting and uses unsupervised adaptive threshold learning to develop a new despeckling algorithm for SAR images. In the proposed algorithm, each segment of the SAR image can be learned for selection of its adaptive threshold. Simulation results demonstrate that the proposed algorithm performs better than similar methods.
对SAR图像进行去斑处理是SAR图像分割和目标识别的关键。当对SAR图像进行去斑处理时,图像的边缘、角落、纹理、物体部位等重要信息会被去斑处理。曲波变换是最近提出的一种多尺度分析形式,它在边缘和曲线检测方面比小波变换和Gabor变换具有更好的性能。这是一个对SAR图像处理有用的几何变换。对于无监督的纹理图像,分割与纹理是不同的,不同的,因此纹理在边界处的噪声会消失。曲波变换在曲线边缘检测中取得了较好的效果,其定位精度高于小波变换。本研究采用基于变换的快速离散曲线变换(FDCT)和无监督自适应阈值学习,提出了一种新的SAR图像去斑算法。在该算法中,可以学习SAR图像的每个片段并选择其自适应阈值。仿真结果表明,该算法的性能优于同类算法。
{"title":"Despeckling algorithm for remote sensing synthetic aperture radar images using multi-scale curvelet transform","authors":"M. Kooshesh, G. Akbarizadeh","doi":"10.1109/AISP.2015.7123533","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123533","url":null,"abstract":"The goal of the present research is to despeckle SAR images, which is critical for segmentation and target recognition in satellite SAR images. When a despeckling algorithm is applied to a SAR image, important information such as the edges, corners, textures, and object parts will degrade. Curvelet transform is a recently proposed form of multi-scale analysis that achieves better performance of wavelet and Gabor transforms in edge and curve detection. This is a geometric transform that is useful for SAR image processing. For unsupervised texture images, segmentation is different and distinct from the textures, so the textures at the boundary noises will disappear. Curvelet transform has produced good results in the detection of curved edges with higher accuracy in finding the orientation than wavelet transforms. The present study uses fast discrete curvelet transform (FDCT) based on wresting and uses unsupervised adaptive threshold learning to develop a new despeckling algorithm for SAR images. In the proposed algorithm, each segment of the SAR image can be learned for selection of its adaptive threshold. Simulation results demonstrate that the proposed algorithm performs better than similar methods.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"38 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134260240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Speech driven lips animation for the Farsi language 语音驱动的波斯语嘴唇动画
Z. Naraghi, M. Jamzad
With the growing presence of computers in everyday life, communication improvement between human and machines is inevitable. Talking faces are the faces whose movements are synchronized to speech. They have an effective role in many applications. Lip is the most important part of a talking face. The main goal of this project is implementing a natural and human-like lip movement synthesis system for the Farsi language. For this purpose, a comprehensive audio visual database called SFAVD1 was designed and used. After extracting the sufficient features and designing a parallel Hidden Markov Model, the speech driven lip movement sequence generator system for Farsi input speech was implemented. To remove discontinuities between lip frames produced by the system, a morphing algorithm was used. The proposed system is unique for Farsi, and the evaluations have shown its acceptable quality.
随着计算机越来越多地出现在日常生活中,人与机器之间的交流的改善是不可避免的。会说话的脸是那些动作与说话同步的脸。它们在许多应用中发挥着有效的作用。嘴唇是一张会说话的脸最重要的部分。这个项目的主要目标是为波斯语实现一个自然的和类似人类的嘴唇运动合成系统。为此,设计并使用了一个名为SFAVD1的综合视听数据库。在充分提取特征并设计并行隐马尔可夫模型的基础上,实现了语音驱动的波斯语输入语音唇动序列生成系统。为了消除系统产生的唇帧之间的不连续,使用了一种变形算法。拟议的系统对波斯语来说是独一无二的,评价表明其质量是可以接受的。
{"title":"Speech driven lips animation for the Farsi language","authors":"Z. Naraghi, M. Jamzad","doi":"10.1109/AISP.2015.7123525","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123525","url":null,"abstract":"With the growing presence of computers in everyday life, communication improvement between human and machines is inevitable. Talking faces are the faces whose movements are synchronized to speech. They have an effective role in many applications. Lip is the most important part of a talking face. The main goal of this project is implementing a natural and human-like lip movement synthesis system for the Farsi language. For this purpose, a comprehensive audio visual database called SFAVD1 was designed and used. After extracting the sufficient features and designing a parallel Hidden Markov Model, the speech driven lip movement sequence generator system for Farsi input speech was implemented. To remove discontinuities between lip frames produced by the system, a morphing algorithm was used. The proposed system is unique for Farsi, and the evaluations have shown its acceptable quality.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134350289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video logo removal using iterative subsequent matching 视频logo移除使用迭代后续匹配
Maryam Dashti, R. Safabakhsh, Mohammadreza Pourfard, M. Abdollahifard
Video inpainting methods has a large number of applications and some of these algorithms are specialized for specific applications such as logo removal. There are only a few general video inpainting algorithms most of which are very time-consuming. This problem makes these algorithms unsuitable for fast video inpainting. In this paper, a fast simple logo removal algorithm has been proposed which uses frames of each video shot for logo removal and removes logo from video after a few iterations. A more accurate non-casual version of our algorithm is also proposed which uses both the information of previous and next frames. The quality of the inpainted video is also comparable with well-known video inpainting algorithms.
视频上漆方法有大量的应用,其中一些算法专门用于特定的应用,如标识删除。目前只有少数几种通用的视频绘制算法,其中大多数算法都非常耗时。这个问题使得这些算法不适用于快速视频绘制。本文提出了一种快速简单的logo去除算法,该算法利用每个视频镜头的帧进行logo去除,经过几次迭代后将logo从视频中去除。我们还提出了一种更精确的非随意版本的算法,该算法同时使用了前一帧和后一帧的信息。所绘制视频的质量也可与知名的视频绘制算法相媲美。
{"title":"Video logo removal using iterative subsequent matching","authors":"Maryam Dashti, R. Safabakhsh, Mohammadreza Pourfard, M. Abdollahifard","doi":"10.1109/AISP.2015.7123495","DOIUrl":"https://doi.org/10.1109/AISP.2015.7123495","url":null,"abstract":"Video inpainting methods has a large number of applications and some of these algorithms are specialized for specific applications such as logo removal. There are only a few general video inpainting algorithms most of which are very time-consuming. This problem makes these algorithms unsuitable for fast video inpainting. In this paper, a fast simple logo removal algorithm has been proposed which uses frames of each video shot for logo removal and removes logo from video after a few iterations. A more accurate non-casual version of our algorithm is also proposed which uses both the information of previous and next frames. The quality of the inpainted video is also comparable with well-known video inpainting algorithms.","PeriodicalId":405857,"journal":{"name":"2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133768069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1