2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)最新文献

筛选
英文 中文
Modeling of 2D Objects with Weighted-Quadratic Trigonometric Spline 二维物体的加权二次三角样条建模
M. Sarfraz, Shamaila Samreen, M. Hussain
{"title":"Modeling of 2D Objects with Weighted-Quadratic Trigonometric Spline","authors":"M. Sarfraz, Shamaila Samreen, M. Hussain","doi":"10.1109/CGIV.2016.15","DOIUrl":"https://doi.org/10.1109/CGIV.2016.15","url":null,"abstract":"An imperative scheme is adopted to model 2D objects by constructing a weighted-spline using a quadratic trigonometric function with well controlled shape influences of parameters. The curve models, constructed through the suggested scheme, own the best possible geometric properties such as convex hull, partition of unity, affine invariance and variation diminishing. The illustration of the method is supportive for various shape effects using interval tension property. The proposed C1 spline method is modest overall.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114851760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Abnormal Events Detection Based on Trajectory Clustering 基于轨迹聚类的异常事件检测
Najla Bouarada Ghrab, Emna Fendri, Mohamed Hammami
{"title":"Abnormal Events Detection Based on Trajectory Clustering","authors":"Najla Bouarada Ghrab, Emna Fendri, Mohamed Hammami","doi":"10.1109/CGIV.2016.65","DOIUrl":"https://doi.org/10.1109/CGIV.2016.65","url":null,"abstract":"Trajectories of moving objects provide crucial clues for video event analysis especially in surveillance applications. In this paper, we proposed a novel approach for detecting abnormal events in video surveillance. Our approach is based on trajectory analysis involving two phases. In the first phase, we extracted clusters of normal events through an agglomerative hierarchical clustering of saved trajectories that were of different lengths, of different local time shifts and containing noise. Then, for each cluster a model was established. In the second phase, we aimed to classify a new event as normal or abnormal one. To achieve this objective, a comparison was performed with the extracted clusters' models thereby reducing the complexity and accelerating the classification process. Experiments were conducted to demonstrate the efficacy and the performance of our approach.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131051803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Automatic Bifurcation Detection in Coronary X-Ray Angiographies 冠状动脉x线造影中的自动分岔检测
Asma Kerkeni, A. Ben Abdallah, A. Manzanera, M. H. Bedoui
{"title":"Automatic Bifurcation Detection in Coronary X-Ray Angiographies","authors":"Asma Kerkeni, A. Ben Abdallah, A. Manzanera, M. H. Bedoui","doi":"10.1109/CGIV.2016.70","DOIUrl":"https://doi.org/10.1109/CGIV.2016.70","url":null,"abstract":"The detection of vascular bifurcation in X-ray images is important for several medical applications. They are used as landmarks for image registration, vessel segmentation and tracking. Although many bifurcation extraction methods have been proposed in recent years, very few work deals with coronary bifurcation in X-ray images. In this paper, we present a new bifurcation detector based on the multiscale Hessian analysis. It can be seen as a scale specific Histogram of Eigenvectors weighted by the vesselness measure. Pixels with three peaks in their immediate neighbourhood are considered as bifurcation candidates. Based on this detector, a novel bifurcationness measure is proposed. The method is tested on real coronary artery angiographies and shows better results compared to other bifurcation detectors.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115044197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Grouping K-Means Adjacent Regions for Semantic Image Annotation Using Bayesian Networks 基于贝叶斯网络的k -均值分组相邻区域语义图像标注
M. Oujaoura, R. El Ayachi, B. Minaoui, M. Fakir, O. Bencharef
{"title":"Grouping K-Means Adjacent Regions for Semantic Image Annotation Using Bayesian Networks","authors":"M. Oujaoura, R. El Ayachi, B. Minaoui, M. Fakir, O. Bencharef","doi":"10.1109/CGIV.2016.54","DOIUrl":"https://doi.org/10.1109/CGIV.2016.54","url":null,"abstract":"To perform a semantic search on a large dataset of images, we need to be able to transform the visual content of images (colors, textures, shapes) into semantic information. This transformation, called image annotation, assigns a caption or keywords to the visual content in a digital image. In this paper we try to resolve partially the region homogeneity problem in image annotation, we propose an approach to annotate image based on grouping adjacent regions, we use the k-means algorithm as the segmentation algorithm while the texture and GIST descriptors are used as features to represent image content. The Bayesian networks were been used as classifiers in order to find and allocate the appropriate keywords to this content. The experimental results were been obtained from the ETH-80 image database.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128895551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification and Recognition of Dental Images Using a Decisional Tree 基于决策树的牙齿图像分类与识别
Hicham Riri, A. Elmoutaouakkil, A. Beni-Hssane, Farid Bourezgui
{"title":"Classification and Recognition of Dental Images Using a Decisional Tree","authors":"Hicham Riri, A. Elmoutaouakkil, A. Beni-Hssane, Farid Bourezgui","doi":"10.1109/CGIV.2016.82","DOIUrl":"https://doi.org/10.1109/CGIV.2016.82","url":null,"abstract":"Recognition and classification of images have a wide field of applications, especially in medical images. In order to provide orthodontists a solution for classification of patients' images to evaluate the evolution of their treatment, we need to use latest efficient technics of classification. In this paper, we propose an algorithm based on a decisional tree to classify and recognize 19 types of dental images. This hierarchical representation can be interpreted as a set of hierarchical types stored in leafs tree structure. By using several extracted features from color images acquired with a digital camera and grayscale images acquired by x-ray scanner. Such as facial features and skin color using YCbCr color-space. The proposed technique has been evaluated on a large data set of four main types namely: mold, intra-oral, extra-oral and radiographic images of different patients. Hence, experimental results demonstrate the good performances of this approach.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132667575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On Performance Evaluation of Registration Algorithms for 3D Point Clouds 三维点云配准算法的性能评价
Mouna Attia, Y. Slama, M. Kamoun
{"title":"On Performance Evaluation of Registration Algorithms for 3D Point Clouds","authors":"Mouna Attia, Y. Slama, M. Kamoun","doi":"10.1109/CGIV.2016.18","DOIUrl":"https://doi.org/10.1109/CGIV.2016.18","url":null,"abstract":"3D point Geometric alignment is a challenging task encountered in many scientific applications related to different fields such as robotics and computer vision. For this reason, the well-known 3D registration problem has been extensively studied, and a lot of efficient 3D registration algorithms (RA) exist. Even though many surveys in the literature addressed RA's, none to our knowledge is especially interested in their use in robotic fields and more precisely in dimensional control of mechanical pieces. Our present work involving both a theoretical and an experimental study compares some local and non-rigid RAs, used to align large point clouds representing mechanical pieces. This paper is two-fold and permits first to uncover the similarities and differences between four known RAs which are ICP, NDT, Softassign and RANSAC and then to establish an inter RAs comparative performance evaluation based on accuracy, speed and other new specific metrics we have defined.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Markovian Segmentation of Color and Gray Level Images 彩色和灰度图像的马尔可夫分割
M. Ameur, N. Idrissi, C. Daoui
{"title":"Markovian Segmentation of Color and Gray Level Images","authors":"M. Ameur, N. Idrissi, C. Daoui","doi":"10.1109/CGIV.2016.57","DOIUrl":"https://doi.org/10.1109/CGIV.2016.57","url":null,"abstract":"The image segmentation is a fundamental tool to analyze and detect objects of interest that can be applied in many fields (medicine, satellite). In this work, we present a classical Markov model for unsupervised image segmentation: \"Hidden Markov Chain with Independent Noise\" (HMC-IN) for segmenting both gray and color images. Then, we compare five iterative algorithms EM, GEM, SEM, MCEM and ICE for estimating parameters of this model under two final bayesian decision criteria MAP and MPM according to the execution time, the convergence, the PNSR index and the rate error.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"12 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Combined Approach Based on Fuzzy Classification and Contextual Region Growing to Image Segmentation 基于模糊分类和上下文区域增长的图像分割方法
Mahaman Sani Chaibou, Karim Kalti, Soulaiman Bassel, M. Mahjoub
{"title":"A Combined Approach Based on Fuzzy Classification and Contextual Region Growing to Image Segmentation","authors":"Mahaman Sani Chaibou, Karim Kalti, Soulaiman Bassel, M. Mahjoub","doi":"10.1109/CGIV.2016.41","DOIUrl":"https://doi.org/10.1109/CGIV.2016.41","url":null,"abstract":"We present in this paper an image segmentation approach that combines a fuzzy semantic region classification and a context based region-growing. Input image is first over-segmented. Then, prior domain knowledge is used to perform a fuzzy classification of these regions to provide a fuzzy semantic labeling. This allows the proposed approach to operate at high level instead of using low-level features and consequently to remedy to the problem of the semantic gap. Each oversegmented region is represented by a vector giving its corresponding membership degrees to the different thematic labels and the whole image is therefore represented by a Regions Partition Matrix. The segmentation is achieved on this matrix instead of the image pixels through two main phases: focusing and propagation. The focusing aims at selecting seeds regions from which information propagation will be performed. The propagation phase allows to spread toward others regions and using fuzzy contextual information the needed knowledge ensuring the semantic segmentation. An application of the proposed approach on mammograms shows promising results.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124380271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
O-LEACH of Routing Protocol for Wireless Sensor Networks 无线传感器网络路由协议的O-LEACH
Wassim Jerbi, Abderrahmen Guermazi, H. Trabelsi
{"title":"O-LEACH of Routing Protocol for Wireless Sensor Networks","authors":"Wassim Jerbi, Abderrahmen Guermazi, H. Trabelsi","doi":"10.1109/CGIV.2016.84","DOIUrl":"https://doi.org/10.1109/CGIV.2016.84","url":null,"abstract":"LEACH protocol called Low Energy Adaptive Clustering Hierarchy, is a protocol that allows the formation of distributed cluster. In each cluster, LEACH randomly selects some sensor nodes called cluster heads (CHs). The selection of CHs is made with a probabilistic calculation. It is supposed that each non-CH node joins a cluster and becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the network. Thus several sensor nodes cannot reach any CH. to solve this problem. We created an O-LEACH Orphan nodes protocol, its role is to reduce the sensor nodes which do not belong the cluster. O-LEACH present two scenarios, the first scenario consists, a cluster member will be able to play the role of a gateway which allows the joining of orphan nodes. The gateway node has to connect a number of orphan nodes, thus the gateway node is considered as a CH' for connected orphans. As a result, orphan nodes become able to send their data messages to the CH' which performs in turn data aggregation and send aggregated data message to the CH. The second scenario consists, if in an area not covered, the number of orphan nodes is very important, if number of cluster member is superior to number of orphan nodes, a sub-cluster will be created. The first orphan node reached the gateway (member of cluster) will be a CH'. O-Leach enables the formation of a new method of cluster, leads to a long life and minimal energy consumption. In orphan node possess enough energy and seeks to be covered by the network. The principal novel contribution of the proposed work is O-LEACH protocol which provides coverage of the whole network with a minimum number of orphaned nodes and has a very high connectivity rates. The simulation results show that O-LEACH performs better than LEACH in terms of coverage, connectivity rate, energy and scalability.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125218003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Image Authentication Based on Faber Schauder DWT 基于Faber Schauder DWT的图像认证
Assma Azeroual, K. Afdel
{"title":"Image Authentication Based on Faber Schauder DWT","authors":"Assma Azeroual, K. Afdel","doi":"10.1109/CGIV.2016.24","DOIUrl":"https://doi.org/10.1109/CGIV.2016.24","url":null,"abstract":"The technology development has made the modification of digital content easier. The need of authenticating digital content is increasing. Image authentication can be done by embedding a mark in the image using digital fragile watermarking. In this paper we propose a new approach for image authentication based on Faber Schauder Discrete Wavelet Transform (FSDWT) and Singular Value Decomposition (SVD). The watermark used to authenticate the image is extracted from the image dominant blocks using SVD and FSDWT. This watermark is embedded in the LSB plan of image. This one is characterized by its contours and its around textures which contain an important concentration of dominant coefficients that are used to select the dominant blocks. Any image modification will result in an important change in the dominant blocks. Hence, if the image is altered, the singular values of the dominant blocks will be dramatically changed, then we confirm that the image is not authentic.","PeriodicalId":351561,"journal":{"name":"2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129125152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信