By Topic

Digital Media and its Application in Museum & Heritages, Second Workshop on

Date 10-12 Dec. 2007

Filter Results

Displaying Results 1 - 25 of 88
  • Second Workshop on Digital Media and its Application in Museum & Heritage - Cover

    Publication Year: 2007 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (822 KB)  
    Freely Available from IEEE
  • Second Workshop on Digital Media and its Application in Museum & Heritage - Title page

    Publication Year: 2007 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (69 KB)  
    Freely Available from IEEE
  • Second Workshop on Digital Media and its Application in Museum & Heritage - Copyright notice

    Publication Year: 2007 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (58 KB)  
    Freely Available from IEEE
  • Second Workshop on Digital Media and its Application in Museum & Heritage - TOC

    Publication Year: 2007 , Page(s): v - x
    Save to Project icon | Request Permissions | PDF file iconPDF (139 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2007 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (85 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2007 , Page(s): xii - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • A Color Watermarking Scheme Based on Block-SVD and Arnold Transformation

    Publication Year: 2007 , Page(s): 3 - 8
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (444 KB) |  | HTML iconHTML  

    This paper proposes a color watermarking scheme based on block-SVD and Arnold transformation. Color watermark means more meaningful information could be concealed in host image. Block-SVD has faster speed than SVD algorithm. We can adjust the block size according to the amount of the watermark to be embedded. Watermark's pixel is buried to the maximum singular value (SV) bit of each block obtained from the block-SVD transformation of host image in each RGB channel. In order to enhance the security and the resistance to image cropping of the scheme, Arnold transformation is applied to watermark scrambling pretreatment. Experimental results show robustness of the proposed scheme against common image processing operations, such as Gaussian noise addition, low pass filtering, lossy JPEG compression, rescaling, cropping and so on. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attack on Cocktail Watermarking Based on High False Positive Probability

    Publication Year: 2007 , Page(s): 9 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (304 KB) |  | HTML iconHTML  

    In this paper, a simple and effective attack on a non-blind robust digital watermark method, cocktail watermarking, was proposed. After reviewing the principle of the cocktail watermarking, the paper discovered that the cocktail watermarking scheme can drive a very high false positive probability although with high robustness simultaneously. Furthermore, a counterfeiting attack to generate a watermarked image with an original image was proposed, which can pass through the watermark extraction and watermark authentication successfully in the case of none watermark embedded. This attack scheme demonstrates that the watermarking algorithm is flawed which can be used by the malicious content owner to forge and distribute a watermarked image to the unknown users. At last, simulations of the counterfeiting attack on cocktail watermarking are devised and the results show that this attack is successful with a reasonable image quality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Multiple Watermarks System

    Publication Year: 2007 , Page(s): 15 - 18
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (145 KB) |  | HTML iconHTML  

    A multiple watermarking algorithm based on the code division multiple access (CDMA) technique is presented. According to the multiple accessing technique of the CDMA system, multiple copyright identifiers are embedded into digital images. Performance evaluation of this multiple watermarks system are presented. This paper proposed a analysis of multiple watermarks system capacity. When two watermarks are embedded in an image at the same time, the capacity is larger than the capacity when the single watermark is embedded, and is smaller than the sum of the capacity of two watermarks are embedded respectively. Bit error rate (BER) performance of multiple watermarks system is also evaluated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Multipurpose Watermarking Scheme for Copyright Protection and Content Authentication

    Publication Year: 2007 , Page(s): 19 - 24
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (614 KB) |  | HTML iconHTML  

    novel multipurpose image watermarking algorithm for copyright protection and content authentication is proposed in this paper. The basic idea is to embed robust and fragile watermarks into different components of gray scale image simultaneously. Based on chaotic maps and nonuniform discrete Fourier transform (NDFT), the robust watermark is firstly embedded into the middle frequency coefficients of NDFT domain by odd-even quantization method; in succession the fragile watermarks are embedded into LSB and less LSB planes according to chaotic stochastic sequence. Simulation results show that the robust watermark has a strong robustness to common image processing operations and the fragile watermarks have ability to discriminate tamper type of watermarked image and capability of tampering restoration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Blind Robust Digital Watermarking on 3D Meshes

    Publication Year: 2007 , Page(s): 25 - 31
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (568 KB) |  | HTML iconHTML  

    A novel blind watermarking method on 3D meshes is proposed in this paper. PCA (primary component analysis) is used for 3D meshes 'preprocessing. Octree structure is obtained after octree partition of 3D meshes. Meaningful watermark is then embedded into SC (Single Child) nodes in bottom level of octree. This method is robust against translation, rotation, uniform scaling and vertex reordering attacks with a big embedding space. Higher nodes of octree are used to construct 'zero-watermark', which can resist simplification, noise and remeshing attacks. This method can be used directly on point cloud as it does nothing with topology of meshes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Image Restoration Based on Robust Estimation in Drowning Warning System

    Publication Year: 2007 , Page(s): 33 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (394 KB) |  | HTML iconHTML  

    For the underwater image of swimming pool, its S/N is low and the edges are fuzzy. If use traditional image restoration method to dispose it directly, the result is not expected, existing weaknesses such as enlarged edge, denoise incompletely and so on. According to the high stabilization of robust estimation to noise, we combined robust estimation technique with image restoration method together, and proposed an adaptive robust image smoothing algorithm. This method set up an image model based on robust M-estimator, and saw the image restoration as a problem of position estimation. Experiments with underwater images of swimming pool proved that the proposed approach can preserve the structure information in the original image while smoothing it simultaneously. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capturing Character Contours from Images of Ancient Chinese Calligraphy

    Publication Year: 2007 , Page(s): 36 - 41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (637 KB) |  | HTML iconHTML  

    novel methodology is proposed to capture character contours from images of ancient Chinese calligraphy which mainly includes two steps: feature points detecting from character contours and contour segment approximating. A new feature-point-detection method called PCACSS (principle component analysis based curvature scale space) is thus proposed. Compared with several existing methods for feature-point-detection, it is robust to noise and can accurately detect feature points from character contours automatically. With feature points determined by PCACSS, the character contours are divided into some contour segments, each contour segment is then approximated with a straight line or Bezier curve depending on the least square error. The proposed method has been implemented and tested on a wide variety of calligraphy images. Resultant outline fonts captured from calligraphy images with our method are visual pleasing as demonstrated by the examples shown in this paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Yellow License Plate Location Method Based on RGB Model of Color Image and Texture of Plate

    Publication Year: 2007 , Page(s): 42 - 46
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (301 KB) |  | HTML iconHTML  

    This paper presents a yellow license plate location algorithm employing RGB model of color image and black-white texture analysis of the plate directly to extract vehicle license plate from a complicated background image. According to the background color of the license plate in RGB color spaces, we transform the RGB image into a grayscale image directly as strengthening the background color of the license plate, then partition the intensity image to obtain a binary image which can stand out the license plate part. We filter out other area whose color is similar to the license plate by analyzing the texture characteristic. The tests show that this location method is straightforward, high efficiency, robust to interfere as well as high speed, better effect and wide application area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Color Prior Knowledge-Based License Plate Location Algorithm

    Publication Year: 2007 , Page(s): 47 - 52
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (566 KB) |  | HTML iconHTML  

    Vehicle license plate location is the key of the vehicle plate recognition system. This paper proposes a new method that sufficiently utilizes the color feature such as fixed color collocation, color centers and distribution in the plate region. In this method, firstly, the input image is convolved with 1-D Gaussian filter, and the regions which have the structure and texture are similar to the license plate are extracted. Then improved fuzzy C-means (FCM) is used to color clustering in the RGB color space. Finally, according to the clustering center and color distribution, the plate region was chosen from the candidate regions. The experimental results of more than 250 images collected show that the method is more accurate and robust to environment variation, and the rate of location is above 98%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Denoise Based on Soft-Threshold and Edge Enhancement

    Publication Year: 2007 , Page(s): 53 - 56
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (476 KB) |  | HTML iconHTML  

    In order to eliminate noise and preserve the edge and texture detail in image, this article proposes a method of image denoise based on soft-threshold and edge enhancement. To enhance edge, first we use the canny edge detection operator to detect the feature of the image, then we preprocess the edge image with a flat operator, next we use stationary wavelet transform to process the processed edge image and noisy image, then we add these wavelet coefficients at the corresponding level, so we can use the soft threshold denoise technology to eliminate the noise. Since the feature is enhanced before soft threshold denoise, the feature can be preserved well. From the result we can see that comparing to the wiener filter, this denoise method has visually pleasing image and the PSNR is improved. Comparing the traditional soft threshold denoise technology, this method has 1-2dB improvement in PSNR. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiscale Variational Threshold SAR Image Denoising Based on Quad-tree Complex Wavelet Packets Transform

    Publication Year: 2007 , Page(s): 57 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (420 KB) |  | HTML iconHTML  

    A new image transform, namely, the quad-tree complex wavelet packets transform (QCWPT) is introduced ,which both has shift invariance and good direction analysis ability and other merits of the dual-tree complex wavelet transform (DCWT), and has the ability of analyzing the high frequency detail signal carefully like the wavelet packet transform (WPT). Furthermore, a novel image denoising scheme based on QCWPT was presented via setting multiscale variational thresholding method,which accords with the characteristic that the high frequency coefficient modules and the variance of the noise attenuate rapidly along with the decomposition scale increasing, the best complex wavelet packets basis was determined and processed at the largest scale. In numerical comparison with various methods, the presented scheme outperforms the traditional Wiener filtering, DCWT and QCWPT in terms of the equivalent number of looks (ENL), the figure of merit (FOM) and visual effects. Experiments also show that the presented scheme could not only remove the noises effectively, but also reserve the SAR image texture and edge details better. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Method for Classification of Ancient Coins Based on Image Textures

    Publication Year: 2007 , Page(s): 63 - 66
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (454 KB) |  | HTML iconHTML  

    A novel approach is proposed to extract textual information for classification and recognition of ancient coins, which is based on tree-structured wavelet transform (TWT) and ant colony optimization (ACO) algorithm. Traditional methods of textural extraction focus on information only in low frequency channels. In this paper, in order to obtain texture information in all channels, incomplete TWT is implemented, and an energy map containing energy value and energy channels is constructed accordingly. Main energy channels and their energy in this map will be recorded as the final textural characteristics for classification and recognition. In image preprocessing, the ACO algorithm combining information entropy is utilized to search an optimal threshold for texture segmentation of ancient coin images. Results of simulation demonstrate special efficiency and feasibility of this novel method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Key Image Processing Technology in the Inspection of Packing Quality for Small-Pack Cigarettes

    Publication Year: 2007 , Page(s): 67 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    Image processing is a key factor in the inspection of packing quality by machine vision. Targeting the inspection of packing quality for small-pack cigarettes in tobacco enterprises, this paper proposes a series of key image processing techniques: a fast algorithm for small-pack edge collecting based on fast Hough transformation, an online differentiating algorithm based on GLCM parameters, and packing-flaw detection based on SVMs, etc. The key techniques are applicable to the inspection of external product-packing quality, and have engineering referential value for constructing product inspection systems based on machine vision. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognition of Defects in Steel Surface Image Based on Neural Networks and Morphology

    Publication Year: 2007 , Page(s): 72 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (243 KB) |  | HTML iconHTML  

    A hybrid image recognition approach based on 'Neural Networks and Morphology is presented to detect various defects in steel surface image, because signal-to-noise ratio of steel surface image is very low, and defection targets are small and their shape is irregular. Firstly, we present the comparison of different segmentation results of steel surface image under BP neural and RGB threshold value method, and draw a conclusion that BP neural network is better than the RGB threshold value method. Secondly, noise is filtered by morphological processing. In this way, different defection was auto-segmented and located. Experiment results show this method can detect different defection and is strongly robust. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simultaneous Multi-view Registration Algorithm for Multiple Range Images

    Publication Year: 2007 , Page(s): 79 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1259 KB) |  | HTML iconHTML  

    To deal with the problems of large amount of data and complex optimization in global registration, we propose an efficient global registration algorithm. In order to eliminate outliers, we propose a statistic method based on uniform distribution test. In order to accelerate to search for corresponding points, we propose a method to establish a corresponding point cache, which can improve the efficiency of space and time. In order to optimize the error between corresponding points, we propose a method based on pseudoinverse matrix, which is strong in numerical stability. And the algorithm is also fit for parallel computation. It can be proved by experiment that this algorithm can eliminate accumulative error and optimize global error efficiently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-perspective Panorama Based on the Improved Pushbroom Model

    Publication Year: 2007 , Page(s): 85 - 90
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (476 KB) |  | HTML iconHTML  

    A novel approach of multi-perspective panorama (route panorama) auto-generating is presented, which is based on the integration of pushbroom model and perspective projection model. This method can avoid objects distortion and information loss caused by the rate change of the moving camera and/or the camera carrier. Further more, this method has overcome various unstabilizing factors through stability analysis and processing. Therefore, we can generate smooth MPP more easily. The experiment shows that our approach has lower demand for video/image capturing device and capturing environment, and has some advantages in imaging characteristics compared with other available approaches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • View Synthesis from Two Unrectified Images

    Publication Year: 2007 , Page(s): 91 - 96
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2288 KB) |  | HTML iconHTML  

    Interpolating views of real objects allows rendering realistic virtual views created without explicit 3D models. This paper proposes a method for rendering arbitrary views from a pair of uncalibrated images. The proposed method utilizes the matching of sparse edge points along epipolar lines instead of computing the entire dense disparity map for the view interpolation. Unavoidably, morphing image patches out of the field-of-view introduces holes in the virtual view. We fills such holes in a synthesized virtual view by blending neighboring colors. The experimental results show the viability of the proposed method for the wide baseline images on which a dense disparity is difficult to be obtained. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DVS Research on Image Based Modeling in Virtual Engineering

    Publication Year: 2007 , Page(s): 97 - 101
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1433 KB) |  | HTML iconHTML  

    This article presents a relative complete desktop vision system (DVS) for 3D model reconstruction based image pairs, which can be used for modeling in virtual engineering. In the system, object feature data is measured with photogrammetry technologies; noise is filtered in adaptive morphology method; data is then compressed via non-uniform grid and median filtering. Experiments prove that the result data can be used to construct 3D model. Most algorithms in this system are base image processing technologies, fast and easy to be implemented. The desktop vision system can be used to construct 3D model conveniently and rapidly in virtual engineering or some other areas. It is smart and worth to be promoted. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Presentation and Animation of Qingming Festival by The Riverside

    Publication Year: 2007 , Page(s): 102 - 105
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (329 KB) |  | HTML iconHTML  

    In this paper, we present a novel method to display a famous ancient Chinese painting for the purpose of cultural heritage preservation. The framework of multi-projector display wall based digital storytelling system is introduced. The aim of this system is to exhibit the ancient painting on a large display wall dynamically. Before being projected, the painting has to be repainted with very high resolution and segmented into many smaller tiles, so that it can be displayed on the large flat display wall. Additionally, in order to make this still painting attractive and living, the technique of digital storytelling is used. So a script called water transportation story is drafted to tell a story about the prosperous city. We extract the movable objects from the original painting and redraw them with three dimensional figures, and then the computer animation technology is used to animate them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.