By Topic

Information Processing, 2009. APCIP 2009. Asia-Pacific Conference on

Date 18-19 July 2009

Go

Filter Results

Displaying Results 1 - 25 of 163
  • [Front cover - Vol 2]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2945 KB)
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2009, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (221 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs - Volume 2

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee - Volume 2

    Publication Year: 2009, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Face Recognition Using Two-Dimensional Discriminant Locality Preserving Projections

    Publication Year: 2009, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    One of the key issues of face recognition is to extract the features of face images, and a new method of feature extraction, two-dimensional discriminate locality preserving projections (2D-DLPP), is proposed. 2D-DLPP benefits from three techniques, i.e., locality preserving projections (LPP), image based projection and discriminant analysis. Firstly, LPP is an effective feature extraction method ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification of Beef Marbling by Image Processing

    Publication Year: 2009, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The price of beef is determined by the carcass grade,and beef grade usually evaluated subjectively based on marbling level. It is a good method to determine marbling level with computer vision instead of person. The method assessing beef grade based on image processing was studied in this paper.The image of longissimus dorsi muscle was segmented using threshold, dilation and erosion, and the param... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PMMR: A Method for Masking Repeats in DNA Fragment Assembly

    Publication Year: 2009, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    A method named PMMR (previously merging for masking repeats) is proposed in this paper for masking repeats in DNA fragment assembly. The method firstly identifies and counts the fragments including a same k-mer substring by scanning the shotgun data set. Then, it merges these fragments by the same k-mer substring. Based on merging, the method can not only mark the position of the repeats, but also... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Video Zero-Watermark Algorithm against RST Attacks

    Publication Year: 2009, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    This paper has brought forth a zero-watermark algorithm for video which is based on the Krawtchouk moment invariants of original images to counterattack RST attack. Due to the stability of the seven lower Krawtchouk moment invariants exhibited in geometrical transformation, the seven moment invariants of the video frames should be calculated first and then construct the watermark sequence with zer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Watermarking Scheme Based on Singular Value of Decomposition in DWT Domain

    Publication Year: 2009, Page(s):19 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    Digital watermarking is an effective way to protect copyright. Using the characteristics of discrete wavelet transform (DWT) and singular value decomposition (SVD), a digital image watermarking algorithm based on DWT and SVD is proposed. The original image is transformed by DWT and SVD and the watermarking image is processed by Arnold transform and SVD. The watermarking image processed is embedded... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast and Robust Image Registration for 3D Face Modeling

    Publication Year: 2009, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    One method of 3D face modeling is constructing a subspace of 3D face image by a set of personspsila 3D face image. It is crucial to register each 3D face image with a reference face image. The current state of the art in image registration is best represented by the well-known iterative closest point (ICP) algorithm and numerous variations on it. Although this method is effective in many domains, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coke Photomicrograph Segmentation Based on an Improved Mean Shift Method

    Publication Year: 2009, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    In the view of characteristics for coke micrograph, a segmentation algorithm combining mean shift and edge confidence, is proposed. Firstly, the edge confidence of image pixels is calculated, and with the edge confidence the weighting function of mean shift algorithm is computed, the sampling points of feature space are weighted in order to improve the accuracy of detected modes. Secondly, coke im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Multi-view Autostereoscopic Display and Its Key Technologie

    Publication Year: 2009, Page(s):31 - 35
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Multi-view autostereoscopic three-dimensional (3D) display has been one of the most popular research issues in the world. And 3D displays are classified into two types: stereoscopic 3D display and autostereoscopic 3D display. The former includes head mount system, anaglyph system, polarized filter system, field sequential system and so on. The latter is also called true 3D display, it provides 3D ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Non-equidistant Optimum GM(1,1) with Modified nth Component be Taken as Initial Value and Its Application to Metal Cutting

    Publication Year: 2009, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Based on the exponential trait of grey model and the definition of integral, the reconstruction method of GM(1, 1) modelpsilas background value of non-equal distance sequence was put forward and a kind of non-equidistant optimum grey model GM(1, 1) with optimizing modified the nth components taken as initial value to test data process was proposed, the method of precision inspection was introduced... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incrementally Updating Concept Context Graph (CCG) for Focused Web Crawling Based on FCA

    Publication Year: 2009, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Focused Web crawler collects relevant Web pages of interested topics from the Internet. Most searchers have studied strategy based on an initial model to gather as many relevant Web pages as possible in the focused Web crawling. However, Web information continually change over time, the initial model representing outdated information canpsilat reflect userpsilas interested topics rightly. In this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Nonlinear Filter Based on Row and Column Operation for Positive Impulsive Noise Reduction

    Publication Year: 2009, Page(s):44 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    The positive impulsive noise may be caused by electron radiation in the photo-electronic imaging system. A novel nonlinear filter based on row and column filtering(RCF) was presented and its denoise and detail preservation properties were analyzed. According to the statistical behaviors of each row and column of an image, the pixel value is determined by its neighborhood. Each row is operated firs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Higher Order DCT Difference to Effective Improve Markov Process Based JPEG Steganalysis Detection Rate

    Publication Year: 2009, Page(s):47 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    In recent, a Markov Process based approach has been proposed to effective attacking JPEG Steganography, and the experimental works had demonstrated that scheme has outperformed the existing steganalyzers in attacking JPEG steganography. To improve that original Markov Process based approach, several variants based that scheme has been proposed and experimented including using JPEG 1D array, using ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Salient Points and Visual Perception Texture Features for Image Retrieval

    Publication Year: 2009, Page(s):51 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    This paper researches on content-based image retrieval based on salient points and visual perception texture features. First, we analysis local features for image indexing. In content-based image retrieval, the method based on salient points detection is one of the most active research areas for it can represent the local properties of the image. This paper introduces an improved salient points de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Texture Image Classification Using Perceptual Texture Features and Gabor Wavelet Features

    Publication Year: 2009, Page(s):55 - 58
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Texture is a key component for human visual perception and plays an important role in image-related applications. This paper combines perceptual texture features and Gabor wavelet features for texture image classification. Three new texture features which are proved to be in accordance with human visual perception are introduced. These features include directionality, contrast and coarseness in wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Image Annotation Based on Improved Relevance Model

    Publication Year: 2009, Page(s):59 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Automatic image annotation is an important and promising solution to narrow the semantic gap between low-level visual feature and high-level semantic concept. Here we propose an improved relevance model to solve image annotation problem. Unlike the classical approaches including classification, and translation model, the improved model is capable of discovering the correlation between blobs (segme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matching Road Networks Extracted from Aerial Images to GIS Data

    Publication Year: 2009, Page(s):63 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    In aerial images, road network is the most salient artificial object, and could provide lots of geographical information. Thus it is very valuable for navigation systems,e.g. cruise missile or UAV(unmanned Aerial Vehicle) navigation system. With the presence of GIS in which road network is also the most common data, the position of aerial image can be located by matching it with a model generated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acquire the Affine Transformation Coefficients in the Chinese Character Intelligent Formation

    Publication Year: 2009, Page(s):67 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    In the Chinese character intelligent formation, the same basic element has different position, size and shape in different Chinese characters. The transformation from the basic element to the Chinese character can be realized by affine transformation, and a novel approach was proposed to acquire the transformation coefficients of basic elements. The interested region was determined based on the st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.