By Topic

Image Analysis and Processing, 1999. Proceedings. International Conference on

Date 27-29 Sept. 1999

Filter Results

Displaying Results 1 - 25 of 210
  • Proceedings 10th International Conference on Image Analysis and Processing

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (680 KB)
    Freely Available from IEEE
  • A new evolutionary learning model for handwritten character prototyping

    Publication Year: 1999, Page(s):830 - 835
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB)

    The work reported in this paper is aimed at exploiting evolutionary learning algorithms for producing the set of prototypes to be used by a handwriting recognition system. In this paper we propose a new evolutionary learning model that combines the power of search of a classical evolutionary algorithm, namely a breeder genetic algorithm, with a novel mechanism for implementing the interaction betw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index of authors

    Publication Year: 1999, Page(s):1227 - 1232
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • A virtual reality environment for Web browsing

    Publication Year: 1999, Page(s):1009 - 1014
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    We present an environment for navigating the Web through a virtual reality space. The two-dimensional Internet space is mapped into virtual worlds according to predefined and/or inferred metaphors. Web and metaphor elements are given a conceptual representation to highlight their similarities, which are used to construct an appropriate mapping. The derived virtual representation is realized throug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time surveillance system detecting persons in complex scenes

    Publication Year: 1999, Page(s):1112 - 1115
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    This paper presents a visual surveillance system that can work in real time under various disturbances, such as changes of lighting and movements of background objects. We propose a robust method of detecting moving objects based on voting in a space-time cube. We have implemented this method on an image processor using multiple DSP boards. Experimental results have shown that the system can detec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple and efficient connected components labeling algorithm

    Publication Year: 1999, Page(s):322 - 327
    Cited by:  Papers (54)  |  Patents (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    We describe a two-scan algorithm for labeling connected components in binary images in raster format. Unlike the classical two-scan approach, our algorithm processes equivalences during the first scan by merging equivalence classes as soon as a new equivalence is found. We show that this significantly improves the efficiency of the labeling process with respect to the classical approach. The data ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Euclidean distance transform on a dedicated architecture based on a reconfigurable mesh network

    Publication Year: 1999, Page(s):235 - 240
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    This paper describes a parallel algorithm for the Euclidean distance transform on a special-purpose architecture based on a reconfigurable mesh interconnection network. The proposed architecture, which supports the Euclidean distance transform algorithm as well as other low-level image processing algorithms, is particularly interesting because it can be effectively implemented in hardware and it c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An interactive visual environment to understand, model and exploit user subjectivity in image retrieving systems

    Publication Year: 1999, Page(s):981 - 986
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    The research discussed in this paper focuses on the emergence of a multimedia language for humans and technology to communicate highly subjective concepts (such as impressions, feelings, and emotions). Nowadays technology is not just a tool for realizing tasks, it also serves as a medium for people to communicate. For that reason, the issue of endowing computers with the ability to understand and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attributed tree matching and maximum weight cliques

    Publication Year: 1999, Page(s):1154 - 1159
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    A classical way of matching relational structures consists of finding a maximum clique in a derived “association graph”. However it is not clear how to apply this approach to problems where the graphs are hierarchically organized, i.e., are trees, since maximum cliques are not constrained to preserve the partial order. We have recently provided a solution to this problem by constructin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the page logical structure

    Publication Year: 1999, Page(s):1003 - 1008
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    We present an algorithm to segment and interpret technical journal pages. Our method has some advantages: it performs a fine segmentation and classification, after a preliminary step of page cleaning, and analyses the spatial disposition of the classified blocks in the page, which is generally not included in other methods. Moreover, there is a choice of working on the source page at two different... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image analysis for video surveillance based on spatial regularization of a statistical model-based change detection

    Publication Year: 1999, Page(s):1108 - 1111
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Advanced video surveillance applications require two successive steps: image analysis and content understanding. The first step analyses and extracts the characteristics of the video sequence. It defines the regions or the objects of interest according to their spatial/temporal properties. This analysis results in a segmentation of the video sequence. This is interpreted by the content understandi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SIC DB: multi-modal database for person authentication

    Publication Year: 1999, Page(s):704 - 708
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    This paper presents a multi-modal database intended for person authentication from multiple cues. It currently contains three sessions of the same 120 individuals, providing profile and frontal color images, 3D facial representations and many French and some English speech utterances. People were selected for their availability so that new sessions will be easily acquired. Individual recognition p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unsupervised multiscale image segmentation

    Publication Year: 1999, Page(s):316 - 321
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    We propose a general unsupervised multiscale feature-based approach towards image segmentation. Clusters in the feature space are assumed to be properties of underlying classes, the recovery of which is achieved by the use of the mean shift procedure, a robust nonparametric decomposition method. The subsequent classification procedure consists of Bayesian multiscale processing which models the inh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated lesion detection methods for 2D and 3D chest X-ray images

    Publication Year: 1999, Page(s):768 - 773
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    The purpose of this work is to present some technical approaches of our computer-aided detection (CAD) system for chest radiograms and helical CT scans, and also evaluate that by using three databases. The CAD includes some methods to detect lesions and to eliminate false-positive findings. The detection methods consist of template matching and artificial neural network approaches. A genetic algor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to rotate a camera

    Publication Year: 1999, Page(s):606 - 611
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    A procedure is proposed that, given any rotating device to support a camera, places the camera's center of projection to within a tenth of a millimeter from the axis of the rotating device, even with wide angle lenses with severe distortion. Results are experimentally validated by checking that all the camera projection centers as computed through an off-the-shelf calibration method are at the sam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of texture features based on Gabor filters

    Publication Year: 1999, Page(s):142 - 147
    Cited by:  Papers (36)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The performance of a number of texture feature operators is evaluated. The features are all based on the local spectrum which is obtained by a bank of Gabor filters. The comparison is made using a quantitative method which is based on Fisher's criterion. It is shown that, in general, the discrimination effectiveness of the features increases with the amount of post-Gabor processing View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A navigation system for vision-guided mobile robots

    Publication Year: 1999, Page(s):566 - 571
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    In this paper we present a vision system for an autonomous mobile robot. Our robot performs goal-reaching tasks into unknown indoor environments by using visual landmarks. Robot vision processes are performed at different levels of abstraction in order to extract useful information for robot navigation. The system, based on the HSV color space, is implemented by two groups of parallel processes: a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed output encoding for multi-class pattern recognition

    Publication Year: 1999, Page(s):229 - 234
    Cited by:  Papers (3)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Fingerspelling recognition and handshape recognition are two examples of real-world, multi-class recognition problems consisting of 26 and 78 classes respectively. While it is theoretically possible to solve any multi-class problem with a single “smart” classifier the complexity of such a classifier is usually prohibitively high. This paper looks at several approaches to solving a nume... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using fractal encoding for image indexing

    Publication Year: 1999, Page(s):975 - 980
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    As already documented in the literature, fractal image encoding can be exploited to obtain good image indexing systems that are able to deal with the images in compressed form, which makes them suitable for use with large databases. The system proposed in this paper has the additional interesting property of being invariant under two classes of pixel intensity transformations. This property makes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Filtering and prediction techniques in radar tracking of vehicles for assisted driving

    Publication Year: 1999, Page(s):1148 - 1151
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    An advanced system of driving assistance is considered, which is based on a network of radar (and, in some situations, infrared) sensors alongside the motorway. The system is capable of tracking each single vehicle in the coverage area individually and to transmit the picture of vehicle positions and velocities to a control center in real time. The latter processes the received data, in order to d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face processing and recognition using learning and evolution

    Publication Year: 1999, Page(s):254 - 257
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    One of the most challenging tasks for visual form (`shape') analysis and object recognition is the understanding of how people process and recognize each other's faces, and the development of corresponding computational models. This paper describes the important and successful role learning and evolution plays in improved and robust face coding and classification schemes. In particular we describe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using normal patterns in handwritten character recognition

    Publication Year: 1999, Page(s):997 - 1002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    This paper presents a system that overcomes the dependence on pattern transformation, like translation, rotation, scaling and further deformations of the input to a recognition system, by reducing the pattern to a normal form. The reduction may be viewed as pre-processing that uses different algorithms to reduce the pattern to normal form at: 0, 1, 2, .., n-level. Our system performs, on patterns ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-agent framework for visual surveillance

    Publication Year: 1999, Page(s):1104 - 1107
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    We describe an architecture for implementing scene understanding algorithms in the visual surveillance domain. To achieve a high level description of events observed by multiple cameras, many inter-related event-driven processes must be executed. We use the agent paradigm to provide a framework in which these processes can be managed. Each camera has an associated agent, which detects and tracks m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A golden block self-generating scheme for continuous patterned wafer inspections

    Publication Year: 1999, Page(s):436 - 441
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    This paper presents a novel technique for detecting defects in periodic 2D wafer images when there is no image database or priori knowledge. It creates a golden block database from the wafer image itself and customizes its content when needed. Spectral estimation is used in the first step to derive the periods of repeated patterns in both directions. Then a building block representing the structur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shape reconstruction of 3D bilaterally symmetric surfaces

    Publication Year: 1999, Page(s):76 - 81
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    The paper presents a new approach for shape recovery based on integrating geometric and photometric information. We consider 3D objects which are symmetric with respect to a plane (e.g., faces) and their reconstruction from a single image. Both the viewpoint and the illumination are not necessarily frontal. In principle, no correspondence between symmetric points is required, but knowledge about a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.