2016 First International Conference on Multimedia and Image Processing (ICMIP)

1-3 June 2016

Filter Results

Displaying Results 1 - 25 of 28
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - vii
    Request permission for commercial reuse | |PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s): viii
    Request permission for commercial reuse | |PDF file iconPDF (221 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2016, Page(s): ix
    Request permission for commercial reuse | |PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2016, Page(s): x
    Request permission for commercial reuse | |PDF file iconPDF (201 KB)
    Freely Available from IEEE
  • Implementation of Real-Time Motion Detecting Algorithm Based on DSP

    Publication Year: 2016, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (646 KB) | HTML iconHTML

    An intelligent monitoring system was designed, which based on DM642 as the hardware platform, video capture, output circuit and Ethernet interface circuit are included. An improved three frame differencing is applied in video moving target detection. In this method, variation trend of video adjacent frame difference is used as the basis of video motion detecting alarm. Moving target will be extrac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Occluded Faces in Unconstrained Crowd Digital Pictures

    Publication Year: 2016, Page(s):5 - 9
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (505 KB) | HTML iconHTML

    Face detection and recognition mechanisms are widely used in many multimedia and security devices. The concept is called face detection and there are significant numbers of studies into face recognition, particularly for image processing and computer vision. However, there remain significant challenges in the existing systems due to limitations behind algorithms. Viola Jones and Cascade Classifier... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Transmission Line Foreign Body Detection Based on Motion Compensation

    Publication Year: 2016, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (640 KB) | HTML iconHTML

    Foreign body has been identified as a significant problem in power transmission due to the potential for system damage. In this paper, the euclidean distance method and forecasting of drift of area are fused to remedy the defect of key frames redundancy. An six parameters model is based on K-ORB features, which is generated by applying K-means algorithm to cluster ORB(Oriented FAST and Rotated BRI... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shot Boundary Detection based on Multilevel Difference of Colour Histograms

    Publication Year: 2016, Page(s):15 - 22
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1215 KB) | HTML iconHTML

    Shot boundary detection (SBD) is a fundamental step in video retrieval and analysis. Although the existing methods have achieved a lot on this field, this problem has not been sufficiently resolved, especially for the gradual boundary. This paper proposed a new method for SBD using a three-stage approach based on the Multilevel Difference of Colour Histograms. In the first stage, we detect the cut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Radiation Accumulation Based Detection Algorithm for Rectilinear-Motion Infrared Dim Target with Constant Acceleration

    Publication Year: 2016, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (468 KB) | HTML iconHTML

    The background radiation noise interference is a difficult technical problem for the dim signal detection. Radiation accumulation is one of effective methods to improve signal-to-noise (SNR). A novel detection algorithm based on radiation accumulation is proposed and the movement model of the target limited by uniform motion is extended to the rectilinear motion with constant acceleration. Firstly... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognition of Objects from Laser Scanned Data Points Using SVM

    Publication Year: 2016, Page(s):28 - 35
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1361 KB) | HTML iconHTML

    Nowadays, laser scanners are operated for data collection instead of video cameras. Laser scanners do not record real world videos except scanned points. Thus it takes away problems of private life conservation. Plus data processing gets very fast and easy. But from laser scanned data points, recognition of objects is a challenging task. This paper points to the usability of SVM to recognize pedes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Accurate Sign Language Recognizer Using Random Sphere Oracle

    Publication Year: 2016, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (314 KB) | HTML iconHTML

    In the present study, we propose an automatic sign language recognizer using an ensemble method called Random Sphere Oracle (RSO). The aim of using this method is to improve the accuracy of the existing sign language recognition (SLR) systems by using an efficient classifier to classify the sign language gestures into their respective classes. The design of the classifier composes of three steps. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tamper Detection of Electronic Bills Based on Semi-fragile Watermarking

    Publication Year: 2016, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (714 KB) | HTML iconHTML

    With more and more applications and developments of financial information in the world, electronic bills become more and more important in the financial industry due to its low costs and high efficiency. While in the implementation of electronic bill, there exist many problems relating to integrity guarantee and modification prevention. This paper introduces a method of electronic bills against mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proposed Robust Video Watermarking Algorithm: Enhanced Extraction from Geometric Attacks

    Publication Year: 2016, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (686 KB) | HTML iconHTML

    This paper proposes a new integrated system based on a video watermarking algorithm with high imperceptibility, improved security, robust against common image and video processing attacks and geometric attacks. The proposed algorithm is based on the features of a selected best algorithm by Agilandeeswari and Ganesan and its limitations. The advantages of the hybrid transform techniques of Nonsubsa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • No-Reference Image Quality Assessment for Defocus Restoration

    Publication Year: 2016, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1064 KB) | HTML iconHTML

    Even though both full-reference and no-reference image quality assessments are extensively applied to evaluate degraded images e.g. blurred, noised, compressed and distorted, few of them especially the no-reference species are suitable for image restoration. The goal of this work is to propose a no-reference quality assessment for defocus restoration. Because of that most optical systems have circ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fashion Harmony of Blouse Color and Pants/Skirts for Women Clothing Using Fuzzy Logic

    Publication Year: 2016, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (609 KB) | HTML iconHTML

    In this paper, we developed harmonizing system the color of outfit based on image processing. This system combines a fuzzy logic control with image processing. Conclusions are based on input color of pants using fuzzy systems, fuzzy decision output associated with the pair of color determination algorithm based on YCbCr color space. The harmonization of the output system was evaluated by 15 respon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interpolation between Outline Font Characters

    Publication Year: 2016, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1002 KB) | HTML iconHTML

    Outline fonts use Bezier curves to describe the outer boundaries of the characters of specific outline fonts. In this paper, we consider the interpolation problem between two different but quite similar outline fonts. Since the compositions of different outline fonts of a character may be different, such as the total number of curves a font of the character contains, and the endpoints of curve seg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Data Structure and File Format for Water-Jet Tactile Display

    Publication Year: 2016, Page(s):67 - 71
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (684 KB) | HTML iconHTML

    Tactile device is used to display tactile data in image mode, which is normally received from a computer. In most cases, the original tactile picture is converted from the visual image, and it would be very convenient for saving and data conversion if tactile data was packaged in file format. In this paper, a file format is constructed for saving data in water-jet tactile, and a mapping algorithm ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key Technology Research for Content Supervision Based on KAD Network

    Publication Year: 2016, Page(s):72 - 77
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (571 KB) | HTML iconHTML

    To solve the issue that it is difficult to monitor the content in the file sharing system because of occult of KAD message, a novel monitoring approach was proposed to obtain the content by intercepting the interactive message for a specified node on the network. First of all, the HashID for a keyword in the message of a supervised node was extracted by using ID mapping method. Secondly, a lightwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Carrier Tracking Loop in Satellite Navigation Receiver Based on High-Order Doppler Parameter Detection Algorithm

    Publication Year: 2016, Page(s):78 - 82
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (399 KB) | HTML iconHTML

    To improve the tracking performance of global positioning system receivers, we have proposed a carrier loop structure based on a high-order Doppler parameter detection algorithm. Applied when the input of the tracking loop is the carrier signal, this solution begins by establishing a relationship between the first and second order rate of change of the Doppler frequency shift and the output of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach of Ontology Based Knowledge Base Construction for Chinese K12 Education

    Publication Year: 2016, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1123 KB) | HTML iconHTML

    The increasing learning materials on the Internet bring the learners a flood of educational resources, along with many difficulties in the learning process. It becomes much harder for the learners to find the required resources and get the right knowledge from these unsorted resources. To give the learners a better learning experience and improve the efficiency of the education based on the Intern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Test Cases Grouping and Iteration Repair to Fix Multi-points Bug

    Publication Year: 2016, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (541 KB) | HTML iconHTML

    Currently, most automated program repair techniques are based on the test suite to constrain the generation of the patch. However, these techniques are facing an important challenge-how to fix multi-point bugs. A multi-point bug exists in a number of statements, and is always cannot be repaired by mutating a single statement. This paper proposes a method to repair multi-point bugs by grouping fail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Roadblocks to UCD Integration

    Publication Year: 2016, Page(s):95 - 98
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (551 KB) | HTML iconHTML

    With new technologies and a plethora of products in the market, there has been a continuous shift in the User requirements. User Experience has become a driving factor in governing the success or failure of the product. Even established products that are not ready to adapt to the new perspective of a good user experience (Ux), stand to lose market share, whereas their competitors that can provide ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.