Search results for "Computer Vision"

showing 10 items of 2353 documents

Texture classification for content-based image retrieval

2002

An original approach to texture-based classification of regions, for image indexing and retrieval, is presented. The system addresses automatic macro-textured ROI detection, and classification: we focus our attention on those objects that can be characterized by a texture as a whole, like trees, flowers, walls, clouds, and so on. The proposed architecture is based on the computation of the /spl lambda/ vector from each selected region, and classification of this feature by means of a pool of suitably trained support vector machines (SVM). This approach is an extension of the one previously developed by some of the authors to classify image regions on the basis of the geometrical shape of th…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniContextual image classificationComputer sciencebusiness.industryFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPattern recognitionImage segmentationContent-based image retrievalCBIR texture analysisObject detectionImage textureFeature (computer vision)Computer visionArtificial intelligencebusinessImage retrievalProceedings 11th International Conference on Image Analysis and Processing
researchProduct

State of the art in passive digital image forgery detection: copy-move image forgery

2017

Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is cop…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCopyingCopy-move forgery Digital forensics Duplicated detection Manipulation detectionbusiness.industryComputer sciencemedia_common.quotation_subjectDigital forensicsComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineering02 engineering and technologyImage (mathematics)Digital imageArtificial IntelligenceOriginalityPattern recognition (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionRelevance (information retrieval)Computer Vision and Pattern RecognitionArtificial intelligenceState (computer science)businessmedia_commonPattern Analysis and Applications
researchProduct

Fast adaptive frame preprocessing for 3D reconstruction

2015

Abstract: This paper presents a new online preprocessing strategy to detect and discard ongoing bad frames in video sequences. These include frames where an accurate localization between corresponding points is difficult, such as for blurred frames, or which do not provide relevant information with respect to the previous frames in terms of texture, image contrast and non-flat areas. Unlike keyframe selectors and deblurring methods, the proposed approach is a fast preprocessing working on a simple gradient statistic, that does not require to compute complex time-consuming image processing, such as the computation of image feature keypoints, previous poses and 3D structure, or to know a prio…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniDeblurringSettore INF/01 - Informaticabusiness.industryComputer scienceFrame (networking)3D reconstructionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONReprojection errorAdaptive frame selectionImage processingFilter (signal processing)Adaptive Frame Selection Blur Detection SLAM Structure-from-MotionBlur detectionFeature (computer vision)SLAMComputer visionArtificial intelligencebusinessImage gradientStructure-from-motion
researchProduct

Path Modeling and Retrieval in Distributed Video Surveillance Databases

2012

We propose a framework for querying a distributed database of video surveillance data in order to retrieve a set of likely paths of a person moving in the area under surveillance. In our framework, each camera of the surveillance system locally pro- cesses the data and stores video sequences in a storage unit and the metadata for each detected person in the distributed database. A pedestrian’s path is formulated as a dynamic Bayesian network (DBN) to model the dependencies between subsequent observa- tions of the person as he makes his way through the camera net- work. We propose a tool by which the analyst can pose queries about where a certain person appeared while moving in the site duri…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniDistributed databaseDatabasebusiness.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONcomputer.software_genreComputer Science ApplicationsData modelingMetadataSet (abstract data type)Beam search camera network dynamic Bayesian network (DBN) path modeling path retrievalSignal ProcessingPath (graph theory)Media TechnologyBeam searchComputer visionArtificial intelligenceData miningElectrical and Electronic EngineeringbusinessHidden Markov modelcomputerDynamic Bayesian network
researchProduct

Palmprint principal lines extraction

2014

The palmprint recognition has become a focus in biological recognition and image processing fields. In this process, the features extraction (with particular attention to palmprint principal line extraction) is especially important. Although a lot of work has been reported, the representation of palmprint is still an open issue. In this paper we propose a simple, efficient, and accurate palmprint principal lines extraction method. Our approach consists of six simple steps: normalization, median filtering, average filters along four prefixed directions, grayscale bottom-hat filtering, combination of bottom-hat filtering, binarization and post processing. The contribution of our work is a new…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEngineeringGround truthBiometricsbusiness.industryFeature extractionsegmentationNormalization (image processing)Palm line extractionImage processingPattern recognitionGrayscalePalmprint; Palm line extraction; segmentation; biometricbiometricMedian filterComputer visionSegmentationArtificial intelligencePalmprintbusiness
researchProduct

Synthetic phenomenology and high-dimensional buffer hypothesis

2012

Synthetic phenomenology typically focuses on the analysis of simplified perceptual signals with small or reduced dimensionality. Instead, synthetic phenomenology should be analyzed in terms of perceptual signals with huge dimensionality. Effective phenomenal processes actually exploit the entire richness of the dynamic perceptual signals coming from the retina. The hypothesis of a high-dimensional buffer at the basis of the perception loop that generates the robot synthetic phenomenology is analyzed in terms of a cognitive architecture for robot vision the authors have developed over the years. Despite the obvious computational problems when dealing with high-dimensional vectors, spaces wit…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniExploitbusiness.industrymedia_common.quotation_subjectSynthetic phenomenologyCognitive architecturecognitive vision systems CiceRobotMaxima and minimaCiceRobot.Artificial IntelligencePerceptionhigh-dimensional bufferRobotComputer visioncognitive vision systemArtificial intelligenceComputational problemPsychologybusinessPhenomenology (psychology)Curse of dimensionalitymedia_common
researchProduct

HarrisZ$^+$: Harris Corner Selection for Next-Gen Image Matching Pipelines

2022

Due to its role in many computer vision tasks, image matching has been subjected to an active investigation by researchers, which has lead to better and more discriminant feature descriptors and to more robust matching strategies, also thanks to the advent of the deep learning and the increased computational power of the modern hardware. Despite of these achievements, the keypoint extraction process at the base of the image matching pipeline has not seen equivalent progresses. This paper presents HarrisZ$^+$, an upgrade to the HarrisZ corner detector, optimized to synergically take advance of the recent improvements of the other steps of the image matching pipeline. HarrisZ$^+$ does not onl…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFOS: Computer and information sciencesHarris detectorSettore INF/01 - InformaticaComputer Vision and Pattern Recognition (cs.CV)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComputer Science - Computer Vision and Pattern Recognitionlocal featurecorner detectorArtificial IntelligenceSignal Processingkeypoint detectorStructure-from-MotionComputer Vision and Pattern RecognitionHarrisZSoftware
researchProduct

Why you trust in visual saliency

2015

Image understanding is a simple task for a human observer. Visual attention is automatically pointed to interesting regions by a natural objective stimulus in a first step and by prior knowledge in a second step. Saliency maps try to simulate human response and use actual eye-movements measurements as ground truth. An interesting question is: how much corruption in a digital image can affect saliency detection respect to the original image? One of the contributions of this work is to compare the performances of standard approaches with respect to different type of image corruptions and different threshold values on saliency maps. If the corruption can be estimated and/or the threshold is fi…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGround truthSaliency mapImage compressionbusiness.industryImage corruptionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONObserver (special relativity)Digital imageVisual attentionComputer visionArtificial intelligencebusinessImage compressionVisual saliencyMathematics
researchProduct

Human Activity Recognition Process Using 3-D Posture Data

2015

In this paper, we present a method for recognizing human activities using information sensed by an RGB-D camera, namely the Microsoft Kinect. Our approach is based on the estimation of some relevant joints of the human body by means of the Kinect; three different machine learning techniques, i.e., K-means clustering, support vector machines, and hidden Markov models, are combined to detect the postures involved while performing an activity, to classify them, and to model each activity as a spatiotemporal evolution of known postures. Experiments were performed on Kinect Activity Recognition Dataset, a new dataset, and on CAD-60, a public dataset. Experimental results show that our solution o…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniImage fusionMarkov chainComputer Networks and CommunicationsComputer sciencebusiness.industryMaximum-entropy Markov modelFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONHuman Factors and ErgonomicsPattern recognitionComputer Science ApplicationsHuman-Computer InteractionActivity recognitionSupport vector machineHuman activity recognition kinect ambient intelligenceArtificial IntelligenceControl and Systems EngineeringSignal ProcessingComputer visionArtificial intelligenceCluster analysisHidden Markov modelbusinessIEEE Transactions on Human-Machine Systems
researchProduct

Super-resolution-based magnification of endothelium cells from biomicroscope videos of the cornea

2018

We present a practical, robust, and effective pipeline to compute a high-resolution (HR) image of the corneal endothelium starting from a low-resolution (LR) video sequence obtained with a general purpose slit lamp biomicroscope. An image quality typical of dedicated and more expensive confocal microscopes is achieved via software magnification by exploiting information redundancy in the video sequence. In particular, the HR image is generated from the best LR frames, obtained by identifying the most suitable endothelium video subsequence using a support vector machine-based learning approach, followed by a robust graph-based frame registration. Results on long, real sequences show that the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniImage fusionSettore INF/01 - InformaticaImage qualityComputer sciencebusiness.industryFrame (networking)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage registrationMagnificationsuper-resolutionImage segmentationAtomic and Molecular Physics and Opticsslit lamp biomicroscope image enhancementComputer Science ApplicationsSupport vector machinecorneal endotheliumSoftwaremachine learningComputer visionimage mosaicingArtificial intelligenceElectrical and Electronic Engineeringbusiness
researchProduct