Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Image" wg kryterium: Wszystkie pola


Tytuł:
Infrared and visible image fusion with deep wavelet-dense network
Autorzy:
Chen, Yanling
Cheng, Lianglun
Wu, Heng
Chen, Ziyang
Li, Feng
Powiązania:
https://bibliotekanauki.pl/articles/2202762.pdf
Data publikacji:
2023
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
infrared image
image fusion
image processing
infrared image enhancement
Opis:
We propose a high-quality infrared and visible image fusion method based on a deep wavelet-dense network (WT-DenseNet). The WT-DenseNet includes three network layers, the hybrid feature extraction layer, fusion layer, and image reconstruction layer. The hybrid feature extraction layer is composed of a wavelet and dense network. The wavelet network decomposes the feature map of the visible and infrared images into low-frequency and high-frequency components, respectively. The dense network extracts the salient features. A fusion layer is designed to integrate low-frequency and salient features. Finally, the fusion images are outputted by an image reconstruction layer. The experimental results demonstrate that the proposed method can realize high-quality infrared and visible image fusions, and the performance of the proposed method is better than that of the six recently published fusion methods in terms of contrast and detail performance.
Źródło:
Optica Applicata; 2023, 53, 1; 49--64
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image compression-encryption algorithm combining compressive sensing with log operation
Autorzy:
Chen, R.-L.
Zhou, Y.
Luo, M.
Zhang, A.-D.
Gong, L.-H.
Powiązania:
https://bibliotekanauki.pl/articles/174009.pdf
Data publikacji:
2018
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
image encryption
image compression
compressive sensing
log operation
Opis:
Based on compressive sensing and log operation, a new image compression-encryption algorithm is proposed, which accomplishes encryption and compression simultaneously. The proposed image compression-encryption algorithm takes advantage of not only the physical realizability of partial Hadamard matrix, but also the resistance of the chosen-plaintext attack since all the elements in the partial Hadamard matrix are 1, –1 or log 1 = 0. The proposed algorithm is sensitive to the key and it can resist various common attacks. The simulation results verify the validity and reliability of the proposed image compression-encryption algorithm.
Źródło:
Optica Applicata; 2018, 48, 4; 563-573
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image compression and encryption algorithm with wavelet-transform-based 2D compressive sensing
Autorzy:
Fan, Jing-Hui
Liu, Xian-Bao
Chen, Yan-Bin
Powiązania:
https://bibliotekanauki.pl/articles/175122.pdf
Data publikacji:
2019
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
wavelet transform
compressive sensing
chaos scrambling
image encryption
image compression
Opis:
By combining a wavelet transform with chaos scrambling, an image compression and encryption algorithm based on 2D compressive sensing is designed. The wavelet transform is employed to obtain the sparse representation of a plaintext image. The sparse image is measured in two orthogonal directions by compressive sensing. Then, the result of 2D compressive sensing is confused by the Arnold transform and the random pixel scrambling. The combination of four-dimensional chaos and logistic map is exploited to generate the first row of the key-controlled circulant matrix. The proposed algorithm not only carries out image compression and encryption simultaneously, but also reduces the consumption of the key by controlling the generation of measurement matrix. Experimental results reveal that the proposed image compression and encryption algorithm is resistant to noise attacks with good compression performance and high key sensitivity.
Źródło:
Optica Applicata; 2019, 49, 3; 461-472
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Underwater image enhancement via efficient generative adversarial network
Autorzy:
Qian, Xin
Ge, Peng
Powiązania:
https://bibliotekanauki.pl/articles/2033886.pdf
Data publikacji:
2021
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
underwater
image dehazing
generative adversarial network
GAN
Opis:
Underwater image enhancement has been receiving much attention due to its significance in facilitating various marine explorations. Inspired by the generative adversarial network (GAN) and residual network (ResNet) in many vision tasks, we propose a simplified designed ResNet model based on GAN called efficient GAN (EGAN) for underwater image enhancement. In particular, for the generator of EGAN we design a new pair of convolutional kernel size for the residual block in the ResNet. Secondly, we abandon batch normalization (BN) after every convolution layer for faster training and less artifacts. Finally, a smooth loss function is introduced for halo-effect alleviation. Extensive qualitative and quantitative experiments show that our methods accomplish considerable improvements compared to the state-of-the-art methods.
Źródło:
Optica Applicata; 2021, 51, 4; 483-497
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption combining discrete fractional angular transform with Arnold transform in image bit planes
Autorzy:
Zhou, Z.
Yu, J.
Liao, Q.
Gong, L.
Powiązania:
https://bibliotekanauki.pl/articles/173704.pdf
Data publikacji:
2018
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
Arnold transform
bit plane
discrete fractional angular transform
image encryption algorithm
Opis:
A new image encryption algorithm by using a discrete fractional angular transform and Arnold transform in image bit planes is investigated. In the image encryption algorithm, the original image is encrypted by the Arnold transform in image bit planes firstly, and then the resulting image is encrypted by the discrete fractional angular transform further. The key of the image encryption algorithm includes the parameters of the Arnold transform and the order of the discrete fractional angular transform. It is shown that the proposed image encryption algorithm is of high security and strong enough to counteract some conventional image attack manners.
Źródło:
Optica Applicata; 2018, 48, 2; 225-236
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Diagnostic moiré image evaluation in spinal deformities
Autorzy:
Balla, P.
Manhertz, G.
Antal, A.
Powiązania:
https://bibliotekanauki.pl/articles/173236.pdf
Data publikacji:
2016
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
Moiré method
image processing
Scheuermann’s disease
curve determination
Opis:
This paper deals with moiré picture evaluation in case of a very frequent spinal deformity, called the Scheuermann’s disease. Spinal deformities often occur in the group of 10–17 year-old children. This Scheuermann-type of spinal deformity is more frequent (11%) than the well-known scoliosis (2–4%), but because of the incorrect diagnosis it often remains without a right treatment. Now the accepted medical diagnostic method is using frontal and lateral X-ray pictures from patients’ back. Our already presented method uses moiré pictures to establish the right diagnosis. This optical method is fast, non-contact and arbitrarily repeatable. In our former paper we presented two computer algorithms to produce the shape of the patients’ spine. These methods showed good agreement with the traditional medical diagnosis, but the extreme search method returned better results. In this paper we are demonstrating our new results using the extreme search method and the improved computer program.
Źródło:
Optica Applicata; 2016, 46, 3; 375-385
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image compression and encryption algorithm based on advanced encryption standard and hyper-chaotic system
Autorzy:
Nie, Zhe
Liu, Zheng-Xin
He, Xiang-Tao
Gong, Li-Hua
Powiązania:
https://bibliotekanauki.pl/articles/174108.pdf
Data publikacji:
2019
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
hyper-chaotic system
advanced encryption standard
discrete cosine transform
image encryption
image compression
Opis:
An image compression and encryption algorithm by combining the advanced encryption standard (AES) with the hyper-chaotic system is designed, in which Arnold map is employed to eliminate part of the block effect in the image compression process. The original image is compressed with the assistance of a discrete cosine transform and then its transform coefficients are encrypted with the AES algorithm. Besides, the hyper-chaotic system is adopted to introduce the nonlinear processfor image encryption. Numerical simulations and theoretical analyses demonstrate that the proposed image compression and encryption algorithm is of high security and good compression performance.
Źródło:
Optica Applicata; 2019, 49, 4; 545-558
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Image encryption based on permutation polynomials over finite fields
Autorzy:
Wu, Jianhua
Liu, Hai
Zhu, Xishun
Powiązania:
https://bibliotekanauki.pl/articles/1835797.pdf
Data publikacji:
2020
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
finite field
permutation polynomials
scrambling
diffusion
image encryption
Opis:
In this paper, we propose an image encryption algorithm based on a permutation polynomial over finite fields proposed by the authors. The proposed image encryption process consists of four stages: i) a mapping from pixel gray-levels into finite field, ii) a pre-scrambling of pixels’ positions based on the parameterized permutation polynomial, iii) a symmetric matrix transform over finite fields which completes the operation of diffusion and, iv) a post-scrambling based on the permutation polynomial with different parameters. The parameters used for the polynomial parameterization and for constructing the symmetric matrix are used as cipher keys. Theoretical analysis and simulation demonstrate that the proposed image encryption scheme is feasible with a high efficiency and a strong ability of resisting various common attacks. In addition, there are not any round-off errors in computation over finite fields, thus guaranteeing a strictly lossless image encryption. Due to the intrinsic nonlinearity of permutation polynomials in finite fields, the proposed image encryption system is nonlinear and can resist known-plaintext and chosen-plaintext attacks.
Źródło:
Optica Applicata; 2020, 50, 3; 357-376
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sufficient conditions for prisms to produce orthogonal image orientation functions without spectral dispersion
Autorzy:
Liao, T.-T.
Lin, P. D.
Powiązania:
https://bibliotekanauki.pl/articles/174146.pdf
Data publikacji:
2018
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
prism
image orientation
spectral dispersion
Opis:
One of the main functions of a prism is to produce an image orientation function without spectral dispersion. The present study extends the work previously reported in [JOSAA 33(7), 2016, pp. 1257–1266] to analyze the sufficient conditions for a prism to produce two particular image orientation functions (Φ2 and Φ5) without spectral dispersion. It is shown that there exist two sufficient conditions under which spectral dispersion can be avoided: (1) the rays enter and exit the prism perpendicularly, or (2) the prism comprises two halves which are mirror images of one another. The present findings provide a useful basis for the design of prisms without spectral dispersion.
Źródło:
Optica Applicata; 2018, 48, 4; 575-587
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Restoration image degraded by a blurred variable in the field
Autorzy:
Bentahar, Y.
Afifi, M.
Dalimi, H.
Amar, S.
Powiązania:
https://bibliotekanauki.pl/articles/174974.pdf
Data publikacji:
2018
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
blind image deconvolution
restoration
total variation
Opis:
Various methods of deconvolution have been developed for several decades, notably in astronomy and microscopy. The extension of these techniques to the case of a spatially varied blur is currently an open problem. In this work, we consider a zone-invariant point spread function model to take into account blur variation in the image. Thus an algorithm has been used where the minimization of the criterion is performed in parallel on different areas of the image, while taking into account the estimates in the neighboring areas of the sub-images under consideration, so that the final solution is the minimum of the criterion where the blur is spatially varied.
Źródło:
Optica Applicata; 2018, 48, 1; 5-14
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Simulation research of bionic image intensifier based on the retina structure of elephant-nose fish
Autorzy:
Zhang, Hongxia
Jin, Qingwen
Li, Peng
Jia, Dagong
Liu, Tiegen
Powiązania:
https://bibliotekanauki.pl/articles/1835814.pdf
Data publikacji:
2020
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
geometric optical design
micro-optical device
image analysis
low-light night vision
bionic image intensifier
Opis:
Enhancing image brightness under low light conditions is crucial. The traditional night vision technology depends on the development of photoelectric materials and accurate image processing algorithms. Inspired by the structure of elephant-nose fish, we construct a bionic image intensifier (BII) model. The BII is a planar array based on the concentrating principle of the compound parabolic concentrator (CPC). This solution is based on pure optical design and independent. Through light tracing, the simulation results show that the brightness of the image is improved and good image uniformity is obtained. Quantitative analysis of the geometric concentration ratio (GCR) and the image uniformity is used to optimize CPC structure parameters. At the same time, we also discuss the influence of CPC structural parameters on image continuity, uniformity and geometric concentration ratio. The optimization results are as follows: the input port diameter is 50 μm, the output port diameter is 10 μm, the height is 90 μm, the GCR is 5.61, and the image uniformity is 95.30%. The comprehensive performance of the BII achieves the best.
Źródło:
Optica Applicata; 2020, 50, 4; 551-566
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cell detection and tracking in lab-on-a-chip devices by image processing
Autorzy:
Lizanets, D.
Walczak, R.
Powiązania:
https://bibliotekanauki.pl/articles/174093.pdf
Data publikacji:
2018
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
image processing
lab-on-a-chip
computer vision
bioanalysis
Opis:
This paper is devoted to the usage of image processing techniques in lab-on-a-chip devices for a cell detection and tracking. Advantages and disadvantages of image processing in data acquisition from lab-on-a-chip are described. A modified multiparametric object tracking method is presented. The method was tested on the lab-on-a-chip setup with living euglena and has shown plausible results for video with a low frame rate.
Źródło:
Optica Applicata; 2018, 48, 1; 15-24
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optical asymmetric double-image encryption and authentication in an interference-based scheme using sparse representation
Autorzy:
Luan, Guangyu
Huang, Caojun
Powiązania:
https://bibliotekanauki.pl/articles/2172860.pdf
Data publikacji:
2022
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
optical encryption
asymmetry
interference
double-image
authentication
Opis:
We report an optical asymmetric scheme for double-image encryption and authentication based on interference using sparse representation. We employ sparse representation and interference to process the Fresnel spectra related with the two original images, and then respectively acquire two ciphertexts and two pairs of private keys. Each original image possesses its corresponding two private keys. Furthermore, the decrypted image is compared with its corresponding plaintext with the aid of a nonlinear correlation for authentication. In the proposed scheme, any information concerning each primary image and comprising its silhouette cannot be recognized even though one, two, or even three masks of the two ciphertexts and two private keys are utilized for decryption. The Fresnel spectrum functions which have different diffraction distances enhance the security of the proposal significantly. Moreover, the proposal also avoids the crosstalk problem. The effectiveness and security of this proposed method are demonstrated via numerical simulations.
Źródło:
Optica Applicata; 2022, 52, 4; 497--510
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Asymmetric double-image encryption using twin decomposition in fractional Hartley domain
Autorzy:
Kumar, Jaideep
Singh, Phool
Yadav, Ak
Powiązania:
https://bibliotekanauki.pl/articles/2060684.pdf
Data publikacji:
2022
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
double image encryption
twin decomposition
asymmetric cryptosystem
fractional Hartley transform
Opis:
Twin decomposition, consisting of equal and random modulus decompositions, not only makes a cryptosystem asymmetric but also resists special attack. A new double-image asymmetric crypto-system using twin decomposition in fractional Hartley domain is proposed. An input grayscale image, bonded with another grayscale image as its phase mask, is transformed via fractional Hartley transform. Equal modulus decomposition is applied on the resulting image, giving us two intermediate images. One of them is subjected to another fractional Hartley transform followed by random modulus decomposition, whereas the other serves as the first private key. The application of random modulus decomposition also results in two images: encrypted image and the second private key. During the process of decryption, firstly the encrypted image is combined with second private key and thereafter it is subjected to inverse fractional Hartley transform. The resulting image is then combined with the first private key, and followed by another inverse fractional Hartley transform, thus recovering the two original images. The proposed cryptosystem is validated for pairs of grayscale images.
Źródło:
Optica Applicata; 2022, 52, 1; 21--35
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain
Autorzy:
Singh, H.
Powiązania:
https://bibliotekanauki.pl/articles/173502.pdf
Data publikacji:
2017
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
fractional Hartley transform
FrHT
image encryption
mean squared error
noise attacks
entropy
Opis:
This paper proposed an enhanced asymmetric cryptosystem scheme for optical image encryption in the fractional Hartley transform domain. Grayscale and binary images have been encrypted separately using double random phase encoding. Phase masks based on optical vortex and random phase masks have been jointly used in spatial as well as in the Fourier planes. The images to be encrypted are first multiplied by optical vortex and random phase mask and then transformed with direct and inverse fractional Hartley transform for obtaining the encrypted images. The images are recovered from their corresponding encrypted images by using the correct parameters of the fractional Hartley transform and optical vortex, whose digital implementation has been performed using MATLAB 7.6.0 (R2008a). The random phase masks, optical vortex and transform orders associated with the fractional Hartley transform are extra keys that cause difficulty to an unauthorized user. Thus, the proposed asymmetric scheme is more secure as compared to conventional techniques. The efficacy of the proposed asymmetric scheme is verified by computing the mean squared error between recovered and the original images. The sensitivity of the asymmetric scheme is also verified with encryption parameters, noise and occlusion attacks. Numerical simulation results demonstrate the effectiveness and security performance of the proposed system.
Źródło:
Optica Applicata; 2017, 47, 4; 557-578
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies