Fig.1. Object Detection Method based on Edge
Fig. 2. System Flowchart
Fig. 3. Result of Histogram Equalization
Fig. 4. Result of Image Binarization
Fig. 5. Detection of Noise Area in Image
Fig. 6. Result of Outline Detection
Fig. 7. Result of Spatial Feature Point Detection
Fig. 8. Labeling Method
Fig. 9. Feature Point Detection
Fig. 10. Conner Point Detection
Fig. 11. 3D Contents Augmented
참고문헌
- K. J. Lee & W. S. Jeong. (2011). An Analysis of the Economic Effects for the Immersive Media Industry. The Journal of Korean Institute of Communications and Information Sciences, 36(7), 795-805. https://doi.org/10.7840/KICS.2011.36B.7.795
- S. Jonathan. (1992). Defining virtual reality: Dimensions determining telepresence. Journal of communication 42(4), 73-93. https://doi.org/10.1111/j.1460-2466.1992.tb00812.x
- Z. Harry & H. James. (2016). Augmented, Mixed and Virtual Reality 2017-2027: Technologies, Forecasts, Players. IDTechEX Reprot:IDTechEX Research.
- H. Park & J. I. Park. (2004). Invisible marker tracking for AR. Proc. of ISMAR, 272-273.
- R. Hartley & A. Zisserman. (2003). Multiple View Geometry, 2nd Ed., Cambridge University Press.
- V. Lepetit, F. Moreno-Noguer & P. Fua. (2009). EPnP: Anaccurate O(n) solution to the PnP problem. IJCV, 81, 155-166.. https://doi.org/10.1007/s11263-008-0152-6
- S. H. Kim (2016). Realtime 3D Human Full-Body Convergence Motion Capture using a Kinect Sensor. Journal of Digital Convergence, 14(1), 189-194. https://doi.org/10.14400/JDC.2016.14.1.189
- K. W. Park & J. Y. Lee. (2015). A Morphology Technique-Based Boundary Detection in a Two-Dimensional QR Code. Journal of Digital Convergence, 13(12), 159-175.
- F. Simone, D. Parry & C. Johnson. (2018). Digital Dilemmas Through Networked Assemblages: Reshaping the Gendered Contours of Our Future. Digital Dilemmas: Transforming Gender Identities and Power Relations in Everyday Life. Palgrave Macmillan, 225-244.
- D. Ebenezer, J. Anitha & J. Gnanaraj. (2017). Optimum laplacian wavelet mask based medical image using hybrid cuckoo search-grey wolf optimization algorithm. Knowledge-Based Systems 131, 58-69. https://doi.org/10.1016/j.knosys.2017.05.017
- L. HE & L. GE. (2018). CamShift Target Tracking Based on the Combination of Inter-frame Difference and Background Difference. In: 2018 37th Chinese Control Conference (CCC), 9461-9465.
- B. Rajathilagam & M. Rangarajan. (2017). Edge detection using G-lets based on matrix factorization by group representations. Pattern Recognition, 67, 1-15. https://doi.org/10.1016/j.patcog.2017.01.028
- S. W Jeong, U. R Chio & I. G. Lee. (2018). Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things. Journal of Digital Convergence, 16(9), 179-185. https://doi.org/10.14400/JDC.2018.16.9.179
- H. U. Kim, H. J. Kim, J. H. Kang & M. S. Jun. (2017). A Study on Analysis and Countermeasure of Security threat in NFC. Journal of Digital Convergence, 14(12), 183-191. https://doi.org/10.14400/JDC.2016.14.12.183
- K. H. Ko. (2018). An Estimating Algorithm of Vehicle Collision Speed Through Images of Blackbox. Journal of Digital Convergence, 16(9), 173-178. https://doi.org/10.14400/JDC.2018.16.5.173