• Title/Summary/Keyword: Binary image

Search Result 987, Processing Time 0.034 seconds

Precise Detection of Car License Plates by Locating Main Characters

  • Lee, Dae-Ho;Choi, Jin-Hyuk
    • Journal of the Optical Society of Korea
    • /
    • v.14 no.4
    • /
    • pp.376-382
    • /
    • 2010
  • We propose a novel method to precisely detect car license plates by locating main characters, which are printed with large font size. The regions of the main characters are directly detected without detecting the plate region boundaries, so that license regions can be detected more precisely than by other existing methods. To generate a binary image, multiple thresholds are applied, and segmented regions are selected from multiple binarized images by a criterion of size and compactness. We do not employ any character matching methods, so that many candidates for main character groups are detected; thus, we use a neural network to reject non-main character groups from the candidates. The relation of the character regions and the intensity statistics are used as the input to the neural network for classification. The detection performance has been investigated on real images captured under various illumination conditions for 1000 vehicles. 980 plates were correctly detected, and almost all non-detected plates were so stained that their characters could not be isolated for character recognition. In addition, the processing time is fast enough for a commercial automatic license plate recognition system. Therefore, the proposed method can be used for recognition systems with high performance and fast processing.

Estimating Illumination Distribution to Generate Realistic Shadows in Augmented Reality

  • Eem, Changkyoung;Kim, Iksu;Jung, Yeongseok;Hong, Hyunki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2289-2301
    • /
    • 2015
  • Mobile devices are becoming powerful enough to realize augmented reality (AR) application. This paper introduces two AR methods to estimate an environmental illumination distribution of a scene. In the first method, we extract the lighting direction and intensity from input images captured with a front-side camera of a mobile device, using its orientation sensor. The second method extracts shadow regions cast by three dimensional (3D) AR marker of known shape and size. Because previous methods examine per pixel shadow intensity, their performances are much affected by the number of sampling points, positions, and threshold values. By using a simple binary operation between the previously clustered shadow regions and the threshold real shadow regions, we can compute efficiently their relative area proportions according to threshold values. This area-based method can overcome point sampling problem and threshold value selection. Experiment results demonstrate that the proposed methods generate natural image with multiple smooth shadows in real-time.

A Development of MiTS Network Protocol based on Light-Weight Ethernet (Light-Weight Ethernet 기반 MiTS 네트워크 프로토콜 개발)

  • Hwang, Hun-Gyu;Yoon, Jin-Sik;Lee, Seong-Dae;Seo, Jeong-Min;Jang, Kil-Woong;Lee, Jang-Se;Park, Hyu-Chan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.8
    • /
    • pp.1172-1179
    • /
    • 2010
  • In this paper, we analyze and design requirements of Network Function block and System Function block of MiTS network protocol based on Light-Weight Ethernet, also implement and test the protocol and library files. Light-Weight Ethernet Protocol consists of Network Function block and System Function block. NF receives and sends datagram based on UDP multi-casting communication. SF processes messages after distinguished Sentence and Binary Image Data.

Implementation of Oriental Medicine Baby Ocular Inspection Technique Using Face Image Analysis (얼굴 영상 분석을 이용한 한방 소아 망진 기법의 구현)

  • Cho Dong-Uk;Kim Bong-Hyun;Lee Se-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.257-263
    • /
    • 2005
  • If baby disease not treats at early, case that cause problem in health hereafter much exists. Specially, because baby expresses own inexpedience by crying, parents or practitioner's is not apt to grasp. Therefore, In this paper, I wish to develop system for analyze if disease is in some region to analyze face and baby cry that organism signal appears intensive for baby disease diagnosis. In this paper, I wish to propose methodology that analyze organism signal that appear in face of whole baby organism signal analysis system. For this, I necessary region binary input baby face picture and to draw necessary five sensory organ and Myungdang region in baby disease diagnosis. Finally, the usefulness of this paper is verified by several experiments.

  • PDF

Design of a Booth's Multiplier Suitable for Embedded Systems (임베디드 시스템에 적용이 용이한 Booth 알고리즘 방식의 곱셈기 설계)

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.838-841
    • /
    • 2007
  • In this study, we implemented a $17^*17b$ binary digital multiplier using radix-4 Booth's algorithm. Two stage pipeline architecture was applied to achieve higher throughput and 4:2 adders were used for regular layout structure in the Wallace tree partition. To evaluate the circuit, several MPW chips were fabricated using Hynix 0.6-um 3M N-well CMOS technology. Also we proposed an efficient test methodology and did fault simulations. The chip contains 9115 transistors and the core area occupies about $1135^*1545$ mm2. The functional tests using ATS-2 tester showed that it can operate with 24 MHz clock at 5.0 V at room temperature.

  • PDF

Effective Watermark Detection Using Asymmetric Thresholds (비대칭 임계치를 이용한 효과적인 워터마크 검출 방법)

  • Shin, Chang-Doon;Oh, Hae-Seok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.6
    • /
    • pp.619-628
    • /
    • 2003
  • In this paper, an effective watermark detection technique in the wavelet transform domain is proposed. In this proposed method, the image is 2-level wavelet transformed, and then the watermark with a binary logo is embedded into middle band except baseband and high band to consider Invisibility and robustness. In this paper, we use an asymmetric thresholds watermarking (ATW) in which detection threshold is higher than inserting threshold in order to enhance watermark detection ratio in attacked images. In watermark detection phase, the detection value is not changed when the difference of the selected wavelet neighboring coefficient pairs Is smaller than specific value. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, etc.

COMPARISON OF DIFFERENT NUMERICAL SCHEMES FOR THE CAHN-HILLIARD EQUATION

  • Lee, Seunggyu;Lee, Chaeyoung;Lee, Hyun Geun;Kim, Junseok
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.17 no.3
    • /
    • pp.197-207
    • /
    • 2013
  • The Cahn-Hilliard equation was proposed as a phenomenological model for describing the process of phase separation of a binary alloy. The equation has been applied to many physical applications such as amorphological instability caused by elastic non-equilibrium, image inpainting, two- and three-phase fluid flow, phase separation, flow visualization and the formation of the quantum dots. To solve the Cahn-Hillard equation, many numerical methods have been proposed such as the explicit Euler's, the implicit Euler's, the Crank-Nicolson, the semi-implicit Euler's, the linearly stabilized splitting and the non-linearly stabilized splitting schemes. In this paper, we investigate each scheme in finite-difference schemes by comparing their performances, especially stability and efficiency. Except the explicit Euler's method, we use the fast solver which is called a multigrid method. Our numerical investigation shows that the linearly stabilized stabilized splitting scheme is not unconditionally gradient stable in time unlike the known result. And the Crank-Nicolson scheme is accurate but unstable in time, whereas the non-linearly stabilized splitting scheme has advantage over other schemes on the time step restriction.

Medial Axis Detection of Stripes Using LoG Scale-Space (LoG Scale-Space를 이용한 라인의 중심축 검출)

  • Byun, Ki-Won;Nam, Ki-Gon;Joo, Jae-Heum
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.3
    • /
    • pp.183-188
    • /
    • 2010
  • In this paper we propose a detection method of the medial axis of the continuous stripes on the LoG scale-space. Our method detects the medial axis of continuous stripes iteratively by varying the scale of LoG operator. Small-scale LoG operator detects two +/- pole pairs centered on the edge positions of stripe by the zero-crossing detection. The more increase the scale of LoG scale-space, the more close two poles to the medial axis of stripe. The medial axis of continuous stripe is the position where two poles is overlapped. The proposed method detected robustly the medial axis of continuous stripes stronger than the thinning methods used to binary image.

A Study on the Automatic Identification of HANGEUL Seal by using the Image Processing (영상처리에 의한 한글인장의 자동직별에 관한 연구)

  • 이기돈;전병민;김상운
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.10 no.2
    • /
    • pp.69-75
    • /
    • 1985
  • The proposed seal identification procedure consists of the smoothing, rotation, thinning, and matching techniques. The seal images which are scanned by CCTV are thresholded into the binary prctures of $256{\times}256$ pixels through A/D converter and 6502 microcomputer. After the sample and target images are ratated into an identical orientation, a thinning process is used to extract the skeletons of the character strobes. The wighted map is constructed by distance weight from which the distance weighted correlation C is computed. The C is compared with the dicision constant C or C for the purpose of seal indentification. The identification rate is 95% and the total CPU time is less than 3 minutes for each identification in the experiment.

  • PDF

A Proposal for RFID Chip Database of Magic Mirror's Total Fashion Coordination (매직미러의 토털 패션 코디네이션을 위한 RFID 칩의 데이터베이스 제안)

  • Lee, Woon-Young;Yang, Sook-Hi
    • The Research Journal of the Costume Culture
    • /
    • v.18 no.5
    • /
    • pp.942-959
    • /
    • 2010
  • The Realization of Ubiquitous is achieved by magic mirror and it is required more concrete study to realize it's functionality. Especially its function of professional fashion co-ordinator for managing the appearance could be of further use. The Objective of this Study is to establish RFID chip data base to put into a computer for making use of the functionality of the magic mirror aiming at suggesting the available information on the total fashion co-ordination. I sought firstly the code with binary system determining the criteria of accessories to be input in a RFID chip. Secondly, as the image with cloth is an important element for the total fashion co-ordination, desired co-ordination among the emphasis, harmony, character, season and accent can be made selectable classifying into a limit element and a common element to extract the codes. Thirdly, necessary conditions were given to the generated codes using Visual C++ program of Microsoft and the extracted codes as per groups were compared and analyzed.