• Title/Summary/Keyword: image phase

Search Result 1,413, Processing Time 0.034 seconds

An adaptive method of multi-scale edge detection for underwater image

  • Bo, Liu
    • Ocean Systems Engineering
    • /
    • v.6 no.3
    • /
    • pp.217-231
    • /
    • 2016
  • This paper presents a new approach for underwater image analysis using the bi-dimensional empirical mode decomposition (BEMD) technique and the phase congruency information. The BEMD algorithm, fully unsupervised, it is mainly applied to texture extraction and image filtering, which are widely recognized as a difficult and challenging machine vision problem. The phase information is the very stability feature of image. Recent developments in analysis methods on the phase congruency information have received large attention by the image researchers. In this paper, the proposed method is called the EP model that inherits the advantages of the first two algorithms, so this model is suitable for processing underwater image. Moreover, the receiver operating characteristic (ROC) curve is presented in this paper to solve the problem that the threshold is greatly affected by personal experience when underwater image edge detection is performed using the EP model. The EP images are computed using combinations of the Canny detector parameters, and the binaryzation image results are generated accordingly. The ideal EP edge feature extractive maps are estimated using correspondence threshold which is optimized by ROC analysis. The experimental results show that the proposed algorithm is able to avoid the operation error caused by manual setting of the detection threshold, and to adaptively set the image feature detection threshold. The proposed method has been proved to be accuracy and effectiveness by the underwater image processing examples.

The Analysis of Amplitude and Phase Image for Acoustic Microscope Using Quadrature Technique (쿼드러춰 방식에 의한 초음파현미경의 진폭과 위상영상 분석)

  • Kim, Hyun;Jun, Kye-Suk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.18 no.3
    • /
    • pp.55-61
    • /
    • 1999
  • In this study, we have constructed the acoustic microscope using quadrature technique and analyzed the relative variation of image intensity and the quality of image by reconstructing the amplitude and phase image for surface defects with tiny hight variation. In this experiment, we have constructed the scanning acoustic microscope using the focused transducer with 3㎒ center frequency and the quadrature detector. And we have fabricated aluminum samples with round defects whose depth is different and reconstructed the amplitude and phase images for the samples. One sample has round defects with 2㎜ diameter and 100㎛ depth and the other has round defects with 4㎜ diameter and 5㎜ depth. In the result of line scanning for the sample with 100㎛ round defects, it has been shown that the variation rate of amplitude image intensity is 7% and the variation rate of phase image intensity is 89%. The phase image has better contrast than amplitude image for the sample. In contrast to this, the amplitude image has better contrast than phase image for the sample with 5㎜ depth's defects. Accordingly there is big difference between amplitude image and phase image for depth variation of defects whose boundary is 1 wavelength. Consequently the acoustic microscope using quadrature detector can be evaluated efficiently more than using envelope detector, for detecting defects which have height variation less than 1 wavelength. And also the phase image and the amplitude image can be used for detecting defects of tiny height variation with complimentary relation.

  • PDF

Optical Encryption System using a Computer Generated Hologram

  • Kim, Jong-Yun;Park, Se-Joon;Kim, Soo-Joong;Doh, Yang-Hoi;Kim, Cheol-Su
    • Journal of the Optical Society of Korea
    • /
    • v.4 no.1
    • /
    • pp.19-22
    • /
    • 2000
  • A new image encoding and identification scheme is proposed for security verification by us-ing a CGH(computer generated hologram), random phase mask, and a correlation technique. The encrypted image, which is attached to the security product, is made by multiplying a QP- CGH(quadratic phase CGI) with a random phase function. The random phase function plays a key role when the encrypted image is decrypted. The encrypted image can be optically recovered by a 2-f imaging system and automatically verified for personal identification by a 4-f correlation system. Simulation results show the proposed method can be used for both the reconstruction of an original image and the recognition of an encrypted image.

Investigation of Phase Singularity Problem in Microwave Breast Tomography

  • Son, Seong-Ho;Simonov, Nikolai;Lee, Kwang-Jae;Jeon, Soon-Ik
    • Journal of electromagnetic engineering and science
    • /
    • v.14 no.4
    • /
    • pp.332-335
    • /
    • 2014
  • This paper investigates the phase singularity problem in microwave image reconstruction utilizing unwrapped phase data. The measured phases of the electric fields in most microwave measurement systems are wrapped. Thus, a certain phase unwrapping process is necessary for reconstruction of the image of a high contrast object. This unwrapping, however, is difficult in the presence of scattering nulls on/near the unwrapping path. At the null point, the phase value will be rendered, resulting in a poor image reconstruction. In this paper, we investigate the phase singularity arising from electromagnetic scattering nulls in microwave breast tomographic imaging. We then propose a transformation technique for the measured electric fields that avoids phase singularity.

Shift and Noise Tolerance Encryption System Using a Joint Transform Correlator (결합 변환 상관기를 이용한 잡음 및 변이에 강한 암호화 시스템)

  • 서동환;김수중
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.7
    • /
    • pp.499-506
    • /
    • 2003
  • In this paper, we propose the shift and noise tolerance method using a virtual phase image and a joint transform correlator (JTC) architecture that can alleviate the need for an accurate optical axis alignment. An encrypted image is obtained by the Fourier transform of the product of a phase- encoded virtual image to camouflage the original one and a random phase image. Therefore, even if unauthorized users analyze the encrypted image, we can prevent the possibility of counterfeiting from unauthorized people using virtual image which dose not contain any information from the original image. We demonstrate the robustness to noise, to data loss and to shift of the encrypted image using a JTC in the proposed description technique.

Optical encryption and decryption technique using virtual image in frequency domain (가상 영상을 이용한 주파수 영역에서의 광학적 암호화 및 복호화 방법)

  • 서동환;조규보;박세준;김수중;김정우;노덕수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.3
    • /
    • pp.255-259
    • /
    • 2003
  • In this paper, we propose an improved image encryption and decryption method using a virtual image and a joint transform correlator (JTC). The encrypted image is obtained by the Fourier transform of the product of a virtual-phase image and a random-phase image, and a Fourier transform of the decrypting key generated by the proposed phase assignment rule is used as the Fourier decrypting key. Based on the solution, the original image is reconstructed using JTC in the frequency-domain. The proposed method using a virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting by unauthorized people. And also the auto-correlation terms, which are the drawback of a JTC system, contribute to reconstructing the original image rather than to disturbing its identification. But because phase-only encryptions are sensitive to noise and scratches, phase errors can be generated in fabricating the encrypted image or the Fourier decrypting key so the errors that are responsible for degradation of the quality of the reconstructed image are analyzed and the solution is demonstrated. Computer simulations show the solution, and the proposed method is very useful for JTC architecture.

Deep Learning Based Digital Staining Method in Fourier Ptychographic Microscopy Image (Fourier Ptychographic Microscopy 영상에서의 딥러닝 기반 디지털 염색 방법 연구)

  • Seok-Min Hwang;Dong-Bum Kim;Yu-Jeong Kim;Yeo-Rin Kim;Jong-Ha Lee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.2
    • /
    • pp.97-106
    • /
    • 2022
  • In this study, H&E staining is necessary to distinguish cells. However, dyeing directly requires a lot of money and time. The purpose is to convert the phase image of unstained cells to the amplitude image of stained cells. Image data taken with FPM was created with Phase image and Amplitude image using Matlab's parameters. Through normalization, a visually identifiable image was obtained. Through normalization, a visually distinguishable image was obtained. Using the GAN algorithm, a Fake Amplitude image similar to the Real Amplitude image was created based on the Phase image, and cells were distinguished by objectification using MASK R-CNN with the Fake Amplitude image As a result of the study, D loss max is 3.3e-1, min is 6.8e-2, G loss max is 6.9e-2, min is 2.9e-2, A loss max is 5.8e-1, min is 1.2e-1, Mask R-CNN max is 1.9e0, and min is 3.2e-1.

Optical Security System Using Phase Mask and Interferometer (위상 카드와 간섭계를 이용한 광학적 보안 시스템)

  • Kim, Jong-Yun;Kim, Gi-Jeong;Park, Se-Jun;Kim, Cheol-Su;Bae, Jang-Geun;Kim, Jeong-U;Kim, Su-Jung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.1
    • /
    • pp.37-43
    • /
    • 2001
  • In this paper, we propose a new optical security technique using two phase masks based on interferometer. A binary random phase image is used as a reference image and the encrypted image is generated according to the phase difference between the reference image and the original image. If there is no phase difference of a same pixel position in two phase masks, interference intensity of the pixel has minimum value and if phase difference of a same pixel position in two phase masks is $\pi$, its interference intensity has maximum value. We can decrypt the original image by putting two phase masks on each of the two optical paths of the Mach-Zehnder interferometer. Computer simulation and the optical experiments show a good performance of the proposed optical security system.

  • PDF

Phase Contrast Projection Display Using Photopolymer

  • Piao, Mei-Lan;Kim, Nam;Park, Jae-Hyeung
    • Journal of the Optical Society of Korea
    • /
    • v.12 no.4
    • /
    • pp.319-325
    • /
    • 2008
  • We propose a phase contrast filter using photopolymer, for the phase contrast projection display. The photopolymer has high photosensitivity such that its optically induced refractive index change has a linear dependency on the illuminating light intensity. We implemented a phase contrast projection display using photopolymer as a phase contrast filter. By controlling the refractive index change of the photopolymer, we successfully convert an input phase image into a high contrast intensity image. We also investigated the effect of the photopolymer illumination condition on the quality of the displayed intensity image. As a projector, we achieved 82% phase to intensity conversion efficiency, which implies that the proposed method can potentially have much higher light efficiency than conventional projection display.

Interferometric Image Encryption and Decryption using Binary Phase Hologram (이진 위상 홀로그램을 이용한 간섭성 영상 암호화 및 복원)

  • 김종윤;김정우
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.3
    • /
    • pp.80-86
    • /
    • 2002
  • In this paper, we propose the new optical security technique using two phase holograms based on interferometer. The encoded random phase image does not have any information on the original image. Without Hewing the key mask, one cannot decode the encrypted image and regenerate the original image. And the use of two phase only images in the proposed security system leads to maximum optical efficiency (100% in theory). Also they cannot be detected by an intensity detector such as a CCD camera. Computer simulations and optical experiments show performance of the proposed methods.

  • PDF