scispace - formally typeset
Search or ask a question
Topic

Contourlet

About: Contourlet is a research topic. Over the lifetime, 3533 publications have been published within this topic receiving 38980 citations.


Papers
More filters
Posted Content
01 Nov 2017-viXra
TL;DR: This study presents an efficient scheme for unsupervised colour–texture image segmentation using neutrosophic set (NS) and non-subsampled contourlet transform (NSCT) and reveals that the segmentation scheme outperforms the other methods for the Berkeley dataset.
Abstract: The process of partitioning an image into some different meaningful regions with the homogeneous characteristics is called the image segmentation which is a crucial task in image analysis.

39 citations

Journal ArticleDOI
TL;DR: A novel method to fuse infrared and visible light images based on region segmentation, which exhibits good infrared target features as well as clear visible background and its advantages over the conventional approaches is proposed.

39 citations

Journal ArticleDOI
TL;DR: A new medical image fusion algorithm based on nonsubsampled contourlet transform (NSCT) and spiking cortical model (SCM) and the effectiveness of the proposed algorithm is achieved by the comparison with existing fusion methods.
Abstract: In this paper, we present a new medical image fusion algorithm based on nonsubsampled contourlet transform (NSCT) and spiking cortical model (SCM). The flexible multi-resolution, anisotropy, and directional expansion characteristics of NSCT are associated with global coupling and pulse synchronization features of SCM. Considering the human visual system characteristics, two different fusion rules are used to fuse the low and high frequency sub-bands respectively. Firstly, maximum selection rule (MSR) is used to fuse low frequency coefficients. Secondly, spatial frequency (SF) is applied to motivate SCM network rather than using coefficients value directly, and then the time matrix of SCM is set as criteria to select coefficients of high frequency subband. The effectiveness of the proposed algorithm is achieved by the comparison with existing fusion methods.

39 citations

Journal ArticleDOI
TL;DR: Since watermark is embedded in the local as well as global CT coefficients of two different frequency bands, the proposed method is robust against a wide range of attacks.
Abstract: In this paper we propose a blind and highly robust watermarking method consisting of two embedding stages. In the first stage, the odd description of image is divided into non-overlapped fixed size blocks and the signature (watermark) is embedded in the high frequency component of the Contourlet transform (CT) of the blocks. In the second stage, the signature is embedded in the low frequency component of the global CT of the image. The main issue associated with two-stage blind watermarking is the selection of the less affected signature among the two embedded signatures. In this paper a measure is introduced to decide between the two extracted signatures. Simulation results indicate that the proposed method achieves higher robustness compared to other known watermarking methods. Moreover, since watermark is embedded in the local as well as global CT coefficients of two different frequency bands, the proposed method is robust against a wide range of attacks. This is due to the fact that most of the attacks affect either a specific frequency band or a specific location in the watermarked image.

39 citations

Journal ArticleDOI
TL;DR: The experimental results reveal that the proposed differential evolution-based image encryption technique outperforms the other existing techniques in terms of security and better visual quality.
Abstract: The main challenges of image encryption are robustness against attacks, key space, key sensitivity, and diffusion. To deal with these challenges, a differential evolution-based image encryption technique is proposed. In the proposed technique, two concepts are utilised to encrypt the images in an efficient manner. The first one is Arnold transform, which is utilised to permute the pixels position of an input image to generate a scrambled image. The second one is differential evolution, which is used to tune the parameters required by a beta chaotic map. Since the beta chaotic map suffers from parameter tuning issue. The entropy of an encrypted image is used as a fitness function. The proposed technique is compared with seven well-known image encryption techniques over five well-known images. The experimental results reveal that the proposed technique outperforms the other existing techniques in terms of security and better visual quality.

38 citations


Network Information
Related Topics (5)
Feature extraction
111.8K papers, 2.1M citations
89% related
Image processing
229.9K papers, 3.5M citations
85% related
Convolutional neural network
74.7K papers, 2M citations
84% related
Deep learning
79.8K papers, 2.1M citations
82% related
Artificial neural network
207K papers, 4.5M citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202336
202299
202175
2020109
2019155
2018164