Topic
Contourlet
About: Contourlet is a research topic. Over the lifetime, 3533 publications have been published within this topic receiving 38980 citations.
Papers published on a yearly basis
Papers
More filters
•
TL;DR: This study presents an efficient scheme for unsupervised colour–texture image segmentation using neutrosophic set (NS) and non-subsampled contourlet transform (NSCT) and reveals that the segmentation scheme outperforms the other methods for the Berkeley dataset.
Abstract: The process of partitioning an image into some different meaningful regions with the homogeneous characteristics is called the image segmentation which is a crucial task in image analysis.
39 citations
••
TL;DR: A novel method to fuse infrared and visible light images based on region segmentation, which exhibits good infrared target features as well as clear visible background and its advantages over the conventional approaches is proposed.
39 citations
••
TL;DR: A new medical image fusion algorithm based on nonsubsampled contourlet transform (NSCT) and spiking cortical model (SCM) and the effectiveness of the proposed algorithm is achieved by the comparison with existing fusion methods.
Abstract: In this paper, we present a new medical image fusion algorithm based on nonsubsampled contourlet transform (NSCT) and spiking cortical model (SCM). The flexible multi-resolution, anisotropy, and directional expansion characteristics of NSCT are associated with global coupling and pulse synchronization features of SCM. Considering the human visual system characteristics, two different fusion rules are used to fuse the low and high frequency sub-bands respectively. Firstly, maximum selection rule (MSR) is used to fuse low frequency coefficients. Secondly, spatial frequency (SF) is applied to motivate SCM network rather than using coefficients value directly, and then the time matrix of SCM is set as criteria to select coefficients of high frequency subband. The effectiveness of the proposed algorithm is achieved by the comparison with existing fusion methods.
39 citations
••
TL;DR: Since watermark is embedded in the local as well as global CT coefficients of two different frequency bands, the proposed method is robust against a wide range of attacks.
Abstract: In this paper we propose a blind and highly robust watermarking method consisting of two embedding stages. In the first stage, the odd description of image is divided into non-overlapped fixed size blocks and the signature (watermark) is embedded in the high frequency component of the Contourlet transform (CT) of the blocks. In the second stage, the signature is embedded in the low frequency component of the global CT of the image. The main issue associated with two-stage blind watermarking is the selection of the less affected signature among the two embedded signatures. In this paper a measure is introduced to decide between the two extracted signatures. Simulation results indicate that the proposed method achieves higher robustness compared to other known watermarking methods. Moreover, since watermark is embedded in the local as well as global CT coefficients of two different frequency bands, the proposed method is robust against a wide range of attacks. This is due to the fact that most of the attacks affect either a specific frequency band or a specific location in the watermarked image.
39 citations
••
TL;DR: The experimental results reveal that the proposed differential evolution-based image encryption technique outperforms the other existing techniques in terms of security and better visual quality.
Abstract: The main challenges of image encryption are robustness against attacks, key space, key sensitivity, and diffusion. To deal with these challenges, a differential evolution-based image encryption technique is proposed. In the proposed technique, two concepts are utilised to encrypt the images in an efficient manner. The first one is Arnold transform, which is utilised to permute the pixels position of an input image to generate a scrambled image. The second one is differential evolution, which is used to tune the parameters required by a beta chaotic map. Since the beta chaotic map suffers from parameter tuning issue. The entropy of an encrypted image is used as a fitness function. The proposed technique is compared with seven well-known image encryption techniques over five well-known images. The experimental results reveal that the proposed technique outperforms the other existing techniques in terms of security and better visual quality.
38 citations