Abstract:
Methods and systems used to associate color calibration profiles with scanned images based on identifying the marking process used for an image on a substrate using spatial characteristics and/or color of the image. Image types which are classified and identified include continuous tone images and halftone images. Among halftone images separately identified are inkjet images, xerographic images and lithographic images. Locally adaptive image threshold techniques may be used to determine the spatial characteristics of the image.
Abstract:
Methods and systems used to associate color calibration profiles with scanned images based on identifying the marking process used for an image on a substrate using spatial characteristics and/or color of the image. Image types which are classified and identified include continuous tone images and halftone images. Among halftone images separately identified are inkjet images, xerographic images and lithographic images. Locally adaptive image threshold techniques may be used to determine the spatial characteristics of the image.
Abstract:
Novel fiducial designs that are based on a plane circle are Disclosed. These fiducial designs can provide five or six degree of freedom poses with a single fiducial using efficient closed form solutions. A novel pose estimation method is used to select the appropriate solution from the multiple solutions obtained, given certain application assumptions, is also disclosed.
Abstract:
The present invention relates to a method for assessing the presence or absence of lesion(s) in an image and a system therefor, wherein said image may be any image potentially comprising lesions, in particular an image from medical image diagnostics, and more particularly an ocular fundus image. The lesions are identified from starting points being candidate lesion areas and validated with respect to their visibility as compared to the local surroundings.
Abstract:
System and method for characterizing configurations of discrete curves based on detected symmetries in the configuration. A configuration of discrete closed curves is received. A plurality of configuration rotational symmetry sub-groups of the configuration are determined, each associated with one or more of the discrete curves, and based on each curve's distance from a configuration center of mass, equivalence class, rotational symmetry group, and sub-configuration rotational symmetry group. The configuration rotational symmetry sub-groups are determined by normalizing the configuration, including determining a configuration center of mass, determining the equivalence class and rotational symmetry group for each discrete curve, determining one or more subsets of the discrete curves based on each discrete curve's equivalence class and distance from the configuration center of mass, and determining configuration rotational symmetry sub-groups for each of the subsets based on each curve's rotational symmetry group, and relative orientations of the discrete curves in the subset.
Abstract:
In segmenting multidimensional image data, the data is represented as a set of points in a vector space which is the product of the vector space of pixel values and the vector space of pixel locations. Segments are determined by the result of clustering of the points, typically by simulating gravitational clustering of the points considered as point masses. From time to time the points are merged according to a proximity criterion, typically defined by mutual occupancy of a pre-defined hypercube in the vector space. The mapping of original pixels to points is tracked during the simulation process, so that pixels may be mapped to segments.
Abstract:
With little efforts, to estimate the appropriateness of automatic defect classification, and to make classification criteria settable with a guarantee for the better classification performance, defects unknown with their classification classes are classified based on two different classification criteria. Also, defects differed in classification results are collected, and each thereto, a defect classification class is provided by using a manual. Then, the defects provided with the classification classes are divided into two types of groups: one is a setting group for the classification criteria; and the other is an evaluation group. Based on the classification criteria that is so set as to classify the defects included in the setting group with the maximum performance, the classification performance of a case where classification is applied to defects included in the evaluation group is calculated, and the appropriateness of thus set classification criteria is evaluated.
Abstract:
A statistical facial feature extraction method is disclosed. In a training phase, N training face images are respectively labeled n feature points located in n different blocks to form N feature vectors. Next, a principal component analysis (PCA) technique is used to obtain a statistical face shape model after aligning each shape vector with a reference shape vector. In an executing phase, initial positions for desired facial features are firstly guessed according to the coordinates of the mean shape for aligned training face images obtained in the training phase, and k candidates are respectively labeled in n search ranges corresponding to above-mentioned initial positions to obtain kn different combinations of test shape vectors. Finally, coordinates of the test shape vector having the best similarity with the mean shape for aligned training face image and the statistical face shape model are assigned as facial features of the test face image.
Abstract:
A fast decomposition and synthesis invariant matching method receives an input image and a pattern template. The input image and pattern template image are used to create a match result output. A refined invariant match uses the initial match result and the pattern template to create a refined invariant match result. The fast decomposition and synthesis invariant pattern search method performs pattern decomposition and synthesis learning to create a pattern search recipe that is used by an invariant pattern search and synthesis method to generate the match result. The pattern search recipe includes template component invariant profiles, component weights, and allowable partial pattern configurations. The invariant matching method supports partial pattern match. This invention decomposes a template into multiple compact shaped components and performs search using separate rotation and scale invariant profiles for each component. It then synthesizes the search results for the complete template or partial template using the component search results. This invention can be directly generalized to three-dimensional or higher dimensional invariant pattern search and can achieves greater speed and accuracy than the prior art methods. Therefore, it can be used in applications such as 3D medical imaging, dynamic medical imaging, confocal microscopy, live cell assays in drug discovery, or ultrasound imaging.
Abstract:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians nulllog onnull to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images ofnullno-mannull zonesnullareas where no humans or vehicles should be present or monitorednullare sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches. Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.