Listing 1 - 1 of 1 |
Sort by
|
Choose an application
Image analysis is a fundamental task for extracting information from images acquired across a range of different devices. Since reliable quantitative results are requested, image analysis requires highly sophisticated numerical and analytical methods—particularly for applications in medicine, security, and remote sensing, where the results of the processing may consist of vitally important data. The contributions to this book provide a good overview of the most important demands and solutions concerning this research area. In particular, the reader will find image analysis applied for feature extraction, encryption and decryption of data, color segmentation, and in the support new technologies. In all the contributions, entropy plays a pivotal role.
keyframes --- time-delay --- whale optimization algorithm --- multilevel thresholding --- multi-exposure image fusion --- additive manufacturing --- patch structure decomposition --- ultra-sound images --- 3D scanning --- Arimoto entropy --- contrast enhancement --- spatial filling factor --- depth maps --- image processing --- 3D prints --- differential evolution --- field of experts --- normalized divergence measure --- image privacy --- multiscale top-hat transform --- q-exponential --- texture information entropy --- diffusion --- hybrid algorithm --- Weibull statistics --- adaptive selection --- nonextensive entropy --- computer aided diagnostics --- fatty liver --- random forest --- DNA encoding --- low contrast --- entropy --- Minkowski island --- fuzzy entropy --- free-form deformations --- person re-identification --- chaotic system --- DNA computing --- pavement --- information entropy --- discrete entropy --- Tsallis statistics --- video skimming --- prime-indexed primes --- natural scene statistics (NSS) --- Hénon map --- q-sigmoid --- image entropy --- Shannon entropy --- macrotexture --- Shannon’s entropy --- binary image --- multi-feature fusion --- image analysis --- uncertainty assessment --- non-rigid registration --- hash layer --- Cantor set --- dynamic filtering --- deep neural network --- security analysis --- multiple-image encryption --- Hamming distance --- blind image quality assessment (BIQA) --- q-Gaussian --- remote sensing --- decay trend --- chaotic cryptography --- chaotic strategy --- cross-entropy loss --- random insertion --- metabolic syndrome --- sign languages --- generalized entropies --- relevance feedback --- image retrieval --- two-dimensional chaotic economic map --- cryptanalysis --- infrared images --- 3D Latin cube --- SHA-256 hash value --- gradient distributions --- structural entropy --- discrete cosine transform (DCT) --- chaotic map --- hepatic steatosis --- machine vision --- electromagnetic field optimization --- security --- image segmentation --- quantization loss --- colonoscopy --- video summarization --- permutation --- Kapur’s entropy --- surface quality assessment --- permutation-diffusion --- Ramanujan primes --- Rényi entropies --- chosen-plaintext attack --- image encryption --- dynamic index --- color image segmentation --- ultrasound --- Otsu method --- sigmoid --- reconstruction --- image information entropy --- 3-D digital imaging --- positron emission tomography --- medical imaging
Listing 1 - 1 of 1 |
Sort by
|