期刊文献+

基于小波和维纳图像复原的像移补偿方法 被引量:1

Image motion compensation using image restoration based on wavelet and Wiener filtering
下载PDF
导出
摘要 提出一种基于小波变换和维纳滤波相结合的图像复原方法,有效地消除了航空成像系统的像移模糊。该算法先在小波变换的基础上对各个子频段的小波系数进行维纳滤波,以达到更好的消除模糊的目的。然后对维纳滤波后的图像进行小波逆变换,得到复原图像。经实验验证该算法对因前向像移造成的图像模糊有比较好的复原效果。 An image restoration algorithm based on wavelet and Wiener filtering is proposed, which effectively removed image blur for aerial image. Firstly the Wiener filtering was utilized in the wavelet coefficient after wavelet transform to remove image blur effectually. Then inverse wavelet transform was used to get restoration image. The simulation results show that this algorithm is effective in removing the image blur caused by the forward image motion.
作者 刘广建 贾平
出处 《微计算机信息》 2009年第18期296-297,42,共3页 Control & Automation
关键词 图像复原 像移模糊 小波变换 维纳滤波 小波逆变换 image restoration motion-blurred wavelet transform Wiener filtering inverse wavelet transform
  • 相关文献

参考文献7

  • 1Shuanghe Peng, Zhen Han. Trust of User Using U-Key on Trusted Platform[J]. IEEE, 2006. 被引量:1
  • 2Trusted Computing Group. TCG Specification Architecture Overview [S].2006.03.29. Specification version 1.2. https://www. trustedcomputinggroup.org. 被引量:1
  • 3Trusted Computing Group. Trusted Platform Module Main Specification Partl: Design Principles; Part 2: TPM Structures; Part3: Commands [S]. https://www.trustedcomputinggroup.org. 2006.3.29. Specification version 1.2. 被引量:1
  • 4Trusted Computing Group. TCG Software Stack(TSS)Specification [S]. 2003.08.20.Specification version 1.10. https://www.trustedcomputinggroup.org. 被引量:1
  • 5王克宏.Java虚拟机规范[M].北京婧华大学出版社1998:1-9. 被引量:2
  • 6Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert Van Doom. Design and Implementation of a TCG-Based Integrity Measurement Architecture[J]. Computer Science, January 16, 2004. 被引量:1
  • 7周涛,池亚平,方勇,亓文华.基于可信度量机制的数字签名模型[J].微计算机信息,2008,24(18):35-37. 被引量:2

二级参考文献7

  • 1王飞,刘毅.可信计算平台安全体系及应用研究[J].微计算机信息,2007(03X):76-78. 被引量:18
  • 2Adrian Spalka, Armin B. Cremers and Hanno Langweg: The Fairy Tale of What You See Is What You Sign-Trojan Horse Attacks on Software for Digital Signatures, [A]. Proceedings of IFIP Working Conference on Security and Control of IT in Society-II. Pp. 75-86, 2001,. 被引量:1
  • 3Trusted Computing Group (TCG). TCG specification architecture overview [EB/OL].https://www.tru_stedcomputinggroup.org/specs/IWG/TCG_ 1_0_Architecture_Overview.pdf, 2005-2-12. 被引量:1
  • 4Trusted computing Platform Alliance (TCPA). Main specification version 1.1b[EB/OL] https://www.trustedcomputinggroup.org/specs/ TPM/TCPA_Main_TCG_Architecture vl lb.pdf, 2005-10-19. 被引量:1
  • 5Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert Van Doorn, Design and Implementation of a TCG-Based Integrity Measurement Architecture, [J].Computer Science, January 16, 2004. 被引量:1
  • 6Arvind Seshadri, Mark Luk, Elaine Shi,Pioneer. Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems, [A].Proceedings of the twentieth ACM symposium on Operating systems principles, Pp. 1-16, 2005. 被引量:1
  • 7KUBBILUN Wolfgang, GAJEK Sebastian, PSARROS Michael, Trustworthy verification and visualization of multiple XML-signa tures,[J]. communications and multimedia security ,pp.?311-320, September 2005. 被引量:1

共引文献1

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部