期刊文献+

融合感知哈希特征的时空上下文目标跟踪算法 被引量:1

Combined spatio-temporal context and perceptual Hash algorithm
下载PDF
导出
摘要 文中提出融合感知哈希特征的时空上下文快速目标跟踪算法,在光照剧烈变化和目标被遮挡情况下能准确地跟踪目标。通过感知哈希特征对目标的位置进行评估,避免时空上下文算法在光照剧烈变化的跟踪漂移问题,并通过更新目标哈希值和时空上下文信息来进行下一次迭代。实验结果表明结合目标时空上下文信息的感知哈希跟踪算法与目前主流跟踪算法相比表现出更快的跟踪速度,并且在复杂背景和被遮挡后表现出较好的鲁棒性。 A real-time and last algorithm that combined spatio-temporal context and perceptual Hash is proposed in this paper. The proposed tracker can track the target accurately and robustly when there are illumination and shelter. The spatio-temporal context was used to estimate the target ’ s position to avoid tracking drift. Then it updates the Hash and spatio-temporal context a computing the target position in next frame. The experimental results indicate that compared with currently algorithms the algorithm combined spatio-temporal context and perceptual Hash algorithm has faster calculating speed.
作者 张庆刚 陈玮
出处 《信息技术》 2017年第4期144-147,152,共5页 Information Technology
关键词 目标跟踪 感知哈希 时空上下文 实时性 object tracking perc eptual Hash spatio - temporalcontext real- time
  • 相关文献

参考文献4

二级参考文献62

  • 1秦川,王朔中,张新鹏.一种基于视觉特性的图像摘要算法[J].中国图象图形学报,2006,11(11):1678-1681. 被引量:17
  • 2Yu H H, Kundur D, Lin C Y. Spies, thieves, and lies: the battle for multimedia in the digital era [J]. IEEE multimedia (S1070-986X), 2001, 8(3): 8-12. 被引量:1
  • 3Zhu B B, Swanson D M, Tewfik H A. When seeing isn't believing [J]. IEEE Signal processing magazine (S1053-5888), 2004, 21(2): 40-49. 被引量:1
  • 4Podilchuk I C, Delp J E. Digital watermarking: algorithms and applications [J]. IEEE Signal Processing Magazine (S1053-5888), 2001, 18(4): 33-46. 被引量:1
  • 5Monga V. Perceptually based methods for robust image hashing [D]. Austin, USA: University of Texas, 2005. 被引量:1
  • 6Schneider M, Chang S F. A robust content based digital signature for image authentication [C]// Proceedings of 1996 IEEE ICIP, Laussane, Switzerland. USA: IEEE, 1996, 3: 227-230. 被引量:1
  • 7Venkatesan R, Koon S M, et al. Robust image hashing [C]// Proceedings of 2000 IEEE ICIP. USA: IEEE, 2000, 3: 664-666. 被引量:1
  • 8Kozat S S, Venkatesan R, Mihcak K M. Robust perceptual image hashing via matrix invariants [C]// Proceedings of 2005 ICIP, Genova, Italy. Italy: IEEE, 2005: 3443-3446. 被引量:1
  • 9Lin C Y, Chang S F. A robust image authentication system distinguishing JPEG compression from malicious manipulation [J]. IEEE Trans. Circuit and Systems for Video Technology (S1051-8215), 2001, 11(2): 153-168. 被引量:1
  • 10Fridrich J Goljan M. Robust hash functions for digital watermarking [C]// IEEE Proceedings International Conference on Information Technology: coding and computing, Las Vegas, Nevada, USA. USA: IEEE, 2000: 178-183. 被引量:1

共引文献26

同被引文献8

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部