An image fusion algorithm of infrared and visible imaging sensors for cyber-physical systems

2019 ◽  
Vol 36 (5) ◽  
pp. 4277-4291 ◽  
Author(s):  
Lihui Chen ◽  
Xiaomin Yang ◽  
Lu Lu ◽  
Kai Liu ◽  
Gwanggil Jeon ◽  
...  
2012 ◽  
Vol 239-240 ◽  
pp. 1336-1339
Author(s):  
Xue Wen Ding ◽  
Berthold Mahundi ◽  
Fei Yang ◽  
Guang Quan Xu

The image fusion algorithm discussed in this paper which utilizes wavelet decomposition and fuzzy reasoning combines images from diverse imaging sensors into a single composite image. It first decomposed source images through wavelet transform, computed the extent of each source image’s contribution through fuzzy reasoning using the area feature of source images, and then fused the coefficients through weighted averaging with the extents of each source images’ contributions as the weight coefficients. Experimental results indicate the final composite image may have more complete information content or better perceptual quality than any one of the source images.


2019 ◽  
Vol 5 (3) ◽  
pp. 32 ◽  
Author(s):  
Ioannis Merianos ◽  
Nikolaos Mitianoudis

Modern imaging applications have increased the demand for High-Definition Range (HDR) imaging. Nonetheless, HDR imaging is not easily available with low-cost imaging sensors, since their dynamic range is rather limited. A viable solution to HDR imaging via low-cost imaging sensors is the synthesis of multiple-exposure images. A low-cost sensor can capture the observed scene at multiple-exposure settings and an image-fusion algorithm can combine all these images to form an increased dynamic range image. In this work, two image-fusion methods are combined to tackle multiple-exposure fusion. The luminance channel is fused using the Mitianoudis and Stathaki (2008) method, while the color channels are combined using the method proposed by Mertens et al. (2007). The proposed fusion algorithm performs well without halo artifacts that exist in other state-of-the-art methods. This paper is an extension version of a conference, with more analysis on the derived method and more experimental results that confirm the validity of the method.


IEEE Access ◽  
2017 ◽  
Vol 5 ◽  
pp. 9089-9098 ◽  
Author(s):  
Yu Wang ◽  
Bin Song ◽  
Peng Zhang ◽  
Ning Xin ◽  
Guixing Cao

Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document