Automatic Generation of Pencil Drawing from Digital Image

2010 ◽  
Vol 159 ◽  
pp. 481-486
Author(s):  
Yao Li

This paper proposes a novel algorithm for the automatic generation of pencil drawing from digital image. We use multi-scale edge detector to construct an outline map according to the structural importance. Using strokes as the major building blocks, we smooth the boundary and rendering outline according to the pencil sketch style. Then, tone rendering is carried out to convey both the tone and textures of the original image. Experimental results on natural scenery and architectural scenery images show that the pencil sketch drawings produced by our method are of good visual effects. Besides, the implementation require less than 1 second on the image with 400*300 pixels.

2012 ◽  
Vol 546-547 ◽  
pp. 410-415
Author(s):  
Chun Ge Tang ◽  
Tie Sheng Fan ◽  
Lei Liu ◽  
Zhi Hui Li

A new blind digital watermarking algorithm based on the chain code is proposed. The chain code is obtained by the characteristics of the original image -the edge contour. The feather can reflect the overall correlation of the vector image, and chain code expression can significantly reduce the boundary representation of the amount of data required. For the watermarking embedding, the original vector image is divided into sub-block images, and two bits of the watermarking information are embedded into sub-block images repeatedly by quantization. For watermarking extracting, the majority decision method is employed to determine the size of the extracted watermark. Experimental results show that the image quality is not significantly lowered after watermarking. The algorithm can resist the basic conventional attacks and has good robustness on the shear attacks.


Author(s):  
Minh Thanh Tạ

This paper proposes a new watermarking method for digital image by composing the DWT-QIM based embedding with visual secret sharing (VSS) method. Firstly, the watermark image is separated into $n$ shares by using the $k-out-of-n$ method, called $(k,n)$ visual secret sharing. One of share is employed in order to embed into the original image for copyright protection. Another $(n-1)$ of shares are registered with Vietnam Copyright Department. When the dispute happens, the verifier can extract the watermark information from the watermarked image, then, decode it with $(k-1)$ shares chosen from $(n-1)$ shares to achieve the copyright information. Our experimental results show that our proposed method works efficiently on the digital images.


2020 ◽  
Vol 2020 (15) ◽  
pp. 350-1-350-10
Author(s):  
Yin Wang ◽  
Baekdu Choi ◽  
Davi He ◽  
Zillion Lin ◽  
George Chiu ◽  
...  

In this paper, we will introduce a novel low-cost, small size, portable nail printer. The usage of this system is to print any desired pattern on a finger nail in just a few minutes. The detailed pre-processing procedures will be described in this paper. These include image processing to find the correct printing zone, and color management to match the patterns’ color. In each phase, a novel algorithm will be introduced to refine the result. The paper will state the mathematical principles behind each phase, and show the experimental results, which illustrate the algorithms’ capabilities to handle the task.


2018 ◽  
Vol 233 ◽  
pp. 00025
Author(s):  
P.V. Polydoropoulou ◽  
K.I. Tserpes ◽  
Sp.G. Pantelakis ◽  
Ch.V. Katsiropoulos

In this work a multi-scale model simulating the effect of the dispersion, the waviness as well as the agglomerations of MWCNTs on the Young’s modulus of a polymer enhanced with 0.4% MWCNTs (v/v) has been developed. Representative Unit Cells (RUCs) have been employed for the determination of the homogenized elastic properties of the MWCNT/polymer. The elastic properties computed by the RUCs were assigned to the Finite Element (FE) model of a tension specimen which was used to predict the Young’s modulus of the enhanced material. Furthermore, a comparison with experimental results obtained by tensile testing according to ASTM 638 has been made. The results show a remarkable decrease of the Young’s modulus for the polymer enhanced with aligned MWCNTs due to the increase of the CNT agglomerations. On the other hand, slight differences on the Young’s modulus have been observed for the material enhanced with randomly-oriented MWCNTs by the increase of the MWCNTs agglomerations, which might be attributed to the low concentration of the MWCNTs into the polymer. Moreover, the increase of the MWCNTs waviness led to a significant decrease of the Young’s modulus of the polymer enhanced with aligned MWCNTs. The experimental results in terms of the Young’s modulus are predicted well by assuming a random dispersion of MWCNTs into the polymer.


2021 ◽  
Vol 11 (2) ◽  
pp. 721
Author(s):  
Hyung Yong Kim ◽  
Ji Won Yoon ◽  
Sung Jun Cheon ◽  
Woo Hyun Kang ◽  
Nam Soo Kim

Recently, generative adversarial networks (GANs) have been successfully applied to speech enhancement. However, there still remain two issues that need to be addressed: (1) GAN-based training is typically unstable due to its non-convex property, and (2) most of the conventional methods do not fully take advantage of the speech characteristics, which could result in a sub-optimal solution. In order to deal with these problems, we propose a progressive generator that can handle the speech in a multi-resolution fashion. Additionally, we propose a multi-scale discriminator that discriminates the real and generated speech at various sampling rates to stabilize GAN training. The proposed structure was compared with the conventional GAN-based speech enhancement algorithms using the VoiceBank-DEMAND dataset. Experimental results showed that the proposed approach can make the training faster and more stable, which improves the performance on various metrics for speech enhancement.


2005 ◽  
Vol 05 (01) ◽  
pp. 135-148 ◽  
Author(s):  
QIBIN SUN ◽  
SHUIMING YE ◽  
CHING-YUNG LIN ◽  
SHIH-FU CHANG

With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic signature scheme to make the digital signatures robust to these image degradations. Due to the unpredictable degradations, the pre-processing and block shuffling techniques are applied onto the image at the signing end to stabilize the feature extracted at the verification end. The proposed approach is compatible with traditional cryptographic signature scheme except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Zhijun Wang

Since the artistry of the work cannot be accurately described, the identification of reproducible plagiarism is more difficult. The identification of reproducible plagiarism of digital image works requires in-depth research on the artistry of artistic works. In this paper, a remote judgment method for plagiarism of painting image style based on wireless network multitask learning is proposed. According to this new method, the uncertainty of painting image samples is removed based on multitask learning algorithm edge sampling. The deep-level details of the painting image are extracted through the multitask classification kernel function, and most of the pixels in the image are eliminated. When the clustering density is greater than the judgment threshold, it can be considered that the two images have spatial consistency. It can also be judged based on this that the two images are similar, that is, there is plagiarism in the painting. The experimental results show that the discrimination rate is always close to 100%, the misjudgment rate of plagiarism of painting images has been reduced, and the various indicators in the discrimination process are the lowest, which fully shows that a very satisfactory discrimination result can be obtained.


2019 ◽  
Vol 7 (4) ◽  
pp. 254
Author(s):  
Nada E. Tawfiq

Image files can hide text without their size being affected too much. This process called steganography which allows hiding text in images without any suspicions from intruders. This paper addresses an improved LSB substitution algorithm for hiding Kurdish text information written in text file into digital image as steganography technique. The algorithm consists of two main phases, the first phase holds the encryption of the Kurdish text message and the embedded technique while the second phase hold the message extraction followed by decryption to get the original code of each character. The algorithm contains many procedures to enhance this process. Least Significant Bit method is used to hide the Kurdish text, in order to keep the features and characteristics of the original image. Applying the proposed approach shows that it seems work in a best case by hiding and retrieving text from the digital image which is used as a carrier of this text. Delphi 2010 was used to simulate both encrypt-embedded phase and extract-decrypt phase, and the results were obtained with high and security which proved the efficiency of the algorithm, where the hidden Kurdish text didn’t make any distortion or change over the cover image.


Author(s):  
Youssef Ouadid ◽  
Abderrahmane Elbalaoui ◽  
Mehdi Boutaounte ◽  
Mohamed Fakir ◽  
Brahim Minaoui

<p>In this paper, a graph based handwritten Tifinagh character recognition system is presented. In preprocessing Zhang Suen algorithm is enhanced. In features extraction, a novel key point extraction algorithm is presented. Images are then represented by adjacency matrices defining graphs where nodes represent feature points extracted by a novel algorithm. These graphs are classified using a graph matching method. Experimental results are obtained using two databases to test the effectiveness. The system shows good results in terms of recognition rate.</p>


Sign in / Sign up

Export Citation Format

Share Document