• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
Citation: Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320

Texture Image Classification with Noise-Tolerant Local Binary Pattern

More Information
  • Published Date: April 30, 2016
  • The local binary pattern (LBP) is a simple and effective texture descriptor. However, it is very sensitive to image noise. To deal with this problem, we propose an efficient texture feature named noise-tolerant complete enhanced local binary pattern (CELBP\+{NT}) to enhance the discriminant ability against the noisy texture images. Derived from the local binary pattern, CELBP\+{NT} is robust to illumination, rotation and noise. Its feature extraction process involves the following three steps. First, different patterns in LBP are reclassified to form an enhanced LBP (ELBP) based on their structures and frequencies. Then, in order to describe the local feature completely and sufficiently, the difference of modulus value and center pixel information is added to ELBP to develop a complete ELBP feature, named CELBP. Meanwhile, the adaptive threshold of CELBP is determined by the image size. Finally, CELBP\+{NT} is proposed by using the favorable characteristics of multi-scale analysis on CELBP. The features are evaluated on the popular Outex database with different intensity and different types of noise. Extensive experimental results show that CELBP\+{NT} not only demonstrates better performance to a number of state-of-the-art LBP variants under no-noise condition, but also effectively improves the performance of texture classification containing noise due to its high robustness and distinctiveness.
  • Related Articles

    [1]Chen Jiaying, Yu Jiong, Yang Xingyao. A Feature Extraction Based Recommender Algorithm Fusing Semantic Analysis[J]. Journal of Computer Research and Development, 2020, 57(3): 562-575. DOI: 10.7544/issn1000-1239.2020.20190189
    [2]Shi Yuliang, Rong Yiping, Zhu Weiyi. Stealing Behavior Recognition Method Based on Electricity Characteristics Analysis[J]. Journal of Computer Research and Development, 2018, 55(8): 1599-1608. DOI: 10.7544/issn1000-1239.2018.20180216
    [3]Zhang Heng, Zhang Libo, WuYanjun. Large-Scale Graph Processing on Multi-GPU Platforms[J]. Journal of Computer Research and Development, 2018, 55(2): 273-288. DOI: 10.7544/issn1000-1239.2018.20170697
    [4]Ning Xin, Li Weijun, Li Haoguang, Liu Wenjie. Uncorrelated Locality Preserving Discriminant Analysis Based on Bionics[J]. Journal of Computer Research and Development, 2016, 53(11): 2623-2629. DOI: 10.7544/issn1000-1239.2016.20150630
    [5]Deng Hongxia, Xiang Jie, You Ya, Li Haifang. Analysis Method of Thinking Data Based on fMRI[J]. Journal of Computer Research and Development, 2014, 51(4): 773-780.
    [6]Chen Dayao, Chen Xiuhong, and Dong Changjian. Face Recognition Based on Null-Space Kernel Discriminant Analysis[J]. Journal of Computer Research and Development, 2013, 50(9): 1924-1932.
    [7]Wang Huafeng, Wang Yuting, Chai Hua. State-of-the-Art on Texture-Based Well Logging Image Classification[J]. Journal of Computer Research and Development, 2013, 50(6): 1335-1348.
    [8]Chen Gang and Chen Xinmeng. An Audio Feature Extraction Method Taking Class Information into Account[J]. Journal of Computer Research and Development, 2006, 43(11): 1959-1964.
    [9]Zheng Yujie, Yang Jingyu, Xu Yong, and Yu Dongjun. A New Feature Extraction Method Based on Fisher Discriminant Minimal Criterion[J]. Journal of Computer Research and Development, 2006, 43(7): 1201-1206.
    [10]Huang Yaping, Luo Siwei, and Qi Yingjian. Supervised Independent Component Analysis by Maximizing J-Divergence Entropy[J]. Journal of Computer Research and Development, 2005, 42(3).
  • Cited by

    Periodical cited type(10)

    1. 杨秀璋,彭国军,刘思德,田杨,李晨光,傅建明. 面向APT攻击的溯源和推理研究综述. 软件学报. 2025(01): 203-252 .
    2. 申国霞,常鑫. 基于可信密码模块的网络信道潜在攻击挖掘. 信息技术. 2023(10): 152-156+162 .
    3. 谢峥,路广平,付安民. 一种可扩展的实时多步攻击场景重构方法. 信息安全研究. 2023(12): 1173-1179 .
    4. 黄维贵,孙怡峰,欧旺,王玉宾. 基于不确定攻击图的违规外联风险分析. 信息工程大学学报. 2022(05): 570-577 .
    5. 王文娟,杜学绘,单棣斌. 基于动态概率攻击图的云环境攻击场景构建方法. 通信学报. 2021(01): 1-17 .
    6. 潘亚峰,朱俊虎,周天阳. APT攻击场景重构方法综述. 信息工程大学学报. 2021(01): 55-60+80 .
    7. 罗智勇,杨旭,刘嘉辉,许瑞. 基于贝叶斯攻击图的网络入侵意图分析模型. 通信学报. 2020(09): 160-169 .
    8. 王硕,王建华,汤光明,裴庆祺,张玉臣,刘小虎. 一种智能高效的最优渗透路径生成方法. 计算机研究与发展. 2019(05): 929-941 . 本站查看
    9. 吴东,郭春,申国伟. 一种基于多因素的告警关联方法. 计算机与现代化. 2019(06): 30-37 .
    10. 韩宜轩,秦元庆. 基于因果关联的电力工控系统攻击场景还原. 信息技术. 2019(08): 41-44+48 .

    Other cited types(13)

Catalog

    Article views (1398) PDF downloads (808) Cited by(23)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return