• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jia Qi, Tian Xiaoyu, Fan Xin, Luo Zhongxuan, and Guo He. Planar Object Recognition Based on Characteristic Ratio[J]. Journal of Computer Research and Development, 2013, 50(9): 1883-1892.
Citation: Jia Qi, Tian Xiaoyu, Fan Xin, Luo Zhongxuan, and Guo He. Planar Object Recognition Based on Characteristic Ratio[J]. Journal of Computer Research and Development, 2013, 50(9): 1883-1892.

Planar Object Recognition Based on Characteristic Ratio

More Information
  • Published Date: September 14, 2013
  • Pattern recognition is an important research field in artificial intelligence. The stability of recognition under projection and affine transformation, especially under sever deformation has long been recognized as an important and difficult problem. In this paper, a novel geometry invariant named characteristic ratio(CHR) resistant to affine deformation is proposed. A new feature descriptor is also constructed based on this, which presents an image as the relationship of collinear points by a series of straight lines cross the image. Then, characteristic ratio is calculated by the position of collinear points, and the image is represented by a sequence of characteristic ratio spectra(CHRS). Finally, dynamic time warping (DTW) algorithm is employed to compare the similarity of spectra and to find the pixel level correspondence between two planar objects. It shows that the proposed method has not only good resistance to severe affine deformation, but also good discriminating ability to similar images.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (833) PDF downloads (668) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return