• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Lei, Shi Zhiguo, Su Haoru, and Li Hong. Image Segmentation Based on Higher Order Markov Random Field[J]. Journal of Computer Research and Development, 2013, 50(9): 1933-1942.
Citation: Liu Lei, Shi Zhiguo, Su Haoru, and Li Hong. Image Segmentation Based on Higher Order Markov Random Field[J]. Journal of Computer Research and Development, 2013, 50(9): 1933-1942.

Image Segmentation Based on Higher Order Markov Random Field

More Information
  • Published Date: September 14, 2013
  • Image segmentation is an ill-posed problem, and accurate image segmentation can be done only if users supply enough constraint information. And the constraint information is always obtained in a user interactive way, and the foreground and background brush are used to label parts of the image pixels. In recent years, due to great progress in graph cut for solving the Markov random field (MRF) problem, more and more foreign researchers have developed many interactive image segmentation tools based on graph cut. Among all these tools, segmentation from a bounding box method is really attractive for its user-friendliness and perspective application. Based on recent popular grid MRF and SuperPixel MRF model, we introduce the higher order potential to the MRF based image segmentation problem. High order potential can capture not only pixel level image segmentation accuracy, but also local range image pixel correlation information. So the image segmentation algorithm performance is greatly enhanced due to the introduction of high order potential of for Gibbs energy function. Compared with pair-wise term MRF, high order MRF model has higher image description precision. Experimental results on image database show that our method outperforms GrabCut method. Finally, we extend our image segmentation from a box method to the video object segmentation problem and get good results.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (1389) PDF downloads (1176) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return