PANORAMIC IMAGE STITCHING USING A PROBABILISTIC COLOUR CORRECTION APPROACH
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 3
Abstract
Image mosaicing in image processing is a technique in which two or more partially overlapping images of the same scene taken at different times and from different positions are combined together to get a more clearer view of the scene. Image mosaics are obtained by performing geometrical and photometrical corrections to the images. This paper deals with colour correction of panoramic images. Mean shift algorithm is employed to segment the image into several regions. Region fusion algorithm thereafter extracts the connected regions. Maximum likelihood estimation procedure models the local joint image histograms as truncated Gaussians. These sets of Gaussians are then used to compute the local colour palette mapping functions. These mapping functions are then applied to the image to establish colour correction.
Authors and Affiliations
Ayona Rajan, Varatharajan R.
Event Driven Plasticity Model for Analyzing Activities through Eye Blink and Classical Conditions
Human proficiency in dealing with alternative dynamic circumstances and accomplishment of uninterrupted different tasks in usually non-stationary atmospheres has got the neuroscientists’ attention to realize the mechanis...
Optimization of Region and Power with Routability Constrained Flip Flop Joining Process
The main factor considered during designing the in low power and high performance was the power consumption. It plays an important role in the above mentioned region. The concept of multi-bit flip–flop assembled structur...
Sleep Apnea Detection using Heart Rate Variability and Classifiers
The Obstructive Sleep Apnea (OSA) or Obstructive Sleep Apnea Syndrome (OSAS) is the sleeping disorder causing the pause in breathing process or a very low breathing rate while sleeping. The standard technique for analyzi...
Enhancement of Security and Usability Standards with a Novel Storage Optimized Honeyword Generation Approach
Among the modern security threats on password based authentication techniques, the brute force computation is the one that performs the inversion of hash values. Several technologies have been developed for the computati...
DESIGN OF LOW POWER 32-BIT CSKA FOR HIGH SPEED APPLICATIONS
Research in Very Large Scale Integration (VLSI) based design of Integrated Circuits (IC) addresses the issues of power, area and time consumption by the components used. These violates the spee...