SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 6, December 2021, pp. 3240~3248
ISSN: 2302-9285, DOI: 10.11591/eei.v10i6.3243 3240
Journal homepage: http://beei.org
Noise resistance territorial intensity-based optical flow using
inverse confidential technique on bilateral function
Darun Kesrarat1
, Vorapoj Patanavijit2
1
Department of Information Technology, Vincent Mary School of Science and Technology, Assumption University,
Bangkok, Thailand
2
Department of Computer and Network Engineering, Vincent Mary School of Engineering, Assumption University,
Bangkok, Thailand
Article Info ABSTRACT
Article history:
Received May 26, 2021
Revised Sep 7, 2021
Accepted Oct 18, 2021
This paper presents the use of the inverse confidential technique on bilateral
function with the territorial intensity-based optical flow to prove the
effectiveness in noise resistance environment. In general, the image’s motion
vector is coded by the technique called optical flow where the sequences of
the image are used to determine the motion vector. But, the accuracy rate of
the motion vector is reduced when the source of image sequences is interfered
by noises. This work proved that the inverse confidential technique on
bilateral function can increase the percentage of accuracy in the motion vector
determination by the territorial intensity-based optical flow under the noisy
environment. We performed the testing with several kinds of non-Gaussian
noises at several patterns of standard image sequences by analyzing the result
of the motion vector in a form of the error vector magnitude (EVM) and
compared it with several noise resistance techniques in territorial intensity-
based optical flow method.
Keywords:
Bilateral filter
Error vector magnitude
Inverse confidential
Non-gaussian noise
Optical flow
This is an open access article under the CC BY-SA license.
Corresponding Author:
Darun Kesrarat
Department of Information Technology
Vincent Mary School of Science and Technology, Assumption University
88 Moo 8 Bang Na-Trad Km. 26 Bangsaothong, Samuthprakarn 10570 Thailand
Email: darunksr@gmail.com
1. INTRODUCTION
The optical flow [1], [2] is a favorite specific method that it is used in numerous areas for more than
3 decades serving as movement prediction by pointing the motion vector (MV) as the main issue. In regular
movement capture [3], [4], motion remuneration [5], image compression [6], and film encoding [7], [8], the
MV is coded by using the optical flow method and it is applied in further processing. Also in image super-
resolution reconstruction areas [9], [10], the optical flow method is an essential part. At that point, the
certainty result of optical flow is necessary. Basically, the optical flow is the coding method that it is used to
point the MV base on the serial images. Numerous optical flow methods that were present like the global
intensity-based method [11], section-based method [12], and phase-based method [13]. However, this paper
attends to study the territorial intensity-based optical flow method [14]. T-OF is one of the accepted optical
flow methods that using the intensity-based algorithm where it has been adjusted in numerous areas in early
with a fine performance, coding speed, and noise resistance. Many research efforts may point to the
improvement on coding speed [15], [16] but the efficiency of noise resistance is focused on in this paper as
the main issue.
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Noise resistance territorial intensity-based optical flow using inverse confidential … (Darun Kesrarat)
3241
In current situation, image and video transmission are a major application area of wireless
communication systems. A peripheral noise reduces sensed image quality and affects look patterns. This
effect of image noise interference on gaze distribution was mainly inclined by noise intensity rather than
noise type. With the image noise interference, the coding of the optical flow is impacted directly and leads to
the error in the result of MV. Many model emphasizes efficient transmission of images from one place to
another with minimum possible errors [17]-[19]. Many solutions proposed the improvement in the quality of
the interfered image or denoise process [20]-[22] in early-stage separately out of the optical flow. But these
approaches took additional denoise processing. The other solution is the improvement on the optical flow
coding itself for noise resistance by adding correlate function and algorithm in the optical flow coding like
inverse confidential and bilateral function [23], [24]. And this is the main issue in this work where the
effectiveness in noise resistance territorial intensity-based method optical flow was proved by using the
technique of inverse confidential in accompany with bilateral function.
This paper focuses on the noise resistance territorial intensity-based optical flow method using the
inverse confidential technique on bilateral function [25]. This paper intends to inspect the effectiveness of
optical coding on non-Gaussian noises in contaminating with sequences image data set. In our experiment,
the non-Gaussian noises like Satl&Pepper at 2 levels of density, Speckle at 2 levels of variance, and Poisson
are used in contaminating with the 4 patterns of standard image sequences like coastguard, foreman, akiyo,
and container. In our effectiveness analysis, we used the error vector magnitude (EVM). The EVM regards
the scale of fault in direction of the determined MV. The paper organization is regulated as follows. Part 2
describes the research methods in optical flow. Part 3 describes the measurement of the performance in noise
resistance adjacent to the other noise resistance methods to confirm the satisfying result of T-RB in noise
resistance. Part 4 describes the conclusion.
2. RESEARCH METHODS IN TERRITORIAL INTENSITY-BASED METHOD OPTICAL
FLOW AND NOISE RESISTANCE TECHNIQUES
In this part, it is explained the territorial intensity-based optical flow method and the noise resistance
techniques on this optical flow.
2.1. Territorial intensity-based optical flow method
The territorial intensity-based optical flow method (T-OF) [14] is an ordinary method for
determining the MV in 2 dimension movement. The T-OF determine via the value of “intensity of luminous
scale” and “smoothness deviation” [26], [27] with a weight least-square for each territorial. The formula is
coded to determine the classical MV as:
[
𝒖(𝒙, 𝒚, 𝒌)
𝒗(𝒙, 𝒚, 𝒌)
] = [
∑ 𝑰𝒙
𝟐
(𝒙, 𝒚, 𝒌) ∑ 𝑰𝒙(𝒙, 𝒚, 𝒌)𝑰𝒚(𝒙, 𝒚, 𝒌)
∑ 𝑰𝒙(𝒙,𝒚, 𝒌)𝑰𝒚(𝒙, 𝒚, 𝒌) ∑ 𝑰𝒚
𝟐
(𝒙, 𝒚, 𝒌)
]
−𝟏
× [
− ∑ 𝑰𝒙(𝒙, 𝒚, 𝒌)𝑰𝒌(𝒙,𝒚, 𝒌)
− ∑ 𝑰𝒚(𝒙, 𝒚, 𝒌)𝑰𝒌(𝒙, 𝒚, 𝒌)
] (1)
With the above formula for T-OF, the flow is constant in a territorial neary pixel. The formual for all
the pixels in that territorial is solved by the least squares. A weight least-square is coded to determine the MV
in each territorial. Where I(x,y,k) indicate the intensity of luminous value at a position (x,y) on an image at
sequence no. k. in a territorial of vertical and horizontal alignment. The formula for intensity of luminous is:
(2)
2.2. T-OF using bilateral function
The bilateral function is one of the general famous noise removal functions. The use of the bilateral
function is found to good effective result in noise resistance when it is coded in correlate with the optical
flow called T-OF using the bilateral function (T-B) [23]. The main procedure is to code the bilateral function
[28]-[31] over the determined MV from the T-OF. The bilateral formula over the determined MV from the T-
OF is:
(3)
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3240 – 3248
3242
With the above formula for T-B, the bilateral function is adopt to with averagely weighted from
territorial MV. Where K is the kernel normalization found on the conventional groundwork [28]. In our
analysis, we referred territorial for M by ±7. The formula for kernel normalization (K) is:
(4)
Where m is the territorial group of bilateral gaussian kernel (ɸ). The formula for bilateral gaussian kernel (ɸ)
is:
(5)
2.3. T-OF using inverse confidential
In the T-OF using inverse confidential (T-I) [24], the 2 ways hypothesis was proposed to identify
confidence rate to ensure certainty of the MV from the optical flow. With the confidence function, the optical
flow is coded to determine the MV in inverse direction and used to determine the confidential base on the
following formula:
(6)
Where vl and vl- are ordinary MV and inverse MV, and n is the number of territorial MV. s is the
point (x,y) on a 2-dimensional image and  bypasses the division by nil in the formula. The confidence rates
are used to code the ending MV in an average of territorial (N(s0)) by:
(7)
Where ))
(
( 0
s
v n
l
is coded from the confidence rate among territorial N(s0) based on the point s0=(x, y, k).
2.4. T-OF using inverse confidential technique with bilateral function
The T-OF using the inverse confidential technique with bilateral function (T-IB) [25] is the
accompanying method between inverse confidential technique and bilateral function. The procedure of T-RB
is illustrated in Figure 1.
Code the MV with
T-OF by the 2-ways
hypothesis of T-I
method
Code the ending
MV by confidence
rate based on T-I
method
Run Bilateral
function on 2-ways
MV
Capture the
sequence Images
Sequence
images
2 ways
MV
2 ways
Bilateral
vector
Figure 1. The procedure of T-IB
First, the traditional T-OF is used to code the MV under the 2 ways hypothesis in T-I. Consequently,
the results of MV in 2 directions are used to calculate with bilateral function. After that, the determination
MV is continued to process through a confidence rate based on the T-I method.
3. EXPERIMENTAL AND CONSEQUENCE
In our experimental, we focused mainly on T-OF and compared its performance against the other
methods where the environment and configuration for the experimental was stated as follow. For T-OF, we
adjusted the smoothness deviation with mask coefficient on 5 iteration loops of territorial (5×5) without
pyramid for coding MV.
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Noise resistance territorial intensity-based optical flow using inverse confidential … (Darun Kesrarat)
3243
About the standard image sequences, we adjusted 4 different patterns of QCIF (176×144) image
sequences (coastguard, foreman, akiyo, and container) in line for 100 frames each. Figure 2 shows each
illustration. And Poisson Noise, Speckle Noise at variance 0.01 and 0.05, and Salt&Pepper Noise at density
0.005 and 0.025 are represented as the non-Gaussian noise used in the experiment. Entirely, there were 20
sets of the image sequence in the experiment along with the performance comparison of the proposed T-IB
with classical T-OF, T-I, and T-B.
(a) (b) (c) (d)
Figure 2. The image sequences on the experiment, (a) coastguard, (b) foreman, (c) akiyo, (d) container
Obviously, the consequence of noise resistance was determined by the EVM. The EVM is
accurately to admeasure the MV for quantifying the performance. The low value in EVM means the
improvement in noise resistance. Here, we adjusted only the active movement vector against the ground truth
vector with root-mean-square by average.
Table 1 shows the compiled average EVM of each optical flow method through 100 frames on each
kind of non-Gaussian noise in correspondence with each pattern of the standard image sequence. Figures 3 to
Figure 6 present the “EVM frame outline” in comparison among several noise resistance optical flow
methods over each kind of noise based on each pattern of standard image sequence by the graph.
Table 1. The compiled average EVM
COASTGUARD FOREMAN AKIYO CONTAINER
Average
EVM
SD of
EVM
Average
EVM
SD of
EVM
Average
EVM
SD of
EVM
Average
EVM
SD of
EVM
Poisson
T-OF 3.111 0.611 3.654 0.590 3.141 0.206 3.606 0.103
T-B 2.983 0.592 3.492 0.584 2.985 0.205 3.494 0.097
T-I 3.036 0.600 3.566 0.588 3.067 0.206 3.544 0.103
*T-IB 2.947 0.586 3.449 0.583 2.946 0.205 3.463 0.097
Salt
&
Pepper
density
0.005
T-OF 3.360 0.631 4.004 0.696 3.291 0.225 3.713 0.134
T-B 3.188 0.590 3.779 0.624 3.110 0.192 3.547 0.105
T-I 3.274 0.612 3.877 0.677 3.215 0.217 3.640 0.121
*T-IB 3.145 0.580 3.714 0.616 3.066 0.188 3.513 0.101
Salt
&
Pepper
density
0.025
T-OF 3.423 0.594 3.901 0.567 3.341 0.319 3.849 0.189
T-B 3.155 0.569 3.659 0.562 3.145 0.240 3.654 0.150
T-I 3.287 0.584 3.762 0.565 3.217 0.282 3.735 0.167
*T-IB 3.077 0.568 3.579 0.566 3.062 0.228 3.573 0.134
Speckle
variance
0.01
T-OF 3.112 0.601 3.619 0.588 3.106 0.206 3.580 0.102
T-B 2.972 0.589 3.466 0.583 2.982 0.220 3.474 0.099
T-I 3.038 0.592 3.537 0.587 3.038 0.208 3.523 0.102
*T-IB 2.938 0.583 3.425 0.582 2.950 0.218 3.448 0.101
Speckle
variance
0.05
T-OF 3.074 0.573 3.511 0.554 3.081 0.219 3.577 0.092
T-B 2.934 0.578 3.368 0.565 2.944 0.223 3.474 0.094
T-I 3.000 0.573 3.438 0.560 3.009 0.221 3.519 0.093
*T-IB 2.898 0.579 3.332 0.569 2.907 0.226 3.448 0.093
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3240 – 3248
3244
(a) (b)
(c) (d)
(e)
Figure 3. The EVM frame outline of COASTGUARD, (a) poisson, (b) salt & pepper density 0.005, (c) salt &
pepper density 0.025,(d) speckle variance 0.01, (e) speckle variance 0.05
(a) (b)
Figure 4. The EVM frame outline of FOREMAN, (a) poisson, (b) salt & pepper density 0.005
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Noise resistance territorial intensity-based optical flow using inverse confidential … (Darun Kesrarat)
3245
(c) (d)
(e)
Figure 4. The EVM frame outline of FOREMAN, (c) salt & pepper density 0.025, (d) speckle variance 0.01,
(e) speckle variance 0.05 (continue)
(a) (b)
(c) (d)
Figure 5. The EVM frame outline of AKIYO,(a) poisson, (b) salt & pepper density 0.005, (c) salt & pepper
density 0.025, (d) speckle variance 0.01
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3240 – 3248
3246
(e)
Figure 5. The EVM frame outline of AKIYO, (e) speckle variance 0.05 (continue)
(a) (b)
(c) (d)
(e)
Figure 6. The EVM frame outline of CONTAINER,(a) poisson, (b) salt & pepper density 0.005, (c) salt &
pepper density 0.025, (d) speckle variance 0.01, (e) speckle variance 0.05
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Noise resistance territorial intensity-based optical flow using inverse confidential … (Darun Kesrarat)
3247
4. CONCLUSION
Regarding the character of territorial processing in T-OF, it provided a good result in noise
resistance by traditional. Then, the overall result of noise resistance of T-I, T-B, and T-IB was slightly
improved over T-OF. In our investigation, we proved that the proposed method (T-IB) presented the best
noise resistance on the non-Gaussian noise overall. Then, the software areas such namely move to track
within the noisy surroundings are appropriate in accordance with adopting this method in accordance with
gain accuracy among the territorial intensity-based optical flow method. By the way, there is no beyond
compare method at this moment. Regarding the detail in the frame outline, the performance of T-I, and T-B
still presented the best result in noise resistance in a few frames. Then, the research on numerous kinds of
noise with numerous noise resistance methods is a controversy for the prospective research.
ACKNOWLEDGEMENTS
This research project was funded by Assumption University of Thailand.
REFERENCES
[1] Andrew and J. R. Burton, “Thinking in Perspective: Critical Essays in the Study of Thought Processes,” Routledge,
ISBN 978-0-416-85840-2, 1978.
[2] D. H. Warren and E. R. Strelow, “Electronic Spatial Sensing for the Blind: Contributions from Perception,”
Springer, 1985.
[3] C. S. Royden and K. D. Moore, “Use of speed cues in the detection of moving objects by moving observers,”
Vision Research, vol. 59, pp. 17-24, 2012, doi: 10.1016/j.visres.2012.02.006.
[4] S. A. Mahmoudi, M Kierzynka, P. Manneback and K. Kurowski, “Real-time motion tracking using optical flow on
multiple GPUs,” Bulletin of the Polish Academy of Sciences. Technical Sciences, vol. 62, no. 1, pp. 139-150, 2014.
[5] Z. Chen, T. He, X. Jin and F. Wu, “Learning for Video Compression,” IEEE Transactions on Circuits and Systems
for Video Technology, vol. 30, no. 2, pp. 566-576, 2020, doi: 10.1109/TCSVT.2019.2892608.
[6] A. J. Qasim, R. Din and F. Q. A. Alyousuf, “Review on techniques and file formats of image compression,”
Bulletin of Electrical Engineering and Informatics, vol. 9, no. 2, pp. 602-610, 2020, doi: 10.11591/eei.v9i2.2085.
[7] T. Wiegand, G. J. Sullivan, G. Bjontegaard and A. Luthra, "Overview of the H.264/AVC video coding standard,"
in IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 7, pp. 560-576, July 2003, doi:
10.1109/TCSVT.2003.815165
[8] ISO, “Information Technology-Coding of Audio Visual Objects-Part 2: Visual, JTC1/SC29/WG11, ISO/IEC 14
469-2 (MPEG-4 Visual),” 2000, [Online]. Available: https://www.iso.org/standard/39259.html.
[9] C. Deng, J. Liu, W. Tian, S. Wang, H. Zhu and S. Zhang, “Image Super-Resolution Reconstruction Based On L1/2
Sparsity,” Bulletin of Electrical Engineering and Informatics, vol. 3, no. 3, pp. 155-160, 2014.
[10] D. Kesrarat, K. Thakulsukant and V. Patanavijit, “A Novel Elementary Spatial Expanding Scheme Form on SISR
Method with Modifying Geman & Mcclure Function,” Telecommunication, Computing, Electronics and Control
TELKOMNIKA, vol. 17, no. 5, pp. 2554-2560, doi: 10.12928/TELKOMNIKA.v17i5.12799.
[11] K. P. Berthold and B. G. Schurnck, “Determining Optical Flow,” Artificial Intelligence, vol. 17, pp. 185-203, 1981.
[12] T. R. Reed, “Digital Image Sequence Processing, Compression, and Analysis,” Chemical Rubber Company (CRC)
Press, 2004, doi: 10.1201/9780203486788.
[13] D. J. Fleet and A. D. Jepson, “Computation of component image velocity from local phase information” Computer
Vision, vol. 5, pp.77-104, 1990.
[14] B. D. Lucas and T. Kanade, “An Iterative Image Registration Technique with an Application to Stereo Vision,”
Proceeding of Defense Advanced Research Projects Agency (DARPA) Image Understanding Workshop, pp. 121-
130, 1981.
[15] Y. Su, Y. Huang and C. J. Kuo, “Efficient Text Classification Using Tree-structured Multi-linear Principal
Component Analysis,” 24th International Conference on Pattern Recognition ICPR, 2018, pp. 585-590, doi:
10.1109/ICPR.2018.8545832.
[16] Y. Su, R. Lin and C. C. J. Kuo, “Tree-structured multi-stage principal component analysis (TMPCA): Theory and
applications,” Expert Systems with Applications, vol. 118, pp. 355-364, 2019, doi: 10.1016/j.eswa.2018.10.020.
[17] M. Kaur, L. Kansal, N. Kaur, G. S. Gaba and D. P. Agrawal, “Analysis of Image Transmission using MIMO-
Alamouti Space-Time Encoding,” International Journal on Advanced Science, Engineering and Information
Technology, vol. 9, no. 1, 2019.
[18] M. Kaur, L. Kansal and N. Kaur, “Image transmission using MIMO-OSTBC3 space-time encoding,” Far East
Journal of Electronics and Communications, vol. 17, no. 6, pp. 1437-1450, 2017, doi: 10.17654/EC017061437.
[19] L. Kansal, G. S. Gaga, N. Chilamkurti and B. G. Kim, “Efficient and Robust Image Communication Techniques for
5G Applications in Smart Cities,” Energies, vol. 14, no. 13, 2021, doi: 10.3390/en14133986.
[20] V. Patanavijit and K. Thakulsukanant, “A Computational Experimental Investigation of Noise Suppressing
Technique Stand on Hard Decision Threshold Dissimilarity under Fixed-Intensity Impulse Noise,” Indonesian
Journal of Electrical Engineering and Computer Science, vol. 24, no. 1, pp. 144-156, 2021, doi:
10.11591/ijeecs.v24.i1.pp144-156.
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3240 – 3248
3248
[21] V. Patanavijit and K. Thakulsukanant, “The Novel Noise Classification Techniques Found on QTSD (Quadruple
Threshold Statistical Detection) Filter under FIIN Environment,” Bulletin of Electrical Engineering and
Informatics, vol. 10, no. 5, pp. 2520-2529, 2021, doi: 10.11591/eei.v10i5.3105.
[22] L. Abderrahim, M. Salama and D. Abdelbaki, “Novel design of a fractional wavelet and its application to image
denoising,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 1, pp. 129-140, 2020, doi:
10.11591/eei.v9i1.1548.
[23] D. Kesrarat and V. Patanavijit, “Experimental Analysis of Performance Comparison on Both Linear Filter and
Bidirectional Confidential Technique for Spatial Domain Optical Flow Algorithm,” The Electrical
Engineering/Electronics, Computer, Communications and Information Technology Association Transactions on
Computer and Information Technology, vol. 7, no. 2, pp. 157-168, 2013.
[24] R. Li and S. Yu, “Confidence based optical flow algorithm for high reliability,” IEEE International Conference on
Acoustics, Speech and Signal Processing, 2008, pp. 785-788, doi: 10.1109/ICASSP.2008.4517727.
[25] D. Kesrarat and V. Patanavijit, “Bidirectional confidential with bilateral filter on local based optical flow for image
reconstruction under noisy condition,” IEEE/ACIS 16th International Conference on Software Engineering,
Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2015, pp. 1-4, doi:
10.1109/SNPD.2015.7176211.
[26] J. L. Barron, D. J. Fleet and S. S. Beauchemin, “Performance of Optical Flow Techniques,” International Journal
of Computer Vision, vol. 12, pp. 43-77, 1994.
[27] D. Fleet and Y. Weiss, “Optical Flow Estimation,” Handbook of Mathematical Models in Computer Vision,
Springer, pp. 237-257, 2006.
[28] S. Paris, P. Konprobst, J. Tumblin, F. Durand, “Bilateral filtering: Theory and Applications,” Found. Trends
Compt. Graph. Vis., vol. 4, no. 1, pp.1-73, 2008.
[29] M. G. Mozerov, “Constrained Optical Flow Estimation as a Matching Problem,” IEEE Transactions on Image
Processing, vol. 22, no. 5, pp. 2044-2055, 2013, doi: 10.1109/TIP.2013.2244221.
[30] Jian Sun, Yin Li, S. B. Kang and Heung-Yeung Shum, “Symmetric stereo matching for occlusion handling,” IEEE
Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05), 2005, pp. 399-406 vol. 2,
doi: 10.1109/CVPR.2005.337.
[31] Ming Zhang and Bahadir Gunturk, “A new image denoising method based on the bilateral filter,” IEEE
International Conference on Acoustics, Speech and Signal Processing, 2008, pp. 929-932, doi:
10.1109/ICASSP.2008.4517763.
BIOGRAPHIES OF AUTHORS
Darun Kesrarat received the B. S., M. S., and Ph. D. from the Department of Information
Technology at Assumption University, Bangkok, Thailand. He is currently an Assistance
Professor. His research areas include signal processing on Image/Video Reconstruction, SRR
(Super-Resolution Reconstruction), Motion Estimation, and Optical Flow Estimation.
Vorapoj Patanavijit received the B.Eng., M.Eng., and Ph.D. degrees from the Department of
Electrical Engineering at the Chulalongkorn University, Bangkok, Thailand, in 1994, 1997 and
2007 respectively. He is currently an Associate Professor. He works in the field of signal
processing and multidimensional signal processing, specializing, in particular, on Image/Video
Reconstruction, SRR (Super-Resolution Reconstruction), Compressive Sensing, Enhancement,
Fusion, Digital Filtering, Denoising, Inverse Problems, Motion Estimation, Optical Flow
Estimation and Registration.

Contenu connexe

Tendances

Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...Pioneer Natural Resources
 
IRJET - Dehazing of Single Nighttime Haze Image using Superpixel Method
IRJET -  	  Dehazing of Single Nighttime Haze Image using Superpixel MethodIRJET -  	  Dehazing of Single Nighttime Haze Image using Superpixel Method
IRJET - Dehazing of Single Nighttime Haze Image using Superpixel MethodIRJET Journal
 
Introduction to Wavelet Transform and Two Stage Image DE noising Using Princi...
Introduction to Wavelet Transform and Two Stage Image DE noising Using Princi...Introduction to Wavelet Transform and Two Stage Image DE noising Using Princi...
Introduction to Wavelet Transform and Two Stage Image DE noising Using Princi...ijsrd.com
 
Wavelet based image fusion
Wavelet based image fusionWavelet based image fusion
Wavelet based image fusionUmed Paliwal
 
Single image super resolution with improved wavelet interpolation and iterati...
Single image super resolution with improved wavelet interpolation and iterati...Single image super resolution with improved wavelet interpolation and iterati...
Single image super resolution with improved wavelet interpolation and iterati...iosrjce
 
Survey on Haze Removal Techniques
Survey on Haze Removal TechniquesSurvey on Haze Removal Techniques
Survey on Haze Removal TechniquesEditor IJMTER
 
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...CSCJournals
 
IRJET- A Novel Hybrid Image Denoising Technique based on Trilateral Filtering...
IRJET- A Novel Hybrid Image Denoising Technique based on Trilateral Filtering...IRJET- A Novel Hybrid Image Denoising Technique based on Trilateral Filtering...
IRJET- A Novel Hybrid Image Denoising Technique based on Trilateral Filtering...IRJET Journal
 
Towards better performance: phase congruency based face recognition
Towards better performance: phase congruency based face recognitionTowards better performance: phase congruency based face recognition
Towards better performance: phase congruency based face recognitionTELKOMNIKA JOURNAL
 
Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5IAEME Publication
 
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...IJERA Editor
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IJNSA Journal
 
Mimo detection-bp-p mrf-yoon-160706a
Mimo detection-bp-p mrf-yoon-160706aMimo detection-bp-p mrf-yoon-160706a
Mimo detection-bp-p mrf-yoon-160706aSeokhyun Yoon
 

Tendances (17)

Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...
 
IRJET - Dehazing of Single Nighttime Haze Image using Superpixel Method
IRJET -  	  Dehazing of Single Nighttime Haze Image using Superpixel MethodIRJET -  	  Dehazing of Single Nighttime Haze Image using Superpixel Method
IRJET - Dehazing of Single Nighttime Haze Image using Superpixel Method
 
Introduction to Wavelet Transform and Two Stage Image DE noising Using Princi...
Introduction to Wavelet Transform and Two Stage Image DE noising Using Princi...Introduction to Wavelet Transform and Two Stage Image DE noising Using Princi...
Introduction to Wavelet Transform and Two Stage Image DE noising Using Princi...
 
Wavelet based image fusion
Wavelet based image fusionWavelet based image fusion
Wavelet based image fusion
 
Path loss prediction
Path loss predictionPath loss prediction
Path loss prediction
 
D0361034037
D0361034037D0361034037
D0361034037
 
Single image super resolution with improved wavelet interpolation and iterati...
Single image super resolution with improved wavelet interpolation and iterati...Single image super resolution with improved wavelet interpolation and iterati...
Single image super resolution with improved wavelet interpolation and iterati...
 
Survey on Haze Removal Techniques
Survey on Haze Removal TechniquesSurvey on Haze Removal Techniques
Survey on Haze Removal Techniques
 
Basics of dip
Basics of dipBasics of dip
Basics of dip
 
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
 
IRJET- A Novel Hybrid Image Denoising Technique based on Trilateral Filtering...
IRJET- A Novel Hybrid Image Denoising Technique based on Trilateral Filtering...IRJET- A Novel Hybrid Image Denoising Technique based on Trilateral Filtering...
IRJET- A Novel Hybrid Image Denoising Technique based on Trilateral Filtering...
 
Towards better performance: phase congruency based face recognition
Towards better performance: phase congruency based face recognitionTowards better performance: phase congruency based face recognition
Towards better performance: phase congruency based face recognition
 
Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5
 
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...
 
Ijcet 06 09_001
Ijcet 06 09_001Ijcet 06 09_001
Ijcet 06 09_001
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
 
Mimo detection-bp-p mrf-yoon-160706a
Mimo detection-bp-p mrf-yoon-160706aMimo detection-bp-p mrf-yoon-160706a
Mimo detection-bp-p mrf-yoon-160706a
 

Similaire à Noise resistance territorial intensity-based optical flow using inverse confidential technique on bilateral function

Image Denoising of various images Using Wavelet Transform and Thresholding Te...
Image Denoising of various images Using Wavelet Transform and Thresholding Te...Image Denoising of various images Using Wavelet Transform and Thresholding Te...
Image Denoising of various images Using Wavelet Transform and Thresholding Te...IRJET Journal
 
23 an investigation on image 233 241
23 an investigation on image 233 24123 an investigation on image 233 241
23 an investigation on image 233 241Alexander Decker
 
Coherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimationCoherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimationcsandit
 
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIDesign of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIinventy
 
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...IJECEIAES
 
Geometric wavelet transform for optical flow estimation algorithm
Geometric wavelet transform for optical flow estimation algorithmGeometric wavelet transform for optical flow estimation algorithm
Geometric wavelet transform for optical flow estimation algorithmijcga
 
4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curveletAlexander Decker
 
4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curveletAlexander Decker
 
A Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image DenoisingA Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image DenoisingIOSR Journals
 
Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...
Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...
Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...TELKOMNIKA JOURNAL
 
A Review on Deformation Measurement from Speckle Patterns using Digital Image...
A Review on Deformation Measurement from Speckle Patterns using Digital Image...A Review on Deformation Measurement from Speckle Patterns using Digital Image...
A Review on Deformation Measurement from Speckle Patterns using Digital Image...IRJET Journal
 
Boosting CED Using Robust Orientation Estimation
Boosting CED Using Robust Orientation EstimationBoosting CED Using Robust Orientation Estimation
Boosting CED Using Robust Orientation Estimationijma
 
An efficient fusion based up sampling technique for restoration of spatially ...
An efficient fusion based up sampling technique for restoration of spatially ...An efficient fusion based up sampling technique for restoration of spatially ...
An efficient fusion based up sampling technique for restoration of spatially ...ijitjournal
 
Paper id 312201526
Paper id 312201526Paper id 312201526
Paper id 312201526IJRAT
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IJNSA Journal
 
An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...IDES Editor
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 

Similaire à Noise resistance territorial intensity-based optical flow using inverse confidential technique on bilateral function (20)

Image Denoising of various images Using Wavelet Transform and Thresholding Te...
Image Denoising of various images Using Wavelet Transform and Thresholding Te...Image Denoising of various images Using Wavelet Transform and Thresholding Te...
Image Denoising of various images Using Wavelet Transform and Thresholding Te...
 
B042107012
B042107012B042107012
B042107012
 
23 an investigation on image 233 241
23 an investigation on image 233 24123 an investigation on image 233 241
23 an investigation on image 233 241
 
Coherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimationCoherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimation
 
Ap36252256
Ap36252256Ap36252256
Ap36252256
 
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIDesign of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
 
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
 
Geometric wavelet transform for optical flow estimation algorithm
Geometric wavelet transform for optical flow estimation algorithmGeometric wavelet transform for optical flow estimation algorithm
Geometric wavelet transform for optical flow estimation algorithm
 
4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet
 
4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet
 
A Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image DenoisingA Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image Denoising
 
Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...
Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...
Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...
 
A Review on Deformation Measurement from Speckle Patterns using Digital Image...
A Review on Deformation Measurement from Speckle Patterns using Digital Image...A Review on Deformation Measurement from Speckle Patterns using Digital Image...
A Review on Deformation Measurement from Speckle Patterns using Digital Image...
 
Boosting CED Using Robust Orientation Estimation
Boosting CED Using Robust Orientation EstimationBoosting CED Using Robust Orientation Estimation
Boosting CED Using Robust Orientation Estimation
 
An efficient fusion based up sampling technique for restoration of spatially ...
An efficient fusion based up sampling technique for restoration of spatially ...An efficient fusion based up sampling technique for restoration of spatially ...
An efficient fusion based up sampling technique for restoration of spatially ...
 
Paper id 312201526
Paper id 312201526Paper id 312201526
Paper id 312201526
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
 
An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...
 
Bh044365368
Bh044365368Bh044365368
Bh044365368
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 

Plus de journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherjournalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksjournalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkjournalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headjournalBEEI
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...journalBEEI
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
 

Plus de journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
 

Dernier

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Dernier (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Noise resistance territorial intensity-based optical flow using inverse confidential technique on bilateral function

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 10, No. 6, December 2021, pp. 3240~3248 ISSN: 2302-9285, DOI: 10.11591/eei.v10i6.3243 3240 Journal homepage: http://beei.org Noise resistance territorial intensity-based optical flow using inverse confidential technique on bilateral function Darun Kesrarat1 , Vorapoj Patanavijit2 1 Department of Information Technology, Vincent Mary School of Science and Technology, Assumption University, Bangkok, Thailand 2 Department of Computer and Network Engineering, Vincent Mary School of Engineering, Assumption University, Bangkok, Thailand Article Info ABSTRACT Article history: Received May 26, 2021 Revised Sep 7, 2021 Accepted Oct 18, 2021 This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity- based optical flow method. Keywords: Bilateral filter Error vector magnitude Inverse confidential Non-gaussian noise Optical flow This is an open access article under the CC BY-SA license. Corresponding Author: Darun Kesrarat Department of Information Technology Vincent Mary School of Science and Technology, Assumption University 88 Moo 8 Bang Na-Trad Km. 26 Bangsaothong, Samuthprakarn 10570 Thailand Email: darunksr@gmail.com 1. INTRODUCTION The optical flow [1], [2] is a favorite specific method that it is used in numerous areas for more than 3 decades serving as movement prediction by pointing the motion vector (MV) as the main issue. In regular movement capture [3], [4], motion remuneration [5], image compression [6], and film encoding [7], [8], the MV is coded by using the optical flow method and it is applied in further processing. Also in image super- resolution reconstruction areas [9], [10], the optical flow method is an essential part. At that point, the certainty result of optical flow is necessary. Basically, the optical flow is the coding method that it is used to point the MV base on the serial images. Numerous optical flow methods that were present like the global intensity-based method [11], section-based method [12], and phase-based method [13]. However, this paper attends to study the territorial intensity-based optical flow method [14]. T-OF is one of the accepted optical flow methods that using the intensity-based algorithm where it has been adjusted in numerous areas in early with a fine performance, coding speed, and noise resistance. Many research efforts may point to the improvement on coding speed [15], [16] but the efficiency of noise resistance is focused on in this paper as the main issue.
  • 2. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Noise resistance territorial intensity-based optical flow using inverse confidential … (Darun Kesrarat) 3241 In current situation, image and video transmission are a major application area of wireless communication systems. A peripheral noise reduces sensed image quality and affects look patterns. This effect of image noise interference on gaze distribution was mainly inclined by noise intensity rather than noise type. With the image noise interference, the coding of the optical flow is impacted directly and leads to the error in the result of MV. Many model emphasizes efficient transmission of images from one place to another with minimum possible errors [17]-[19]. Many solutions proposed the improvement in the quality of the interfered image or denoise process [20]-[22] in early-stage separately out of the optical flow. But these approaches took additional denoise processing. The other solution is the improvement on the optical flow coding itself for noise resistance by adding correlate function and algorithm in the optical flow coding like inverse confidential and bilateral function [23], [24]. And this is the main issue in this work where the effectiveness in noise resistance territorial intensity-based method optical flow was proved by using the technique of inverse confidential in accompany with bilateral function. This paper focuses on the noise resistance territorial intensity-based optical flow method using the inverse confidential technique on bilateral function [25]. This paper intends to inspect the effectiveness of optical coding on non-Gaussian noises in contaminating with sequences image data set. In our experiment, the non-Gaussian noises like Satl&Pepper at 2 levels of density, Speckle at 2 levels of variance, and Poisson are used in contaminating with the 4 patterns of standard image sequences like coastguard, foreman, akiyo, and container. In our effectiveness analysis, we used the error vector magnitude (EVM). The EVM regards the scale of fault in direction of the determined MV. The paper organization is regulated as follows. Part 2 describes the research methods in optical flow. Part 3 describes the measurement of the performance in noise resistance adjacent to the other noise resistance methods to confirm the satisfying result of T-RB in noise resistance. Part 4 describes the conclusion. 2. RESEARCH METHODS IN TERRITORIAL INTENSITY-BASED METHOD OPTICAL FLOW AND NOISE RESISTANCE TECHNIQUES In this part, it is explained the territorial intensity-based optical flow method and the noise resistance techniques on this optical flow. 2.1. Territorial intensity-based optical flow method The territorial intensity-based optical flow method (T-OF) [14] is an ordinary method for determining the MV in 2 dimension movement. The T-OF determine via the value of “intensity of luminous scale” and “smoothness deviation” [26], [27] with a weight least-square for each territorial. The formula is coded to determine the classical MV as: [ 𝒖(𝒙, 𝒚, 𝒌) 𝒗(𝒙, 𝒚, 𝒌) ] = [ ∑ 𝑰𝒙 𝟐 (𝒙, 𝒚, 𝒌) ∑ 𝑰𝒙(𝒙, 𝒚, 𝒌)𝑰𝒚(𝒙, 𝒚, 𝒌) ∑ 𝑰𝒙(𝒙,𝒚, 𝒌)𝑰𝒚(𝒙, 𝒚, 𝒌) ∑ 𝑰𝒚 𝟐 (𝒙, 𝒚, 𝒌) ] −𝟏 × [ − ∑ 𝑰𝒙(𝒙, 𝒚, 𝒌)𝑰𝒌(𝒙,𝒚, 𝒌) − ∑ 𝑰𝒚(𝒙, 𝒚, 𝒌)𝑰𝒌(𝒙, 𝒚, 𝒌) ] (1) With the above formula for T-OF, the flow is constant in a territorial neary pixel. The formual for all the pixels in that territorial is solved by the least squares. A weight least-square is coded to determine the MV in each territorial. Where I(x,y,k) indicate the intensity of luminous value at a position (x,y) on an image at sequence no. k. in a territorial of vertical and horizontal alignment. The formula for intensity of luminous is: (2) 2.2. T-OF using bilateral function The bilateral function is one of the general famous noise removal functions. The use of the bilateral function is found to good effective result in noise resistance when it is coded in correlate with the optical flow called T-OF using the bilateral function (T-B) [23]. The main procedure is to code the bilateral function [28]-[31] over the determined MV from the T-OF. The bilateral formula over the determined MV from the T- OF is: (3)
  • 3.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3240 – 3248 3242 With the above formula for T-B, the bilateral function is adopt to with averagely weighted from territorial MV. Where K is the kernel normalization found on the conventional groundwork [28]. In our analysis, we referred territorial for M by ±7. The formula for kernel normalization (K) is: (4) Where m is the territorial group of bilateral gaussian kernel (ɸ). The formula for bilateral gaussian kernel (ɸ) is: (5) 2.3. T-OF using inverse confidential In the T-OF using inverse confidential (T-I) [24], the 2 ways hypothesis was proposed to identify confidence rate to ensure certainty of the MV from the optical flow. With the confidence function, the optical flow is coded to determine the MV in inverse direction and used to determine the confidential base on the following formula: (6) Where vl and vl- are ordinary MV and inverse MV, and n is the number of territorial MV. s is the point (x,y) on a 2-dimensional image and  bypasses the division by nil in the formula. The confidence rates are used to code the ending MV in an average of territorial (N(s0)) by: (7) Where )) ( ( 0 s v n l is coded from the confidence rate among territorial N(s0) based on the point s0=(x, y, k). 2.4. T-OF using inverse confidential technique with bilateral function The T-OF using the inverse confidential technique with bilateral function (T-IB) [25] is the accompanying method between inverse confidential technique and bilateral function. The procedure of T-RB is illustrated in Figure 1. Code the MV with T-OF by the 2-ways hypothesis of T-I method Code the ending MV by confidence rate based on T-I method Run Bilateral function on 2-ways MV Capture the sequence Images Sequence images 2 ways MV 2 ways Bilateral vector Figure 1. The procedure of T-IB First, the traditional T-OF is used to code the MV under the 2 ways hypothesis in T-I. Consequently, the results of MV in 2 directions are used to calculate with bilateral function. After that, the determination MV is continued to process through a confidence rate based on the T-I method. 3. EXPERIMENTAL AND CONSEQUENCE In our experimental, we focused mainly on T-OF and compared its performance against the other methods where the environment and configuration for the experimental was stated as follow. For T-OF, we adjusted the smoothness deviation with mask coefficient on 5 iteration loops of territorial (5×5) without pyramid for coding MV.
  • 4. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Noise resistance territorial intensity-based optical flow using inverse confidential … (Darun Kesrarat) 3243 About the standard image sequences, we adjusted 4 different patterns of QCIF (176×144) image sequences (coastguard, foreman, akiyo, and container) in line for 100 frames each. Figure 2 shows each illustration. And Poisson Noise, Speckle Noise at variance 0.01 and 0.05, and Salt&Pepper Noise at density 0.005 and 0.025 are represented as the non-Gaussian noise used in the experiment. Entirely, there were 20 sets of the image sequence in the experiment along with the performance comparison of the proposed T-IB with classical T-OF, T-I, and T-B. (a) (b) (c) (d) Figure 2. The image sequences on the experiment, (a) coastguard, (b) foreman, (c) akiyo, (d) container Obviously, the consequence of noise resistance was determined by the EVM. The EVM is accurately to admeasure the MV for quantifying the performance. The low value in EVM means the improvement in noise resistance. Here, we adjusted only the active movement vector against the ground truth vector with root-mean-square by average. Table 1 shows the compiled average EVM of each optical flow method through 100 frames on each kind of non-Gaussian noise in correspondence with each pattern of the standard image sequence. Figures 3 to Figure 6 present the “EVM frame outline” in comparison among several noise resistance optical flow methods over each kind of noise based on each pattern of standard image sequence by the graph. Table 1. The compiled average EVM COASTGUARD FOREMAN AKIYO CONTAINER Average EVM SD of EVM Average EVM SD of EVM Average EVM SD of EVM Average EVM SD of EVM Poisson T-OF 3.111 0.611 3.654 0.590 3.141 0.206 3.606 0.103 T-B 2.983 0.592 3.492 0.584 2.985 0.205 3.494 0.097 T-I 3.036 0.600 3.566 0.588 3.067 0.206 3.544 0.103 *T-IB 2.947 0.586 3.449 0.583 2.946 0.205 3.463 0.097 Salt & Pepper density 0.005 T-OF 3.360 0.631 4.004 0.696 3.291 0.225 3.713 0.134 T-B 3.188 0.590 3.779 0.624 3.110 0.192 3.547 0.105 T-I 3.274 0.612 3.877 0.677 3.215 0.217 3.640 0.121 *T-IB 3.145 0.580 3.714 0.616 3.066 0.188 3.513 0.101 Salt & Pepper density 0.025 T-OF 3.423 0.594 3.901 0.567 3.341 0.319 3.849 0.189 T-B 3.155 0.569 3.659 0.562 3.145 0.240 3.654 0.150 T-I 3.287 0.584 3.762 0.565 3.217 0.282 3.735 0.167 *T-IB 3.077 0.568 3.579 0.566 3.062 0.228 3.573 0.134 Speckle variance 0.01 T-OF 3.112 0.601 3.619 0.588 3.106 0.206 3.580 0.102 T-B 2.972 0.589 3.466 0.583 2.982 0.220 3.474 0.099 T-I 3.038 0.592 3.537 0.587 3.038 0.208 3.523 0.102 *T-IB 2.938 0.583 3.425 0.582 2.950 0.218 3.448 0.101 Speckle variance 0.05 T-OF 3.074 0.573 3.511 0.554 3.081 0.219 3.577 0.092 T-B 2.934 0.578 3.368 0.565 2.944 0.223 3.474 0.094 T-I 3.000 0.573 3.438 0.560 3.009 0.221 3.519 0.093 *T-IB 2.898 0.579 3.332 0.569 2.907 0.226 3.448 0.093
  • 5.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3240 – 3248 3244 (a) (b) (c) (d) (e) Figure 3. The EVM frame outline of COASTGUARD, (a) poisson, (b) salt & pepper density 0.005, (c) salt & pepper density 0.025,(d) speckle variance 0.01, (e) speckle variance 0.05 (a) (b) Figure 4. The EVM frame outline of FOREMAN, (a) poisson, (b) salt & pepper density 0.005
  • 6. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Noise resistance territorial intensity-based optical flow using inverse confidential … (Darun Kesrarat) 3245 (c) (d) (e) Figure 4. The EVM frame outline of FOREMAN, (c) salt & pepper density 0.025, (d) speckle variance 0.01, (e) speckle variance 0.05 (continue) (a) (b) (c) (d) Figure 5. The EVM frame outline of AKIYO,(a) poisson, (b) salt & pepper density 0.005, (c) salt & pepper density 0.025, (d) speckle variance 0.01
  • 7.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3240 – 3248 3246 (e) Figure 5. The EVM frame outline of AKIYO, (e) speckle variance 0.05 (continue) (a) (b) (c) (d) (e) Figure 6. The EVM frame outline of CONTAINER,(a) poisson, (b) salt & pepper density 0.005, (c) salt & pepper density 0.025, (d) speckle variance 0.01, (e) speckle variance 0.05
  • 8. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Noise resistance territorial intensity-based optical flow using inverse confidential … (Darun Kesrarat) 3247 4. CONCLUSION Regarding the character of territorial processing in T-OF, it provided a good result in noise resistance by traditional. Then, the overall result of noise resistance of T-I, T-B, and T-IB was slightly improved over T-OF. In our investigation, we proved that the proposed method (T-IB) presented the best noise resistance on the non-Gaussian noise overall. Then, the software areas such namely move to track within the noisy surroundings are appropriate in accordance with adopting this method in accordance with gain accuracy among the territorial intensity-based optical flow method. By the way, there is no beyond compare method at this moment. Regarding the detail in the frame outline, the performance of T-I, and T-B still presented the best result in noise resistance in a few frames. Then, the research on numerous kinds of noise with numerous noise resistance methods is a controversy for the prospective research. ACKNOWLEDGEMENTS This research project was funded by Assumption University of Thailand. REFERENCES [1] Andrew and J. R. Burton, “Thinking in Perspective: Critical Essays in the Study of Thought Processes,” Routledge, ISBN 978-0-416-85840-2, 1978. [2] D. H. Warren and E. R. Strelow, “Electronic Spatial Sensing for the Blind: Contributions from Perception,” Springer, 1985. [3] C. S. Royden and K. D. Moore, “Use of speed cues in the detection of moving objects by moving observers,” Vision Research, vol. 59, pp. 17-24, 2012, doi: 10.1016/j.visres.2012.02.006. [4] S. A. Mahmoudi, M Kierzynka, P. Manneback and K. Kurowski, “Real-time motion tracking using optical flow on multiple GPUs,” Bulletin of the Polish Academy of Sciences. Technical Sciences, vol. 62, no. 1, pp. 139-150, 2014. [5] Z. Chen, T. He, X. Jin and F. Wu, “Learning for Video Compression,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 2, pp. 566-576, 2020, doi: 10.1109/TCSVT.2019.2892608. [6] A. J. Qasim, R. Din and F. Q. A. Alyousuf, “Review on techniques and file formats of image compression,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 2, pp. 602-610, 2020, doi: 10.11591/eei.v9i2.2085. [7] T. Wiegand, G. J. Sullivan, G. Bjontegaard and A. Luthra, "Overview of the H.264/AVC video coding standard," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 7, pp. 560-576, July 2003, doi: 10.1109/TCSVT.2003.815165 [8] ISO, “Information Technology-Coding of Audio Visual Objects-Part 2: Visual, JTC1/SC29/WG11, ISO/IEC 14 469-2 (MPEG-4 Visual),” 2000, [Online]. Available: https://www.iso.org/standard/39259.html. [9] C. Deng, J. Liu, W. Tian, S. Wang, H. Zhu and S. Zhang, “Image Super-Resolution Reconstruction Based On L1/2 Sparsity,” Bulletin of Electrical Engineering and Informatics, vol. 3, no. 3, pp. 155-160, 2014. [10] D. Kesrarat, K. Thakulsukant and V. Patanavijit, “A Novel Elementary Spatial Expanding Scheme Form on SISR Method with Modifying Geman & Mcclure Function,” Telecommunication, Computing, Electronics and Control TELKOMNIKA, vol. 17, no. 5, pp. 2554-2560, doi: 10.12928/TELKOMNIKA.v17i5.12799. [11] K. P. Berthold and B. G. Schurnck, “Determining Optical Flow,” Artificial Intelligence, vol. 17, pp. 185-203, 1981. [12] T. R. Reed, “Digital Image Sequence Processing, Compression, and Analysis,” Chemical Rubber Company (CRC) Press, 2004, doi: 10.1201/9780203486788. [13] D. J. Fleet and A. D. Jepson, “Computation of component image velocity from local phase information” Computer Vision, vol. 5, pp.77-104, 1990. [14] B. D. Lucas and T. Kanade, “An Iterative Image Registration Technique with an Application to Stereo Vision,” Proceeding of Defense Advanced Research Projects Agency (DARPA) Image Understanding Workshop, pp. 121- 130, 1981. [15] Y. Su, Y. Huang and C. J. Kuo, “Efficient Text Classification Using Tree-structured Multi-linear Principal Component Analysis,” 24th International Conference on Pattern Recognition ICPR, 2018, pp. 585-590, doi: 10.1109/ICPR.2018.8545832. [16] Y. Su, R. Lin and C. C. J. Kuo, “Tree-structured multi-stage principal component analysis (TMPCA): Theory and applications,” Expert Systems with Applications, vol. 118, pp. 355-364, 2019, doi: 10.1016/j.eswa.2018.10.020. [17] M. Kaur, L. Kansal, N. Kaur, G. S. Gaba and D. P. Agrawal, “Analysis of Image Transmission using MIMO- Alamouti Space-Time Encoding,” International Journal on Advanced Science, Engineering and Information Technology, vol. 9, no. 1, 2019. [18] M. Kaur, L. Kansal and N. Kaur, “Image transmission using MIMO-OSTBC3 space-time encoding,” Far East Journal of Electronics and Communications, vol. 17, no. 6, pp. 1437-1450, 2017, doi: 10.17654/EC017061437. [19] L. Kansal, G. S. Gaga, N. Chilamkurti and B. G. Kim, “Efficient and Robust Image Communication Techniques for 5G Applications in Smart Cities,” Energies, vol. 14, no. 13, 2021, doi: 10.3390/en14133986. [20] V. Patanavijit and K. Thakulsukanant, “A Computational Experimental Investigation of Noise Suppressing Technique Stand on Hard Decision Threshold Dissimilarity under Fixed-Intensity Impulse Noise,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 24, no. 1, pp. 144-156, 2021, doi: 10.11591/ijeecs.v24.i1.pp144-156.
  • 9.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3240 – 3248 3248 [21] V. Patanavijit and K. Thakulsukanant, “The Novel Noise Classification Techniques Found on QTSD (Quadruple Threshold Statistical Detection) Filter under FIIN Environment,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 5, pp. 2520-2529, 2021, doi: 10.11591/eei.v10i5.3105. [22] L. Abderrahim, M. Salama and D. Abdelbaki, “Novel design of a fractional wavelet and its application to image denoising,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 1, pp. 129-140, 2020, doi: 10.11591/eei.v9i1.1548. [23] D. Kesrarat and V. Patanavijit, “Experimental Analysis of Performance Comparison on Both Linear Filter and Bidirectional Confidential Technique for Spatial Domain Optical Flow Algorithm,” The Electrical Engineering/Electronics, Computer, Communications and Information Technology Association Transactions on Computer and Information Technology, vol. 7, no. 2, pp. 157-168, 2013. [24] R. Li and S. Yu, “Confidence based optical flow algorithm for high reliability,” IEEE International Conference on Acoustics, Speech and Signal Processing, 2008, pp. 785-788, doi: 10.1109/ICASSP.2008.4517727. [25] D. Kesrarat and V. Patanavijit, “Bidirectional confidential with bilateral filter on local based optical flow for image reconstruction under noisy condition,” IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2015, pp. 1-4, doi: 10.1109/SNPD.2015.7176211. [26] J. L. Barron, D. J. Fleet and S. S. Beauchemin, “Performance of Optical Flow Techniques,” International Journal of Computer Vision, vol. 12, pp. 43-77, 1994. [27] D. Fleet and Y. Weiss, “Optical Flow Estimation,” Handbook of Mathematical Models in Computer Vision, Springer, pp. 237-257, 2006. [28] S. Paris, P. Konprobst, J. Tumblin, F. Durand, “Bilateral filtering: Theory and Applications,” Found. Trends Compt. Graph. Vis., vol. 4, no. 1, pp.1-73, 2008. [29] M. G. Mozerov, “Constrained Optical Flow Estimation as a Matching Problem,” IEEE Transactions on Image Processing, vol. 22, no. 5, pp. 2044-2055, 2013, doi: 10.1109/TIP.2013.2244221. [30] Jian Sun, Yin Li, S. B. Kang and Heung-Yeung Shum, “Symmetric stereo matching for occlusion handling,” IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05), 2005, pp. 399-406 vol. 2, doi: 10.1109/CVPR.2005.337. [31] Ming Zhang and Bahadir Gunturk, “A new image denoising method based on the bilateral filter,” IEEE International Conference on Acoustics, Speech and Signal Processing, 2008, pp. 929-932, doi: 10.1109/ICASSP.2008.4517763. BIOGRAPHIES OF AUTHORS Darun Kesrarat received the B. S., M. S., and Ph. D. from the Department of Information Technology at Assumption University, Bangkok, Thailand. He is currently an Assistance Professor. His research areas include signal processing on Image/Video Reconstruction, SRR (Super-Resolution Reconstruction), Motion Estimation, and Optical Flow Estimation. Vorapoj Patanavijit received the B.Eng., M.Eng., and Ph.D. degrees from the Department of Electrical Engineering at the Chulalongkorn University, Bangkok, Thailand, in 1994, 1997 and 2007 respectively. He is currently an Associate Professor. He works in the field of signal processing and multidimensional signal processing, specializing, in particular, on Image/Video Reconstruction, SRR (Super-Resolution Reconstruction), Compressive Sensing, Enhancement, Fusion, Digital Filtering, Denoising, Inverse Problems, Motion Estimation, Optical Flow Estimation and Registration.