A New Image Inpainting Approach based on Criminisi Algorithm
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 6
Abstract
In patch-based inpainting methods, the order of filling the areas to be restored is very important. This filling order is defined by a priority function that integrates two parameters: confidence term and data term. The priority, as initially defined, is negatively affected by the mutual influence of confidence and data terms. In addition, the rapid decrease to zero of confidence term leads the numerical instability of algorithms. Finally, the data term depends only on the central pixel of the patch, without taking into account the influence of neighboring pixels. Our aim in this paper is to propose an algorithm to solve the problems mentioned above. This algorithm is based on a new definition of the priority function, a calculation of the average data term obtained from the elementary data terms in a patch and an update of the confidence term slowing its decrease and avoiding convergence to zero. We evaluated our method by comparing it with algorithms in the literature. The results show that our method provides better results both visually and in terms of the Peak Signal-to-Noise Ratio (PSNR) and Structural SIMilarity index (SSIM).
Authors and Affiliations
Nouho Ouattara, Georges Laussane Loum, Ghislain Koffi Pandry, Armand Kodjo Atiampo
Weighted G1-Multi-Degree Reduction of B´ezier Curves
In this paper, weighted G1-multi-degree reduction of B´ezier curves is considered. The degree reduction of a given B´ezier curve of degree n is used to write it as a B´ezier curve of degree m,m < n. Exact degree reduc...
A Novel Steganography Method for Hiding BW Images into Gray Bitmap Images via k-Modulus Method
This paper is to create a pragmatic steganographic implementation to hide black and white image which is known as stego image inside another gray bitmap image that known as cover image. First of all, the proposed techniq...
Performance Evaluation of Anti-Collision Algorithms for RFID System with Different Delay Requirements
The main purpose of Radio-frequency identification (RFID) implementation is to keep track of the tagged items. The basic components of an RFID system include tags and readers. Tags communicate with the reader through a s...
An Authentication Protocol Based on Combined RFID-Biometric System
Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the...
Cross-Organizational Information Systems: A Case for Educational Data Mining
Establishing a new organization is becoming more difficult day by day due to the extremely competitive business environment. A new organization may not have enough experience to survive in the competitive market; which i...