Publication | Closed Access
Authenticating edges produced by zero-crossing algorithms
202
Citations
14
References
1989
Year
Cryptographic PrimitiveEngineeringZero-crossing AlgorithmsFormal VerificationImage AnalysisPhantom EdgesPattern RecognitionComputational ImagingDance ImagesEdge DetectionAuthentication ProtocolRadiologyAuthentic EdgeMachine VisionIdentity-based SecurityComputer ScienceSpatial FilteringMedical Image ComputingImage EnhancementSignal ProcessingPhantom EdgeComputer VisionData SecurityCryptographyGraph Theory
It is shown that zero-crossing edge detection algorithms can produce edges that do not correspond to significant image intensity changes. Such edges are called phantom or spurious. A method for classifying zero crossings as corresponding to authentic or phantom edges is presented. The contrast of an authentic edge is shown to increase and the contrast of phantom edges to decrease with a decrease in the filter scale. Thus, a phantom edge is truly a phantom in that the closer one examines it, the weaker it becomes. The results of applying the classification schemes described to synthetic and authentic signals in one and two dimensions are given. The significance of the phantom edges is examined with respect to their frequency and strength relative to the authentic edges, and it is seen that authentic edges are denser and stronger, on the average, than phantom edges.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
| Year | Citations | |
|---|---|---|
Page 1
Page 1