期刊文献+

基于NSCT和PCA变换域的遥感图像融合算法 被引量:6

Remote sensing image fusion algorithm based on NSCT and PCA transform-domain
在线阅读 下载PDF
导出
摘要 为使融合后的图像在尽可能保持原图像光谱信息的同时,有效提高空间细节信息,提出了一种新的基于非下采样Contourlet变换(NSCT)和主成分分析(PCA)的全色图像和多光谱图像融合算法.对多光谱图像进行PCA变换得到主元分量,将处理后的主元分量与全色图像进行NSCT分解,针对低频子带系数选择提出了一种基于窗口与局部方差相结合的融合策略;在高频子带系数选择上,提出了基于区域线性相关测定的融合策略.进行非下采样Contourlet逆变换和PCA逆变换,得到具有高空间质量的多光谱图像.实验结果表明,提出的算法在保留光谱信息和提高空间细节信息的综合性能上有所提高,能够取得较好的融合效果. In order to preserve possibly the spectral information and enhance synchronously the spatial detail information for the fused image, a novel panchromatic and multispectral image fusion algorithm based on nonsubsampled contourlet transform (NSCT) and principal component analysis (PCA) was proposed. The principal component was obtained by PCA transformation for multispectral image. The NSCT decomposition was performed for the processed principal component and panchromatic image. The fusion strategy combined window with local variance was proposed for the low-frequency band coefficient choice. And the fusion strategy based on regional linear relativity measurement was proposed for the high-frequency band coefficient choice. A fused multispectral image with high spatial quality was obtained through performing inverse NSCT and PCA transforms. The experimental results show that the proposed fusion scheme can improve the comprehensive properties in preserving the spectral information and improving the spatial detail information, and achieve better fusion effect.
出处 《沈阳工业大学学报》 EI CAS 2011年第3期308-314,共7页 Journal of Shenyang University of Technology
基金 国家自然科学基金资助项目(61077079) 哈尔滨市优秀学科带头人基金资助项目(2009RFXXG034)
关键词 遥感图像 图像融合 非下采样CONTOURLET变换 主成分分析 子带系数选择 融合规则 局部方差 区域线性相关测定 remote sensing image image fusion nonsubsampled contourlet transform principal componentanalysis band coefficient choice fusion rule local variance regional linear relativity rrr.asurernent
  • 相关文献

参考文献10

  • 1Bellovin S, Merrit M. Encrypted key exchange:password based protocols secure against dictionary attacks [ C ]//Proceedings of the Symposium on Security and Privacy. Oakland, USA, 1992:72 - 84.
  • 2Lin C, Sun H, Steiner M, et al. Three-party encrypted key exchange without server public-keys [ J ]. IEEE Communications Letters, 2001,5 (12) :497 - 499.
  • 3Bresson E, Olivier C, David P. Group Diffie-Hellman key exchange secure against dictionary attacks [ C ]/// Advances in Cryptology-Proceedings of ASIACRYPT' 02. Queenstown. New-Zealand .2002:497 - 514.
  • 4Jin W B, Lee D H. N-party encrypted Diffie-Hellman key exchange using different passwords [ C ]//ACNS 2005. New York, USA, 2005 : 75-90.
  • 5Byun J W, Lee D H, Lim J. Password-based group key exchange secure against insider guessing attacks [ C ]//Proceedings of CIS ' 05. Hong Kong, China, 2005 : 143 - 148.
  • 6Emmanuel B, Olivier C, David P, et al. Provably au- thenticated group Diffie-Hellman key exchange [ C]//Proceedings of 8th ACM Conference on Computer and Communications Security. Philadelphia, USA.2001:255 - 264.
  • 7Phan R C,Goi B M. Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords [ C]//ACNS 2006. Singapore City, Singa- pore,2006:226 - 238.
  • 8Dan B, Matt F. Identity-based encryption from the weil pairing [ C ]//Advances in Cryptology-CRYPTO 2001. Santa Barbara, USA,2001:213 - 229.
  • 9Wong C K, Gouda M, Lam S. Secure group communi- cations using key graphs [ C ]//Proceedings of SIG- COMM. Vancouver, Canada, 1998 : 16 - 30.
  • 10Wan Z G, Deng R H, Bao F, et al. A hierarchical group password-authenticated key exchange protocol using different passwords [ C ]//Proceedings of ICICS 2007. Zhengzhou, China,2007 : 31 - 43.

同被引文献58

引证文献6

二级引证文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部