Advanced Search
Volume 29 Issue 8
Jan.  2011
Turn off MathJax
Article Contents
Zhang Shun, Gao Tie-Gang. Encryption Based on DNA Coding, Codon Grouping and Substitution[J]. Journal of Electronics & Information Technology, 2015, 37(1): 150-157. doi: 10.11999/JEIT140091
Citation: Zou Yi-min, Wang Bo. Estimate of Ball Pose by Monocular Vision Image[J]. Journal of Electronics & Information Technology, 2007, 29(8): 1826-1828. doi: 10.3724/SP.J.1146.2005.01506

Estimate of Ball Pose by Monocular Vision Image

doi: 10.3724/SP.J.1146.2005.01506
  • Received Date: 2005-11-21
  • Rev Recd Date: 2006-04-24
  • Publish Date: 2007-08-19
  • A vision inspection technique is provided, which can be used to estimate the position and orientation of the ball and its center axis hole by its projected image. When the focus length of digital camera is given, with the size of circular and spherical feature is also known, their position and/or orientation can be estimated using monocular vision. Thus, the ball pose is acquired from several spherical and circular features shaped by the contour of the ball and its axis. Besides, with the existence of image noise and fitting error of the projection ellipses, the solution base on sole feature is not concurrent with each other. The non-linear least squares algorithm is used to refine above rough solutions and to improve the estimate precise。Experiments with simulated data as well as real image is also presented to validate the algorithms.
  • Menthon D D and Davis L S. New exact and approximate solutions of the three-point perspective problem [A]. In Proceedings of International Conference on Robotics and Automation, Cincinnati, OH, 1990: 40-45.[2]Horaud R, Conio B, and Leboulleux O. An analytic solution for the perspective 4-points problem [J].Computer. Vision, Graphics Image Processing.1989, 47(1):33-44[3]Tsai R Y. A versatile camera calibration technique for high-accuracy 3D machine vision metrology using off-the-shelf TV camera and lenses [J]. IEEE Journal of Robotics and Automation, 1987, RA-3 (4): 323-344.[4]Haralick R M. Solving camera parameters from the perspective projective projection of a parameterized curve [J].Pattern Recognition.1984, 17(6):637-645[5]Marimont D H. Inferring spatial structure from feature correspondence [D]. [Ph. D. dissertation], Stanford Univ., Stanford, CA, Mar.1986.[6]Shin Y C and Ahmad S. 3D location of circular and spherical features by monocular model-based vision [A]. In Proceedings of International Conference on Systems, Man, and Cybernetics, Boston, MA, 1989: 576-581.[7]Sung J A, Wolfgang R, and Hans-Jurgen W. Least-squares orthogonal distances fitting of circle, sphere, ellipse, hyperbola, and parabola [J].Pattern Recognition.2001, 34(12):2283-2303
  • Cited by

    Periodical cited type(12)

    1. 赵凤. 基于混沌置乱与DNA计算的彩色图像加密算法. 德州学院学报. 2020(04): 21-26+34 .
    2. 李红梅,徐凌. 基于斜帐篷映射的混沌加密置乱算法研究. 长春师范大学学报. 2019(06): 67-71 .
    3. 吕冬梅,李国东,王丽娟. 基于变参混沌的异位异或图像加密算法. 包装工程. 2019(17): 227-234 .
    4. 陈子豪,苗博,殷旭东. 基于多混沌系统和DNA编码的数字图像分块加密算法. 常熟理工学院学报. 2019(05): 47-52 .
    5. 侯震. 猪繁殖和呼吸障碍综合征病毒GP5蛋白的原核表达. 畜禽业. 2018(10): 6+8 .
    6. 邹红霞,齐斌,王宇,李冀兴. 基于联盟链和DNA编码的局域网加密技术. 信息网络安全. 2018(12): 31-37 .
    7. 朱淑芹,李俊青. 参数扰动下的混沌的图像加密方案. 计算机科学. 2017(S1): 356-360+384 .
    8. 王丽燕,柳扬. 基于污染二维混沌动力系统的加密算法. 大连理工大学学报. 2016(06): 650-656 .
    9. 周小安,李耀清. 基于DNA乱序编码和混沌映射的图像加密算法. 智能计算机与应用. 2016(05): 11-16 .
    10. 禹思敏,吕金虎,李澄清. 混沌密码及其在多媒体保密通信中应用的进展. 电子与信息学报. 2016(03): 735-752 . 本站查看
    11. 鄢懿,张灿,郭振永,高绍帅,陈德元. 基于混沌密钥控制的联合信源信道与安全算术码编译码算法. 电子与信息学报. 2016(10): 2553-2559 . 本站查看
    12. 彭珊,龙敏. 结合DNA编码和混沌的图像选择区域加密. 应用科学学报. 2015(06): 655-662 .

    Other cited types(10)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2962) PDF downloads(1083) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return