A Content-adaptive Visibility Predictor for Perceptually Optimized Image Blending

被引:0
|
作者
Fukiage, Taiki [1 ]
Oishi, Takeshi [2 ]
机构
[1] NTT Corp, NTT Commun Sci Labs, 3-1 Wakamiya, Atsugi, Kanagawa 2430198, Japan
[2] Univ Tokyo, Inst Ind Sci, Meguro Ku, 4-6-1 Komaba, Tokyo, Japan
关键词
Alpha blending; image blending; human visual system; contrast perception; visibility; CONTRAST CONSTANCY; VISION; COLOR; NORMALIZATION; PERCEPTION; MECHANISMS; MODEL;
D O I
10.1145/3565972
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The visibility of an image semi-transparently overlaid on another image varies significantly, depending on the content of the images. This makes it difficult to maintain the desired visibility level when the image content changes. To tackle this problem, we developed a perceptual model to predict the visibility of the blended results of arbitrarily combined images. Conventional visibility models cannot reflect the dependence of the suprathreshold visibility of the blended images on the appearance of the pre-blended image content. Therefore, we have proposed a visibility model with a content-adaptive feature aggregation mechanism, which integrates the visibility for each image feature (i.e., such as spatial frequency and colors) after applying weights that are adaptively determined according to the appearance of the input image. We conducted a large-scale psychophysical experiment to develop the visibility predictor model. Ablation studies revealed the importance of the adaptive weighting mechanism in accurately predicting the visibility of blended images. We have also proposed a technique for optimizing the image opacity such that users can set the visibility of the target image to an arbitrary level. Our evaluation revealed that the proposed perceptually optimized image blending was effective under practical conditions.
引用
收藏
页数:29
相关论文
共 50 条
  • [31] Content-adaptive image compression and encryption via optimized compressive sensing with double random phase encoding driven by chaos
    Gan, Zhihua
    Chai, Xiuli
    Bi, Jianqiang
    Chen, Xiuhui
    COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (03) : 2291 - 2309
  • [32] Content-adaptive image compression and encryption via optimized compressive sensing with double random phase encoding driven by chaos
    Zhihua Gan
    Xiuli Chai
    Jianqiang Bi
    Xiuhui Chen
    Complex & Intelligent Systems, 2022, 8 : 2291 - 2309
  • [33] Content-adaptive neural filters for image interpolation using pixel classification
    Hu, H
    Hofman, PM
    de Haan, G
    APPLICATIONS OF NEURAL NETWORKS AND MACHINE LEARNING IN IMAGE PROCESSING IX, 2005, 5673 : 1 - 11
  • [34] Towards secured image steganography based on content-adaptive adversarial perturbation
    Sharma, Vipal Kumar
    Mir, Roohie Naaz
    Rout, Ranjeet Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [35] AN IMPROVED CONTENT-ADAPTIVE MESH-GENERATION METHOD FOR IMAGE REPRESENTATION
    Adams, Michael D.
    2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, : 873 - 876
  • [36] Improving security for image steganography using content-adaptive adversarial perturbations
    Luo, Jie
    He, Peisong
    Liu, Jiayong
    Wang, Hongxia
    Wu, Chunwang
    Yuan, Chao
    Xia, Qiang
    APPLIED INTELLIGENCE, 2023, 53 (12) : 16059 - 16076
  • [37] A novel content-adaptive interpolation
    Chan, TW
    Au, OC
    Chong, TS
    Chau, WS
    2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 6260 - 6263
  • [38] Content-Adaptive Superpixel Segmentation
    Xiao, Xiaolin
    Zhou, Yicong
    Gong, Yue-Jiao
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2018, 27 (06) : 2883 - 2896
  • [39] A novel game-theoretic model for content-adaptive image steganography
    Li, Qi
    Liao, Xin
    Chen, Guoyong
    Ding, Liping
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, : 232 - 237
  • [40] Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding
    Schoettle, Pascal
    Korff, Stefan
    Boehme, Rainer
    2012 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2012, : 193 - 198