RESUMO
Despite the rapid growth in brain tumor segmentation approaches, there are still many challenges in this field. Automatic segmentation of brain images has a critical role in decreasing the burden of manual labeling and increasing robustness of brain tumor diagnosis. We consider segmentation of glioma tumors, which have a wide variation in size, shape and appearance properties. In this paper images are enhanced and normalized to same scale in a preprocessing step. The enhanced images are then segmented based on their intensities using 3D super-voxels. Usually in images a tumor region can be regarded as a salient object. Inspired by this observation, we propose a new feature which uses a saliency detection algorithm. An edge-aware filtering technique is employed to align edges of the original image to the saliency map which enhances the boundaries of the tumor. Then, for classification of tumors in brain images, a set of robust texture features are extracted from super-voxels. Experimental results indicate that our proposed method outperforms a comparable state-of-the-art algorithm in term of dice score.
Assuntos
Neoplasias Encefálicas/diagnóstico , Neuroimagem/métodos , Algoritmos , Encéfalo , Neoplasias Encefálicas/classificação , HumanosRESUMO
Today with the advent of technology in different medical imaging fields, the use of stereoscopic images has increased. Furthermore, with the rapid growth in telemedicine for remote diagnosis, treatment, and surgery, there is a need for watermarking. This is for copyright protection and tracking of digital media. Also, the efficient use of bandwidth for transmission of such data is another concern. In this paper an adaptive watermarking scheme is proposed that considers human visual system in depth perception. Our proposed scheme modifies maximum singular values of wavelet coefficients of stereo pair for embedding watermark bits. Experimental results show high 3D visual quality of watermarked video frames. Moreover, comparison with a compatible state of the art method shows that the proposed method is highly robust against attacks such as AWGN, salt and pepper noise, and JPEG compression.