Threshold Selection on Circular Histogram Using Renyi Entropy
Abstract
References
Recommendations
Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint
IMACC 2015: Proceedings of the 15th IMA International Conference on Cryptography and Coding - Volume 9496We provide a new inequality that links two important entropy notions: Shannon Entropy $$H_1$$ and collision entropy $$H_2$$ . Our formula gives the worst possible amount of collision entropy in a probability distribution, when its Shannon Entropy is ...
Some properties of Rényi entropy and Rényi entropy rate
In this paper, we define the conditional Renyi entropy and show that the so-called chain rule holds for the Renyi entropy. Then, we introduce a relation for the rate of Renyi entropy and use it to derive the rate of the Renyi entropy for an irreducible-...
Simplified expression and recursive algorithm of multi-threshold Tsallis entropy
Highlights- Propose and proved simplified representation of multi-threshold Tsallis entropy and Renyi entropy.
- Proved that Tsallis entropy and Renyi entropy are equivalent for multi-threshold segmentation with the same parameters.
- Proposed ...
AbstractImage segmentation is an important step in obtaining image information, and it has always been an extremely critical link in the fields of computer vision and pattern recognition. Because of its simplicity and effectiveness, threshold-based image ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/e1476651-7086-4e73-9212-c45ba02ceaf1/3532342.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 29Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format