Journal of Terahertz Science and Electronic Information Technology , Volume. 23, Issue 3, 278(2025)
Target image information compression and extraction algorithm based on information entropy
[2] [2] SHANNON C E. A mathematical theory of communication[J]. The Bell System Technical Journal, 1948, 27(3): 379-423. doi: 10.1002/j.1538-7305.1948.tb01338.x.
[12] [12] DU Xiuli, FAN Guichuan, LYU Yana, et al. Bayesian network parameter learning algorithm for target damage assessment[C]//IOP Conference Series: Materials Science and Engineering. Zhuhai, China: IOP, 2019: 052014. doi: 10.1088/1757-899X/569/5/052014.
[18] [18] BEMARD J, MYERS B J. Immediate battle damage assessment of missile attack effectiveness: US20010853935[P]. 2001-05-11.
[19] [19] CONLEY K A, GAMACHE R M, DROTAR J T. Battle damage assessment system: US-7568430-B1[P]. 2006-02-16.
[20] [20] SOLES A M, WALSH M R, SCOTT E B. Damage detection and remediation system and methods thereof: US20120188078A1[P].2011-06-16.
[26] [26] LOWE D G. Distinctive image features from scale-invariant key points[J]. International Journal of Computer Vision, 2004, 60(2): 91-110. doi: 10.1023/B:VISI.0000029664.99615.94.
[27] [27] BAY H, ESS A, TUYTELAARS T, et al. Speeded-Up Robust Features(SURF)[J]. Computer Vision and Image Understanding, 2008, 110(3): 346-359. doi: 10.1016/j.cviu.2007.09.014.
[28] [28] RUBLEE E, RABAUD V, KONOLIGE K, et al. ORB: an efficient alternative to SIFT or SURF[C]//2011 International Conference on Computer Vision. Barcelona, Spain: IEEE, 2011: 2564-2571. doi: 10.1109/ICCV.2011.6126544.
[29] [29] HE K M, GKIOXARI G, DOLLR P, et al. Mask R-CNN[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2020, 42(2): 386-397. doi: 10.1109/TPAMI.2018.2844175.
[30] [30] FARHADI A, REDMON J. Yolov3: an incremental improvement[C]//Computer Vision and Pattern Recognition. Salt Lake City, USA: IEEE, 2018(1804): 1-6.
[31] [31] LIU Wei, ANGUELOV D, ERHAN D, et al. SSD: single shot MultiBox detector[C]//Computer Vision-ECCV 2016: Springer International Publishing. Cham: Springer, 2016: 21-37. doi: 10.1007/978-3-319-46448-0_2.
Get Citation
Copy Citation Text
LI Chenglong, LOU Wenzhong, DING Nanxi, MA Wenlong, ZHAO Fei, ZHANG Zihao. Target image information compression and extraction algorithm based on information entropy[J]. Journal of Terahertz Science and Electronic Information Technology , 2025, 23(3): 278
Category:
Received: Oct. 12, 2023
Accepted: Jun. 5, 2025
Published Online: Jun. 5, 2025
The Author Email: LOU Wenzhong (louwz2020@163.com)