Research Article
Image Anomaly Detection Based on Adaptive Iteration and Feature Extraction in Edge-Cloud IoT
Algorithm 1
The proposed adaptive iterative algorithm.
Input: | : the tested image; | : the maximum number of iteration; | : algorithm termination threshold; | Obtaining the candidate tampering area using formula (1); | whiledo | PCT feature extraction, PM matching and dense linear filtering; | corrosion; | expansion; | ; | PCT feature extraction, PM matching and dense linear filtering; | ; | morphology open operation; | ifthen | //calculate the first derivative; | ifthen | break; | end if | end if | ; | end while | Output: the tamper localization . |
|