JSIP  Vol.5 No.2 , May 2014
Template Matching from 2-D into 1-D
Abstract: The following article has been retracted due to special reason of the authors. This paper published in Vol.5 No. 2, 2014, has been removed from this site. Title: Template Matching from 2-D into 1-D Author: Yasser Fouda
Cite this paper: Fouda, Y. (2014) Template Matching from 2-D into 1-D. Journal of Signal and Information Processing, 5, 23-31. doi: 10.4236/jsip.2014.52005.

[1]   Mikhail, I.A. (2001) Faster Image Template Matching in the Sum of the Absolute Value of Differences Measures. IEEE Transactions on Image Processing, 10, 659-663.

[2]   Tsai,D.-M. and Lin, C.-T. (2003) Fast Normalized Cross Correlation for Detect Detection. Pattern Recognition Letters, 24, 2625-2631.

[3]   Costa, C.E. and Petrou, M. (2000) Automatic Registration of Ceramic Tiles for the Purpose of Fault Detection. Machine Vision and Applications, 11, 225-230.

[4]   Li, R., Zeng, B. and Liou, M.L. (1994) A New Three-Step Search Algorithm for Block Motion Estimation. IEEE Transactions on Circuits and Systems for Video Technology, 4, 438-442.

[5]   Mahmood, A. and Khan, S. (2012) Correlation Coefficient Based Fast Template Matching through Partial Elimination. IEEE Transactions on Image Processing, 21, 2099-2108.

[6]   Chen, Y.S., Huang, Y.P. and Fuh, C.S. (2001) A Fast Block Matching Algorithm Based on the Winner-Update Strategy. IEEE Transactions on Image Processing, 10, 1212-1222.

[7]   Wei, S. and Lai, S. (2008) Fast Template Matching Based on Normalized Cross Correlation with Adaptive Multilevel Winner Update. IEEE Transactions on Image Processing, 17, 2227-2235.

[8]   Alsaade, F., Fouda, Y. and Khan, A.R. (2012) Efficient Cellular Automata Algorithm for Template Matching. Journal of Artificial Intelligence, 5, 122-129.

[9]   Essannouni, F., Thami, R.O.H., Aboutajdine, D. and Salam, A. (2007) Adjustable SAD Matching Algorithm Using Frequency Domain. Journal of Real-Time Image Processing, 1, 257-265.

[10]   Alsaade, F. and Fouda, Y. (2012) Template Matching Based on SAD and Pyramid. International Journal of Computer Science and Information Security, 10, 11-16.