• Laser & Optoelectronics Progress
  • Vol. 60, Issue 16, 1610011 (2023)
Qi Li1, Long Li1, Wei Wang2,*, and Pengbo Nan1
Author Affiliations
  • 1School of Textile Science and Engineering, Xi'an Polytechnic University, Xi'an 710048, Shaanxi, China
  • 2Science Park, Xi'an Polytechnic University, Xi'an 710048, Shaanxi, China
  • show less
    DOI: 10.3788/LOP222378 Cite this Article Set citation alerts
    Qi Li, Long Li, Wei Wang, Pengbo Nan. Image Inpainting of Damaged Textiles Based on Improved Criminisi Algorithm[J]. Laser & Optoelectronics Progress, 2023, 60(16): 1610011 Copy Citation Text show less
    Description of Criminisi algorithm
    Fig. 1. Description of Criminisi algorithm
    Algorithm block diagram of textile cultural relic image restoration
    Fig. 2. Algorithm block diagram of textile cultural relic image restoration
    Boundary tracking results after denoising. (a) Raw wool fabric image; (b) boundary tracking images without denoising; (c) boundary tracking image processed by adaptive filtering; (d) boundary tracking image processed by proposed algorithm
    Fig. 3. Boundary tracking results after denoising. (a) Raw wool fabric image; (b) boundary tracking images without denoising; (c) boundary tracking image processed by adaptive filtering; (d) boundary tracking image processed by proposed algorithm
    Schematic diagram of mask making process. (a) Original image; (b) damaged area; (c) mask map; (d) image to be repaired
    Fig. 4. Schematic diagram of mask making process. (a) Original image; (b) damaged area; (c) mask map; (d) image to be repaired
    The result of K-means color segmentation
    Fig. 5. The result of K-means color segmentation
    Color dispersion of different pixel blocks. (a) Sample 1,σ(p)=0.3398; (b) Sample 2,σ(p)=0.5350
    Fig. 6. Color dispersion of different pixel blocks. (a) Sample 1,σ(p)=0.3398; (b) Sample 2,σ(p)=0.5350
    Comparison of inpainting results of damaged textile cultural relics images by four algorithms. (a) Image of damaged textile artifacts; (b) mask map; (c) inpainting image by Criminisi algorithm;(d) inpainting image by reference [16] algorithm; (e) inpainting image by reference [22] algorithm; (f) inpainting image by proposed algorithm
    Fig. 7. Comparison of inpainting results of damaged textile cultural relics images by four algorithms. (a) Image of damaged textile artifacts; (b) mask map; (c) inpainting image by Criminisi algorithm;(d) inpainting image by reference [16] algorithm; (e) inpainting image by reference [22] algorithm; (f) inpainting image by proposed algorithm
    Comparison of repairing effect of artificial fictitious damaged textile image. (a) Image of original textile; (b) artificial virtual damage image; (c) inpainting image by Criminisi algorithm;(d) inpainting image by reference [16] algorithm; (e) inpainting image by reference [22] algorithm; (f) inpainting image by proposed algorithm
    Fig. 8. Comparison of repairing effect of artificial fictitious damaged textile image. (a) Image of original textile; (b) artificial virtual damage image; (c) inpainting image by Criminisi algorithm;(d) inpainting image by reference [16] algorithm; (e) inpainting image by reference [22] algorithm; (f) inpainting image by proposed algorithm
    Comparison of inpainting effects. (a) Original image; (b) damaged image; (c) inpainting image by reference [16] algorithm; (d) inpainting image by reference [22] algorithm; (e) inpainting image by proposed algorithm
    Fig. 9. Comparison of inpainting effects. (a) Original image; (b) damaged image; (c) inpainting image by reference [16] algorithm; (d) inpainting image by reference [22] algorithm; (e) inpainting image by proposed algorithm
    No.PSNR /dBSSIM
    Criminisi6Reference[16Reference[22

    Proposed

    algorithm

    Criminisi6Reference[16Reference[22

    Proposed

    algorithm

    129.099328.308229.65531.69470.94990.93360.95430.9639
    226.230526.548524.441728.35630.96020.96470.94560.9669
    326.661026.783726.827429.44220.93890.93690.93940.9685
    431.011132.873831.159632.87280.98730.98790.98480.9885
    529.768432.396732.077634.46260.96900.97750.98730.9821
    633.189135.637835.122636.26450.97780.98480.97890.9855
    No.FSIMMSE
    Criminisi6Reference[16Reference[22

    Proposed

    algorithm

    Crimytinisi6Reference[16Reference[22

    Proposed

    algorithm

    10.97930.77180.977590.982680.011395.998470.401544.0162
    20.95910.97040.97320.9749154.8929143.9549233.837194.9413
    30.97680.98040.98030.9809140.2739136.3683135.003573.9374
    40.98850.99050.98890.992851.519640.338249.787433.5586
    50.98140.98580.98720.989668.586937.446440.301323.2715
    60.98730.99100.99250.991631.201117.754319.990515.3686
    Table 1. Comparison of quality evaluation parameters (test 1)
    No.PSNRSSIM
    Reference[16Reference[22

    Proposed

    algorithm

    Reference[16Reference[22

    Proposed

    algorithm

    124.543524.029326.25490.96340.96400.9733
    241.526839.754243.21080.99610.99580.9967
    331.130030.728532.59590.99330.99350.9944
    No.FSIMMSE
    Reference[16Reference[22

    Proposed

    algorithm

    Reference[16Reference[22

    Proposed

    algorithm

    10.97230.97280.9799219.5577257.1270154.0254
    20.99810.99700.99913.63426.88113.1045
    30.99620.99460.996850.127954.983735.7677
    Table 2. Comparison of quality evaluation parameters (test 2)