This document discusses various shape features that can be used for machine vision and image segmentation. It covers thresholding techniques, identifying object boundaries using chain codes and Fourier descriptors, and describing regions using basic descriptors like area and perimeter or moment invariants. Segmentation is described as an important but difficult task, and thresholding, discontinuities and region similarity are presented as common segmentation approaches. Examples are provided to illustrate different shape feature extraction methods.
At the end of this lesson, you should be able to;
define segmentation.
Describe edge based in segmentation.
describe thresholding and its properties.
apply edge detection and thresholding as segmentation techniques.
Image segmentation is an important image processing step, and it is used everywhere if we want to analyze what is inside the image. Image segmentation, basically provide the meaningful objects of the image.
Texture based feature extraction and object trackingPriyanka Goswami
The project involved developing and implementing different texture analysis based extraction techniques like Local Binary Pattern (LBP), Local Derivative Pattern (LDP) and Local Ternary Pattern (LTP) in MATLAB and carrying out a comparative study by analyzing the effectiveness of each technique using a standard set of images (Yale data set). The most optimum technique is then applied to identify cloud patterns and track their motion (in pixel position changes) in time series images (acquired from weather satellites like GOES) using the Chi-Square Difference method.
At the end of this lesson, you should be able to;
describe Connected Components and Contours in image segmentation.
discuss region based segmentation method.
discuss Region Growing segmentation technique.
discuss Morphological Watersheds segmentation.
discuss Model Based Segmentation.
discuss Motion Segmentation.
implement connected components, flood fill, watershed, template matching and frame difference techniques.
formulate possible mechanisms to propose segmentation methods to solve problems.
Image segmentation techniques
More information on this research can be found in:
Hussein, Rania, Frederic D. McKenzie. “Identifying Ambiguous Prostate Gland Contours from Histology Using Capsule Shape Information and Least Squares Curve Fitting.” The International Journal of Computer Assisted Radiology and Surgery ( IJCARS), Volume 2 Numbers 3-4, pp. 143-150, December 2007.
At the end of this lesson, you should be able to;
define segmentation.
Describe edge based in segmentation.
describe thresholding and its properties.
apply edge detection and thresholding as segmentation techniques.
Image segmentation is an important image processing step, and it is used everywhere if we want to analyze what is inside the image. Image segmentation, basically provide the meaningful objects of the image.
Texture based feature extraction and object trackingPriyanka Goswami
The project involved developing and implementing different texture analysis based extraction techniques like Local Binary Pattern (LBP), Local Derivative Pattern (LDP) and Local Ternary Pattern (LTP) in MATLAB and carrying out a comparative study by analyzing the effectiveness of each technique using a standard set of images (Yale data set). The most optimum technique is then applied to identify cloud patterns and track their motion (in pixel position changes) in time series images (acquired from weather satellites like GOES) using the Chi-Square Difference method.
At the end of this lesson, you should be able to;
describe Connected Components and Contours in image segmentation.
discuss region based segmentation method.
discuss Region Growing segmentation technique.
discuss Morphological Watersheds segmentation.
discuss Model Based Segmentation.
discuss Motion Segmentation.
implement connected components, flood fill, watershed, template matching and frame difference techniques.
formulate possible mechanisms to propose segmentation methods to solve problems.
Image segmentation techniques
More information on this research can be found in:
Hussein, Rania, Frederic D. McKenzie. “Identifying Ambiguous Prostate Gland Contours from Histology Using Capsule Shape Information and Least Squares Curve Fitting.” The International Journal of Computer Assisted Radiology and Surgery ( IJCARS), Volume 2 Numbers 3-4, pp. 143-150, December 2007.
DTAM: Dense Tracking and Mapping in Real-Time, Robot vision GroupLihang Li
This is the slides about DTAM for my group meeting report, hope it does help to anyone who will want to implement DTAM and need to understand it deeply.
Lab course presentation to detect the parking space for the car given 2D image from the google maps and 3D point Cloud data of the current enivornment.
Github of the project can be find here.
https://github.com/amanullahtariq/ParkingSpaceDetection
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
4. Segmentation
• Segmentation: subdivides an image into its constituent region or
objects
• The purpose of image segmentation is to decompose the image into
parts that are meaningful with respect to a particular application
• Example, automatic PCB (printed circuit board) inspection,
5. Segmentation
• Segmentation is one of the most difficult tasks in image processing
• Segmentation accuracy determines the success or failure of
automated analysis procedure
• Considerable care should be taken to improve the probability of
rugged segmentation
6. Segmentation
Image segmentation generally are based on basic properties of intensity
values:
1. Discontinuity: partition an image based on abrupt changes in
intensity, such as edges
2. Similarity: partition image into regions that are similar according to
a set of predefined criteria
7. Thresholding
• Thresholding is a fundamental approach to segmentation
• Popular in applications where speed is an important factor
• Single value thresholding can be given mathematically as follows:
T
y
x
f
if
T
y
x
f
if
y
x
g
)
,
(
0
)
,
(
1
)
,
(
8. Thresholding (example)
• For example, we are going to build poker playing robot
• This robot should be able to visually interpret the card in its hand
9. What is the Correct Threshold?
• Wrong threshold leads to disastrous results
10. Basic Global Thresholding
• Partition the image histogram using a single global
threshold
• The basic global threshold, T, is calculated as follows:
1. Select an initial estimate for T (typically the average grey level
in the image)
2. Segment the image using T to produce two groups of pixels: G1
consisting of pixels with grey levels >T and G2 consisting pixels
with grey levels ≤ T
3. Compute the average grey levels of pixels in G1 to give μ1 and
G2 to give μ2
11. Basic Global Thresholding
4. Compute a new threshold value:
5. Repeat steps 2 – 4 until the difference in T in successive
iterations is less than a predefined limit T∞
• This algorithm works very well for finding thresholds when the
histogram is suitable
2
2
1
T
13. Problems with Single Value
Thresholding
• Single value thresholding only works for bimodal histograms
• Images with other kinds of histograms need more than a single
threshold
14. Thresholding (example)
• For example, we want to
isolate the contents
of the bottles
• Think about what the
histogram for this
image would look like
• Single threshold value can’t be used
in this problem
• The second picture shows the single
value thresholding result
15. Double Value Threshold
• We need a double value to
segment this kind of image
• There are two objects in this
image, bottle and liquid
• After we applied double
threshold value, we can
distinguish bottle and liquid
17. Object Descriptor
• Objects are represented as a collection of pixels in an image
• To support the object recognition, we need to describe the
properties of group pixels object descriptor
• Two forms of object descriptor:
1. Boundary descriptor: characterize an arrangement of pixels in
the object perimeter or boundary
2. Region descriptor: characterize an arrangement of pixels within
the area of the object
18. Important Properties
of Object Descriptor
1. Complete set: two objects must have the same descriptors if and only
if they have the same shape
2. Congruent: able to recognize similar objects when they have similar
descriptors
3. Convenient: they have invariant properties (position, rotation, scale,
or affine/perspective changes)
4. Compact set: represent the essence of an object in an efficient way
19. Boundary
• Boundary: a region describes contents that are surrounded
by a boundary (or perimeter) region’s contour
• The boundary found by following the object contour:
– First, find one point on the contour
– Progress round the contour either in a clockwise/anticlockwise
direction, finding the nearest (or next) contour point.
20. Chain Code
• We can represents a contour with the coordinates of a sequence of
pixels in the image
• Alternatively, we can just store the relative position between
consecutive pixels. This is the basic idea behind chain code
• The set of pixels in the border of a shape is translated into a set of
connections between them
22. Start Point Invariance
in Chain Code
• Chain code will be different when the start point changes
• We need start point invariance. This can be achieved by considering the
elements of the code to constitute the digits in an integer.
• We can shift the digits cyclically (replacing the least significant digit with
the most significant one, and shifting all other digits left one place).
23. Fourier Descriptor
• Let x[m] and y[m] be the coordinates of the m-th pixel on the boundary
of a given 2D shape containing pixels, a complex number can be formed
as z[m]=x[m]+jy[m], and the Fourier Descriptor (FD) of this shape is
defined as the DFT of z[m]:
• FD is independent of its location, scaling, rotation and starting point
• We could use M < N FDs corresponding to the low frequency
components of the boundary to represent the 2D shape
Z[k]= DFT[z[m]]=
1
N
z[m]e- j2pmk/N
m=0
N-1
å
25. Fourier Descriptor Properties
• Fourier descriptors inherit several properties from the Fourier transform.
• Translation invariant: no matter where the shape is located in the image,
the Fourier descriptors remain the same.
• Scaling invariant: if the shape is scaled by a factor, the Fourier descriptors
are scaled by that same factor.
• Rotation and starting point invariant: rotating the shape or selecting a
different starting point only affects the phase of the descriptors.
25-Jun-21 Image Processing and Multimedia Retrieval 25
27. Region
There are two main region descriptors:
1. Basic: characterize the geometric properties of the region
2. Moment: characterize the density of the region
28. Basic Region Descriptors
• A region can be described by considering scalar measures based on its
geometric properties
Descriptor Formula
Area
Perimeter
Compactness
Dispersion
A(S) = I(x, y)DA
y
x
P(S) = (xi - xi-1)2
+(yi - yi-1)2
i
å
C(S) =
A(s)
P2
(s) / 4p
IR(S) =
max (xi - x)2
+(yi - y)2
( )
min (xi - x)2
+(yi - y)2
( )
30. Moments
• Moments describe a shape’s layout, a bit like combining area,
compactness, irregularity, and higher-order descriptions together
• The moment of order p and q, mpq of a function I(x,y) is defined as
• Example
mpq = xp
yq
y
x
I(x, y)DA
m00 = I(x, y)DA
y
x
m10 = xI(x, y)DA
y
x
m01 = yI(x, y)DA
y
x
31. Centralized Moments
• General formula:
• Example
• This moment descriptors are translation invariant
mpq = (x - x)p
(y - y)q
y
x
I(x, y)DA
m01 = m01 -
m01
m00
m00
m10 = m01
m20 = m20 -
m10
2
m00
33. Invariant Moments
• Centralized moments are only translation invariant
• Normalized central moments are invariant to translation, scale and
rotation
hpq =
mpq
m00
g
where g=
p + q
2
"p+ q ³ 2
36. Acknowledgment
Some of slides in this PowerPoint presentation are adaptation from
various slides, many thanks to:
1. Dr. Brian Mac Namee, School of Computing at the Dublin Institute
of Technology (http://www.comp.dit.ie/bmacnamee/gaip.htm)
2. James Hays, Computer Science Department, Brown University,
(http://cs.brown.edu/~hays/)