SlideShare a Scribd company logo
1 of 55
Overview of Computer Vision
CS491E/791E
What is Computer Vision?
• Deals with the development of the theoretical and
algorithmic basis by which useful information about the
3D world can be automatically extracted and analyzed
from a single or multiple o 2D images of the world.
Computer Vision, Also Known As ...
• Image Analysis
• Scene Analysis
• Image Understanding
Some Related Disciplines
• Image Processing
• Computer Graphics
• Pattern Recognition
• Robotics
• Artificial Intelligence
Image Processing
• Image Enhancement
Image Processing (cont’d)
• Image Restoration(e.g., correcting out-focus images)
Image Processing (cont’d)
• Image Compression
Computer Graphics
• Geometric modeling
Computer Vision
Robotic Vision
• Application of computer vision in robotics.
• Some important applications include :
– Autonomous robot navigation
– Inspection and assembly
Pattern Recognition
• Has a very long history (research work in this field started
in the 60s).
• Concerned with the recognition and classification of 2D
objects mainly from 2D images.
• Many classic approaches only worked under very
constrained views (not suitable for 3D objects).
• It has triggered much of the research which led to today’s
field of computer vision.
• Many pattern recognition principles are used extensively in
computer vision.
Artificial Intelligence
• Concerned with designing systems that are intelligent and
with studying computational aspects of intelligence.
• It is used to analyze scenes by computing a symbolic
representation of the scene contents after the images have
been processed to obtain features.
• Many techniques from artificial intelligence play an
important role in many aspects of computer vision.
• Computer vision is considered a sub-field of artificial
intelligence.
Why is Computer Vision Difficult?
• It is a many-to-one mapping
– A variety of surfaces with different material and
geometrical properties, possibly under different lighting
conditions, could lead to identical images
– Inverse mapping has non unique solution (a lot of
information is lost in the transformation from the 3D
world to the 2D image)
• It is computationally intensive
• We do not understand the recognition problem
Practical Considerations
• Impose constraints to recover the scene
– Gather more data (images)
– Make assumptions about the world
• Computability and robustness
– Is the solution computable using reasonable resources?
– Is the solution robust?
• Industrial computer vision systems work very well
– Make strong assumptions about lighting conditions
– Make strong assumptions about the position of objects
– Make strong assumptions about the type of objects
An Industrial Computer Vision System
The Three Processing Levels
• Low-level processing
– Standard procedures are applied to improve image quality
– Procedures are required to have no intelligent capabilities.
The Three Processing Levels (cont’d)
• Intermediate-level processing
– Extract and characterize components in the image
– Some intelligent capabilities are required.
The Three Processing Levels (cont’d)
• High-level processing
– Recognition and interpretation.
– Procedures require high intelligent capabilities.
Scene interpretation, even of complex, cluttered scenes is a
straightforward task for humans.
Recognition Cues
How are we able to discern reality and an image of reality?
What clues are present in the image?
What knowledge do we use to process this image?
Recognition Cues (cont’d)
What is this object?
Does color play a role in recognition?
Might this be easier to recognize from a different view?
The role of color
The role of texture
• Characteristic image texture can help us readily recognize
objects.
The role of shape
The role of grouping
Mathematics in Computer Vision
• In the early days of computer vision, vision systems employed
simple heuristic methods.
• Today, the domain is heavily inclined towards theoretically,
well-founded methods involving non-trivial mathematics.
– Calculus
– Linear Algebra
– Probabilities and Statistics
– Signal Processing
– Projective Geometry
– Computational Geometry
– Optimization Theory
– Control Theory
Computer Vision Applications
• Industrial inspection/quality control
• Surveillance and security
• Face recognition
• Gesture recognition
• Space applications
• Medical image analysis
• Autonomous vehicles
• Virtual reality and much more …...
Visual Inspection
Character Recognition
Document Handling
Signature Verification
Biometrics
Fingerprint Verification / Identification
Fingerprint Identification Research at
UNR
Minutiae Matching
Delaunay Triangulation
Object Recognition
Object Recognition Research
at UNR
reference view 1 reference view 2
novel view recognized
Indexing into Databases
• Shape content
Indexing into Databases (cont’d)
• Color, texture
Target Recognition
• Department of Defense (Army, Airforce, Navy)
Interpretation of aerial photography is a problem domain in both
computer vision and photogrammetry.
Interpretation of Aerial Photography
Autonomous Vehicles
• Land, Underwater, Space
Traffic Monitoring
Face Detection
Face Recognition
Face Detection/Recognition Research
at UNR
Facial Expression Recognition
Face Tracking
Face Tracking (cont’d)
Hand Gesture Recognition
• Smart Human-Computer User Interfaces
• Sign Language Recognition
Human Activity Recognition
Medical Applications
• skin cancer breast cancer
Astronomy Applications
Research at UNR
• Identify radio galaxies having a special morphology called
“bent-double” (in collaboration with Lawrence
Livermore National Laboratory)
Morphing
Inserting Artificial Objects into a Scene
Computer Vision and Related
Courses at UNR
• CS474/674 Image Processing and Interpretation
• CS480/680 Computer Graphics
• CS479/679 Pattern Recognition
• CS476/676 Artificial Intelligence
• CS773A Machine Intelligence
• CS791Q Machine Learning
• CS7xx Neural Networks
• CS7xx Computer Vision
More information on Computer Vision
• Computer Vision Home Page
http://www.cs.cmu.edu/afs/cs/project/cil/ftp/html/vision.html
• Home Page
http://www.cs.unr.edu/CRCD
• UNR Computer Vision Laboratory
http://www.cs.unr.edu/CVL

More Related Content

Similar to Application of image processing.ppt

Computer Vision – From traditional approaches to deep neural networks
Computer Vision – From traditional approaches to deep neural networksComputer Vision – From traditional approaches to deep neural networks
Computer Vision – From traditional approaches to deep neural networksinovex GmbH
 
Overview of Computer Vision For Footwear Industry
Overview of Computer Vision For Footwear IndustryOverview of Computer Vision For Footwear Industry
Overview of Computer Vision For Footwear IndustryTanvir Moin
 
Intelligent image processing
Intelligent image processingIntelligent image processing
Intelligent image processingAndrew Stewart
 
introdaction.pptx
introdaction.pptxintrodaction.pptx
introdaction.pptxDekebatufa
 
Synthetic Data and Graphics Techniques in Robotics
Synthetic Data and Graphics Techniques in RoboticsSynthetic Data and Graphics Techniques in Robotics
Synthetic Data and Graphics Techniques in RoboticsPrabindh Sundareson
 
Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...IRJET Journal
 
Fcv core szeliski_zisserman
Fcv core szeliski_zissermanFcv core szeliski_zisserman
Fcv core szeliski_zissermanzukun
 
3D PRINTING - REVERSE ENGINEERING
3D PRINTING - REVERSE ENGINEERING 3D PRINTING - REVERSE ENGINEERING
3D PRINTING - REVERSE ENGINEERING S. Sathishkumar
 
What is computer vision?
What is computer vision?What is computer vision?
What is computer vision?Qentinel
 
Digital_image_processing_-Vijaya_Raghavan.pdf
Digital_image_processing_-Vijaya_Raghavan.pdfDigital_image_processing_-Vijaya_Raghavan.pdf
Digital_image_processing_-Vijaya_Raghavan.pdfVaideshSiva1
 
HiPEAC 2019 Workshop - Real-Time Modelling Visual Scenes with Biological Insp...
HiPEAC 2019 Workshop - Real-Time Modelling Visual Scenes with Biological Insp...HiPEAC 2019 Workshop - Real-Time Modelling Visual Scenes with Biological Insp...
HiPEAC 2019 Workshop - Real-Time Modelling Visual Scenes with Biological Insp...Tulipp. Eu
 
Computer vision.pptx for pg students study about computer vision
Computer vision.pptx for pg students study about computer visionComputer vision.pptx for pg students study about computer vision
Computer vision.pptx for pg students study about computer visionshesnasuneer
 
vision_2.ppt
vision_2.pptvision_2.ppt
vision_2.pptnyomans1
 
vision.ppt
vision.pptvision.ppt
vision.pptnyomans1
 
Fcv core sawhney
Fcv core sawhneyFcv core sawhney
Fcv core sawhneyzukun
 

Similar to Application of image processing.ppt (20)

Computer Vision – From traditional approaches to deep neural networks
Computer Vision – From traditional approaches to deep neural networksComputer Vision – From traditional approaches to deep neural networks
Computer Vision – From traditional approaches to deep neural networks
 
Overview of Computer Vision For Footwear Industry
Overview of Computer Vision For Footwear IndustryOverview of Computer Vision For Footwear Industry
Overview of Computer Vision For Footwear Industry
 
Intelligent image processing
Intelligent image processingIntelligent image processing
Intelligent image processing
 
Object Recognition
Object RecognitionObject Recognition
Object Recognition
 
Computer Vision
Computer VisionComputer Vision
Computer Vision
 
introdaction.pptx
introdaction.pptxintrodaction.pptx
introdaction.pptx
 
Synthetic Data and Graphics Techniques in Robotics
Synthetic Data and Graphics Techniques in RoboticsSynthetic Data and Graphics Techniques in Robotics
Synthetic Data and Graphics Techniques in Robotics
 
Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...
 
Fcv core szeliski_zisserman
Fcv core szeliski_zissermanFcv core szeliski_zisserman
Fcv core szeliski_zisserman
 
mca.pptx
mca.pptxmca.pptx
mca.pptx
 
3D PRINTING - REVERSE ENGINEERING
3D PRINTING - REVERSE ENGINEERING 3D PRINTING - REVERSE ENGINEERING
3D PRINTING - REVERSE ENGINEERING
 
What is computer vision?
What is computer vision?What is computer vision?
What is computer vision?
 
Digital_image_processing_-Vijaya_Raghavan.pdf
Digital_image_processing_-Vijaya_Raghavan.pdfDigital_image_processing_-Vijaya_Raghavan.pdf
Digital_image_processing_-Vijaya_Raghavan.pdf
 
HiPEAC 2019 Workshop - Real-Time Modelling Visual Scenes with Biological Insp...
HiPEAC 2019 Workshop - Real-Time Modelling Visual Scenes with Biological Insp...HiPEAC 2019 Workshop - Real-Time Modelling Visual Scenes with Biological Insp...
HiPEAC 2019 Workshop - Real-Time Modelling Visual Scenes with Biological Insp...
 
Ch1.pptx
Ch1.pptxCh1.pptx
Ch1.pptx
 
Computer vision.pptx for pg students study about computer vision
Computer vision.pptx for pg students study about computer visionComputer vision.pptx for pg students study about computer vision
Computer vision.pptx for pg students study about computer vision
 
vision.ppt
vision.pptvision.ppt
vision.ppt
 
vision_2.ppt
vision_2.pptvision_2.ppt
vision_2.ppt
 
vision.ppt
vision.pptvision.ppt
vision.ppt
 
Fcv core sawhney
Fcv core sawhneyFcv core sawhney
Fcv core sawhney
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Application of image processing.ppt