SlideShare a Scribd company logo
1 of 30
Download to read offline
Outline
 Introduction to SIFT
 Overview of Algorithm
     Construction of Scale space
     DoG (Difference of Gaussian Images)
     Finding Keypoint
     Getting Rid of Bad Keypoint
     Assigning an orientation to keypoints
     Generate SIFT features
Introduction to SIFT
   Scale-invariant feature transform (or SIFT)
    is an algorithm in computer vision to detect
    and describe local features in images.

   This algorithm was published by David
    Lowe.
Types of invariance
   Illumination
Types of invariance
 Illumination
 Scale
Types of invariance
 Illumination
 Scale
 Rotation
Types of invariance
 Illumination
 Scale
 Rotation
 Full perspective
SIFT Algorithm
1. Constructing Scale space
 In scale Space we take the image and
  generate progressively blurred out
  images, then resize the original image to
  half and generate blurred images.
 Images that are of same size but different
  scale are called octaves.
How Blurring is performed?
   Mathematically blurring is defined as convolution of
    Gaussian operator and image.




    where G= Gaussian Blur operator
 L is a blurred image
 G is the Gaussian Blur operator
 I is an image
 x, y are the location coordinates
 σ is the “scale” parameter. The amount of
  blur. Greater the value, greater the blur.
 The * is the convolution operation in x and y.
  It applies Gaussian blur G onto the image I
2. Difference of Gaussian(DoG)
 LoG are obtained by taking second order
  derivative.
 DoG images are equivalent to Laplacian of
  Gaussian image. Moreover DoG are scale
  invariant.
 In other word when we do difference of
  gaussian images, it is multiplied with σ2
  which is present in gaussian blur operator G.
3. Finding Keypoint
   Finding keypoint is a two step process:
    1. Locate maxima/minima in DoG images
    2. Find subpixel maxima/minima
Locate maxima/minima

 In the image X is current pixel, while green
  circles are its neighbors, X is marked as
  Keypoint if it is greatest or east of all 26
  neighboring pixels.
 First and last scale are not checked for
  keypoints as there are not enough neighbors
  to compare.
Find subpixel maxima/minima

 Sub-pixel value are generated using Taylor
  expansion of image around the keypoint found.
 The extreme points of this equation can be found
  by differentiating and equating to zero. On
  solving, we’ll get subpixel key point locations.
  These subpixel values increase chances of
  matching and stability of the algorithm.
4. Eliminating bad keypoints
1.       Removing Low Contrast features
      If magnitude of intensity at current pixel is less
         than certain value then it is rejected.
2.       Removing edges
         For poorly defined peaks in the DoG
          function, the principal curvature across the edge
          would be much larger than the principal
          curvature along it
         To determine edges Hessian matrix is used.
Tr (H) = Dxx + Dyy
Det(H) = DxxDyy - (Dxy )2



   If the value of R is greater for a candidate
    keypoint, then that keypoint is poorly localized and
    hence rejected.
5. Assigning Orientation
 Gradient direction and magnitude around
  keypoints are collected, and prominent
  orientations are assigned to keypoints.
 Calculations are done relative to this
  orientation, hence it ensure rotation
  invariance.
   The magnitude and orientation is calculated for
    all pixels around the keypoint.
    Then, A histogram is created for this.




   So, orientation can split up one keypoint into
    multiple keypoints
6. Generating SIFT Features
  Creating fingerprint for each keypoint, so that
   we can distinguish between different keypoints.
  A 16 x 16 window is taken around
   keypoint, and it is divided into 16 4 x 4
   windows.
Generating SIFT Features
   Within each 4×4 window, gradient magnitudes
    and orientations are calculated. These
    orientations are put into an 8
    bin histogram, depending on gradient directions.
Generating SIFT Features
 The value added to bin also depend upon distance
  from keypoint ,so gradients which are far are less in
  magnitude.
 This is achieved by using Gaussian weighting
  function.
   This has to be repeated for all 16 4x4 regions so
    we will get total 16x8=128 numbers. These 128
    numbers are normalized and resultant 128 numbers
    form feature vector which determine a keypoint
    uniquely.
Problem associated with feature vector
1. Rotation Dependence
   If we rotate the image all the gradient orientation will
    get change. So to avoid this keypoint’s rotation is
    subtracted from each gradient orientation. Hence
    each gradient orientation is relative to keypoint’s
    orientation.
 2. Illumination Dependence
   If we threshold numbers that are big, we can achieve
    illumination independence. So, any number (of the
    128) greater than 0.2 is changed to 0.2. This resultant
    feature vector is normalized again. And now we have
    an illumination independent feature vector.
Application
   Application of SIFT include object
    recognition, gesture recognition, image
    stitching, 3D modeling.
Object recognition
Image
Stitching
References
   http://www.aishack.in/2010/05/sift-scale-invariant-
    feature-transform
   http://en.wikipedia.org/wiki/Scale-invariant feature
    transform
   yumeng-SIFTreport-5.18_bpt.pdf
   Paper on SIFT by Harri Auvinen, Tapio
    Lepp¨alampi, Joni Taipale and Maria Teplykh.
   David G. Lowe, Distinctive Image Features from
    Scale-Invariant Keypoints, International Journal of
    Computer Vision, 2004

More Related Content

What's hot

Morphological image processing
Morphological image processingMorphological image processing
Morphological image processingVinayak Narayanan
 
Smoothing in Digital Image Processing
Smoothing in Digital Image ProcessingSmoothing in Digital Image Processing
Smoothing in Digital Image ProcessingPallavi Agarwal
 
SIFT vs other Feature Descriptor
SIFT vs other Feature DescriptorSIFT vs other Feature Descriptor
SIFT vs other Feature DescriptorNisar Ahmed Rana
 
Feature Matching using SIFT algorithm
Feature Matching using SIFT algorithmFeature Matching using SIFT algorithm
Feature Matching using SIFT algorithmSajid Pareeth
 
Convolutional Neural Network and Its Applications
Convolutional Neural Network and Its ApplicationsConvolutional Neural Network and Its Applications
Convolutional Neural Network and Its ApplicationsKasun Chinthaka Piyarathna
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and SegmentationA B Shinde
 
Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)Gaurav Mittal
 
SURF - Speeded Up Robust Features
SURF - Speeded Up Robust FeaturesSURF - Speeded Up Robust Features
SURF - Speeded Up Robust FeaturesMarta Lopes
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
Feature detection and matching
Feature detection and matchingFeature detection and matching
Feature detection and matchingKuppusamy P
 
ImageProcessing10-Segmentation(Thresholding) (1).ppt
ImageProcessing10-Segmentation(Thresholding) (1).pptImageProcessing10-Segmentation(Thresholding) (1).ppt
ImageProcessing10-Segmentation(Thresholding) (1).pptVikramBarapatre2
 
From Image Processing To Computer Vision
From Image Processing To Computer VisionFrom Image Processing To Computer Vision
From Image Processing To Computer VisionJoud Khattab
 
Image Restoration And Reconstruction
Image Restoration And ReconstructionImage Restoration And Reconstruction
Image Restoration And ReconstructionAmnaakhaan
 

What's hot (20)

Morphological image processing
Morphological image processingMorphological image processing
Morphological image processing
 
Hit and-miss transform
Hit and-miss transformHit and-miss transform
Hit and-miss transform
 
Smoothing in Digital Image Processing
Smoothing in Digital Image ProcessingSmoothing in Digital Image Processing
Smoothing in Digital Image Processing
 
SIFT vs other Feature Descriptor
SIFT vs other Feature DescriptorSIFT vs other Feature Descriptor
SIFT vs other Feature Descriptor
 
Edge detection
Edge detectionEdge detection
Edge detection
 
Unit3 dip
Unit3 dipUnit3 dip
Unit3 dip
 
Feature Matching using SIFT algorithm
Feature Matching using SIFT algorithmFeature Matching using SIFT algorithm
Feature Matching using SIFT algorithm
 
Convolutional Neural Network and Its Applications
Convolutional Neural Network and Its ApplicationsConvolutional Neural Network and Its Applications
Convolutional Neural Network and Its Applications
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)
 
Spatial domain and filtering
Spatial domain and filteringSpatial domain and filtering
Spatial domain and filtering
 
SURF - Speeded Up Robust Features
SURF - Speeded Up Robust FeaturesSURF - Speeded Up Robust Features
SURF - Speeded Up Robust Features
 
DIP - Image Restoration
DIP - Image RestorationDIP - Image Restoration
DIP - Image Restoration
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Feature detection and matching
Feature detection and matchingFeature detection and matching
Feature detection and matching
 
ImageProcessing10-Segmentation(Thresholding) (1).ppt
ImageProcessing10-Segmentation(Thresholding) (1).pptImageProcessing10-Segmentation(Thresholding) (1).ppt
ImageProcessing10-Segmentation(Thresholding) (1).ppt
 
From Image Processing To Computer Vision
From Image Processing To Computer VisionFrom Image Processing To Computer Vision
From Image Processing To Computer Vision
 
Sharpening spatial filters
Sharpening spatial filtersSharpening spatial filters
Sharpening spatial filters
 
Image Restoration And Reconstruction
Image Restoration And ReconstructionImage Restoration And Reconstruction
Image Restoration And Reconstruction
 

Viewers also liked

Scale Invariant feature transform
Scale Invariant feature transformScale Invariant feature transform
Scale Invariant feature transformShanker Naik
 
SIFT Algorithm Introduction
SIFT Algorithm IntroductionSIFT Algorithm Introduction
SIFT Algorithm IntroductionTruong LD
 
Scale Invariant Feature Tranform
Scale Invariant Feature TranformScale Invariant Feature Tranform
Scale Invariant Feature TranformShanker Naik
 
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)npinto
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBPMarwan H. Noman
 
An improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognitionAn improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognitioneSAT Journals
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition TechniquesDaksh Verma
 
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud ComputingTowards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud ComputingSi Chen
 
Fuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge DetectionFuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge DetectionDawn Raider Gupta
 
Tính toán khoa học - Chương 7: Các phương pháp cực tiểu hóa không ràng buộc
Tính toán khoa học - Chương 7: Các phương pháp cực tiểu hóa không ràng buộcTính toán khoa học - Chương 7: Các phương pháp cực tiểu hóa không ràng buộc
Tính toán khoa học - Chương 7: Các phương pháp cực tiểu hóa không ràng buộcChien Dang
 
Modern features-part-2-descriptors
Modern features-part-2-descriptorsModern features-part-2-descriptors
Modern features-part-2-descriptorszukun
 
Contextless Object Recognition with Shape-enriched SIFT and Bags of Features
Contextless Object Recognition with Shape-enriched SIFT and Bags of FeaturesContextless Object Recognition with Shape-enriched SIFT and Bags of Features
Contextless Object Recognition with Shape-enriched SIFT and Bags of FeaturesUniversitat Politècnica de Catalunya
 

Viewers also liked (20)

Scale Invariant feature transform
Scale Invariant feature transformScale Invariant feature transform
Scale Invariant feature transform
 
SIFT Algorithm Introduction
SIFT Algorithm IntroductionSIFT Algorithm Introduction
SIFT Algorithm Introduction
 
Scale Invariant Feature Tranform
Scale Invariant Feature TranformScale Invariant Feature Tranform
Scale Invariant Feature Tranform
 
Scale invariant feature transform
Scale invariant feature transformScale invariant feature transform
Scale invariant feature transform
 
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
 
Local binary pattern
Local binary patternLocal binary pattern
Local binary pattern
 
Feature Extraction
Feature ExtractionFeature Extraction
Feature Extraction
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 
An improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognitionAn improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognition
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 
Edge detection-LOG
Edge detection-LOGEdge detection-LOG
Edge detection-LOG
 
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud ComputingTowards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
 
Preprocessing
PreprocessingPreprocessing
Preprocessing
 
Fuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge DetectionFuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge Detection
 
Dsip and its biometrics appln
Dsip and its biometrics applnDsip and its biometrics appln
Dsip and its biometrics appln
 
Tính toán khoa học - Chương 7: Các phương pháp cực tiểu hóa không ràng buộc
Tính toán khoa học - Chương 7: Các phương pháp cực tiểu hóa không ràng buộcTính toán khoa học - Chương 7: Các phương pháp cực tiểu hóa không ràng buộc
Tính toán khoa học - Chương 7: Các phương pháp cực tiểu hóa không ràng buộc
 
Modern features-part-2-descriptors
Modern features-part-2-descriptorsModern features-part-2-descriptors
Modern features-part-2-descriptors
 
Lec04 gpu architecture
Lec04 gpu architectureLec04 gpu architecture
Lec04 gpu architecture
 
Contextless Object Recognition with Shape-enriched SIFT and Bags of Features
Contextless Object Recognition with Shape-enriched SIFT and Bags of FeaturesContextless Object Recognition with Shape-enriched SIFT and Bags of Features
Contextless Object Recognition with Shape-enriched SIFT and Bags of Features
 
Face recognition
Face recognitionFace recognition
Face recognition
 

Similar to SIFT

Sift detector boosted by adaptive contrast threshold to improve matching robu...
Sift detector boosted by adaptive contrast threshold to improve matching robu...Sift detector boosted by adaptive contrast threshold to improve matching robu...
Sift detector boosted by adaptive contrast threshold to improve matching robu...Venkat Projects
 
Sift detector boosted by adaptive contrast threshold to improve matching robu...
Sift detector boosted by adaptive contrast threshold to improve matching robu...Sift detector boosted by adaptive contrast threshold to improve matching robu...
Sift detector boosted by adaptive contrast threshold to improve matching robu...Venkat Projects
 
Literature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based WatermarkingLiterature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based WatermarkingPriyatham Bollimpalli
 
06 image features
06 image features06 image features
06 image featuresankit_ppt
 
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...Kunal Kishor Nirala
 
Intelligent Auto Horn System Using Artificial Intelligence
Intelligent Auto Horn System Using Artificial IntelligenceIntelligent Auto Horn System Using Artificial Intelligence
Intelligent Auto Horn System Using Artificial IntelligenceIRJET Journal
 
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE sipij
 
image segmentation by ppres.pptx
image segmentation by ppres.pptximage segmentation by ppres.pptx
image segmentation by ppres.pptxmohan134666
 
GEOMETRIC TAMPERING ESTIMATION BY MEANS OF A SIFT-BASED FORENSIC ANALYSIS
GEOMETRIC TAMPERING ESTIMATION  BY MEANS OF A SIFT-BASED FORENSIC ANALYSISGEOMETRIC TAMPERING ESTIMATION  BY MEANS OF A SIFT-BASED FORENSIC ANALYSIS
GEOMETRIC TAMPERING ESTIMATION BY MEANS OF A SIFT-BASED FORENSIC ANALYSISICL - Image Communication Laboratory
 
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFTImproved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFTNooria Sukmaningtyas
 
Practical Digital Image Processing 3
 Practical Digital Image Processing 3 Practical Digital Image Processing 3
Practical Digital Image Processing 3Aly Abdelkareem
 
11 cie552 image_featuresii_sift
11 cie552 image_featuresii_sift11 cie552 image_featuresii_sift
11 cie552 image_featuresii_siftElsayed Hemayed
 
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge DetectionEdge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detectioncihantopal2
 
Estrazione automatica delle linee in un'immagine digitale
Estrazione automatica delle linee in un'immagine digitaleEstrazione automatica delle linee in un'immagine digitale
Estrazione automatica delle linee in un'immagine digitalefrancescapadoin
 
Practical Digital Image Processing 4
Practical Digital Image Processing 4Practical Digital Image Processing 4
Practical Digital Image Processing 4Aly Abdelkareem
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2Aly Abdelkareem
 
Lec07 corner blob
Lec07 corner blobLec07 corner blob
Lec07 corner blobBaliThorat1
 

Similar to SIFT (20)

Sift detector boosted by adaptive contrast threshold to improve matching robu...
Sift detector boosted by adaptive contrast threshold to improve matching robu...Sift detector boosted by adaptive contrast threshold to improve matching robu...
Sift detector boosted by adaptive contrast threshold to improve matching robu...
 
Sift detector boosted by adaptive contrast threshold to improve matching robu...
Sift detector boosted by adaptive contrast threshold to improve matching robu...Sift detector boosted by adaptive contrast threshold to improve matching robu...
Sift detector boosted by adaptive contrast threshold to improve matching robu...
 
Literature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based WatermarkingLiterature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based Watermarking
 
CV PPT.pptx
CV PPT.pptxCV PPT.pptx
CV PPT.pptx
 
Ijcatr04041016
Ijcatr04041016Ijcatr04041016
Ijcatr04041016
 
06 image features
06 image features06 image features
06 image features
 
SIFT.ppt
SIFT.pptSIFT.ppt
SIFT.ppt
 
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...
 
Intelligent Auto Horn System Using Artificial Intelligence
Intelligent Auto Horn System Using Artificial IntelligenceIntelligent Auto Horn System Using Artificial Intelligence
Intelligent Auto Horn System Using Artificial Intelligence
 
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
 
image segmentation by ppres.pptx
image segmentation by ppres.pptximage segmentation by ppres.pptx
image segmentation by ppres.pptx
 
GEOMETRIC TAMPERING ESTIMATION BY MEANS OF A SIFT-BASED FORENSIC ANALYSIS
GEOMETRIC TAMPERING ESTIMATION  BY MEANS OF A SIFT-BASED FORENSIC ANALYSISGEOMETRIC TAMPERING ESTIMATION  BY MEANS OF A SIFT-BASED FORENSIC ANALYSIS
GEOMETRIC TAMPERING ESTIMATION BY MEANS OF A SIFT-BASED FORENSIC ANALYSIS
 
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFTImproved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
 
Practical Digital Image Processing 3
 Practical Digital Image Processing 3 Practical Digital Image Processing 3
Practical Digital Image Processing 3
 
11 cie552 image_featuresii_sift
11 cie552 image_featuresii_sift11 cie552 image_featuresii_sift
11 cie552 image_featuresii_sift
 
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge DetectionEdge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
 
Estrazione automatica delle linee in un'immagine digitale
Estrazione automatica delle linee in un'immagine digitaleEstrazione automatica delle linee in un'immagine digitale
Estrazione automatica delle linee in un'immagine digitale
 
Practical Digital Image Processing 4
Practical Digital Image Processing 4Practical Digital Image Processing 4
Practical Digital Image Processing 4
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2
 
Lec07 corner blob
Lec07 corner blobLec07 corner blob
Lec07 corner blob
 

Recently uploaded

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 

Recently uploaded (20)

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 

SIFT

  • 1.
  • 2. Outline  Introduction to SIFT  Overview of Algorithm  Construction of Scale space  DoG (Difference of Gaussian Images)  Finding Keypoint  Getting Rid of Bad Keypoint  Assigning an orientation to keypoints  Generate SIFT features
  • 3. Introduction to SIFT  Scale-invariant feature transform (or SIFT) is an algorithm in computer vision to detect and describe local features in images.  This algorithm was published by David Lowe.
  • 4. Types of invariance  Illumination
  • 5. Types of invariance  Illumination  Scale
  • 6. Types of invariance  Illumination  Scale  Rotation
  • 7. Types of invariance  Illumination  Scale  Rotation  Full perspective
  • 9. 1. Constructing Scale space  In scale Space we take the image and generate progressively blurred out images, then resize the original image to half and generate blurred images.  Images that are of same size but different scale are called octaves.
  • 10. How Blurring is performed?  Mathematically blurring is defined as convolution of Gaussian operator and image. where G= Gaussian Blur operator
  • 11.  L is a blurred image  G is the Gaussian Blur operator  I is an image  x, y are the location coordinates  σ is the “scale” parameter. The amount of blur. Greater the value, greater the blur.  The * is the convolution operation in x and y. It applies Gaussian blur G onto the image I
  • 12. 2. Difference of Gaussian(DoG)
  • 13.  LoG are obtained by taking second order derivative.  DoG images are equivalent to Laplacian of Gaussian image. Moreover DoG are scale invariant.  In other word when we do difference of gaussian images, it is multiplied with σ2 which is present in gaussian blur operator G.
  • 14. 3. Finding Keypoint  Finding keypoint is a two step process: 1. Locate maxima/minima in DoG images 2. Find subpixel maxima/minima
  • 15. Locate maxima/minima  In the image X is current pixel, while green circles are its neighbors, X is marked as Keypoint if it is greatest or east of all 26 neighboring pixels.  First and last scale are not checked for keypoints as there are not enough neighbors to compare.
  • 16. Find subpixel maxima/minima  Sub-pixel value are generated using Taylor expansion of image around the keypoint found.  The extreme points of this equation can be found by differentiating and equating to zero. On solving, we’ll get subpixel key point locations. These subpixel values increase chances of matching and stability of the algorithm.
  • 17. 4. Eliminating bad keypoints 1. Removing Low Contrast features  If magnitude of intensity at current pixel is less than certain value then it is rejected. 2. Removing edges  For poorly defined peaks in the DoG function, the principal curvature across the edge would be much larger than the principal curvature along it  To determine edges Hessian matrix is used.
  • 18. Tr (H) = Dxx + Dyy Det(H) = DxxDyy - (Dxy )2  If the value of R is greater for a candidate keypoint, then that keypoint is poorly localized and hence rejected.
  • 19. 5. Assigning Orientation  Gradient direction and magnitude around keypoints are collected, and prominent orientations are assigned to keypoints.  Calculations are done relative to this orientation, hence it ensure rotation invariance.
  • 20. The magnitude and orientation is calculated for all pixels around the keypoint. Then, A histogram is created for this.  So, orientation can split up one keypoint into multiple keypoints
  • 21. 6. Generating SIFT Features  Creating fingerprint for each keypoint, so that we can distinguish between different keypoints.  A 16 x 16 window is taken around keypoint, and it is divided into 16 4 x 4 windows.
  • 22. Generating SIFT Features  Within each 4×4 window, gradient magnitudes and orientations are calculated. These orientations are put into an 8 bin histogram, depending on gradient directions.
  • 23. Generating SIFT Features  The value added to bin also depend upon distance from keypoint ,so gradients which are far are less in magnitude.  This is achieved by using Gaussian weighting function.
  • 24.
  • 25. This has to be repeated for all 16 4x4 regions so we will get total 16x8=128 numbers. These 128 numbers are normalized and resultant 128 numbers form feature vector which determine a keypoint uniquely.
  • 26. Problem associated with feature vector 1. Rotation Dependence  If we rotate the image all the gradient orientation will get change. So to avoid this keypoint’s rotation is subtracted from each gradient orientation. Hence each gradient orientation is relative to keypoint’s orientation. 2. Illumination Dependence  If we threshold numbers that are big, we can achieve illumination independence. So, any number (of the 128) greater than 0.2 is changed to 0.2. This resultant feature vector is normalized again. And now we have an illumination independent feature vector.
  • 27. Application  Application of SIFT include object recognition, gesture recognition, image stitching, 3D modeling.
  • 30. References  http://www.aishack.in/2010/05/sift-scale-invariant- feature-transform  http://en.wikipedia.org/wiki/Scale-invariant feature transform  yumeng-SIFTreport-5.18_bpt.pdf  Paper on SIFT by Harri Auvinen, Tapio Lepp¨alampi, Joni Taipale and Maria Teplykh.  David G. Lowe, Distinctive Image Features from Scale-Invariant Keypoints, International Journal of Computer Vision, 2004