SlideShare a Scribd company logo
1 of 5
Download to read offline
Poster Paper
Proc. of Int. Conf. on Control, Communication and Power Engineering 2013

NMS and Thresholding Architecture used for FPGA
based Canny Edge Detector for Area Optimization
1,
1,

Chandrashekar N.S.,2, Dr. K.R. Nataraj

Department of ECE, Don Bosco Institute of Technology, Bangalore,Karnataka, India.
chandrashekarns@rediffmail.com
2,
Department of ECE, SJB Institute of Technology, Bangalore, Karnataka, India.
Nataraj.sjbit@gmail.com

Abstract—— In this paper, an architecture designed for NonMaximal Suppression used in Canny edge detection algorithm
is presented in order to reduce memory requirements
significantly. The architecture also achieves decreased latency
and increased throughput with no loss in edge detection. The
new algorithm used has a low-complexity 8-bin non-uniform
gradient magnitude histogram to compute block-based
hysteresis thresholds that are used by the Canny edge detector.
Furthermore, the hardware architecture of the proposed
algorithm is presented in this paper and the architecture is
synthesized on the Xilinx Virtex 5 FPGA. The design
development is done in VHDL and simulated results are
obtained using modelsim 6.3 with Xilinx 12.2.
Keywords — Canny Edge Detector, Distributed Processing,
Non-uniform Quantization, FPGA.

I. INTRODUCTION
The analysis of image processing is simplified by the edge
detection process, by means of reducing the amount of data
to be processed, while preserving useful structural
information about object at the same time. There is certainly
a great deal of diversity in the applications of edge detection,
but it is felt that many applications share a common set of
requirements [1]. The Canny edge detector is used in many
real-world applications due to its ability to extract significant
edges with good detection and good localization performance.
Unfortunately, the canny edge detection algorithm contains
extensive pre-processing and post-processing steps and is
more computationally complex than other edge detection
algorithms, such as Roberts, Prewitt and Sobel algorithms
[2].
In [1, 8], a recursively implementable edge detection
algorithm is suggested and optimized, using retiming
techniques. But its performance is quite poor in images with
low SNRs. The approach of [5, 6] combines the derivative
and smoothening operations of the Canny algorithm into a
single mask to reduce computations. The pipelined
implementation is a block-based approach with a block-size
of 2 rows of pixels. It overcomes the dependencies between
the blocks by fixing high and low thresholds to a constant
value. In both of these approaches gradient thresholds are
not adapted to the image characteristics, and their
performance is not guaranteed for blurred images and images
with low SNRs [3]. In [4] Canny edge detector a parallel
architecture of simultaneous 4-pixel calculation is proposed,
which increases the throughput of the design without
80
© 2013 ACEEE
DOI: 03.LSCS.2013.2.26

increasing the need for on-chip cache memories. This design
has been synthesized for low-end and high-end Xilinx FPGA.
However, in [3] the hysteresis thresholds calculation is based
on a very finely and uniformly quantized 64-bin gradient
magnitude histogram, which is computationally expensive
and, thereby, hinders the real-time implementation. In this
paper, a method based on non-uniform and coarse
quantization of the gradient magnitude histogram is proposed.
In addition, the proposed algorithm is mapped onto
reconfigurable hardware architecture. This architecture
exploits the parallelism and pipelining of the proposed
algorithm, and therefore, yields significant speedup in running
times. In [7], GPU was used due to its powerful ability of
parallel processing while a new Canny operator is proposed
with the introduction of parallel breakpoints detection and
edge tracing without recursive operations.
In [9], an improvised approach is done for image edge
detection and its efficiency with a set of images. Results
confirm that the DOW-canny edge detector, besides being
insensitive to noise, is able to fabricate superior and accurate
edges in regions of fine graining, geometrical figures and
alpha-numerics as compared to the current edge detection
techniques. The detector is also able to handle noisy as well
as noiseless images.
This paper is organized as follows: Section 2 gives a Brief
analysis of the Canny edge detector algorithm. Section 3
presents the proposed Canny edge detection algorithm which
includes a novel method for the hysteresis thresholds
computation based on a non-uniform quantized gradient
magnitude histogram. Simulation results are presented in
Section 4. A conclusion is given in Section 5.
II. CANNY ALGORITHM ANALYSIS
The block diagram of the Canny algorithm is demonstrated
in Fig. 1. The Canny algorithm first smoothens the image to
eliminate noise by using a smoothing filter such as the
Gaussian Convolution. The Gaussian smoothing was
performed using a mask (matrix) which was sled over the
image, manipulating a square of pixels at a time. The bigger
the dimensions of the mask, lower was the sensitivity the
detector had to noise. A mask was a common choice for the
size of a Gaussian filter. The output smoothed image was
denoted as I (x, y).
After smoothing the next step was the calculation of
gradient of the image. The gradient calculation lead to the
Poster Paper
Proc. of Int. Conf. on Control, Communication and Power Engineering 2013
detection of the possible edge strength and direction. This
was executed by another convolution with a gradient
operator. The most commonly used gradient operators are
the Prewitt and the Sobel operators. Both operators perform
a 2-D spatial gradient measurement on an image. Calculating
the horizontal gradient Gx(x, y) and vertical gradient Gy(x, y)
at each pixel location by convolving the image I(x, y) with
partial derivatives of a 2D Gaussian function. Computing the
gradient magnitude G(x, y) and direction θ(x, y) at each pixel
location. Gradient magnitude and orientation are given by
the following equations:

any pixels that were connected to this edge pixel and having
a value greater than T2 were also selected as edge pixels. If
an edge was to be followed, a gradient of T2 is needed to
start but it doesn’t stop till a gradient below T1 [1] is hit.
III. IMPLEMENTATION OF THE PROPOSED CANNY EDGE DETECTOR
In this section, the hardware implementation of proposed
canny edge detection algorithm on the Xilinx FPGA is
described. The proposed architecture consists of the
following 5 units:
 Smoothening unit using Gaussian filter.
 Vertical and horizontal gradient Magnitude
calculation unit.
 Directional non-maximum suppression unit.
 High and low threshold Calculation unit.
 Thresholding with hysteresis unit.

(1)
θ = arctan (Gy/Gx)
(2)
Arctan and the division can be eliminated by simply comparing
Gx and Gy values, if they are of similar length, a diagonal
direction is obtained, if one is at least 2.5 times longer than
the other, a horizontal or vertical direction is obtained.

A. Image Smoothening:
The input image was smoothened using a 3×3 Gaussian
mask. The Gaussian filter is separable and, thus, the
implementation of the 2-D convolution with the 3×3 Gaussian
mask was achieved using row and column 1- D convolutions.
B. Gradients and Gradient Magnitude Calculation:
Calculation of the vertical and horizontal gradients using
convolution kernels was done in this stage. The kernels vary
in size from 3 × 3 to 9 × 9, depending on the sharpness of the
image. The whole design was pipelined, and thus the output
was generated at every clock cycle. This was an input to the
magnitude calculation unit which computes, at each pixel
location, the gradient magnitude from the pixel’s horizontal
and vertical gradients.
C. Directional Non Maximum Suppression:
The non-maxima elimination filter is used to eliminate
pixels that are not part of a continuous line. In other the
pixels which are having high gradient magnitude but they are
not a part of a continuous line can be easily eliminated using
this filter. General concept used for the elimination of the
unwanted pixel is as follows. A simple 3x3 window for the
given image was considered and the value of the center pixel
in comparison with the adjacent pixel in the given window
that are perpendicular to the center pixel was checked. When
the comparison was found to be too high, that is if the center
pixel value was too high as compared to the adjacent pixel,
the center pixel was eliminated and replaced with the earlier
pixel value. Fig. 2 given below shows the basic 3x3 window
and the pixel considered for the comparison. In Fig. 3, the
architecture of the directional non-maximum suppression is
shown. In order to access all the pixels’ gradient magnitudes
in the 3× 3 window at the same time, two FIFO buffers were
employed. The horizontal gradient Gx and the vertical gradient
Gy controlled the selector which delivers the gradient
magnitude (marked as M(x, y) in Fig. 3) of neighbors along
the direction of the gradient, into the arithmetic unit. This
arithmetic unit consisted of one divider, two multipliers and
one adder, which were implemented using the Xilinx Math

Figure 1. Block diagram of the Canny edge detection algorithm

After the edge directions were known, non-maximum
suppression was applied. Non-maximum suppression is used
to trace pixels along the gradient in the edge direction and
compare their values perpendicular to the gradient. Two
perpendicular pixel values were compared with the value in
the edge direction. If their value was lower than the pixel on
the edge then they were suppressed i.e., their pixel value was
changed to 0, else the higher pixel value was set as the edge
and the other two suppressed with a pixel value of 0. Finally,
hysteresis was used as a means of eliminating streaking.
Streaking is the breaking up of an edge contour caused by
the operator output fluctuating above and below the
threshold. If a single threshold, T1 is applied to an image,
and an edge has an average strength equal to T1, then due to
noise, there will be instances where the edge dips below the
threshold. Equally it will also extend above the threshold
making an edge look like a dashed line. To avoid this,
hysteresis uses 2 thresholds, a high and a low. Any pixel in
the image that has a value greater than T1 is presumed to be
an edge pixel, and was marked as such immediately. Then,
© 2013 ACEEE
DOI: 03.LSCS.2013.2.26

81
Poster Paper
Proc. of Int. Conf. on Control, Communication and Power Engineering 2013
Functions IP cores. The output of the arithmetic unit was
compared with the gradient magnitude of the center pixel,
and the pixel that had no local maximum gradient magnitude
was eliminated.

Figure 2. 3x3 window for non-maximum suppression unit

Figure 4. Pipelined architecture of the Thresholding Unit

detection system. The implementation was achieved with
the device FPGA Virtex 5 XC5VTX240T and Package FF1759.
Design utilization summary obtained for Non-Maximum Suppression Unit is given in Fig.5(a) and RTL top module schematic and simulation results of Non- Maximum Suppression
Unit is shown in Fig. 5(b) and 5(c) respectively.
Logic Utilization

Used

Number of Slice Registers

11443

149760

7%

Numbers of Slice LUTs

26223

149760

17%

3440

34226

10%

23

680

3%

3

32

9%

Number of fully used LUTFF pairs
Number of bonded IOBs
Figure 3. Directional Non Maximum Suppression Unit Architecture

Number of
BUFG/BUFGCTRLs

D. Calculation of the hysteresis thresholds:
Since the low and high thresholds were calculated based
on the gradient histogram, the histogram of the image was
computed after it had undergone directional non-maximum
suppression. As discussed in Section 2, an 8-step nonuniform quantizer was employed to obtain the discrete
histogram for each processed block. The block-based
hysteresis thresholds (high threshold ThH and low threshold
ThL) were computed.

Utilization

Figure 5 (a). Design Summary of Non-Maximum Suppression Unit

E. Thresholding with hysteresis:
Since, the output of the non maximum suppression unit
contains some spurious edges, the method of thresholding
with hysteresis was used. Two thresholds, high threshold
ThH and low threshold ThL, which were obtained from the
threshold calculation unit, were employed. Let f(x, y) be the
image obtained from the non maximum suppression stage,
f1(x, y) be the strong edge image and f2(x, y) be the weak
edge image. Fig. 4 illustrates the pipelined design of this
stage.

Figure 5 (b). RTL Top module Schematic of Non-Maximum
Suppression Unit

Design utilization summary obtained for Thresholding
Unit is given in Fig. 6(a) and RTL top module schematic and
simulation results of Thresholding Unit is shown in Fig. 6 (b)
and Fig. 6 (c) respectively.

IV. SIMULATION RESULTS AND ANALYSIS
Implementation was done for Non-Maximum Suppression
Unit and Thresholding Unit that had resulted in Canny edge
© 2013 ACEEE
DOI: 03.LSCS.2013.2.26

Available

82
Poster Paper
Proc. of Int. Conf. on Control, Communication and Power Engineering 2013

Figure 6 (c). Simulation Results of Thresholding Unit
Figure 5 (c). Simulation Results of Non-Maximum Suppression Unit
Logic Utilization

Used

Available

TABLE: I. N ON-MAXIMUM SUPPRESSION UNIT

Utilization

Number of Slice Registers

193

149760

0%

Numbers of Slice LUTs

271

149760

0%

Number of fully used LUT-FF
pairs
Number of bonded IOBs

163

301

54%

30

680

4%

2

32

Non-Maximum Suppression
Unit

6%

Number of BUFG/BUFGCTRLs

Slice
Logic
Utilization
Number
of Slice
Registers
Number
of Slice
LUTs:
Number
of fully
used
LUT-FF
pairs
Number
of bonded
IOBs
umber of
BUFG/B
UF
GCTRLs

Figure 6 (a). Design Summary of Thresholding Unit

Latency
Total time
period

AND

THRESHOLDING UNIT

Thresholding Unit

Used

Availab
le

Utilizati
on

Use
d

Availa
ble

Utilizati
on

11443

149760

7%

193

149760

0%

26223

149760

17%

271

149760

0%

3440

34226

10%

163

34226

54%

23

680

3%

30

680

4%

3

32

9%

2

32

6%

0.001051ms

0.001051ms

3.9332ms

3.9332ms

Summary of Non-Maximum Suppression Unit and
Thresholding Unit as shown in Table I below.

reduction in memory, decrease in latency and increase in
throughput with no loss in edge detection. As a result, it was
found that the computational cost of the proposed algorithm
is very low compared to the original Canny edge detection
algorithm. The algorithm was mapped onto a Xilinx Virtex-5
FPGA platform and tested using ModelSim. It was observed
that this was capable of supporting fast real-time edge
detection for images and videos with various spatial and
temporal resolutions including full-HD content.

IV. CONCLUSION

REFERENCES

A novel non-uniform quantized histogram calculation
method was proposed in the present work, in order to reduce
the computational cost of the hysteresis threshold selection
for the edge detection. An architecture for Non-maximal
Suppression used in Canny edge detection algorithm was
also designed that gave significant result with respect to

[1] L. Torres, M. Robert, E. Bourennane, and M. Paindavoine,
“Implementation of a recursive real time edge detector using
retiming techniques,” VLSI, pp. 811 –816, Aug. 1995.
[2] Qian Xu, Chaitali Chakrabarti and Lina J. Karam,”A Distributed
Canny Edge Detector and Its Implementation On FPGA”,
Arizona State University, Tempe, AZ 2011.

Figure 6 (b). RTL Top module Schematic of Thresholding Unit

© 2013 ACEEE
DOI: 03.LSCS.2013.2.26

83
Poster Paper
Proc. of Int. Conf. on Control, Communication and Power Engineering 2013
[3] S. Varadarajan, C. Chakrabarti, L. J. Karam, and J. M.Bauza,
“A distributed psycho-visually motivated Canny edge
detector,” IEEE ICASSP, pp. 822 –825, Mar. 2010.
[4] Christos Gentsos, Calliope-Louisa Sotiropoulou and Spiridon
Nikolaidi,”Real- Time Canny Edge Detection Parallel
Implementation for FPGAs”,499-502,ICECS,12-15 Dec. 2010.
[5] W. He and K. Yuan, “An improved Canny edge detector and its
realization on FPGA,” WCICA, pp. 6561 –6564, Jun. 2008.
[6] D. V. Rao and M. Venkatesan, “An efficient reconfigurable
architecture and implementation of edge detection algorithm
using Handle-C,” ITCC, vol. 2, pp. 843 – 847, Apr.2004.

© 2013 ACEEE
DOI: 03.LSCS.2013.2. 26

[7] Shengxiao Niu, Jingjing Yang, Sheng Wang, Gengsheng
Chen,”Improvement and Parallel Implementation of Canny
Edge Detection Algorithm Based on GPU”. ASIC (ASICON),
2011.
[8] J. Canny, “A computational approach to edge detection,”IEEE
Trans. PAMI, vol. 8, no. 6, pp. 679 –698, Nov. 1986.
[9] Anand Gupta, Ravi Kumar Dalal,Rahul Gupta,Pulkit Wadhwa
“DOW-Canny: An Improvised Version Of Canny Edge
Detector”. (ISPACS) December 7-9, 2011.

84

More Related Content

What's hot

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Image parts and segmentation
Image parts and segmentation Image parts and segmentation
Image parts and segmentation Rappy Saha
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...eSAT Publishing House
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationMostafa G. M. Mostafa
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital imagesRupesh Ambatwad
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsCSCJournals
 
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Habibur Rahman
 
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Pinaki Ranjan Sarkar
 
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithmPaper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithmMDABDULMANNANMONDAL
 
A CONCERT EVALUATION OF EXEMPLAR BASED IMAGE INPAINTING ALGORITHMS FOR NATURA...
A CONCERT EVALUATION OF EXEMPLAR BASED IMAGE INPAINTING ALGORITHMS FOR NATURA...A CONCERT EVALUATION OF EXEMPLAR BASED IMAGE INPAINTING ALGORITHMS FOR NATURA...
A CONCERT EVALUATION OF EXEMPLAR BASED IMAGE INPAINTING ALGORITHMS FOR NATURA...cscpconf
 
Image segmentation
Image segmentationImage segmentation
Image segmentationRania H
 
6. 7772 8117-1-pb
6. 7772 8117-1-pb6. 7772 8117-1-pb
6. 7772 8117-1-pbIAESIJEECS
 

What's hot (20)

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Watershed
WatershedWatershed
Watershed
 
Image parts and segmentation
Image parts and segmentation Image parts and segmentation
Image parts and segmentation
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital images
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped Windows
 
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
 
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
 
Segmentation Techniques -II
Segmentation Techniques -IISegmentation Techniques -II
Segmentation Techniques -II
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Segmentation
SegmentationSegmentation
Segmentation
 
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithmPaper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
 
44 paper
44 paper44 paper
44 paper
 
A CONCERT EVALUATION OF EXEMPLAR BASED IMAGE INPAINTING ALGORITHMS FOR NATURA...
A CONCERT EVALUATION OF EXEMPLAR BASED IMAGE INPAINTING ALGORITHMS FOR NATURA...A CONCERT EVALUATION OF EXEMPLAR BASED IMAGE INPAINTING ALGORITHMS FOR NATURA...
A CONCERT EVALUATION OF EXEMPLAR BASED IMAGE INPAINTING ALGORITHMS FOR NATURA...
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
H010315356
H010315356H010315356
H010315356
 
6. 7772 8117-1-pb
6. 7772 8117-1-pb6. 7772 8117-1-pb
6. 7772 8117-1-pb
 

Viewers also liked

Viewers also liked (9)

84 11-21
84 11-2184 11-21
84 11-21
 
Meth lab result 56ng of meth in mila's urine nms lab april 2010
Meth lab result 56ng of meth in mila's urine nms lab april 2010Meth lab result 56ng of meth in mila's urine nms lab april 2010
Meth lab result 56ng of meth in mila's urine nms lab april 2010
 
82 348-355
82 348-35582 348-355
82 348-355
 
80 152-157
80 152-15780 152-157
80 152-157
 
72 129-135
72 129-13572 129-135
72 129-135
 
71 338-347
71 338-34771 338-347
71 338-347
 
65 113-121
65 113-12165 113-121
65 113-121
 
69 122-128
69 122-12869 122-128
69 122-128
 
11 spinal reflexes sr2002 2013 al
11 spinal reflexes sr2002 2013 al11 spinal reflexes sr2002 2013 al
11 spinal reflexes sr2002 2013 al
 

Similar to NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for Area Optimization

Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...IJMER
 
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...IOSR Journals
 
Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507IJRAT
 
CenterForDomainSpecificComputing-Poster
CenterForDomainSpecificComputing-PosterCenterForDomainSpecificComputing-Poster
CenterForDomainSpecificComputing-PosterYunming Zhang
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGIRJET Journal
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...ijcisjournal
 
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING sipij
 
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
A NOBEL HYBRID APPROACH FOR EDGE  DETECTIONA NOBEL HYBRID APPROACH FOR EDGE  DETECTION
A NOBEL HYBRID APPROACH FOR EDGE DETECTIONijcses
 
Paper on image processing
Paper on image processingPaper on image processing
Paper on image processingSaloni Bhatia
 
Image segmentation methods for brain mri images
Image segmentation methods for brain mri imagesImage segmentation methods for brain mri images
Image segmentation methods for brain mri imageseSAT Journals
 
47549379 paper-on-image-processing
47549379 paper-on-image-processing47549379 paper-on-image-processing
47549379 paper-on-image-processingmaisali4
 
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...iosrjce
 
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...IJTET Journal
 
Evaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image ProcssingEvaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image Procssingidescitation
 
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...paperpublications3
 
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...IJERA Editor
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Editor IJARCET
 

Similar to NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for Area Optimization (20)

B0220609
B0220609B0220609
B0220609
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
 
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
 
Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507
 
CenterForDomainSpecificComputing-Poster
CenterForDomainSpecificComputing-PosterCenterForDomainSpecificComputing-Poster
CenterForDomainSpecificComputing-Poster
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
 
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
 
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
A NOBEL HYBRID APPROACH FOR EDGE  DETECTIONA NOBEL HYBRID APPROACH FOR EDGE  DETECTION
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
 
EDGE DETECTION
EDGE DETECTIONEDGE DETECTION
EDGE DETECTION
 
Paper on image processing
Paper on image processingPaper on image processing
Paper on image processing
 
Image segmentation methods for brain mri images
Image segmentation methods for brain mri imagesImage segmentation methods for brain mri images
Image segmentation methods for brain mri images
 
47549379 paper-on-image-processing
47549379 paper-on-image-processing47549379 paper-on-image-processing
47549379 paper-on-image-processing
 
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...
 
R01725115118
R01725115118R01725115118
R01725115118
 
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
 
Evaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image ProcssingEvaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image Procssing
 
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
 
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
 

More from idescitation (20)

74 136-143
74 136-14374 136-143
74 136-143
 
62 328-337
62 328-33762 328-337
62 328-337
 
46 102-112
46 102-11246 102-112
46 102-112
 
47 292-298
47 292-29847 292-298
47 292-298
 
49 299-305
49 299-30549 299-305
49 299-305
 
57 306-311
57 306-31157 306-311
57 306-311
 
60 312-318
60 312-31860 312-318
60 312-318
 
5 1-10
5 1-105 1-10
5 1-10
 
11 69-81
11 69-8111 69-81
11 69-81
 
14 284-291
14 284-29114 284-291
14 284-291
 
15 82-87
15 82-8715 82-87
15 82-87
 
29 88-96
29 88-9629 88-96
29 88-96
 
43 97-101
43 97-10143 97-101
43 97-101
 
106 419-424
106 419-424106 419-424
106 419-424
 
114 425-433
114 425-433114 425-433
114 425-433
 
501 183-191
501 183-191501 183-191
501 183-191
 
503 434-438
503 434-438503 434-438
503 434-438
 
525 192-198
525 192-198525 192-198
525 192-198
 
528 439-449
528 439-449528 439-449
528 439-449
 
529 199-206
529 199-206529 199-206
529 199-206
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for Area Optimization

  • 1. Poster Paper Proc. of Int. Conf. on Control, Communication and Power Engineering 2013 NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for Area Optimization 1, 1, Chandrashekar N.S.,2, Dr. K.R. Nataraj Department of ECE, Don Bosco Institute of Technology, Bangalore,Karnataka, India. chandrashekarns@rediffmail.com 2, Department of ECE, SJB Institute of Technology, Bangalore, Karnataka, India. Nataraj.sjbit@gmail.com Abstract—— In this paper, an architecture designed for NonMaximal Suppression used in Canny edge detection algorithm is presented in order to reduce memory requirements significantly. The architecture also achieves decreased latency and increased throughput with no loss in edge detection. The new algorithm used has a low-complexity 8-bin non-uniform gradient magnitude histogram to compute block-based hysteresis thresholds that are used by the Canny edge detector. Furthermore, the hardware architecture of the proposed algorithm is presented in this paper and the architecture is synthesized on the Xilinx Virtex 5 FPGA. The design development is done in VHDL and simulated results are obtained using modelsim 6.3 with Xilinx 12.2. Keywords — Canny Edge Detector, Distributed Processing, Non-uniform Quantization, FPGA. I. INTRODUCTION The analysis of image processing is simplified by the edge detection process, by means of reducing the amount of data to be processed, while preserving useful structural information about object at the same time. There is certainly a great deal of diversity in the applications of edge detection, but it is felt that many applications share a common set of requirements [1]. The Canny edge detector is used in many real-world applications due to its ability to extract significant edges with good detection and good localization performance. Unfortunately, the canny edge detection algorithm contains extensive pre-processing and post-processing steps and is more computationally complex than other edge detection algorithms, such as Roberts, Prewitt and Sobel algorithms [2]. In [1, 8], a recursively implementable edge detection algorithm is suggested and optimized, using retiming techniques. But its performance is quite poor in images with low SNRs. The approach of [5, 6] combines the derivative and smoothening operations of the Canny algorithm into a single mask to reduce computations. The pipelined implementation is a block-based approach with a block-size of 2 rows of pixels. It overcomes the dependencies between the blocks by fixing high and low thresholds to a constant value. In both of these approaches gradient thresholds are not adapted to the image characteristics, and their performance is not guaranteed for blurred images and images with low SNRs [3]. In [4] Canny edge detector a parallel architecture of simultaneous 4-pixel calculation is proposed, which increases the throughput of the design without 80 © 2013 ACEEE DOI: 03.LSCS.2013.2.26 increasing the need for on-chip cache memories. This design has been synthesized for low-end and high-end Xilinx FPGA. However, in [3] the hysteresis thresholds calculation is based on a very finely and uniformly quantized 64-bin gradient magnitude histogram, which is computationally expensive and, thereby, hinders the real-time implementation. In this paper, a method based on non-uniform and coarse quantization of the gradient magnitude histogram is proposed. In addition, the proposed algorithm is mapped onto reconfigurable hardware architecture. This architecture exploits the parallelism and pipelining of the proposed algorithm, and therefore, yields significant speedup in running times. In [7], GPU was used due to its powerful ability of parallel processing while a new Canny operator is proposed with the introduction of parallel breakpoints detection and edge tracing without recursive operations. In [9], an improvised approach is done for image edge detection and its efficiency with a set of images. Results confirm that the DOW-canny edge detector, besides being insensitive to noise, is able to fabricate superior and accurate edges in regions of fine graining, geometrical figures and alpha-numerics as compared to the current edge detection techniques. The detector is also able to handle noisy as well as noiseless images. This paper is organized as follows: Section 2 gives a Brief analysis of the Canny edge detector algorithm. Section 3 presents the proposed Canny edge detection algorithm which includes a novel method for the hysteresis thresholds computation based on a non-uniform quantized gradient magnitude histogram. Simulation results are presented in Section 4. A conclusion is given in Section 5. II. CANNY ALGORITHM ANALYSIS The block diagram of the Canny algorithm is demonstrated in Fig. 1. The Canny algorithm first smoothens the image to eliminate noise by using a smoothing filter such as the Gaussian Convolution. The Gaussian smoothing was performed using a mask (matrix) which was sled over the image, manipulating a square of pixels at a time. The bigger the dimensions of the mask, lower was the sensitivity the detector had to noise. A mask was a common choice for the size of a Gaussian filter. The output smoothed image was denoted as I (x, y). After smoothing the next step was the calculation of gradient of the image. The gradient calculation lead to the
  • 2. Poster Paper Proc. of Int. Conf. on Control, Communication and Power Engineering 2013 detection of the possible edge strength and direction. This was executed by another convolution with a gradient operator. The most commonly used gradient operators are the Prewitt and the Sobel operators. Both operators perform a 2-D spatial gradient measurement on an image. Calculating the horizontal gradient Gx(x, y) and vertical gradient Gy(x, y) at each pixel location by convolving the image I(x, y) with partial derivatives of a 2D Gaussian function. Computing the gradient magnitude G(x, y) and direction θ(x, y) at each pixel location. Gradient magnitude and orientation are given by the following equations: any pixels that were connected to this edge pixel and having a value greater than T2 were also selected as edge pixels. If an edge was to be followed, a gradient of T2 is needed to start but it doesn’t stop till a gradient below T1 [1] is hit. III. IMPLEMENTATION OF THE PROPOSED CANNY EDGE DETECTOR In this section, the hardware implementation of proposed canny edge detection algorithm on the Xilinx FPGA is described. The proposed architecture consists of the following 5 units:  Smoothening unit using Gaussian filter.  Vertical and horizontal gradient Magnitude calculation unit.  Directional non-maximum suppression unit.  High and low threshold Calculation unit.  Thresholding with hysteresis unit. (1) θ = arctan (Gy/Gx) (2) Arctan and the division can be eliminated by simply comparing Gx and Gy values, if they are of similar length, a diagonal direction is obtained, if one is at least 2.5 times longer than the other, a horizontal or vertical direction is obtained. A. Image Smoothening: The input image was smoothened using a 3×3 Gaussian mask. The Gaussian filter is separable and, thus, the implementation of the 2-D convolution with the 3×3 Gaussian mask was achieved using row and column 1- D convolutions. B. Gradients and Gradient Magnitude Calculation: Calculation of the vertical and horizontal gradients using convolution kernels was done in this stage. The kernels vary in size from 3 × 3 to 9 × 9, depending on the sharpness of the image. The whole design was pipelined, and thus the output was generated at every clock cycle. This was an input to the magnitude calculation unit which computes, at each pixel location, the gradient magnitude from the pixel’s horizontal and vertical gradients. C. Directional Non Maximum Suppression: The non-maxima elimination filter is used to eliminate pixels that are not part of a continuous line. In other the pixels which are having high gradient magnitude but they are not a part of a continuous line can be easily eliminated using this filter. General concept used for the elimination of the unwanted pixel is as follows. A simple 3x3 window for the given image was considered and the value of the center pixel in comparison with the adjacent pixel in the given window that are perpendicular to the center pixel was checked. When the comparison was found to be too high, that is if the center pixel value was too high as compared to the adjacent pixel, the center pixel was eliminated and replaced with the earlier pixel value. Fig. 2 given below shows the basic 3x3 window and the pixel considered for the comparison. In Fig. 3, the architecture of the directional non-maximum suppression is shown. In order to access all the pixels’ gradient magnitudes in the 3× 3 window at the same time, two FIFO buffers were employed. The horizontal gradient Gx and the vertical gradient Gy controlled the selector which delivers the gradient magnitude (marked as M(x, y) in Fig. 3) of neighbors along the direction of the gradient, into the arithmetic unit. This arithmetic unit consisted of one divider, two multipliers and one adder, which were implemented using the Xilinx Math Figure 1. Block diagram of the Canny edge detection algorithm After the edge directions were known, non-maximum suppression was applied. Non-maximum suppression is used to trace pixels along the gradient in the edge direction and compare their values perpendicular to the gradient. Two perpendicular pixel values were compared with the value in the edge direction. If their value was lower than the pixel on the edge then they were suppressed i.e., their pixel value was changed to 0, else the higher pixel value was set as the edge and the other two suppressed with a pixel value of 0. Finally, hysteresis was used as a means of eliminating streaking. Streaking is the breaking up of an edge contour caused by the operator output fluctuating above and below the threshold. If a single threshold, T1 is applied to an image, and an edge has an average strength equal to T1, then due to noise, there will be instances where the edge dips below the threshold. Equally it will also extend above the threshold making an edge look like a dashed line. To avoid this, hysteresis uses 2 thresholds, a high and a low. Any pixel in the image that has a value greater than T1 is presumed to be an edge pixel, and was marked as such immediately. Then, © 2013 ACEEE DOI: 03.LSCS.2013.2.26 81
  • 3. Poster Paper Proc. of Int. Conf. on Control, Communication and Power Engineering 2013 Functions IP cores. The output of the arithmetic unit was compared with the gradient magnitude of the center pixel, and the pixel that had no local maximum gradient magnitude was eliminated. Figure 2. 3x3 window for non-maximum suppression unit Figure 4. Pipelined architecture of the Thresholding Unit detection system. The implementation was achieved with the device FPGA Virtex 5 XC5VTX240T and Package FF1759. Design utilization summary obtained for Non-Maximum Suppression Unit is given in Fig.5(a) and RTL top module schematic and simulation results of Non- Maximum Suppression Unit is shown in Fig. 5(b) and 5(c) respectively. Logic Utilization Used Number of Slice Registers 11443 149760 7% Numbers of Slice LUTs 26223 149760 17% 3440 34226 10% 23 680 3% 3 32 9% Number of fully used LUTFF pairs Number of bonded IOBs Figure 3. Directional Non Maximum Suppression Unit Architecture Number of BUFG/BUFGCTRLs D. Calculation of the hysteresis thresholds: Since the low and high thresholds were calculated based on the gradient histogram, the histogram of the image was computed after it had undergone directional non-maximum suppression. As discussed in Section 2, an 8-step nonuniform quantizer was employed to obtain the discrete histogram for each processed block. The block-based hysteresis thresholds (high threshold ThH and low threshold ThL) were computed. Utilization Figure 5 (a). Design Summary of Non-Maximum Suppression Unit E. Thresholding with hysteresis: Since, the output of the non maximum suppression unit contains some spurious edges, the method of thresholding with hysteresis was used. Two thresholds, high threshold ThH and low threshold ThL, which were obtained from the threshold calculation unit, were employed. Let f(x, y) be the image obtained from the non maximum suppression stage, f1(x, y) be the strong edge image and f2(x, y) be the weak edge image. Fig. 4 illustrates the pipelined design of this stage. Figure 5 (b). RTL Top module Schematic of Non-Maximum Suppression Unit Design utilization summary obtained for Thresholding Unit is given in Fig. 6(a) and RTL top module schematic and simulation results of Thresholding Unit is shown in Fig. 6 (b) and Fig. 6 (c) respectively. IV. SIMULATION RESULTS AND ANALYSIS Implementation was done for Non-Maximum Suppression Unit and Thresholding Unit that had resulted in Canny edge © 2013 ACEEE DOI: 03.LSCS.2013.2.26 Available 82
  • 4. Poster Paper Proc. of Int. Conf. on Control, Communication and Power Engineering 2013 Figure 6 (c). Simulation Results of Thresholding Unit Figure 5 (c). Simulation Results of Non-Maximum Suppression Unit Logic Utilization Used Available TABLE: I. N ON-MAXIMUM SUPPRESSION UNIT Utilization Number of Slice Registers 193 149760 0% Numbers of Slice LUTs 271 149760 0% Number of fully used LUT-FF pairs Number of bonded IOBs 163 301 54% 30 680 4% 2 32 Non-Maximum Suppression Unit 6% Number of BUFG/BUFGCTRLs Slice Logic Utilization Number of Slice Registers Number of Slice LUTs: Number of fully used LUT-FF pairs Number of bonded IOBs umber of BUFG/B UF GCTRLs Figure 6 (a). Design Summary of Thresholding Unit Latency Total time period AND THRESHOLDING UNIT Thresholding Unit Used Availab le Utilizati on Use d Availa ble Utilizati on 11443 149760 7% 193 149760 0% 26223 149760 17% 271 149760 0% 3440 34226 10% 163 34226 54% 23 680 3% 30 680 4% 3 32 9% 2 32 6% 0.001051ms 0.001051ms 3.9332ms 3.9332ms Summary of Non-Maximum Suppression Unit and Thresholding Unit as shown in Table I below. reduction in memory, decrease in latency and increase in throughput with no loss in edge detection. As a result, it was found that the computational cost of the proposed algorithm is very low compared to the original Canny edge detection algorithm. The algorithm was mapped onto a Xilinx Virtex-5 FPGA platform and tested using ModelSim. It was observed that this was capable of supporting fast real-time edge detection for images and videos with various spatial and temporal resolutions including full-HD content. IV. CONCLUSION REFERENCES A novel non-uniform quantized histogram calculation method was proposed in the present work, in order to reduce the computational cost of the hysteresis threshold selection for the edge detection. An architecture for Non-maximal Suppression used in Canny edge detection algorithm was also designed that gave significant result with respect to [1] L. Torres, M. Robert, E. Bourennane, and M. Paindavoine, “Implementation of a recursive real time edge detector using retiming techniques,” VLSI, pp. 811 –816, Aug. 1995. [2] Qian Xu, Chaitali Chakrabarti and Lina J. Karam,”A Distributed Canny Edge Detector and Its Implementation On FPGA”, Arizona State University, Tempe, AZ 2011. Figure 6 (b). RTL Top module Schematic of Thresholding Unit © 2013 ACEEE DOI: 03.LSCS.2013.2.26 83
  • 5. Poster Paper Proc. of Int. Conf. on Control, Communication and Power Engineering 2013 [3] S. Varadarajan, C. Chakrabarti, L. J. Karam, and J. M.Bauza, “A distributed psycho-visually motivated Canny edge detector,” IEEE ICASSP, pp. 822 –825, Mar. 2010. [4] Christos Gentsos, Calliope-Louisa Sotiropoulou and Spiridon Nikolaidi,”Real- Time Canny Edge Detection Parallel Implementation for FPGAs”,499-502,ICECS,12-15 Dec. 2010. [5] W. He and K. Yuan, “An improved Canny edge detector and its realization on FPGA,” WCICA, pp. 6561 –6564, Jun. 2008. [6] D. V. Rao and M. Venkatesan, “An efficient reconfigurable architecture and implementation of edge detection algorithm using Handle-C,” ITCC, vol. 2, pp. 843 – 847, Apr.2004. © 2013 ACEEE DOI: 03.LSCS.2013.2. 26 [7] Shengxiao Niu, Jingjing Yang, Sheng Wang, Gengsheng Chen,”Improvement and Parallel Implementation of Canny Edge Detection Algorithm Based on GPU”. ASIC (ASICON), 2011. [8] J. Canny, “A computational approach to edge detection,”IEEE Trans. PAMI, vol. 8, no. 6, pp. 679 –698, Nov. 1986. [9] Anand Gupta, Ravi Kumar Dalal,Rahul Gupta,Pulkit Wadhwa “DOW-Canny: An Improvised Version Of Canny Edge Detector”. (ISPACS) December 7-9, 2011. 84