SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 1 Issue 3, December 2012 
www.ijsr.net 
Medial Axis Transformation based Skeletonzation
of Image Patterns using Image Processing
Techniques
Navjot Mann1
, Parminder Singh2
 
1
Department of Computer Science & Engineering., SUS College of Engineering
Tangori, Mohali, Punjab INDIA
navjotmann.88@gmail.com
2
Department of Information Technology, Chandigarh Engineering College, Landran
Mohali, Punjab INDIA
singh.parminder06@gmail.com
Abstract: The medial axis of an image pattern is the loci of all inscribed disks that touch two or more boundary points without crossing
any of the boundaries. The medial axis transform (MAT) is a powerful representation for objects with inherent symmetry or near-
symmetry. The medial axis of 2-D image patterns provides a conceptual design base, with transition to a detailed design occurring when
the radius function is added to the medial axis or surface. To make such a design tool practicable, however, it is essential to be able to
convert from an MAT format to a boundary representation of an object. In the proposed work, the medial axis transform has been
extracted using the Euclidean distance transform based computation. The image pattern u prepared initially in binary form and then
distance of each non-zero pixel to its closest zeroed pixel is computed. This process continues till the entire image pattern is scanned to its
core.
Keywords: Medial Axis Transform, Euclidean Distance Transform, Charge Coupled Device
1. Introduction
Skeletonization is a process of extracting a skeleton from
an object in a digital image. A skeleton of an image can be
thought of as a one-pixel thick line through the middle of
an object which preserves the topology of that object. It is
a fundamental preprocessing step in many image
processing and pattern recognition algorithms.
Skeletonized images (skeletons) are easier to process and
they reduce processing time for the subsequent operations.
It is a morphological operation that is used to remove
selected foreground pixels from binary images. It is
somewhat like erosion or opening. It is particularly useful
for thinning and Medial Axis Transform. It is only applied
to binary images, and produces another binary image as
output. This operation makes use of a structuring element.
These elements are of the extended type meaning they can
contain both ones and zeros. The skeletonization operation
is related to the hit-and-miss transform and can be
expressed quite simply in terms of it. The skeletonization
of an image I by a structuring element J is given as:
= I – hit or miss (I, J)
2. Brief Literature Survey
Thinning algorithm uses flag map and bitmap
simultaneously to decide if a boundary pixel can be
deleted as well as incorporation of smoothing templates to
smooth the final skeleton. Various performance
measurements are proposed and their comparisons and
analysis are presented [5]. The images interested in a
scene can be characterized by structures composed of line
or curve or arc patterns for shape analysis. It is used to
compress the input data and expedite the extraction of
image features [3]. A good fingerprint thinning algorithm
can depress image noise and promote the robustness of the
minutiae extraction algorithm which helps improve the
overall performance of the system. Many thinning
algorithms have been devised and applied to a wide range
of applications including, Optical Character Recognition
(OCR), biological cell structures and fingerprint patterns
[10]. Service assets are proposed to be framed into a well-
established categorical structure based on pattern
recognition algorithm. This design aims to provide
systematic methodology and enablement architecture for
analyzing, clustering, and adapting heterogeneous services
for dynamic application integration [13]. Parallel thinning
algorithms which generate one-pixel-wide skeletons
generally have difficulty in preserving the connectivity of
an image or generate spurious branches. A thinning
algorithm for roman, devnagri and gurumukhi numerals
has been implemented and evaluated [8].
3. Image Preparation
Before extracting the medial axis transform of an image
pattern, the image is first converted to binary image with
white as background and black as object’s pixels. The
image can be binarized using the Otsu algorithm. In the
220
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 1 Issue 3, December 2012 
www.ijsr.net 
presented work, the image is acquired using CCD camera
in jpeg format. The jpeg format is converted to gray scale
image using rgb2gray command in matlab. Otsu algorithm
is then applied over the gray scale image in order to get
the binary image. The binary image is now ready to face
the MAT algorithm in order to extract the skeleton of the
image pattern under test.
3. Euclidean Distance Transform
The distance transform provides a metric or measure of
the separation of points in the image. The Euclidean
distance is the straight-line distance between two pixels.
0 0 0
0 1 0
0 0 0
The bwdist function in matlab computes the Euclidean
distance between each pixel that is set to off (0) and the
nearest nonzero pixel for bi nary images. The Euclidean
distance between points p and q is the length of the line
segment connecting them ( ). In Cartesian coordinates,
if P = (p1, p2,..., pn) and Q = (q1, q2,..., qn) are two points
in Euclidean n-space, then the distance from p to q, or
from q to p is given by:
D(P,Q) = √ (P1 - Q1)2 + (P1 - Q1)2 + . . . (Pi - Qi)2 + . . .
(Pn - Qn)2
Below images show the Euclidean distance (ED)
transform as computed in matlab:
Figure 1: Input Image 
Figure 2: ED Transform
4. Extraction of MAT
The medial axis transform (MAT) of an image is
computed by calculating the Euclidean distance transform
of the given input image pattern. The MAT is described as
being the locus of the local maxima on the distance
transform.
After the computation of Euclidean distance transform
(EDT) of the input image, the EDT is represented in
image representing the Euclidean distances as gray levels.
The same is shown in above images.
The maximum Euclidean distance is represented as
maximum gray level intensity in the EDT image. The
pixel coordinates of the maximum gray level intensity are
extracted from the EDT image by converting the EDT
image into row x column matrix. The row and column of
the matrix gives the coordinates of the MAT line of the
image pattern.
5. Performance Evaluation Parameters
Connectivity number (CN):
It is a measure of how many objects are connected with a
particular pixel [3]. It is measured by number of color
changes (black to white or white to black) in
neighbourhood of pixel P[i][j]
Cn= Nk – (Nk+1 . Nk+2)
where Nk = color of eight neighbours of pixel
analyzed
N0 = central pixel
N1 = Pixel to the right of the central pixel and
so on
Thinness Measurement (TM):
It measures the degree to which an object in an image is
thinned [6].
TM = 1 – (TM1 / TM2)
TM1 = Triangle Count (P[i][j])
TM2 = 4 × [max(m,n) – 1]2
Where Triangle Count (P[i][j]) = P[i][j] × P[i][j-1] ×
P[i-1][j-1] +
P[i][j] × P[i-1][j-1] × P[i- 1][j]
+
P[i][j] × p[i-1][j] × P[i-1][j+1]
+
P[i][j] × P[i-1][j+1] × P[i][j+1]
And TM1 = Total number of black triangles in an
image.
TM2= Maximum number of black triangles an
image could have
Triangle Count = 2
Connectivity Measurement (CM):
It is used to measure the connectivity of output skeleton.
An object in an image is said to be disconnected if it has
221
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 1 Issue 3, December 2012 
www.ijsr.net 
broken pieces. [6]
CM = S(P[i][j])
Where S(P[i][j]) =
Sensitivity Measurement (SM):
It is used to measure the noise in an image. This noise is
mainly the perturbations in an outline of an object, not
unwanted extra parts in an image. [6]
SM =
Where S(P[i][j]) =
6. Results
Following images show the input image pattern and the
corresponding MAT.
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Input Images – Fig. 3, 5 and 7
MAT Images – Fig. 4, 6 and 8
Table 1: Performance measure of the skeletonized image
Image No. CN TM CM SM
Fig. 3 0.0114 0.880 0.00013 0.005
Fig. 5 0.0209 0.984 0.00015 0.103
Fig. 7 0.0300 0.896 0.00040 0.014
7. Conclusion
The result table shows the results after implementing the
discussed medial axis transform based skeletonzation of
image patterns. The Skeletonized images are shown in fig.
4, 6 and 8. Higher the thinness factor better is the
skeletonzation or thinning. The discussed algorithm has
been implemented on matlab version 7.5 and a text file is
generated after every skeletonization.The performance
parameters are normalized with respect to size of the
image. This removes the ambiguity of the image if
zoomed or compressed. Euclidean transform based medial
axis transformation extraction of image patterns give a
good speedy skeleton of image patterns. This serves good
purpose in terms of computational speed.
References
[1] Mark Vincze, Bence kovari: “Comparitive survey of
thinning algorithms”, Budapest University of
Technology and economics.
[2] Khalid Sayeed, Marek Tabe˛Dzki , Mariusz Rynnik
Marcin Adamski :“K3M: A Universal Algorithm For
Image Skeletonization and a Review Of Thinning
Techniques”, Int. J. Appl. Math. Computer Sci., 2010,
222
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 1 Issue 3, December 2012 
www.ijsr.net 
Vol. 20, No. 2, 317–335 DOI: 10.2478/v10006-010-
0024-4
[3] Dr. P.Subashini, S.Jansi: “Optimal thinning algorithm
for detection of FCD in MRI images”, International
Journal of Scientific & Engineering Research Volume
2, Issue 9, September-2011 1 ISSN 2229-5518 IJSER
[4] Louisa Lam, Seong-Whan lee, Member, IEEE, and
Ching Y.Suen fellow, IEEE:”Thinning methodologies
– A comprehensive survey”, IEEE transactions on
pattern analysis and machine intelligence, Vol 14,
No.9, September 1992.
[5] Dr. Chi Quek,G.S.Ng, R. W. Zhou: “A Novel single
pass thinning algorithm”, IEEE transaction on system
man andcybernetics,8th September,1994
[6] Peter Tarabek: “Performance Measurements Of
Thinning algorithms”, Journal of Information,
Control and Management Systems, Vol. 6, (2008),
No.2
[7] Rafael.C.Gonzalez, Richard E. Woods, Steven I.
Eddins:”Digital Image processing using Matlab”.
[8] Gulshan Goyal, Dr. Maitreyee Dutta, Er. Akshay
Girdhar: “A parallel thinning algorithm for numerical
pattern images in BMP format”,International Journal
of Advanced Engineering and Applications, Jan 2010.
[9] Peter Kardos, Gabor Nemeth, Kalman Palagyi:” An
order Independent Sequential Thinning Algorithm”,
P. Wiederhold and R.P. Barneva (Eds.): IWCIA 2009,
LNCS 5852, pp. 162–175, 2009.@Springer-Verlag
Berlin Heidelberg 2009
[10]N.P. Khanyile, J.R. Tapamo, E. Dube:”A
Comparitive study of Fingerprint thinning
Algorithms”
[11]Ferid Bajramovic, Frank Mattern, Nicholas Butko,
Joachim Denzler:” A Comparison of Nearest
Neighbor Search Algorithms for Generic object
Recognition”. J. Blanc-Talon et al. (Eds.): ACIVS
2006, LNCS 4179, pp. 1186–1197, 2006.@Springer-
Verlag Berlin Heidelberg 2006
[12]Jacob Graves, Roger Mailler:”Quatifying the
Accuracy of C. Elegans Image Analysis”,
BIOTECHNO 2011: The Third International
Conference on Bioinformatics, Biocomputational
Systems and Biotechnologies.
[13]Liang-Jie Zhang, Shuxing Cheng, Carl K. Chang, and
Qun Zhou:” A Pattern Recognition based Algorithm
and case study for clustering and selecting business
services”, IEEE Transactions on systems, man, and
cybernatics—Part A: Systems and Humans, VOL. 42,
NO. 1, JANUARY 2012
[14]M.A. Comeau, E. Holbaek-Hanssen:”Compression
and Compaction of Binary Raster Images”
Author Profile
Navjot Kaur received the degree in Computer Science
and Engineering from Yadawindra College of Engineering
in 2010. She is pursuing Masters Degree in Information
Technology from Chandigarh Engineering College,
Landran, Mohali from 2010 that is under thesis. She is
working in SUS college of Engineering, Tanori, Mohali in
Computer Science Department as Assistant Professor.
223

More Related Content

What's hot

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationSpectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationiaemedu
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
ROI Based Image Compression in Baseline JPEG
ROI Based Image Compression in Baseline JPEGROI Based Image Compression in Baseline JPEG
ROI Based Image Compression in Baseline JPEGIJERA Editor
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...CSCJournals
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature reviewTharindu Rusira
 
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...Koteswar Rao Jerripothula
 
Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentationHaitham Ahmed
 
An approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwtAn approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwtIAEME Publication
 
Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operationsijcseit
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital imagesRupesh Ambatwad
 
Wavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methodsWavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methodsIJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

What's hot (17)

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationSpectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolation
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
ROI Based Image Compression in Baseline JPEG
ROI Based Image Compression in Baseline JPEGROI Based Image Compression in Baseline JPEG
ROI Based Image Compression in Baseline JPEG
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
 
20120140502012
2012014050201220120140502012
20120140502012
 
Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentation
 
An approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwtAn approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwt
 
Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operations
 
H1802054851
H1802054851H1802054851
H1802054851
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
 
G1802053147
G1802053147G1802053147
G1802053147
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital images
 
Wavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methodsWavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methods
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Similar to Medial Axis Transformation based Skeletonzation Using Image Processing Techniques

EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...
EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...
EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...cscpconf
 
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGEAPPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGEcscpconf
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forprjpublications
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorIRJET Journal
 
Spectral approach to image projection with cubic
Spectral approach to image projection with cubicSpectral approach to image projection with cubic
Spectral approach to image projection with cubiciaemedu
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...IJCSEIT Journal
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based patternijcsit
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewsipij
 
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...IRJET Journal
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...IJCSEA Journal
 

Similar to Medial Axis Transformation based Skeletonzation Using Image Processing Techniques (20)

EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...
EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...
EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...
 
I010135760
I010135760I010135760
I010135760
 
C017121219
C017121219C017121219
C017121219
 
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGEAPPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain Tumor
 
Spectral approach to image projection with cubic
Spectral approach to image projection with cubicSpectral approach to image projection with cubic
Spectral approach to image projection with cubic
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
 
mini prjt
mini prjtmini prjt
mini prjt
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
Oc2423022305
Oc2423022305Oc2423022305
Oc2423022305
 
H010315356
H010315356H010315356
H010315356
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
 
D0361034037
D0361034037D0361034037
D0361034037
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based pattern
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of view
 
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
 

More from International Journal of Science and Research (IJSR)

More from International Journal of Science and Research (IJSR) (20)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
 
Ad hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo s
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

Medial Axis Transformation based Skeletonzation Using Image Processing Techniques

  • 1. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 1 Issue 3, December 2012  www.ijsr.net  Medial Axis Transformation based Skeletonzation of Image Patterns using Image Processing Techniques Navjot Mann1 , Parminder Singh2   1 Department of Computer Science & Engineering., SUS College of Engineering Tangori, Mohali, Punjab INDIA navjotmann.88@gmail.com 2 Department of Information Technology, Chandigarh Engineering College, Landran Mohali, Punjab INDIA singh.parminder06@gmail.com Abstract: The medial axis of an image pattern is the loci of all inscribed disks that touch two or more boundary points without crossing any of the boundaries. The medial axis transform (MAT) is a powerful representation for objects with inherent symmetry or near- symmetry. The medial axis of 2-D image patterns provides a conceptual design base, with transition to a detailed design occurring when the radius function is added to the medial axis or surface. To make such a design tool practicable, however, it is essential to be able to convert from an MAT format to a boundary representation of an object. In the proposed work, the medial axis transform has been extracted using the Euclidean distance transform based computation. The image pattern u prepared initially in binary form and then distance of each non-zero pixel to its closest zeroed pixel is computed. This process continues till the entire image pattern is scanned to its core. Keywords: Medial Axis Transform, Euclidean Distance Transform, Charge Coupled Device 1. Introduction Skeletonization is a process of extracting a skeleton from an object in a digital image. A skeleton of an image can be thought of as a one-pixel thick line through the middle of an object which preserves the topology of that object. It is a fundamental preprocessing step in many image processing and pattern recognition algorithms. Skeletonized images (skeletons) are easier to process and they reduce processing time for the subsequent operations. It is a morphological operation that is used to remove selected foreground pixels from binary images. It is somewhat like erosion or opening. It is particularly useful for thinning and Medial Axis Transform. It is only applied to binary images, and produces another binary image as output. This operation makes use of a structuring element. These elements are of the extended type meaning they can contain both ones and zeros. The skeletonization operation is related to the hit-and-miss transform and can be expressed quite simply in terms of it. The skeletonization of an image I by a structuring element J is given as: = I – hit or miss (I, J) 2. Brief Literature Survey Thinning algorithm uses flag map and bitmap simultaneously to decide if a boundary pixel can be deleted as well as incorporation of smoothing templates to smooth the final skeleton. Various performance measurements are proposed and their comparisons and analysis are presented [5]. The images interested in a scene can be characterized by structures composed of line or curve or arc patterns for shape analysis. It is used to compress the input data and expedite the extraction of image features [3]. A good fingerprint thinning algorithm can depress image noise and promote the robustness of the minutiae extraction algorithm which helps improve the overall performance of the system. Many thinning algorithms have been devised and applied to a wide range of applications including, Optical Character Recognition (OCR), biological cell structures and fingerprint patterns [10]. Service assets are proposed to be framed into a well- established categorical structure based on pattern recognition algorithm. This design aims to provide systematic methodology and enablement architecture for analyzing, clustering, and adapting heterogeneous services for dynamic application integration [13]. Parallel thinning algorithms which generate one-pixel-wide skeletons generally have difficulty in preserving the connectivity of an image or generate spurious branches. A thinning algorithm for roman, devnagri and gurumukhi numerals has been implemented and evaluated [8]. 3. Image Preparation Before extracting the medial axis transform of an image pattern, the image is first converted to binary image with white as background and black as object’s pixels. The image can be binarized using the Otsu algorithm. In the 220
  • 2. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 1 Issue 3, December 2012  www.ijsr.net  presented work, the image is acquired using CCD camera in jpeg format. The jpeg format is converted to gray scale image using rgb2gray command in matlab. Otsu algorithm is then applied over the gray scale image in order to get the binary image. The binary image is now ready to face the MAT algorithm in order to extract the skeleton of the image pattern under test. 3. Euclidean Distance Transform The distance transform provides a metric or measure of the separation of points in the image. The Euclidean distance is the straight-line distance between two pixels. 0 0 0 0 1 0 0 0 0 The bwdist function in matlab computes the Euclidean distance between each pixel that is set to off (0) and the nearest nonzero pixel for bi nary images. The Euclidean distance between points p and q is the length of the line segment connecting them ( ). In Cartesian coordinates, if P = (p1, p2,..., pn) and Q = (q1, q2,..., qn) are two points in Euclidean n-space, then the distance from p to q, or from q to p is given by: D(P,Q) = √ (P1 - Q1)2 + (P1 - Q1)2 + . . . (Pi - Qi)2 + . . . (Pn - Qn)2 Below images show the Euclidean distance (ED) transform as computed in matlab: Figure 1: Input Image  Figure 2: ED Transform 4. Extraction of MAT The medial axis transform (MAT) of an image is computed by calculating the Euclidean distance transform of the given input image pattern. The MAT is described as being the locus of the local maxima on the distance transform. After the computation of Euclidean distance transform (EDT) of the input image, the EDT is represented in image representing the Euclidean distances as gray levels. The same is shown in above images. The maximum Euclidean distance is represented as maximum gray level intensity in the EDT image. The pixel coordinates of the maximum gray level intensity are extracted from the EDT image by converting the EDT image into row x column matrix. The row and column of the matrix gives the coordinates of the MAT line of the image pattern. 5. Performance Evaluation Parameters Connectivity number (CN): It is a measure of how many objects are connected with a particular pixel [3]. It is measured by number of color changes (black to white or white to black) in neighbourhood of pixel P[i][j] Cn= Nk – (Nk+1 . Nk+2) where Nk = color of eight neighbours of pixel analyzed N0 = central pixel N1 = Pixel to the right of the central pixel and so on Thinness Measurement (TM): It measures the degree to which an object in an image is thinned [6]. TM = 1 – (TM1 / TM2) TM1 = Triangle Count (P[i][j]) TM2 = 4 × [max(m,n) – 1]2 Where Triangle Count (P[i][j]) = P[i][j] × P[i][j-1] × P[i-1][j-1] + P[i][j] × P[i-1][j-1] × P[i- 1][j] + P[i][j] × p[i-1][j] × P[i-1][j+1] + P[i][j] × P[i-1][j+1] × P[i][j+1] And TM1 = Total number of black triangles in an image. TM2= Maximum number of black triangles an image could have Triangle Count = 2 Connectivity Measurement (CM): It is used to measure the connectivity of output skeleton. An object in an image is said to be disconnected if it has 221
  • 3. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 1 Issue 3, December 2012  www.ijsr.net  broken pieces. [6] CM = S(P[i][j]) Where S(P[i][j]) = Sensitivity Measurement (SM): It is used to measure the noise in an image. This noise is mainly the perturbations in an outline of an object, not unwanted extra parts in an image. [6] SM = Where S(P[i][j]) = 6. Results Following images show the input image pattern and the corresponding MAT. Figure 3 Figure 4 Figure 5 Figure 6 Figure 7 Figure 8 Input Images – Fig. 3, 5 and 7 MAT Images – Fig. 4, 6 and 8 Table 1: Performance measure of the skeletonized image Image No. CN TM CM SM Fig. 3 0.0114 0.880 0.00013 0.005 Fig. 5 0.0209 0.984 0.00015 0.103 Fig. 7 0.0300 0.896 0.00040 0.014 7. Conclusion The result table shows the results after implementing the discussed medial axis transform based skeletonzation of image patterns. The Skeletonized images are shown in fig. 4, 6 and 8. Higher the thinness factor better is the skeletonzation or thinning. The discussed algorithm has been implemented on matlab version 7.5 and a text file is generated after every skeletonization.The performance parameters are normalized with respect to size of the image. This removes the ambiguity of the image if zoomed or compressed. Euclidean transform based medial axis transformation extraction of image patterns give a good speedy skeleton of image patterns. This serves good purpose in terms of computational speed. References [1] Mark Vincze, Bence kovari: “Comparitive survey of thinning algorithms”, Budapest University of Technology and economics. [2] Khalid Sayeed, Marek Tabe˛Dzki , Mariusz Rynnik Marcin Adamski :“K3M: A Universal Algorithm For Image Skeletonization and a Review Of Thinning Techniques”, Int. J. Appl. Math. Computer Sci., 2010, 222
  • 4. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 1 Issue 3, December 2012  www.ijsr.net  Vol. 20, No. 2, 317–335 DOI: 10.2478/v10006-010- 0024-4 [3] Dr. P.Subashini, S.Jansi: “Optimal thinning algorithm for detection of FCD in MRI images”, International Journal of Scientific & Engineering Research Volume 2, Issue 9, September-2011 1 ISSN 2229-5518 IJSER [4] Louisa Lam, Seong-Whan lee, Member, IEEE, and Ching Y.Suen fellow, IEEE:”Thinning methodologies – A comprehensive survey”, IEEE transactions on pattern analysis and machine intelligence, Vol 14, No.9, September 1992. [5] Dr. Chi Quek,G.S.Ng, R. W. Zhou: “A Novel single pass thinning algorithm”, IEEE transaction on system man andcybernetics,8th September,1994 [6] Peter Tarabek: “Performance Measurements Of Thinning algorithms”, Journal of Information, Control and Management Systems, Vol. 6, (2008), No.2 [7] Rafael.C.Gonzalez, Richard E. Woods, Steven I. Eddins:”Digital Image processing using Matlab”. [8] Gulshan Goyal, Dr. Maitreyee Dutta, Er. Akshay Girdhar: “A parallel thinning algorithm for numerical pattern images in BMP format”,International Journal of Advanced Engineering and Applications, Jan 2010. [9] Peter Kardos, Gabor Nemeth, Kalman Palagyi:” An order Independent Sequential Thinning Algorithm”, P. Wiederhold and R.P. Barneva (Eds.): IWCIA 2009, LNCS 5852, pp. 162–175, 2009.@Springer-Verlag Berlin Heidelberg 2009 [10]N.P. Khanyile, J.R. Tapamo, E. Dube:”A Comparitive study of Fingerprint thinning Algorithms” [11]Ferid Bajramovic, Frank Mattern, Nicholas Butko, Joachim Denzler:” A Comparison of Nearest Neighbor Search Algorithms for Generic object Recognition”. J. Blanc-Talon et al. (Eds.): ACIVS 2006, LNCS 4179, pp. 1186–1197, 2006.@Springer- Verlag Berlin Heidelberg 2006 [12]Jacob Graves, Roger Mailler:”Quatifying the Accuracy of C. Elegans Image Analysis”, BIOTECHNO 2011: The Third International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies. [13]Liang-Jie Zhang, Shuxing Cheng, Carl K. Chang, and Qun Zhou:” A Pattern Recognition based Algorithm and case study for clustering and selecting business services”, IEEE Transactions on systems, man, and cybernatics—Part A: Systems and Humans, VOL. 42, NO. 1, JANUARY 2012 [14]M.A. Comeau, E. Holbaek-Hanssen:”Compression and Compaction of Binary Raster Images” Author Profile Navjot Kaur received the degree in Computer Science and Engineering from Yadawindra College of Engineering in 2010. She is pursuing Masters Degree in Information Technology from Chandigarh Engineering College, Landran, Mohali from 2010 that is under thesis. She is working in SUS college of Engineering, Tanori, Mohali in Computer Science Department as Assistant Professor. 223