This document summarizes research on automated damage assessment from satellite imagery after disasters. It presents a novel algorithm to extract buildings from high-resolution satellite images that can detect rooftops of various shapes and colors. The algorithm is applied to images of the National Palace in Haiti before and after the 2010 earthquake. Change detection measures like color histograms and edge density are then used to analyze damage, showing potential to discriminate between collapsed, partially damaged and undamaged buildings. The results demonstrate that this automated approach could provide accurate damage assessments after disasters.
Recent Advances in Object-based Change Detection.pdfgrssieee
This document summarizes recent advances in object-based change detection methods. It presents a new multiresolution segmentation approach adapted for change detection that segments images independently but checks for consistency between segments. Object correspondence is established through directed or intersected objects. Change detection is performed using IR-MAD. The methods were tested on aerial imagery and showed good overall accuracy rates above 98%, demonstrating the promise of object-based change detection techniques. Further developments are needed to improve consistency tests, segmentation parameter selection, and implementation.
The document discusses using a local dissimilarity measure (LDM) for binary pattern matching. It introduces LDM, which quantifies differences between binary images in a localized manner. LDM is computed from the distance transforms of the two images being compared. The document proposes using LDM as a shape matching technique by calculating the LDM between a reference shape and subsets of a binary image to find the best match location. Initial results suggest LDM provides localized and quantified comparison of images without feature extraction. However, it increases computation time compared to other methods.
This document describes a new method for georegistering and stabilizing aerial video over mountainous terrain using LIDAR data. The method registers images to high-resolution digital elevation models by generating predicted images from the DEM and sensor model, registering these to the actual images, and correcting the sensor model. Examples show the method stabilizes shaky video, tracks moving objects, produces orthorectified video draped over DEMs, and aligns video and thermal infrared mosaics with map graphics in Google Earth. The method processes images in about 1 second and achieves absolute geolocation accuracy of 1-2 meters.
This document appears to be an exam for a course on image processing. It contains 20 multiple choice questions testing concepts related to image processing techniques. Some of the concepts addressed include image transformations, filtering, restoration, and color space conversions. The questions cover topics such as piecewise linear transformations, monotonic functions, histogram processing methods, distance metrics, and stages of image processing like acquisition and enhancement.
SIGGRAPH ASIA 2012 Stereoscopic Cloning Presentation SlideI-Chao Shen
This is the presentation slide of paper : Perspective-Aware Warping for Seamless Stereoscopic Image Cloning.
It is made by Sheng-Jie Luo, National Taiwan University.
Please refer to http://www.cmlab.csie.ntu.edu.tw/~forestking/research/SIGA12-StereoCloning/ for more detail.
The document summarizes lecture notes and assignments for an image processing course taught by Sanjay Goel at JIIT in 2012. Over the course of 17 lectures, topics included possibilities of image processing in cultural heritage and entertainment, color models, geometric transformations, histogram processing, matrix operations, and spatial filtering. Assignments involved writing programs to perform tasks like converting color models, applying geometric transforms, and using filters for tasks like noise removal and edge detection.
The document proposes two algorithms for fingerprint classification based on singular point detection. The first algorithm uses directional images and masks to detect core and delta point neighborhoods, then analyzes histograms to locate exact singular points. The second algorithm detects neighborhoods based on curvature and direction changes, then uses Poincare index to identify candidate points. Both aim to classify fingerprints into arch, loop, or whorl categories based on identified singular point types and positions.
The document summarizes research on extracting water surfaces from simulated Synthetic Aperture Radar (SAR) images produced for the Surface Water and Ocean Topography (SWOT) mission. The researchers adapted an existing road network extraction algorithm for detecting hydrological networks in the low-incidence Ka-band SAR images. They improved the low-level line detection and high-level graph construction steps to better handle the unique characteristics of the SWOT data. Evaluation of the method on test data showed it was able to correctly extract most rivers, with completeness and correctness generally over 0.5. Future work could involve testing on real SWOT data and combining the approach with other segmentation techniques.
Recent Advances in Object-based Change Detection.pdfgrssieee
This document summarizes recent advances in object-based change detection methods. It presents a new multiresolution segmentation approach adapted for change detection that segments images independently but checks for consistency between segments. Object correspondence is established through directed or intersected objects. Change detection is performed using IR-MAD. The methods were tested on aerial imagery and showed good overall accuracy rates above 98%, demonstrating the promise of object-based change detection techniques. Further developments are needed to improve consistency tests, segmentation parameter selection, and implementation.
The document discusses using a local dissimilarity measure (LDM) for binary pattern matching. It introduces LDM, which quantifies differences between binary images in a localized manner. LDM is computed from the distance transforms of the two images being compared. The document proposes using LDM as a shape matching technique by calculating the LDM between a reference shape and subsets of a binary image to find the best match location. Initial results suggest LDM provides localized and quantified comparison of images without feature extraction. However, it increases computation time compared to other methods.
This document describes a new method for georegistering and stabilizing aerial video over mountainous terrain using LIDAR data. The method registers images to high-resolution digital elevation models by generating predicted images from the DEM and sensor model, registering these to the actual images, and correcting the sensor model. Examples show the method stabilizes shaky video, tracks moving objects, produces orthorectified video draped over DEMs, and aligns video and thermal infrared mosaics with map graphics in Google Earth. The method processes images in about 1 second and achieves absolute geolocation accuracy of 1-2 meters.
This document appears to be an exam for a course on image processing. It contains 20 multiple choice questions testing concepts related to image processing techniques. Some of the concepts addressed include image transformations, filtering, restoration, and color space conversions. The questions cover topics such as piecewise linear transformations, monotonic functions, histogram processing methods, distance metrics, and stages of image processing like acquisition and enhancement.
SIGGRAPH ASIA 2012 Stereoscopic Cloning Presentation SlideI-Chao Shen
This is the presentation slide of paper : Perspective-Aware Warping for Seamless Stereoscopic Image Cloning.
It is made by Sheng-Jie Luo, National Taiwan University.
Please refer to http://www.cmlab.csie.ntu.edu.tw/~forestking/research/SIGA12-StereoCloning/ for more detail.
The document summarizes lecture notes and assignments for an image processing course taught by Sanjay Goel at JIIT in 2012. Over the course of 17 lectures, topics included possibilities of image processing in cultural heritage and entertainment, color models, geometric transformations, histogram processing, matrix operations, and spatial filtering. Assignments involved writing programs to perform tasks like converting color models, applying geometric transforms, and using filters for tasks like noise removal and edge detection.
The document proposes two algorithms for fingerprint classification based on singular point detection. The first algorithm uses directional images and masks to detect core and delta point neighborhoods, then analyzes histograms to locate exact singular points. The second algorithm detects neighborhoods based on curvature and direction changes, then uses Poincare index to identify candidate points. Both aim to classify fingerprints into arch, loop, or whorl categories based on identified singular point types and positions.
The document summarizes research on extracting water surfaces from simulated Synthetic Aperture Radar (SAR) images produced for the Surface Water and Ocean Topography (SWOT) mission. The researchers adapted an existing road network extraction algorithm for detecting hydrological networks in the low-incidence Ka-band SAR images. They improved the low-level line detection and high-level graph construction steps to better handle the unique characteristics of the SWOT data. Evaluation of the method on test data showed it was able to correctly extract most rivers, with completeness and correctness generally over 0.5. Future work could involve testing on real SWOT data and combining the approach with other segmentation techniques.
Hacking a Bird in the Sky: Hijacking VSAT ConnectionJim Geovedi
The document discusses hacking satellite internet connections through VSAT systems. It provides background on satellites, how they are launched and positioned in orbit, and how satellite internet services work. It specifically focuses on VSAT systems, describing their topology and components, as well as how their signals are transmitted and received via satellite footprints. The goal is to demonstrate security flaws that could allow hijacking of VSAT connections.
Hacking a Bird in the Sky: The Revenge of Angry BirdsJim Geovedi
The document discusses satellite communication systems and potential vulnerabilities. It describes how VSAT networks are used to provide services like automated teller machines and banking networks. It then outlines some hypothetical attacks against different parts of satellite systems, including denial of service attacks against uplinks and downlinks, commandeering spare satellites, and spoofing orbital positioning. The document cautions that insiders pose the biggest risk, and discusses frameworks for distributed scanning of satellites to identify vulnerabilities early. It advocates for monitoring spectrum usage and carrier signals to detect anomalies.
Satellites play a significant role in communication, early warning systems, global broadcasting, meteorology, navigation, reconnaissance, remote sensing, and surveillance.Satellite services cover practically every sector, from mobile cellular communication to telemedicine, so any interference with them could have a serious effect. Satellites are a strategic asset for any country and are considered as “critical infrastructure,” therefore they are considerable as privileged targets for a possible cyber attack.
The document discusses different types of professional hackers and their roles, including corporate hackers like programmers, administrators, operators, security officers, and IT auditors who work for companies. It also discusses independent hackers like operating system hackers, intrusion specialists, vulnerability researchers, botnet owners, rootkit/trojan/virus writers, and spammers/fraudsters. Finally, it raises questions about the professional hacking community and skills in Indonesia.
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Jim Geovedi
This document discusses techniques for intercepting unencrypted satellite communications. It begins by providing background on satellite types and orbits, as well as common transmission standards. It then describes how to capture satellite signals using a DVB card and Linux tools. Specific techniques covered include identifying packet IDs to create virtual interfaces, DNS spoofing, TCP hijacking, and attacking GRE tunnels. The document explains how these techniques could allow intercepting passwords, cookies, emails and other sensitive transmitted data. It emphasizes that while uplink data cannot be captured from satellites, attacking protocols like GRE could enable some uplink sniffing.
Satellite Hacking — Intro by Indianz (2012)Jim Geovedi
A very good introduction by IndianZ (Martin Rutishauser) about Satellite Hacking. He also brought up some information that missed in my satellite hacking talks. Highly recommended for those who are interested in the subject.
SATELLITE COMMUNICATION AND IT'S APPLICATION IN GPSArkaprava Jana
The document discusses satellite communication and its application in GPS. It provides an outline covering topics like satellite orbits, types of satellites, subsystems, system design, frequency coordination, satellite links, capacity allocation, VSAT systems, the evolution of satellites, applications, and advantages/disadvantages. Key points include descriptions of different orbit types like LEO, GEO, and HEO; components of satellite systems including space and ground segments; and applications of satellite technology like GPS and fixed satellite services.
Hacking a Bird in the Sky: Hijacking VSAT ConnectionJim Geovedi
The document discusses hacking satellite internet connections through VSAT systems. It provides background on satellites, how they are launched and positioned in orbit, and how satellite internet services work. It specifically focuses on VSAT systems, describing their topology and components, as well as how their signals are transmitted and received via satellite footprints. The goal is to demonstrate security flaws that could allow hijacking of VSAT connections.
Hacking a Bird in the Sky: The Revenge of Angry BirdsJim Geovedi
The document discusses satellite communication systems and potential vulnerabilities. It describes how VSAT networks are used to provide services like automated teller machines and banking networks. It then outlines some hypothetical attacks against different parts of satellite systems, including denial of service attacks against uplinks and downlinks, commandeering spare satellites, and spoofing orbital positioning. The document cautions that insiders pose the biggest risk, and discusses frameworks for distributed scanning of satellites to identify vulnerabilities early. It advocates for monitoring spectrum usage and carrier signals to detect anomalies.
Satellites play a significant role in communication, early warning systems, global broadcasting, meteorology, navigation, reconnaissance, remote sensing, and surveillance.Satellite services cover practically every sector, from mobile cellular communication to telemedicine, so any interference with them could have a serious effect. Satellites are a strategic asset for any country and are considered as “critical infrastructure,” therefore they are considerable as privileged targets for a possible cyber attack.
The document discusses different types of professional hackers and their roles, including corporate hackers like programmers, administrators, operators, security officers, and IT auditors who work for companies. It also discusses independent hackers like operating system hackers, intrusion specialists, vulnerability researchers, botnet owners, rootkit/trojan/virus writers, and spammers/fraudsters. Finally, it raises questions about the professional hacking community and skills in Indonesia.
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Jim Geovedi
This document discusses techniques for intercepting unencrypted satellite communications. It begins by providing background on satellite types and orbits, as well as common transmission standards. It then describes how to capture satellite signals using a DVB card and Linux tools. Specific techniques covered include identifying packet IDs to create virtual interfaces, DNS spoofing, TCP hijacking, and attacking GRE tunnels. The document explains how these techniques could allow intercepting passwords, cookies, emails and other sensitive transmitted data. It emphasizes that while uplink data cannot be captured from satellites, attacking protocols like GRE could enable some uplink sniffing.
Satellite Hacking — Intro by Indianz (2012)Jim Geovedi
A very good introduction by IndianZ (Martin Rutishauser) about Satellite Hacking. He also brought up some information that missed in my satellite hacking talks. Highly recommended for those who are interested in the subject.
SATELLITE COMMUNICATION AND IT'S APPLICATION IN GPSArkaprava Jana
The document discusses satellite communication and its application in GPS. It provides an outline covering topics like satellite orbits, types of satellites, subsystems, system design, frequency coordination, satellite links, capacity allocation, VSAT systems, the evolution of satellites, applications, and advantages/disadvantages. Key points include descriptions of different orbit types like LEO, GEO, and HEO; components of satellite systems including space and ground segments; and applications of satellite technology like GPS and fixed satellite services.
SATELLITE COMMUNICATION AND IT'S APPLICATION IN GPS
Automated Damage Assessment in the Haiti Earthquake using Satellite Imagery
1. Automated Damage Assessment
g
In the Haiti Earthquake
Using Satellite Imagery
Using Satellite Imagery
Jim Thomas1, Ahsan Kareem2, Kevin W. Bowyer3
1
Computer Science and Engineering, Univ. of Notre Dame, IN, USA, jthoma14@cse.nd.edu
2
Civil Engineering, Univ. of Notre Dame, Notre Dame, IN, USA, kareem@nd.edu
3
Computer Science and Engineering, Univ. of Notre Dame, IN, USA, kwb@cse.nd.edu
http://www.nd.edu/~nathaz/
http://nathazlab.blogspot.com/
NatHaz Modeling L b
N H M d li Laboratory
University of Notre Dame
156 Fitzpatrick Hall
Notre Dame, IN 46556
www.nd.edu/~nathaz GCOE Partner
1
2. Introduction
Automated damage detection from satellite or aerial
imagery for post disaster analysis has been a major
research effort in the past decade.
Previous attempts mostly focused on pixel-based
change detection (figure 1). A damage estimate is
prepared using change detection on before-and-
after event images.
Such low-resolution analysis limits accuracy to a
rough approximation of estimated damage.
Figure 1
Th availability of hi h resolution i
The il bilit f high l ti imagery provides an
id
opportunity for a more detailed analysis.
However, building extraction in this approach is limited
by color/shape variations in roof structures (figure 2).
The
Th ongoing research at U i
i h t University of N t D
it f Notre Dame
focuses on detecting rooftops of all shapes and colors.
This approach is geared towards the development of
automated, accurate damage assessment techniques
based individual buildings.
b d on i di id l b ildi
Figure 2
2
3. Building Extraction
g
A novel algorithm for building detection has been developed.
This method makes use of supervised/unsupervised
classification for initial segmentation.
Figure 3 shows a pre-hurricane image from Pensacola, Florida.
Buildings hidden by trees and the variations in roof structure
make this a challenging example for building detection.
Figure 3
g
First step is a segmentation that classifies various
pixels of the image into shadows, buildings, roads,
vegetation etc.; See Figure 4.
Different combinations of the classified segments are
considered and a hypothesis tests whether the
combination represents a building.
Figure 4
This hypothesis makes use of shape, spectral and shadow
evidence to accept or reject a group of segments as a building.
The buildings thus extracted from the above image are marked
in white in Figure 5 and have a detection accuracy of 91%.
g y
Figure 5 3
4. National Palace in Port au Prince, Haiti
Port-au-Prince,
(a) (b)
Figure 6:
g
(a) National
Palace before
the quake;
(b) buildings
extracted from
image in (a).
Figure 7:
(a) National Palace
after the quake;
(b) buildings
extracted from
image in (a).
(a) (b)
4
5. Change Detection
Color-histogram-based change measures were
computed as follows:
HSV color space histograms were computed
for the before and after images.
The Bhattacharyya distance d(H1,H2) between
yy ( ,
normalized histograms H1 and H2 is given by:
This distance represents the change from
before to after the earthquake.
A false color damage map based on the Lesser More
computed distance is shown in Figure 8. damage damage
Figure 8
5
6. Change Detection (
g (Contd.)
)
Edge density is another measure, that captures non-uniformity of texture resulting
from damage. More edges are likely to appear in an after-event image as a result
damaged or collapsed roofs
d d ll d f
A difference image of the National palace is shown in Figure 9 and the corresponding
edges detected using the Canny edge detector are shown in Figure 10.
Figure 9 Figure 10
6
7. Results
Plots of damage measures computed vs actual damage states (ground truth) for
color histogram distances (a) and edge density measures (b) are shown below.
While color-histogram based measures discriminate well between collapsed and
undamaged roofs, edge-density measures are particularly useful in identifying
collapsed rooftops.
1.2 1.2 0.4 0.4
0.35 0.35
1 1
0.3 0.3
0.8 0.8
0.25 0.25
0.6 0.6 0.2 0.2
0.15 0.15
0.4 0.4
0.1 0.1
0.2 0.2
0.05
0 05 0.05
0 05
0 0 0 0
Collapsed Partial Damage No Damage Collapsed Partial Damage No Damage
( )
(a) Color Histogram distances
g ( )
(b) Edge-density measures
g y
7
8. Acknowledgment
The support for this study was provided by the Collaborative
Research Program at the NatHaz Laboratory as a part of the
Global Center of Excellence at the Tokyo Polytechnic University:
New Frontier of Education and Research in Wind Engineering. The
funds were provided by the Ministry of Education, Culture, Sports,
Science and Technology (MEXT), Japan. The opinions presented
in this report do not necessarily reflect the views of the
collaborators or the funding agency.
8