SlideShare a Scribd company logo
Edge Detection
What is Edge Detection?
Identifying points/Edges in a digital image at which
the image brightness changes sharply or has
discontinuities.
- Edges are significant local changes of intensity in an image.
- Edges typically occur on the boundary between two
different regions in an image.
Goal of edge detection
Edge detection is extensively used in image segmentation
when we want to divide the image into areas
corresponding to different objects. If we need to extract
different object from an image, we need Edge Detection
Using Edge Detection, we can:
- Produce a line drawing of a scene from an image of that scene.
- Important features can be extracted from the edges of an image
(e.g., corners, lines, curves).
- These features are used by higher-level computer vision algorithms
(e.g., recognition, Image comparizon ).
Unaccepted object can be remove.
Process of Edge Detection
Most of edge detection algorithm are based on one of two basic
properties of intensity values: Discontinuity and similarity.
Typically, there are three steps to perform edge detection:
1. Noise reduction
2. Edge enhancement
3. Edge localization
Process of Edge Detection (...)
Noise reduction
where we try to suppress as much noise as possible, without
smoothing away the meaningful edges.
Original Image After Nois Reduction
Process of Edge Detection (...)
Edge enhancement
where we apply some kind of filter that responds strongly at edges
and weakly elsewhere, so that the edges may be identified as local
maxima in the filter’s output . One suggestion is to use some kind of
high pass filter.
Process of Edge Detection (...)
Edge localization
where we decide which of the local maxima output by the filter are
meaningful edges and which are caused by noise
Process of Edge Detection (...)
There are many algorithm for Edge Detection. Some are:
Robert's edge detector
Prewitt edge detector
Sobel edge detector
Frie Chen edge detector
Canny edge detector
Canny edge detector is giving best output, I am going to explain Canny edge
detector.
Canny Edge Detector
Canny Edge Detector is complex and uses a multi-stage algorithm to
detect a wide range of edges in images. It is most commonly
implemented edge detection algorithm. It has three basic objectives:
Low error rate
Edge points should be well localized
Single edge point response
Canny Edge Detector
As I mention before, canny edge detector have multiple algorithm.
It have 5 steps, those are:
Image Smoothing
Gradient Operation
Nonmaxima Suppression
Hysteresis Thresholding
Connectivity Analysis
Canny Edge Detector
Image Smoothing
Reduce image noise by smoothing with a Gaussian
The choice of σ depends on desired behavior
large σ detects large scale edges
small σ detects fine features
The larger the width of the Gaussian mask, the lower is the detector's sensitivity to
noise.
Canny Edge Detector
Canny Edge Detector
Nonmaxima Suppression
Nonmaxima Suppression reduce thick edge strength responses around true edges
select the single maximum point across the width of an edge. is used to trace along
the edge in the edge direction and suppress any pixel value (sets it equal to 0) that is
not considered to be an edge. This will give a thin line in the output image.
Canny Edge Detector
Hysteresis Thresholding
Large intensity gradients are more likely to correspond to edges than small intensity gradients. It is in most
cases impossible to specify a threshold at which a given intensity gradient switches from corresponding to an
edge into not doing so. Therefore Canny uses thresholding with hysteresis.
Thresholding with hysteresis requires two thresholds – high and low. Select two thresholds TH and TL such that
0 6 TL < TH 6 255
Create two new binary 2-D arrays
• gNH(x; y) = gN(x y) > TH
• gNL(x; y) = gN(x y) > TL
Eliminate from gNL(x; y) all the nonzero
pixels from gNH(x y)
After this operation
• gNH(x y) will contain only the strong edge points
• gNL(x y) will contain only the weak edge points
• They will not contain common points
Ratio of TH to TL should be 2 : 1 or 3 : 1
Canny Edge Detector
Connectivity Analysis
After step #4, gNH(x y) will contain the strong edge pixels { thus are valid edge pixels.
However, there will be discontinuity in the edges. Longer edges are formed using the
following procedure:
1 Add all the edge pixels in gNH(x y) to a list L
2 Do until there are more edge pixels in L
• Locate the next unvisited edge pixel, p
• Mark as valid edge pixels all the weak pixels in gNL(x y) that are connected to p (8
neighbors)
• Remove p from L
3 Set to zero all pixels in gNL(x y) that were not marked as valid edge pixels
4 Combine all nonzero pixels in gNH(x y) and gNL(x y ) to find the final edge pixels
Analysis
Canny Edge Detector
Visually all steps
?
Thank you!
Jakir Hossain.
ID:
CSE-24th Batch.
Southeast University.

More Related Content

What's hot

EDGE DETECTION
EDGE DETECTIONEDGE DETECTION
EDGE DETECTION
VIKAS SINGH BHADOURIA
 
Computer vision - edge detection
Computer vision - edge detectionComputer vision - edge detection
Computer vision - edge detection
Wael Badawy
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
A B Shinde
 
IMAGE SEGMENTATION.
IMAGE SEGMENTATION.IMAGE SEGMENTATION.
IMAGE SEGMENTATION.
Tawose Olamide Timothy
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
asodariyabhavesh
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
Rishabh shah
 
Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filters
A B Shinde
 
Hough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamHough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul Islam
Nazmul Islam
 
Chapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woodsChapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woods
asodariyabhavesh
 
Image enhancement
Image enhancementImage enhancement
Image enhancementAyaelshiwi
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
vsaranya169
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
Image Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom ConceptsImage Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom Concepts
mmjalbiaty
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Md Shabir Alam
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Bulbul Agrawal
 
gaussian filter seminar ppt
gaussian filter seminar pptgaussian filter seminar ppt
gaussian filter seminar ppt
sachin kumar rajput
 
Active contour segmentation
Active contour segmentationActive contour segmentation
Active contour segmentation
Nishant Jain
 
Color image processing Presentation
Color image processing PresentationColor image processing Presentation
Color image processing Presentation
Revanth Chimmani
 
Digital image processing
Digital image processingDigital image processing
Digital image processing
Astha Jain
 

What's hot (20)

EDGE DETECTION
EDGE DETECTIONEDGE DETECTION
EDGE DETECTION
 
Edge detection
Edge detectionEdge detection
Edge detection
 
Computer vision - edge detection
Computer vision - edge detectionComputer vision - edge detection
Computer vision - edge detection
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
 
IMAGE SEGMENTATION.
IMAGE SEGMENTATION.IMAGE SEGMENTATION.
IMAGE SEGMENTATION.
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filters
 
Hough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamHough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul Islam
 
Chapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woodsChapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woods
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Image Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom ConceptsImage Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom Concepts
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
gaussian filter seminar ppt
gaussian filter seminar pptgaussian filter seminar ppt
gaussian filter seminar ppt
 
Active contour segmentation
Active contour segmentationActive contour segmentation
Active contour segmentation
 
Color image processing Presentation
Color image processing PresentationColor image processing Presentation
Color image processing Presentation
 
Digital image processing
Digital image processingDigital image processing
Digital image processing
 

Similar to Edge Detection

Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge DetectionEdge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
cihantopal2
 
Real time Canny edge detection
Real time Canny edge detectionReal time Canny edge detection
Real time Canny edge detection
Shashank Kapoor
 
Exploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny AlgorithmExploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny AlgorithmPrasad Thakur
 
image segmentation by ppres.pptx
image segmentation by ppres.pptximage segmentation by ppres.pptx
image segmentation by ppres.pptx
mohan134666
 
195706916 i journals-paper-template-2013
195706916 i journals-paper-template-2013195706916 i journals-paper-template-2013
195706916 i journals-paper-template-2013
homeworkping3
 
X-Ray Image Acquisition and Analysis
X-Ray Image Acquisition and AnalysisX-Ray Image Acquisition and Analysis
X-Ray Image Acquisition and Analysis
IJREST
 
PPT s06-machine vision-s2
PPT s06-machine vision-s2PPT s06-machine vision-s2
PPT s06-machine vision-s2
Binus Online Learning
 
Edge detection iOS application
Edge detection iOS applicationEdge detection iOS application
Edge detection iOS application
Ketan Raval
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
A B Shinde
 
Study and Comparison of Various Image Edge Detection Techniques
Study and Comparison of Various Image Edge Detection TechniquesStudy and Comparison of Various Image Edge Detection Techniques
Study and Comparison of Various Image Edge Detection Techniques
CSCJournals
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
ijcisjournal
 
09 cie552 image_featuresi
09 cie552 image_featuresi09 cie552 image_featuresi
09 cie552 image_featuresi
Elsayed Hemayed
 
YCIS_Forensic_Image Enhancement and Edge detection.pptx
YCIS_Forensic_Image Enhancement and Edge detection.pptxYCIS_Forensic_Image Enhancement and Edge detection.pptx
YCIS_Forensic_Image Enhancement and Edge detection.pptx
SharmilaMore5
 
Comparative study on image segmentation techniques
Comparative study on image segmentation techniquesComparative study on image segmentation techniques
Comparative study on image segmentation techniquesgmidhubala
 
Image segmentation techniques
Image segmentation techniquesImage segmentation techniques
Image segmentation techniques
gmidhubala
 
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEYALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
sipij
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
Azharo7
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
IJECEIAES
 
Fuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge DetectionFuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge Detection
Dawn Raider Gupta
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to Edge Detection (20)

Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge DetectionEdge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
 
Real time Canny edge detection
Real time Canny edge detectionReal time Canny edge detection
Real time Canny edge detection
 
Exploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny AlgorithmExploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny Algorithm
 
image segmentation by ppres.pptx
image segmentation by ppres.pptximage segmentation by ppres.pptx
image segmentation by ppres.pptx
 
195706916 i journals-paper-template-2013
195706916 i journals-paper-template-2013195706916 i journals-paper-template-2013
195706916 i journals-paper-template-2013
 
X-Ray Image Acquisition and Analysis
X-Ray Image Acquisition and AnalysisX-Ray Image Acquisition and Analysis
X-Ray Image Acquisition and Analysis
 
PPT s06-machine vision-s2
PPT s06-machine vision-s2PPT s06-machine vision-s2
PPT s06-machine vision-s2
 
Edge detection iOS application
Edge detection iOS applicationEdge detection iOS application
Edge detection iOS application
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Study and Comparison of Various Image Edge Detection Techniques
Study and Comparison of Various Image Edge Detection TechniquesStudy and Comparison of Various Image Edge Detection Techniques
Study and Comparison of Various Image Edge Detection Techniques
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
 
09 cie552 image_featuresi
09 cie552 image_featuresi09 cie552 image_featuresi
09 cie552 image_featuresi
 
YCIS_Forensic_Image Enhancement and Edge detection.pptx
YCIS_Forensic_Image Enhancement and Edge detection.pptxYCIS_Forensic_Image Enhancement and Edge detection.pptx
YCIS_Forensic_Image Enhancement and Edge detection.pptx
 
Comparative study on image segmentation techniques
Comparative study on image segmentation techniquesComparative study on image segmentation techniques
Comparative study on image segmentation techniques
 
Image segmentation techniques
Image segmentation techniquesImage segmentation techniques
Image segmentation techniques
 
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEYALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
 
Fuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge DetectionFuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge Detection
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Edge Detection

  • 2. What is Edge Detection? Identifying points/Edges in a digital image at which the image brightness changes sharply or has discontinuities. - Edges are significant local changes of intensity in an image. - Edges typically occur on the boundary between two different regions in an image.
  • 3. Goal of edge detection Edge detection is extensively used in image segmentation when we want to divide the image into areas corresponding to different objects. If we need to extract different object from an image, we need Edge Detection Using Edge Detection, we can: - Produce a line drawing of a scene from an image of that scene. - Important features can be extracted from the edges of an image (e.g., corners, lines, curves). - These features are used by higher-level computer vision algorithms (e.g., recognition, Image comparizon ). Unaccepted object can be remove.
  • 4. Process of Edge Detection Most of edge detection algorithm are based on one of two basic properties of intensity values: Discontinuity and similarity. Typically, there are three steps to perform edge detection: 1. Noise reduction 2. Edge enhancement 3. Edge localization
  • 5. Process of Edge Detection (...) Noise reduction where we try to suppress as much noise as possible, without smoothing away the meaningful edges. Original Image After Nois Reduction
  • 6. Process of Edge Detection (...) Edge enhancement where we apply some kind of filter that responds strongly at edges and weakly elsewhere, so that the edges may be identified as local maxima in the filter’s output . One suggestion is to use some kind of high pass filter.
  • 7. Process of Edge Detection (...) Edge localization where we decide which of the local maxima output by the filter are meaningful edges and which are caused by noise
  • 8. Process of Edge Detection (...) There are many algorithm for Edge Detection. Some are: Robert's edge detector Prewitt edge detector Sobel edge detector Frie Chen edge detector Canny edge detector Canny edge detector is giving best output, I am going to explain Canny edge detector.
  • 9. Canny Edge Detector Canny Edge Detector is complex and uses a multi-stage algorithm to detect a wide range of edges in images. It is most commonly implemented edge detection algorithm. It has three basic objectives: Low error rate Edge points should be well localized Single edge point response
  • 10. Canny Edge Detector As I mention before, canny edge detector have multiple algorithm. It have 5 steps, those are: Image Smoothing Gradient Operation Nonmaxima Suppression Hysteresis Thresholding Connectivity Analysis
  • 11. Canny Edge Detector Image Smoothing Reduce image noise by smoothing with a Gaussian The choice of σ depends on desired behavior large σ detects large scale edges small σ detects fine features The larger the width of the Gaussian mask, the lower is the detector's sensitivity to noise.
  • 13. Canny Edge Detector Nonmaxima Suppression Nonmaxima Suppression reduce thick edge strength responses around true edges select the single maximum point across the width of an edge. is used to trace along the edge in the edge direction and suppress any pixel value (sets it equal to 0) that is not considered to be an edge. This will give a thin line in the output image.
  • 14. Canny Edge Detector Hysteresis Thresholding Large intensity gradients are more likely to correspond to edges than small intensity gradients. It is in most cases impossible to specify a threshold at which a given intensity gradient switches from corresponding to an edge into not doing so. Therefore Canny uses thresholding with hysteresis. Thresholding with hysteresis requires two thresholds – high and low. Select two thresholds TH and TL such that 0 6 TL < TH 6 255 Create two new binary 2-D arrays • gNH(x; y) = gN(x y) > TH • gNL(x; y) = gN(x y) > TL Eliminate from gNL(x; y) all the nonzero pixels from gNH(x y) After this operation • gNH(x y) will contain only the strong edge points • gNL(x y) will contain only the weak edge points • They will not contain common points Ratio of TH to TL should be 2 : 1 or 3 : 1
  • 15. Canny Edge Detector Connectivity Analysis After step #4, gNH(x y) will contain the strong edge pixels { thus are valid edge pixels. However, there will be discontinuity in the edges. Longer edges are formed using the following procedure: 1 Add all the edge pixels in gNH(x y) to a list L 2 Do until there are more edge pixels in L • Locate the next unvisited edge pixel, p • Mark as valid edge pixels all the weak pixels in gNL(x y) that are connected to p (8 neighbors) • Remove p from L 3 Set to zero all pixels in gNL(x y) that were not marked as valid edge pixels 4 Combine all nonzero pixels in gNH(x y) and gNL(x y ) to find the final edge pixels Analysis
  • 17. ?
  • 18. Thank you! Jakir Hossain. ID: CSE-24th Batch. Southeast University.