SlideShare a Scribd company logo
IMAGE PROCESSING
&
FEATURE EXTRACTION
By Rishabh Shah
Feature
Detection &
Description
Feature
detection
Feature
Descriptor
Feature
Matching
PIPELINE
Feature
Detection
The Feature detection are of two types :
1)GLOBAL
2)LOCAL
LOCAL is further divided into three types:
1)SINGLE SCALE
2)Affine Invariant
3)Multi Scale
Global vs Local
 Global representation method produces a single vector with
values that measure various aspects of the image such as
color, texture or shape.
 This includes color histograms, texture, edges or even a
specific descriptor extracted from some filters applied to the
image.
 While main goal of local feature representation is to
distinctively represent the image based on some salient
regions while remaining invariant to viewpoint and
illumination changes.
 image is represented based on its local structures by a set of
local feature descriptors extracted from a set of image
regions called interest regions (i.e., keypoints)
SingleScale
 Harris corner detection : It basically finds the
difference in intensity for a displacement of in all
directions. This is expressed as below:
 We need to maximize the ‘E’(Intensity of displacement )
and hence we need to maximize the “shifted Intensity”
part of the previous equation. On maximizing we get the
following equation:
Contd..
 We get the Eigen values for the equation lambda_1 and
lambda_2. These will help us calculate the score(R):
 If R is small then L1 and L2 both will be small and hence
it indicates flat region.
 If R < 0 , now this when L1>>L2 and hence this detects
the edge .
 If R is large , Now this indicates L1 &L2 are large and
hence the corner is detected.
FASTCorner
detection
 FAST(Features from accelerated segment test), In this
method, 16 pixels around the center pixel at a radius r of the
Bresenheim circle are taken. This pixels are further checked
for their intensity values.
 Now the pixel is a corner if there exists a set of contiguous
pixels in the circle (of 16 pixels) which are all brighter than
(Ip + t) or darker then (Ip - t) .
Contd..
 Image represents the corner and hence tried to prove the FAST
algorithm.
 Fast is provided with machine learning algorithm ID3 , it is used
to classify the detected points into the classes.
 After a set of key-points are formed non-maximal suppression is
applied. Sometimes adjacent points might turnout to be corner
points and hence to avoid it the lower one is excluded.
Hessian
operator
 This operator looks for the points where it’s determinant has a
local maxima.
 Now it looks the points where the derivatives responses are high
in two orthogonal directions.
 Non-Maximum suppression is applied over the pixel values and
hence the maximum among them is carried ahead.
 Then again among all these values the once with intensity values
higher than threshold are taken ahead.
 This all is done because the second order operator is sensitive to
the noise and hence we need the pixel intensities which help in
better description of the image.
Multi -Scale
 In multi-scaling part the image key points are identified at various
scales of Gaussian kernel’s scale.
 LoG : LaplacianOf Gaussian, it is a BLOB(Binary LargeObject)
detection method. Now BLOB detection is important because
BLOB tend to represent a set of pixels sharing similar kind of
texture and hence intensity values.
 Operator response is strongly dependent on the relationship
between the size of the blob structures in the image domain and
the size of the smoothing Gaussian kernel. Standard deviation in
Gaussian kernel handles the scaling part.
Contd…
 It directly searches for scale invariant features due it’s ability to
find 3D Extrema. It is also circular due to which it is rotation
invariant.
Difference of
Gaussian
 DOG- Difference of Gaussian,The DoG function D(x, y,σ) can be
computed without convolution by subtracting adjacent scale
levels of a Gaussian pyramid separated by a factor k.
 We need to select the center pixel and see whether it is greater
than every other pixel around it .
GaborWavelet
 The Gabor wavelets are biologically motivated convolution kernels
in the shape of plane waves restricted by a Gaussian envelope
function.
 The advantage of Gabor wavelets is that they provides
simultaneous optimal resolution in both space and spatial
frequency domains.Additionally, Gabor wavelets have the
capability of enhancing low level features such as peaks, valleys
and ridges.
 Sai, represents the wavelet. he coefficients of the convolution,
represent the information in a local image region, which should be
more effective than isolated pixels
Feature
Descriptor
 SIFT(Scale Invariant FeatureTransform):
 SCALE SPACE EXTREMA DETECTION: It is nothing but DoG,
hence we further down-sample the image.
 KEYPOINT LOCALIZATION :There are some changes in intensity
values upon changing the brightness and other things and hence
to prevent changes in the keypoints some measures have to be
taken. So we have intensity threshold determined empirically and
similarly we have contrast threshold determined.
We also have hessian matrix for computing the curvature.
Contd..
 ORIENTATIONASSIGNMENT:We have to have , the keypoints
invariant to rotation.
 A set of orientation histograms is created where each histogram
contains samples from a 4×4 sub region of the original
neighborhood region and having eight orientations bins in each.
 Hence we have 36 bins of size 10 each (36 X 10 = 360 degrees).
 The peak is the direction of the key point.
 SIFT DESCRIPTOR:The descriptor is then formed from a vector
containing the values of all the orientation histograms entries.
Since there are 4 × 4 histograms each with 8 bins, the feature
vector has 4 × 4 × 8 = 128 elements for each key point
SpeededUp
Robust
Features
Detection
(SURF)
 SURF, It uses 2D Box Filter like Hessian Operator unlike SIFT , its
basic idea is to approximate the second order Gaussian derivatives
in an efficient way with the help of integral images using a set of
box filters.
 w is a relative weight for the filter response and it is used to
balance the expression for the Hessian’s determinant.
 The approximated determinant of the Hessian represents the blob
response in the image.
 The SURF descriptor starts by constructing a square region
centered around the detected interest point, and oriented along
its main orientation
Contd..
 The interest region is further divided into smaller 4 × 4 sub-regions
and for each sub region the Harr wavelet responses in the vertical
and horizontal directions.
 The wavelet responses dx and dy are summed up for each sub-
region and entered in a feature vector v.
 Computing this for all the 4 × 4 sub-regions, resulting a feature
descriptor of length 4 × 4 × 4 = 64 dimensions.
LBP- Local
Binary Pattern
 It characterizes the spatial structure of the texture.
 The LBP feature descriptor:
 LBP has the advantage of tolerance of illumination changes and
computational simplicity.Also, the LBP and its variants achieve
great success in texture description. Unfortunately, the LBP
feature is an index of discrete patterns rather than a numerical
feature.
Feature
Matching
 Once the features and their descriptors have been extracted from
two or more images, the next step is to establish some preliminary
feature matches between these images.
 Basics of Brute-Force Matcher
 Brute-Force matcher is simple. It takes the descriptor of one
feature in first set and is matched with all other features in second
set using some distance calculation.And the closest one is
returned.
 FLANN based Matcher
 FLANN stands for Fast Library for Approximate Nearest
Neighbors. It contains a collection of algorithms optimized for fast
nearest neighbor search in large datasets and for high dimensional
features. It works more faster than BFMatcher for large datasets
Contd…
 To suppress matching candidates for which the correspondence
may be regarded as ambiguous, the ratio between the distances
to the nearest and the next nearest image descriptor is required to
be less than some threshold
THE END.

More Related Content

What's hot

Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
Ahmed Daoud
 
Digital image processing
Digital image processing  Digital image processing
Digital image processing
kavitha muneeshwaran
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & Descriptors
PundrikPatel
 
Canny Edge Detection
Canny Edge DetectionCanny Edge Detection
Canny Edge Detection
SN Chakraborty
 
Feature detection and matching
Feature detection and matchingFeature detection and matching
Feature detection and matching
Kuppusamy P
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Bulbul Agrawal
 
IMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESIMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUES
Vicky Kumar
 
Color image processing Presentation
Color image processing PresentationColor image processing Presentation
Color image processing Presentation
Revanth Chimmani
 
Image Segmentation
 Image Segmentation Image Segmentation
Image Segmentation
Syed Muhammad Hammad
 
Hough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamHough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul Islam
Nazmul Islam
 
Sharpening spatial filters
Sharpening spatial filtersSharpening spatial filters
Image segmentation
Image segmentationImage segmentation
Image segmentation
Kuppusamy P
 
Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)
VARUN KUMAR
 
Feature detection - Image Processing
Feature detection - Image ProcessingFeature detection - Image Processing
Feature detection - Image Processing
Ritesh Kanjee
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
ramya marichamy
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
asodariyabhavesh
 
Intensity Transformation
Intensity TransformationIntensity Transformation
Intensity Transformation
Amnaakhaan
 
Spatial filtering using image processing
Spatial filtering using image processingSpatial filtering using image processing
Spatial filtering using image processing
Anuj Arora
 
06 spatial filtering DIP
06 spatial filtering DIP06 spatial filtering DIP
06 spatial filtering DIP
babak danyal
 
Segmentation
SegmentationSegmentation
Segmentation
guest49d49
 

What's hot (20)

Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
 
Digital image processing
Digital image processing  Digital image processing
Digital image processing
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & Descriptors
 
Canny Edge Detection
Canny Edge DetectionCanny Edge Detection
Canny Edge Detection
 
Feature detection and matching
Feature detection and matchingFeature detection and matching
Feature detection and matching
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
IMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESIMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUES
 
Color image processing Presentation
Color image processing PresentationColor image processing Presentation
Color image processing Presentation
 
Image Segmentation
 Image Segmentation Image Segmentation
Image Segmentation
 
Hough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamHough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul Islam
 
Sharpening spatial filters
Sharpening spatial filtersSharpening spatial filters
Sharpening spatial filters
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)
 
Feature detection - Image Processing
Feature detection - Image ProcessingFeature detection - Image Processing
Feature detection - Image Processing
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
 
Intensity Transformation
Intensity TransformationIntensity Transformation
Intensity Transformation
 
Spatial filtering using image processing
Spatial filtering using image processingSpatial filtering using image processing
Spatial filtering using image processing
 
06 spatial filtering DIP
06 spatial filtering DIP06 spatial filtering DIP
06 spatial filtering DIP
 
Segmentation
SegmentationSegmentation
Segmentation
 

Similar to Image feature extraction

06 image features
06 image features06 image features
06 image features
ankit_ppt
 
Scale Invariant Feature Tranform
Scale Invariant Feature TranformScale Invariant Feature Tranform
Scale Invariant Feature Tranform
Shanker Naik
 
Local binary pattern
Local binary patternLocal binary pattern
Local binary pattern
International Islamic University
 
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFTImproved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
Nooria Sukmaningtyas
 
search engine for images
search engine for imagessearch engine for images
search engine for images
Anjani
 
Lec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdfLec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdf
nagwaAboElenein
 
Image Processing
Image ProcessingImage Processing
Image Processing
Tuyen Pham
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Object tracking with SURF: ARM-Based platform Implementation
Object tracking with SURF: ARM-Based platform ImplementationObject tracking with SURF: ARM-Based platform Implementation
Object tracking with SURF: ARM-Based platform Implementation
Editor IJCATR
 
4-RSSI-Spectral Domain Image Transforms_1.pdf
4-RSSI-Spectral Domain Image Transforms_1.pdf4-RSSI-Spectral Domain Image Transforms_1.pdf
4-RSSI-Spectral Domain Image Transforms_1.pdf
muhammadwalidmido
 
BilateralFiltering
BilateralFilteringBilateralFiltering
BilateralFiltering
Jacob Logas
 
Literature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based WatermarkingLiterature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based Watermarking
Priyatham Bollimpalli
 
3rd unit.pptx
3rd unit.pptx3rd unit.pptx
3rd unit.pptx
ssuser0bf6a8
 
SIFT
SIFTSIFT
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
sipij
 
Edge detection
Edge detectionEdge detection
Edge detection
Kalyan Srivatsav
 
2024-master dityv5y65v56u4b6u64u46p 0318-25.pdf
2024-master dityv5y65v56u4b6u64u46p 0318-25.pdf2024-master dityv5y65v56u4b6u64u46p 0318-25.pdf
2024-master dityv5y65v56u4b6u64u46p 0318-25.pdf
natnaeltamirat6212
 
image segmentation by ppres.pptx
image segmentation by ppres.pptximage segmentation by ppres.pptx
image segmentation by ppres.pptx
mohan134666
 
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
sipij
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentation
wolf
 

Similar to Image feature extraction (20)

06 image features
06 image features06 image features
06 image features
 
Scale Invariant Feature Tranform
Scale Invariant Feature TranformScale Invariant Feature Tranform
Scale Invariant Feature Tranform
 
Local binary pattern
Local binary patternLocal binary pattern
Local binary pattern
 
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFTImproved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
 
search engine for images
search engine for imagessearch engine for images
search engine for images
 
Lec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdfLec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdf
 
Image Processing
Image ProcessingImage Processing
Image Processing
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Object tracking with SURF: ARM-Based platform Implementation
Object tracking with SURF: ARM-Based platform ImplementationObject tracking with SURF: ARM-Based platform Implementation
Object tracking with SURF: ARM-Based platform Implementation
 
4-RSSI-Spectral Domain Image Transforms_1.pdf
4-RSSI-Spectral Domain Image Transforms_1.pdf4-RSSI-Spectral Domain Image Transforms_1.pdf
4-RSSI-Spectral Domain Image Transforms_1.pdf
 
BilateralFiltering
BilateralFilteringBilateralFiltering
BilateralFiltering
 
Literature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based WatermarkingLiterature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based Watermarking
 
3rd unit.pptx
3rd unit.pptx3rd unit.pptx
3rd unit.pptx
 
SIFT
SIFTSIFT
SIFT
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 
Edge detection
Edge detectionEdge detection
Edge detection
 
2024-master dityv5y65v56u4b6u64u46p 0318-25.pdf
2024-master dityv5y65v56u4b6u64u46p 0318-25.pdf2024-master dityv5y65v56u4b6u64u46p 0318-25.pdf
2024-master dityv5y65v56u4b6u64u46p 0318-25.pdf
 
image segmentation by ppres.pptx
image segmentation by ppres.pptximage segmentation by ppres.pptx
image segmentation by ppres.pptx
 
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
EFFECTIVE INTEREST REGION ESTIMATION MODEL TO REPRESENT CORNERS FOR IMAGE
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentation
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 

Image feature extraction

  • 3. Feature Detection The Feature detection are of two types : 1)GLOBAL 2)LOCAL LOCAL is further divided into three types: 1)SINGLE SCALE 2)Affine Invariant 3)Multi Scale
  • 4. Global vs Local  Global representation method produces a single vector with values that measure various aspects of the image such as color, texture or shape.  This includes color histograms, texture, edges or even a specific descriptor extracted from some filters applied to the image.  While main goal of local feature representation is to distinctively represent the image based on some salient regions while remaining invariant to viewpoint and illumination changes.  image is represented based on its local structures by a set of local feature descriptors extracted from a set of image regions called interest regions (i.e., keypoints)
  • 5. SingleScale  Harris corner detection : It basically finds the difference in intensity for a displacement of in all directions. This is expressed as below:  We need to maximize the ‘E’(Intensity of displacement ) and hence we need to maximize the “shifted Intensity” part of the previous equation. On maximizing we get the following equation:
  • 6. Contd..  We get the Eigen values for the equation lambda_1 and lambda_2. These will help us calculate the score(R):  If R is small then L1 and L2 both will be small and hence it indicates flat region.  If R < 0 , now this when L1>>L2 and hence this detects the edge .  If R is large , Now this indicates L1 &L2 are large and hence the corner is detected.
  • 7. FASTCorner detection  FAST(Features from accelerated segment test), In this method, 16 pixels around the center pixel at a radius r of the Bresenheim circle are taken. This pixels are further checked for their intensity values.  Now the pixel is a corner if there exists a set of contiguous pixels in the circle (of 16 pixels) which are all brighter than (Ip + t) or darker then (Ip - t) .
  • 8. Contd..  Image represents the corner and hence tried to prove the FAST algorithm.  Fast is provided with machine learning algorithm ID3 , it is used to classify the detected points into the classes.  After a set of key-points are formed non-maximal suppression is applied. Sometimes adjacent points might turnout to be corner points and hence to avoid it the lower one is excluded.
  • 9. Hessian operator  This operator looks for the points where it’s determinant has a local maxima.  Now it looks the points where the derivatives responses are high in two orthogonal directions.  Non-Maximum suppression is applied over the pixel values and hence the maximum among them is carried ahead.  Then again among all these values the once with intensity values higher than threshold are taken ahead.  This all is done because the second order operator is sensitive to the noise and hence we need the pixel intensities which help in better description of the image.
  • 10. Multi -Scale  In multi-scaling part the image key points are identified at various scales of Gaussian kernel’s scale.  LoG : LaplacianOf Gaussian, it is a BLOB(Binary LargeObject) detection method. Now BLOB detection is important because BLOB tend to represent a set of pixels sharing similar kind of texture and hence intensity values.  Operator response is strongly dependent on the relationship between the size of the blob structures in the image domain and the size of the smoothing Gaussian kernel. Standard deviation in Gaussian kernel handles the scaling part.
  • 11. Contd…  It directly searches for scale invariant features due it’s ability to find 3D Extrema. It is also circular due to which it is rotation invariant.
  • 12. Difference of Gaussian  DOG- Difference of Gaussian,The DoG function D(x, y,σ) can be computed without convolution by subtracting adjacent scale levels of a Gaussian pyramid separated by a factor k.  We need to select the center pixel and see whether it is greater than every other pixel around it .
  • 13. GaborWavelet  The Gabor wavelets are biologically motivated convolution kernels in the shape of plane waves restricted by a Gaussian envelope function.  The advantage of Gabor wavelets is that they provides simultaneous optimal resolution in both space and spatial frequency domains.Additionally, Gabor wavelets have the capability of enhancing low level features such as peaks, valleys and ridges.  Sai, represents the wavelet. he coefficients of the convolution, represent the information in a local image region, which should be more effective than isolated pixels
  • 14. Feature Descriptor  SIFT(Scale Invariant FeatureTransform):  SCALE SPACE EXTREMA DETECTION: It is nothing but DoG, hence we further down-sample the image.  KEYPOINT LOCALIZATION :There are some changes in intensity values upon changing the brightness and other things and hence to prevent changes in the keypoints some measures have to be taken. So we have intensity threshold determined empirically and similarly we have contrast threshold determined. We also have hessian matrix for computing the curvature.
  • 15. Contd..  ORIENTATIONASSIGNMENT:We have to have , the keypoints invariant to rotation.  A set of orientation histograms is created where each histogram contains samples from a 4×4 sub region of the original neighborhood region and having eight orientations bins in each.  Hence we have 36 bins of size 10 each (36 X 10 = 360 degrees).  The peak is the direction of the key point.  SIFT DESCRIPTOR:The descriptor is then formed from a vector containing the values of all the orientation histograms entries. Since there are 4 × 4 histograms each with 8 bins, the feature vector has 4 × 4 × 8 = 128 elements for each key point
  • 16. SpeededUp Robust Features Detection (SURF)  SURF, It uses 2D Box Filter like Hessian Operator unlike SIFT , its basic idea is to approximate the second order Gaussian derivatives in an efficient way with the help of integral images using a set of box filters.  w is a relative weight for the filter response and it is used to balance the expression for the Hessian’s determinant.  The approximated determinant of the Hessian represents the blob response in the image.  The SURF descriptor starts by constructing a square region centered around the detected interest point, and oriented along its main orientation
  • 17. Contd..  The interest region is further divided into smaller 4 × 4 sub-regions and for each sub region the Harr wavelet responses in the vertical and horizontal directions.  The wavelet responses dx and dy are summed up for each sub- region and entered in a feature vector v.  Computing this for all the 4 × 4 sub-regions, resulting a feature descriptor of length 4 × 4 × 4 = 64 dimensions.
  • 18. LBP- Local Binary Pattern  It characterizes the spatial structure of the texture.  The LBP feature descriptor:  LBP has the advantage of tolerance of illumination changes and computational simplicity.Also, the LBP and its variants achieve great success in texture description. Unfortunately, the LBP feature is an index of discrete patterns rather than a numerical feature.
  • 19. Feature Matching  Once the features and their descriptors have been extracted from two or more images, the next step is to establish some preliminary feature matches between these images.  Basics of Brute-Force Matcher  Brute-Force matcher is simple. It takes the descriptor of one feature in first set and is matched with all other features in second set using some distance calculation.And the closest one is returned.  FLANN based Matcher  FLANN stands for Fast Library for Approximate Nearest Neighbors. It contains a collection of algorithms optimized for fast nearest neighbor search in large datasets and for high dimensional features. It works more faster than BFMatcher for large datasets
  • 20. Contd…  To suppress matching candidates for which the correspondence may be regarded as ambiguous, the ratio between the distances to the nearest and the next nearest image descriptor is required to be less than some threshold