SlideShare a Scribd company logo
H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115
www.ijera.com 112 | P a g e
Edge Detection Using Directional Filtering
H. Aboelsoud M.
(Military Technical Colleague – Egyptian Armed Forces)
ABSTRACT
Edge detection can be performed by applying an edge filter in n directions. Conceptually, in order to estimate
gradient, that is, to determine the edge map, eight filtering directions, e.g. (0, π/8, π/4, 3π/8, π/2, 5π/8, 3π/4,
7π/8), constitute the sufficient basis for the gradient calculation. Computationally, such a two-dimensional (2-D)
eight-directional filter can be represented by a pair of real masks, that is, by one complex-number matrix. Final
edges are determined after applying the non-maximum suppression followed by thresholding with hysteresis
algorithms to obtain smooth and connected edge map.
Keywords - Conjugate images, directional filtering, edge detection.
I. INTRODUCTION
An edge is characterized by an abrupt change in
intensity indicating the boundary between two
regions in an image. It is a local property of an
individual pixel and is calculated from the image
function in a neighborhood of the pixel. Edge
detection is a fundamental operation in computer
vision and image processing. It concerns the
detection of significant variations of a grey level
image. The output of this operation is mainly used in
higher-level visual processing like three-dimensional
(3-D) reconstruction, stereo motion analysis,
recognition, scene segmentation, image compression,
etc. Hence, it is important for a detector to be
efficient and reliable [1].
In computer vision, edge detection is
traditionally implemented by convolving the image
with some form of linear filter, usually a filter that
approximates a first or second derivative operator.
An odd symmetric filter will approximate a first
derivative, and peaks in the convolution output will
correspond to edges (luminance discontinuities) in
the image. An even symmetric filter will approximate
a second derivative operator. Zero-crossings in the
output of convolution with an even symmetric filter
will correspond to edges [2].
If we ignore the noise present in images, edge
detection can be based primarily on the computation
of the gradient of intensity with subsequent
thresholding of its magnitude. For this purpose the
popular filters, like the Sobel filter [3], are used.
Hence, a typical simple method of obtaining an edge
strength map is based on the estimation of two
components of the intensity gradient vector using
horizontal and vertical Sobel masks. Taking noise
and edge imperfection into consideration, edge filters
are traditionally constructed so as to improve the
suppression of unwanted disturbances by appropriate
lowpass filtering. The idea has originated perhaps
from the concept of stochastic gradient [4] and from
work of Marr and Hildreth [5], and in its current form
was introduced by Canny [6] and developed further
in many works using various criteria of optimality of
the edge detection process. Following a classification
of the optimal one-dimensional (1-D) edge filters
presented by Heijden [7], the following operators are
considered to be the main contenders: Canny [6] and
its version by Deriche [8], Shen–Castan [9], [10],
(see also [11]), Sarkar–Boyer [12], Boie–Cox [13],
Spacek [14], Petrou-Kittler [15], and the CVM
detector of Heijden [7]. The above filters were
primarily constructed as 1-D filters and then extended
appropriately into two dimensions.
This paper is focused on the use of directional
filtering for edge detection. We show that,
eventually, a 2-D eight-directional edge filter can be
represented by a pair of matrix filters, or equivalently
by one complex-number filter. We start with the
description of the details of the eight-directional 2-D
edge filter. In the next section we present
experimental results of its application for edge
detection in real life images. Finally, a conclusion is
presented in Section-4.
RESEARCH ARTICLE OPEN ACCESS
H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115
www.ijera.com 113 | P a g e
(9)
(10)
(11)
II. Eight-Directional Filter
Consider a digital grey level image F(x,y),
assume we wish to convolve the image with a 2D
Gaussian filter to smooth it. The 2D Gaussian
smoothing operator G(x,y) is given by:
e
yx
yxG


2
1 2
22
2
)(
),(


(1)
where x,y are the image co-ordinates and σ is a
standard deviation of the associated probability
distribution [16].
Let f(x,y) denotes to the smoothed image, then:
f(x,y) = F(x,y)  G(x,y) (2)
where  denotes to the convolution operation.
Consider a neighborhood R of a pixel (x,y) expanded
in the direction d as shown in Fig. 1. A general
nonlinear filtering operation over the region R may
now be defined by [17]:
f(x,y)→g((x,y);R)=  
R
uuuyuxfh )),,(( 21 (3)
where f(x,y) and g((x,y);R) are the smoothed and
filtered images respectively, such a region of interest
is rotated in the directions(d1; ……. ; dn) to cover the
whole 2π angle.
Fig. 1 Directional neighborhood of a pixel (x,y)
Applying the filtering operation (3) over the
region
R k
; we obtain a so-called conjugate image,
gk (x,y). The edge strength may now be calculated by
performing a vector addition of conjugate images.
Using the complex-number notation, we have:


n
k
j
km
k
eyxgyxg
1
),(),(  (4)
where gm(x,y) is a complex-number-valued edge
strength and its magnitude specifies a scalar edge
strength.
If we use linear filters, then a conjugate image in the
kth
direction is calculated as a convolution of the
smoothed image, f(x,y); with a kth
directional filter,
h k , as follows:
gk(x,y) = f(x,y)  h k (x,y) (5)
Now, the complex edge strength can be obtained as a
convolution of the smoothed image, f(x,y); with the
complex edge filter h(x,y), as follows:
 



n
1k
kj
km ey))(x,hy)f(x,()y,x(g (6)




n
1k
kj
km ey)(x,h)y,x(f)y,x(g (7)
gm(x,y) = f(x,y) h(x,y) (8)
where h(x,y) is a sum of appropriately rotated filter
components.
In order to estimate two components of the intensity
gradient, eight filtering directions (aiming at
detecting edges in all directions), e.g. (0, π/8, π/4,
3π/8, π/2, 5π/8, 3π/4, 7π/8), might be required. In this
case, there are eight directions, θk=k π/8,
k=0,1,2,….,7, thus eight filtering regions.
The complex “eight-directional” edge filter, h; can be
directly determined using (7) by adding eight uni-
directional components, namely:
8/7j
8/7
4/3j
4/3
8/5j
8/5
2/j
2/
8/3j
8/3
4/j
4/
8/j
8/0
eheheheh
ehehehhh
















for the simplicity let “a” denotes to 8/j
e 
, then:
a.
00000
ja0000
0000
0000ja
00000
a.
00000
0ja000
00000
000ja0
00000
a.
0j000
00000
00000
00000
000j0
a.
00000
00a00
00000
00a00
00000
a.
000a0
00000
00000
00000
0a000
a.
00000
000a0
00000
0a000
00000
a.
00000
00001
00000
10000
00000
a.
00000
00000
0a0a0
00000
00000
h
2
2
3
3
2
2
11














































































































































 
Then the complex edge filter can be calculated as:
a.
0j0a0
jajaaa1
0a0a0
1aajaja
0a0j0
h
2
23
11
32
2


















 
H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115
www.ijera.com 114 | P a g e
(12)








































0107071.00
7071.09239.09239.03827.00
03827.003827.00
13827.09239.09239.07071.0
07071.0010
.j
0007071.00
7071.03827.03827.09239.01
09239.009239.00
19239.03827.03827.07071.0
07071.0000
h
From equations (11), and (12), a 2D eight-directional
edge filter can be represented by a pair of matrix
filters, or, equivalently by one complex-number filter.
Fig. 2 shows its frequency response.
Fig. 2 Frequency response of eight-directional filter
Equation (12) can be written as:
h(x,y) = hx(x,y) + j hy(x,y) (13)
From equation (8), the edge strength is given by:
gm(x,y) = f(x,y)  (hx(x,y) + j hy(x,y)) (14)
gm(x,y) = (f(x,y) (hx(x,y))
+ j (f(x,y) hy(x,y)) (15)
gm(x,y) = fx(x,y) + j fy(x,y) (16)
its magnitude is given by:
2
y
2
xm ))y,x(f())y,x(f())y,x(g(mag  (17)
and its direction by )
)y,x(f
)y,x(f
(tan
x
y1 .
III. EXPERIMENTAL RESULTS
The eight-directional edge filter has been
tested with three images: Wall image (Fig. 3), X-ray
image of brain (Fig. 4), and CT image of abdomen
(Fig. 5), and some results are presented in Fig. 6,
Fig.7, and Fig.8 respectively.
Fig. 3 A 256 ×256 Wall image.
Fig. 4 X-ray image of brain
Fig. 5 CT abdomen image
Fig. 6. (a): magnitude of the edge strength obtained
using eight-directional filter of (12). (b): edge map
after non-maximum and thresholding operations
(lower thresh = 0.08, and upper thresh =0.2).
Fig. 7. (a): magnitude of the edge strength obtained
using eight-directional filter of (12). (b): edge map
after non-maximum and thresholding operations
(lower thresh = 0.06, and upper thresh =0.15).
(a)
H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115
www.ijera.com 115 | P a g e
(b)
Fig. 8 (a): magnitude of the edge strength obtained
using eight-directional filter of (12). (b): edge map
after non-maximum and thresholding operations
(lower thresh = 0.048, and upper thresh =0.12).
Figures 6(a), 7(a), and 8(a), illustrate the edge
strength maps generated using convolution of images
with the eight-directional filter of (12). In Figures
6(b), 7(b), and 8(b), the above maps are presented
after operations of the non-maximum suppression
followed by thresholding with hysteresis algorithms.
The threshold parameters are manually adjusted for
best results. It is clear from the figures, that the edge
maps generated using convolution of images with the
eight-directional filter of (12) contain many visibly
important edges.
IV. CONCLUSION
Physical edges are one of the most important
properties of objects. They correspond to object
boundaries or to changes in surface orientation or
material properties. Edges help to extracting useful
information and characteristics of an image.
In this paper, we have discussed how to build a
2-D edge filter that collects information from eight
directions around a central pixel. We show that, such
a 2-D eight-directional filter can be represented by a
pair of real masks, that is, by one complex-number
matrix.
The above filter has been tested in the
preceding section. The test is performed on three real
life images. The final edges are determined after
operations of the non-maximum suppression
followed by thresholding with hysteresis algorithms.
It is to be noted that on all the real life images
considered, the eight-directional edge filter produced
fairly good results.
REFERENCES
[1] Rishi R. Rakesh, Probal Chaudhuri, and C. A.
Murthy „Thresholding in Edge Detection: A
Statistical Approach‟ IEEE Transactions on
image processing, vol. 13, no. 7, July 2004.
[2] E. Davies, “Machine Vision: Theory,
Algorithms and Practicalities”, Academic
Press, pp 101 – 110, 1990.
[3] R. M. Haralick and L. S. Shapiro, Computer
Vision, vol. 1. Reading, MA: Addison-Wesley,
1992.
[4] A. K. Jain, Fundamentals of Digital Image
Processing. Englewood Cliffs, NJ: Prentice-
Hall, 1989.
[5] D. Marr and E. Hildreth, “Theory of edge
detection,” in Proc. R. Soc. Lond. B, vol. 207,
pp. 187–217, 1980.
[6] J. Canny, “A computational approach to edge
detection,” IEEE Trans .Pattern Anal.
Machine Intell., vol. PAMI-8, pp. 679–698,
Nov. 1986.
[7] F. van der Heijden, “Edge and line feature
extraction based on covariance models,”
IEEE Trans. Pattern Anal. Machine Intell.,
vol. 17, pp. 16–33, Jan. 1995.
[8] R. Deriche, “Using Canny‟s criteria to derive
a recursively implemented optimal edge
detector,” Int. J. Comput. Vis., vol. 1, pp.
167–187, 1987.
[9] J. Shen and S. Castan, “An optimal linear
operator for edge detection,” CVGIP: Graph.
Models Image Processing, vol. 54, pp. 112–
133, Mar. 1992.
[10] “Toward the unification of band-limited
derivative operators for edge detection,”
Signal Process., vol. 31, pp. 103–119, 1993.
[11] K. R. Rao and J. Ben-Arie, “Optimal edge
detection using expansion matching and
restoration,” IEEE Trans. Pattern Anal.
Machine Intell., vol. 16, pp. 1169–1182, Dec.
1994.
[12] S. Sarkar and K. L. Boyer, “On optimal
infinite impulse response edge detection
filters,” IEEE Trans. Pattern Anal. Machine
Intell., vol. 13, pp. 1154–1171, Nov. 1991.
[13] R. Boie and I. Cox, “Two dimensional
optimum edge recognition using matched and
Wiener filters for machine vision,” in Proc.
Int. Conf. Computer Vision, London, U.K.,
1997, pp. 450–456.
[14] L. A. Spacek, “Edge detection and motion
detection,” Image Vis. Comput., vol. 4, pp.
43–56, Feb. 1986.
[15] M. Petrou and J. Kittler, “Optimal edge
detectors for ramp edges,” IEEE Trans.
Pattern Anal. Machine Intell., vol. 13, pp.
483–491, May 1991.
[16] Milan Sonka, Vaclav Hlavac, and Roger
Boyle, “Image Processing, Analysis and
Machine Vision,” 1993.
[17] Andrew P. Paplinski, “Directional Filtering in
Edge Detection,” IEEE Tran. Image Proc.,
Vol. 7, No. 4, pp. 611-615, APRIL 1998.

More Related Content

What's hot

Snakes in Images (Active contour tutorial)
Snakes in Images (Active contour tutorial)Snakes in Images (Active contour tutorial)
Snakes in Images (Active contour tutorial)Yan Xu
 
Image Restoration And Reconstruction
Image Restoration And ReconstructionImage Restoration And Reconstruction
Image Restoration And Reconstruction
Amnaakhaan
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
asodariyabhavesh
 
Iaetsd an enhanced circular detection technique rpsw using circular hough t...
Iaetsd an enhanced circular detection technique   rpsw using circular hough t...Iaetsd an enhanced circular detection technique   rpsw using circular hough t...
Iaetsd an enhanced circular detection technique rpsw using circular hough t...
Iaetsd Iaetsd
 
Overlapping T-block analysis and genetic optimization of rectangular grooves ...
Overlapping T-block analysis and genetic optimization of rectangular grooves ...Overlapping T-block analysis and genetic optimization of rectangular grooves ...
Overlapping T-block analysis and genetic optimization of rectangular grooves ...Yong Heui Cho
 
Image Restitution Using Non-Locally Centralized Sparse Representation Model
Image Restitution Using Non-Locally Centralized Sparse Representation ModelImage Restitution Using Non-Locally Centralized Sparse Representation Model
Image Restitution Using Non-Locally Centralized Sparse Representation Model
IJERA Editor
 
Basics of edge detection and forier transform
Basics of edge detection and forier transformBasics of edge detection and forier transform
Basics of edge detection and forier transform
Simranjit Singh
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
Shajun Nisha
 
Image restoration recent_advances_and_applications
Image restoration recent_advances_and_applicationsImage restoration recent_advances_and_applications
Image restoration recent_advances_and_applications
M Pardo
 
Edge Detection using Hough Transform
Edge Detection using Hough TransformEdge Detection using Hough Transform
Edge Detection using Hough Transform
Mrunal Selokar
 
Theories and Engineering Technics of 2D-to-3D Back-Projection Problem
Theories and Engineering Technics of 2D-to-3D Back-Projection ProblemTheories and Engineering Technics of 2D-to-3D Back-Projection Problem
Theories and Engineering Technics of 2D-to-3D Back-Projection Problem
Seongcheol Baek
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
lalithambiga kamaraj
 
Digital image processing
Digital image processing  Digital image processing
Digital image processing
kavitha muneeshwaran
 
Robust Image Denoising in RKHS via Orthogonal Matching Pursuit
Robust Image Denoising in RKHS via Orthogonal Matching PursuitRobust Image Denoising in RKHS via Orthogonal Matching Pursuit
Robust Image Denoising in RKHS via Orthogonal Matching Pursuit
Pantelis Bouboulis
 
Detection of Seam Carving in Uncompressed Images using eXtreme Gradient Boosting
Detection of Seam Carving in Uncompressed Images using eXtreme Gradient BoostingDetection of Seam Carving in Uncompressed Images using eXtreme Gradient Boosting
Detection of Seam Carving in Uncompressed Images using eXtreme Gradient Boosting
IJCSIS Research Publications
 
Digital Image Processing - Image Restoration
Digital Image Processing - Image RestorationDigital Image Processing - Image Restoration
Digital Image Processing - Image Restoration
Mathankumar S
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
Ahmed Daoud
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
Wael Sharba
 
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
iosrjce
 

What's hot (20)

Snakes in Images (Active contour tutorial)
Snakes in Images (Active contour tutorial)Snakes in Images (Active contour tutorial)
Snakes in Images (Active contour tutorial)
 
Image Restoration And Reconstruction
Image Restoration And ReconstructionImage Restoration And Reconstruction
Image Restoration And Reconstruction
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
 
Iaetsd an enhanced circular detection technique rpsw using circular hough t...
Iaetsd an enhanced circular detection technique   rpsw using circular hough t...Iaetsd an enhanced circular detection technique   rpsw using circular hough t...
Iaetsd an enhanced circular detection technique rpsw using circular hough t...
 
Overlapping T-block analysis and genetic optimization of rectangular grooves ...
Overlapping T-block analysis and genetic optimization of rectangular grooves ...Overlapping T-block analysis and genetic optimization of rectangular grooves ...
Overlapping T-block analysis and genetic optimization of rectangular grooves ...
 
Image Restitution Using Non-Locally Centralized Sparse Representation Model
Image Restitution Using Non-Locally Centralized Sparse Representation ModelImage Restitution Using Non-Locally Centralized Sparse Representation Model
Image Restitution Using Non-Locally Centralized Sparse Representation Model
 
Basics of edge detection and forier transform
Basics of edge detection and forier transformBasics of edge detection and forier transform
Basics of edge detection and forier transform
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
 
Image restoration recent_advances_and_applications
Image restoration recent_advances_and_applicationsImage restoration recent_advances_and_applications
Image restoration recent_advances_and_applications
 
Image transforms
Image transformsImage transforms
Image transforms
 
Edge Detection using Hough Transform
Edge Detection using Hough TransformEdge Detection using Hough Transform
Edge Detection using Hough Transform
 
Theories and Engineering Technics of 2D-to-3D Back-Projection Problem
Theories and Engineering Technics of 2D-to-3D Back-Projection ProblemTheories and Engineering Technics of 2D-to-3D Back-Projection Problem
Theories and Engineering Technics of 2D-to-3D Back-Projection Problem
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Digital image processing
Digital image processing  Digital image processing
Digital image processing
 
Robust Image Denoising in RKHS via Orthogonal Matching Pursuit
Robust Image Denoising in RKHS via Orthogonal Matching PursuitRobust Image Denoising in RKHS via Orthogonal Matching Pursuit
Robust Image Denoising in RKHS via Orthogonal Matching Pursuit
 
Detection of Seam Carving in Uncompressed Images using eXtreme Gradient Boosting
Detection of Seam Carving in Uncompressed Images using eXtreme Gradient BoostingDetection of Seam Carving in Uncompressed Images using eXtreme Gradient Boosting
Detection of Seam Carving in Uncompressed Images using eXtreme Gradient Boosting
 
Digital Image Processing - Image Restoration
Digital Image Processing - Image RestorationDigital Image Processing - Image Restoration
Digital Image Processing - Image Restoration
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...
 

Viewers also liked

W04408116121
W04408116121W04408116121
W04408116121
IJERA Editor
 
A045050107
A045050107A045050107
A045050107
IJERA Editor
 
Ci4301487491
Ci4301487491Ci4301487491
Ci4301487491
IJERA Editor
 
H45014650
H45014650H45014650
H45014650
IJERA Editor
 
O044049498
O044049498O044049498
O044049498
IJERA Editor
 
Rol i znachenie_pamyati_v_deyatelnosti_operatora
Rol i znachenie_pamyati_v_deyatelnosti_operatoraRol i znachenie_pamyati_v_deyatelnosti_operatora
Rol i znachenie_pamyati_v_deyatelnosti_operatora
СНУЯЭиП
 
L0440285459
L0440285459L0440285459
L0440285459
IJERA Editor
 
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
IJERA Editor
 
T4409103113
T4409103113T4409103113
T4409103113
IJERA Editor
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
IJERA Editor
 
Statistical Evaluation of Wastewater Characteristics at the Inlet – Outlet of...
Statistical Evaluation of Wastewater Characteristics at the Inlet – Outlet of...Statistical Evaluation of Wastewater Characteristics at the Inlet – Outlet of...
Statistical Evaluation of Wastewater Characteristics at the Inlet – Outlet of...
IJERA Editor
 
C044021013
C044021013C044021013
C044021013
IJERA Editor
 
A comparative study for detection and measurement of voltage disturbance in o...
A comparative study for detection and measurement of voltage disturbance in o...A comparative study for detection and measurement of voltage disturbance in o...
A comparative study for detection and measurement of voltage disturbance in o...
IJERA Editor
 
моя презентация диссертации "Развитие эмоциональной направленности студентов...
моя презентация диссертации  "Развитие эмоциональной направленности студентов...моя презентация диссертации  "Развитие эмоциональной направленности студентов...
моя презентация диссертации "Развитие эмоциональной направленности студентов...
СНУЯЭиП
 
O045057780
O045057780O045057780
O045057780
IJERA Editor
 
E42043640
E42043640E42043640
E42043640
IJERA Editor
 
H43044145
H43044145H43044145
H43044145
IJERA Editor
 

Viewers also liked (20)

W04408116121
W04408116121W04408116121
W04408116121
 
A045050107
A045050107A045050107
A045050107
 
Ci4301487491
Ci4301487491Ci4301487491
Ci4301487491
 
Ap4301221223
Ap4301221223Ap4301221223
Ap4301221223
 
H45014650
H45014650H45014650
H45014650
 
O044049498
O044049498O044049498
O044049498
 
Rol i znachenie_pamyati_v_deyatelnosti_operatora
Rol i znachenie_pamyati_v_deyatelnosti_operatoraRol i znachenie_pamyati_v_deyatelnosti_operatora
Rol i znachenie_pamyati_v_deyatelnosti_operatora
 
Timisoara
TimisoaraTimisoara
Timisoara
 
Bl4301350359
Bl4301350359Bl4301350359
Bl4301350359
 
L0440285459
L0440285459L0440285459
L0440285459
 
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
 
T4409103113
T4409103113T4409103113
T4409103113
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
 
Statistical Evaluation of Wastewater Characteristics at the Inlet – Outlet of...
Statistical Evaluation of Wastewater Characteristics at the Inlet – Outlet of...Statistical Evaluation of Wastewater Characteristics at the Inlet – Outlet of...
Statistical Evaluation of Wastewater Characteristics at the Inlet – Outlet of...
 
C044021013
C044021013C044021013
C044021013
 
A comparative study for detection and measurement of voltage disturbance in o...
A comparative study for detection and measurement of voltage disturbance in o...A comparative study for detection and measurement of voltage disturbance in o...
A comparative study for detection and measurement of voltage disturbance in o...
 
моя презентация диссертации "Развитие эмоциональной направленности студентов...
моя презентация диссертации  "Развитие эмоциональной направленности студентов...моя презентация диссертации  "Развитие эмоциональной направленности студентов...
моя презентация диссертации "Развитие эмоциональной направленности студентов...
 
O045057780
O045057780O045057780
O045057780
 
E42043640
E42043640E42043640
E42043640
 
H43044145
H43044145H43044145
H43044145
 

Similar to R04404112115

Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
CSCJournals
 
Filtering Corrupted Image and Edge Detection in Restored Grayscale Image Usin...
Filtering Corrupted Image and Edge Detection in Restored Grayscale Image Usin...Filtering Corrupted Image and Edge Detection in Restored Grayscale Image Usin...
Filtering Corrupted Image and Edge Detection in Restored Grayscale Image Usin...
CSCJournals
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
CSCJournals
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
eSAT Publishing House
 
Edge Extraction with an Anisotropic Vector Field using Divergence Map
Edge Extraction with an Anisotropic Vector Field using Divergence MapEdge Extraction with an Anisotropic Vector Field using Divergence Map
Edge Extraction with an Anisotropic Vector Field using Divergence Map
CSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Speckle noise reduction using hybrid tmav based fuzzy filter
Speckle noise reduction using hybrid tmav based fuzzy filterSpeckle noise reduction using hybrid tmav based fuzzy filter
Speckle noise reduction using hybrid tmav based fuzzy filter
eSAT Publishing House
 
Thermal image for truncated object target in the presence of vibrations motions
Thermal image for truncated object target in the presence of vibrations motionsThermal image for truncated object target in the presence of vibrations motions
Thermal image for truncated object target in the presence of vibrations motions
Alexander Decker
 
channel_mzhazbay.pdf
channel_mzhazbay.pdfchannel_mzhazbay.pdf
channel_mzhazbay.pdf
Maksat Zhazbayev
 
3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slides3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slides
BHAGYAPRASADBUGGE
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
ijistjournal
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
ijistjournal
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
sipij
 
W33123127
W33123127W33123127
W33123127
IJERA Editor
 
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodesIn tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
Meyli Valin Fernández
 
Using Generic Image Processing Operations to Detect a Calibration Grid
Using Generic Image Processing Operations to Detect a Calibration GridUsing Generic Image Processing Operations to Detect a Calibration Grid
Using Generic Image Processing Operations to Detect a Calibration Grid
Jan Wedekind
 
DESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGIC
DESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGICDESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGIC
DESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGIC
VLSICS Design
 
Ef34795798
Ef34795798Ef34795798
Ef34795798
IJERA Editor
 

Similar to R04404112115 (20)

Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
 
Filtering Corrupted Image and Edge Detection in Restored Grayscale Image Usin...
Filtering Corrupted Image and Edge Detection in Restored Grayscale Image Usin...Filtering Corrupted Image and Edge Detection in Restored Grayscale Image Usin...
Filtering Corrupted Image and Edge Detection in Restored Grayscale Image Usin...
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
Edge Extraction with an Anisotropic Vector Field using Divergence Map
Edge Extraction with an Anisotropic Vector Field using Divergence MapEdge Extraction with an Anisotropic Vector Field using Divergence Map
Edge Extraction with an Anisotropic Vector Field using Divergence Map
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Speckle noise reduction using hybrid tmav based fuzzy filter
Speckle noise reduction using hybrid tmav based fuzzy filterSpeckle noise reduction using hybrid tmav based fuzzy filter
Speckle noise reduction using hybrid tmav based fuzzy filter
 
1873 1878
1873 18781873 1878
1873 1878
 
1873 1878
1873 18781873 1878
1873 1878
 
Thermal image for truncated object target in the presence of vibrations motions
Thermal image for truncated object target in the presence of vibrations motionsThermal image for truncated object target in the presence of vibrations motions
Thermal image for truncated object target in the presence of vibrations motions
 
channel_mzhazbay.pdf
channel_mzhazbay.pdfchannel_mzhazbay.pdf
channel_mzhazbay.pdf
 
3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slides3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slides
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
 
W33123127
W33123127W33123127
W33123127
 
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodesIn tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
In tech multiple-wavelength_holographic_interferometry_with_tunable_laser_diodes
 
Using Generic Image Processing Operations to Detect a Calibration Grid
Using Generic Image Processing Operations to Detect a Calibration GridUsing Generic Image Processing Operations to Detect a Calibration Grid
Using Generic Image Processing Operations to Detect a Calibration Grid
 
DESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGIC
DESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGICDESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGIC
DESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGIC
 
Ef34795798
Ef34795798Ef34795798
Ef34795798
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

R04404112115

  • 1. H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115 www.ijera.com 112 | P a g e Edge Detection Using Directional Filtering H. Aboelsoud M. (Military Technical Colleague – Egyptian Armed Forces) ABSTRACT Edge detection can be performed by applying an edge filter in n directions. Conceptually, in order to estimate gradient, that is, to determine the edge map, eight filtering directions, e.g. (0, π/8, π/4, 3π/8, π/2, 5π/8, 3π/4, 7π/8), constitute the sufficient basis for the gradient calculation. Computationally, such a two-dimensional (2-D) eight-directional filter can be represented by a pair of real masks, that is, by one complex-number matrix. Final edges are determined after applying the non-maximum suppression followed by thresholding with hysteresis algorithms to obtain smooth and connected edge map. Keywords - Conjugate images, directional filtering, edge detection. I. INTRODUCTION An edge is characterized by an abrupt change in intensity indicating the boundary between two regions in an image. It is a local property of an individual pixel and is calculated from the image function in a neighborhood of the pixel. Edge detection is a fundamental operation in computer vision and image processing. It concerns the detection of significant variations of a grey level image. The output of this operation is mainly used in higher-level visual processing like three-dimensional (3-D) reconstruction, stereo motion analysis, recognition, scene segmentation, image compression, etc. Hence, it is important for a detector to be efficient and reliable [1]. In computer vision, edge detection is traditionally implemented by convolving the image with some form of linear filter, usually a filter that approximates a first or second derivative operator. An odd symmetric filter will approximate a first derivative, and peaks in the convolution output will correspond to edges (luminance discontinuities) in the image. An even symmetric filter will approximate a second derivative operator. Zero-crossings in the output of convolution with an even symmetric filter will correspond to edges [2]. If we ignore the noise present in images, edge detection can be based primarily on the computation of the gradient of intensity with subsequent thresholding of its magnitude. For this purpose the popular filters, like the Sobel filter [3], are used. Hence, a typical simple method of obtaining an edge strength map is based on the estimation of two components of the intensity gradient vector using horizontal and vertical Sobel masks. Taking noise and edge imperfection into consideration, edge filters are traditionally constructed so as to improve the suppression of unwanted disturbances by appropriate lowpass filtering. The idea has originated perhaps from the concept of stochastic gradient [4] and from work of Marr and Hildreth [5], and in its current form was introduced by Canny [6] and developed further in many works using various criteria of optimality of the edge detection process. Following a classification of the optimal one-dimensional (1-D) edge filters presented by Heijden [7], the following operators are considered to be the main contenders: Canny [6] and its version by Deriche [8], Shen–Castan [9], [10], (see also [11]), Sarkar–Boyer [12], Boie–Cox [13], Spacek [14], Petrou-Kittler [15], and the CVM detector of Heijden [7]. The above filters were primarily constructed as 1-D filters and then extended appropriately into two dimensions. This paper is focused on the use of directional filtering for edge detection. We show that, eventually, a 2-D eight-directional edge filter can be represented by a pair of matrix filters, or equivalently by one complex-number filter. We start with the description of the details of the eight-directional 2-D edge filter. In the next section we present experimental results of its application for edge detection in real life images. Finally, a conclusion is presented in Section-4. RESEARCH ARTICLE OPEN ACCESS
  • 2. H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115 www.ijera.com 113 | P a g e (9) (10) (11) II. Eight-Directional Filter Consider a digital grey level image F(x,y), assume we wish to convolve the image with a 2D Gaussian filter to smooth it. The 2D Gaussian smoothing operator G(x,y) is given by: e yx yxG   2 1 2 22 2 )( ),(   (1) where x,y are the image co-ordinates and σ is a standard deviation of the associated probability distribution [16]. Let f(x,y) denotes to the smoothed image, then: f(x,y) = F(x,y)  G(x,y) (2) where  denotes to the convolution operation. Consider a neighborhood R of a pixel (x,y) expanded in the direction d as shown in Fig. 1. A general nonlinear filtering operation over the region R may now be defined by [17]: f(x,y)→g((x,y);R)=   R uuuyuxfh )),,(( 21 (3) where f(x,y) and g((x,y);R) are the smoothed and filtered images respectively, such a region of interest is rotated in the directions(d1; ……. ; dn) to cover the whole 2π angle. Fig. 1 Directional neighborhood of a pixel (x,y) Applying the filtering operation (3) over the region R k ; we obtain a so-called conjugate image, gk (x,y). The edge strength may now be calculated by performing a vector addition of conjugate images. Using the complex-number notation, we have:   n k j km k eyxgyxg 1 ),(),(  (4) where gm(x,y) is a complex-number-valued edge strength and its magnitude specifies a scalar edge strength. If we use linear filters, then a conjugate image in the kth direction is calculated as a convolution of the smoothed image, f(x,y); with a kth directional filter, h k , as follows: gk(x,y) = f(x,y)  h k (x,y) (5) Now, the complex edge strength can be obtained as a convolution of the smoothed image, f(x,y); with the complex edge filter h(x,y), as follows:      n 1k kj km ey))(x,hy)f(x,()y,x(g (6)     n 1k kj km ey)(x,h)y,x(f)y,x(g (7) gm(x,y) = f(x,y) h(x,y) (8) where h(x,y) is a sum of appropriately rotated filter components. In order to estimate two components of the intensity gradient, eight filtering directions (aiming at detecting edges in all directions), e.g. (0, π/8, π/4, 3π/8, π/2, 5π/8, 3π/4, 7π/8), might be required. In this case, there are eight directions, θk=k π/8, k=0,1,2,….,7, thus eight filtering regions. The complex “eight-directional” edge filter, h; can be directly determined using (7) by adding eight uni- directional components, namely: 8/7j 8/7 4/3j 4/3 8/5j 8/5 2/j 2/ 8/3j 8/3 4/j 4/ 8/j 8/0 eheheheh ehehehhh                 for the simplicity let “a” denotes to 8/j e  , then: a. 00000 ja0000 0000 0000ja 00000 a. 00000 0ja000 00000 000ja0 00000 a. 0j000 00000 00000 00000 000j0 a. 00000 00a00 00000 00a00 00000 a. 000a0 00000 00000 00000 0a000 a. 00000 000a0 00000 0a000 00000 a. 00000 00001 00000 10000 00000 a. 00000 00000 0a0a0 00000 00000 h 2 2 3 3 2 2 11                                                                                                                                                 Then the complex edge filter can be calculated as: a. 0j0a0 jajaaa1 0a0a0 1aajaja 0a0j0 h 2 23 11 32 2                    
  • 3. H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115 www.ijera.com 114 | P a g e (12)                                         0107071.00 7071.09239.09239.03827.00 03827.003827.00 13827.09239.09239.07071.0 07071.0010 .j 0007071.00 7071.03827.03827.09239.01 09239.009239.00 19239.03827.03827.07071.0 07071.0000 h From equations (11), and (12), a 2D eight-directional edge filter can be represented by a pair of matrix filters, or, equivalently by one complex-number filter. Fig. 2 shows its frequency response. Fig. 2 Frequency response of eight-directional filter Equation (12) can be written as: h(x,y) = hx(x,y) + j hy(x,y) (13) From equation (8), the edge strength is given by: gm(x,y) = f(x,y)  (hx(x,y) + j hy(x,y)) (14) gm(x,y) = (f(x,y) (hx(x,y)) + j (f(x,y) hy(x,y)) (15) gm(x,y) = fx(x,y) + j fy(x,y) (16) its magnitude is given by: 2 y 2 xm ))y,x(f())y,x(f())y,x(g(mag  (17) and its direction by ) )y,x(f )y,x(f (tan x y1 . III. EXPERIMENTAL RESULTS The eight-directional edge filter has been tested with three images: Wall image (Fig. 3), X-ray image of brain (Fig. 4), and CT image of abdomen (Fig. 5), and some results are presented in Fig. 6, Fig.7, and Fig.8 respectively. Fig. 3 A 256 ×256 Wall image. Fig. 4 X-ray image of brain Fig. 5 CT abdomen image Fig. 6. (a): magnitude of the edge strength obtained using eight-directional filter of (12). (b): edge map after non-maximum and thresholding operations (lower thresh = 0.08, and upper thresh =0.2). Fig. 7. (a): magnitude of the edge strength obtained using eight-directional filter of (12). (b): edge map after non-maximum and thresholding operations (lower thresh = 0.06, and upper thresh =0.15). (a)
  • 4. H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115 www.ijera.com 115 | P a g e (b) Fig. 8 (a): magnitude of the edge strength obtained using eight-directional filter of (12). (b): edge map after non-maximum and thresholding operations (lower thresh = 0.048, and upper thresh =0.12). Figures 6(a), 7(a), and 8(a), illustrate the edge strength maps generated using convolution of images with the eight-directional filter of (12). In Figures 6(b), 7(b), and 8(b), the above maps are presented after operations of the non-maximum suppression followed by thresholding with hysteresis algorithms. The threshold parameters are manually adjusted for best results. It is clear from the figures, that the edge maps generated using convolution of images with the eight-directional filter of (12) contain many visibly important edges. IV. CONCLUSION Physical edges are one of the most important properties of objects. They correspond to object boundaries or to changes in surface orientation or material properties. Edges help to extracting useful information and characteristics of an image. In this paper, we have discussed how to build a 2-D edge filter that collects information from eight directions around a central pixel. We show that, such a 2-D eight-directional filter can be represented by a pair of real masks, that is, by one complex-number matrix. The above filter has been tested in the preceding section. The test is performed on three real life images. The final edges are determined after operations of the non-maximum suppression followed by thresholding with hysteresis algorithms. It is to be noted that on all the real life images considered, the eight-directional edge filter produced fairly good results. REFERENCES [1] Rishi R. Rakesh, Probal Chaudhuri, and C. A. Murthy „Thresholding in Edge Detection: A Statistical Approach‟ IEEE Transactions on image processing, vol. 13, no. 7, July 2004. [2] E. Davies, “Machine Vision: Theory, Algorithms and Practicalities”, Academic Press, pp 101 – 110, 1990. [3] R. M. Haralick and L. S. Shapiro, Computer Vision, vol. 1. Reading, MA: Addison-Wesley, 1992. [4] A. K. Jain, Fundamentals of Digital Image Processing. Englewood Cliffs, NJ: Prentice- Hall, 1989. [5] D. Marr and E. Hildreth, “Theory of edge detection,” in Proc. R. Soc. Lond. B, vol. 207, pp. 187–217, 1980. [6] J. Canny, “A computational approach to edge detection,” IEEE Trans .Pattern Anal. Machine Intell., vol. PAMI-8, pp. 679–698, Nov. 1986. [7] F. van der Heijden, “Edge and line feature extraction based on covariance models,” IEEE Trans. Pattern Anal. Machine Intell., vol. 17, pp. 16–33, Jan. 1995. [8] R. Deriche, “Using Canny‟s criteria to derive a recursively implemented optimal edge detector,” Int. J. Comput. Vis., vol. 1, pp. 167–187, 1987. [9] J. Shen and S. Castan, “An optimal linear operator for edge detection,” CVGIP: Graph. Models Image Processing, vol. 54, pp. 112– 133, Mar. 1992. [10] “Toward the unification of band-limited derivative operators for edge detection,” Signal Process., vol. 31, pp. 103–119, 1993. [11] K. R. Rao and J. Ben-Arie, “Optimal edge detection using expansion matching and restoration,” IEEE Trans. Pattern Anal. Machine Intell., vol. 16, pp. 1169–1182, Dec. 1994. [12] S. Sarkar and K. L. Boyer, “On optimal infinite impulse response edge detection filters,” IEEE Trans. Pattern Anal. Machine Intell., vol. 13, pp. 1154–1171, Nov. 1991. [13] R. Boie and I. Cox, “Two dimensional optimum edge recognition using matched and Wiener filters for machine vision,” in Proc. Int. Conf. Computer Vision, London, U.K., 1997, pp. 450–456. [14] L. A. Spacek, “Edge detection and motion detection,” Image Vis. Comput., vol. 4, pp. 43–56, Feb. 1986. [15] M. Petrou and J. Kittler, “Optimal edge detectors for ramp edges,” IEEE Trans. Pattern Anal. Machine Intell., vol. 13, pp. 483–491, May 1991. [16] Milan Sonka, Vaclav Hlavac, and Roger Boyle, “Image Processing, Analysis and Machine Vision,” 1993. [17] Andrew P. Paplinski, “Directional Filtering in Edge Detection,” IEEE Tran. Image Proc., Vol. 7, No. 4, pp. 611-615, APRIL 1998.