SlideShare a Scribd company logo
IMAGE REPRESENTATION &
DESCRIPTORS
 After an image has been segmented into regions ; the resulting
pixels is usually is represented and described in suitable form for
further computer processing.
 Representing regions incolves in to two choices: in terms of it’s
1) external characteristics ( boundary)
2) internal characteristics ( pixels)
 Above task is making data useful to computer
 Next task is to describe the region on bases of representation
 External representation is chosen when primary focus on
shape characteristics.
 Internal representation is chosen when primary focus on
regionl properties like color and texture characteristics.
 Sometime it is possible to choose both characteristics.
 Features selected as descriptors should be insensitive to
changes in size, tanslation & rotation.
 It deals with compaction of segmented data into
representations that facilitate the computation of
descriptors.
 Technique of Representation :-
a. Chain codes
b. PolygonalApproximations
- Minimum perimeter polygones
- Merging technique
- Splitting technique
c. Signatures
d. BoundarySegments
e. Skeletons
0
3
2
 They are used to represent a boundary by a connected
sequence of straight line segments of specified length &
direction.
 Typically this representation is based on 4- or 8- connectivity
of segments.
 The direction of each segments is coded by using a
numbering scheme.
2
1 1
0
3
4
5
7
4-connectivity
6
8-connectivity
 A boundary code formrd as a sequence of such directional
number is referred as a Freeman chain code.
 Digital images are acquired & processed in a grid format with
equal spacing in x and y directions.
 So a chain code can be generated by following a boundary
(say clockwise direction) and assigning a direction to the
segments connecting every pair of pixels.
 Unacceptable method: (because)
1) Resulting chain tends to be quite long
2) Any small disturbances along the boundary due to noise
or imperfect segmentation can cause changes in code.
 A solution to this problem is to resample the boundary by
selecting a larger grid spacing.
 Then, as the boundary is traversed, a boundary point is
assigned to each node of the large grid, depending upon the
proximity of original boundary to that node.
 The re-sampled boundary can now be represented by a 4- or
8-code.
 The accuracy of the resulting code representation depends
on the spacing of the sampling grid.
 Example:-
Start ChainCode:
0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
 The chain code of a boundary depends upon the starting point.
 However the code can be normalized:
–Assume the chain is a circular sequence
(given a chain of 1 to N codes ; N+1 = 1)
– Redefine the starting point such that we generate an integer of
smallest magnitude
Chain Code 1 Chain Code 2
0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1,1, 1, 1, 1, 1, 0, 0, 0
NormalizedCode 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
0
 Chain code depend on orientation
– a rotation results in a different chain codeOne solution
– Use the “first difference” of the chain code instead of the
code itself
 The difference is obtained by simply counting (counter-
clockwise) the number of directions that separate two
adjacent elements
1
2
3
Difference:Count the number of separating
directions inan anti-clockwise fashion
2 1 0 1 0 3 3 2 2 2 ChainCode
3 3 1 3 3 0 3 0 DifferenceCode
Ex. First difference of 4-direction chain code
10103322 is 3133030.
Considering the circular sequence first
element is calculated by subtracting last and
first component. Ex. 33133030
 An approach for generating an algorithm to compute MPPs
is to enclose a boundary by a set of concatenated cells.
 Allow the boundary to shrink as a rubber band.
 This shrinking produces the shape of a polygon of min.
perimeter.
 Size of cells determine the accuracy of the polygonal
approximation.
 In the limit if size of each cell corresponds to a pixel in the
boundary , the error in each cell between the boundary & the
MPP approx. at most would be √2d, where d-min possible
pixel distance.
 The objective is to use the largest possible cell size
acceptable in a given application.
 Thus, producing MPPs with fewest no. of vertices.
 The cellular approach reduces the shape of the object
enclosed by the original boundary.
Min. Perimeter
Polygon
 Techniques based on average error or other criteria have
been applied to the problem of polygonal approximation.
 One approach is to merge points along a boundary until the
least square error line fit of the points merged so far exceeds
a preset threshold.
 When this condition occurs, parameters of line are stored,
the error is set to 0, the procedure is repeated, merging new
points along the boundary until the error again exceeds the
threshold.
 Merging technique problem:
– No guarantee for corner detection
 Solution:
– SplittingTechniques
 to subdivide a segment successively into two parts until a
given criterion is satisfied.
–Objective: seeking prominent inflection points
Step:-
1. Start with an initial guess, e.g., based on majority axes
2. Calculate the orthogonal distance from lines to all points
3. If maximum distance > threshold, create new vertex there
4. Repeat until no points exceed criterion
Example:-
 It is a 1D functional representation of a boundary & may be
generated in various ways.
 One of the simplest is to plot the distance from the centroid
to the boundary as a function of angle.
 Signatures generated by this method are invariant to
translation but they depend on rotation and scaling.
 Normalization with respect to rotation can be achieved by
finding a way to select the same starting point to generate
the signature , according to shape.
 One way to normalize this is to scale all functions so that
they always span the same range of values. e.g [0,1]
 Advantage :
- it’s simplicity
 disadvantage :
- scaling of the entire function depends upon only two
values: maximum & minimum.
 The boundary can be decomposed into segments.
–Useful to extract information from concave parts of the
objects.
 A good way to achieve this is to calculate the convex Hull of
the region enclosed by the boundary Hull.
 Can be a bit noise sensitive
1. Smooth prior toConvex hull calculation
2. CalculateConvex Hull on polygon approximation
 Convex Hull, H, of an arbitrary set, S, is the smallest set
containingS
 H minusS (H-S)
– Is called the convex deficiency
 We can use the convex deficiency to mark features
Follow the contour ofS and mark points that transitions
into or out of the convex deficiency
 UsingConvex Hull and its Deficiency
This data can be used to describe the region
– Number of pixels in convex deficiency
– Number of components in convex deficiency
– Ratio lengths of the transition points
– so on
 An important approach to represent the structural shape of a
plane region is to reduce it to a graph.
 The reduction may be accomplished by obtaining the
skeleton of the region via thinning (skeletonizing) algorithm.
 Skeleton of a region may be defined as the medial axis
transformation (MAT).
 MAT of a region R with border B is as follows:
- For every point p in R, we find its closest neighbor in B. If
p has more than such neighbor, it is said to belong to the
medial axis (skeleton).
‘prairie fire concept’
 Implementation involves calculating the distance from every
interior point to every boundary point on region.
 Thinning algorithm deals with deleting the boundary points
of a region subject to condition that deleting these points:
1) Does not remove end points.
2) Does not break connectivity &
3) Does not cause excessive erosion of the region.
 Thinning algorithm:
Region points are assumed to have value 1 & background
points are assumed to have value 0.
p9 p2 p3
p8 p1 p4
p7 p6 p5
 Step 1
flags a contour point for deletion if the followingconditions
are satisfied:
a) 2 ≤ N(p1) ≤ 6
b)T(p1) = 1
c) p2.p4.p6 = 0
d) p4.p6.p8 = 0
p2,
where N(p1) is the number of nonzero neighbors of p1;
i.e. N(p1) = p2 + p3 + …… + p8 + p9
where pi is either 0 or 1.
T(p1) is number of 0-1 transitions in the ordered sequence
p3, ….., p8, p9., p2
 InStep 2:
conditions a & b remain the same, but conditions c & d are
changed to
c’) p2.p4.p8 = 0
d’) p2.p6.p8 = 0
0 0 1
1 p1 0
1 0 1
Step 1 is applied to every border pixel in binary region under
Consideration If 1 or more of conditions a to d are violated, the
value of point in question is not changed.
 If all conditions are satisfied, the point is flagged
for deletion.
 But not deleted until all border points have been
processed.
 This delay prevents the change of structure of
data during execution of algorithm.
 After step 1 been applied to all border points,
those who are flagged are deleted (changed to
0).
 Step 2 is applied to resulting data in exactly
same manner as step1.
 Some simple discriptors:-
 Length of the contour
– Simply count the number of pixels along the border
–You may consider diagonally connected pixels to count as √2
 Diameter of the boundary B
– Diam(B) = max[D(pi,pj)]
– this is the major axis of the region
 Curvature
– Rate of change of the slope
 Bounding Box
–Smallest rectangle (aligned with the image axis) that can bound
the region
 Shape number
– compute the chain code difference
– re-order this to create the minimum integer
– this is called the shape number
 Example:-
 Fourier Descriptors
 Consider an N-point digital boundary in the xy plane
 This forms a coordinate pairs (xo, yo), (x1, y2), . . . . ., (xn-1, yn-1)
 We can consider this as two vectors
– x(k) = xk
– y(k) = yk
 Furthermore
– We could consider this a complex number
– s(k) = x(k) + jy(k) where j=sqrt(-1)
 Using the vector s(k)
 Compute the 1-D Discrete FourierTransform
representation.pptx
representation.pptx
representation.pptx
representation.pptx

More Related Content

Similar to representation.pptx

Building 3D Morphable Models from 2D Images
Building 3D Morphable Models from 2D ImagesBuilding 3D Morphable Models from 2D Images
Building 3D Morphable Models from 2D ImagesShanglin Yang
 
10 Important AI Research Papers.pdf
10 Important AI Research Papers.pdf10 Important AI Research Papers.pdf
10 Important AI Research Papers.pdf
Linda Garcia
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
Heman Pathak
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
IJECEIAES
 
MDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersMDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizers
Ericsson
 
various methods for image segmentation
various methods for image segmentationvarious methods for image segmentation
various methods for image segmentationRaveesh Methi
 
G364246
G364246G364246
G364246
IJERA Editor
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
IJERA Editor
 
Two marks with answers ME6501 CAD
Two marks with answers ME6501 CADTwo marks with answers ME6501 CAD
Two marks with answers ME6501 CAD
Priscilla CPG
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
MadhuriMulik1
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally punctured
eSAT Publishing House
 
A Density Control Based Adaptive Hexahedral Mesh Generation Algorithm
A Density Control Based Adaptive Hexahedral Mesh Generation AlgorithmA Density Control Based Adaptive Hexahedral Mesh Generation Algorithm
A Density Control Based Adaptive Hexahedral Mesh Generation Algorithm
ijeei-iaes
 
Automatic Generation of Persistent Formations Under Range Constraints
Automatic Generation of Persistent Formations Under Range ConstraintsAutomatic Generation of Persistent Formations Under Range Constraints
Automatic Generation of Persistent Formations Under Range Constraintselliando dias
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
gamalsallam1989
 
J1803056876
J1803056876J1803056876
J1803056876
IOSR Journals
 
Steady state CFD analysis of C-D nozzle
Steady state CFD analysis of C-D nozzle Steady state CFD analysis of C-D nozzle
Steady state CFD analysis of C-D nozzle
Vishnu R
 
1516 contouring
1516 contouring1516 contouring
1516 contouring
Dr Fereidoun Dejahang
 
Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012
Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012
Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012
Florent Renucci
 

Similar to representation.pptx (20)

Building 3D Morphable Models from 2D Images
Building 3D Morphable Models from 2D ImagesBuilding 3D Morphable Models from 2D Images
Building 3D Morphable Models from 2D Images
 
10 Important AI Research Papers.pdf
10 Important AI Research Papers.pdf10 Important AI Research Papers.pdf
10 Important AI Research Papers.pdf
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
 
MDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersMDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizers
 
various methods for image segmentation
various methods for image segmentationvarious methods for image segmentation
various methods for image segmentation
 
Fingerprints images
Fingerprints imagesFingerprints images
Fingerprints images
 
G364246
G364246G364246
G364246
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
 
Two marks with answers ME6501 CAD
Two marks with answers ME6501 CADTwo marks with answers ME6501 CAD
Two marks with answers ME6501 CAD
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally punctured
 
A Density Control Based Adaptive Hexahedral Mesh Generation Algorithm
A Density Control Based Adaptive Hexahedral Mesh Generation AlgorithmA Density Control Based Adaptive Hexahedral Mesh Generation Algorithm
A Density Control Based Adaptive Hexahedral Mesh Generation Algorithm
 
Automatic Generation of Persistent Formations Under Range Constraints
Automatic Generation of Persistent Formations Under Range ConstraintsAutomatic Generation of Persistent Formations Under Range Constraints
Automatic Generation of Persistent Formations Under Range Constraints
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
 
2015LISAT_pathloss1
2015LISAT_pathloss12015LISAT_pathloss1
2015LISAT_pathloss1
 
J1803056876
J1803056876J1803056876
J1803056876
 
Steady state CFD analysis of C-D nozzle
Steady state CFD analysis of C-D nozzle Steady state CFD analysis of C-D nozzle
Steady state CFD analysis of C-D nozzle
 
1516 contouring
1516 contouring1516 contouring
1516 contouring
 
Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012
Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012
Manifold Blurring Mean Shift algorithms for manifold denoising, report, 2012
 

Recently uploaded

Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 

Recently uploaded (20)

Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 

representation.pptx

  • 2.  After an image has been segmented into regions ; the resulting pixels is usually is represented and described in suitable form for further computer processing.  Representing regions incolves in to two choices: in terms of it’s 1) external characteristics ( boundary) 2) internal characteristics ( pixels)  Above task is making data useful to computer  Next task is to describe the region on bases of representation
  • 3.  External representation is chosen when primary focus on shape characteristics.  Internal representation is chosen when primary focus on regionl properties like color and texture characteristics.  Sometime it is possible to choose both characteristics.  Features selected as descriptors should be insensitive to changes in size, tanslation & rotation.
  • 4.  It deals with compaction of segmented data into representations that facilitate the computation of descriptors.  Technique of Representation :- a. Chain codes b. PolygonalApproximations - Minimum perimeter polygones - Merging technique - Splitting technique c. Signatures d. BoundarySegments e. Skeletons
  • 5. 0 3 2  They are used to represent a boundary by a connected sequence of straight line segments of specified length & direction.  Typically this representation is based on 4- or 8- connectivity of segments.  The direction of each segments is coded by using a numbering scheme. 2 1 1 0 3 4 5 7 4-connectivity 6 8-connectivity
  • 6.  A boundary code formrd as a sequence of such directional number is referred as a Freeman chain code.  Digital images are acquired & processed in a grid format with equal spacing in x and y directions.  So a chain code can be generated by following a boundary (say clockwise direction) and assigning a direction to the segments connecting every pair of pixels.  Unacceptable method: (because) 1) Resulting chain tends to be quite long 2) Any small disturbances along the boundary due to noise or imperfect segmentation can cause changes in code.
  • 7.  A solution to this problem is to resample the boundary by selecting a larger grid spacing.  Then, as the boundary is traversed, a boundary point is assigned to each node of the large grid, depending upon the proximity of original boundary to that node.  The re-sampled boundary can now be represented by a 4- or 8-code.  The accuracy of the resulting code representation depends on the spacing of the sampling grid.  Example:- Start ChainCode: 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
  • 8.  The chain code of a boundary depends upon the starting point.  However the code can be normalized: –Assume the chain is a circular sequence (given a chain of 1 to N codes ; N+1 = 1) – Redefine the starting point such that we generate an integer of smallest magnitude Chain Code 1 Chain Code 2 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1,1, 1, 1, 1, 1, 0, 0, 0 NormalizedCode 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
  • 9. 0  Chain code depend on orientation – a rotation results in a different chain codeOne solution – Use the “first difference” of the chain code instead of the code itself  The difference is obtained by simply counting (counter- clockwise) the number of directions that separate two adjacent elements 1 2 3 Difference:Count the number of separating directions inan anti-clockwise fashion 2 1 0 1 0 3 3 2 2 2 ChainCode 3 3 1 3 3 0 3 0 DifferenceCode Ex. First difference of 4-direction chain code 10103322 is 3133030. Considering the circular sequence first element is calculated by subtracting last and first component. Ex. 33133030
  • 10.
  • 11.  An approach for generating an algorithm to compute MPPs is to enclose a boundary by a set of concatenated cells.  Allow the boundary to shrink as a rubber band.  This shrinking produces the shape of a polygon of min. perimeter.  Size of cells determine the accuracy of the polygonal approximation.  In the limit if size of each cell corresponds to a pixel in the boundary , the error in each cell between the boundary & the MPP approx. at most would be √2d, where d-min possible pixel distance.  The objective is to use the largest possible cell size acceptable in a given application.  Thus, producing MPPs with fewest no. of vertices.
  • 12.  The cellular approach reduces the shape of the object enclosed by the original boundary. Min. Perimeter Polygon
  • 13.  Techniques based on average error or other criteria have been applied to the problem of polygonal approximation.  One approach is to merge points along a boundary until the least square error line fit of the points merged so far exceeds a preset threshold.  When this condition occurs, parameters of line are stored, the error is set to 0, the procedure is repeated, merging new points along the boundary until the error again exceeds the threshold.  Merging technique problem: – No guarantee for corner detection  Solution: – SplittingTechniques
  • 14.  to subdivide a segment successively into two parts until a given criterion is satisfied. –Objective: seeking prominent inflection points Step:- 1. Start with an initial guess, e.g., based on majority axes 2. Calculate the orthogonal distance from lines to all points 3. If maximum distance > threshold, create new vertex there 4. Repeat until no points exceed criterion
  • 16.  It is a 1D functional representation of a boundary & may be generated in various ways.  One of the simplest is to plot the distance from the centroid to the boundary as a function of angle.  Signatures generated by this method are invariant to translation but they depend on rotation and scaling.  Normalization with respect to rotation can be achieved by finding a way to select the same starting point to generate the signature , according to shape.  One way to normalize this is to scale all functions so that they always span the same range of values. e.g [0,1]
  • 17.  Advantage : - it’s simplicity  disadvantage : - scaling of the entire function depends upon only two values: maximum & minimum.
  • 18.  The boundary can be decomposed into segments. –Useful to extract information from concave parts of the objects.  A good way to achieve this is to calculate the convex Hull of the region enclosed by the boundary Hull.  Can be a bit noise sensitive 1. Smooth prior toConvex hull calculation 2. CalculateConvex Hull on polygon approximation
  • 19.  Convex Hull, H, of an arbitrary set, S, is the smallest set containingS  H minusS (H-S) – Is called the convex deficiency  We can use the convex deficiency to mark features Follow the contour ofS and mark points that transitions into or out of the convex deficiency
  • 20.  UsingConvex Hull and its Deficiency This data can be used to describe the region – Number of pixels in convex deficiency – Number of components in convex deficiency – Ratio lengths of the transition points – so on
  • 21.  An important approach to represent the structural shape of a plane region is to reduce it to a graph.  The reduction may be accomplished by obtaining the skeleton of the region via thinning (skeletonizing) algorithm.  Skeleton of a region may be defined as the medial axis transformation (MAT).  MAT of a region R with border B is as follows: - For every point p in R, we find its closest neighbor in B. If p has more than such neighbor, it is said to belong to the medial axis (skeleton). ‘prairie fire concept’
  • 22.  Implementation involves calculating the distance from every interior point to every boundary point on region.  Thinning algorithm deals with deleting the boundary points of a region subject to condition that deleting these points: 1) Does not remove end points. 2) Does not break connectivity & 3) Does not cause excessive erosion of the region.
  • 23.  Thinning algorithm: Region points are assumed to have value 1 & background points are assumed to have value 0. p9 p2 p3 p8 p1 p4 p7 p6 p5  Step 1 flags a contour point for deletion if the followingconditions are satisfied: a) 2 ≤ N(p1) ≤ 6 b)T(p1) = 1 c) p2.p4.p6 = 0 d) p4.p6.p8 = 0
  • 24. p2, where N(p1) is the number of nonzero neighbors of p1; i.e. N(p1) = p2 + p3 + …… + p8 + p9 where pi is either 0 or 1. T(p1) is number of 0-1 transitions in the ordered sequence p3, ….., p8, p9., p2  InStep 2: conditions a & b remain the same, but conditions c & d are changed to c’) p2.p4.p8 = 0 d’) p2.p6.p8 = 0 0 0 1 1 p1 0 1 0 1 Step 1 is applied to every border pixel in binary region under Consideration If 1 or more of conditions a to d are violated, the value of point in question is not changed.
  • 25.  If all conditions are satisfied, the point is flagged for deletion.  But not deleted until all border points have been processed.  This delay prevents the change of structure of data during execution of algorithm.  After step 1 been applied to all border points, those who are flagged are deleted (changed to 0).  Step 2 is applied to resulting data in exactly same manner as step1.
  • 26.  Some simple discriptors:-  Length of the contour – Simply count the number of pixels along the border –You may consider diagonally connected pixels to count as √2  Diameter of the boundary B – Diam(B) = max[D(pi,pj)] – this is the major axis of the region  Curvature – Rate of change of the slope  Bounding Box –Smallest rectangle (aligned with the image axis) that can bound the region
  • 27.  Shape number – compute the chain code difference – re-order this to create the minimum integer – this is called the shape number  Example:-
  • 28.  Fourier Descriptors  Consider an N-point digital boundary in the xy plane  This forms a coordinate pairs (xo, yo), (x1, y2), . . . . ., (xn-1, yn-1)  We can consider this as two vectors – x(k) = xk – y(k) = yk  Furthermore – We could consider this a complex number – s(k) = x(k) + jy(k) where j=sqrt(-1)
  • 29.  Using the vector s(k)  Compute the 1-D Discrete FourierTransform