SlideShare une entreprise Scribd logo
1  sur  5
Raviteja.Bhima / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.123-127
123 | P a g e
Performance Evaluation Of Some Algorithms For Acoustic
Images Using Image Segmentation Techniqes
Raviteja.Bhima
Abstract
This paper is concerned with
Unsupervised sonar image segmentation .We
present a new estimation and segmentation
procedure on images provided by a high
resolution sonar. The sonar image is segmented
in to two kinds of regions:Shadow
(corresponding to a lack of acoustic
reverberation behind each object lying on
seabed) and Reverberation (Due the reflection
of acoustic wave on the seabed and on the
objects).The unsupervised contextual method is
defined as a two-step processExpectation
Maximization Algorithm and Statistical Region
SnakeTheory[1]. The expectation maximization
algorithm is very useful for parameter estimation
problems in finite mixtures. The stochastic EM
algorithm is a widely applicable approach for
computing maximum likelihood estimates for the
mixture problem[2].During past years the active
contour models (Snakes) have been widely used
for finding the contours of objects. This
segmentation strategy is classically edge-based in
the sense that the snake is driven to fit the
maximum of an edge map of the scene.This
technique has been successfully applied to real
sonar images, and is compatible with an
automatic processing of massive amounts of data.
IndexTerms: Active contours , Image edge
detection , Imageprocessing ,Unsupervised Imagese
gmentation ,Expectation,MaximizationAlgorithm,
Snake Algorithm ,
Introduction
In image analysis, image segmentationis
the partition of a digital image into multiple regions
(sets of pixels) with each region associated with one
of a finite number of classes that are modeled as
distinct random fields[3]. An important problem is
that of parameter estimation since the random field
models are mostly parametricmodels specified by a
small number of parameters which have to be
estimated from the data. In most of the previous
considerations, supervised approacheswhich usually
assume training data to be available for image
classes, the parameters can be estimated from the
training data before segmentation is widely used.
Although this supervised approach avoids the
complexity of a combined problem of estimation
and segmentation, it is rather unrealistic in many
practical situations.
To automatically detect objects in side-scan
sonar images, supervised approaches are difficult
due to the large variability in the appearance of side-
scan images. Thus, unsupervised approacheswhich
also allow analysis to be carried out while the data is
being collected, enabling mission plans to be
changed depending on the data collected are
strongly needed[4].
In sonar imagery, three kinds of regions
can be visualized: highlight, shadow, and sea bottom
reverberation areas. The highlight information is
caused by the reflection of the acoustic wave on the
object, while the shadow zone corresponds to a lack
of acoustic reverberation behind the object.
Fig (1) The formation of object area in side scan
image
System Model& EM Algorithm
Raviteja.Bhima / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.123-127
124 | P a g e
The EM algorithm is the most general effective
algorithm for solving in complete data problems.
The definitive reference for this algorithm was
written by Dempster, Laird & Rubin in 1977.
Basically it works as follows.
Let x= (yT
, zT
) be a set of random data of interest,
where y is the observed data & z is the part of x
that is not observable. For example, in image
segmentation y is the set of image pixel intensities
and is observable, whereas z is the image class
status of the pixels that is not visible. Usually the
observable y is called the incomplete data, & x is
called the complete data.
Let g(x/Ψ) be the probability density function of
the complete data, where Ψ is a parameter vector
that characterize the density function. The
incomplete data problem is to estimate Ψ based
only on the observations represented by the
incomplete data y.
It generates from some initial approximation Ψ(0),
a sequence of estimate Ψ(p), where each iteration
consist of the following two steps
Expectation-step(E=step)
Determine the function
Q(Ψ|))=E[log(g(X|Ψ))|y,(p)] (1)
Maximization-step(M-step)
Find the maximizor
Ψ(p+1) )
=arg max(Q(Ψ| (p)))
(2)
Here, p represents the pth
iteration. It has been that
under some relatively general conditions, the
estimate converges to the ML estimate of the
incomplete data problem, at least locally.
Model of EM Algorithm
This is the simplest case, where the data is fully
categorized. The fully categorized data can be
generally represented as
{xi,i=1,……,N}={(yi,zi
T
)T
,i=1,…..,N}(3)
Where each zi=(zi,1,……,zi,k)T
is an indicator vector
of length k with 1 in the kth
position & zeros
elsewhere. Then the likelihood function
corresponding to (  i,……..,  N) can then be written
in the form
  

N
i
N
i
ikiii zzyx ff
1 1
1
)|,.....,,()|()|g(X 
)1(
ˆ p
k =

N
i
p
ik
N 1
ˆ
1

;k=1,2,…K,
Snake Algorithm
The technique discussed in this section is based on
research conducted in [1], where snakes are used
under a statistical framework to segment images.
Whilst many region based techniques are often
computationally insensitive, the techniques
described here is very fast, allowing much of the
intensive calculations to be computed before the
segmentation commences. This is possible when
the statistical laws present in the image can be
described by the exponential family, making the
approach applicable in a wide range of physical
situations[12].
Assume that the observed scene (The raw side scan
sonar image) y is composed of two areas: Target
(Shadow or highlight) and background of, we wish
to, segment the target region. We consider the
image y ={y(i,j)|(i,j)[1,Ni][1,Nj]} to be
composed of Ni Nj pixels where the gray levels of
the Nt target pixels and the gray levels of Nb
Background pixels are assumed to be uncorrelated
and independently disturbed. They are described by
their respectively probability density functions
f(y(i,j)| t ) and f(y(i,j)| b ) where t and b Are
the parameters of the probability density
functions[10].
We define a binary window function
W={w(i,j)|w(i,j) [1,Ni] [1,Nj]} which defines
the shape of the snake at any instant of time.
Defining w(i,j) to be equal to 1 inside the
windowand 0 elsewhere, the image becomes
composed of tworegions Ωt ={(i,j)|w(i,j)=1} and
Ωb={(i,j)|w(i,j)=0} so that the observed image can
be viewed as the sum of two component
y(i,j)=t(i,j)w(i,j)+b(i,j)(1-w(i,j)) (4)
Raviteja.Bhima / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.123-127
125 | P a g e
Where t(i,j) and b(i,j) are values drawn fromtheir
respective probability distributions.
Therefore the purpose of segmentation becomes to
estimate the most likely shape w for the target in
the sense. Without any a priori knowledge about
the shape of the target, the best w is chosen by
maximizing the likelihood function[8].
g[y|w,t
,b
]=g( t
|  bbt
g |(). ) (5)
The likelihood function is expressed as a product of
probabilities as the pixels are assumed to be
uncorrelated and
u
{y(i,j)|(i,j) u
}(u=t or u=b). (6)
As we can see the likelihood function in (5.2)
depends on the parameters of the probability
functions as well as the window shape w. the
parameter vector u
where u{t,b} are the priori unknown and are in
general of ni interest .However for segmentation to
be possible it is necessary to compute these values.
The parameters can be calculated using a variety of
techniques such as a maximum a posteriori
approach, but for simplicity, a maximum likelihood
approach is again utilised as no a priori knowledge
on the values of the parameters is available[8].
In order to proceed one has to specify parameters
expression for the probability density functions
f(y(i,j)|t
) and f(y(i,j)|b
Here we consider
probability density functions which belong to the
exponential families for r(i,j) and b(i,j). Taking into
account the sufficient statistics if we choose
Maximum likelihood estimation and insert these
estimates in the likelihood function l(y,w)[9].
l(y,w)=log{ ]([ tt
tG }+log{ )]([ bb
tG }(4)
Where Gu
are the functions which depend on y
only via t( u
).
The window function w that maximizes the
criterion J(y,w)=-l(y,w) then performs a maximum
likelihood segmentation of the target in the sense.
The criterion can consequently be regarded as
energy acting on the snake since its minimization
forces the contour to surround thetarget. For this
purpose, we can use an iterativealgorithm in which
we have to calculate the criterion J(y,w) for each
deformation of the snake. Thus, the minimization
procedure can be time consuming. In the next
section, we show how to obtain the optimal
criterion J(y,w).
Simulation Results
Side scan sonar Images
close image
10 20 30 40 50 60 70
10
20
30
40
50
60
70
Bot-hat image
10 20 30 40 50 60 70
10
20
30
40
50
60
70
Raviteja.Bhima / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.123-127
126 | P a g e
Segmentation result of a synthetic image
Probability Density of the Three Pixel Classes
(Good Conditions)
Snake Algorithm:
Conclusion
Image processing is a rapidly growing
area of computer science. Its growth has been
fueled by technological advances in digital
x
y
Morphological clustering image
10 20 30 40 50 60
10
20
30
40
50
60
1
2
3
x
y
Segmentation of Synthetic image
10 20 30 40 50 60
10
20
30
40
50
60
1
2
3
0 10 20 30 40 50 60
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
Normalized historgram and estimated mixture
pixel intensity value
probability
Nomalized histogram
Sum of pdf
Shadow
Background
Target
10 20 30 40 50 60 70
10
20
30
40
50
60
70
5
10
15
20
25
30
35
40
45
50
10 20 30 40 50 60 70
10
20
30
40
50
60
70
5
10
15
20
25
30
35
40
45
50
x
y
Clustering and segmentation of Synthetic image
10 20 30 40 50 60
10
20
30
40
50
60
1
2
3
Iteration Result: Polygon 8 Nodes (Bad Highlight
Contrast)
EM Algorithm
Iteration Result: Polygon 4 Nodes (Bad Highlight
Contrast)
Raviteja.Bhima / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.123-127
127 | P a g e
imaging, computer processors and mass storage
devices. Fields which traditionally used analog
imaging are now switching to digital systems, for
their flexibility and affordability. Important
examples are medicine, film and video production,
photography, remote sensing, and security
monitoring.
Nowadays, image segmentation represents a task of
growing importance in many different fields. This
technique is finding broad applications in
underwater acoustics, space born remote sensing,
medical imaging systems, non-distractive material
analysis, as well as spoken language
processing[14].
This paper concludes that it is to explore
the potential growth areas of using these two
algorithms in side scan imagery. Evaluating and
comparing their performances for both synthetic
and real sonar images using the software simulation
tool MATLAB.
References
[1] R. Adams and L. Bischof, “Seeded region
growing,” IEEE Trans. Pattern Anal.
Machine Intell., vol. 6, June 1994.
[2] A. C. Bovic, M. Clark, and W. S. Geisler,
“Multichannel texture analysis using
localized spatial filters,” IEEE Trans.
Pattern Anal. Machine Intell., vol. 12, pp.
55–73, Jan. 1990.
[3] J. M. H. Du Buf, “Gabor phase in texture
discrimination,” Signal Process., vol. 21,
pp. 221–240, 1990.
[4] J. M. H. Du Buf and P. Heitkämper,
“Texture features based on Gabor phase,”
Signal Process., vol. 23, pp. 225–244,
1991.
[5] J. Canny, “Computational approach to
edge detection,” IEEE Trans. Pattern
Anal. Machine Intell., vol. 8, pp. 679–698,
Nov. 1986.
[6] L. D. Cohen, “On active contour models
and balloons,” CVGIP: Image
Understand., vol. 53, pp. 211–218, Mar.
1991.
[7] J. G. Daugman and C. J. Downing,
“Demodulation, predictive coding, and
spatial vision,” J. Opt. Soc. Amer. A, vol.
12, pp. 641–660, Apr. 1995.
[8] R. Deriche, “Optimal edge detection using
recursive filtering,” in Proc. IEEE Int.
Conf. Computer Vision, 1987, pp. 501–
505.
[9] D. Dunn, W. E. Higgins, and J. Wakeley,
“Texture segmentation using 2-D Gabor
elementary functions,” IEEE Trans.
Pattern Anal. Machine Intell., vol. 16, pp.
130–149, Feb. 1994.
[10] T. Meier and K. Ngan, “Automatic
segmentation of moving objects for video
object plane generation,” IEEE Trans.
Circuits Syst. Video Technol., vol. 8, pp.
525–538, 1998.
[11] D. Wang, “Unsupervised video
segmentation based on watersheds and
temporal tracking,” IEEE Trans. Circuits
Syst. Video Technol., vol. 8, pp. 539–546,
1998.
[12] C. Gu and M. Lee, “Semiautomatic
segmentation and tracking of semantic
video objects,” IEEE Trans. Circuits Syst.
Video Technol., vol. 8, pp. 572–584,
1998.
[13] M. Kass, A. Witkin, and D. Terzopoulos,
“Snakes: Active contour models,” Int. J.
Comput. Vis., vol. 1, pp. 321–331, 1988.
[14] F. Leymarie and M. Levine, “Tracking
deformable objects in the plane using an
active contour model,” IEEE Trans.
Pattern Anal. Machine Intell.,vol. 15, pp.
617–633, 1993.

Contenu connexe

Tendances

3次元レジストレーションの基礎とOpen3Dを用いた3次元点群処理
3次元レジストレーションの基礎とOpen3Dを用いた3次元点群処理3次元レジストレーションの基礎とOpen3Dを用いた3次元点群処理
3次元レジストレーションの基礎とOpen3Dを用いた3次元点群処理Toru Tamaki
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationVARUN KUMAR
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
Fuzzy c means_realestate_application
Fuzzy c means_realestate_applicationFuzzy c means_realestate_application
Fuzzy c means_realestate_applicationCemal Ardil
 
igarss11benedek.pdf
igarss11benedek.pdfigarss11benedek.pdf
igarss11benedek.pdfgrssieee
 
Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm IJECEIAES
 
08 cie552 image_segmentation
08 cie552 image_segmentation08 cie552 image_segmentation
08 cie552 image_segmentationElsayed Hemayed
 
Effect of grid adaptive interpolation over depth images
Effect of grid adaptive interpolation over depth imagesEffect of grid adaptive interpolation over depth images
Effect of grid adaptive interpolation over depth imagescsandit
 
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece PsychotherapyIllustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece PsychotherapyIJMER
 
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)neeraj7svp
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator cscpconf
 

Tendances (18)

N018219199
N018219199N018219199
N018219199
 
3次元レジストレーションの基礎とOpen3Dを用いた3次元点群処理
3次元レジストレーションの基礎とOpen3Dを用いた3次元点群処理3次元レジストレーションの基礎とOpen3Dを用いた3次元点群処理
3次元レジストレーションの基礎とOpen3Dを用いた3次元点群処理
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Oc2423022305
Oc2423022305Oc2423022305
Oc2423022305
 
Fuzzy c means_realestate_application
Fuzzy c means_realestate_applicationFuzzy c means_realestate_application
Fuzzy c means_realestate_application
 
G234247
G234247G234247
G234247
 
Image Segmentation
 Image Segmentation Image Segmentation
Image Segmentation
 
igarss11benedek.pdf
igarss11benedek.pdfigarss11benedek.pdf
igarss11benedek.pdf
 
Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm
 
08 cie552 image_segmentation
08 cie552 image_segmentation08 cie552 image_segmentation
08 cie552 image_segmentation
 
Effect of grid adaptive interpolation over depth images
Effect of grid adaptive interpolation over depth imagesEffect of grid adaptive interpolation over depth images
Effect of grid adaptive interpolation over depth images
 
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece PsychotherapyIllustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
 
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator
 
40120130406008
4012013040600840120130406008
40120130406008
 
Kk3517971799
Kk3517971799Kk3517971799
Kk3517971799
 
Ijetcas14 372
Ijetcas14 372Ijetcas14 372
Ijetcas14 372
 

En vedette (20)

P33077080
P33077080P33077080
P33077080
 
Ib3313831387
Ib3313831387Ib3313831387
Ib3313831387
 
L33054060
L33054060L33054060
L33054060
 
Ik3314371440
Ik3314371440Ik3314371440
Ik3314371440
 
Ic3313881393
Ic3313881393Ic3313881393
Ic3313881393
 
Fe33940945
Fe33940945Fe33940945
Fe33940945
 
Gd3310901094
Gd3310901094Gd3310901094
Gd3310901094
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
Cc32497503
Cc32497503Cc32497503
Cc32497503
 
Mahruf -Resume
Mahruf -ResumeMahruf -Resume
Mahruf -Resume
 
Anthony laxen e_suites_escrowagree
Anthony laxen  e_suites_escrowagreeAnthony laxen  e_suites_escrowagree
Anthony laxen e_suites_escrowagree
 
PRESUNTOS
PRESUNTOS PRESUNTOS
PRESUNTOS
 
Teste
TesteTeste
Teste
 
Pi 101
Pi 101Pi 101
Pi 101
 
LegislaçãO Proposta
LegislaçãO PropostaLegislaçãO Proposta
LegislaçãO Proposta
 
妙而舒研究室
妙而舒研究室妙而舒研究室
妙而舒研究室
 
Album de mi familia
Album de mi familiaAlbum de mi familia
Album de mi familia
 
mecanica 01
mecanica 01mecanica 01
mecanica 01
 
Unilabor Novedades 2015
Unilabor Novedades 2015Unilabor Novedades 2015
Unilabor Novedades 2015
 
Oйы жүйріктің-тілі жүйрік
Oйы жүйріктің-тілі жүйрікOйы жүйріктің-тілі жүйрік
Oйы жүйріктің-тілі жүйрік
 

Similaire à W33123127

3 ijaems nov-2015-6-development of an advanced technique for historical docum...
3 ijaems nov-2015-6-development of an advanced technique for historical docum...3 ijaems nov-2015-6-development of an advanced technique for historical docum...
3 ijaems nov-2015-6-development of an advanced technique for historical docum...INFOGAIN PUBLICATION
 
A Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic BackgroundA Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic BackgroundIJERA Editor
 
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...sipij
 
Improving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning AlgorithmImproving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning Algorithmijsrd.com
 
AUTOMATIC THRESHOLDING TECHNIQUES FOR OPTICAL IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR OPTICAL IMAGESAUTOMATIC THRESHOLDING TECHNIQUES FOR OPTICAL IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR OPTICAL IMAGESsipij
 
Different Image Segmentation Techniques for Dental Image Extraction
Different Image Segmentation Techniques for Dental Image ExtractionDifferent Image Segmentation Techniques for Dental Image Extraction
Different Image Segmentation Techniques for Dental Image ExtractionIJERA Editor
 
An efficient approach to wavelet image Denoising
An efficient approach to wavelet image DenoisingAn efficient approach to wavelet image Denoising
An efficient approach to wavelet image Denoisingijcsit
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemIAEME Publication
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
Implementation and performance evaluation of
Implementation and performance evaluation ofImplementation and performance evaluation of
Implementation and performance evaluation ofijcsa
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...IOSR Journals
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy Systeminventy
 
HUMAN DETECTION IN HOURS OF DARKNESS USING GAUSSIAN MIXTURE MODEL ALGORITHM
HUMAN DETECTION IN HOURS OF DARKNESS USING GAUSSIAN MIXTURE MODEL ALGORITHMHUMAN DETECTION IN HOURS OF DARKNESS USING GAUSSIAN MIXTURE MODEL ALGORITHM
HUMAN DETECTION IN HOURS OF DARKNESS USING GAUSSIAN MIXTURE MODEL ALGORITHMijistjournal
 
Fuzzy entropy based optimal
Fuzzy entropy based optimalFuzzy entropy based optimal
Fuzzy entropy based optimalijsc
 
Sensitivity of Support Vector Machine Classification to Various Training Feat...
Sensitivity of Support Vector Machine Classification to Various Training Feat...Sensitivity of Support Vector Machine Classification to Various Training Feat...
Sensitivity of Support Vector Machine Classification to Various Training Feat...Nooria Sukmaningtyas
 

Similaire à W33123127 (20)

3 ijaems nov-2015-6-development of an advanced technique for historical docum...
3 ijaems nov-2015-6-development of an advanced technique for historical docum...3 ijaems nov-2015-6-development of an advanced technique for historical docum...
3 ijaems nov-2015-6-development of an advanced technique for historical docum...
 
A Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic BackgroundA Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic Background
 
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
 
05397385
0539738505397385
05397385
 
05397385
0539738505397385
05397385
 
Improving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning AlgorithmImproving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning Algorithm
 
AUTOMATIC THRESHOLDING TECHNIQUES FOR OPTICAL IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR OPTICAL IMAGESAUTOMATIC THRESHOLDING TECHNIQUES FOR OPTICAL IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR OPTICAL IMAGES
 
Different Image Segmentation Techniques for Dental Image Extraction
Different Image Segmentation Techniques for Dental Image ExtractionDifferent Image Segmentation Techniques for Dental Image Extraction
Different Image Segmentation Techniques for Dental Image Extraction
 
An efficient approach to wavelet image Denoising
An efficient approach to wavelet image DenoisingAn efficient approach to wavelet image Denoising
An efficient approach to wavelet image Denoising
 
How to Decide the Best Fuzzy Model in ANFIS
How to Decide the Best Fuzzy Model in ANFIS How to Decide the Best Fuzzy Model in ANFIS
How to Decide the Best Fuzzy Model in ANFIS
 
50120130405020
5012013040502050120130405020
50120130405020
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Implementation and performance evaluation of
Implementation and performance evaluation ofImplementation and performance evaluation of
Implementation and performance evaluation of
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy System
 
HUMAN DETECTION IN HOURS OF DARKNESS USING GAUSSIAN MIXTURE MODEL ALGORITHM
HUMAN DETECTION IN HOURS OF DARKNESS USING GAUSSIAN MIXTURE MODEL ALGORITHMHUMAN DETECTION IN HOURS OF DARKNESS USING GAUSSIAN MIXTURE MODEL ALGORITHM
HUMAN DETECTION IN HOURS OF DARKNESS USING GAUSSIAN MIXTURE MODEL ALGORITHM
 
Fuzzy entropy based optimal
Fuzzy entropy based optimalFuzzy entropy based optimal
Fuzzy entropy based optimal
 
Sensitivity of Support Vector Machine Classification to Various Training Feat...
Sensitivity of Support Vector Machine Classification to Various Training Feat...Sensitivity of Support Vector Machine Classification to Various Training Feat...
Sensitivity of Support Vector Machine Classification to Various Training Feat...
 

Dernier

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Dernier (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

W33123127

  • 1. Raviteja.Bhima / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.123-127 123 | P a g e Performance Evaluation Of Some Algorithms For Acoustic Images Using Image Segmentation Techniqes Raviteja.Bhima Abstract This paper is concerned with Unsupervised sonar image segmentation .We present a new estimation and segmentation procedure on images provided by a high resolution sonar. The sonar image is segmented in to two kinds of regions:Shadow (corresponding to a lack of acoustic reverberation behind each object lying on seabed) and Reverberation (Due the reflection of acoustic wave on the seabed and on the objects).The unsupervised contextual method is defined as a two-step processExpectation Maximization Algorithm and Statistical Region SnakeTheory[1]. The expectation maximization algorithm is very useful for parameter estimation problems in finite mixtures. The stochastic EM algorithm is a widely applicable approach for computing maximum likelihood estimates for the mixture problem[2].During past years the active contour models (Snakes) have been widely used for finding the contours of objects. This segmentation strategy is classically edge-based in the sense that the snake is driven to fit the maximum of an edge map of the scene.This technique has been successfully applied to real sonar images, and is compatible with an automatic processing of massive amounts of data. IndexTerms: Active contours , Image edge detection , Imageprocessing ,Unsupervised Imagese gmentation ,Expectation,MaximizationAlgorithm, Snake Algorithm , Introduction In image analysis, image segmentationis the partition of a digital image into multiple regions (sets of pixels) with each region associated with one of a finite number of classes that are modeled as distinct random fields[3]. An important problem is that of parameter estimation since the random field models are mostly parametricmodels specified by a small number of parameters which have to be estimated from the data. In most of the previous considerations, supervised approacheswhich usually assume training data to be available for image classes, the parameters can be estimated from the training data before segmentation is widely used. Although this supervised approach avoids the complexity of a combined problem of estimation and segmentation, it is rather unrealistic in many practical situations. To automatically detect objects in side-scan sonar images, supervised approaches are difficult due to the large variability in the appearance of side- scan images. Thus, unsupervised approacheswhich also allow analysis to be carried out while the data is being collected, enabling mission plans to be changed depending on the data collected are strongly needed[4]. In sonar imagery, three kinds of regions can be visualized: highlight, shadow, and sea bottom reverberation areas. The highlight information is caused by the reflection of the acoustic wave on the object, while the shadow zone corresponds to a lack of acoustic reverberation behind the object. Fig (1) The formation of object area in side scan image System Model& EM Algorithm
  • 2. Raviteja.Bhima / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.123-127 124 | P a g e The EM algorithm is the most general effective algorithm for solving in complete data problems. The definitive reference for this algorithm was written by Dempster, Laird & Rubin in 1977. Basically it works as follows. Let x= (yT , zT ) be a set of random data of interest, where y is the observed data & z is the part of x that is not observable. For example, in image segmentation y is the set of image pixel intensities and is observable, whereas z is the image class status of the pixels that is not visible. Usually the observable y is called the incomplete data, & x is called the complete data. Let g(x/Ψ) be the probability density function of the complete data, where Ψ is a parameter vector that characterize the density function. The incomplete data problem is to estimate Ψ based only on the observations represented by the incomplete data y. It generates from some initial approximation Ψ(0), a sequence of estimate Ψ(p), where each iteration consist of the following two steps Expectation-step(E=step) Determine the function Q(Ψ|))=E[log(g(X|Ψ))|y,(p)] (1) Maximization-step(M-step) Find the maximizor Ψ(p+1) ) =arg max(Q(Ψ| (p))) (2) Here, p represents the pth iteration. It has been that under some relatively general conditions, the estimate converges to the ML estimate of the incomplete data problem, at least locally. Model of EM Algorithm This is the simplest case, where the data is fully categorized. The fully categorized data can be generally represented as {xi,i=1,……,N}={(yi,zi T )T ,i=1,…..,N}(3) Where each zi=(zi,1,……,zi,k)T is an indicator vector of length k with 1 in the kth position & zeros elsewhere. Then the likelihood function corresponding to (  i,……..,  N) can then be written in the form     N i N i ikiii zzyx ff 1 1 1 )|,.....,,()|()|g(X  )1( ˆ p k =  N i p ik N 1 ˆ 1  ;k=1,2,…K, Snake Algorithm The technique discussed in this section is based on research conducted in [1], where snakes are used under a statistical framework to segment images. Whilst many region based techniques are often computationally insensitive, the techniques described here is very fast, allowing much of the intensive calculations to be computed before the segmentation commences. This is possible when the statistical laws present in the image can be described by the exponential family, making the approach applicable in a wide range of physical situations[12]. Assume that the observed scene (The raw side scan sonar image) y is composed of two areas: Target (Shadow or highlight) and background of, we wish to, segment the target region. We consider the image y ={y(i,j)|(i,j)[1,Ni][1,Nj]} to be composed of Ni Nj pixels where the gray levels of the Nt target pixels and the gray levels of Nb Background pixels are assumed to be uncorrelated and independently disturbed. They are described by their respectively probability density functions f(y(i,j)| t ) and f(y(i,j)| b ) where t and b Are the parameters of the probability density functions[10]. We define a binary window function W={w(i,j)|w(i,j) [1,Ni] [1,Nj]} which defines the shape of the snake at any instant of time. Defining w(i,j) to be equal to 1 inside the windowand 0 elsewhere, the image becomes composed of tworegions Ωt ={(i,j)|w(i,j)=1} and Ωb={(i,j)|w(i,j)=0} so that the observed image can be viewed as the sum of two component y(i,j)=t(i,j)w(i,j)+b(i,j)(1-w(i,j)) (4)
  • 3. Raviteja.Bhima / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.123-127 125 | P a g e Where t(i,j) and b(i,j) are values drawn fromtheir respective probability distributions. Therefore the purpose of segmentation becomes to estimate the most likely shape w for the target in the sense. Without any a priori knowledge about the shape of the target, the best w is chosen by maximizing the likelihood function[8]. g[y|w,t ,b ]=g( t |  bbt g |(). ) (5) The likelihood function is expressed as a product of probabilities as the pixels are assumed to be uncorrelated and u {y(i,j)|(i,j) u }(u=t or u=b). (6) As we can see the likelihood function in (5.2) depends on the parameters of the probability functions as well as the window shape w. the parameter vector u where u{t,b} are the priori unknown and are in general of ni interest .However for segmentation to be possible it is necessary to compute these values. The parameters can be calculated using a variety of techniques such as a maximum a posteriori approach, but for simplicity, a maximum likelihood approach is again utilised as no a priori knowledge on the values of the parameters is available[8]. In order to proceed one has to specify parameters expression for the probability density functions f(y(i,j)|t ) and f(y(i,j)|b Here we consider probability density functions which belong to the exponential families for r(i,j) and b(i,j). Taking into account the sufficient statistics if we choose Maximum likelihood estimation and insert these estimates in the likelihood function l(y,w)[9]. l(y,w)=log{ ]([ tt tG }+log{ )]([ bb tG }(4) Where Gu are the functions which depend on y only via t( u ). The window function w that maximizes the criterion J(y,w)=-l(y,w) then performs a maximum likelihood segmentation of the target in the sense. The criterion can consequently be regarded as energy acting on the snake since its minimization forces the contour to surround thetarget. For this purpose, we can use an iterativealgorithm in which we have to calculate the criterion J(y,w) for each deformation of the snake. Thus, the minimization procedure can be time consuming. In the next section, we show how to obtain the optimal criterion J(y,w). Simulation Results Side scan sonar Images close image 10 20 30 40 50 60 70 10 20 30 40 50 60 70 Bot-hat image 10 20 30 40 50 60 70 10 20 30 40 50 60 70
  • 4. Raviteja.Bhima / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.123-127 126 | P a g e Segmentation result of a synthetic image Probability Density of the Three Pixel Classes (Good Conditions) Snake Algorithm: Conclusion Image processing is a rapidly growing area of computer science. Its growth has been fueled by technological advances in digital x y Morphological clustering image 10 20 30 40 50 60 10 20 30 40 50 60 1 2 3 x y Segmentation of Synthetic image 10 20 30 40 50 60 10 20 30 40 50 60 1 2 3 0 10 20 30 40 50 60 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 Normalized historgram and estimated mixture pixel intensity value probability Nomalized histogram Sum of pdf Shadow Background Target 10 20 30 40 50 60 70 10 20 30 40 50 60 70 5 10 15 20 25 30 35 40 45 50 10 20 30 40 50 60 70 10 20 30 40 50 60 70 5 10 15 20 25 30 35 40 45 50 x y Clustering and segmentation of Synthetic image 10 20 30 40 50 60 10 20 30 40 50 60 1 2 3 Iteration Result: Polygon 8 Nodes (Bad Highlight Contrast) EM Algorithm Iteration Result: Polygon 4 Nodes (Bad Highlight Contrast)
  • 5. Raviteja.Bhima / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.123-127 127 | P a g e imaging, computer processors and mass storage devices. Fields which traditionally used analog imaging are now switching to digital systems, for their flexibility and affordability. Important examples are medicine, film and video production, photography, remote sensing, and security monitoring. Nowadays, image segmentation represents a task of growing importance in many different fields. This technique is finding broad applications in underwater acoustics, space born remote sensing, medical imaging systems, non-distractive material analysis, as well as spoken language processing[14]. This paper concludes that it is to explore the potential growth areas of using these two algorithms in side scan imagery. Evaluating and comparing their performances for both synthetic and real sonar images using the software simulation tool MATLAB. References [1] R. Adams and L. Bischof, “Seeded region growing,” IEEE Trans. Pattern Anal. Machine Intell., vol. 6, June 1994. [2] A. C. Bovic, M. Clark, and W. S. Geisler, “Multichannel texture analysis using localized spatial filters,” IEEE Trans. Pattern Anal. Machine Intell., vol. 12, pp. 55–73, Jan. 1990. [3] J. M. H. Du Buf, “Gabor phase in texture discrimination,” Signal Process., vol. 21, pp. 221–240, 1990. [4] J. M. H. Du Buf and P. Heitkämper, “Texture features based on Gabor phase,” Signal Process., vol. 23, pp. 225–244, 1991. [5] J. Canny, “Computational approach to edge detection,” IEEE Trans. Pattern Anal. Machine Intell., vol. 8, pp. 679–698, Nov. 1986. [6] L. D. Cohen, “On active contour models and balloons,” CVGIP: Image Understand., vol. 53, pp. 211–218, Mar. 1991. [7] J. G. Daugman and C. J. Downing, “Demodulation, predictive coding, and spatial vision,” J. Opt. Soc. Amer. A, vol. 12, pp. 641–660, Apr. 1995. [8] R. Deriche, “Optimal edge detection using recursive filtering,” in Proc. IEEE Int. Conf. Computer Vision, 1987, pp. 501– 505. [9] D. Dunn, W. E. Higgins, and J. Wakeley, “Texture segmentation using 2-D Gabor elementary functions,” IEEE Trans. Pattern Anal. Machine Intell., vol. 16, pp. 130–149, Feb. 1994. [10] T. Meier and K. Ngan, “Automatic segmentation of moving objects for video object plane generation,” IEEE Trans. Circuits Syst. Video Technol., vol. 8, pp. 525–538, 1998. [11] D. Wang, “Unsupervised video segmentation based on watersheds and temporal tracking,” IEEE Trans. Circuits Syst. Video Technol., vol. 8, pp. 539–546, 1998. [12] C. Gu and M. Lee, “Semiautomatic segmentation and tracking of semantic video objects,” IEEE Trans. Circuits Syst. Video Technol., vol. 8, pp. 572–584, 1998. [13] M. Kass, A. Witkin, and D. Terzopoulos, “Snakes: Active contour models,” Int. J. Comput. Vis., vol. 1, pp. 321–331, 1988. [14] F. Leymarie and M. Levine, “Tracking deformable objects in the plane using an active contour model,” IEEE Trans. Pattern Anal. Machine Intell.,vol. 15, pp. 617–633, 1993.