SlideShare une entreprise Scribd logo
1  sur  30
IMAGE REPRESENTATION &
DESCRIPTORS
By
Pundrik Patel (304)
Hardik Prajapati(270)
DEPARTMENTOF ELECTRICAL ENGINEERING
FACULTY OFTECHNOLOGY AND ENGINEERING
THE MAHARAJA SAYAJIRAO UNIVERSITYOF BARODA
VADODARA,GUJARAT, INDIA
Introduction
 After an image has been segmented into regions ; the resulting
pixels is usually is represented and described in suitable form for
further computer processing.
 Representing regions incolves in to two choices: in terms of it’s
1) external characteristics ( boundary)
2) internal characteristics ( pixels)
 Above task is making data useful to computer
 Next task is to describe the region on bases of representation
 External representation is chosen when primary focus on
shape characteristics.
 Internal representation is chosen when primary focus on
regionl properties like color and texture characteristics.
 Sometime it is possible to choose both characteristics.
 Features selected as descriptors should be insensitive to
changes in size, tanslation & rotation.
Representation
 It deals with compaction of segmented data into
representations that facilitate the computation of
descriptors.
 Technique of Representation :-
a. Chain codes
b. Polygonal Approximations
- Minimum perimeter polygones
- Merging technique
- Splitting technique
c. Signatures
d. Boundary Segments
e. Skeletons
Chain codes
 They are used to represent a boundary by a connected
sequence of straight line segments of specified length &
direction.
 Typically this representation is based on 4- or 8- connectivity
of segments.
 The direction of each segments is coded by using a
numbering scheme.
1
0
3
2
2
1
0
3
4
5
6
7
4-connectivity 8-connectivity
 A boundary code formrd as a sequence of such directional
number is referred as a Freeman chain code.
 Digital images are acquired & processed in a grid format with
equal spacing in x and y directions.
 So a chain code can be generated by following a boundary
(say clockwise direction) and assigning a direction to the
segments connecting every pair of pixels.
 Unacceptable method: (because)
1) Resulting chain tends to be quite long
2) Any small disturbances along the boundary due to noise
or imperfect segmentation can cause changes in code.
 A solution to this problem is to resample the boundary by
selecting a larger grid spacing.
 Then, as the boundary is traversed, a boundary point is
assigned to each node of the large grid, depending upon the
proximity of original boundary to that node.
 The re-sampled boundary can now be represented by a 4- or
8-code.
 The accuracy of the resulting code representation depends
on the spacing of the sampling grid.
 Example:-
Start Chain Code:
0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
 The chain code of a boundary depends upon the starting point.
 However the code can be normalized:
– Assume the chain is a circular sequence
(given a chain of 1 to N codes ; N+1 = 1)
– Redefine the starting point such that we generate an integer of
smallest magnitude
Chain Code 1 Chain Code 2
0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1, 0, 0, 0
Normalized Code 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
 Chain code depend on orientation
– a rotation results in a different chain code One solution
– Use the “first difference” of the chain code instead of the
code itself
 The difference is obtained by simply counting (counter-
clockwise) the number of directions that separate two
adjacent elements
0
1
2
3
Difference: Count the number of separating
directions inan anti-clockwise fashion
2 1 0 1 0 3 3 2 2 2 Chain Code
3 3 1 3 3 0 3 0 Difference Code
Ex. First difference of 4-direction chain code
10103322 is 3133030.
Considering the circular sequence first
element is calculated by subtracting last and
first component. Ex. 33133030
Polygon Approximation
 A digital boundary can be approximated with arbitrary
accuracy by a polygon.
 For a closed boundary, approx becomes exact when
no. of segments of polygon = no. of points in the boundary.
 Goal of poly. Approx is to capture the essence of the shape in
a given boundary using fewest no. of segments.
Min. Perimeter Polygon (MPP):
 An approach for generating an algorithm to compute MPPs
is to enclose a boundary by a set of concatenated cells.
 Allow the boundary to shrink as a rubber band.
 This shrinking produces the shape of a polygon of min.
perimeter.
 Size of cells determine the accuracy of the polygonal
approximation.
 In the limit if size of each cell corresponds to a pixel in the
boundary , the error in each cell between the boundary & the
MPP approx. at most would be √2d, where d-min possible
pixel distance.
 The objective is to use the largest possible cell size
acceptable in a given application.
 Thus, producing MPPs with fewest no. of vertices.
 The cellular approach reduces the shape of the object
enclosed by the original boundary.
boundary
enclose
by
cells
Min. Perimeter
Polygon
Merging Techniques
 Techniques based on average error or other criteria have
been applied to the problem of polygonal approximation.
 One approach is to merge points along a boundary until the
least square error line fit of the points merged so far exceeds
a preset threshold.
 When this condition occurs, parameters of line are stored,
the error is set to 0, the procedure is repeated, merging new
points along the boundary until the error again exceeds the
threshold.
 Merging technique problem:
– No guarantee for corner detection
 Solution:
– Splitting Techniques
Splitting Techniques
 to subdivide a segment successively into two parts until a
given criterion is satisfied.
– Objective: seeking prominent inflection points
Step:-
1. Start with an initial guess, e.g., based on majority axes
2. Calculate the orthogonal distance from lines to all points
3. If maximum distance > threshold, create new vertex there
4. Repeat until no points exceed criterion
Example:-
Signature
 It is a 1D functional representation of a boundary & may be
generated in various ways.
 One of the simplest is to plot the distance from the centroid
to the boundary as a function of angle.
 Signatures generated by this method are invariant to
translation but they depend on rotation and scaling.
 Normalization with respect to rotation can be achieved by
finding a way to select the same starting point to generate
the signature , according to shape.
 One way to normalize this is to scale all functions so that
they always span the same range of values. e.g [0,1]
 Advantage :
- it’s simplicity
 disadvantage :
- scaling of the entire function depends upon only two
values: maximum & minimum.
Boundary segments
 The boundary can be decomposed into segments.
– Useful to extract information from concave parts of the
objects.
 A good way to achieve this is to calculate the convex Hull of
the region enclosed by the boundary Hull.
 Can be a bit noise sensitive
1. Smooth prior to Convex hull calculation
2. Calculate Convex Hull on polygon approximation
 Convex Hull, H, of an arbitrary set, S, is the smallest set
containing S
 H minus S (H-S)
– Is called the convex deficiency
 We can use the convex deficiency to mark features
Follow the contour of S and mark points that transitions
into or out of the convex deficiency
 Using Convex Hull and its Deficiency
This data can be used to describe the region
– Number of pixels in convex deficiency
– Number of components in convex deficiency
– Ratio lengths of the transition points
– so on
Skeletons
 An important approach to represent the structural shape of a
plane region is to reduce it to a graph.
 The reduction may be accomplished by obtaining the
skeleton of the region via thinning (skeletonizing) algorithm.
 Skeleton of a region may be defined as the medial axis
transformation (MAT).
 MAT of a region R with border B is as follows:
- For every point p in R, we find its closest neighbor in B. If
p has more than such neighbor, it is said to belong to the
medial axis (skeleton).
‘prairie fire concept’
 Implementation involves calculating the distance from every
interior point to every boundary point on region.
 Thinning algorithm deals with deleting the boundary points
of a region subject to condition that deleting these points:
1) Does not remove end points.
2) Does not break connectivity &
3) Does not cause excessive erosion of the region.
 Thinning algorithm:
Region points are assumed to have value 1 & background
points are assumed to have value 0.
p9 p2 p3
p8 p1 p4
p7 p6 p5
 Step 1
flags a contour point for deletion if the followingconditions
are satisfied:
a) 2 ≤ N(p1) ≤ 6
b)T(p1) = 1
c) p2.p4.p6 = 0
d) p4.p6.p8 = 0
where N(p1) is the number of nonzero neighbors of p1;
i.e. N(p1) = p2 + p3 + …… + p8 + p9
where pi is either 0 or 1.
T(p1) is number of 0-1 transitions in the ordered sequence p2,
p3, ….., p8, p9., p2
 In Step 2:
conditions a & b remain the same, but conditions c & d are
changed to
c’) p2.p4.p8 = 0
d’) p2.p6.p8 = 0
0 0 1
1 p1 0
1 0 1
Step 1 is applied to every border pixel in binary region under
Consideration If 1 or more of conditions a to d are violated, the
value of point in question is not changed.
 If all conditions are satisfied, the point is flagged
for deletion.
 But not deleted until all border points have been
processed.
 This delay prevents the change of structure of
data during execution of algorithm.
 After step 1 been applied to all border points,
those who are flagged are deleted (changed to
0).
 Step 2 is applied to resulting data in exactly
same manner as step1.
Boundary Descriptors
 Some simple discriptors:-
 Length of the contour
– Simply count the number of pixels along the border
–You may consider diagonally connected pixels to count as √2
 Diameter of the boundary B
– Diam(B) = max[D(pi,pj)]
– this is the major axis of the region
 Curvature
– Rate of change of the slope
 Bounding Box
– Smallest rectangle (aligned with the image axis) that can bound
the region
 Shape number
– compute the chain code difference
– re-order this to create the minimum integer
– this is called the shape number
 Example:-
 Fourier Descriptors
 Consider an N-point digital boundary in the xy plane
 This forms a coordinate pairs (xo, yo), (x1, y2), . . . . ., (xn-1, yn-1)
 We can consider this as two vectors
– x(k) = xk
– y(k) = yk
 Furthermore
– We could consider this a complex number
– s(k) = x(k) + jy(k) where j=sqrt(-1)
 Using the vector s(k)
 Compute the 1-D Discrete FourierTransform
Thank
You

Contenu connexe

Tendances

Interpixel redundancy
Interpixel redundancyInterpixel redundancy
Interpixel redundancyNaveen Kumar
 
SPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGSPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGmuthu181188
 
Histogram Processing
Histogram ProcessingHistogram Processing
Histogram ProcessingAmnaakhaan
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image FundamentalsA B Shinde
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processingkiruthiammu
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentationasodariyabhavesh
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Kalyan Acharjya
 
Point processing
Point processingPoint processing
Point processingpanupriyaa7
 
Color Image Processing: Basics
Color Image Processing: BasicsColor Image Processing: Basics
Color Image Processing: BasicsA B Shinde
 
Hough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamHough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamNazmul Islam
 
Predictive coding
Predictive codingPredictive coding
Predictive codingp_ayal
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic codingVikas Goyal
 
Image Enhancement using Frequency Domain Filters
Image Enhancement using Frequency Domain FiltersImage Enhancement using Frequency Domain Filters
Image Enhancement using Frequency Domain FiltersKarthika Ramachandran
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processingAhmed Daoud
 
Simultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color ImagesSimultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color ImagesCristina Pérez Benito
 

Tendances (20)

Interpixel redundancy
Interpixel redundancyInterpixel redundancy
Interpixel redundancy
 
SPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGSPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSING
 
Histogram Processing
Histogram ProcessingHistogram Processing
Histogram Processing
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image Fundamentals
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processing
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
 
Point processing
Point processingPoint processing
Point processing
 
Color Image Processing: Basics
Color Image Processing: BasicsColor Image Processing: Basics
Color Image Processing: Basics
 
Image segmentation
Image segmentation Image segmentation
Image segmentation
 
Edge detection
Edge detectionEdge detection
Edge detection
 
Hough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamHough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul Islam
 
Lzw coding technique for image compression
Lzw coding technique for image compressionLzw coding technique for image compression
Lzw coding technique for image compression
 
Predictive coding
Predictive codingPredictive coding
Predictive coding
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic coding
 
Image Enhancement using Frequency Domain Filters
Image Enhancement using Frequency Domain FiltersImage Enhancement using Frequency Domain Filters
Image Enhancement using Frequency Domain Filters
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
 
Simultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color ImagesSimultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color Images
 

Similaire à Image Representation & Descriptors

Image representation
Image representationImage representation
Image representationRahul Dadwal
 
Two Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingTwo Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingChamod Mune
 
47549379 paper-on-image-processing
47549379 paper-on-image-processing47549379 paper-on-image-processing
47549379 paper-on-image-processingmaisali4
 
MDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersMDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersEricsson
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection NetworkHeman Pathak
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally puncturedeSAT Publishing House
 
Report AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro SantoroReport AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro SantoroPietro Santoro
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
 
Module-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfModule-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfvikasmittal92
 
Performance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codesPerformance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codeseSAT Journals
 
Final Project Report Nadar
Final Project Report NadarFinal Project Report Nadar
Final Project Report NadarMaher Nadar
 
ImageSegmentation (1).ppt
ImageSegmentation (1).pptImageSegmentation (1).ppt
ImageSegmentation (1).pptNoorUlHaq47
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.pptAVUDAI1
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.pptDEEPUKUMARR
 
Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...TELKOMNIKA JOURNAL
 

Similaire à Image Representation & Descriptors (20)

representation.pptx
representation.pptxrepresentation.pptx
representation.pptx
 
Image representation
Image representationImage representation
Image representation
 
Two Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingTwo Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image Processing
 
Representation image
Representation imageRepresentation image
Representation image
 
47549379 paper-on-image-processing
47549379 paper-on-image-processing47549379 paper-on-image-processing
47549379 paper-on-image-processing
 
MDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersMDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizers
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally punctured
 
Report AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro SantoroReport AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro Santoro
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
G364246
G364246G364246
G364246
 
Module-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfModule-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdf
 
Performance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codesPerformance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codes
 
Final Project Report Nadar
Final Project Report NadarFinal Project Report Nadar
Final Project Report Nadar
 
ImageSegmentation (1).ppt
ImageSegmentation (1).pptImageSegmentation (1).ppt
ImageSegmentation (1).ppt
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.ppt
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.ppt
 
2015LISAT_pathloss1
2015LISAT_pathloss12015LISAT_pathloss1
2015LISAT_pathloss1
 
Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...
 

Dernier

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Dernier (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Image Representation & Descriptors

  • 1. IMAGE REPRESENTATION & DESCRIPTORS By Pundrik Patel (304) Hardik Prajapati(270) DEPARTMENTOF ELECTRICAL ENGINEERING FACULTY OFTECHNOLOGY AND ENGINEERING THE MAHARAJA SAYAJIRAO UNIVERSITYOF BARODA VADODARA,GUJARAT, INDIA
  • 2. Introduction  After an image has been segmented into regions ; the resulting pixels is usually is represented and described in suitable form for further computer processing.  Representing regions incolves in to two choices: in terms of it’s 1) external characteristics ( boundary) 2) internal characteristics ( pixels)  Above task is making data useful to computer  Next task is to describe the region on bases of representation
  • 3.  External representation is chosen when primary focus on shape characteristics.  Internal representation is chosen when primary focus on regionl properties like color and texture characteristics.  Sometime it is possible to choose both characteristics.  Features selected as descriptors should be insensitive to changes in size, tanslation & rotation.
  • 4. Representation  It deals with compaction of segmented data into representations that facilitate the computation of descriptors.  Technique of Representation :- a. Chain codes b. Polygonal Approximations - Minimum perimeter polygones - Merging technique - Splitting technique c. Signatures d. Boundary Segments e. Skeletons
  • 5. Chain codes  They are used to represent a boundary by a connected sequence of straight line segments of specified length & direction.  Typically this representation is based on 4- or 8- connectivity of segments.  The direction of each segments is coded by using a numbering scheme. 1 0 3 2 2 1 0 3 4 5 6 7 4-connectivity 8-connectivity
  • 6.  A boundary code formrd as a sequence of such directional number is referred as a Freeman chain code.  Digital images are acquired & processed in a grid format with equal spacing in x and y directions.  So a chain code can be generated by following a boundary (say clockwise direction) and assigning a direction to the segments connecting every pair of pixels.  Unacceptable method: (because) 1) Resulting chain tends to be quite long 2) Any small disturbances along the boundary due to noise or imperfect segmentation can cause changes in code.
  • 7.  A solution to this problem is to resample the boundary by selecting a larger grid spacing.  Then, as the boundary is traversed, a boundary point is assigned to each node of the large grid, depending upon the proximity of original boundary to that node.  The re-sampled boundary can now be represented by a 4- or 8-code.  The accuracy of the resulting code representation depends on the spacing of the sampling grid.  Example:- Start Chain Code: 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
  • 8.  The chain code of a boundary depends upon the starting point.  However the code can be normalized: – Assume the chain is a circular sequence (given a chain of 1 to N codes ; N+1 = 1) – Redefine the starting point such that we generate an integer of smallest magnitude Chain Code 1 Chain Code 2 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1, 0, 0, 0 Normalized Code 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
  • 9.  Chain code depend on orientation – a rotation results in a different chain code One solution – Use the “first difference” of the chain code instead of the code itself  The difference is obtained by simply counting (counter- clockwise) the number of directions that separate two adjacent elements 0 1 2 3 Difference: Count the number of separating directions inan anti-clockwise fashion 2 1 0 1 0 3 3 2 2 2 Chain Code 3 3 1 3 3 0 3 0 Difference Code Ex. First difference of 4-direction chain code 10103322 is 3133030. Considering the circular sequence first element is calculated by subtracting last and first component. Ex. 33133030
  • 10. Polygon Approximation  A digital boundary can be approximated with arbitrary accuracy by a polygon.  For a closed boundary, approx becomes exact when no. of segments of polygon = no. of points in the boundary.  Goal of poly. Approx is to capture the essence of the shape in a given boundary using fewest no. of segments.
  • 11. Min. Perimeter Polygon (MPP):  An approach for generating an algorithm to compute MPPs is to enclose a boundary by a set of concatenated cells.  Allow the boundary to shrink as a rubber band.  This shrinking produces the shape of a polygon of min. perimeter.  Size of cells determine the accuracy of the polygonal approximation.  In the limit if size of each cell corresponds to a pixel in the boundary , the error in each cell between the boundary & the MPP approx. at most would be √2d, where d-min possible pixel distance.  The objective is to use the largest possible cell size acceptable in a given application.  Thus, producing MPPs with fewest no. of vertices.
  • 12.  The cellular approach reduces the shape of the object enclosed by the original boundary. boundary enclose by cells Min. Perimeter Polygon
  • 13. Merging Techniques  Techniques based on average error or other criteria have been applied to the problem of polygonal approximation.  One approach is to merge points along a boundary until the least square error line fit of the points merged so far exceeds a preset threshold.  When this condition occurs, parameters of line are stored, the error is set to 0, the procedure is repeated, merging new points along the boundary until the error again exceeds the threshold.  Merging technique problem: – No guarantee for corner detection  Solution: – Splitting Techniques
  • 14. Splitting Techniques  to subdivide a segment successively into two parts until a given criterion is satisfied. – Objective: seeking prominent inflection points Step:- 1. Start with an initial guess, e.g., based on majority axes 2. Calculate the orthogonal distance from lines to all points 3. If maximum distance > threshold, create new vertex there 4. Repeat until no points exceed criterion
  • 16. Signature  It is a 1D functional representation of a boundary & may be generated in various ways.  One of the simplest is to plot the distance from the centroid to the boundary as a function of angle.  Signatures generated by this method are invariant to translation but they depend on rotation and scaling.  Normalization with respect to rotation can be achieved by finding a way to select the same starting point to generate the signature , according to shape.  One way to normalize this is to scale all functions so that they always span the same range of values. e.g [0,1]
  • 17.  Advantage : - it’s simplicity  disadvantage : - scaling of the entire function depends upon only two values: maximum & minimum.
  • 18. Boundary segments  The boundary can be decomposed into segments. – Useful to extract information from concave parts of the objects.  A good way to achieve this is to calculate the convex Hull of the region enclosed by the boundary Hull.  Can be a bit noise sensitive 1. Smooth prior to Convex hull calculation 2. Calculate Convex Hull on polygon approximation
  • 19.  Convex Hull, H, of an arbitrary set, S, is the smallest set containing S  H minus S (H-S) – Is called the convex deficiency  We can use the convex deficiency to mark features Follow the contour of S and mark points that transitions into or out of the convex deficiency
  • 20.  Using Convex Hull and its Deficiency This data can be used to describe the region – Number of pixels in convex deficiency – Number of components in convex deficiency – Ratio lengths of the transition points – so on
  • 21. Skeletons  An important approach to represent the structural shape of a plane region is to reduce it to a graph.  The reduction may be accomplished by obtaining the skeleton of the region via thinning (skeletonizing) algorithm.  Skeleton of a region may be defined as the medial axis transformation (MAT).  MAT of a region R with border B is as follows: - For every point p in R, we find its closest neighbor in B. If p has more than such neighbor, it is said to belong to the medial axis (skeleton). ‘prairie fire concept’
  • 22.  Implementation involves calculating the distance from every interior point to every boundary point on region.  Thinning algorithm deals with deleting the boundary points of a region subject to condition that deleting these points: 1) Does not remove end points. 2) Does not break connectivity & 3) Does not cause excessive erosion of the region.
  • 23.  Thinning algorithm: Region points are assumed to have value 1 & background points are assumed to have value 0. p9 p2 p3 p8 p1 p4 p7 p6 p5  Step 1 flags a contour point for deletion if the followingconditions are satisfied: a) 2 ≤ N(p1) ≤ 6 b)T(p1) = 1 c) p2.p4.p6 = 0 d) p4.p6.p8 = 0
  • 24. where N(p1) is the number of nonzero neighbors of p1; i.e. N(p1) = p2 + p3 + …… + p8 + p9 where pi is either 0 or 1. T(p1) is number of 0-1 transitions in the ordered sequence p2, p3, ….., p8, p9., p2  In Step 2: conditions a & b remain the same, but conditions c & d are changed to c’) p2.p4.p8 = 0 d’) p2.p6.p8 = 0 0 0 1 1 p1 0 1 0 1 Step 1 is applied to every border pixel in binary region under Consideration If 1 or more of conditions a to d are violated, the value of point in question is not changed.
  • 25.  If all conditions are satisfied, the point is flagged for deletion.  But not deleted until all border points have been processed.  This delay prevents the change of structure of data during execution of algorithm.  After step 1 been applied to all border points, those who are flagged are deleted (changed to 0).  Step 2 is applied to resulting data in exactly same manner as step1.
  • 26. Boundary Descriptors  Some simple discriptors:-  Length of the contour – Simply count the number of pixels along the border –You may consider diagonally connected pixels to count as √2  Diameter of the boundary B – Diam(B) = max[D(pi,pj)] – this is the major axis of the region  Curvature – Rate of change of the slope  Bounding Box – Smallest rectangle (aligned with the image axis) that can bound the region
  • 27.  Shape number – compute the chain code difference – re-order this to create the minimum integer – this is called the shape number  Example:-
  • 28.  Fourier Descriptors  Consider an N-point digital boundary in the xy plane  This forms a coordinate pairs (xo, yo), (x1, y2), . . . . ., (xn-1, yn-1)  We can consider this as two vectors – x(k) = xk – y(k) = yk  Furthermore – We could consider this a complex number – s(k) = x(k) + jy(k) where j=sqrt(-1)
  • 29.  Using the vector s(k)  Compute the 1-D Discrete FourierTransform