SlideShare une entreprise Scribd logo
1  sur  71
RECOGNITION OF
OBJECTS
Group Members
ASHA SAJU LIYA C ANTO SANIYA CORREYA TINU PAUL
Jasmine Jasmine (name)
Jasmine (street)
Jasmine(flower)
Recognition problem hard with computer
For human being it is easy to recognize the objects by color, texture and
appearance.
A spontaneous, natural activity for humans and other biological systems.
People know about millions of different objects, yet they can easily
distinguish among them.
But in the case of computers they are not able to recognize just with
appearance. There must be detailed screening to be done to identify a
object.
A FLOWER
Main problems faced by computer while
detecting objects
Scale and shape of the imaged object varies
with viewpoint
Occlusion (self- or by a foreground object)
Lighting changes
Background “clutter”
Occlusion
Rotation
Lighting Changes
Scaled Image
Pixel Representation
• Just pixels is a bad representation
• Pixel intensities are affected by a lot of
different things like
Why pixel matching is not a good method??
Rotation
 scaling
 perspective
Illumination changes
 Reordering of scenes
– starting from an image of an object of interest (the query), search
through an image dataset to obtain (or retrieve) those images that
contain the target object.
OBJECT RECOGNITION
Definition
• Object recognition is a task of finding and
identifying object in an image or video sequence.
• The goal of instance-level recognition is to match
(recognize) a specific object or scene.
Object Recognition Process
Query Image
Divide it into grids
Find key points
How to Detect Key points
Key points are the features or points in an image
that doesn’t change their positions in the original
image even if the image is scaled, rotated or
translated.
These points remains fixed in all these cases.
Descriptors
 Each key point has many descriptions.
 Lowe's method for image feature generation transforms an image
into a large collection of feature vectors, each of which is
invariant to image translation,
invariant to scaling,
invariant to rotation.
How can we find descriptors??
Commonly used methods
SIFT
SURF
SIFT Descriptors
Scale Invariant Feature Transform
Compute regions in each image independently
“Label” each region by a vector of descriptors
Find corresponding regions by matching to closest descriptor
vector
Score each frame in the database by the number of matches
Difference of Gaussians function is applied in scale space to a
series of smoothed and re-sampled images.
(a)233x189 image
(b) 832 DOG extrema
• Consider a certain threshold value.
Discard points that are not within the range of this threshold.
729 left after peak value threshold
Dominant orientations are assigned.
These steps ensure that the key points are more stable for matching and recognition.
536 left after testing ratio of principle curvatures
SIFT vector formation
SIFT descriptors are then obtained by considering pixels around
the radius of a key location
Create array of orientation histograms
SURF
 Speeded Up Robust Features
It is a high-performance scale and rotation-invariant
detector / descriptor
The standard version of SURF is several times faster than
SIFT and claimed by its authors to be more robust against
different image transformations than SIFT.
Feature matching using Nearest Neighbor
Next we will use the descriptor computed over each
detection to match the detections between images.
We will use the simplest matching scheme- the nearest
neighbor of descriptors
 The nearest neighbors are defined as the keypoints with
minimum Euclidean distance from the given descriptor
vector.
Nearest Neighbor Ratio
The probability that a match is correct can be determined by
taking the ratio of distance from the closest neighbor to the
distance of the second closest.
where d1 and d2 are the nearest and second nearest neighbor
distances
The value of the resultant ratio varies from 0.1 to 0.9. best value
is 0.8.
Represent each region by SIFT descriptor (128-
vector)
Clustering
There will be thousands of points. How to group them ?
The answer is use clustering method.
When clusters of features are found for an object, the
probability of the interpretation being correct is much
higher than for any single feature.
Towards Large Scale Retrieval
Large Scale Retrieval
 In large scale retrieval the goal is to match a query image to a large database of
images (for example the WWW or Wikipedia).
 The quality of a match is measured as the number of geometrically verified
feature correspondences between the query and a database image.
 While the techniques discussed in Part I and II are sufficient to do this, in practice
they require too much memory to store the SIFT descriptors for all the detections
in all the database images
 We explore next two key ideas: one to reduce the memory; the other to speed up
image retrieval.
1. CREATING VISUAL WORDS
2. INVERTED INDEX
Object
Bag of ‘words’
CREATE VOCABULARY
Vocabulary of
words
Visual
words
Bag of features
• First, take a bunch of images, extract features, and build up a “dictionary”
or “visual vocabulary” – a list of common features
• Visual words are the representation of the whole features extracted
Bag of features: outline
1. Extract features
Bag of features:
1. Extract features
2. Learn “visual vocabulary”
Bag of features:
1. Extract features
2. Learn “visual vocabulary”
3. Quantize features using visual vocabulary
Bag of features:
1. Extract features
2. Learn “visual vocabulary”
3. Quantize features using visual vocabulary
4. Represent images by frequencies of
“visual words”
Inverted index
 Indexing all the feature vectors extracted from the database.
 In this work, each of the visual descriptors is hierarchically quantized by hierarchical K-
means clustering.
 Here, K defines the branch factor of the tree rather than the final number of clusters
 we kept an inverted file associated with each leaf node—a representative descriptor
(visual word)—in the vocabulary tree.
 However, we recorded not only the visual instances that contain the word, but also those
word IDs.
 Can quickly use the inverted file to compute similarity between a new image and all the
images in the database
 Only consider database images whose bins overlap the query image
Advantage of Indexing
 One merit of the adaptive vocabulary tree is that the tree needs not to be re-built when
the database slightly changes.
 Moreover, the tree grows based on a measure that encourages splitting those nodes that
become too ambiguous and pruning nodes that are not active for the current set of
tasks.
word 1
word 2
word i id2 id2 id8 id9
id1 id9 id9
word 1
word 2
word i id2 id8 id9
id1 id9
Easily implemented with Matlab
using sparse matrices/vectors
f1 f9
f2 if8 f9
Can easily incorporate meta
Information per descriptor
APPLICATIONS
 Digital watermarking
 Face detection
 OCR
 Quality control and assembly in industrial plants.
 Robot localization and navigation.
 Monitoring and surveillance.
 Automatic exploration of image databases
 Appearance Recognition
Digital watermarking
A digital watermark is a kind of marker embedded in a noise-
tolerant signal such as an audio, video or image data.
It is typically used to identify ownership of the copyright of
such signal.
 "Watermarking" is the process of hiding digital information in
a carrier signal; the hidden information should, but does not
need to, contain a relation to the carrier signal.
Face detection
Face detection is a computer technology being used in a variety of
applications that identifies human faces in digital images. Face
detection also refers to the psychological process by which humans
locate and attend to faces in a visual scene.
Face Detection
EE465: Introduction to Digital Image Processing Copyright Xin Li'2003
59
OCR
 Optical character recognition (optical character reader) (OCR)
is the mechanical or electronic conversion of images of typed,
handwritten or printed text into machine-encoded text.
 It is widely used as a form of data entry from printed paper
data records, etc.
 It is a common method of digitizing printed texts so that it can
be electronically edited, searched, stored more compactly,
displayed on-line, and used in machine processes such as
machine translation, text-to-speech, key data and text mining.
Robot localization and navigation.
Vehicle Detection
 Intelligent vehicles aim at improving the driving safety by machine vision
techniques
EE465: Introduction to Digital Image Processing Copyright Xin Li'2003
63
Quality control and assembly in industrial
plants
Pedestrian Detection
 Why do we need to detect pedestrians?
 Security monitoring
 Intelligent vehicles
 Video database search
 Challenges
 Uncertainty with pedestrian profile, viewing
distance and angle, deformation of human limb
EE465: Introduction to Digital Image Processing Copyright Xin Li'2003
65
Learning-based Pedestrian Detection
EE465: Introduction to Digital Image Processing Copyright Xin Li'2003
66
Represent an object by the set of its possible
appearances (i.e., under all possible viewpoints and
illumination conditions).
Identifying an object implies finding the closest stored
image.
Upload or provide url for image, and find visually similar
photos
Site :-http://www.stevesdigicams.com/BYO.jpg
Conclusion
 Any information can be retrieved from the system
with accurate results.
 Many applications such as face detection, pattern
recognition is based on the technique object
recognition
QUESTIONS??

Contenu connexe

Tendances

Deep learning based object detection basics
Deep learning based object detection basicsDeep learning based object detection basics
Deep learning based object detection basicsBrodmann17
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationMostafa G. M. Mostafa
 
Real Time Object Tracking
Real Time Object TrackingReal Time Object Tracking
Real Time Object TrackingVanya Valindria
 
Object tracking presentation
Object tracking  presentationObject tracking  presentation
Object tracking presentationMrsShwetaBanait1
 
Deep learning for image video processing
Deep learning for image video processingDeep learning for image video processing
Deep learning for image video processingYu Huang
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial DomainDEEPASHRI HK
 
An Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial IntelligenceAn Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial IntelligenceWasif Altaf
 
Occlusion and Abandoned Object Detection for Surveillance Applications
Occlusion and Abandoned Object Detection for Surveillance ApplicationsOcclusion and Abandoned Object Detection for Surveillance Applications
Occlusion and Abandoned Object Detection for Surveillance ApplicationsEditor IJCATR
 
Fundamental Steps of Digital Image Processing & Image Components
Fundamental Steps of Digital Image Processing & Image ComponentsFundamental Steps of Digital Image Processing & Image Components
Fundamental Steps of Digital Image Processing & Image ComponentsKalyan Acharjya
 
Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methodsAmr Nasr
 
Fourier descriptors & moments
Fourier descriptors & momentsFourier descriptors & moments
Fourier descriptors & momentsrajisri2
 
Deep Learning in Computer Vision
Deep Learning in Computer VisionDeep Learning in Computer Vision
Deep Learning in Computer VisionSungjoon Choi
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
Object detection
Object detectionObject detection
Object detectionSomesh Vyas
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image FundamentalsA B Shinde
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Kalyan Acharjya
 
Object detection presentation
Object detection presentationObject detection presentation
Object detection presentationAshwinBicholiya
 

Tendances (20)

Deep learning based object detection basics
Deep learning based object detection basicsDeep learning based object detection basics
Deep learning based object detection basics
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 
Real Time Object Tracking
Real Time Object TrackingReal Time Object Tracking
Real Time Object Tracking
 
Object tracking presentation
Object tracking  presentationObject tracking  presentation
Object tracking presentation
 
Deep learning for image video processing
Deep learning for image video processingDeep learning for image video processing
Deep learning for image video processing
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
 
An Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial IntelligenceAn Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial Intelligence
 
Occlusion and Abandoned Object Detection for Surveillance Applications
Occlusion and Abandoned Object Detection for Surveillance ApplicationsOcclusion and Abandoned Object Detection for Surveillance Applications
Occlusion and Abandoned Object Detection for Surveillance Applications
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
Fundamental Steps of Digital Image Processing & Image Components
Fundamental Steps of Digital Image Processing & Image ComponentsFundamental Steps of Digital Image Processing & Image Components
Fundamental Steps of Digital Image Processing & Image Components
 
Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methods
 
Deep Learning for Computer Vision: Object Detection (UPC 2016)
Deep Learning for Computer Vision: Object Detection (UPC 2016)Deep Learning for Computer Vision: Object Detection (UPC 2016)
Deep Learning for Computer Vision: Object Detection (UPC 2016)
 
Fourier descriptors & moments
Fourier descriptors & momentsFourier descriptors & moments
Fourier descriptors & moments
 
Canny Edge Detection
Canny Edge DetectionCanny Edge Detection
Canny Edge Detection
 
Deep Learning in Computer Vision
Deep Learning in Computer VisionDeep Learning in Computer Vision
Deep Learning in Computer Vision
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Object detection
Object detectionObject detection
Object detection
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image Fundamentals
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
 
Object detection presentation
Object detection presentationObject detection presentation
Object detection presentation
 

En vedette

Object recognition
Object recognitionObject recognition
Object recognitionakkichester
 
Anil Thomas - Object recognition
Anil Thomas - Object recognitionAnil Thomas - Object recognition
Anil Thomas - Object recognitionIntel Nervana
 
AAAI08 tutorial: visual object recognition
AAAI08 tutorial: visual object recognitionAAAI08 tutorial: visual object recognition
AAAI08 tutorial: visual object recognitionzukun
 
Object Detection and Recognition
Object Detection and Recognition Object Detection and Recognition
Object Detection and Recognition Intel Nervana
 
Object recognition
Object recognitionObject recognition
Object recognition22yash
 
Object recognition seminar S2006E01
Object recognition seminar S2006E01Object recognition seminar S2006E01
Object recognition seminar S2006E01wolf
 
Identity Management Manifesto
Identity Management ManifestoIdentity Management Manifesto
Identity Management ManifestoTrendbüro
 
Mit6870 orsu lecture2
Mit6870 orsu lecture2Mit6870 orsu lecture2
Mit6870 orsu lecture2zukun
 
Urs Köster Presenting at RE-Work DL Summit in Boston
Urs Köster Presenting at RE-Work DL Summit in BostonUrs Köster Presenting at RE-Work DL Summit in Boston
Urs Köster Presenting at RE-Work DL Summit in BostonIntel Nervana
 
Constellation Models and Unsupervised Learning for Object Class Recognition
Constellation Models and Unsupervised Learning for Object Class RecognitionConstellation Models and Unsupervised Learning for Object Class Recognition
Constellation Models and Unsupervised Learning for Object Class Recognitionwolf
 
cvpr2011: human activity recognition - part 1: introduction
cvpr2011: human activity recognition - part 1: introductioncvpr2011: human activity recognition - part 1: introduction
cvpr2011: human activity recognition - part 1: introductionzukun
 
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)npinto
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?C/D/H Technology Consultants
 
Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)nikhilus85
 
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3STM Journals
 
Image representation
Image representationImage representation
Image representationRahul Dadwal
 
Human activity recognition
Human activity recognitionHuman activity recognition
Human activity recognitionRandhir Gupta
 

En vedette (20)

Object recognition
Object recognitionObject recognition
Object recognition
 
Anil Thomas - Object recognition
Anil Thomas - Object recognitionAnil Thomas - Object recognition
Anil Thomas - Object recognition
 
AAAI08 tutorial: visual object recognition
AAAI08 tutorial: visual object recognitionAAAI08 tutorial: visual object recognition
AAAI08 tutorial: visual object recognition
 
Object Detection and Recognition
Object Detection and Recognition Object Detection and Recognition
Object Detection and Recognition
 
Object recognition
Object recognitionObject recognition
Object recognition
 
Object recognition seminar S2006E01
Object recognition seminar S2006E01Object recognition seminar S2006E01
Object recognition seminar S2006E01
 
Identity Management Manifesto
Identity Management ManifestoIdentity Management Manifesto
Identity Management Manifesto
 
Pc Seminar Jordi
Pc Seminar JordiPc Seminar Jordi
Pc Seminar Jordi
 
Mit6870 orsu lecture2
Mit6870 orsu lecture2Mit6870 orsu lecture2
Mit6870 orsu lecture2
 
Urs Köster Presenting at RE-Work DL Summit in Boston
Urs Köster Presenting at RE-Work DL Summit in BostonUrs Köster Presenting at RE-Work DL Summit in Boston
Urs Köster Presenting at RE-Work DL Summit in Boston
 
Constellation Models and Unsupervised Learning for Object Class Recognition
Constellation Models and Unsupervised Learning for Object Class RecognitionConstellation Models and Unsupervised Learning for Object Class Recognition
Constellation Models and Unsupervised Learning for Object Class Recognition
 
cvpr2011: human activity recognition - part 1: introduction
cvpr2011: human activity recognition - part 1: introductioncvpr2011: human activity recognition - part 1: introduction
cvpr2011: human activity recognition - part 1: introduction
 
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?
 
Part1
Part1Part1
Part1
 
Representation image
Representation imageRepresentation image
Representation image
 
Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)
 
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3
Journal of Image Processing & Pattern Recognition Progress vol 3 issue 3
 
Image representation
Image representationImage representation
Image representation
 
Human activity recognition
Human activity recognitionHuman activity recognition
Human activity recognition
 

Similaire à Object recognition

Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine LearningMakine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine LearningAli Alkan
 
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEYAPPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEYcscpconf
 
Applications of spatial features in cbir a survey
Applications of spatial features in cbir  a surveyApplications of spatial features in cbir  a survey
Applications of spatial features in cbir a surveycsandit
 
Secure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS RecognitionSecure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS Recognitionijsrd.com
 
Currency recognition on mobile phones
Currency recognition on mobile phonesCurrency recognition on mobile phones
Currency recognition on mobile phoneshabeebsab
 
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...Editor IJMTER
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces StudsPlanet.com
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformIRJET Journal
 
IRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for BlindIRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for BlindIRJET Journal
 
Spot the Dog: An overview of semantic retrieval of unannotated images in the ...
Spot the Dog: An overview of semantic retrieval of unannotated images in the ...Spot the Dog: An overview of semantic retrieval of unannotated images in the ...
Spot the Dog: An overview of semantic retrieval of unannotated images in the ...Jonathon Hare
 
A Review on Matching For Sketch Technique
A Review on Matching For Sketch TechniqueA Review on Matching For Sketch Technique
A Review on Matching For Sketch TechniqueIOSR Journals
 
Integrated Hidden Markov Model and Kalman Filter for Online Object Tracking
Integrated Hidden Markov Model and Kalman Filter for Online Object TrackingIntegrated Hidden Markov Model and Kalman Filter for Online Object Tracking
Integrated Hidden Markov Model and Kalman Filter for Online Object Trackingijsrd.com
 
Introduction talk to Computer Vision
Introduction talk to Computer Vision Introduction talk to Computer Vision
Introduction talk to Computer Vision Chen Sagiv
 
Logo Detection Using AI ML
Logo Detection Using AI MLLogo Detection Using AI ML
Logo Detection Using AI MLIRJET Journal
 

Similaire à Object recognition (20)

Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine LearningMakine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
 
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEYAPPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
 
Applications of spatial features in cbir a survey
Applications of spatial features in cbir  a surveyApplications of spatial features in cbir  a survey
Applications of spatial features in cbir a survey
 
Secure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS RecognitionSecure System based on Dynamic Features of IRIS Recognition
Secure System based on Dynamic Features of IRIS Recognition
 
SVD Based Blind Video Watermarking Algorithm
SVD Based Blind Video Watermarking AlgorithmSVD Based Blind Video Watermarking Algorithm
SVD Based Blind Video Watermarking Algorithm
 
Currency recognition on mobile phones
Currency recognition on mobile phonesCurrency recognition on mobile phones
Currency recognition on mobile phones
 
Image Processing as a Part of Big Data Initiatives
Image Processing as a Part of Big Data InitiativesImage Processing as a Part of Big Data Initiatives
Image Processing as a Part of Big Data Initiatives
 
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
IRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for BlindIRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for Blind
 
Spot the Dog: An overview of semantic retrieval of unannotated images in the ...
Spot the Dog: An overview of semantic retrieval of unannotated images in the ...Spot the Dog: An overview of semantic retrieval of unannotated images in the ...
Spot the Dog: An overview of semantic retrieval of unannotated images in the ...
 
A Review on Matching For Sketch Technique
A Review on Matching For Sketch TechniqueA Review on Matching For Sketch Technique
A Review on Matching For Sketch Technique
 
F42062732
F42062732F42062732
F42062732
 
pydataPointCloud.pptx
pydataPointCloud.pptxpydataPointCloud.pptx
pydataPointCloud.pptx
 
Integrated Hidden Markov Model and Kalman Filter for Online Object Tracking
Integrated Hidden Markov Model and Kalman Filter for Online Object TrackingIntegrated Hidden Markov Model and Kalman Filter for Online Object Tracking
Integrated Hidden Markov Model and Kalman Filter for Online Object Tracking
 
Ai use cases
Ai use casesAi use cases
Ai use cases
 
06_features_slides.pdf
06_features_slides.pdf06_features_slides.pdf
06_features_slides.pdf
 
Introduction talk to Computer Vision
Introduction talk to Computer Vision Introduction talk to Computer Vision
Introduction talk to Computer Vision
 
Logo Detection Using AI ML
Logo Detection Using AI MLLogo Detection Using AI ML
Logo Detection Using AI ML
 

Plus de saniacorreya

Students academic performance using clustering technique
Students academic performance using clustering techniqueStudents academic performance using clustering technique
Students academic performance using clustering techniquesaniacorreya
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMsaniacorreya
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokenssaniacorreya
 
Color and human vision
Color and human visionColor and human vision
Color and human visionsaniacorreya
 
Manipulator robot for crack detection and welding
Manipulator robot for crack detection and weldingManipulator robot for crack detection and welding
Manipulator robot for crack detection and weldingsaniacorreya
 

Plus de saniacorreya (8)

Students academic performance using clustering technique
Students academic performance using clustering techniqueStudents academic performance using clustering technique
Students academic performance using clustering technique
 
Sania rtp
Sania rtpSania rtp
Sania rtp
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 
Color and human vision
Color and human visionColor and human vision
Color and human vision
 
Manipulator robot for crack detection and welding
Manipulator robot for crack detection and weldingManipulator robot for crack detection and welding
Manipulator robot for crack detection and welding
 
Windows 10 ppt
Windows 10 pptWindows 10 ppt
Windows 10 ppt
 
Li fi
Li fiLi fi
Li fi
 

Dernier

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 

Dernier (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

Object recognition

  • 2. Group Members ASHA SAJU LIYA C ANTO SANIYA CORREYA TINU PAUL
  • 3. Jasmine Jasmine (name) Jasmine (street) Jasmine(flower)
  • 4.
  • 5. Recognition problem hard with computer For human being it is easy to recognize the objects by color, texture and appearance. A spontaneous, natural activity for humans and other biological systems. People know about millions of different objects, yet they can easily distinguish among them. But in the case of computers they are not able to recognize just with appearance. There must be detailed screening to be done to identify a object. A FLOWER
  • 6. Main problems faced by computer while detecting objects Scale and shape of the imaged object varies with viewpoint Occlusion (self- or by a foreground object) Lighting changes Background “clutter”
  • 7.
  • 12. Pixel Representation • Just pixels is a bad representation • Pixel intensities are affected by a lot of different things like
  • 13. Why pixel matching is not a good method?? Rotation  scaling  perspective Illumination changes  Reordering of scenes
  • 14. – starting from an image of an object of interest (the query), search through an image dataset to obtain (or retrieve) those images that contain the target object. OBJECT RECOGNITION
  • 15. Definition • Object recognition is a task of finding and identifying object in an image or video sequence. • The goal of instance-level recognition is to match (recognize) a specific object or scene.
  • 18. Divide it into grids
  • 20. How to Detect Key points Key points are the features or points in an image that doesn’t change their positions in the original image even if the image is scaled, rotated or translated. These points remains fixed in all these cases.
  • 21. Descriptors  Each key point has many descriptions.  Lowe's method for image feature generation transforms an image into a large collection of feature vectors, each of which is invariant to image translation, invariant to scaling, invariant to rotation.
  • 22. How can we find descriptors?? Commonly used methods SIFT SURF
  • 23. SIFT Descriptors Scale Invariant Feature Transform Compute regions in each image independently “Label” each region by a vector of descriptors Find corresponding regions by matching to closest descriptor vector Score each frame in the database by the number of matches Difference of Gaussians function is applied in scale space to a series of smoothed and re-sampled images.
  • 24.
  • 26. • Consider a certain threshold value. Discard points that are not within the range of this threshold. 729 left after peak value threshold
  • 27. Dominant orientations are assigned. These steps ensure that the key points are more stable for matching and recognition. 536 left after testing ratio of principle curvatures
  • 28. SIFT vector formation SIFT descriptors are then obtained by considering pixels around the radius of a key location
  • 29. Create array of orientation histograms
  • 30. SURF  Speeded Up Robust Features It is a high-performance scale and rotation-invariant detector / descriptor The standard version of SURF is several times faster than SIFT and claimed by its authors to be more robust against different image transformations than SIFT.
  • 31.
  • 32. Feature matching using Nearest Neighbor Next we will use the descriptor computed over each detection to match the detections between images. We will use the simplest matching scheme- the nearest neighbor of descriptors  The nearest neighbors are defined as the keypoints with minimum Euclidean distance from the given descriptor vector.
  • 33. Nearest Neighbor Ratio The probability that a match is correct can be determined by taking the ratio of distance from the closest neighbor to the distance of the second closest. where d1 and d2 are the nearest and second nearest neighbor distances The value of the resultant ratio varies from 0.1 to 0.9. best value is 0.8.
  • 34. Represent each region by SIFT descriptor (128- vector)
  • 35.
  • 36. Clustering There will be thousands of points. How to group them ? The answer is use clustering method. When clusters of features are found for an object, the probability of the interpretation being correct is much higher than for any single feature.
  • 37.
  • 38.
  • 39. Towards Large Scale Retrieval
  • 40. Large Scale Retrieval  In large scale retrieval the goal is to match a query image to a large database of images (for example the WWW or Wikipedia).  The quality of a match is measured as the number of geometrically verified feature correspondences between the query and a database image.  While the techniques discussed in Part I and II are sufficient to do this, in practice they require too much memory to store the SIFT descriptors for all the detections in all the database images  We explore next two key ideas: one to reduce the memory; the other to speed up image retrieval.
  • 41. 1. CREATING VISUAL WORDS 2. INVERTED INDEX
  • 42. Object Bag of ‘words’ CREATE VOCABULARY Vocabulary of words Visual words
  • 43. Bag of features • First, take a bunch of images, extract features, and build up a “dictionary” or “visual vocabulary” – a list of common features • Visual words are the representation of the whole features extracted
  • 44. Bag of features: outline 1. Extract features
  • 45.
  • 46. Bag of features: 1. Extract features 2. Learn “visual vocabulary”
  • 47.
  • 48. Bag of features: 1. Extract features 2. Learn “visual vocabulary” 3. Quantize features using visual vocabulary
  • 49.
  • 50. Bag of features: 1. Extract features 2. Learn “visual vocabulary” 3. Quantize features using visual vocabulary 4. Represent images by frequencies of “visual words”
  • 51.
  • 52.
  • 53.
  • 54. Inverted index  Indexing all the feature vectors extracted from the database.  In this work, each of the visual descriptors is hierarchically quantized by hierarchical K- means clustering.  Here, K defines the branch factor of the tree rather than the final number of clusters  we kept an inverted file associated with each leaf node—a representative descriptor (visual word)—in the vocabulary tree.  However, we recorded not only the visual instances that contain the word, but also those word IDs.  Can quickly use the inverted file to compute similarity between a new image and all the images in the database  Only consider database images whose bins overlap the query image
  • 55. Advantage of Indexing  One merit of the adaptive vocabulary tree is that the tree needs not to be re-built when the database slightly changes.  Moreover, the tree grows based on a measure that encourages splitting those nodes that become too ambiguous and pruning nodes that are not active for the current set of tasks. word 1 word 2 word i id2 id2 id8 id9 id1 id9 id9 word 1 word 2 word i id2 id8 id9 id1 id9 Easily implemented with Matlab using sparse matrices/vectors f1 f9 f2 if8 f9 Can easily incorporate meta Information per descriptor
  • 56. APPLICATIONS  Digital watermarking  Face detection  OCR  Quality control and assembly in industrial plants.  Robot localization and navigation.  Monitoring and surveillance.  Automatic exploration of image databases  Appearance Recognition
  • 57. Digital watermarking A digital watermark is a kind of marker embedded in a noise- tolerant signal such as an audio, video or image data. It is typically used to identify ownership of the copyright of such signal.  "Watermarking" is the process of hiding digital information in a carrier signal; the hidden information should, but does not need to, contain a relation to the carrier signal.
  • 58. Face detection Face detection is a computer technology being used in a variety of applications that identifies human faces in digital images. Face detection also refers to the psychological process by which humans locate and attend to faces in a visual scene.
  • 59. Face Detection EE465: Introduction to Digital Image Processing Copyright Xin Li'2003 59
  • 60. OCR  Optical character recognition (optical character reader) (OCR) is the mechanical or electronic conversion of images of typed, handwritten or printed text into machine-encoded text.  It is widely used as a form of data entry from printed paper data records, etc.  It is a common method of digitizing printed texts so that it can be electronically edited, searched, stored more compactly, displayed on-line, and used in machine processes such as machine translation, text-to-speech, key data and text mining.
  • 61. Robot localization and navigation.
  • 62.
  • 63. Vehicle Detection  Intelligent vehicles aim at improving the driving safety by machine vision techniques EE465: Introduction to Digital Image Processing Copyright Xin Li'2003 63
  • 64. Quality control and assembly in industrial plants
  • 65. Pedestrian Detection  Why do we need to detect pedestrians?  Security monitoring  Intelligent vehicles  Video database search  Challenges  Uncertainty with pedestrian profile, viewing distance and angle, deformation of human limb EE465: Introduction to Digital Image Processing Copyright Xin Li'2003 65
  • 66. Learning-based Pedestrian Detection EE465: Introduction to Digital Image Processing Copyright Xin Li'2003 66
  • 67. Represent an object by the set of its possible appearances (i.e., under all possible viewpoints and illumination conditions). Identifying an object implies finding the closest stored image.
  • 68. Upload or provide url for image, and find visually similar photos Site :-http://www.stevesdigicams.com/BYO.jpg
  • 69. Conclusion  Any information can be retrieved from the system with accurate results.  Many applications such as face detection, pattern recognition is based on the technique object recognition
  • 70.