SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Edge Detection
What is Edge Detection?
Identifying points/Edges in a digital image at which
the image brightness changes sharply or has
discontinuities.
- Edges are significant local changes of intensity in an image.
- Edges typically occur on the boundary between two
different regions in an image.
Goal of edge detection
Edge detection is extensively used in image segmentation
when we want to divide the image into areas
corresponding to different objects. If we need to extract
different object from an image, we need Edge Detection
Using Edge Detection, we can:
- Produce a line drawing of a scene from an image of that scene.
- Important features can be extracted from the edges of an image
(e.g., corners, lines, curves).
- These features are used by higher-level computer vision algorithms
(e.g., recognition, Image comparizon ).
Unaccepted object can be remove.
Process of Edge Detection
Most of edge detection algorithm are based on one of two basic
properties of intensity values: Discontinuity and similarity.
Typically, there are three steps to perform edge detection:
1. Noise reduction
2. Edge enhancement
3. Edge localization
Process of Edge Detection (...)
Noise reduction
where we try to suppress as much noise as possible, without
smoothing away the meaningful edges.
Original Image After Nois Reduction
Process of Edge Detection (...)
Edge enhancement
where we apply some kind of filter that responds strongly at edges
and weakly elsewhere, so that the edges may be identified as local
maxima in the filter’s output . One suggestion is to use some kind of
high pass filter.
Process of Edge Detection (...)
Edge localization
where we decide which of the local maxima output by the filter are
meaningful edges and which are caused by noise
Process of Edge Detection (...)
There are many algorithm for Edge Detection. Some are:
Robert's edge detector
Prewitt edge detector
Sobel edge detector
Frie Chen edge detector
Canny edge detector
Canny edge detector is giving best output, I am going to explain Canny edge
detector.
Canny Edge Detector
Canny Edge Detector is complex and uses a multi-stage algorithm to
detect a wide range of edges in images. It is most commonly
implemented edge detection algorithm. It has three basic objectives:
Low error rate
Edge points should be well localized
Single edge point response
Canny Edge Detector
As I mention before, canny edge detector have multiple algorithm.
It have 5 steps, those are:
Image Smoothing
Gradient Operation
Nonmaxima Suppression
Hysteresis Thresholding
Connectivity Analysis
Canny Edge Detector
Image Smoothing
Reduce image noise by smoothing with a Gaussian
The choice of σ depends on desired behavior
large σ detects large scale edges
small σ detects fine features
The larger the width of the Gaussian mask, the lower is the detector's sensitivity to
noise.
Canny Edge Detector
Canny Edge Detector
Nonmaxima Suppression
Nonmaxima Suppression reduce thick edge strength responses around true edges
select the single maximum point across the width of an edge. is used to trace along
the edge in the edge direction and suppress any pixel value (sets it equal to 0) that is
not considered to be an edge. This will give a thin line in the output image.
Canny Edge Detector
Hysteresis Thresholding
Large intensity gradients are more likely to correspond to edges than small intensity gradients. It is in most
cases impossible to specify a threshold at which a given intensity gradient switches from corresponding to an
edge into not doing so. Therefore Canny uses thresholding with hysteresis.
Thresholding with hysteresis requires two thresholds – high and low. Select two thresholds TH and TL such that
0 6 TL < TH 6 255
Create two new binary 2-D arrays
‱ gNH(x; y) = gN(x y) > TH
‱ gNL(x; y) = gN(x y) > TL
Eliminate from gNL(x; y) all the nonzero
pixels from gNH(x y)
After this operation
‱ gNH(x y) will contain only the strong edge points
‱ gNL(x y) will contain only the weak edge points
‱ They will not contain common points
Ratio of TH to TL should be 2 : 1 or 3 : 1
Canny Edge Detector
Connectivity Analysis
After step #4, gNH(x y) will contain the strong edge pixels { thus are valid edge pixels.
However, there will be discontinuity in the edges. Longer edges are formed using the
following procedure:
1 Add all the edge pixels in gNH(x y) to a list L
2 Do until there are more edge pixels in L
‱ Locate the next unvisited edge pixel, p
‱ Mark as valid edge pixels all the weak pixels in gNL(x y) that are connected to p (8
neighbors)
‱ Remove p from L
3 Set to zero all pixels in gNL(x y) that were not marked as valid edge pixels
4 Combine all nonzero pixels in gNH(x y) and gNL(x y ) to find the final edge pixels
Analysis
Canny Edge Detector
Visually all steps
?
Thank you!
Jakir Hossain.
ID:
CSE-24th Batch.
Southeast University.

Weitere Àhnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Canny Edge Detection
Canny Edge DetectionCanny Edge Detection
Canny Edge Detection
 
Edge detection of video using matlab code
Edge detection of video using matlab codeEdge detection of video using matlab code
Edge detection of video using matlab code
 
IMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESIMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUES
 
Basics of edge detection and forier transform
Basics of edge detection and forier transformBasics of edge detection and forier transform
Basics of edge detection and forier transform
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Edge detection
Edge detectionEdge detection
Edge detection
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Image segmentation
Image segmentation Image segmentation
Image segmentation
 
Canny edge detection
Canny edge detectionCanny edge detection
Canny edge detection
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
 
Image segmentation techniques
Image segmentation techniquesImage segmentation techniques
Image segmentation techniques
 
Region based image segmentation
Region based image segmentationRegion based image segmentation
Region based image segmentation
 
Feature Extraction
Feature ExtractionFeature Extraction
Feature Extraction
 
Noise
NoiseNoise
Noise
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Image Processing with OpenCV
Image Processing with OpenCVImage Processing with OpenCV
Image Processing with OpenCV
 
Hog
HogHog
Hog
 
Shape Features
 Shape Features  Shape Features
Shape Features
 
Edge detection-LOG
Edge detection-LOGEdge detection-LOG
Edge detection-LOG
 
Watershed
WatershedWatershed
Watershed
 

Ähnlich wie Edge Detection

Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge DetectionEdge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detectioncihantopal2
 
Real time Canny edge detection
Real time Canny edge detectionReal time Canny edge detection
Real time Canny edge detectionShashank Kapoor
 
Exploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny AlgorithmExploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny AlgorithmPrasad Thakur
 
image segmentation by ppres.pptx
image segmentation by ppres.pptximage segmentation by ppres.pptx
image segmentation by ppres.pptxmohan134666
 
195706916 i journals-paper-template-2013
195706916 i journals-paper-template-2013195706916 i journals-paper-template-2013
195706916 i journals-paper-template-2013homeworkping3
 
X-Ray Image Acquisition and Analysis
X-Ray Image Acquisition and AnalysisX-Ray Image Acquisition and Analysis
X-Ray Image Acquisition and AnalysisIJREST
 
Edge detection iOS application
Edge detection iOS applicationEdge detection iOS application
Edge detection iOS applicationKetan Raval
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and SegmentationA B Shinde
 
Study and Comparison of Various Image Edge Detection Techniques
Study and Comparison of Various Image Edge Detection TechniquesStudy and Comparison of Various Image Edge Detection Techniques
Study and Comparison of Various Image Edge Detection TechniquesCSCJournals
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...ijcisjournal
 
09 cie552 image_featuresi
09 cie552 image_featuresi09 cie552 image_featuresi
09 cie552 image_featuresiElsayed Hemayed
 
YCIS_Forensic_Image Enhancement and Edge detection.pptx
YCIS_Forensic_Image Enhancement and Edge detection.pptxYCIS_Forensic_Image Enhancement and Edge detection.pptx
YCIS_Forensic_Image Enhancement and Edge detection.pptxSharmilaMore5
 
Comparative study on image segmentation techniques
Comparative study on image segmentation techniquesComparative study on image segmentation techniques
Comparative study on image segmentation techniquesgmidhubala
 
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEYALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEYsipij
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingAzharo7
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...IJECEIAES
 
Fuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge DetectionFuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge DetectionDawn Raider Gupta
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Module-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfModule-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfvikasmittal92
 

Ähnlich wie Edge Detection (20)

Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge DetectionEdge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
 
Real time Canny edge detection
Real time Canny edge detectionReal time Canny edge detection
Real time Canny edge detection
 
Exploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny AlgorithmExploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny Algorithm
 
image segmentation by ppres.pptx
image segmentation by ppres.pptximage segmentation by ppres.pptx
image segmentation by ppres.pptx
 
195706916 i journals-paper-template-2013
195706916 i journals-paper-template-2013195706916 i journals-paper-template-2013
195706916 i journals-paper-template-2013
 
X-Ray Image Acquisition and Analysis
X-Ray Image Acquisition and AnalysisX-Ray Image Acquisition and Analysis
X-Ray Image Acquisition and Analysis
 
PPT s06-machine vision-s2
PPT s06-machine vision-s2PPT s06-machine vision-s2
PPT s06-machine vision-s2
 
Edge detection iOS application
Edge detection iOS applicationEdge detection iOS application
Edge detection iOS application
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Study and Comparison of Various Image Edge Detection Techniques
Study and Comparison of Various Image Edge Detection TechniquesStudy and Comparison of Various Image Edge Detection Techniques
Study and Comparison of Various Image Edge Detection Techniques
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
 
09 cie552 image_featuresi
09 cie552 image_featuresi09 cie552 image_featuresi
09 cie552 image_featuresi
 
YCIS_Forensic_Image Enhancement and Edge detection.pptx
YCIS_Forensic_Image Enhancement and Edge detection.pptxYCIS_Forensic_Image Enhancement and Edge detection.pptx
YCIS_Forensic_Image Enhancement and Edge detection.pptx
 
Comparative study on image segmentation techniques
Comparative study on image segmentation techniquesComparative study on image segmentation techniques
Comparative study on image segmentation techniques
 
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEYALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
 
Fuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge DetectionFuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge Detection
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Module-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfModule-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdf
 

KĂŒrzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

KĂŒrzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Edge Detection

  • 2. What is Edge Detection? Identifying points/Edges in a digital image at which the image brightness changes sharply or has discontinuities. - Edges are significant local changes of intensity in an image. - Edges typically occur on the boundary between two different regions in an image.
  • 3. Goal of edge detection Edge detection is extensively used in image segmentation when we want to divide the image into areas corresponding to different objects. If we need to extract different object from an image, we need Edge Detection Using Edge Detection, we can: - Produce a line drawing of a scene from an image of that scene. - Important features can be extracted from the edges of an image (e.g., corners, lines, curves). - These features are used by higher-level computer vision algorithms (e.g., recognition, Image comparizon ). Unaccepted object can be remove.
  • 4. Process of Edge Detection Most of edge detection algorithm are based on one of two basic properties of intensity values: Discontinuity and similarity. Typically, there are three steps to perform edge detection: 1. Noise reduction 2. Edge enhancement 3. Edge localization
  • 5. Process of Edge Detection (...) Noise reduction where we try to suppress as much noise as possible, without smoothing away the meaningful edges. Original Image After Nois Reduction
  • 6. Process of Edge Detection (...) Edge enhancement where we apply some kind of filter that responds strongly at edges and weakly elsewhere, so that the edges may be identified as local maxima in the filter’s output . One suggestion is to use some kind of high pass filter.
  • 7. Process of Edge Detection (...) Edge localization where we decide which of the local maxima output by the filter are meaningful edges and which are caused by noise
  • 8. Process of Edge Detection (...) There are many algorithm for Edge Detection. Some are: Robert's edge detector Prewitt edge detector Sobel edge detector Frie Chen edge detector Canny edge detector Canny edge detector is giving best output, I am going to explain Canny edge detector.
  • 9. Canny Edge Detector Canny Edge Detector is complex and uses a multi-stage algorithm to detect a wide range of edges in images. It is most commonly implemented edge detection algorithm. It has three basic objectives: Low error rate Edge points should be well localized Single edge point response
  • 10. Canny Edge Detector As I mention before, canny edge detector have multiple algorithm. It have 5 steps, those are: Image Smoothing Gradient Operation Nonmaxima Suppression Hysteresis Thresholding Connectivity Analysis
  • 11. Canny Edge Detector Image Smoothing Reduce image noise by smoothing with a Gaussian The choice of σ depends on desired behavior large σ detects large scale edges small σ detects fine features The larger the width of the Gaussian mask, the lower is the detector's sensitivity to noise.
  • 13. Canny Edge Detector Nonmaxima Suppression Nonmaxima Suppression reduce thick edge strength responses around true edges select the single maximum point across the width of an edge. is used to trace along the edge in the edge direction and suppress any pixel value (sets it equal to 0) that is not considered to be an edge. This will give a thin line in the output image.
  • 14. Canny Edge Detector Hysteresis Thresholding Large intensity gradients are more likely to correspond to edges than small intensity gradients. It is in most cases impossible to specify a threshold at which a given intensity gradient switches from corresponding to an edge into not doing so. Therefore Canny uses thresholding with hysteresis. Thresholding with hysteresis requires two thresholds – high and low. Select two thresholds TH and TL such that 0 6 TL < TH 6 255 Create two new binary 2-D arrays ‱ gNH(x; y) = gN(x y) > TH ‱ gNL(x; y) = gN(x y) > TL Eliminate from gNL(x; y) all the nonzero pixels from gNH(x y) After this operation ‱ gNH(x y) will contain only the strong edge points ‱ gNL(x y) will contain only the weak edge points ‱ They will not contain common points Ratio of TH to TL should be 2 : 1 or 3 : 1
  • 15. Canny Edge Detector Connectivity Analysis After step #4, gNH(x y) will contain the strong edge pixels { thus are valid edge pixels. However, there will be discontinuity in the edges. Longer edges are formed using the following procedure: 1 Add all the edge pixels in gNH(x y) to a list L 2 Do until there are more edge pixels in L ‱ Locate the next unvisited edge pixel, p ‱ Mark as valid edge pixels all the weak pixels in gNL(x y) that are connected to p (8 neighbors) ‱ Remove p from L 3 Set to zero all pixels in gNL(x y) that were not marked as valid edge pixels 4 Combine all nonzero pixels in gNH(x y) and gNL(x y ) to find the final edge pixels Analysis
  • 17. ?
  • 18. Thank you! Jakir Hossain. ID: CSE-24th Batch. Southeast University.