SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Bubble Character Analysis using Image Processing Methods
Guangshen Ma, Ziyao Wang, Yihui Feng, Minwoo Kim
Duke University
Introduction
The goal of this project is to process the bubble images using image
processing algorithms so that we can easily study the dynamics
properties of bubbles. In order to further analyze bubble’s
characters such as velocity and trajectory path, interactive
segmentation and bubble region detection algorithms can be used to
detect the bubble position and to extract its physical information.
Then, image inpainting algorithm is used to focus on a single
bubble of interest. Also, the bubble’s penetration depth and
departure frequency are measured with our methods.
1. Preprocess raw images
2. Measure penetration depth
3. Estimate bubble’s departure frequency
4. Inpaint the damaged image
5. Segment out a single bubble using interactive segmentation
6. Detect the bubble region
Algorithm and results
1. Preprocessing
A. Background processing: Subtract pure background image from bubble image.
B. Grayscale processing: Change the RGB color image to gray image.
C. Binary processing: Identify bubble shape by binarization.
D. Bubble padding: Filling holes inside bubble regions.
E. Canny edge detection: Detect the edge using Canny-edge detector.
Algorithm and results
Further work includes developing algorithms of bubble ellipse reconstruction using
Hough transform and using methods of Gray-level Co-occurrence Matrix for flow regime
classification.
Algorithm and results
Future work
5. Interactive segmentation
To study the behavior of a single bubble, we segment out the bubble
of interest from the rest of the other bubbles.
A. Provide hints of samples for foreground and background by
marking connected lines as in the right figure. These samples
form sample distribution for the foreground and background.
B. From the user-provided samples, estimate the conditional
probability densities ! " ℱ), ! " ℬ) for foreground and
background. To resolve non-smoothness and sparsity of the
densities, use nonparametric smoothing technique to smooth
these densities. Use kernel smoothing with Epanechnikov kernel.
C. For every pixel in the image, compute the probability of how
each pixel is likely to be the foreground or background using
Bayes’s rule, i.e., ! ℱ ") =
((*|ℱ)
( ℱ ⋅((*|ℱ)-( ℬ ⋅((*|ℬ)
.
D. For each pair of pixels (x,y) in the image, measure the distance
between two points regarding how likely two points belong to
the same group. Specifically, compute geodesic distance defined
by . ", / = min
34,5
∫ |7 8 ⋅ 9:*,; 8 |
;
*
, where 7 8 =
	9! ℱ 8) and :*,; 8 is any arbitrary path from pixel " to /.
E. Computing . ", / for each pair of pixels reduces to computing
shortest path in a discretized image space with 4-neighbour
scheme. Use Dijstra’s single source shortest path algorithm to
compute all the distances, which takes time complexity of
=(> log >), where >	is the total number of pixels in the image.
F. Based on the user-provided samples and computed distances,
determine whether a given pixel " is more likely to belong to the
foreground or background.4. Image inpainting
In order to recover the original image after segmenting the single bubble, we need to
inpaint the regions where all the other bubbles are removed.
A. Detect all the bubbles using edge detection techniques
B. Remove all the bubbles from the image except the selected one.
C. Inpaint the removed regions B by solving ∆D = 0	over B with Dirichlet boundary
condition.
2. Penetration depth
The penetration depth is defined as the bubble’s
penetrating distance along the upper edge of the
nozzle, which is a significant feature for bubbles
that is determined by different diameters of
nozzle and fluid speed.
A. Use Canny-edge detector to process binary
images and choose proper threshold to
generate clear edge of the first bubble.
B. Use loops to find peak values in a set of
bubble images
3. Departure frequency
Bubble departure frequency is the rate of
generating new bubbles from the nozzle.
A. Use Canny-edge detector to find the upper
horizontal edge of the nozzle, using an
imaginary horizontal line for scanning.
B. Detect the moment when each bubble just
separates from the nozzle by sweeping the
scan line.
C. Based on the recorded separated points,
calculate the number of images between two
seperated moments to get departure
frequency.
6. Bubble detection
The goal of this algorithm is to detect the
position of the region of bubble by labeling
the connection components. This method is
useful for further extracting the property
information in bubble images.
A. After image preprocessing, the
connected components of the binary
image is labeled with arbitrary numbers
(“1” to “8”).
B. With the labeled binary image, the
numbers are reindexed based on the
barycenter of the bubble from bottom to
top. Therefore, the positions and regions
of the bubbles are easily detected.
Objectives

Weitere ähnliche Inhalte

Was ist angesagt?

Image processing SaltPepper Noise
Image processing SaltPepper NoiseImage processing SaltPepper Noise
Image processing SaltPepper Noise
Ankush Srivastava
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
Gichelle Amon
 
Image representation
Image representationImage representation
Image representation
Rahul Dadwal
 

Was ist angesagt? (20)

Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filters
 
08 frequency domain filtering DIP
08 frequency domain filtering DIP08 frequency domain filtering DIP
08 frequency domain filtering DIP
 
Image processing SaltPepper Noise
Image processing SaltPepper NoiseImage processing SaltPepper Noise
Image processing SaltPepper Noise
 
A Comparison of Block-Matching Motion Estimation Algorithms
A Comparison of Block-Matching Motion Estimation AlgorithmsA Comparison of Block-Matching Motion Estimation Algorithms
A Comparison of Block-Matching Motion Estimation Algorithms
 
Bio medical image processing
Bio medical image processingBio medical image processing
Bio medical image processing
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Image degradation and noise by Md.Naseem Ashraf
Image degradation and noise by Md.Naseem AshrafImage degradation and noise by Md.Naseem Ashraf
Image degradation and noise by Md.Naseem Ashraf
 
Audio file format in computer graphic
Audio file format in computer graphicAudio file format in computer graphic
Audio file format in computer graphic
 
Jpeg and mpeg ppt
Jpeg and mpeg pptJpeg and mpeg ppt
Jpeg and mpeg ppt
 
Bit plane coding
Bit plane codingBit plane coding
Bit plane coding
 
Image processing, Noise, Noise Removal filters
Image processing, Noise, Noise Removal filtersImage processing, Noise, Noise Removal filters
Image processing, Noise, Noise Removal filters
 
Image compression models
Image compression modelsImage compression models
Image compression models
 
Log Transformation in Image Processing with Example
Log Transformation in Image Processing with ExampleLog Transformation in Image Processing with Example
Log Transformation in Image Processing with Example
 
Image Acquisition and Representation
Image Acquisition and RepresentationImage Acquisition and Representation
Image Acquisition and Representation
 
Data Redundacy
Data RedundacyData Redundacy
Data Redundacy
 
Gray level transformation
Gray level transformationGray level transformation
Gray level transformation
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
unit-3.ppt
unit-3.pptunit-3.ppt
unit-3.ppt
 
Module 31
Module 31Module 31
Module 31
 
Image representation
Image representationImage representation
Image representation
 

Ähnlich wie Poster image processing

Kevin_Park_OSU_ Master_Project Report
Kevin_Park_OSU_ Master_Project ReportKevin_Park_OSU_ Master_Project Report
Kevin_Park_OSU_ Master_Project Report
Kevin Park
 
Image segmentation for high resolution images
Image segmentation for high resolution imagesImage segmentation for high resolution images
Image segmentation for high resolution images
jeet patalia
 

Ähnlich wie Poster image processing (20)

Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
 
E017443136
E017443136E017443136
E017443136
 
E0442328
E0442328E0442328
E0442328
 
Av4301248253
Av4301248253Av4301248253
Av4301248253
 
Kevin_Park_OSU_ Master_Project Report
Kevin_Park_OSU_ Master_Project ReportKevin_Park_OSU_ Master_Project Report
Kevin_Park_OSU_ Master_Project Report
 
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGEOBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
 
Object Detection for Service Robot Using Range and Color Features of an Image
Object Detection for Service Robot Using Range and Color Features of an ImageObject Detection for Service Robot Using Range and Color Features of an Image
Object Detection for Service Robot Using Range and Color Features of an Image
 
Object detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an imageObject detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an image
 
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation Principle
 
A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...
A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...
A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...
 
Reconstruction of Inner Worm Passage of Quercus Mongolica Seeds
Reconstruction of Inner Worm Passage of Quercus Mongolica SeedsReconstruction of Inner Worm Passage of Quercus Mongolica Seeds
Reconstruction of Inner Worm Passage of Quercus Mongolica Seeds
 
Morphological Operations (2).pptx
Morphological Operations (2).pptxMorphological Operations (2).pptx
Morphological Operations (2).pptx
 
SALIENCY MAP BASED IMPROVED SEGMENTATION
SALIENCY MAP BASED IMPROVED SEGMENTATIONSALIENCY MAP BASED IMPROVED SEGMENTATION
SALIENCY MAP BASED IMPROVED SEGMENTATION
 
Denoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using SobelmethodDenoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using Sobelmethod
 
Image segmentation for high resolution images
Image segmentation for high resolution imagesImage segmentation for high resolution images
Image segmentation for high resolution images
 
Face Detection and Recognition Using Back Propagation Neural Network and Four...
Face Detection and Recognition Using Back Propagation Neural Network and Four...Face Detection and Recognition Using Back Propagation Neural Network and Four...
Face Detection and Recognition Using Back Propagation Neural Network and Four...
 
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
 
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
 
Computer Graphics: Visible surface detection methods
Computer Graphics: Visible surface detection methodsComputer Graphics: Visible surface detection methods
Computer Graphics: Visible surface detection methods
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Poster image processing

  • 1. Bubble Character Analysis using Image Processing Methods Guangshen Ma, Ziyao Wang, Yihui Feng, Minwoo Kim Duke University Introduction The goal of this project is to process the bubble images using image processing algorithms so that we can easily study the dynamics properties of bubbles. In order to further analyze bubble’s characters such as velocity and trajectory path, interactive segmentation and bubble region detection algorithms can be used to detect the bubble position and to extract its physical information. Then, image inpainting algorithm is used to focus on a single bubble of interest. Also, the bubble’s penetration depth and departure frequency are measured with our methods. 1. Preprocess raw images 2. Measure penetration depth 3. Estimate bubble’s departure frequency 4. Inpaint the damaged image 5. Segment out a single bubble using interactive segmentation 6. Detect the bubble region Algorithm and results 1. Preprocessing A. Background processing: Subtract pure background image from bubble image. B. Grayscale processing: Change the RGB color image to gray image. C. Binary processing: Identify bubble shape by binarization. D. Bubble padding: Filling holes inside bubble regions. E. Canny edge detection: Detect the edge using Canny-edge detector. Algorithm and results Further work includes developing algorithms of bubble ellipse reconstruction using Hough transform and using methods of Gray-level Co-occurrence Matrix for flow regime classification. Algorithm and results Future work 5. Interactive segmentation To study the behavior of a single bubble, we segment out the bubble of interest from the rest of the other bubbles. A. Provide hints of samples for foreground and background by marking connected lines as in the right figure. These samples form sample distribution for the foreground and background. B. From the user-provided samples, estimate the conditional probability densities ! " ℱ), ! " ℬ) for foreground and background. To resolve non-smoothness and sparsity of the densities, use nonparametric smoothing technique to smooth these densities. Use kernel smoothing with Epanechnikov kernel. C. For every pixel in the image, compute the probability of how each pixel is likely to be the foreground or background using Bayes’s rule, i.e., ! ℱ ") = ((*|ℱ) ( ℱ ⋅((*|ℱ)-( ℬ ⋅((*|ℬ) . D. For each pair of pixels (x,y) in the image, measure the distance between two points regarding how likely two points belong to the same group. Specifically, compute geodesic distance defined by . ", / = min 34,5 ∫ |7 8 ⋅ 9:*,; 8 | ; * , where 7 8 = 9! ℱ 8) and :*,; 8 is any arbitrary path from pixel " to /. E. Computing . ", / for each pair of pixels reduces to computing shortest path in a discretized image space with 4-neighbour scheme. Use Dijstra’s single source shortest path algorithm to compute all the distances, which takes time complexity of =(> log >), where > is the total number of pixels in the image. F. Based on the user-provided samples and computed distances, determine whether a given pixel " is more likely to belong to the foreground or background.4. Image inpainting In order to recover the original image after segmenting the single bubble, we need to inpaint the regions where all the other bubbles are removed. A. Detect all the bubbles using edge detection techniques B. Remove all the bubbles from the image except the selected one. C. Inpaint the removed regions B by solving ∆D = 0 over B with Dirichlet boundary condition. 2. Penetration depth The penetration depth is defined as the bubble’s penetrating distance along the upper edge of the nozzle, which is a significant feature for bubbles that is determined by different diameters of nozzle and fluid speed. A. Use Canny-edge detector to process binary images and choose proper threshold to generate clear edge of the first bubble. B. Use loops to find peak values in a set of bubble images 3. Departure frequency Bubble departure frequency is the rate of generating new bubbles from the nozzle. A. Use Canny-edge detector to find the upper horizontal edge of the nozzle, using an imaginary horizontal line for scanning. B. Detect the moment when each bubble just separates from the nozzle by sweeping the scan line. C. Based on the recorded separated points, calculate the number of images between two seperated moments to get departure frequency. 6. Bubble detection The goal of this algorithm is to detect the position of the region of bubble by labeling the connection components. This method is useful for further extracting the property information in bubble images. A. After image preprocessing, the connected components of the binary image is labeled with arbitrary numbers (“1” to “8”). B. With the labeled binary image, the numbers are reindexed based on the barycenter of the bubble from bottom to top. Therefore, the positions and regions of the bubbles are easily detected. Objectives