SlideShare ist ein Scribd-Unternehmen logo
1 von 30
IMAGE REPRESENTATION &
DESCRIPTORS
By
Pundrik Patel (304)
Hardik Prajapati(270)
DEPARTMENTOF ELECTRICAL ENGINEERING
FACULTY OFTECHNOLOGY AND ENGINEERING
THE MAHARAJA SAYAJIRAO UNIVERSITYOF BARODA
VADODARA,GUJARAT, INDIA
Introduction
 After an image has been segmented into regions ; the resulting
pixels is usually is represented and described in suitable form for
further computer processing.
 Representing regions incolves in to two choices: in terms of it’s
1) external characteristics ( boundary)
2) internal characteristics ( pixels)
 Above task is making data useful to computer
 Next task is to describe the region on bases of representation
 External representation is chosen when primary focus on
shape characteristics.
 Internal representation is chosen when primary focus on
regionl properties like color and texture characteristics.
 Sometime it is possible to choose both characteristics.
 Features selected as descriptors should be insensitive to
changes in size, tanslation & rotation.
Representation
 It deals with compaction of segmented data into
representations that facilitate the computation of
descriptors.
 Technique of Representation :-
a. Chain codes
b. Polygonal Approximations
- Minimum perimeter polygones
- Merging technique
- Splitting technique
c. Signatures
d. Boundary Segments
e. Skeletons
Chain codes
 They are used to represent a boundary by a connected
sequence of straight line segments of specified length &
direction.
 Typically this representation is based on 4- or 8- connectivity
of segments.
 The direction of each segments is coded by using a
numbering scheme.
1
0
3
2
2
1
0
3
4
5
6
7
4-connectivity 8-connectivity
 A boundary code formrd as a sequence of such directional
number is referred as a Freeman chain code.
 Digital images are acquired & processed in a grid format with
equal spacing in x and y directions.
 So a chain code can be generated by following a boundary
(say clockwise direction) and assigning a direction to the
segments connecting every pair of pixels.
 Unacceptable method: (because)
1) Resulting chain tends to be quite long
2) Any small disturbances along the boundary due to noise
or imperfect segmentation can cause changes in code.
 A solution to this problem is to resample the boundary by
selecting a larger grid spacing.
 Then, as the boundary is traversed, a boundary point is
assigned to each node of the large grid, depending upon the
proximity of original boundary to that node.
 The re-sampled boundary can now be represented by a 4- or
8-code.
 The accuracy of the resulting code representation depends
on the spacing of the sampling grid.
 Example:-
Start Chain Code:
0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
 The chain code of a boundary depends upon the starting point.
 However the code can be normalized:
– Assume the chain is a circular sequence
(given a chain of 1 to N codes ; N+1 = 1)
– Redefine the starting point such that we generate an integer of
smallest magnitude
Chain Code 1 Chain Code 2
0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1, 0, 0, 0
Normalized Code 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
 Chain code depend on orientation
– a rotation results in a different chain code One solution
– Use the “first difference” of the chain code instead of the
code itself
 The difference is obtained by simply counting (counter-
clockwise) the number of directions that separate two
adjacent elements
0
1
2
3
Difference: Count the number of separating
directions inan anti-clockwise fashion
2 1 0 1 0 3 3 2 2 2 Chain Code
3 3 1 3 3 0 3 0 Difference Code
Ex. First difference of 4-direction chain code
10103322 is 3133030.
Considering the circular sequence first
element is calculated by subtracting last and
first component. Ex. 33133030
Polygon Approximation
 A digital boundary can be approximated with arbitrary
accuracy by a polygon.
 For a closed boundary, approx becomes exact when
no. of segments of polygon = no. of points in the boundary.
 Goal of poly. Approx is to capture the essence of the shape in
a given boundary using fewest no. of segments.
Min. Perimeter Polygon (MPP):
 An approach for generating an algorithm to compute MPPs
is to enclose a boundary by a set of concatenated cells.
 Allow the boundary to shrink as a rubber band.
 This shrinking produces the shape of a polygon of min.
perimeter.
 Size of cells determine the accuracy of the polygonal
approximation.
 In the limit if size of each cell corresponds to a pixel in the
boundary , the error in each cell between the boundary & the
MPP approx. at most would be √2d, where d-min possible
pixel distance.
 The objective is to use the largest possible cell size
acceptable in a given application.
 Thus, producing MPPs with fewest no. of vertices.
 The cellular approach reduces the shape of the object
enclosed by the original boundary.
boundary
enclose
by
cells
Min. Perimeter
Polygon
Merging Techniques
 Techniques based on average error or other criteria have
been applied to the problem of polygonal approximation.
 One approach is to merge points along a boundary until the
least square error line fit of the points merged so far exceeds
a preset threshold.
 When this condition occurs, parameters of line are stored,
the error is set to 0, the procedure is repeated, merging new
points along the boundary until the error again exceeds the
threshold.
 Merging technique problem:
– No guarantee for corner detection
 Solution:
– Splitting Techniques
Splitting Techniques
 to subdivide a segment successively into two parts until a
given criterion is satisfied.
– Objective: seeking prominent inflection points
Step:-
1. Start with an initial guess, e.g., based on majority axes
2. Calculate the orthogonal distance from lines to all points
3. If maximum distance > threshold, create new vertex there
4. Repeat until no points exceed criterion
Example:-
Signature
 It is a 1D functional representation of a boundary & may be
generated in various ways.
 One of the simplest is to plot the distance from the centroid
to the boundary as a function of angle.
 Signatures generated by this method are invariant to
translation but they depend on rotation and scaling.
 Normalization with respect to rotation can be achieved by
finding a way to select the same starting point to generate
the signature , according to shape.
 One way to normalize this is to scale all functions so that
they always span the same range of values. e.g [0,1]
 Advantage :
- it’s simplicity
 disadvantage :
- scaling of the entire function depends upon only two
values: maximum & minimum.
Boundary segments
 The boundary can be decomposed into segments.
– Useful to extract information from concave parts of the
objects.
 A good way to achieve this is to calculate the convex Hull of
the region enclosed by the boundary Hull.
 Can be a bit noise sensitive
1. Smooth prior to Convex hull calculation
2. Calculate Convex Hull on polygon approximation
 Convex Hull, H, of an arbitrary set, S, is the smallest set
containing S
 H minus S (H-S)
– Is called the convex deficiency
 We can use the convex deficiency to mark features
Follow the contour of S and mark points that transitions
into or out of the convex deficiency
 Using Convex Hull and its Deficiency
This data can be used to describe the region
– Number of pixels in convex deficiency
– Number of components in convex deficiency
– Ratio lengths of the transition points
– so on
Skeletons
 An important approach to represent the structural shape of a
plane region is to reduce it to a graph.
 The reduction may be accomplished by obtaining the
skeleton of the region via thinning (skeletonizing) algorithm.
 Skeleton of a region may be defined as the medial axis
transformation (MAT).
 MAT of a region R with border B is as follows:
- For every point p in R, we find its closest neighbor in B. If
p has more than such neighbor, it is said to belong to the
medial axis (skeleton).
‘prairie fire concept’
 Implementation involves calculating the distance from every
interior point to every boundary point on region.
 Thinning algorithm deals with deleting the boundary points
of a region subject to condition that deleting these points:
1) Does not remove end points.
2) Does not break connectivity &
3) Does not cause excessive erosion of the region.
 Thinning algorithm:
Region points are assumed to have value 1 & background
points are assumed to have value 0.
p9 p2 p3
p8 p1 p4
p7 p6 p5
 Step 1
flags a contour point for deletion if the followingconditions
are satisfied:
a) 2 ≀ N(p1) ≀ 6
b)T(p1) = 1
c) p2.p4.p6 = 0
d) p4.p6.p8 = 0
where N(p1) is the number of nonzero neighbors of p1;
i.e. N(p1) = p2 + p3 + 

 + p8 + p9
where pi is either 0 or 1.
T(p1) is number of 0-1 transitions in the ordered sequence p2,
p3, 
.., p8, p9., p2
 In Step 2:
conditions a & b remain the same, but conditions c & d are
changed to
c’) p2.p4.p8 = 0
d’) p2.p6.p8 = 0
0 0 1
1 p1 0
1 0 1
Step 1 is applied to every border pixel in binary region under
Consideration If 1 or more of conditions a to d are violated, the
value of point in question is not changed.
 If all conditions are satisfied, the point is flagged
for deletion.
 But not deleted until all border points have been
processed.
 This delay prevents the change of structure of
data during execution of algorithm.
 After step 1 been applied to all border points,
those who are flagged are deleted (changed to
0).
 Step 2 is applied to resulting data in exactly
same manner as step1.
Boundary Descriptors
 Some simple discriptors:-
 Length of the contour
– Simply count the number of pixels along the border
–You may consider diagonally connected pixels to count as √2
 Diameter of the boundary B
– Diam(B) = max[D(pi,pj)]
– this is the major axis of the region
 Curvature
– Rate of change of the slope
 Bounding Box
– Smallest rectangle (aligned with the image axis) that can bound
the region
 Shape number
– compute the chain code difference
– re-order this to create the minimum integer
– this is called the shape number
 Example:-
 Fourier Descriptors
 Consider an N-point digital boundary in the xy plane
 This forms a coordinate pairs (xo, yo), (x1, y2), . . . . ., (xn-1, yn-1)
 We can consider this as two vectors
– x(k) = xk
– y(k) = yk
 Furthermore
– We could consider this a complex number
– s(k) = x(k) + jy(k) where j=sqrt(-1)
 Using the vector s(k)
 Compute the 1-D Discrete FourierTransform
Thank
You

Weitere Àhnliche Inhalte

Was ist angesagt?

Point processing
Point processingPoint processing
Point processingpanupriyaa7
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationMostafa G. M. Mostafa
 
Image Enhancement using Frequency Domain Filters
Image Enhancement using Frequency Domain FiltersImage Enhancement using Frequency Domain Filters
Image Enhancement using Frequency Domain FiltersKarthika Ramachandran
 
Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.SomitSamanto1
 
image compression ppt
image compression pptimage compression ppt
image compression pptShivangi Saxena
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filteringGautam Saxena
 
Data Redundacy
Data RedundacyData Redundacy
Data RedundacyPoonam Seth
 
4.intensity transformations
4.intensity transformations4.intensity transformations
4.intensity transformationsYahya Alkhaldi
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image FundamentalsA B Shinde
 
SPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGSPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGmuthu181188
 
Image Enhancement - Point Processing
Image Enhancement - Point ProcessingImage Enhancement - Point Processing
Image Enhancement - Point ProcessingGayathri31093
 
Histogram Processing
Histogram ProcessingHistogram Processing
Histogram ProcessingAmnaakhaan
 
digital image processing
digital image processingdigital image processing
digital image processingAbinaya B
 
Interpixel redundancy
Interpixel redundancyInterpixel redundancy
Interpixel redundancyNaveen Kumar
 
Image sampling and quantization
Image sampling and quantizationImage sampling and quantization
Image sampling and quantizationBCET, Balasore
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 
Watershed Segmentation Image Processing
Watershed Segmentation Image ProcessingWatershed Segmentation Image Processing
Watershed Segmentation Image ProcessingArshad Hussain
 
Image Restoration
Image RestorationImage Restoration
Image RestorationPoonam Seth
 

Was ist angesagt? (20)

Point processing
Point processingPoint processing
Point processing
 
Edge detection
Edge detectionEdge detection
Edge detection
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 
Image Enhancement using Frequency Domain Filters
Image Enhancement using Frequency Domain FiltersImage Enhancement using Frequency Domain Filters
Image Enhancement using Frequency Domain Filters
 
Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
 
Data Redundacy
Data RedundacyData Redundacy
Data Redundacy
 
4.intensity transformations
4.intensity transformations4.intensity transformations
4.intensity transformations
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image Fundamentals
 
SPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGSPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSING
 
Image Enhancement - Point Processing
Image Enhancement - Point ProcessingImage Enhancement - Point Processing
Image Enhancement - Point Processing
 
Image compression models
Image compression modelsImage compression models
Image compression models
 
Histogram Processing
Histogram ProcessingHistogram Processing
Histogram Processing
 
digital image processing
digital image processingdigital image processing
digital image processing
 
Interpixel redundancy
Interpixel redundancyInterpixel redundancy
Interpixel redundancy
 
Image sampling and quantization
Image sampling and quantizationImage sampling and quantization
Image sampling and quantization
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Watershed Segmentation Image Processing
Watershed Segmentation Image ProcessingWatershed Segmentation Image Processing
Watershed Segmentation Image Processing
 
Image Restoration
Image RestorationImage Restoration
Image Restoration
 

Ähnlich wie Image Representation & Descriptors

Image representation
Image representationImage representation
Image representationRahul Dadwal
 
Two Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingTwo Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingChamod Mune
 
47549379 paper-on-image-processing
47549379 paper-on-image-processing47549379 paper-on-image-processing
47549379 paper-on-image-processingmaisali4
 
MDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersMDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersEricsson
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection NetworkHeman Pathak
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally puncturedeSAT Publishing House
 
Report AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro SantoroReport AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro SantoroPietro Santoro
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
 
Image segmentation
Image segmentationImage segmentation
Image segmentationMadhuriMulik1
 
Module-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfModule-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfvikasmittal92
 
Performance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codesPerformance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codeseSAT Journals
 
Final Project Report Nadar
Final Project Report NadarFinal Project Report Nadar
Final Project Report NadarMaher Nadar
 
ImageSegmentation (1).ppt
ImageSegmentation (1).pptImageSegmentation (1).ppt
ImageSegmentation (1).pptNoorUlHaq47
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.pptAVUDAI1
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.pptDEEPUKUMARR
 
Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...TELKOMNIKA JOURNAL
 

Ähnlich wie Image Representation & Descriptors (20)

representation.pptx
representation.pptxrepresentation.pptx
representation.pptx
 
Image representation
Image representationImage representation
Image representation
 
Two Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingTwo Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image Processing
 
Representation image
Representation imageRepresentation image
Representation image
 
47549379 paper-on-image-processing
47549379 paper-on-image-processing47549379 paper-on-image-processing
47549379 paper-on-image-processing
 
MDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersMDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizers
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally punctured
 
Report AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro SantoroReport AdvancedCodingFinal - Pietro Santoro
Report AdvancedCodingFinal - Pietro Santoro
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
G364246
G364246G364246
G364246
 
Module-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfModule-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdf
 
Performance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codesPerformance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codes
 
Final Project Report Nadar
Final Project Report NadarFinal Project Report Nadar
Final Project Report Nadar
 
ImageSegmentation (1).ppt
ImageSegmentation (1).pptImageSegmentation (1).ppt
ImageSegmentation (1).ppt
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.ppt
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.ppt
 
2015LISAT_pathloss1
2015LISAT_pathloss12015LISAT_pathloss1
2015LISAT_pathloss1
 
Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...
 

KĂŒrzlich hochgeladen

Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 

KĂŒrzlich hochgeladen (20)

Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 

Image Representation & Descriptors

  • 1. IMAGE REPRESENTATION & DESCRIPTORS By Pundrik Patel (304) Hardik Prajapati(270) DEPARTMENTOF ELECTRICAL ENGINEERING FACULTY OFTECHNOLOGY AND ENGINEERING THE MAHARAJA SAYAJIRAO UNIVERSITYOF BARODA VADODARA,GUJARAT, INDIA
  • 2. Introduction  After an image has been segmented into regions ; the resulting pixels is usually is represented and described in suitable form for further computer processing.  Representing regions incolves in to two choices: in terms of it’s 1) external characteristics ( boundary) 2) internal characteristics ( pixels)  Above task is making data useful to computer  Next task is to describe the region on bases of representation
  • 3.  External representation is chosen when primary focus on shape characteristics.  Internal representation is chosen when primary focus on regionl properties like color and texture characteristics.  Sometime it is possible to choose both characteristics.  Features selected as descriptors should be insensitive to changes in size, tanslation & rotation.
  • 4. Representation  It deals with compaction of segmented data into representations that facilitate the computation of descriptors.  Technique of Representation :- a. Chain codes b. Polygonal Approximations - Minimum perimeter polygones - Merging technique - Splitting technique c. Signatures d. Boundary Segments e. Skeletons
  • 5. Chain codes  They are used to represent a boundary by a connected sequence of straight line segments of specified length & direction.  Typically this representation is based on 4- or 8- connectivity of segments.  The direction of each segments is coded by using a numbering scheme. 1 0 3 2 2 1 0 3 4 5 6 7 4-connectivity 8-connectivity
  • 6.  A boundary code formrd as a sequence of such directional number is referred as a Freeman chain code.  Digital images are acquired & processed in a grid format with equal spacing in x and y directions.  So a chain code can be generated by following a boundary (say clockwise direction) and assigning a direction to the segments connecting every pair of pixels.  Unacceptable method: (because) 1) Resulting chain tends to be quite long 2) Any small disturbances along the boundary due to noise or imperfect segmentation can cause changes in code.
  • 7.  A solution to this problem is to resample the boundary by selecting a larger grid spacing.  Then, as the boundary is traversed, a boundary point is assigned to each node of the large grid, depending upon the proximity of original boundary to that node.  The re-sampled boundary can now be represented by a 4- or 8-code.  The accuracy of the resulting code representation depends on the spacing of the sampling grid.  Example:- Start Chain Code: 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
  • 8.  The chain code of a boundary depends upon the starting point.  However the code can be normalized: – Assume the chain is a circular sequence (given a chain of 1 to N codes ; N+1 = 1) – Redefine the starting point such that we generate an integer of smallest magnitude Chain Code 1 Chain Code 2 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1, 0, 0, 0 Normalized Code 0, 0, 0, 3, 0, 0, 3, 3, 3, 3, 3, 2, 2, 2, 2, 2, 1, 1, 1, 1, 1, 1
  • 9.  Chain code depend on orientation – a rotation results in a different chain code One solution – Use the “first difference” of the chain code instead of the code itself  The difference is obtained by simply counting (counter- clockwise) the number of directions that separate two adjacent elements 0 1 2 3 Difference: Count the number of separating directions inan anti-clockwise fashion 2 1 0 1 0 3 3 2 2 2 Chain Code 3 3 1 3 3 0 3 0 Difference Code Ex. First difference of 4-direction chain code 10103322 is 3133030. Considering the circular sequence first element is calculated by subtracting last and first component. Ex. 33133030
  • 10. Polygon Approximation  A digital boundary can be approximated with arbitrary accuracy by a polygon.  For a closed boundary, approx becomes exact when no. of segments of polygon = no. of points in the boundary.  Goal of poly. Approx is to capture the essence of the shape in a given boundary using fewest no. of segments.
  • 11. Min. Perimeter Polygon (MPP):  An approach for generating an algorithm to compute MPPs is to enclose a boundary by a set of concatenated cells.  Allow the boundary to shrink as a rubber band.  This shrinking produces the shape of a polygon of min. perimeter.  Size of cells determine the accuracy of the polygonal approximation.  In the limit if size of each cell corresponds to a pixel in the boundary , the error in each cell between the boundary & the MPP approx. at most would be √2d, where d-min possible pixel distance.  The objective is to use the largest possible cell size acceptable in a given application.  Thus, producing MPPs with fewest no. of vertices.
  • 12.  The cellular approach reduces the shape of the object enclosed by the original boundary. boundary enclose by cells Min. Perimeter Polygon
  • 13. Merging Techniques  Techniques based on average error or other criteria have been applied to the problem of polygonal approximation.  One approach is to merge points along a boundary until the least square error line fit of the points merged so far exceeds a preset threshold.  When this condition occurs, parameters of line are stored, the error is set to 0, the procedure is repeated, merging new points along the boundary until the error again exceeds the threshold.  Merging technique problem: – No guarantee for corner detection  Solution: – Splitting Techniques
  • 14. Splitting Techniques  to subdivide a segment successively into two parts until a given criterion is satisfied. – Objective: seeking prominent inflection points Step:- 1. Start with an initial guess, e.g., based on majority axes 2. Calculate the orthogonal distance from lines to all points 3. If maximum distance > threshold, create new vertex there 4. Repeat until no points exceed criterion
  • 16. Signature  It is a 1D functional representation of a boundary & may be generated in various ways.  One of the simplest is to plot the distance from the centroid to the boundary as a function of angle.  Signatures generated by this method are invariant to translation but they depend on rotation and scaling.  Normalization with respect to rotation can be achieved by finding a way to select the same starting point to generate the signature , according to shape.  One way to normalize this is to scale all functions so that they always span the same range of values. e.g [0,1]
  • 17.  Advantage : - it’s simplicity  disadvantage : - scaling of the entire function depends upon only two values: maximum & minimum.
  • 18. Boundary segments  The boundary can be decomposed into segments. – Useful to extract information from concave parts of the objects.  A good way to achieve this is to calculate the convex Hull of the region enclosed by the boundary Hull.  Can be a bit noise sensitive 1. Smooth prior to Convex hull calculation 2. Calculate Convex Hull on polygon approximation
  • 19.  Convex Hull, H, of an arbitrary set, S, is the smallest set containing S  H minus S (H-S) – Is called the convex deficiency  We can use the convex deficiency to mark features Follow the contour of S and mark points that transitions into or out of the convex deficiency
  • 20.  Using Convex Hull and its Deficiency This data can be used to describe the region – Number of pixels in convex deficiency – Number of components in convex deficiency – Ratio lengths of the transition points – so on
  • 21. Skeletons  An important approach to represent the structural shape of a plane region is to reduce it to a graph.  The reduction may be accomplished by obtaining the skeleton of the region via thinning (skeletonizing) algorithm.  Skeleton of a region may be defined as the medial axis transformation (MAT).  MAT of a region R with border B is as follows: - For every point p in R, we find its closest neighbor in B. If p has more than such neighbor, it is said to belong to the medial axis (skeleton). ‘prairie fire concept’
  • 22.  Implementation involves calculating the distance from every interior point to every boundary point on region.  Thinning algorithm deals with deleting the boundary points of a region subject to condition that deleting these points: 1) Does not remove end points. 2) Does not break connectivity & 3) Does not cause excessive erosion of the region.
  • 23.  Thinning algorithm: Region points are assumed to have value 1 & background points are assumed to have value 0. p9 p2 p3 p8 p1 p4 p7 p6 p5  Step 1 flags a contour point for deletion if the followingconditions are satisfied: a) 2 ≀ N(p1) ≀ 6 b)T(p1) = 1 c) p2.p4.p6 = 0 d) p4.p6.p8 = 0
  • 24. where N(p1) is the number of nonzero neighbors of p1; i.e. N(p1) = p2 + p3 + 

 + p8 + p9 where pi is either 0 or 1. T(p1) is number of 0-1 transitions in the ordered sequence p2, p3, 
.., p8, p9., p2  In Step 2: conditions a & b remain the same, but conditions c & d are changed to c’) p2.p4.p8 = 0 d’) p2.p6.p8 = 0 0 0 1 1 p1 0 1 0 1 Step 1 is applied to every border pixel in binary region under Consideration If 1 or more of conditions a to d are violated, the value of point in question is not changed.
  • 25.  If all conditions are satisfied, the point is flagged for deletion.  But not deleted until all border points have been processed.  This delay prevents the change of structure of data during execution of algorithm.  After step 1 been applied to all border points, those who are flagged are deleted (changed to 0).  Step 2 is applied to resulting data in exactly same manner as step1.
  • 26. Boundary Descriptors  Some simple discriptors:-  Length of the contour – Simply count the number of pixels along the border –You may consider diagonally connected pixels to count as √2  Diameter of the boundary B – Diam(B) = max[D(pi,pj)] – this is the major axis of the region  Curvature – Rate of change of the slope  Bounding Box – Smallest rectangle (aligned with the image axis) that can bound the region
  • 27.  Shape number – compute the chain code difference – re-order this to create the minimum integer – this is called the shape number  Example:-
  • 28.  Fourier Descriptors  Consider an N-point digital boundary in the xy plane  This forms a coordinate pairs (xo, yo), (x1, y2), . . . . ., (xn-1, yn-1)  We can consider this as two vectors – x(k) = xk – y(k) = yk  Furthermore – We could consider this a complex number – s(k) = x(k) + jy(k) where j=sqrt(-1)
  • 29.  Using the vector s(k)  Compute the 1-D Discrete FourierTransform