Professional Documents
Culture Documents
List of Applications
Target detection
2. Object recognition
3. Feature extraction and matching
4. Optical Character Recognition Systems
5. Writer identification
6. Digital watermarking
7. Medical and industrial applications
8. Image Morphing and
9. Image Fusion
1.
1/11/2015
Object Recognition
Object recognition is an amazing human feat.
Humans effortlessly recognize objects within
a fraction of a second.
Unlike computers, humans can easily
recognize a face, understand spoken words,
and distinguish different styles of
handwriting.
Object recognizing is a study of how
machines can observe the environment,
learn to distinguish patterns of interest and
make reasonable decisions about the
categories of patterns.
1/11/2015
Automated object-recognition
systems
Living organism
Biological
sensor
information
Cognitive
process
identification
ENVIRONMENT
Electronic
sensor
data
Algorithm
1/11/2015
Data
Description
Features
Classification
1/11/2015
identification
Decision theoretic
Classical
approach
Parametric Non-parametric
method
method
Structural
Neural network
approach
Parametric
method
1/11/2015
Non-parametric
method
1/11/2015
Medicine
ECG pattern recognition
EEG pattern recognition
Mammorgram analysis
Lung sound classification and analysis
1/11/2015
Forensic
Fingerprint recognition
Face recognition
Iris recognition
Vein-pattern recognition
1/11/2015
Remote sensing
Cloud pattern analysis
Crop forecast
1/11/2015
10
Industrial applications
Character recognition
Automated inspection
1/11/2015
11
1/11/2015
12
Face recognition
Face detection
Eigen faces
Neural network approach
1/11/2015
13
Face Detection
Faces are diverse, semi-rigid, semi-flexible,
culturally significant and part of our
individual entity.
A variety of face detection techniques are
employed from correlation, neural networks,
eigen templates, Bayesian models and flexible
models.
Given an arbitrary image, the goal of face
detection is to determine whether or not
there are any faces in the image and if
present, return the image location and
extent of each face.
1/11/2015
14
1/11/2015
15
Knowledge-based methods
Rule based,
Rules capture the relationships between
facial features
The rules are derived from a researchers
knowledge of human faces.
1/11/2015
16
1/11/2015
17
Template matching
A standard face pattern is manually
predefined, or parameterized by a
function.
Correlation values with the standard
patterns are computed for the face
contour, eyes, nose and mouth
independently.
1/11/2015
18
1/11/2015
19
Eigenfaces
Face vectors can be obtained by
computing the eigen vectors of the
images autocorrelation matrix.
These eigen vectors are known as eigen
faces.
Face image consists of different patterns
such eyes, nose, mouth etc. These
patterns are separated by specific
distances.
1/11/2015
20
1/11/2015
21
3.
4.
5.
Facial Expression
Image Orientation
Imaging Conditions
Pose
Presence of Glass
1/11/2015
22
23
Pre-processing
Segmentation
Feature
Extraction
Classification
Post-processing
1/11/2015
24
Pre-processing
Binarization
Noise reduction
Stroke width normalization
Skew correction
Slant removal
1/11/2015
25
Binarization
1/11/2015
26
1/11/2015
27
1/11/2015
28
Skew Correction
1/11/2015
29
Slant Removal
The slant of handwritten texts varies
from user to user. Slant removal methods
are used to normalize the all characters
to a standard form.
Popular deslanting techniques are:
Calculationof the average angle of nearvertical elements
1/11/2015
30
Slant Removal
1/11/2015
31
Segmentation
1/11/2015
32
Segmentation
Explicit Segmentation
In explicit approaches one tries to identify
the smallest possible word segments
(primitive segments) that may be smaller
than letters, but surely cannot be segmented
further. Later in the recognition process
these primitive segments are assembled into
letters based on input from the character
recognizer. The advantage of the first
strategy is that it is robust and quite
straightforward, but is not very flexible.
1/11/2015
33
Feature Extraction
Statistical
Structural
Global transformations and moments
1/11/2015
34
Statistical Features
Zoning
Projections and profiles
Crossings and distances
1/11/2015
35
Zoning
1/11/2015
36
1/11/2015
37
1/11/2015
38
1/11/2015
39
Projection Histograms
1/11/2015
40
Profiles
1/11/2015
41
Profiles
Profiles can also be used to the contour of the
character image
Extract the contour of the character
Locate the uppermost and the lowermost points
of the contour
Calculate the in and out profiles of the contour
1/11/2015
42
Structural Features
1/11/2015
43
Structural Features
1/11/2015
44
Structural Features
1/11/2015
45
1/11/2015
46
1/11/2015
47
Writer identification
1/11/2015
48
Handwriting Characteristics
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Line quality
Word and letter spacing
Letter comparison
Pen lifts
Connecting strokes
Beginning and ending strokes
Unusual letter formation
Shading or pen pressure
Slant
Baseline habits
Flourishes or embellishments
Diacritic placement
1/11/2015
49
Digital Watermarking
1.
2.
3.
4.
What is watermarking?
Digital watermarking is a technique for inserting
information (the watermark) into an image, which can
be later extracted or detected for variety of
purposes including identification and authentication
purposes.
Applications of watermarking:
Copyright Protection : Invisibly mark products
Manage distribution of assets :Apply unique
watermark key to each copy of a distributed
video/image
Embed all necessary data in a single image
Naturally expands to video watermarking
1/11/2015
50
Simple
Spatial Domain Modification made to the luminance
values
Transformed Domain
DCT
DWT
SVD
1/11/2015
51
Classification
Capacity
Complexity
Invertibility
Robustness
Security
Transparency
Verification
1/11/2015
52
Robustness
Fragile
Detection fails with even minor modification
Useful in tampering detection
Common in simple additive watermarking
Robust
Detection is accurate even under modification
Need for robustness dependent on use of
data
1/11/2015
53
Non-blind
The watermarking scheme requires the use of
the original image
Semi-Blind
The watermarking scheme requires the
watermark data and/or the parameters used to
embed the data
Blind
If the watermarking scheme does not require the
original image or any other data
1/11/2015
54
1/11/2015
55
Types of Watermark
1/11/2015
56
Results
1/11/2015
57
1/11/2015
58
Conclusion
Watermarking is still a challenging research
field with many interesting problems :
Robustness to both geometric and nongeometric attacks with blind detection.
Other attacks such as protocol attacks and
cryptographic attacks
Correct recovery of multiple-bit message
Public-key detection
1/11/2015
59
Image Morphing
60
Contents
Brief Introduction
What is morphing?
Image processing techniques
Image morphing algorithms
Applications of image morphing
61
Brief Introduction:
Morphing derived from the word metamorphosis.
The word metamorphosis is of the Greek origin, and is composed of two words:
- Meta: meaning between or after, and
- Morphosis: the way form or structure changes.
Metamorphosis means to change shape, appearance
or form.
62
What is morphing?
Morphing can be defined as:
- Transition from one object to another.
- Process of transforming one image into another.
Morphing can be defined as an animated transformation
of one image into another image.
63
Example:
64
65
66
Cross-dissolving
A simple way to transform an image to an other is to do crossdissolving.
It is just a pixel by pixel interpolation to fade from one image to an
other.
A cross-dissolve is a sequence of images which
implements a gradual fade from one to the other.
Cross dissolving means that one image fades to another image using
linear interpolation.
67
Cross-dissolving (contd.)
The result is usually bad because the two images are often not aligned and just
cross-dissolving gives a double-image effect.
This problem is particularly apparent in the middle frame, where both input
images contribute equally to the output.
In order to overcome this problem, warping is used to align the two images
before cross dissolving.
68
Example (contd.)
Step 2) Perform coordinate transformations on the partitioned
images to
match the feature points of two images.
Here, matching is done within the eyes and the mouths for these two
images.
We can find that the girls face becomes longer, and
the lion's
face becomes shorter.
Example (contd.)
Step 3) Cross-dissolve the two images to generate a new image. The morph
result looks like a combination of these two wrapped faces.
The new face has two eyes and one mouth, and it possesses the features
from both the girls and the
lion's faces.
Warping
Warping is the difficult step of morphing.
There are a lot of techniques available for warping.
Warping determines the way pixels from one image are
correlated with corresponding pixels from the other image.
Two ways to warp an image:
- Forward mapping.
- Reverse mapping.
72
73
1) Field/Line Morphing
2) Mesh Warping
3) Thin Plate Spline Based Image Warping
4) Multilevel Free-form Deformation (MFFD)
74
1) Field/Line Morphing
The algorithm uses lines to relate the features in source image
to features in the destination image.
It uses reverse mapping for warping the image.
Correspondence achieved using feature line(s) in source and
destination images.
Source Image
Destination Image
75
every pair of
towards the
on
called Beier-
76
Q
X
v
u
P
Destination Image
Source Image
77
u
P
Destination Image
Source Image
78
2) Mesh Warping
The mesh-warping algorithm relates features with non-uniform mesh in the
source and destination images, i.e., the images are broken up into small regions that
are mapped onto each other for the morph.
To illustrate the 2-pass mesh warping algorithm, consider the image sequence .
Here, refer the source and the target images as IS and IT, respectively. The source
image is associated with mesh MS.
It specifies the coordinates of control points.
A second mesh MT specifies their corresponding positions in the target image.
79
80
81
82
Content
Introduction
Algorithm
Results
Introduction
Original Image
Original Image
After Segmentation
Watershed segmentation
Algorithm
Read the original image I
Morphological reconstruction(using dilation) of the I
Complement of reconstructed image Ic
Marker= I Ic
Extended and imposed minimum to obtained the
markers
Compute watershed transform of the markers
Morphological
Reconstruction(Dilation)
Result (I)
Original Image
Result (II)
Dilated image
Reconstructed image
Result (III)
Complement of
reconstructed image
Result (IV)
Marker = I-Ic
Result (V)
Final Marker
Result (VI)
After watershed
Border line
Result (VII)
Image Fusion
1/11/2015
97
Outline
Introduction
Objective
Single sensor image fusion
Multi sensor image fusion
Image registration
Image fusion
Different image fusion methods
Applications
conclusion
Introduction
To FUSE means to join together
The process of combining relevant information from
two or more images into a single image.
The resulting image will be more informative than any
of the input images.
Create new images that are more suitable for the
purposes of human/machine perception, and for
further image-processing tasks such as segmentation,
object detection or target recognition
For example, visible-band and infrared images may be
fused to aid pilots landing aircraft in poor visibility.
Objective
Require high spatial and high spectral resolution
in a single image simultaneously
Techniques allow the integration of different
information sources
The fused image can have complementary spatial
and spectral resolution characteristics
Fusion techniques can distort the spectral
information of the multispectral data while
merging
Examples: A camera equipped visible image
capturing as well as infrared sensors
Sensors
Registration
Fusion
Image registration
Concept of signal conditioning
Process of aligning two or more images of the
same scene (base image & input image)
Objective-bring the input image into alignment
with the base image by applying a spatial
transformation
Transform
Domain
Averaging,
Lapacian
Pyramid Based
Brovey Method
Curvelet
Transform
Based
Principal
Component
Analysis (PCA)
Wavelet
Transform
IHS Based
Methods
High Pass
Filtering
Applications
Image Classification
Aerial and Satellite imaging
Medical imaging
Robot vision
Concealed weapon detection
Multi-focus image fusion
Digital camera application
Battle field monitoring