You are on page 1of 53

Computer Vision and Image Analysis

Digital Image Processing and Analysis


4th Edition Scott E Umbaugh
Visit to download the full and correct content document:
https://textbookfull.com/product/computer-vision-and-image-analysis-digital-image-pro
cessing-and-analysis-4th-edition-scott-e-umbaugh/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Digital Image Enhancement Restoration and Compression


Digital Image Processing and Analysis for True Epub
Scott E Umbaugh

https://textbookfull.com/product/digital-image-enhancement-
restoration-and-compression-digital-image-processing-and-
analysis-for-true-epub-scott-e-umbaugh/

Feature Extraction and Image Processing for Computer


Vision 4th Edition Mark Nixon

https://textbookfull.com/product/feature-extraction-and-image-
processing-for-computer-vision-4th-edition-mark-nixon/

Image Processing and Computer Vision in iOS Oge Marques

https://textbookfull.com/product/image-processing-and-computer-
vision-in-ios-oge-marques/

Nonlinear Eigenproblems in Image Processing and


Computer Vision Guy Gilboa

https://textbookfull.com/product/nonlinear-eigenproblems-in-
image-processing-and-computer-vision-guy-gilboa/
Computer Vision Pattern Recognition Image Processing
and Graphics Renu Rameshan

https://textbookfull.com/product/computer-vision-pattern-
recognition-image-processing-and-graphics-renu-rameshan/

Image Processing Computer Vision and Pattern


Recognition Hamid R. Arabnia

https://textbookfull.com/product/image-processing-computer-
vision-and-pattern-recognition-hamid-r-arabnia/

Feature extraction and image processing for computer


vision Fourth Edition Aguado

https://textbookfull.com/product/feature-extraction-and-image-
processing-for-computer-vision-fourth-edition-aguado/

Digital Image Watermarking: Theoretical and


Computational Advances (Intelligent Signal Processing
and Data Analysis) 1st Edition Borra

https://textbookfull.com/product/digital-image-watermarking-
theoretical-and-computational-advances-intelligent-signal-
processing-and-data-analysis-1st-edition-borra/

Applied Computer Vision and Image Processing


Proceedings of ICCET 2020 Volume 1 Brijesh Iyer

https://textbookfull.com/product/applied-computer-vision-and-
image-processing-proceedings-of-iccet-2020-volume-1-brijesh-iyer/
ISTUDY
Computer Vision and Image Analysis
Computer Vision and Image Analysis, focuses on techniques and methods for image analysis and their use in the
development of computer vison applications. The field is advancing at an ever increasing pace, with applications
ranging from medical diagnostics to space exploration. The diversity of applications is one of the driving forces
that make it such an exciting field to be involved in for the 21st century. This book presents a unique engineering
approach to the practice of computer vision and image analysis, which starts by presenting a global model to help
gain an understanding of the overall process, followed by a breakdown and explanation of each individual topic.
Topics are presented as they become necessary for understanding the practical imaging model under study, which
provides the reader with the motivation to learn about and use the tools and methods being explored.
The book includes chapters on image systems and software, image analysis, edge, line and shape detection,
image segmentation, feature extraction and pattern classification. Numerous examples, including over 500 color
images are used to illustrate the concepts discussed. Readers can explore their own application development with
any programming language, including C/C ++, MATLAB®, Python, and R, and software is provided for both the
Windows/C/C ++ and MATLAB environment.
The book can be used by the academic community in teaching and research, with over 700 PowerPoint Slides and
a complete Solutions Manual to the over 150 included problems. It can also be used for self-study by those involved
with developing computer vision applications, whether they are engineers, scientists, or artists. The new edition
has been extensively updated and includes numerous problems and programming exercises that will help the
reader and student develop their skills.
Computer Vision and
Image Analysis
Digital Image Processing and Analysis

Fourth Edition

Scott E Umbaugh
MATLAB® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks does not warrant the accuracy of the text or exer-
cises in this book. This book’s use or discussion of MATLAB® software or related products does not constitute endorsement or sponsorship by
The MathWorks of a particular pedagogical approach or particular use of the MATLAB® software.

Fourth edition published 2023


by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742

and by CRC Press


4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN

CRC Press is an imprint of Taylor & Francis Group, LLC

© 2023 Scott E Umbaugh

Third edition published by CRC press 2018

Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity
of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced
in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not
been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any
electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming and recording, or in any information
storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright Clearance Center,
Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact mpkbookspermissions@
tandf.co.uk

Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation
without intent to infringe.

ISBN: 9781032071299 (hbk)


ISBN: 9781032117089 (pbk)
ISBN: 9781003221135 (ebk)
ISBN: 9781032384450 (eBook+)

DOI: 10.1201/9781003221135

Typeset in Palatino
by codeMantra
To Robin and David

and

In loving memory of

Richard Eugene Umbaugh and Elnora Mae Umbaugh


Contents

Preface ...................................................................................................................................................................................... xiii


Acknowledgments ................................................................................................................................................................ xvii
Author .......................................................................................................................................................................................xix

1 Digital Image Processing and Analysis ........................................................................................................................ 1


1.1 Introduction .............................................................................................................................................................. 1
1.2 Image Analysis and Computer Vision Overview ............................................................................................... 2
1.3 Digital Imaging Systems ......................................................................................................................................... 6
1.4 Image Formation and Sensing ............................................................................................................................. 11
1.4.1 Visible Light Imaging ............................................................................................................................... 13
1.4.2 Imaging Outside the Visible Range of the EM Spectrum ................................................................... 18
1.4.3 Acoustic Imaging ...................................................................................................................................... 22
1.4.4 Electron Imaging....................................................................................................................................... 23
1.4.5 Laser Imaging............................................................................................................................................ 23
1.4.6 Computer-Generated Images .................................................................................................................. 23
1.5 Image Representation ............................................................................................................................................ 27
1.5.1 Binary Images............................................................................................................................................ 27
1.5.2 Gray-Scale Images ..................................................................................................................................... 27
1.5.3 Color Images .............................................................................................................................................. 27
1.5.4 Multispectral and Multiband Images .................................................................................................... 36
1.5.5 Digital Image File Formats ...................................................................................................................... 36
1.6 Key Points................................................................................................................................................................ 39
1.7 References and Further Reading ......................................................................................................................... 42
1.8 Exercises .................................................................................................................................................................. 43

2 Computer Vision Development Tools ......................................................................................................................... 47


2.1 Introduction and Overview.................................................................................................................................. 47
2.2 CVIPtools Windows GUI ...................................................................................................................................... 47
2.2.1 Image Viewer ............................................................................................................................................. 49
2.2.2 Analysis Window...................................................................................................................................... 50
2.2.3 Utilities Window ....................................................................................................................................... 52
2.2.4 Help Window ............................................................................................................................................ 52
2.2.5 Development Tools ................................................................................................................................... 52
2.3 CVIPlab for C/C++ Programming....................................................................................................................... 58
2.3.1 Toolkit, Toolbox Libraries and Memory Management in C/C++ ...................................................... 63
2.3.2 Image Data and File Structures .............................................................................................................. 63
2.4 The MATLAB CVIP Toolbox ................................................................................................................................ 71
2.4.1 Help Files ................................................................................................................................................... 71
2.4.2 M-Files ........................................................................................................................................................ 73
2.4.3 CVIPtools for MATLAB GUI................................................................................................................... 73
2.4.4 CVIPlab for MATLAB .............................................................................................................................. 73
2.4.5 Vectorization .............................................................................................................................................. 79
2.4.6 Using CVIPlab for MATLAB ................................................................................................................... 80
2.4.7 Adding a Function .................................................................................................................................... 82
2.4.8 A Sample Batch Processing M-File ......................................................................................................... 83
2.4.9 VIPM File Format ...................................................................................................................................... 85
2.5 References and Further Reading ......................................................................................................................... 86
2.6 Introductory Programming Exercises ................................................................................................................ 87
2.7 Computer Vision and Image Analysis Projects ................................................................................................. 89
viii Contents

3 Image Analysis and Computer Vision ........................................................................................................................ 91


3.1 Introduction ............................................................................................................................................................ 91
3.1.1 Overview .................................................................................................................................................... 91
3.1.2 System Model ............................................................................................................................................ 91
3.2 Preprocessing.......................................................................................................................................................... 92
3.2.1 Region of Interest Geometry ................................................................................................................... 93
3.2.2 Arithmetic and Logic Operations .......................................................................................................... 99
3.2.3 Enhancement with Spatial Filters......................................................................................................... 104
3.2.4 Enhancement with Histogram Operations ......................................................................................... 108
3.2.5 Image Quantization .................................................................................................................................110
3.3 Binary Image Analysis ........................................................................................................................................ 121
3.3.1 Thresholding Bimodal Histograms ..................................................................................................... 121
3.3.2 Connectivity and Labeling .................................................................................................................... 124
3.3.3 Basic Binary Object Features ................................................................................................................. 125
3.3.4 Computer Vision: Binary Object Classification .................................................................................. 129
3.4 Key Points.............................................................................................................................................................. 138
3.5 References and Further Reading ....................................................................................................................... 142
3.6 Exercises ................................................................................................................................................................ 143
3.6.1 Programming Exercises ......................................................................................................................... 145
3.7 Supplementary Exercises .................................................................................................................................... 147
3.7.1 Supplementary Programming Exercises ............................................................................................. 148

4 Edge, Line and Shape Detection................................................................................................................................. 151


4.1 Introduction and Overview ................................................................................................................................ 151
4.2 Edge Detection ..................................................................................................................................................... 151
4.2.1 Gradient Operators ................................................................................................................................. 153
4.2.2 Compass Masks....................................................................................................................................... 156
4.2.3 Thresholds, Noise Mitigation and Edge Linking ............................................................................... 157
4.2.4 Advanced Edge Detectors ..................................................................................................................... 160
4.2.5 Edges in Color Images............................................................................................................................ 175
4.2.6 Edge Detector Performance ................................................................................................................... 180
4.3 Line Detection ...................................................................................................................................................... 188
4.3.1 Hough Transform ................................................................................................................................... 188
4.3.2 Postprocessing ......................................................................................................................................... 191
4.4 Corner and Shape Detection .............................................................................................................................. 194
4.4.1 Corner Detection ..................................................................................................................................... 194
4.4.2 Shape Detection with the Hough Transform ...................................................................................... 197
4.5 Key Points.............................................................................................................................................................. 199
4.6 References and Further Reading ....................................................................................................................... 205
4.7 Exercises ................................................................................................................................................................ 206
4.7.1 Programming Exercises ......................................................................................................................... 208
4.8 Supplementary Exercises .................................................................................................................................... 210
4.8.1 Supplementary Programming Exercises ..............................................................................................211

5 Segmentation .................................................................................................................................................................. 213


5.1 Introduction and Overview................................................................................................................................ 213
5.1.1 Segmentation System Model and Preprocessing ............................................................................... 213
5.1.2 Image Segmentation Categories ............................................................................................................216
5.2 Region Growing and Shrinking ........................................................................................................................ 217
5.3 Clustering Techniques ......................................................................................................................................... 221
5.4 Boundary Detection............................................................................................................................................. 227
5.5 Deep Learning Segmentation Methods ............................................................................................................ 230
5.5.1 Convolution Neural Networks.............................................................................................................. 231
5.6 Combined Segmentation Approaches .............................................................................................................. 233
Contents ix

5.7 Morphological Filtering ...................................................................................................................................... 233


5.7.1 Erosion, Dilation, Opening, Closing .................................................................................................... 233
5.7.2 Hit-or-Miss Transform, Thinning and Skeletonization .................................................................... 242
5.7.3 Iterative Modification ............................................................................................................................. 250
5.8 Segmentation Evaluation Methods ................................................................................................................... 258
5.8.1 Binary Object Shape Comparison Metrics .......................................................................................... 258
5.8.2 Subjective Methods for Complex Images ............................................................................................ 259
5.8.3 Objective Methods for Complex Images ............................................................................................. 261
5.9 Key Points.............................................................................................................................................................. 262
5.10 References and Further Reading ....................................................................................................................... 267
5.11 Exercises ................................................................................................................................................................ 268
5.11.1 Programming Exercises ......................................................................................................................... 270
5.12 Supplementary Exercises .................................................................................................................................... 270
5.12.1 Supplementary Programming Exercises ............................................................................................. 272

6 Feature Extraction and Analysis................................................................................................................................. 275


6.1 Introduction and Overview ................................................................................................................................ 275
6.1.1 Feature Extraction ................................................................................................................................... 276
6.2 Shape Features ...................................................................................................................................................... 276
6.3 Histogram Features ............................................................................................................................................. 280
6.4 Color Features ....................................................................................................................................................... 286
6.5 Fourier Transform and Spectral Features......................................................................................................... 286
6.6 Texture Features ................................................................................................................................................... 297
6.7 Region-Based Features: SIFT/SURF/GIST ........................................................................................................ 303
6.8 Feature Extraction with CVIPtools .................................................................................................................... 304
6.9 Feature Analysis................................................................................................................................................... 306
6.9.1 Feature Vectors and Feature Spaces ..................................................................................................... 306
6.9.2 Distance and Similarity Measures ....................................................................................................... 307
6.9.3 Data Preprocessing ................................................................................................................................. 312
6.10 Key Points.............................................................................................................................................................. 315
6.11 References and Further Reading ....................................................................................................................... 323
6.12 Exercises ................................................................................................................................................................ 325
6.12.1 Programming Exercises ......................................................................................................................... 327
6.13 Supplementary Exercises .................................................................................................................................... 329
6.13.1 Supplementary Programming Exercises ............................................................................................. 330

7 Pattern Classification .................................................................................................................................................... 331


7.1 Introduction .......................................................................................................................................................... 331
7.2 Algorithm Development: Training and Testing Methods ............................................................................. 331
7.3 Nearest Neighbor (NN), K-NN, Nearest Centroid, Template Matching ...................................................... 333
7.4 Bayesian, Support Vector Machines, Random Forest Classifiers .................................................................. 334
7.5 Neural Networks and Deep Learning .............................................................................................................. 337
7.6 Cost/Risk Functions and Success Measures .................................................................................................... 340
7.7 Pattern Classification Tools: Python, R, MATLAB and CVIPtools ............................................................... 343
7.7.1 Python ...................................................................................................................................................... 344
7.7.2 R: Bayesian Modeling and Visualization Tools .................................................................................. 344
7.7.3 MATLAB: Statistics and Machine Learning ....................................................................................... 344
7.7.4 CVIPtools ................................................................................................................................................. 344
7.8 Key Points.............................................................................................................................................................. 346
7.9 References and Further Reading ....................................................................................................................... 349
7.10 Exercises ................................................................................................................................................................ 349
7.10.1 Programming Exercises ......................................................................................................................... 352
7.11 Supplementary Exercises .................................................................................................................................... 353
7.11.1 Supplementary Programming Exercises ............................................................................................. 355
x Contents

8 Application Development Tools ................................................................................................................................. 357


8.1 Introduction and Overview ................................................................................................................................ 357
8.2 CVIP Algorithm Test and Analysis Tool .......................................................................................................... 357
8.2.1 Overview and Capabilities .................................................................................................................... 357
8.2.2 How to Use CVIP-ATAT......................................................................................................................... 358
8.2.2.1 Running CVIP-ATAT .............................................................................................................. 358
8.2.2.2 Creating a New Project........................................................................................................... 358
8.2.2.3 Inserting Images ...................................................................................................................... 360
8.2.2.4 Inputting an Algorithm .......................................................................................................... 362
8.2.2.5 Executing an Experiment ....................................................................................................... 364
8.3 CVIP-ATAT: Application Development Necrotic Liver Tissue ...................................................................... 367
8.3.1 Introduction and Overview .................................................................................................................. 367
8.3.2 The Algorithm ......................................................................................................................................... 368
8.3.3 Conclusion ............................................................................................................................................... 368
8.4 CVIP-ATAT: Application Development with Fundus Images ....................................................................... 372
8.4.1 Introduction and Overview .................................................................................................................. 372
8.4.2 The New Algorithm ............................................................................................................................... 372
8.4.3 Conclusion ............................................................................................................................................... 377
8.5 CVIP-ATAT: Automatic Mask Creation of Gait Images .................................................................................. 377
8.5.1 Introduction ............................................................................................................................................. 377
8.5.2 Gait Analysis Images.............................................................................................................................. 378
8.5.3 Preprocessing .......................................................................................................................................... 378
8.5.4 Algorithm Combinations ....................................................................................................................... 378
8.5.5 Results Analysis ...................................................................................................................................... 380
8.5.6 Conclusion ............................................................................................................................................... 382
References ........................................................................................................................................................................ 383
8.6 CVIP Feature Extraction and Pattern Classification Tool .............................................................................. 383
8.6.1 Overview and Capabilities .................................................................................................................... 383
8.6.2 How to Use CVIP-FEPC ......................................................................................................................... 384
8.6.2.1 Running CVIP-FEPC .............................................................................................................. 384
8.6.2.2 Creating a New Project........................................................................................................... 385
8.6.2.3 Entering Classes in CVIP-FEPC ............................................................................................ 386
8.6.2.4 Adding Images and Associated Classes .............................................................................. 386
8.6.2.5 Applying Feature Extraction and Pattern Classification ................................................... 386
8.6.2.6 Running a Single Test with Training and Test Sets ........................................................... 386
8.6.2.7 The Result File ......................................................................................................................... 391
8.6.2.8 Running a Leave-One-Out Test in Combinatoric Mode ................................................... 391
8.7 CVIP-FEPC: Application Development with Thermograms ......................................................................... 393
8.7.1 Introduction and Overview .................................................................................................................. 393
8.7.2 Setting Up Experiments ......................................................................................................................... 393
8.7.3 Running the Experiments and Analyzing Results ............................................................................ 395
8.7.4 Conclusion ............................................................................................................................................... 398
8.8 CVIP-FEPC: Identification of Bone Cancer in Canine Thermograms .......................................................... 398
8.8.1 Introduction ............................................................................................................................................. 398
8.8.2 Clinical Application Development ....................................................................................................... 399
8.8.2.1 Image Database........................................................................................................................ 399
8.8.2.2 Feature Extraction and Pattern Classification ..................................................................... 399
8.8.2.3 Experimental Setup ................................................................................................................ 400
8.8.3 Results and Discussion .......................................................................................................................... 401
8.8.4 Conclusion ............................................................................................................................................... 401
References ........................................................................................................................................................................ 403
8.9 MATLAB CVIP Toolbox GUI: Detection of Syrinx in Canines with Chiari Malformation
via Thermograms ................................................................................................................................................. 403
8.9.1 Introduction ............................................................................................................................................. 403
8.9.2 Material and Methods ............................................................................................................................ 404
Contents xi

8.9.2.1 Image Data Acquisition .......................................................................................................... 404


8.9.2.2 ROI Extraction.......................................................................................................................... 404
8.9.2.3 MATLAB................................................................................................................................... 404
8.9.2.4 CVIPtools .................................................................................................................................. 405
8.9.3 MATLAB CVIP Toolbox......................................................................................................................... 405
8.9.3.1 Feature Extraction and Pattern Classification ..................................................................... 405
8.9.3.2 Features..................................................................................................................................... 405
8.9.3.3 Data Normalization Methods................................................................................................ 405
8.9.3.4 Distance Metrics ...................................................................................................................... 405
8.9.3.5 Classification Methods ........................................................................................................... 405
8.9.4 CVIPtools MATLAB Toolbox GUI........................................................................................................ 405
8.9.4.1 Feature Extraction Using the MATLAB GUI ...................................................................... 406
8.9.4.2 Pattern Classification Using MATLAB GUI ........................................................................ 407
8.9.5 Results and Discussion .......................................................................................................................... 408
8.9.6 Conclusion ............................................................................................................................................... 410
References .........................................................................................................................................................................411

Index ........................................................................................................................................................................................ 413


Preface

Digital image processing and analysis is a field that continues to experience rapid growth, with applications ranging
from areas such as space exploration to the entertainment industry. The diversity of applications is one of the driving
forces that make it such an exciting field to be involved in for the 21st century. Digital image processing can be defined as
the acquisition and processing of visual information by computer. This book presents a unique approach to the prac-
tice of digital image processing, and it will be of interest to those who want to learn about and use computer imaging
techniques.
Digital image processing can be divided into two primary application areas, human vision and computer vision,
with image analysis tying these two together. Computer Vision and Image Analysis, focuses on the tools needed for
development of computer vision applications. The culminating chapter provides the reader with examples of using the
tools discussed throughout the book necessary for developing computer vision applications. The automatic identifica-
tion of land types in satellite images, robotic control of a mars rover and the automatic classification of abnormalities
in medical images are all examples of computer vision applications. Human vision applications involve manipula-
tion of image data for viewing by people. Examples include the development of better compression algorithms, spe-
cial effects imaging for motion pictures and the restoration of satellite images distorted by atmospheric disturbance.
eResources (PowerPoint slides, software documentation, Solutions manuals, and quizzes) are also available on the
Routledge website: www.routledge.com\9781032071299

Why Write a New Edition of This Book?


The primary reasons for a new edition of the book are (1) to create two separate volumes corresponding to each
application area, (2) to include new material for the CVIPtools MATLAB Toolbox GUI, (3) to update the book for
this rapidly changing field and (4) to add more examples and images. The reason to separate the textbook, Digital
Image Processing and Analysis, into two volumes for the new edition is that we will have separate texts for computer
vision and human-based vision applications. In my computer vison and image processing (CVIP) courses here
at SIUE, they are divided accordingly. Our department at SIUE has programs in both electrical engineering and
computer engineering, and it has a primary area in CVIP. However, quite often in Computer Science or Industrial
Engineering programs, that may only be interested in the computer vision material, and for some electrical engi-
neering programs, they may be primarily interested in the digital image processing for human vision–based appli-
cations. With separate volumes, we have created textbooks that can be completely covered in either type of course,
with no need to jump around in the textbook. Additionally, without the need to be comprehensive to the entire
CVIP area in one book, we can focus on each specific area exclusively, thereby enabling a more focused and com-
prehensive approach to the material.
After many requests from CVIPtools users regarding the MATLAB version, we decided it is a good idea to expand
the MATLAB version to include a graphical user interface (GUI), similar to the one in the standard Windows
CVIPtools. Although there are a number of imaging tools currently available for use with MATLAB, we believe that
there are important aspects of the CVIPtools libraries that are unique. The comprehensive nature of the libraries
and the fact that they have been in use by the imaging community for over 25 years are important considerations
which guided us in the decision to create the CVIP MATLAB Toolbox and its new GUI.
As with previous editions of the book, an engineering approach to digital image processing is taken, and com-
puter vision and image analysis are brought together into a unified framework that provides a useful paradigm for
the development of computer vision applications. Additionally, the theoretical foundation is presented as needed in
order to fully understand the material. Although theoretical-based textbooks are available, they do not really take
what I consider an engineering approach. I still feel that there is a need for an application-oriented book that brings
computer vision and analysis together in a unified framework, and this book fills that gap.
As with the most recent edition, color is used throughout and more materials have been added regarding the
processing of color images. I also reorganized, updated, expanded and added more materials that make it more
useful as an applications-oriented textbook. I added more exercises, expanded the chapter on computer vision
xiv Preface

development tools and moved it earlier in the book – it is now Chapter 2 and was Chapter 11 in the previous edi-
tion. The creation of a GUI for the new CVIP MATLAB Toolbox will provide an additional platform for imaging
exploration and development, which is of particular interest to engineers.
The CVIP MATLAB Toolbox is a major new part of the continuing development of the comprehensive CVIPtools envi-
ronment. In conjunction with the previous development tools, the Computer Vision and Image Processing Algorithm
Test and Analysis Tool (CVIP-ATAT) and the CVIP Feature Extraction and Pattern Classification Tool (CVIP-FEPC), we
now realize a much more powerful development environment. The new Windows version of CVIPtools, which has
been integrated even more throughout the book, in conjunction with the new development tools, creates a valuable
environment for learning about imaging as well as providing a set of reusable tools for applications development.

Who Will Use This Book?


Computer Vision and Image Analysis is intended for use by the academic community in teaching and research, as well as
working professionals performing research and development in the commercial sectors. This includes all areas of com-
puter vision and image analysis, and presents a computer vision system as a deployed image analysis system. It will
be useful to academics and practicing engineers, consultants and programmers, as well as those in the graphics fields,
medical imaging professionals, multimedia specialists and others. The book can be used for self-study and is of interest
to anyone involved with developing computer vision applications, whether they are engineers, geographers, biologists,
oceanographers or astronomers. At the university, it can be used as a text in standard computer vision senior-level or
graduate course, or it may be used at any level in an applications-oriented course. One essential component that is miss-
ing from standard theoretical textbooks is a conceptual presentation of the material, which is fundamental to gaining
a solid understanding of these complex topics. Additionally, this book provides the theory necessary to understand the
foundations of computer vision, as well as that which is needed for new algorithm development.
The prerequisites for the book are an interest in the field, a basic background in computers and a basic math
background provided in an undergraduate science or engineering program. Knowledge of the C family of pro-
gramming languages, including C, C++ and C#, and/or MATLAB experience will be necessary for those intending
to develop algorithms at the application level. The book is written so that readers without a complete engineering
background can learn to use the tools and achieve a conceptual understanding of the material.

Approach
To help motivate the reader, I have taken an approach to learning that presents topics as needed. This approach
starts by presenting a global model to help gain an understanding of the overall process, followed by a breakdown
and explanation of each individual topic. Instead of presenting techniques or mathematical tools when they fit into
a nice, neat theoretical framework, topics are presented as they become necessary for understanding the practical
imaging model under study. This approach provides the reader with the motivation to learn about and use the tools
and topics, because they see an immediate need for them. For example, the mathematical process of convolution
is introduced when it is needed for an image zoom algorithm, and morphological operations are introduced when
morphological filtering operations are needed after image segmentation. This approach also makes the book more
useful as a reference, or for those who may not work through the book sequentially, but will reference a specific
section as the need arises.

Organization of the Book


The book is divided into eight primary chapters. The first chapter is an introductory chapter and overview of digi-
tal image processing and analysis; it discusses terms and describes application areas with examples. Chapter 1 also
provides a description of imaging systems, both hardware and software, and material regarding image acquisition
Preface xv

and representation. Chapter 2 includes material about the CVIPtools software development environment, both C/
C++ and MATLAB, to ease the reader into programming at an early stage. Chapter 3 leads the reader through the
various stages of image analysis, culminating in a simple binary computer vision application example. Chapter
4 discusses edge, line, boundary and shape detection. Chapter 5 provides an overview of image segmentation
methods, with representative examples of each algorithm type, and shows how morphological filtering is used as
segmentation postprocessing to clarify object shapes. Chapter 5 also discusses how segmentation and morphologi-
cal filters are applied to computer vision system development. Chapter 6 includes feature selection, feature extrac-
tion and feature analysis. To complete the tools needed for image analysis, and our view of computer vision as
deployed image analysis systems, Chapter 7 covers algorithm development and pattern classification methods. The
final chapter, Chapter 8, has more detailed examples of application development, including the Feature Extraction
and Pattern Classification (FEPC) and Algorithm Test and Analysis Tool (ATAT) development tools, as well as
new edited conference papers describing computer vision applications developed with CVIPtools. The reader who
wants to develop applications within a CVIP-development environment will find what is needed here. Also note
that complete documentation for the software is available on the publisher’s web site for the book: www.routledge.
com/9781032071299 as “Online Docs”.

Using the Book in Your Courses


The book is intended for use in computer vision, robot vision, machine vision or image analysis courses at the senior
or beginning graduate level. To use Computer Vision and Image Analysis in a one semester course, I suggest covering
Chapters 1 through 6 and selected pattern classification topics of interest from Chapter 7. If time allows, application
development tools and examples in Chapter 8 can be explored. At our university, I have a follow-on graduate-only
course that is project oriented where I use Chapter 8 as introductory material and supplement it with journal papers
and application exploration.
The programming material in Chapter 2 can be used depending on the desire of the instructor – the skeleton
program, CVIPlab, can be used either with C/C++ or in the MATLAB environment, or both. I encourage all who
use the book to explore the programming exercises because they provide a valuable tool to learn about computer
vision applications. There are also many tutorial exercises using the CVIP environment included with each chapter,
which provide hands-on experience and allow the user to gain insight into the various algorithms and parameters.
Detailed syllabi for the courses at Southern Illinois University Edwardsville can be seen at my home page: www.
siue.edu/~sumbaug.

The CVIPtools Software Development Environment


The software development environment includes an extensive set of standard C libraries, a skeleton program for using
the C libraries called CVIPlab, a dynamically linked library (cviptools.dll) based on the common object module (COM)
interface, a GUI-based program for the exploration of computer imaging called CVIPtools, two algorithm development
and batch processing tools CVIP-ATAT and CVIP-FEPC, and the new CVIP MATLAB Toolbox. The CVIPlab program
and all the standard libraries are all ANSI-C compatible. The new version of CVIPtools has been developed exclu-
sively for the Windows operating system, but various UNIX versions are available at the web site (http://cviptools.
siue.edu/). The CVIPtools software, the libraries, the CVIPlab program, CVIP-ATAT, CVIP-FEPC, the CVIP MATLAB
Toolbox and GUI, and images used in the textbook are available on the web site (cviptools.siue.edu).
The CVIPtools software has been used in projects funded by the National Institutes of Health, the United States
Department of Defense and numerous corporations in the commercial sector. CVIPtools has been used in the medi-
cal, aerospace, printing and manufacturing fields in applications such as the development of a helicopter simula-
tion, automated classification of lumber, skin tumor evaluation and analysis, embedded image processing for print
technology, the automatic classification of defects in microdisplay chips and the analysis of veterinary thermo-
graphic images for disease evaluation. Since it is a university-sponsored project, it is continually being upgraded
and expanded, and the updates are available from the web site. This software allows the reader to learn about
imaging topics in an interactive and exploratory manner, and to develop their own programming expertise with the
xvi Preface

CVIPlab program and the associated laboratory exercises. With the addition of the new GUI for the CVIP Toolbox for
MATLAB, the users can explore the functions in a manner similar to using the Windows GUI. The CVIPlab program
and the CVIP MATLAB Toolbox both allow the user access to any of the already-defined CVIPtools functions, rang-
ing from general purpose input/output and matrix functions to more advanced transform functions and complex
imaging algorithms; some of these functions are state-of-the-art algorithms since CVIPtools is continually being
enhanced at the Computer Vision and Image Processing Laboratory at Southern Illinois University Edwardsville
(SIUE).

MATLAB® is a registered trademark of The MathWorks, Inc. For product information, please contact:
The MathWorks, Inc.
3 Apple Hill Drive
Natick, MA 01760-2098 USA
Tel: 508-647-7000
Fax: 508-647-7001
E-mail: info@mathworks.com
Web: www.mathworks.com
Acknowledgments

I thank Southern Illinois University Edwardsville, specifically the School of Engineering and the Electrical and
Computer Engineering Department, for their support of this endeavor. I also thank all the students who have taken
my imaging courses and provided valuable feedback regarding the learning and teaching of computer vision and
image analysis.
The initial version of the CVIPtools software was developed primarily by myself and a few graduate students:
Gregory Hance, Arve Kjoelen, Kun Luo, Mark Zuke and Yansheng Wei; without their hard work and dedication,
the foundation that was built upon for the subsequent versions would not be solid. The next major Windows ver-
sion of CVIPtools was developed primarily by myself and Iris Cheng, Xiaohe Chen, Dejun Zhang and Huashi Ding.
Additional students who contributed were Husain Kagalwalla and Sushma Gouravaram.
The next version of CVIPtools was initially developed by Patrick Solt and Evan Bian. The work was completed by
Patrick Solt, Jhansi Akkineni, Mouinika Mamidi, Pelin Guvenc, Serkan Kefel and Hari Krishna Akkineni. Jhansi
Akkineni served as project coordinator, and her efforts deserve special recognition. Her dedication to the project and
the help she provided to others working on the project were substantial. Iris Cheng, who was the primary contributor on
the original Windows version of CVIPtools, also deserves special recognition for her continued support as a consultant
on the project. CVIPtools development continued with Hari Siva Kumar Reddy Bhogala, followed by Sai Chaitanya
Gorantla. The current version of CVIPtools was created by Rohini Dahal, Gita Pant, John M. Hilbing (Jack) and Charles
Stacey. All the graduate students who worked on the CVIPtools project deserve my special recognition and thanks.
The Computer Vision and Image Processing Algorithm Test and Analysis Tool, CVIP-ATAT, underwent many
changes during its development. The initial version was provided by Sid Smith and Jeremy Wood. Geer Shaung
and Evan Bian provided substantial new development for this tool, which helped to make it more practical for its
use with CVIPtools. Further development was completed, tested and utilized in projects by Pelin Guvenc. Hari
Siva Kumar Reddy Bhogala worked on the improvement of CVIP-ATAT and Ravneet Kaur performed testing for
the previous version. The CVIP-ATAT was worked on extensively by Charles Stacey, who has provided wonderful
improvements and updated methods for the software.
The Computer Vision and Image Processing Feature Extraction and Pattern Classification Tool, CVIP-FEPC, was
created and developed by Patrick Solt, and its development was partially funded by the Long Island Veterinary
Specialists. Additional work was performed for the improvement and enhancement of CVIP-FEPC by Kumari
Heema Poudel. Following that, Rohini Dahal took over programming development with Norsang Lama providing
extensive testing to create the first robust version of CVIP-FEPC. The current version has undergone enhancements,
primarily implemented by Charles Stacey. All the hard work and dedication of my graduate students is greatly
appreciated.
The MATLAB CVIP Toolbox was initially developed by the porting of CVIPtools C functions to mex (MATLAB
executable) files by Krishna Regmi, whose great effort laid the foundation and provided valuable insight into
our future development. The mex file development for the project was continued by Deependra Mishra. After
encountering numerous complications with various versions of compilers and operating systems, we decided to
continue development of the CVIP Toolbox using m-files. Mehrdad Alvandipour and Norsang Lama teamed up
with Deependra to complete the first version consisting primarily of m-files. Lakshmi Gorantla continued devel-
opment and testing before the release of version 2.5. Their long hours and perseverance during development is
greatly appreciated. This first version of the MATLAB CVIP Toolbox has gotten extensive use and has been a benefit
to those who are using CVIPtools and want to perform development in the MATLAB environment. For the new
version of the MATLAB Toolbox, we added a GUI and a number of functions. Julian Buritica was instrumental
with the GUI development, with the work continued by Hridoy Biswas and Al Mahmud. This version of the CVIP
Toolbox for MATLAB will be released in conjunction with this new book edition.
In small but important parts of CVIPtools, public domain software was used, and kudos to those who pro-
vided it: Jef Pokanzer’s pbmplus, Sam Leffler’s TIFF library, Paul Heckbert’s Graphics Gems, the Independent JPEG
Group’s software, Yuval Fisher’s fractal code and the Texas Agricultural Experiment Station’s code for the original
texture features.
I’d like to thank those who contributed photographs and images: Howard Ash, Mark Zuke, Mike Wilson,
Tony Berke, George Dean, Sara Sawyer, Sue Eder, Jeff Zuke, Bill White, the National Oceanic and Atmospheric
Administration, NASA and MIT. H. Kipsang Choge, Charles Stacey and Hridoy Biswas deserve credit for helping
xviii Acknowledgments

out with some of the figures, and I thank them for this work. Thanks also to David, Robin, Michael, Jeanie, Jeff,
Mom, Greg, Glicer, Gaby, Dad, Pat, Angi, Tyler, Connor, Kayla, Aaron, Ava, Kenley, Kaiden, Chris, Ryder, Chad,
Jamie, Noah, Rohini, Gita, Hridoy, Charles, Iris and Alice for letting me use their smiling faces in some of the
figures.
I also want to extend my gratitude to my graduate students and others who helped with the review of various
sections of the book. This primarily includes Julian Buritica, Charles Stacey, Hridoy Biswas and Al Mahmud, as
well as the numerous students who have used my books to learn about imaging in the courses I teach and those
taught world-wide. I also want to thank all the other authors and coauthors of the papers used in Chapter 8.
I also thank the publisher, Nora Konopka at CRC Press/Taylor & Francis Group, for having the vision, sagacity
and good taste in publishing the fourth edition of the book. Nora has been very supportive throughout the project
and very helpful in making sure that everything was put together the way I wanted. The entire staff at the CRC
Press, especially Prachi Mishra, Glenon Butler and Swapnil Joshi, have been very helpful in getting and keeping
the project rolling, and special thanks go to them. Their encouragement and enthusiasm is much appreciated; they
all have done a wonderful job managing project details as we approach production. Thanks also go to Gayathri
Tamilselvan and the production staff who survived my many requests regarding the book layout, but still managed
to get it done in a timely manner.
Finally, I thank my family for all their contributions; without them, this book would not have been possible. I
thank my mom who instilled in me a love of learning and a sense of wonder about the world around me; my dad,
who taught me how to think like an engineer and the importance of self-discipline and hard work. I want to thank
my brothers, Greg and Jeff, for being there during those formative years. And I am especially grateful to Jeanie,
Robin, David and Michael, who lived through the ordeal and endured the many long hours I put into the new
edition of this book.
Author

Dr. Scott E Umbaugh is a University Distinguished Research Professor of Electrical and Computer Engineering
and Graduate Program director for the Department of Electrical and Computer Engineering at Southern Illinois
University Edwardsville (SIUE). He is also the director of the Computer Vision and Image Processing (CVIP)
Laboratory at SIUE. He has been teaching computer vision and image processing, as well as computer and electri-
cal engineering design, for over 30 years. His professional interests include computer vision and image processing
education, research and development of both human and computer vision applications, and engineering design
education.
Prior to his academic career, Dr. Umbaugh worked as a computer design engineer and project manager in the avi-
onics and telephony industries. He has been a computer imaging consultant since 1986 and has provided consulting
services for the aerospace, medical and manufacturing industries with projects ranging from automatic identification
of defects in microdisplay chips to analysis of thermographic images for clinical diagnosis of brain disease. He has
performed research and development for projects funded by the National Institutes of Health, the National Science
Foundation and the U.S. Department of Defense.
Dr. Umbaugh is the author or co-author of numerous technical papers, two edited books and multiple editions
of his textbooks on computer vision and image processing. His books are used at academic and research organiza-
tions throughout the world. He has served on editorial boards and as a reviewer for a variety of IEEE journals, and
has evaluated research monographs and textbooks in the imaging field.
Dr. Umbaugh received his B.S.E. degree with honors from Southern Illinois University Edwardsville in 1982,
M.S.E.E. in 1987 and Ph.D. in 1990 from the Missouri University of Science and Technology, where he was a
Chancellor’s Fellow. He is a life senior member of the Institute of Electrical and Electronic Engineers (IEEE) and a
member of Sigma Xi and the International Society for Optical Engineering (SPIE). Dr. Umbaugh is also the primary
developer of the CVIPtools software package and the associated CVIP MATLAB Toolbox.
1
Digital Image Processing and Analysis

1.1 Introduction

Digital image processing is a field that continues to grow, with new applications being developed at an ever-increas-
ing pace. It is a fascinating and exciting area to be involved in today with application areas ranging from medicine
to the entertainment industry to the space program. The internet, with its ease of use via web browsers, combined
with the advances in computer power and network bandwidth has brought the world into our offices and into our
homes. One of the most interesting aspects of this information revolution is the ability to send and receive com-
plex data that transcends ordinary written text. Visual information, transmitted in the form of digital images, has
become a major method of communication for the 21st century. With the advent of modern mobile phones, this
information is available anywhere and anytime, with uses limited only by the imagination.
Digital image processing can be defined as the acquisition and processing of visual information by computer.
The importance of digital image processing is derived from the fact that our primary sense is our visual sense.
Our vision system allows us to gather information without the need for physical interaction; it enables us to
analyze many types of information directly from pictures or video. It provides us with the ability to navigate
about our environment, and the human visual system is the most sophisticated, advanced neural system in
the human body. Most of the scientific discoveries and advancements have relied on the visual system for their
development – from the discovery of fire to the design of a smart phone.
The information that can be conveyed in images has been known throughout the centuries to be extraordi-
nary – one picture is worth a thousand words. Fortunately, this is the case because the computer representation
of an image requires the equivalent of many thousands of words of data, and without a corresponding amount of
information, the medium would be prohibitively inefficient. The massive amount of data required for images is a
primary reason for the development of many subareas within the field of image processing, such as image segmen-
tation and image compression. Another important aspect of computer imaging involves the ultimate “receiver” of
the visual information – in some cases the human visual system and in others the computer itself.
This distinction allows us to separate digital image processing into two primary application areas: (1) com-
puter vision applications and (2) human vision applications, with image analysis being a key component in the
development and deployment of both (Figure 1.1-1). In computer vision applications, the processed (output) images

DIGITAL IMAGE PROCESSING

COMPUTER HUMAN
IMAGE
VISION VISION
ANALYSIS
APPLICATIONS APPLICATIONS

FIGURE 1.1-1
Digital image processing can be separated into computer vision and human vision applications, with image analysis being
essential to both.

DOI: 10.1201/9781003221135-1
2 Computer Vision and Image Analysis

are for use by a computer, while in human vision applications, the output images are for human consumption. The
human visual system and the computer as a vision system have varying limitations and strengths, and the image
processing specialist needs to be aware of the functionality of these two very different systems. The human
vision system is limited to visible wavelengths of light, which cover only a small portion of the electromagnetic
(EM) spectrum. The computer is capable of dealing with the entire EM spectrum, ranging from gamma rays to
radio waves, and it can process other imaging modalities such as ultrasound and magnetic resonance imaging
(MRI).
Historically, the field of digital image processing grew from electrical engineering as an extension of the signal
processing branch, while the computer science discipline was largely responsible for developments in computer
vision applications. At some universities, these two are still separate and distinct, but the commonalities and the
perceived needs have brought the two together. Here, we will simply refer to digital image processing as the gen-
eral field while allowing for separate application areas in computer and human vision. As shown in Figure 1.1-1,
image analysis applies to both applications’ areas.
Image analysis involves the examination of the image data to facilitate solving an imaging problem. Image analysis
methods comprise the major components of a computer vision system, where the system is to analyze images and
have a computer act on the results. In one sense, a computer vision application is simply a deployed image analysis
system. In the development of a human vision image processing application, many images must be examined and
tested so image analysis is necessary during the development of the system.
This book focuses on computer vision and image analysis. Chapters 1 and 2 introduce the basic concepts, and will
provide the necessary background for those who are new to the field, and an overview of software tools that have
been developed for use with the book. This includes a discussion of image acquisition, imaging systems and image
representation. Chapters 3–7 cover a system model for the image analysis process and then describe each major part
of this model in separate chapters. Each of these chapters concludes with a key points section, followed by references
and suggestions for further reading, and a series of exercises to help the learning process. The exercises include
definitions, discussions, problems, advanced problems and computer exercises using the CVIPtools software and
programming exercises. Chapter 8 concludes the book with a discussion of application development with an over-
view of the more advanced tools in the development environment, the Algorithm Test and Analysis Tool and the
Feature Pattern and Classification Tool.
For the programming exercises, the reader has multiple options. The new CVIP MATLAB Toolbox is available
to MATLAB users, and the CVIPlab prototype program can be used by C, C++ or C# programmers. The program-
ming environment provided with the CVIPtools software is a comprehensive environment for computer vision
and image processing education and application development. Chapter 8 describes the development tools in more
detail, including examples, and provides applications that were developed with the CVIPtools environment. For
downloading, installing and updating CVIPtools, and a description of the CVIPtools software organization, see the
web site: cviptools.siue.edu. Note that more information is available on the publisher’s web site, including function
quick reference lists, application papers and useful image processing resources.

1.2 Image Analysis and Computer Vision Overview


Image analysis involves investigation of the image data for a specific application. Typically, we have a set of images
and want to look beyond the raw image data to evaluate the images at a higher level and gain insight for the appli-
cation to determine how they can be used to extract the information we need. The image analysis process requires
the use of tools such as image segmentation, image transforms, feature extraction and pattern classification. Image
segmentation is often one of the first steps in finding higher-level objects from the raw image data. Feature extraction
and analysis is the process of acquiring higher-level image information, such as shape or color information, and it
may require the use of image transforms to find spatial frequency information. Pattern classification is the act of taking
this higher-level information and identifying objects within the image.
Image analysis methods comprise the major components of a computer vision system. Computer vision may be
best understood by considering different types of applications. Many of these applications involve tasks that are
either tedious for people to perform, require work in a hostile environment, require a high rate of processing, or
require access and use of a large database of information. Computer vision systems are used in many and various
Digital Image Processing and Analysis 3

types of environments – from manufacturing plants to hospital surgical suites to the surface of Mars. For example,
in manufacturing systems, computer vision is often used for quality control. There, the computer vision system will
scan manufactured items for defects and provide control signals to a robotic manipulator to automatically remove
defective parts. To develop an application of this nature, an image database consisting of sample images is first
created. Next, image analysis is applied to develop the necessary algorithms to solve the problem. One interesting
example of this type of system involves the automated inspection of microdisplay chips.
Microdisplay chips are used in digital cameras, projection systems, televisions, heads-up-displays and any appli-
cation that requires a small imaging device. Prior to the design of this computer vision system, these chips were
inspected manually – a process that is slow and prone to error. Once the market demand for these chips accelerated,
the manual inspection process was not practical. In Figure 1.2-1, we see the microdisplay chip inspection system along
with two sample images. The original images were captured at 3:1 magnification, which means each picture element
in the microdisplay chip corresponds to a 3 × 3 array in the image. The system automatically finds various types of
defects in the chips, such as the pixel defects and the faint display defects shown here.
An active area of computer vison research today involves applications for facial recognition. This is desired for
many reasons, including recognizing terrorist suspects in airport crowds or pictures of your long-lost cousin in a
stack of photos. The first step in facial recognition is to find faces in an image. An algorithm to select subimages
within an image that are likely to contain faces was developed using convolutional neural networks (see Chapters 5
and 7), and a resulting output image is shown in Figure 1.2-2a. In this image, the subimages that contain faces have
been marked with boxes. In addition to facial recognition, Figure 1.2-2b shows results from an algorithm developed
to identify chairs and computer monitors.
Another interesting computer vision application that required image analysis for algorithm development
involved the automatic counting and grading of lumber. Before this system was implemented, this task was done
manually, which was a boring task, had an unacceptable error rate and was inefficient. This application was chal-
lenging due to the variation in the lumber stack, such as gaps in between boards, variation in the wood color,
cracks in the boards or holes in the boards. Figure 1.2-3 shows an example of the system in operation, with a
sample input image, processed image and system output. The processed image is used by high-level software
to count and grade the lumber in stack. With the system in place, the lumberyard can minimize errors, increase
efficiency and provide their workers with more rewarding tasks.
Image analysis is used in the development of many computer vision applications for the medical community,
with the only certainty being that the variety of applications will continue to grow. Current examples of medical
systems being developed include systems to automatically diagnose skin lesions, systems to aid neurosurgeons
during brain surgery and systems to automatically perform clinical tests. Systems that automate the diagnostic pro-
cess are being developed for various reasons, including pre-screening to determine appropriate subsequent tests or
analysis, as tools by medical professionals where specialists are unavailable, or to act as consultants to the primary
care givers, and they may serve their most useful purpose in the training of medical professionals. These types of
systems may be experimental, and some are still in the research stages, but more and more of them are being inte-
grated into medical practice. Computer vision systems that are being used in the surgical suite have already been
used to improve the surgeon’s ability to “see” what is happening in the body during surgery, and consequently,
improve the quality of medical care. Systems are also currently being used for tissue and cell analysis; for example,
to automate applications that require the identification and counting of certain types of cells (see Figure 1.2-4).
Computer vision is being used more and more in medical applications, but it will still be some time before we see
computers playing doctor like the holographic doctor in the Star Trek series.
The field of law enforcement and security is an active area for image analysis research and development, with
applications ranging from automatic identification of fingerprints to DNA analysis. Security systems to identify
people by retinal scans, facial scans and the veins in the hand have been developed. Reflected ultraviolet (UV)
imaging systems are being used to find latent fingerprints, shoeprints, body fluids and bite marks that are not vis-
ible to the human visual system. Infrared (IR) imaging to count bugs has been used at Disney World to help keep
their greenery green. Currently, cars are equipped with systems to automatically avoid accidents, and systems are
under development and being tested to fully automate our transportation systems to make travel safer. The United
States space program and the Defense department, with their needs for robots with visual capabilities, are actively
involved in image analysis research and development. Applications range from autonomous vehicles to target
tracking and identification. Satellites orbiting the earth collect massive amounts of image data every day, and these
images are automatically scanned to aid in making maps, predicting the weather and helping us to understand the
changes taking place on our home planet.
4 Computer Vision and Image Analysis

(a)

Input images Pixel defect detection After blob analysis

(b) (c) (d)

(e) (f) (g)

FIGURE 1.2-1
Microdisplay chip inspection. (a) Computer vision system for microdisplay chip inspection, (b) microdisplay chip image1 at
3:1 magnification, (c) Image1 after pixel defect detection, (d) Image1 after blob analysis to find faint defects, (e) microdisplay chip
Image2 at 3:1 magnification, (f) Image2 after pixel defect detection and (g) Image2 after blob analysis to find faint defects (photo
courtesy of Mike Wilson and Iris Cheng, Westar Display Technologies, Inc.)
Digital Image Processing and Analysis 5

(a)

(b)

FIGURE 1.2-2
Face and object recognition. (a) Image after being processed by a computer vision algorithm to find and identify faces. (b)
Image processed to identify chairs and monitors.
6 Computer Vision and Image Analysis

(a) (b)

(c)

FIGURE 1.2-3
Lumber grading. (a) Image captured by the computer vision system for lumber counting grading, (b) intermediate image after
processing, (c) example of system output after software analysis. (Photo courtesy of Tony Berke, River City Software.)

1.3 Digital Imaging Systems


Digital image processing systems come in many different configurations, depending on the application. As tech-
nology advances, these systems get smaller, faster and more sophisticated. Here, we will focus on the primary
aspects of a generic imaging system. We will look at how images are sensed and transformed into computer files,
and how these computer files are used to represent image information.
Computer imaging systems are comprised of two primary component types: hardware and software. The hard-
ware components, as seen in Figure 1.3-1, can be divided into the image acquisition subsystem, the computer itself
and the display and storage devices. The computer system may contain special-purpose imaging hardware, as well
as computer vision and image processing software. The software allows us to manipulate the image and perform
Digital Image Processing and Analysis 7

FIGURE 1.2-4
Necrotic liver tissue classification. An image that was used to develop a computer vision algorithm to automatically segment
and classify necrotic (dead) liver tissue from surrounding tissue. The research investigated the toxicity of an acetaminophen
overdose, the leading cause of acute liver failure in the United States, with the goal of identifying novel therapeutic targets. The
small gray areas are blood vessels and its area should be subtracted from the necrotic area. (Image courtesy of David Umbaugh
and the University of Kansas Medical Center.)

Image Acquisition Image Display/Storage

Phone
Monitor

Computer System

Camera
Printer

Phone

Image Sensor

Flash Drive

FIGURE 1.3-1
Digital image processing system hardware.
8 Computer Vision and Image Analysis

any desired analysis or processing on the image data. Additionally, we may also use software to control the image
acquisition and storage process.
The computer system may be a general-purpose computer with an imaging device connected. Images may be
acquired by the computer via a standalone camera or phone camera, or they can be input from any image sensing
device or downloaded from the internet. The primary device for capturing live images is the camera, which can
use either a digital or analog format. Digital cameras store image data in a format similar to that used directly by
the computer, while analog cameras output a continuous video signal which must be modified to create an image
suitable for computer processing. Although digital cameras are the newer format, analog cameras are still used
in many applications due to the large installed base, well-established standards and inexpensive, easily available
parts.
A standard analog video camera requires a frame grabber, or image digitizer, to interface with the computer.
The frame grabber is a special-purpose piece of hardware that accepts a standard analog video signal and outputs
an image in the form that a computer can understand – a digital image. Analog video standards vary throughout
the world; RS-170A, RS-330 and RS-343A are the monochrome video standards in the North America and Japan.
RS-343A is used for high-resolution video with 675–1,023 lines per frame. CCIR is the monochrome standard used
primarily in Europe. The three color video standards are NTSC, PAL and SECAM. NTSC is used in North America,
Japan and parts of South America, while PAL is used in parts of Africa, Asia and Northern Europe. SECAM is used
in parts of Africa, Asia, Eastern Europe, Russia and France. NTSC is 525 lines, 30 frames (60 fields) per second, 2:1
interlaced standard. PAL and SECAM are 625 lines, 25 frames (50 fields) per second, 2:1 interlaced standards.
The process of transforming a standard analog video signal into a digital image is called digitization. This trans-
formation is necessary because the standard video signal is in analog (continuous) form, and the computer requires
a digitized or sampled version of that continuous signal. A typical video signal contains frames of video informa-
tion, where each frame corresponds to a full screen of visual information. Each frame may then be divided into
fields, and each field consists of alternating lines of video information. In Figure 1.3-2a, we see the typical image on
a display device, where the solid lines represent one field of information and the dotted lines represent the other
field. These two fields make up one frame of visual information. This two fields per frame model is referred to as
interlaced video. Some types of video signals, called progressive scan or non-interlaced video, have only one field per
frame. Non-interlaced video is typically used in computer monitors.
In Figure 1.3-2b, we see the electrical signal that corresponds to one line of video information. Note the horizontal
synch pulse between each line of information, and this synchronization pulse tells the display hardware to start a
new line. After one frame has been displayed, a longer synchronization pulse, called the vertical synch pulse, tells
the display hardware to start a new field or frame.
The analog video signal is converted to a digital image by sampling the continuous signal at a fixed rate. In
Figure 1.3-3, we see one line of a video signal being sampled (digitized) by instantaneously measuring the volt-
age of the signal at fixed intervals in time. The value of the voltage at each instant is converted into a number that
is stored, corresponding to the brightness of the image at that point. Note that the image brightness at a point

(a) (b)

One line of information


Voltage

Horizontal
sync pulse

Time

FIGURE 1.3-2
The video signal. (a) One frame, two fields. Each field is obtained by taking very other line. One field is represented by solid
lines and the other by dotted lines. (b) The analog video signal. One line of information is one row of image data, and the hori-
zontal synch pulse is the control signal for the hardware to designate the end of a line.
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of Gratitude
This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

Title: Gratitude

Author: Roy Norton

Release date: October 23, 2023 [eBook #71939]

Language: English

Original publication: New York: Street and Smith, 1913

Credits: Roger Frank and Sue Clark

*** START OF THE PROJECT GUTENBERG EBOOK GRATITUDE


***
GRATITUDE
By Roy Norton
Author of “The Garden of Fate,” “The Plunderer,” Etc.

The first of a new series of stories about the Competents in Alaska. The
season ended, they throw their last shovelfuls of dirt and bid good-by to
the homely cabin on the mountainside. But their last days on the claim
were not to pass without adventure.

I’ve heard of hearts unkind, kind deeds


With coldness still returning;
Alas! The gratitude of men
Hath oftener left me mourning.
Shakespeare George, lover of poetry, found the quotation in an
old magazine, and carefully framed and tacked it above his bunk,
where, in somber moods, he might refer to it. And the rest of us,
partners in that isolated heart of Alaska, smiled, being well aware
that cynicism had no place in his character. Sometimes, when tales
of ingratitude came to his ears, he attempted to quote it; usually after
this fashion:
“I’ve hearn of hearts unkind, them deeds
With coolness still a-turning;
But, Lord! The gratitude of folks
Has most always left me busted.”
He sometimes stated that there were cases where even the
poetry was inadequate, and in particular mentioned this fact in
connection with Laughing Jim.
Jim was bad, through and through, with a thoroughness that left
no cause for mistake, and he was rendered worse by such a charm
of recklessness, bravery, and laughter, that half his misdeeds were
overlooked. He laid no claim to honesty, and with amazing,
disarming truthfulness, admitted his own shortcomings. He was a
delightful story-teller, who could amuse and interest his auditors with
recountals of his varied experiences in many jails. He was above the
average in height, and as if to give the lie to his life, had fearless,
candid, laughing eyes. Perhaps it was his sense of humor that made
one doubt whether he was consciously bad, or merely lacking in
moral sense. Anyway, he laughed at everything, himself included.
No one quite remembers when he arrived in Marook, or, at least,
none ever mentioned it. Probably he came with that inrush in the late
fall of ’97, when the newly discovered Klondike sent its refugees
hurrying down the river to camps where they might be sure of
supplies through the long winter season, and he laughed his way
into a job as bartender, for want of something else to do, and then, in
time, graduated to the post of running the roulette wheel at the
Hang-out. He was distinguished in dress by having the only toothpick
shoes in camp, which he always wore, and for the excellent care he
bestowed on his hands. He was popular with those who went to the
Hang-out to lose their hard-won gold dust, and set a new pace in
crying his wares.
“Come, gather round me, merry gentlemen!” he would shout,
when business languished. “Why play the bank when you can lose
your money here so much faster? Your money extracted without
pain. Try the wheel! No man ever quit me winner!”
And then he would throw back his handsome young head, and
that free, reckless laugh of his would roar out over the rumble of
conversation, the clink of bottle on glass, the persistent clacking of
chips and markers at the bank, and the clattering of dice where
chuck-a-luck held forth. My partners, known to the camp as “the
Competents” Westerners all, and all of the sober, taciturn type, were
too wise in the ways of gamedom to patronize either his or any of the
other games in the Hang-out; but when spending nights in camp they
frequently went there in lieu of other places to go, and for
Shakespeare George this strange, unmoral, laughing man formed a
liking. That George did not dislike him stood him in good stead on
that night when Phil Mahoney ran amuck.
Phil had sold a claim for two thousand dollars, and Phil, ordinarily
taciturn, developed into a roaring carouser of high rank. Moreover, a
sporting tendency led him to accept Laughing Jim’s challenge and
attempt to worst that proficient at his own game. We were loitering
there when Phil, leering, trudged away from the bar to the wheel and
bought chips.
“One more man’s money in the till!” shouted Jim. “Fair warning is
fair warning. Play with me long enough and I take your wad!”
“If I plays long enough,” growled Phil, seating himself and shoving
a stack of chips on the fifteen spot and sparing a few for the single
and double O.
Still voicing that deep-throated laugh, Jim raked them in, and
again asserted that all men who came to his wheel lost; but Phil,
angry, doubled his stakes, and assumed a grin. Five times in
succession he lost, and then bought more chips, and now the grin
had given place to a sullen frown.
“There’ll be trouble with that fool yet,” said George to me, “and it’ll
be his own bloomin’ fault, because he’s been warned often enough
by Jim.”
We drew closer to the table, as did several others, seeing that
Mahoney’s bets were increasing; but his exclamations of
disappointment were drowned in the babel of sound that weltered
throughout the Hang-out. Jim had begun by taunting him; but now,
discovering his ill temper, as merely the cool “wheelman,” twirling the
little white ball, and raking in the losses, or paying out the winnings.
Once he objected to something Phil said.
“What makes you play when luck’s all against you?” he
demanded. “It’s not my fault if you lose all the time, is it?”
But Phil, by this time heavily short in purse, played on with a
certain unmistakable desperation, and lost with a persistence that
rapidly depleted his bag of gold dust. Now and then he won for a few
turns of the illusive wheel, but the certain percentage of the game
against him again told, and finally he was down to his last money. He
staked everything recklessly on the old “star combination,” and Jim
waited patiently for him to place his bet, and, it seemed to me, with a
faint hope that it might be withdrawn.
“All bets down?” he demanded at last.
“Ain’t blind, are you?” was Phil’s surly response, and Jim, with a
slight shrug, twirled the ball. It hovered aimlessly for two or three
turns as the wheel slowed down, and once it threatened to fall into a
winning pocket; then, with the perversity of fortune, it slipped quietly
into a partition and lay there. For a full quarter of a minute Jim did
not touch it, nor the stakes that Phil had lost, and then he slowly
reached over and swept the table clean, and, as he did so, again
vented that slow laugh of his.
“Told you I’d get you,” he said; but in the friendliest and most
careless of tones.
Phil, who had risen to his feet as the wheel spun, stood as if
transfixed by adversity when Jim swept the last of the money into the
drawer; but his lips were drawn back into a stiff, snarling grin, and his
eyes were wild with disappointment and anger. At the sound of Jim’s
laugh he suddenly broke loose into a storm of oaths, and, almost
before any one could realize his intent, so swift was his action, he
whipped a gun from his belt and “threw it down” on the wheelman.
The quickness of Shakespeare George was, and still is, proverbial
among those who knew him up and down the long Northwestern
coast. Undoubtedly, on that evening, it was the means of saving the
life of Laughing Jim; for even as George leaped forward from the
side and caught Phil’s arm, the pistol exploded. But so sure and deft
had been George’s attack, the heavy bullet merely buried itself in
one of the poles of the cabin roof, and the pistol hand, clutched by
the harsh, sinewy fingers of the miner, waved aloft helplessly as the
two men struggled backward and forward. The roulette wheel with its
table was overturned, and for a minute the room was filled with
excited men who broke forward to witness or participate in any
trouble. Quite steadily George forced Phil back against the wall, still
clutching the upraised hand, and held him there.
“Phil! Phil!” George expostulated. “What’s the matter with you—
you fool! Cut it out, I tell you!”
Other voices joined the protest, and another of the competents,
Bill Davis, reached up and twisted the gun from Phil’s hand. George
released his hold, and for a minute they stood there, angry, excited,
and gathered as if for further combat; then, slowly, Phil relaxed.
“You got a square deal, pardner, all right,” insisted Shakespeare
George with his slow drawl. “I ain’t got no use at all for gamblers or
them that plays; but we stood behind you when you commenced,
and Jim told you he’d get your money. Then he tried to get you to
stop when he saw luck was against you, and that you was gettin’
sore, and that didn’t do no good. I ain’t right sure that, if you’d ’a’
killed him, I wouldn’t have helped hang you. Now will you be good?”
With an impatient curse Phil shoved men out of his path and
tramped through the doorway and into the night. Some one laughed
with a clear, cool laugh, and it was Jim, the wheelman, righting his
table and wheel. Another man laughed, some one said, “The cussed
fool!” There was a return movement toward the other gambling
tables, and the Hang-out had resumed its normal atmosphere of
rumbling, subdued noise, stale smells of sweaty furs, dead smoke,
and poisonous liquors.
Laughing Jim dropped the wheel back to its pivot, gave it a spin,
and looked across at Shakespeare George. His face was, for an
instant, grave and earnest.
“Close call—that!” he said quietly. “And I reckon, Mister
Shakespeare George, that I owe you one. Thanks!”
He looked down and began to adjust his chips as if words were
awkward for him under such circumstances, and then, as if to further
conceal embarrassment, or through sheer, careless hardness, he
again lifted his head and laughed, and his clear voice went out:
“Everything all right again! Still doing business at the same old stand.
Come up and try your luck, boys! Come try your luck!”
I was not certain whether mine was a sense of surprise at this
callous outburst, or one of intense disgust for the whole sordid and
near-tragic drama, as we followed the broken man out into the cold,
still, starlit night. And, so slight is our gift of prescience, I did not in
the least anticipate that this was but the opening scene for others in
which Shakespeare George, clean, homely, and capable, and
Laughing Jim, bad, attractive, and reckless, were to play parts.
The second scene was two months in coming. It was toward the
very close of the long winter season that shut us in, and infolded us,
like prisoners in a gloom of frost and ice, in the cold, yet attractive,
center of a frozen world.
We, the Competents and I, had been working with persistent
industry for weeks, and hungered for a touch of the camp and its
vicissitudes; so, one night, when the restless craving for recreation
was strong upon us, we went, slipping swiftly over the frozen trails in
our moccasins, panting up steeps, and racing down short hills
between bare trees as the dim path opened and beckoned us on.
The trail leading into the camp debouched into a cluster of cabins
owned by miners who had claims on the gulches, and these were
spread, regardless of streets, on the flat facing the river—frozen now
into a broad ribbon of ice, snow-covered, and resting like a sinuous
white blanket between the bordering hills. We passed through this
clump of black squares, snow-capped, and out to the ribbon’s edge.
Bill Davis, in the lead, stopped us with a gesture and an exclamation.
“Listen!” he said.
We did. In the profound stillness we heard voices—angry voices—
as of turbulent men. They came from down the straggling business
street, lasted for a moment, and then were again shut off, even as
the shutter of a camera, timed, permits light and then stops it.
“Must have been down at the post,” Bill said. “We heard it while
the door was open. Something doing. Let’s lope along and see.”
He set the pace, and in a few minutes we opened the door of the
trading post to find it filled with muttering men, and it was plain to us
that a miner’s meeting, irregular and hurried, perhaps, but
nevertheless a miner’s meeting, was in session. Men in mackinaws,
furs, and parkas were crowded into the place, and the dim lamps,
with their tin reflectors, betrayed angry faces. Phil Mahoney was
standing on the rough counter haranguing the men, and his face was
black with excitement and temper.
“And look what he did to me!” he shouted, just as we entered.
“Skinned me out of all I had, then laughed in my face. And it only
took him ten or fifteen minutes to do it. They ain’t no square game
could do it. He’s a crook! That’s what this Jim is! Why, he says so
himself, and laughs about it. This camp’s had too much of him. He’s
busted too many men. I move we go down and get him and start him
over the ice, to-night! Now!”
Despite the small esteem in which I held Laughing Jim, a shudder
rippled up my spine at the thought of such an execution; for it meant
nothing less. To “start a man over the ice,” meant that he would be
sent without blankets, or food, and that, with a full eighty miles to
Taninaw, the nearest point of succor, meant nothing save
condemnation to slow death by cold or exhaustion.
“Hold on! Hold on, a minute, before that’s put to a vote,” I heard
Shakespeare George demand.
Men turned and craned their necks to look at him as he crowded
toward the counter and into the little, open space reserved beneath it
for courtesy.
“Me and my pardners just got here,” said George, “and we’d like
to know what Jim’s done this time.”
“Done?” shouted Phil, rendered more angry by interference. “He’s
skinned Missouri Jones out of all he had, and then won his pay
dump from him. Ain’t that enough?”
George eyed Phil steadily, and took his time to answer.
“Why did Missouri go against him?” he demanded. “Ain’t he old
enough, and wise enough, to know that he can’t beat a wheel?”
“But the wheel’s crooked!” declared Phil, his very beard bristling
with excitement.
“Humph! You don’t know that, and I don’t,” retorted George. “Until
it’s proved that it is, I’ll not vote to kill a man. That’s what it amounts
to. You all know it.”
There was an instant’s silence that gave way to murmurs of
approval, angry protests, and argument, above which rose Phil’s
voice, high and shrill, demanding the question. George fought for
more time, and begged men to consider carefully before voting; but
the clamor drowned him at last, and the chairman put the motion to a
vote by counting hands. There was a sudden silence, portentous, as
it took place, and I looked around me at the hard or cruel faces of
men whose hands were uplifted in the death sign, and heard the
steady, solemn voice of the chairman counting: “One—two—three
⸺” and so on, up to “twenty-seven.”
When the call for those opposed came, my hand, with those of the
Competents, was held high, and with restrained breath we again
listened to the tally. Slowly and more slow, it approached the end,
and stopped at identically the same number. Three or four men,
loudest of whom was Phil Mahoney, began shouting arguments; but
were silenced by the chairman, who calmly stated that for purposes
of certainty he would ask for another vote. Again trying moments
passed and the result was the same. Quite deliberately the chairman
got to his feet on the counter, and held up his hand.
“It rests with me to cast the deciding vote,” he said, and we all
leaned forward in suspense and stared at him. His face was firm,
and his voice without a tremor as he spoke. He was a brave man,
was that chairman, standing there, dominant, before more than half
a hundred earnest men!
“Shakespeare George,” he said, “has convinced me that we are in
possible danger of condemning a man who, though his business is
questionable, and his character confessedly loose, may be innocent
of crookedness in the cases before this meeting. I therefore cast the
deciding vote against sending him out over the ice, and declare the
meeting open for any further business, or a motion to adjourn.”
Instantly the room was in a tumult that the chairman could not
quell. Above the clamor, I heard Phil Mahoney shouting; “To thunder
with such a vote! Come on, boys! Meeting or no meeting, we’ll get
that thief! All that’s with me, come on!”
I felt a sudden jerk at my arm that almost overthrew me, and saw
that it was George’s hand that had seized me.
“Quick! Outside!” he shouted in my ear, and plunged toward the
door.
As a flying wedge the Competents, accustomed for many years to
fighting together, quick, sinewy, big, and powerful men all, charged to
the door, jerked it open, and drew themselves together in front of it, a
grim little line of determination. The moon had risen to cast shadows
at the foot of the trees on the white, still snow, and shadows at the
feet of our pitifully thin line; but we were tensed and waiting for the
rush. As the foremost men belched from the door they halted in
surprise, for directly before them stood Shakespeare George with a
heavy, menacing gun, held at the hip, and pointed toward them.
“Stop!” he ordered, and there was something so chill and
commanding in his voice that men paused irresolutely; then, sensing
the deadliness of the situation, obeyed.
“The meeting in there fairly voted down any action against
Laughing Jim,” George said quietly. “My pardners and I stand for law
and order. The majority is still the law in this camp, and if it comes to
a show-down, we, my pardners and I, will furnish the order! There’ll
be no rush on Laughing Jim so long as any of us can handle his gun.
If you think you can put it over, men, try it on!”
His grim conclusion was not to go unchallenged; for when he
ceased, Phil Mahoney leaped to the front, waving his arms and
shouting an appeal to his followers to pay no heed. Before he had
uttered a dozen words George leaped. The long barrel of his pistol
flew into the air, and came crashing sidewise against Phil’s head,
and the disturber fell to the snow, stricken as is an animal beneath
the blow of a pole-ax.
Even as he fell, George’s voice, cold and drawling, steady and
distinct, queried: “Who’s next?”
There was no “next.” I found myself the only unarmed one from
our camp, leaning forward on tiptoes, with fists clenched, and the
expectant lust of battle ripping through my veins as I saw them
waver, saw other men line themselves back of us ready for combat,
and witnessed, as the long seconds flew, the dissolution of Phil
Mahoney’s forces. At the time it seemed that hours were passing;
but that entire change of sentiment could not have required more
than five minutes, and then there arose the murmur: “George is right,
boys! The meeting decided it! That settles it!” and all was over.
The strange character of Shakespeare George was never better
exemplified than in his following action, and thinking of the events of
that far-fled night, I sometimes smile at his conception of “law and
order”; for when it was certain that the mob spirit was quelled and
dissipated, he slipped the gun back into its worn holster and
whispered to us, his partners: “Come on, boys! I’ve got something
else we ought to do,” and trudged away. The door of the trading post
slammed as old Mayo swore at the loiterers and asserted that he
had no contract to warm all outdoors. Black-moving spots were here
and there on the white-covered earth as groups turned toward their
cabins, moving quickly to escape the nipping teeth of the air.
Wondering what George could have in mind, we followed him, for
with us it was custom to cling together, come what might. Straight he
led us to the Hang-out, and in through the door. Already Laughing
Jim was the center of a garrulous group, and his face for once was
grave. As we entered he broke away from those who retailed to him
the narrowness of his escape, and came toward George, admiring,
reluctant, yet evidently anxious to voice his gratitude. But George’s
brows drew themselves into a scowl, and his gray-blue eyes were
cold and sharp as he looked at the man whose life he had most
certainly saved for a second time.
“Put on your coat,” he said, “and come outside for a minute. We
want to talk to you, Jim.”
Again we followed him out as we saw that Jim, his young face
depicting curiosity, was turning over his cash drawer to the
bartender, and looking for his mackinaw. We had but a minute to wait
before he emerged, and no time at all to speculate over George’s
intentions.
“I’ve saved you to-night, for the second time,” was our partner’s
terse statement.
Jim started to thank him, but George threw up his hand,
demanding attention.
“So you owe me something, and you’ll pay! Jim, your game’s done
as far as this camp’s concerned.”
Again the wheelman opened his lips as if to speak, and again was
abruptly silenced.
“We’ll have no powwow,” declared George, scowling at him, as he
stood there in the moonlight. “But you’ll do this! You’ll walk back into
the Hang-out and announce that never again in this camp will you
roll a wheel or turn a card; that you’re through; that you’ve finished!
Then you’ll wait for the first chance to go down, or up, the river when
spring comes, and—Jim—you’ll go!”
“But⸺” objected Jim.
“I said you’d go!” was the quick assertion. “There are a bunch of
us here, pardners all, who say that you’ll go as I say, quit to-night,
and go as soon as you can. And it’s up to you where you go. Up the
river to Dawson, down to St. Michaels, or⸺”
Significantly the thumb of his mitten turned toward the earth, and
Jim understood. The shadows on the snow, sharp and defined,
nodded their heads in assent, and the gambler looked from man to
man, reading in those dim faces a sentence. It was characteristic of
him that after this quick appraisement he drew a deep breath, looked
out across the broad expanse of snow-clad river, up at the flaming
skies, and then laughed, deeply, recklessly, and shrugged his
shoulders. Also it was characteristic that he turned toward the door,
and said: “Good! Come ahead and see if I can’t play any game!”
Once inside he walked unhesitatingly to the rough bar, seized a
cigar cutter that rested thereon, and banged it loudly on the pine
boards. Every one in the room paused and turned toward him, men’s
faces, dim through the smoke, expressing open-mouthed curiosity.
“Men,” said Jim, when he had their full attention, “I’ve been
accused of turning a crooked game. It isn’t so. I’ve played it fair, but
had rare good luck. I owe Shakespeare George a debt. I’m paying it,
full and square. And to pay it, and be quits with a clean slate, he
demands that I play no more—any game—in Marook. It costs me a
lot, for you’re a bunch of easy marks—suckers—with gold dust! But I
pay! From this minute, now, I play nothing, gamble nothing in this
camp, and am done!”
The surprised silence following this strange assertion was broken
by his big, hearty laugh, and the banging of his emphatic fist on the
bar. Quite mockingly he backed away from George, doffed his hat,
brought his heels together, and bowed deeply.
“I’ve made good,” he said. “Othello’s occupation’s gone! But God
speed the spring so that he may find other fields to conquer!”
And he backed away, down the open space in front of the bar, and
out of the door, while George’s face lighted with sudden interest at
the sound of the double quotation.
“That’s from the third act and the third scene,” said George
delightedly, as if he had made a great discovery. And then: “It means
that he’s lost his job! That’s the place where Othello talks about the
dread clamorous counterfeiters. That Jim’s a scholar! That’s what he
is—a scholar.”
It was not the fear of enmities that kept us away from the camp on
the banks of the Yukon in the weeks that followed that night, but the
demands of work. Slowly the disappointment had come to us that
our claims were not of the best, and that only by continuous effort
could we hope to make them pay scant profit. Save on occasions
when some of them passed on the trail we saw nothing of the men of
Marook or Laughing Jim. Once we heard that the latter had
complained that George had kept him from reaping the profits of the
camp, and again that, loafing on the outer edge of his gambling
world, he had angrily sworn that if he had been left undisturbed he
would have made his fortune. I suppose there was some truth in his
statement. Yet he held to his word, this unmoral, reckless vagabond
who laughed. They said that he was still there, wearing, despite
derision, his pointed-toed shoes, and manicuring his nails; but
gambling not at all.
And so, at last, the sun found us, and burst glaring upon our
activities, and thawed the huge black dumps, and melted the snow,
devoting all his energy of the high latitudes throughout the long days.
Water streamed from the hillsides. Every brook was a torrent, every
snow bank the repository for the continuous, melodious chorus of
tinkling water drops as they dripped and dripped, and sang their little
good-by songs. The dams were built, the gates swung up and down,
the shovels tore into the pay dumps, and the sluice boxes roared as
we men of Little Marook strove, and cleaned up our winter’s profit,
be it large or small. Gone was the whine of the windlass in the frosty
air, gone the sound of belabored arms beating heavy chests in the
struggle to keep warm. Gone was the ring of the ax, the clatter of
buckets emptying their contents on the apex of pyramids. The air
was redolent with the call of wild fowl come to the breeding ground,
the chirping of migratory birds, and the noiseless hum of insects.
“Boys,” said Bill Davis on the night we cleaned up the last of our
pay dirt, “I figure that she runs about fifteen thousand dollars, at
eighteen an ounce. Not much, but a mighty sight better than
nothing.”
As he talked, he poured the dust into one of our half-filled
buckskin sacks, and dropped it into our safe deposit—an empty oil
can. Then, heaving a tired sigh, he slid the can under the bunk. On
the morrow we would pick up the last scant remnants, pull the
sluices, and divide this mass of gold into packs for the next day’s
journey to the post trader at the camp. Our season’s work was done.
As claims went in that country, and in proportion to the cost of living,
we had not prospered; but we had more than paid our way and were
glad; for, long before, we had decided to sell the claim and go
“outside”—to the real United States—for the summer season. We
went to sleep with the cabin door open, now that spring had come,
and I remember that the last feature I observed was the lengthening
of the daylight.
Full of the desire of youth for rest, I awoke only when Tim shouted
his call for breakfast, and tumbled sleepily to my clothing, to the
washbasin outside the door, and my seat at the table. Then, a gallant
company, we sallied down for our last day’s work on the claim. And
we made merry over it, this last day, and played pranks, and loitered,
and threw the last shovelfuls with something of regret, for we were
leaving the ground that had promised much, paid something, and
was to be bartered. It was like bidding good-by to a friend, when we
took the last pan of dust we would ever “clean up” from it, and filed
toward the homely cabin on the mountainside. George put the pan
on top of the stove to dry, for we used no amalgam; and Tim, whose
week it was to cook, put the supper before us. We ate with
something of melancholy, some queer mingling of good-by regret
and satisfaction that at least we had worked as men. Tim got up at
last and caught the pan in his hands with a strip of cloth, and
reached under the bunk for the can. We heard an exclamation, first
of surprise, and then alarm, as he pulled it out from beneath the
bunk, clattering hollowly.
“Robbed! By heavens! Some one’s looted us!”
His voice arose in a queer crescendo of astonishment and
indignation. Stools were thrust back and our feet trampled heavily
over the floor as we bent above him and stared down at the empty
can, disbelieving him and our senses. It was true. The can was
empty, and the profits of our year’s toil had vanished as if by
malignant magic. We started toward the door foolishly intent on
plunging out into the night, but Bill Davis, veteran of the trails, leaped
in front of us and threw up a restraining hand.
“Easy, boys! Easy does it,” he said quietly, and we paused,
looking at him expectantly, and wondering what he had in mind.
“Our only chance,” he said, “of learning how, or by whom it was
taken, is the sign out here in the mud. Whoever got it left a track. If
we run over it in the night, it will be wiped out. If we wait until
morning the sign will be there, some place; unless the man that
robbed us had wings.”
“Right for you!” was a chorus, growled in unison.
And so we all remained in the cabin, and sat and talked, and
waited for daybreak, and indulged in idle speculation, but there was
no lamentation.
It was George’s wholesome, kindly hand that crept over on mine,
as we sat there in the gloom, and it was his kindly voice that said:
“Don’t worry, boy! It hits you harder than us, because we’ve money
outside. Alaska to us was an adventure. To you it was the first step
on the big stairs of life, for you are young, but we’ll get him yet. It’s
part of the game that we should.”
And I was comforted thereby, and asleep when some one aroused
us in the morning. I tumbled from my bunk, astonished by the
sudden knowledge that I had slept in all my clothing, and that I had
not suffered a wickedly troublesome dream. Tim was up and pouring
coffee, hot and steaming, into the tin cups, and the day was breaking
over the eastern hills in the early hour of the morning, so swift is the
sun’s reappearance in that high clime. We ate and drank sparsely,
quietly, each intent on what the signs might show, and deliberately,
nay, almost leisurely, tightened our belts and went out of the door,
George in the lead, Tim, short and stocky, bending behind him like
an unleashed hound, and Bill, huge and grim, following.
It was a foregone conclusion that the robber had done one of two
things—approached from behind the cabin in the daylight, while we
were working, or crept stealthily in at night while we were asleep. In
the latter case he had doubtless fled down the trail. In the former he
would have retreated by the rear of the cabin, and out into the
screen of the forest on the mountainside above. So, first, we
inspected the trail. Veterans in reading signs were these men who
had permitted me to share their lot, and they walked forward with
keen eyes sweeping this way and that—eyes which nothing could
escape. A broken twig, a patch of crushed, indented moss, anything
unusual, would be observed and noted. They bade me walk behind,
and scanned the ground for a hundred yards before one of them
uttered a sound. Then George straightened up, and I saw the hurt
look on his face give way to an angry scowl, and saw him swing one
ponderous fist into a palm.
“Come here,” he said, with strange repression, and we joined him.
There, plainly imprinted in the mud, where some one had entered
the trail from a moss-carpeted side, were tracks, and they were
those of one who wore shoes—shoes of civilization, such as but few
men wore in our outskirt of a rough world, and the shoes were
pointed, delicately, foppishly, almost daintily.
We lifted our heads and stared at one another, with the same
unvoiced comment leaping from our eyes. We looked again at the
telltale tracks in the mud, clearly leading down the hillside to the
gulch below, and thus off toward the camp. We lifted our heads once
more and George spoke.
“Laughing Jim!” he said.
“No other man in all the country wore such shoes!” Tim added.
“And no one but an expert crook would have taken a chance in
coming into our cabin night before last,” suggested Bill.
“That’s when the trick was turned,” declared George. “And he has
paid me—gratitude!”
We passed, peering, down the trail and out into the gulch. Straight
down it we went, finding here and there, in the slow miles, that
unusual mark, the mark of a toothpick shoe in a country where all
men wore rubber boots or mukluks in the wet and soggy spring.
There could have been but one destination for those feet, so, at last,
we wasted no more time on signs, but strode hurriedly and angrily
away toward Marook. We gained the top of the hill in the pass above
the town and looked down. Where last we had seen the ribbon of
white, was now open water. The river had broken and cleared itself
of ice while we toiled over our dumps. It ran below us, a turgid flood.
Down in front of the A. C. Trading Post men were assembled, and
they fired guns and shouted, while dogs ran hither and yon, howling
a chorus of excitement and salute for the first steamboat of the year.
It was coming slowly toward the bank, a tiny, rough affair that had
wintered in a slough up the river. We hurried onward toward the
water front, and had small need to ask questions, inasmuch as the
first one was answered.
“Has any one seen Laughing Jim lately?” demanded George of
the group in front of the Hang-out.
“If you’re looking for him, you’re a trifle late,” jocularly asserted the
nearest man. “He pulled out yesterday mornin’ in a boat, goin’ down
the river. And he seemed in a hurry; but he stopped to laugh and
twiddle his thumb at his nose to the boys who saw him go, and said
he was right sorry he hadn’t had a chance to skin the whole blamed
camp before he set sail. Ha! Ha! Ha!”
He laughed boisterously at his own joke, a laugh in which we did
not join, for now we knew, indubitably, that Jim had sufficient reason
for haste. It was Bill, slow and cautious, who asked another question,
pertinent to our quest.
“Any one else gone from the camp?” he asked.
“Nope! No one else had any reason to be in a rush,” was the
response.
“What makes you think Jim was in a hurry?” asked George,
frowning at the man.
“Because he just dumped himself, and some blankets, and grub
into a canoe that belonged to an Injun, and paddled away as if he
was out to break records,” asserted our informant. “Somebody asked
him what was his rush, and he said he had a new job that he must
move fast to grab. Cute of him, wasn’t it? He was a smart son of a
gun, all right, and would have his little joke, right up to the last.”
Again the man laughed, and then, as the steamboat was about to
land, hurriedly left us and started toward the river bank.
Bill beckoned us to one side.
“Boys,” he said, “we’ve got just one chance, and that is to get to
St. Michaels as soon as he does. Unimak Pass probably isn’t clear
of ice yet, and he will have to lay there until the steamer can get in
from outside to take him away. We’ve got to try to catch him between
here and there, and we’ve got several hundred miles to do it in. Two
of us better rustle a boat. The others arrange for some one to keep
an eye on our cabin up in the gulch, and buy grub for a cruise. Then

You might also like