Presented by :- Vishal Vijayshankar Mishra

Slides:



Advertisements
Similar presentations
Eigen Decomposition and Singular Value Decomposition
Advertisements

Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
EigenFaces.
EDGE DETECTION ARCHANA IYER AADHAR AUTHENTICATION.
Machine Learning Lecture 8 Data Processing and Representation
Image Segmentation Image segmentation (segmentace obrazu) –division or separation of the image into segments (connected regions) of similar properties.
Edge detection Goal: Identify sudden changes (discontinuities) in an image Intuitively, most semantic and shape information from the image can be encoded.
Pattern Recognition Topic 1: Principle Component Analysis Shapiro chap
Robust Object Segmentation Using Adaptive Thresholding Xiaxi Huang and Nikolaos V. Boulgouris International Conference on Image Processing 2007.
Prénom Nom Document Analysis: Data Analysis and Clustering Prof. Rolf Ingold, University of Fribourg Master course, spring semester 2008.
3D Hand Pose Estimation by Finding Appearance-Based Matches in a Large Database of Training Views
A Novel 2D To 3D Image Technique Based On Object- Oriented Conversion.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Image Segmentation by Clustering using Moments by, Dhiraj Sakumalla.
Presented by: Kamakhaya Argulewar Guided by: Prof. Shweta V. Jain
FEATURE EXTRACTION FOR JAVA CHARACTER RECOGNITION Rudy Adipranata, Liliana, Meiliana Indrawijaya, Gregorius Satia Budhi Informatics Department, Petra Christian.
Summarized by Soo-Jin Kim
Machine Vision for Robots
BACKGROUND LEARNING AND LETTER DETECTION USING TEXTURE WITH PRINCIPAL COMPONENT ANALYSIS (PCA) CIS 601 PROJECT SUMIT BASU FALL 2004.
Digital Image Processing CCS331 Relationships of Pixel 1.
Edges. Edge detection schemes can be grouped in three classes: –Gradient operators: Robert, Sobel, Prewitt, and Laplacian (3x3 and 5x5 masks) –Surface.
Detection of nerves in Ultrasound Images using edge detection techniques NIRANJAN TALLAPALLY.
Phase Congruency Detects Corners and Edges Peter Kovesi School of Computer Science & Software Engineering The University of Western Australia.
November 13, 2014Computer Vision Lecture 17: Object Recognition I 1 Today we will move on to… Object Recognition.
N– variate Gaussian. Some important characteristics: 1)The pdf of n jointly Gaussian R.V.’s is completely described by means, variances and covariances.
Data Extraction using Image Similarity CIS 601 Image Processing Ajay Kumar Yadav.
Interactive Sand Art Drawing Using RGB-D Sensor
CSC508 Convolution Operators. CSC508 Convolution Arguably the most fundamental operation of computer vision It’s a neighborhood operator –Similar to the.
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities Prof. Charlene Tsai.
A Flexible New Technique for Camera Calibration Zhengyou Zhang Sung Huh CSPS 643 Individual Presentation 1 February 25,
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
A Tutorial on using SIFT Presented by Jimmy Huff (Slightly modified by Josiah Yoder for Winter )
主講者 : 陳建齊. Outline & Content 1. Introduction 2. Thresholding 3. Edge-based segmentation 4. Region-based segmentation 5. conclusion 2.
Digital Image Processing
October 1, 2013Computer Vision Lecture 9: From Edges to Contours 1 Canny Edge Detector However, usually there will still be noise in the array E[i, j],
CS654: Digital Image Analysis
Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin, South Korea Copyright © solarlits.com.
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities May 2, 2005 Prof. Charlene Tsai.
Course 5 Edge Detection. Image Features: local, meaningful, detectable parts of an image. edge corner texture … Edges: Edges points, or simply edges,
Lecture 04 Edge Detection Lecture 04 Edge Detection Mata kuliah: T Computer Vision Tahun: 2010.
Machine Vision Edge Detection Techniques ENT 273 Lecture 6 Hema C.R.
Chapter 13 Discrete Image Transforms
Over the recent years, computer vision has started to play a significant role in the Human Computer Interaction (HCI). With efficient object tracking.
IMAGE PROCESSING APPLIED TO TRAFFIC QUEUE DETECTION ALGORITHM.
Student Gesture Recognition System in Classroom 2.0 Chiung-Yao Fang, Min-Han Kuo, Greg-C Lee, and Sei-Wang Chen Department of Computer Science and Information.
Edge Detection slides taken and adapted from public websites:
Face Detection EE368 Final Project Group 14 Ping Hsin Lee
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities Prof. Charlene Tsai.
Principal Component Analysis (PCA)
Computer Vision Lecture 5: Binary Image Processing
Principal Component Analysis
A New Approach to Track Multiple Vehicles With the Combination of Robust Detection and Two Classifiers Weidong Min , Mengdan Fan, Xiaoguang Guo, and Qing.
Edge Detection The purpose of Edge Detection is to find jumps in the brightness function (of an image) and mark them.
Tremor Detection Using Motion Filtering and SVM Bilge Soran, Jenq-Neng Hwang, Linda Shapiro, ICPR, /16/2018.
Computer Vision Lecture 9: Edge Detection II
Edge detection Goal: Identify sudden changes (discontinuities) in an image Intuitively, most semantic and shape information from the image can be encoded.
Hu Li Moments for Low Resolution Thermal Face Recognition
Introduction Computer vision is the analysis of digital images
Object Recognition Today we will move on to… April 12, 2018
Canny Edge Detector.
Local features and image matching
Midterm Exam Closed book, notes, computer Similar to test 1 in format:
EE 492 ENGINEERING PROJECT
Edge Detection Today’s readings Cipolla and Gee Watt,
第 九 章 影像邊緣偵測 9-.
Introduction Computer vision is the analysis of digital images
IT472 Digital Image Processing
IT472 Digital Image Processing
Presentation transcript:

Presented by :- Vishal Vijayshankar Mishra Gesture-Based Interface Hand Gesture Recognition Based on Karhunen-Loeve Transform Presented by :- Vishal Vijayshankar Mishra

Outline Introduction About KL Transformation About Canny Edge Detection Proposed System Conclusion

Introduction Interaction with computers are not comfortable experience. Computers should communicate with people with body language. Hand gesture recognition becomes important Interactive human-machine interface and virtual environment

Pre-processing of Hand Gesture Recognition Detection of Hand Gesture Regions Aim to fix on the valid frames and locate the hand region from the rest of the image. Low time consuming  fast processing rate  real time speed

Pre-processing of Hand Gesture Recognition Detect skin region from the rest of the image by using color. Each color has three components hue, saturation, and value Chroma consists of hue and saturation is separated from value Under different condition, Chroma is invariant.

Prelude: Firstly the hand is detected using skin filtering and palm cropping was performed to extract out only the palm portion of the hand. The extracted image was then processed using the Canny Edge Detection technique to extract the outline images of palm. After palm extraction, the features of hand were extracted using K-L Transform technique and finally the input gesture was recognized using proper classifier.

Canny Edge Detection This is one of the best edge detection techniques but little complex than other edge detection techniques. The major advantage of this technique is its performance. In case of other edge detection techniques only one threshold is used, in which all values below the threshold were set to 0. Thus, we must be very careful while selecting the threshold. Selecting the threshold too low may result in some false edges which are also known as false positives. Whereas if the threshold selected is too high, some valid edge points might be lost, this is also known as false negatives. But canny edge detection technique uses two thresholds: a lower threshold, TL and a higher threshold, TH thus eliminating problem of false positive and false negative.

Steps involved in this type of detection are: The input image is smoothened with a Gaussian filter after which the Gradient magnitude and angle images are computed. Non-maxima suppression is applied to the gradient magnitude image. And finally detection and linking of the edges is done using double thresholding and connectivity analysis.

Karhunen-Loeve (K-L) Transform K-L Transform is used to translate and rotate the axes and new coordinate is established according to the variance of the data. The K-L transformation is also known as the principal component transformation, the eigenvector transformation or the Hoteling transformation. The advantages are that it eliminates the correlated data, reduces dimension keeping average square error minimum and gives good cluster characteristics. K-L Transform gives very good energy compression. It establishes a new co-ordinate system whose origin will be at the Centre of the object and the axis of the new co-ordinate system will be parallel to the directions of the Eigen vectors. It is often used to remove random noise. The steps involved in the process are:

The steps involved in the process are: The steps involved in the process are: Firstly I consider an input data matrix say X and then I find out the mean vector say M: M = EX The next step is finding out the covariance matrix C of X. Mathematically, covariance is given by: C = E (X - M) (X - M). The Eigen values and Eigen vectors are found out from C such that the eigenvalues are arranged in the descending order and corresponding Eigen vectors are obtained. Matrix A is obtained in such a manner that the first row represents Eigen vector corresponding to maximum Eigen value and so on. K-L Transform is given by: KLT = A (X - M) Where A is the matrix consisting of Eigen vectors arranged in rows such that they are arranged in decreasing order of Eigen value.

Proposed System KL Transform is used to recognize different hand gestures. Such as : Skin filtering Palm cropping Edge detection Feature extraction Classification

PROPOSED SYSTEM Diagram

Skin Filtering Skin filtering is a process of finding regions with skin colored pixels from the background. This process has been used for detection of face, hand, etc. which is applied indifferent fields. The basic block diagram of the skin filtering process is shown below.

Block diagram of skin filtering

b) Hand Cropping After the skin has been extracted from the input image, hand cropping is done. As I am considering the gesture shown by the hand only till the wrist portion, it is important to remove the other skin parts. Here, I scanned the image from left to right or vice-versa and from top to bottom or vice-versa in order to detect the wrist and then the minimum and maximum positions where the white pixels end was determined and based on that cropping is done. One of the arbitrary images has been shown below.

Skin filtering: a) Input image, b) HSV conversion of input image, c)Filtered image, d) Smoothened image, e) Binary image in grayscale, f) Biggest BLOB.

C) Edge Detection After extraction of the desired hand I extracted only the edges of the hand in the image so as to further reduce the time and computational complexity during the whole process. There are different edge detection techniques like Sobel, Prewitt, Roberts, Gaussian, zero-cross and canny method among which Canny method is found to be the best of all the techniques studied as it uses two different thresholds, a low threshold and a high threshold to detect strong and weak edges, thus eliminating the problem of inclusion false edges and discarding the valid edge points. I have used the Canny method in our work.

Edge detection. (a) Input image, (b) Edge detected image

D) Feature Extraction Extraction of unique features for each gesture which are independent of human hand size and light illumination is important. I have used K-L transform as it provides advantages like it completely de-correlates the original data, the total entropy is minimized, and for any amount of compression the mean square error in the reconstruction is minimized. Some of the results are shown in fig. 8 which shows the image along with the Eigen vectors obtained using K-L Transform.

Features extracted for gesture UP and DOWN Features extracted for gesture UP and DOWN. (a) Input image, (b) Eigen vector plot.

E) Classifier We have used two types of classifier, one based on the angle made by the Eigen vector with reference axis and another based on Euclidean distance and made a comparative study between them and it was found that both of them gave the same results. The angle can be obtained considering either x or y-axis as reference axis but must be constant for all symbols. I have considered angles with respect to the x-axis. Table I shows the classification based on the angle between the Eigen vector and the x-axis. After rigorous experimentation it was found that for different images of a particular gesture the angle lie within certain limit. Based on that knowledge thresholds are set to classify the gesture. Here, I have considered only the angle made by the first Eigen vector, as the angle made by the second Eigen vector just differs by an angle of 90 with the first one. Considering only a single angle made by any one of the Eigen vector is sufficient for the purpose.

CONCLUSIONS A new technique has been proposed to increase the adaptability of a gesture recognition system. In this paper, the steps that I have used for recognizing different hand gestures are skin filtering, edge detection, K-L transform and finally a proper classifier, where I have used angle based classification to detect which symbol the test image belongs to. The experiment was performed with bare hands while interacting with the computer. I have used Euclidean distance based classifier in order to compare the result from the angle based classifier and it was found that both give the same result. Thus accurate result was obtained. However, difficulty faced by us was it was not able to recognize gestures like STOP, FIVE whose result was similar to the FOUR and PHONE which was similar to THUMBS DOWN. I wish to overcome such difficulties in the near future. Moreover, here I have dealt with few gestures, so later I can extend to other gestures and implement it in different fields.

Thank You! Questions?