TEMPLATE DESIGN © 2008 TEMPLATE 2013 by Jifeng Chen Center for Hardware Assurance, Security, and Engineering University.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Applications of one-class classification
CSCE 643 Computer Vision: Template Matching, Image Pyramids and Denoising Jinxiang Chai.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Computational Biology, Part 23 Biological Imaging II Robert F. Murphy Copyright  1996, 1999, All rights reserved.
University of Connecticut Automated Counterfeit IC Physical Defect Characterization Team 176 Wesley Stevens Dan Guerrera Ryan Nesbit Advisors: Professor.
Detection and Measurement of Pavement Cracking Bagas Prama Ananta.
July 27, 2002 Image Processing for K.R. Precision1 Image Processing Training Lecture 1 by Suthep Madarasmi, Ph.D. Assistant Professor Department of Computer.
An Adaptive Image Enhancement Algorithm for Face Detection By Lizuo Jin, Shin’ichi Satoh, and Masao Sakauchi. ECE 738 In Young Chung.
Image Segmentation Image segmentation (segmentace obrazu) –division or separation of the image into segments (connected regions) of similar properties.
Lecture 07 Segmentation Lecture 07 Segmentation Mata kuliah: T Computer Vision Tahun: 2010.
‘ Glaucoma Detection In Retinal Images Using Automated Method ’
AIIA Lab, Department of Informatics Aristotle University of Thessaloniki Z.Theodosiou, F.Raimondo, M.E.Garefalaki, G.Karayannopoulou, K.Lyroudia, I.Pitas,
Segmentation and Region Detection Defining regions in an image.
EE 7730 Image Segmentation.
Motion Detection And Analysis Michael Knowles Tuesday 13 th January 2004.
1 Improving Entropy Registration Theodor D. Richardson.
Detection of Weld Defects in Rails by Ultrasonic Software Statistical and algorithmic ultrasonic software techniques are used in the analysis of ultrasonic.
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
1 Using A Multiscale Approach to Characterize Workload Dynamics Characterize Workload Dynamics Tao Li June 4, 2005 Dept. of Electrical.
Evaluating the Quality of Image Synthesis and Analysis Techniques Matthew O. Ward Computer Science Department Worcester Polytechnic Institute.
CS292 Computational Vision and Language Segmentation and Region Detection.
Despeckle Filtering in Medical Ultrasound Imaging
Cloud Imagery and Motion Mark Anderson, Scott Cornelsen, and Tom Wilkerson Space Dynamics Laboratory Utah State University, Logan, UT
Spatial-based Enhancements Lecture 3 prepared by R. Lathrop 10/99 updated 10/03 ERDAS Field Guide 6th Ed. Ch 5: ;
An automated image prescreening tool for a printer qualification process by † Du-Yong Ng and ‡ Jan P. Allebach † Lexmark International Inc. ‡ School of.
Computer vision.
IIS for Image Processing Michael J. Watts
Final project – Computational Biology
Term 2, 2011 Week 1. CONTENTS Types and purposes of graphic representations Spreadsheet software – Producing graphs from numerical data Mathematical functions.
CS 501: Software Engineering Fall 1999 Lecture 16 Verification and Validation.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
University of Connecticut Automated IC Defect Characterization Wesley Stevens Dan Guerrera Ryan Nesbit Professor Mohammad Tehranipoor Electrical and Computer.
Topic 10 - Image Analysis DIGITAL IMAGE PROCESSING Course 3624 Department of Physics and Astronomy Professor Bob Warwick.
Texture. Texture is an innate property of all surfaces (clouds, trees, bricks, hair etc…). It refers to visual patterns of homogeneity and does not result.
Use of Hierarchical Keywords for Easy Data Management on HUBzero HUBbub Conference 2013 September 6 th, 2013 Gaurav Nanda, Jonathan Tan, Peter Auyeung,
Plug-in and tutorial development for GIMP- Cathy Irwin, 2004 The Development of Image Completion and Tutorial Plug-ins for the GIMP By: Cathy Irwin Supervisors:
EFFICIENT ROAD MAPPING VIA INTERACTIVE IMAGE SEGMENTATION Presenter: Alexander Velizhev CMRT’09 ISPRS Workshop O. Barinova, R. Shapovalov, S. Sudakov,
Joon Hyung Shim, Jinkyu Yang, and Inseong Kim
Wei Dang Kevin Ellsworth Cory Shirts.  Goal: have a user interface to allow user text input using sign language digits and letters ◦ User interface ◦
Summarizing the Content of Large Traces to Facilitate the Understanding of the Behaviour of a Software System Abdelwahab Hamou-Lhadj Timothy Lethbridge.
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
Clinton Jung Advisor: Bir Bhanu Center for Research in Intelligent Systems August 20, 2009.
University of Connecticut Automated Counterfeit IC Physical Defect Characterization Team 176 Wesley Stevens Dan Guerrera Ryan Nesbit Advisors: Professor.
1 Document Image Matching Based on Component Blocks Fuhui Long, Hanchuan Peng, Zheru Chi, and Wanchi Siu Center for Multimedia Signal Processing, Department.
Automated QA/QC Technique for Climate Sensor Data EPSCoR Hawaii HGDR Scientific Data Management Portal Development Team.
Computer Vision Lecture #10 Hossam Abdelmunim 1 & Aly A. Farag 2 1 Computer & Systems Engineering Department, Ain Shams University, Cairo, Egypt 2 Electerical.
Veggie Vision: A Produce Recognition System R.M. Bolle J.H. Connell N. Haas R. Mohan G. Taubin IBM T.J. Watson Resarch Center Presented by Chris McClendon.
Automatic License Plate Location Using Template Matching University of Wisconsin - Madison ECE 533 Image Processing Fall 2004 Project Kerry Widder.
Templates, Image Pyramids, and Filter Banks
Small Intestine Villi Cell Counting Meghan Olson & Jittapat Bunnag.
2D Texture Synthesis Instructor: Yizhou Yu. Texture synthesis Goal: increase texture resolution yet keep local texture variation.
1 Machine Vision. 2 VISION the most powerful sense.
Digital Image Processing CSC331
Face Detection – EE368 Group 10 May 30, Face Detection EE 368 Group 10 Waqar Mohsin Noman Ahmed Chung-Tse Mar.
License Plate Recognition of A Vehicle using MATLAB
Detection, Tracking and Recognition in Video Sequences Supervised By: Dr. Ofer Hadar Mr. Uri Perets Project By: Sonia KanOra Gendler Ben-Gurion University.
Zachary Starr Dept. of Computer Science, University of Missouri, Columbia, MO 65211, USA Digital Image Processing Final Project Dec 11 th /16 th, 2014.
Introduction to Computational and Biological Vision Keren shemesh
Introduction Computer vision is the analysis of digital images
IC Counterfeit Detection Using Physical Inspection Methods
IMAGE MOSAICING MALNAD COLLEGE OF ENGINEERING
Introduction Computer vision is the analysis of digital images
IC Counterfeit Detection Using Physical Inspection Methods
Spatial operations and transformations
Digital Image Processing Week III
Introduction Computer vision is the analysis of digital images
Presented by Mohammad Rashidujjaman Rifat Ph.D Student,
Application of Facial Recognition in Biometric Security
Spatial operations and transformations
Presentation transcript:

TEMPLATE DESIGN © TEMPLATE 2013 by Jifeng Chen Center for Hardware Assurance, Security, and Engineering University of Connecticut Automated Counterfeit IC Physical Defect Characterization Team 176: Wesley Stevens, Dan Guerrera, Ryan Nesbit Advisors: Mohammad Tehranipoor, Domenic Forte ECE Department, University of Connecticut, {wesley.stevens, daniel.guerrera, {tehrani, Motivation  Create an automated, user friendly program for identifying physical defects of ICs  Accept wide range of image inputs from various locations  Process different images with specific algorithms  Compile and display comprehensive results Objective and Solution  Increasing number of counterfeit integrated circuits (ICs)  Counterfeit ICs can cause catastrophic failure of systems  Current physical defect tests are destructive, time consuming  An expert is required both for performing tests and analysis of results General Specifications Language:MATLAB Analysis Types:Single, Golden Image Types:Surface, Pin, Text Image Magnification:20x – 100x Ideal Image Resolution:1000 by 1000 pixels Output:Current Algorithm, Identified Defects, Summary Counterfeit determination is based on identifying defects or abnormalities with the IC Physical defects can be categorized by the component or location at which they occur Imaging techniques provide data that can be used to identify defects and determine IC authenticity Defects detected include:  Pin: dents, contamination, color variations, misaligned  Surface: scratches, color variation, improper textures, package damage  Text: markings, ghost markings Surface Analysis Example Images Feature Matching and Alignment Pin Analysis About the Authors  Expand Defect Coverage  Improve Algorithm Robustness  Expand Group Comparison Analysis  Create Graphical User Interface  Modify User Results Transformation: Algorithm Results: Original Image: Difference: Future Work Wesley Stevens (EE/CE), Dan Guerrera (CE), and Ryan Nesbit (EE) are full time undergraduate students at the University of Connecticut. Original Image: Isolation of distinct objects: Counting objects: Scratch Analysis: Counts results of all operations Highlights areas with count greater than a given threshold Statistical Averaging: Cleans up excess blocks Determines types of anomalies present in different blocks Correlate types to various defects Scratch Analysis: Converts image to binary using threshold Creates line structuring elements for comparison Iterates through operations while varying parameters Statistical Averaging: Divides image into blocks based on size Calculates Global and Local statistics Compares each block to gathered statistics Flags blocks outside of threshold Approach and Methods Object Isolation: Uses differences in intensity values to find objects Different structuring elements are used to find different objects Algorithm iteratively grows these objects The parameters of each structuring element are changed on each iteration Given the type of structuring element the type of defect can be determined Algorithm will count and find the area of each object This data is also used in determining what type of defects might exist Certain checks exist to help filter out false positives