DANGER DETECTOR FINAL VIP PRESENTATION Krithika Chandrasekar Devang Parekh Shruthi S Reddy.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Applications of one-class classification
Programming Assignment 2 CS 302 Data Structures Dr. George Bebis.
電腦視覺 Computer and Robot Vision I
ImageJ tutorial showing the operations needed to calculate air-filled porosity for an example soil column.
CDS 301 Fall, 2009 Image Visualization Chap. 9 November 5, 2009 Jie Zhang Copyright ©
Automatic Thresholding
電腦視覺 Computer and Robot Vision I Chapter2: Binary Machine Vision: Thresholding and Segmentation Instructor: Shih-Shinh Huang 1.
Automatic Identification of Bacterial Types using Statistical Image Modeling Sigal Trattner, Dr. Hayit Greenspan, Prof. Shimon Abboud Department of Biomedical.
September 10, 2013Computer Vision Lecture 3: Binary Image Processing 1Thresholding Here, the right image is created from the left image by thresholding,
TEMPLATE DESIGN © Detection of explosives using image analysis Dr Charles A Bouman, Eri Haneda, Aarthi Balachander, Krithika.
Quadtrees, Octrees and their Applications in Digital Image Processing
EE 7730 Image Segmentation.
MRI Image Segmentation for Brain Injury Quantification Lindsay Kulkin 1 and Bir Bhanu 2 1 Department of Biomedical Engineering, Syracuse University, Syracuse,
TEMPLATE DESIGN © Detection of explosives using image analysis Krithika Chandrasekar, Devang Parekh, Parham Hesamaddin.
Quadtrees, Octrees and their Applications in Digital Image Processing
Objective of Computer Vision
Pattern Recognition. Introduction. Definitions.. Recognition process. Recognition process relates input signal to the stored concepts about the object.
Image Segmentation Using Region Growing and Shrinking
CS 376b Introduction to Computer Vision 04 / 02 / 2008 Instructor: Michael Eckmann.
Four patients underwent a PET/CT scan with a Philips True Flight Gemini PET/CT scanner. We manually identified a total of 26 central-chest lesions on the.
GmImgProc Alexandra Olteanu SCPD Alexandru Ştefănescu SCPD.
UNDERSTANDING DYNAMIC BEHAVIOR OF EMBRYONIC STEM CELL MITOSIS Shubham Debnath 1, Bir Bhanu 2 Embryonic stem cells are derived from the inner cell mass.
Chapter 9.  Mathematical morphology: ◦ A useful tool for extracting image components in the representation of region shape.  Boundaries, skeletons,
Topic 10 - Image Analysis DIGITAL IMAGE PROCESSING Course 3624 Department of Physics and Astronomy Professor Bob Warwick.
S EGMENTATION FOR H ANDWRITTEN D OCUMENTS Omar Alaql Fab. 20, 2014.
CS 6825: Binary Image Processing – binary blob metrics
University of Kurdistan Digital Image Processing (DIP) Lecturer: Kaveh Mollazade, Ph.D. Department of Biosystems Engineering, Faculty of Agriculture,
CS 376b Introduction to Computer Vision 02 / 22 / 2008 Instructor: Michael Eckmann.
Intelligent Vision Systems ENT 496 Object Shape Identification and Representation Hema C.R. Lecture 7.
Digital Image Processing CCS331 Relationships of Pixel 1.
Digital Image Processing Lecture 18: Segmentation: Thresholding & Region-Based Prof. Charlene Tsai.
Chapter 10, Part II Edge Linking and Boundary Detection The methods discussed in the previous section yield pixels lying only on edges. This section.
EECS 274 Computer Vision Segmentation by Clustering II.
Development of a baggage scanning algorithm using image analysis techniques KRITHIKA CHANDRASEKAR SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING 1.
Data Extraction using Image Similarity CIS 601 Image Processing Ajay Kumar Yadav.
Pixel Connectivity Pixel connectivity is a central concept of both edge- and region- based approaches to segmentation The notation of pixel connectivity.
CS654: Digital Image Analysis
Detection of Explosives Using Image Analysis Krithika Chandrasekar, Devang Parekh, Yichen Lu, Xiaodong Li Shruthi Sanjeevi Reddy, Liqun Yang Purdue University.
Image Segmentation in Color Space By Anisa Chaudhary.
Image Segmentation by Histogram Thresholding Venugopal Rajagopal CIS 581 Instructor: Longin Jan Latecki.
主講者 : 陳建齊. Outline & Content 1. Introduction 2. Thresholding 3. Edge-based segmentation 4. Region-based segmentation 5. conclusion 2.
Digital Image Processing
Musical notes reader Anna Shmushkin & Lior Abramov.
Nottingham Image Analysis School, 23 – 25 June NITS Image Segmentation Guoping Qiu School of Computer Science, University of Nottingham
Wonjun Kim and Changick Kim, Member, IEEE
Thresholding Foundation:. Thresholding In A: light objects in dark background To extract the objects: –Select a T that separates the objects from the.
Digital Image Processing, 3rd ed. © 1992–2008 R. C. Gonzalez & R. E. Woods Gonzalez & Woods Chapter 11 Representation and.
SUMMERY 1. VOLUMETRIC FEATURES FOR EVENT DETECTION IN VIDEO correlate spatio-temporal shapes to video clips that have been automatically segmented we.
Course 3 Binary Image Binary Images have only two gray levels: “1” and “0”, i.e., black / white. —— save memory —— fast processing —— many features of.
Color Image Segmentation Mentor : Dr. Rajeev Srivastava Students: Achit Kumar Ojha Aseem Kumar Akshay Tyagi.
Digital Image Processing CCS331 Relationships of Pixel 1.
Fast Human Detection in Crowded Scenes by Contour Integration and Local Shape Estimation Csaba Beleznai, Horst Bischof Computer Vision and Pattern Recognition,
Clustering [Idea only, Chapter 10.1, 10.2, 10.4].
Lecture z Chapter 10: Image Segmentation. Segmentation approaches 1) Gradient based: How different are pixels? 2) Thresholding: Converts grey-level images.
Digital Image Processing (DIP)
DANGER DETECTOR FINAL PRESENTATION
IMAGE SEGMENTATION USING THRESHOLDING
Computer Vision Lecture 12: Image Segmentation II
Project Implementation for ITCS4122
Outline Perceptual organization, grouping, and segmentation
Binary Image Analysis: Part 1 Readings: Chapter 3: 3.1, 3.4, 3.8
Detecting Artifacts and Textures in Wavelet Coded Images
Fall 2012 Longin Jan Latecki
Binary Image Analysis: Part 1 Readings: Chapter 3: 3.1, 3.4, 3.8
پردازش تصاویر دیجیتال- احمدی فرد
Chapter 10 – Image Segmentation
Image Segmentation.
Segmentation and Edge Detection
Image Segmentation Using Region Growing and Shrinking
Presentation transcript:

DANGER DETECTOR FINAL VIP PRESENTATION Krithika Chandrasekar Devang Parekh Shruthi S Reddy

Outline Objectives Flowchart of algorithm Review of major concepts used to implement algorithm Results Future Work

Objectives – Part I The algorithm takes as its input CT images of screened baggage. Each slice represents a 2D view of the outline of each object contrasted against a background. Our immediate objective is: To find a suitable method to separate 2D objects and background. Several thresholding techniques can be used (Otsu method helps to separate data into two or more classes of pixels.) To perform connected component analysis on the slices to obtain the 2D connected object. Perform clustering (or another suitable segmentation algorithm) if there is a distinct change in density across the volume of the object and confirm the exact region around which an explosive might be concealed.

Objectives-Part II Develop an algorithm to perform assembly of CT slices. This involves finding slices with similar connected regions and grouping them together. Write code to perform clustering on the 3D image of the object. Last step involves comparing the results of clustering with known properties of explosives and flagging an alarm when a match is found (explained in further details in Results section)

Flowchart of algorithm

Otsu Thresholding Use of graythresh command in Matlab to find a threshold using Otsu’s Method

CONNECTED COMPONENT ANALYSIS 7 Once region boundaries have been detected, it is often useful to extract regions which are not separated by a boundary. Any set of pixels which is not separated by a boundary is call connected. Each maximal region of connected pixels is called a connected component. The set of connected components partition an image into segments. Let s be a neighborhood system. – 4-point neighborhood system – 8-point neighborhood system Let c(s) be the set of neighbors that are connected to the point s. For all s and r, the set c(s) must have the properties that – c(s) ε s – r ε c(s), s ε c(r) A region R S is said to be connected under c(s) if for all s, r 2 R there exists a sequence of M pixels, s1, · · ·, sM such that s1 ε c(s), s2 ε c(s1), · · ·, sM ε c(sM−1), r ε c(sM) i.e. there is a connected path from s to r. *

CCA-procedure Find connected regions for each slice using ‘bwconncomp’. Iteratively scan every slice to compare if similar connected regions are found. (Tolerance used=0.8) If slice ‘i’ and ‘i+1’ have the same/similar connected regions classify them into a single 3-D array Follow the same scanning procedure across all the slices in the data set. Note that all the slices in the Data set hold relevant data which can be analyzed meaningfully. Slices which have CT artifacts alone have been manually removed so that results of analysis are accurate. Next step performed is clustering.

Feature Vector analysis Mean and Variance are the numerical features that are used to represent our object str1 = 'mean'; str2 = 'var'; eval([featvector '= struct( str1,mean(mean((A))), str2, var(var((A))));']); eval([featvectorOriginal '= struct( str1,mean(mean((C))), str2, var(var((C))));']); x = mean(mean((A))); y = var(var((A))); xOriginal = mean(mean((C))); yOriginal = var(var((C) ) ); meanGray(i) = x; varGray(i) = y; meanOrig(i) = xOriginal; varOrig(i) = yOriginal ;

Hierarchical Clustering

Hierarchical Clustering stering/index.html

Hierarchical Clustering stering/index.html

Hierarchical Clustering stering/index.html

Hierarchical Clustering stering/index.html

Hierarchical Clustering stering/index.html

Hierarchical Clustering stering/index.html

Hierarchical Clustering stering/index.html

Classification if (d==1) if ((abs (xOriginal - Feat1 (1))<1)||(abs (yOriginal - Feat1 (2))<1)) fprintf ('Location is found! Slice = % d Object # = % d \n',k,i) disp (row') disp (col') end if ( c == 1) Feat1 = [xOriginal yOriginal]; d=d+1; c=c+1; end

Results All results shown below are for analysis performed between slice 10 and 14 of the given data set. A prominent Connected region for slice 10 Columns Rows (Let this be slice i)

Results (contd) Prominent connected region for slice 11 Columns Rows Tolerance>0.8 Gets assembled as i+1 into array A

Results (contd) Prominent connected region for slice 11 Columns Rows Tolerance>0.8 Gets assembled as i+2 into array A

Results of clustering for example above Number of centroids-9 (center of the hierarchical cluster for this connected region is at z=11) Histogram of pixel intensities-smooth distribution Conclusion-object is not a potential suspect

Future work Integrate with simulator group and check validity of algorithm by using the visualization tool. Detect False alarms using MAP estimation and accurately find co-ordinates of the explosive, given the 2D CT slices of scanned baggage