Self-Intersected Boundary Detection and Prevention Methods Joachim Stahl 4/26/2004.

Slides:



Advertisements
Similar presentations
Simultaneous surveillance camera calibration and foot-head homology estimation from human detection 1 Author : Micusic & Pajdla Presenter : Shiu, Jia-Hau.
Advertisements

Polynomial Approximation PSCI 702 October 05, 2005.
Perceptron Learning Rule
The CORS method Selecting the roots of a system of polynomial equations with combinatorial optimization H. Bekker E.P. Braad B. Goldengorin University.
CSCI 347 / CS 4206: Data Mining Module 07: Implementations Topic 03: Linear Models.
Review: Constraint Satisfaction Problems How is a CSP defined? How do we solve CSPs?
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Divide and Conquer.
Theoretical Program Checking Greg Bronevetsky. Background The field of Program Checking is about 13 years old. Pioneered by Manuel Blum, Hal Wasserman,
P. Venkataraman Mechanical Engineering P. Venkataraman Rochester Institute of Technology DETC2011 –47658 Determining ODE from Noisy Data 31 th CIE, Washington.
Snakes - Active Contour Lecturer: Hagit Hel-Or
Biased Normalized Cuts 1 Subhransu Maji and Jithndra Malik University of California, Berkeley IEEE Conference on Computer Vision and Pattern Recognition.
Robust Extraction of Vertices in Range Images by Constraining the Hough Transform Dimitrios Katsoulas Institute for Pattern Recognition and Image Processing.
Hierarchical Region-Based Segmentation by Ratio-Contour Jun Wang April 28, 2004 Course Project of CSCE 790.
EE663 Image Processing Edge Detection 5 Dr. Samir H. Abdul-Jauwad Electrical Engineering Department King Fahd University of Petroleum & Minerals.
Prénom Nom Document Analysis: Linear Discrimination Prof. Rolf Ingold, University of Fribourg Master course, spring semester 2008.
Polynomial Time Approximation Scheme for Euclidian Traveling Salesman
A Study of Approaches for Object Recognition
MAE 552 – Heuristic Optimization Lecture 6 February 6, 2002.
GENERALIZED HOUGH TRANSFORM. Recap on classical Hough Transform 1.In detecting lines – The parameters  and  were found out relative to the origin (0,0)
Parallel Computation of the Minimum Separation Distance of Bezier Curves and Surfaces Lauren Bissett, Nicholas Woodfield,
Image segmentation based on edge and corner detectors Joachim Stahl 04/21/2005.
Automatic Camera Calibration for Image Sequences of a Football Match Flávio Szenberg (PUC-Rio) Paulo Cezar P. Carvalho (IMPA) Marcelo Gattass (PUC-Rio)
Cliff Rhyne and Jerry Fu June 5, 2007 Parallel Image Segmenter CSE 262 Spring 2007 Project Final Presentation.
NEW APPROACH TO CALCULATION OF RANGE OF POLYNOMIALS USING BERNSTEIN FORMS.
CS 4700: Foundations of Artificial Intelligence
Filtering Approaches for Real-Time Anti-Aliasing /
Distinctive Image Features from Scale-Invariant Keypoints By David G. Lowe, University of British Columbia Presented by: Tim Havinga, Joël van Neerbos.
Curve Modeling Bézier Curves
Dual Evolution for Geometric Reconstruction Huaiping Yang (FSP Project S09202) Johannes Kepler University of Linz 1 st FSP-Meeting in Graz, Nov ,
Introduction Tracking the corners Camera model and collision detection Keyframes Path Correction Controlling the entire path of a virtual camera In computer.
Globally Optimal Grouping for Symmetric Closed Boundaries with Stahl/ Wang Method Vida Movahedi September 2007.
Associative Pattern Memory (APM) Larry Werth July 14, 2007
October 14, 2014Computer Vision Lecture 11: Image Segmentation I 1Contours How should we represent contours? A good contour representation should meet.
Finding dense components in weighted graphs Paul Horn
1 CO Games Development 1 Week 6 Introduction To Pathfinding + Crash and Turn + Breadth-first Search Gareth Bellaby.
Object Stereo- Joint Stereo Matching and Object Segmentation Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on Michael Bleyer Vienna.
HOUGH TRANSFORM Presentation by Sumit Tandon
1 Pattern Recognition: Statistical and Neural Lonnie C. Ludeman Lecture 21 Oct 28, 2005 Nanjing University of Science & Technology.
1 Optimal Cycle Vida Movahedi Elder Lab, January 2008.
EDGE DETECTION IN COMPUTER VISION SYSTEMS PRESENTATION BY : ATUL CHOPRA JUNE EE-6358 COMPUTER VISION UNIVERSITY OF TEXAS AT ARLINGTON.
EECS 274 Computer Vision Segmentation by Clustering II.
Dense Image Over-segmentation on a GPU Alex Rodionov 4/24/2009.
1 Pattern Recognition: Statistical and Neural Lonnie C. Ludeman Lecture 24 Nov 2, 2005 Nanjing University of Science & Technology.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
FORS 8450 Advanced Forest Planning Lecture 5 Relatively Straightforward Stochastic Approach.
Automated Solar Cavity Detection
Robust Real Time Face Detection
Course 8 Contours. Def: edge list ---- ordered set of edge point or fragments. Def: contour ---- an edge list or expression that is used to represent.
Geometric Data and Representation Pattern Recognition 2015/2016 Marc van Kreveld.
November 5, 2013Computer Vision Lecture 15: Region Detection 1 Basic Steps for Filtering in the Frequency Domain.
COMPUTATIONAL GEOMETRY AND MATRIX MULTIPLICATION Mohammed Zeeshan Farooqui Minhaj Uddin.
Multi-view Traffic Sign Detection, Recognition and 3D Localisation Radu Timofte, Karel Zimmermann, and Luc Van Gool.
Computer Vision Computer Vision based Hole Filling Chad Hantak COMP December 9, 2003.
CS 721 Project Implementation of Hypergraph Edge Covering Algorithms By David Leung ( )
Motion Segmentation CAGD&CG Seminar Wanqiang Shen
Learn how to make your drawings come alive…  COURSE: SKETCH RECOGNITION Analysis, implementation, and comparison of sketch recognition algorithms, including.
CMPT 120 Topic: Searching – Part 2 and Intro to Time Complexity (Algorithm Analysis)
April 21, 2016Introduction to Artificial Intelligence Lecture 22: Computer Vision II 1 Canny Edge Detector The Canny edge detector is a good approximation.
Another Example: Circle Detection
An Adept Edge Detection Algorithm for Human Knee Osteoarthritis Images
CS 326A: Motion Planning Probabilistic Roadmaps for Path Planning in High-Dimensional Configuration Spaces (1996) L. Kavraki, P. Švestka, J.-C. Latombe,
Computer Vision Lecture 13: Image Segmentation III
Estimation of 3D Bounding Box for Image Object
Computer Vision Lecture 12: Image Segmentation II
Superscalar Processors & VLIW Processors
Clipping Computer Graphics Cohen Sutherland Algorithm (Line)
Applied Combinatorics, 4th Ed. Alan Tucker
Department of Electrical Engineering
Synthesis of Motion from Simple Animations
Grape Detection in Vineyards Introduction To Computational and Biological Vision final project Kobi Ruham Eli Izhak.
Presentation transcript:

Self-Intersected Boundary Detection and Prevention Methods Joachim Stahl 4/26/2004

2 Introduction Image segmentation and most salient boundary detection. Why? Simulate human vision system. Object detection within an image.

3 Wang, Kubota, Siskind Method Advantages of WKS method: Global Optimal. Not biased towards boundaries with fewer fragments. Reference: S. Wang, J. Wang, T. Kubota. From Fragments to Salient Closed Boundaries: An In-Depth Study, to appear in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Washington, DC, 2004.

4 WKS Method in a nutshell

5 Self-intersection problem #1 First case of self-intersection. Two segments of the boundary intersect themselves. It is a closed boundary though. Shape of eight or infinity.

6 Self-intersection problem #1 (cont) Proposed solution: Branch & Bound First checks if an intersection occurred. If yes, branch execution. In each branch run the same set again, but ignore one of the segments. Repeat until you get non-intersected results. Pick the one with the least weight.

7 Self-intersection problem #1 (cont) Additionally: Establish a threshold. If the total weight of a boundary in a branch goes over it, reject. Do not go a level down if there is already a candidate with less weight in same level. Original W = 5.5 W = 7 W = 8W = 10 W = 7.6 W = 9

8 Self-intersection problem #1 (cont) Sample result of applying the branching method.

9 Self-intersection problem #2 Second case. Given two edges, the stochastic- completion-fields gap-filling method returns a self- intersecting segment.

10 Self-intersection problem #2 (cont) Proposed solution: Use instead a Bezier approximation. First check that the set of points satisfy minimum requirements. Then calculate the Bezier approximation. Else, return an artificial infinite long segment. (i.e. discard the segment).

11 Self-intersection problem #2 (cont) Bezier approximation works by calculating the middle points of segments. It needs four points, two for the origins and two to determine tangents at those points.

12 Self-intersection problem #2 (cont) Given the four points as p = [p 1, p 2, p 3, p 4 ]. We have vector u = [1 u u 2 u 3 ]. We can calculate the a point in the approximation by doing: p(u) = u.M B.p T where M B is the Bezier matrix M B = Note: Approximation done to a recursion depth of 10. Balance between fast and smooth.

13 Self-intersection problem #2 (cont) Proposed solution implementation. Extend the given tangents and find intersection between them. Use the intersection point for both tangent points of Bezier approximation.

14 Self-intersection problem #2 (cont) Cases where Bezier approximation does not work. But it is a case that is not desirable anyway. Can be detected easily, and return an infinite gap.

15 Self-intersection problem #2 (cont) The special case of parallel tangents needs to be addressed separately. In general, they are discarded.

16 Conclusion Both cases of self-intersecting boundaries can be overcome by implementing the proposed solutions. In the first case, the problem can be detect and corrected. In the second it is avoided.

17 Final Remarks This is a part of this research project. Other topics include: Dealing with open boundaries. Multiple boundaries. To be presented by Jun Wang.

18 The End Questions?