A Generic Shape Descriptor using Bezier Curves Presenting by – Dr. Manzur Murshed Authors – Ferdous Ahmed Sohel Dr. Gour C. Karmakar Prof. Laurence S.

Slides:



Advertisements
Similar presentations
Continuous Estimation in WLAN Positioning By Tilen Ma Clarence Fung.
Advertisements

Aggregating local image descriptors into compact codes
NameEnrollment noRoll no PATEL KRUPALI SHAH JENNY NAYAK KHUSHBU GAMIT ZANKHANA Guided by - Mr.
Lecture Notes #11 Curves and Surfaces II
© University of Wisconsin, CS559 Spring 2004
Lecture 10 Curves and Surfaces I
Geometric Modeling Notes on Curve and Surface Continuity Parts of Mortenson, Farin, Angel, Hill and others.
DREAM PLAN IDEA IMPLEMENTATION Introduction to Image Processing Dr. Kourosh Kiani
Copyright © Cengage Learning. All rights reserved.
Multimedia DBs.
EE663 Image Processing Edge Detection 2 Dr. Samir H. Abdul-Jauwad Electrical Engineering Department King Fahd University of Petroleum & Minerals.
Prénom Nom Document Analysis: Data Analysis and Clustering Prof. Rolf Ingold, University of Fribourg Master course, spring semester 2008.
Copyright © Cengage Learning. All rights reserved. 10 Introduction to the Derivative.
The Tornado Model: Uncertainty Model for Continuously Changing Data Byunggu Yu 1, Seon Ho Kim 2, Shayma Alkobaisi 2, Wan Bae 2, Thomas Bailey 3 Department.
A New Rate-Complexity-QP Algorithm for HEVC Intra-Picture Rate Control LING TIAN, YIMIN ZHOU, AND XIAOJUN CAO 2014 INTERNATIONAL CONFERENCE ON COMPUTING,
1 © 2010 Cengage Learning Engineering. All Rights Reserved. 1 Introduction to Digital Image Processing with MATLAB ® Asia Edition McAndrew ‧ Wang ‧ Tseng.
1 Embedded colour image coding for content-based retrieval Source: Journal of Visual Communication and Image Representation, Vol. 15, Issue 4, December.
IGCSE Revision Lesson 3 I can calculate the gradient of a straight line from the co-ordinates of two points on it I can calculate the length and the co-ordinates.
Introduction --Classification Shape ContourRegion Structural Syntactic Graph Tree Model-driven Data-driven Perimeter Compactness Eccentricity.
Curve Modeling Bézier Curves
Introduction and Analysis of Error Pertemuan 1
Higher Computing Data Representation.
A VOICE ACTIVITY DETECTOR USING THE CHI-SQUARE TEST
By: De’Aja Koontz 6 Th Period.  A member of the set of positive whole numbers {1, 2, 3,... }, negative whole numbers {-1, -2, -3,... }, and zero {0}.
Frame by Frame Bit Allocation for Motion-Compensated Video Michael Ringenburg May 9, 2003.
Surface modeling through geodesic Reporter: Hongyan Zhao Date: Apr. 18th
An Improved Shape Descriptor Using Bezier Curves Authors: Ferdous Ahmed Sohel Dr. Gour Chandra Karmakar Professor Laurence Sean Dooley.
(Spline, Bezier, B-Spline)
V. Space Curves Types of curves Explicit Implicit Parametric.
EE 492 ENGINEERING PROJECT LIP TRACKING Yusuf Ziya Işık & Ashat Turlibayev Yusuf Ziya Işık & Ashat Turlibayev Advisor: Prof. Dr. Bülent Sankur Advisor:
Timothy Reeves: Presenter Marisa Orr, Sherrill Biggers Evaluation of the Holistic Method to Size a 3-D Wheel/Soil Model.
Click to edit Present’s Name Xiaoyang Zhang 1, Jianbin Qin 1, Wei Wang 1, Yifang Sun 1, Jiaheng Lu 2 HmSearch: An Efficient Hamming Distance Query Processing.
Curves.
Shape Based Image Retrieval Using Fourier Descriptors Dengsheng Zhang and Guojun Lu Gippsland School of Computing and Information Technology Monash University.
Ferdous A. Sohel, Prof. Laurence S. Dooley and Dr. Gour C. Karmakar Gippsland School of Computing and Information System Monash University, Churchill.
CISC1100: Binary Numbers Fall 2014, Dr. Zhang 1. Numeral System 2  A way for expressing numbers, using symbols in a consistent manner.  " 11 " can be.
Lecture 7: Features Part 2 CS4670/5670: Computer Vision Noah Snavely.
A survey of different shape analysis techniques 1 A Survey of Different Shape Analysis Techniques -- Huang Nan.
Dengsheng Zhang and Melissa Chen Yi Lim
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Resolve the vector into x & y components 40.0 m/s at 45 o SoW.
Artistic Surface Rendering Using Layout Of Text Tatiana Surazhsky Gershon Elber Technion, Israel Institute of Technology.
STROUD Worked examples and exercises are in the text PROGRAMME 8 DIFFERENTIATION APPLICATIONS 1.
CS654: Digital Image Analysis Lecture 36: Feature Extraction and Analysis.
Course 8 Contours. Def: edge list ---- ordered set of edge point or fragments. Def: contour ---- an edge list or expression that is used to represent.
Section 9.1 Arc Length. FINDING THE LENGTH OF A PLANE CURVE Divide the interval [a, b] into n equal subintervals. Find the length of the straight line.
September 28, 2000 Improved Simultaneous Data Reconciliation, Bias Detection and Identification Using Mixed Integer Optimization Methods Presented by:
Accelerated Motion Chapter 3.
Rate Distortion Theory. Introduction The description of an arbitrary real number requires an infinite number of bits, so a finite representation of a.
Resolve the vector into x & y components 40.0 m/s at 45 o SoW.
Machine Vision Edge Detection Techniques ENT 273 Lecture 6 Hema C.R.
Computer Vision Image Features Instructor: Dr. Sherif Sami Lecture 4.
Parameter Reduction for Density-based Clustering on Large Data Sets Elizabeth Wang.
1 Faculty of Information Technology Enhanced Generic Fourier Descriptor for Object-Based Image Retrieval Dengsheng Zhang, Guojun Lu Gippsland School of.
Defect-Defect Interaction in Carbon Nanotubes under Mechanical Loading Topological defects can be formed in carbon nanotubes (CNTs) during processing or.
CSCI480/582 Lecture 9 Chap.2.2 Cubic Splines – Hermit and Bezier Feb, 11, 2009.
Copyright © Cengage Learning. All rights reserved.
What is the differentiation.
DIFFERENTIATION APPLICATIONS 1
Copyright © Cengage Learning. All rights reserved.
Arc Length and Curvature
Copyright © Cengage Learning. All rights reserved.
Improving Retrieval Performance of Zernike Moment Descriptor on Affined Shapes Dengsheng Zhang, Guojun Lu Gippsland School of Comp. & Info Tech Monash.
Differentiation Summary
Density-Based Image Vector Quantization Using a Genetic Algorithm
Homework, Page Let f (x) = 3x2. Show that f (2+h) =3h2 + 12h Then show that and compute f ′(2) by taking the limit as h → 0. Rogawski Calculus.
第 九 章 影像邊緣偵測 9-.
Numerical Computation and Optimization
Romberg Rule of Integration
Numerical Computation and Optimization
Presentation transcript:

A Generic Shape Descriptor using Bezier Curves Presenting by – Dr. Manzur Murshed Authors – Ferdous Ahmed Sohel Dr. Gour C. Karmakar Prof. Laurence S. Dooley Gippsland School of Computing and Information Technology Monash University, AUSTRALIA

Gippsland School of Computing and IT, Australia2 Presentation Outline 1.Introduction 2.Existing Bezier curve (BC) based shape descriptors 3.Proposed shape descriptor (SDBC) i.Control point determination ii.Control point coding 4.Results & Analysis 5.Conclusion and Future works

Gippsland School of Computing and IT, Australia3 Introduction …… Descriptor Applications of shape description: -Communication: Mobile multimedia communication, low bit rate coding. -Storage and retrieval: Digital library, indexing, digital archiving. -Interactive editing: Cartoons, digital films.

Gippsland School of Computing and IT, Australia4 Existing shape descriptor using BC 1.Arabic character descriptor proposed by Sarfraz and Khan. 2.Chinese calligraphic character descriptor using BC proposed by Yang et al. 3.Object shape description using cubic BC by Cinque et al.

Gippsland School of Computing and IT, Australia5 Shape description using cubic BC 1.Control point selection: i.The shape is divided into a number of equi-length segments in terms of number of shape points. ii.For each segment – control points are selected at some specific distances. 2.Control point coding: i.Control points are encoded parametrically.

Gippsland School of Computing and IT, Australia6 Shape description using cubic BC (Cont.) 1.The descriptor for each segment consists of: i.The coordinate values of the 1st and 4th control point, ii.For the 2nd control point, the magnitude and the gradient of the tangent vector from the 1st control point and iii.For the 3rd control point, the magnitude and the gradient of the tangent vector from the 4th control point.

Gippsland School of Computing and IT, Australia7 Limitation 1: Due to the even spacing of the segments and control points – R1 R2 i.Flat regions (e.g., R1) and sharp changing regions (R2) are both getting equal emphasis in control point selection – thus can lead to large distortion even with large number of segments. Shape description using cubic BC (Cont.)

Gippsland School of Computing and IT, Australia8 Limitation 2: According to the definition the magnitude and the gradient are all floating point numbers, hence will require larger size of descriptor. Shape description using cubic BC (Cont.) To overcome these limitations SDBC has been proposed

Gippsland School of Computing and IT, Australia9 Control Point Calculation 1.Calculation of the set of significant points: i.The set of the least number of shape points that can produce the shape with ZERO distortion. Proposed SDBC 2.Addition of the significant points: i.Reduces the likelihood of losing potential significant points as a control point by considering curvature domain specific information. ii.Inserts supplementary at average distance of the significant points.

Gippsland School of Computing and IT, Australia10 3.Union of significant and supplementary points are referred to as approximated boundary points (ABP). i.ABP are used in control point calculation. Proposed SDBC (cont.) Like Cinque et al.’s method, the control points for a segment starting from i th ABP is defined as Where z is the number of ABP in a segment and b the ABP set.

Gippsland School of Computing and IT, Australia11  There is a periodic nature in the distance between the control points shown in following figure. 1.If the distance between the first and second control point is l number of ABP. 2.The distance between the 2 nd and 3 rd is 2*l ABP. 3.The distance between the 3 rd and 4 th is l ABP. 4.l, 2*l, l series for each additional segments. Start- ing pointl2*lll2*ll …l2*l First SegmentNext segment…Last Segment Proposed SDBC (cont.) Control point coding

Gippsland School of Computing and IT, Australia12 Proposed SDBC (cont.) Dynamic fixed length coding (DFLCC)  A combination of run-length code and chain code.  Encodes the control points differentially.  Direction of the current control point from the previous is encoded by 6-bits.  The distance is the length of the run (for covering l ABP it is L 1 bits and for 2*l it is L 2 bits, clearly L 2 =L 1 +1).

Gippsland School of Computing and IT, Australia13 Proposed SDBC (cont.) 4- bit for length of L 1 Start- ing pointDir+ L 1 Dir+ L 2 Dir+ L 1 Dir+ Dir+ L 2 Dir+ L 1 …Dir+ Dir+ L 2 First SegmentNext segment…Last Segment The complete descriptor looks like The starting 4- bits are reserved for the length of L 1, which could be maximum 16-bit number and thus SDBC can encode a segment consisting of up to 4*2 16 shape points.

Gippsland School of Computing and IT, Australia14 Results and Analysis Class one – peak distortion in pel Class two – mean squared distortion in pel 2 Results for Fish object shapes with 5 segments Fish 1 Fish 2

Gippsland School of Computing and IT, Australia15 FishSR = 5SR = 6SR = 7SR =8 MaxMSMaxMSMaxMSMaxMS 1BC SDBC BC SDBC Results and Analysis Distortion measures for different number of segments (units: Max – pel and MS – pel 2 ), SR= Number of segments.

Gippsland School of Computing and IT, Australia16 FishSR = 5SR = 6SR = 7SR =8 1 BC SDBC BC SDBC Results and Analysis Descriptor length in bits  Over 35% descriptor size reduction for each additional segments.  Around 30% overall descriptor size reduction.

Gippsland School of Computing and IT, Australia17 Conclusions and Future Works SDBC addresses domain specific shape information. Keeps the distortion lower. The descriptor length is lower.  Consider the loops in shapes and cornerity of the shape at the shape points and divide the shape into segments.  For each segment apply the SDBC algorithm with a modification in the DFLC.

Gippsland School of Computing and IT, Australia18