SlideShare una empresa de Scribd logo
1 de 4
International Journal of Engineering Research and Development
E-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 7, Issue 3 (May 2013), PP. 78-81
78
Super Active Visual Segmentation
Sasi Kumar A.V1
, M.S.Balamurugan2
1. PG Scholar, Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamil Nadu.
2. Assist.Prof./ECE, Sri Shakthi Institute of Engineering and Technology, Coimbatore.
Abstract: - Attention is an integral part of the human visual system and has been widely studied in
the visual attention literature. The human eyes fixate at important locations in the scene, and every
fixation point lies inside a particular region of arbitrary shape and size, which can either be an entire
object or a part of it. Using that fixation point as an identification marker on the object, we propose a
method to segment the object of interest by finding the “optimal” closed contour around the fixation
point in the polar space, avoiding the perennial problem of scale in the Cartesian space. The proposed
segmentation process is carried out in two separate steps: First, all visual cues are combined to
generate the probabilistic boundary edge map of the scene; second, in this edge map, the “optimal”
closed contour around a given fixation point is found. Having two separate steps also makes it
possible to establish a simple feedback between the mid-level cue (regions) and the low-level visual
cues (edges). In fact, we propose a segmentation refinement process based on such a feedback
process. Finally, our experiments show the promise of the proposed method as an automatic
segmentation framework for a general purpose visual system.
Keywords: - Fixation-based segmentation, polar space, cue integration, visual attention. Region
based segmentation.
I. INTRODUCTION
To see an object in the scene, we look at it. The human visual system makes a series of fixations at
various salient locations while it observes the scene and tries to makes sense of it. See Fig. 1.1 for the fixations
made by an observer while looking at a still image, as recorded by an eye tracker. The eyes cannot be static.
They have to keep moving to a new location either voluntarily or involuntarily.
Overview
The proposed segmentation framework that takes as its input a fixation (a point location) in the scene
and outputs the region containing that fixation. The fixated region is segmented in terms of the area enclosed by
the “optimal” closed boundary around the fixation using the probabilistic boundary edge map of the scene (or
image). The probabilistic boundary edge map, which is generated by using all available visual cues, contains the
probability of an edge pixel being at an object (or depth) boundary. The separation of the cue handling from the
actual segmentation step is an important contribution of our work, because it makes segmentation of a region
independent of types of visual cues that are used to generate the probabilistic boundary edge map. The proposed
segmentation framework is a two step process: first, the probabilistic boundary edge map of the image is
generated using all available low level cues (section 3.2); second, the probabilistic edge map is transformed into
the polar space with the fixation as the pole (section 3.3), and the path through this polar probabilistic edge map
(the blue line in Fig.3.4g) that “optimally” splits the map into two parts (Fig.3.4f) is found. This path maps back
to a closed contour around the fixation point. The pixels on the left side of the path in the polar space correspond
to the inside of the region enclosed by the contour in the Cartesian space, and those on the right side correspond
to the outside of that region. So, finding the optimal path in the polar probabilistic edge map is a binary labeling
problem and graph cut is used to find this globally optimal solution to this binary problem (section 3.4)
Figure 1.2: Segmentation of a natural scene in (a) using the Normalized Cut algorithm [78] for two different
values of its input parameter (the expected number of regions) 10 and 60 are shown in (b) and (c) respectively.
Super Active Visual Segmentation
79
The main contributions of the work described in this thesis are as follows;
• The proposed automatic method to segment an object (or region) given a fixation on that object (or
region) in the scene/image. Segmenting the region containing a given fixation point is a well-posed binary
labeling problem in the polar space, generated by transforming the probabilistic boundary edge map from the
Cartesian space to the polar space with the fixation point as pole. In the transformed polar edge map, lengths of
the possible closed contours around the fixation point are normalized (section 3.1) and thus the segmentation
results are not affected by the scale of the fixated region. The proposed framework does not depend upon any
user input to output the optimal segmentation of the fixated region.
• Since we carry out segmentation in two separate steps, it provides an easy way to incorporate
feedback from the current segmentation output to influence the segmentation result for the next fixation by just
changing the probabilities of the edge pixels in the probabilistic boundary edge map (see chapter 7 for how it is
used to generate a multi-fixation framework). Also, using noisy motion and stereo cues to only modify the
boundary probabilities of the static monocular edges provides better localization of the region boundaries while
tracing actual depth boundaries around any fixation point in the scene.
II. SEGMENTING A FIXATION REGION
Segmenting a fixated region is equivalent to finding the “optimal” closed contour around the fixation
point. This closed contour should be a connected set of boundary edge pixels (or fragments) in the edge map.
However, the edge map contains both types of edges, namely, boundary (or depth) and internal (or
texture/intensity) edges. In order to trace the boundary edge fragments through the edge map to form the contour
enclosing the fixation point, it is important to be able to differentiate between the boundary edges from the non-
boundary (e.g. texture and internal) edges.
Polar space is the key
The gradient edge map of the disc, shown in Fig. 3.1b, has two concentric circles. The big circle is the
actual boundary of the disc whereas the small circle is just the internal edge on the disc. The edge map correctly
assigns the boundary contour intensity as 0.78 and the internal contour 0.39 (the intensity values range from 0 to
1). The lengths of the two circles are 400 and 100 pixels. Now, the cost of tracing the boundary and the internal
contour in the Cartesian space will be respectively 88 = (400 × (1 - 0.78)) and 61 = (100 × (1 - 0.39)). Clearly,
the internal contour costs less and hence will be considered optimal even though the boundary contour is the
brightest and should actually be the optimal contour. In fact, this problem of inherently preferring short contours
over long contours has already been identified in the graph cut based approaches where the minimum cut
usually prefers to take “short cut” in the image.
Probabilistic boundary edge map by combining cues
In this section, we carry out the first step of the segmentation process: generating the probabilistic
boundary edge map using all available visual cues. There are two types of visual cues on the basis of how they
are calculated: 1) static monocular cues, that come from just a single image; 2) stereo and motion cues that need
more than one image to be computed.
III. RESULTS AND SIMULATIONS
Segmentation Accuracy
Our dataset is a collection of 20 videos with an average length of seven frames and 50 Stereo pairs with
respect to their ground-truth segmentation.
Table 4.1 shows that after adding motion or stereo cues with color and texture
For videos F-measure
With Motion 0.95 ± 0.01
Without Motion 0.62 ± 0.02
For stereo pairs
With Stereo 0.96 ± 0.02
Without Stereo 0.65 ± 0.02
Table 4.1: The performance of our segmentation for the videos and the stereo pairs.
Super Active Visual Segmentation
80
Figure 4.1: Row 1-3: a moving camera and stationary objects. Row 4: an
Image from a stereo pair. Row 5: a moving object (car) and a stationary camera. Column 1: the original images
with fixations (the green “X”). Column 2: Our segmentation results for the fixation using static monocular cues
only. Column 3: Our segmentation results for the same fixation after combining motion or stereo cues with
static monocular cues.
Region merging algorithm:
The goal of image segmentation is to partition an image into a certain number of pieces which have
coherent features (color, texture, etc.) and in the mean while to group
The meaningful pieces together for the convenience of perceiving. First, regions carry on more information in
describing the nature of objects. Second, the number of primitive regions is much fewer than that of pixels in an
image and thus largely speeds up the region merging process.
Figure 4.2: 1.original image 2. Splitting part
By using region merging and splitting algorithm the accuracy of the paper is improved.
Stability Analysis
Figure 4.3: Stability Analysis of region segmentation with respect to the fixation Locations.
REFERENCES
[1]. R. Achanta, S. Hemami, F. Estrada, and S. Susstrunk, “Frequency Tuned Salient Region Detection,”
Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2009.
[2]. S. Alpert, M. Galun, R. Basri, and A. Brandt, “Image Segmentation by Probabilistic Bottom-Up
Aggregation and Cue Integration,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, June
2007.
[3]. P. Arbelaez and L. Cohen, “Constrained Image Segmentation from Hierarchical Boundaries,” Proc.
IEEE Conf. Computer Vision and Pattern Recognition, pp. 454-467, 2008.
[4]. S. Bagon, O. Boiman, and M. Irani, “What Is a Good Image Segment?A Unified Approach to Segment
Extraction,” Proc. 10th European Conf. Computer Vision, pp. 30-44, 2008.
[5]. A. Blake, C. Rother, M. Brown, P. Perez, and P. Torr, “Interactive Image Segmentation Using an
Adaptive GMMRF Model,” Proc. European Conf. Computer Vision, pp. 428-441, 2004.
[6]. Y.Y. Boykov and M.P. Jolly, “Interactive Graph Cuts for Optimal Boundary and Region Segmentation
of Objects in n-d Images,” Proc. Eighth IEEE Int’l Conf. Computer Vision, pp. 105-112, 2001.
[7]. Y.Y. Boykov and V. Kolmogorov, “An Experimental Comparison of Min-Cut/Max-Flow Algorithms
for Energy Minimization in Vision,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 26,
no. 9, pp. 1124-1137, Sept. 2004.
[8]. T. Brox, A. Bruhn, N. Papenberg, and J. Weickert, High Accuracy Optical Flow Estimation Based on a
Theory for Warping, pp. 25-36. Springer, 2004.
Super Active Visual Segmentation
81
[9]. N.D.B. Bruce and J.K. Tsotsos, “Saliency, Attention, and Visual Search: An Information Theoretic
Approach,” J. Vision, vol. 9, no. 3, pp. 1-24, 2009.
[10]. M. Cerf, J. Harel, W. Einha¨user, and C. Koch, “Predicting Human Gaze Using Low-Level Saliency
Combined with Face Detection,” Proc. Neural Information Processing Systems, 2008.
[11]. E. Craft, H. Schu¨ tze, E. Niebur, and R. von der Heydt, “A Neural Model of Figure-Ground
Organization,” J.Neurophysiology, vol. 6, no. 97, pp. 4310-4326, 2007.
[12]. P. Dimitrov, C. Phillips, and K. Siddiqi, “Robust and Efficient Skeletal Graphs,” Proc. IEEE Conf.
Computer Vision and Pattern Recognition, vol. 1, pp. 417-423, 2000.

Más contenido relacionado

La actualidad más candente

Image Segmentation Using Pairwise Correlation Clustering
Image Segmentation Using Pairwise Correlation ClusteringImage Segmentation Using Pairwise Correlation Clustering
Image Segmentation Using Pairwise Correlation ClusteringIJERA Editor
 
IMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESIMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESVicky Kumar
 
Lec11: Active Contour and Level Set for Medical Image Segmentation
Lec11: Active Contour and Level Set for Medical Image SegmentationLec11: Active Contour and Level Set for Medical Image Segmentation
Lec11: Active Contour and Level Set for Medical Image SegmentationUlaş Bağcı
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposureiosrjce
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Editor IJARCET
 
Region-based Semi-supervised Clustering Image Segmentation
Region-based Semi-supervised Clustering Image SegmentationRegion-based Semi-supervised Clustering Image Segmentation
Region-based Semi-supervised Clustering Image SegmentationOnur Yılmaz
 
Presentation on deformable model for medical image segmentation
Presentation on deformable model for medical image segmentationPresentation on deformable model for medical image segmentation
Presentation on deformable model for medical image segmentationSubhash Basistha
 
A Combined Model for Image Inpainting
A Combined Model for Image InpaintingA Combined Model for Image Inpainting
A Combined Model for Image Inpaintingiosrjce
 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSijcseit
 
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Pinaki Ranjan Sarkar
 
Image segmentation
Image segmentationImage segmentation
Image segmentationkhyati gupta
 
Comparative analysis and implementation of structured edge active contour
Comparative analysis and implementation of structured edge active contour Comparative analysis and implementation of structured edge active contour
Comparative analysis and implementation of structured edge active contour IJECEIAES
 

La actualidad más candente (17)

Image Segmentation Using Pairwise Correlation Clustering
Image Segmentation Using Pairwise Correlation ClusteringImage Segmentation Using Pairwise Correlation Clustering
Image Segmentation Using Pairwise Correlation Clustering
 
Segmentation Techniques -I
Segmentation Techniques -ISegmentation Techniques -I
Segmentation Techniques -I
 
IMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESIMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUES
 
Lec11: Active Contour and Level Set for Medical Image Segmentation
Lec11: Active Contour and Level Set for Medical Image SegmentationLec11: Active Contour and Level Set for Medical Image Segmentation
Lec11: Active Contour and Level Set for Medical Image Segmentation
 
Segmentation
SegmentationSegmentation
Segmentation
 
Image segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
Image segmentation using wvlt trnsfrmtn and fuzzy logic. pptImage segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
Image segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251
 
Region-based Semi-supervised Clustering Image Segmentation
Region-based Semi-supervised Clustering Image SegmentationRegion-based Semi-supervised Clustering Image Segmentation
Region-based Semi-supervised Clustering Image Segmentation
 
Presentation on deformable model for medical image segmentation
Presentation on deformable model for medical image segmentationPresentation on deformable model for medical image segmentation
Presentation on deformable model for medical image segmentation
 
A Combined Model for Image Inpainting
A Combined Model for Image InpaintingA Combined Model for Image Inpainting
A Combined Model for Image Inpainting
 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
 
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Comparative analysis and implementation of structured edge active contour
Comparative analysis and implementation of structured edge active contour Comparative analysis and implementation of structured edge active contour
Comparative analysis and implementation of structured edge active contour
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Data structures
Data structuresData structures
Data structures
 

Destacado

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Offshore Outsourcing Alternative Solution
Offshore Outsourcing Alternative SolutionOffshore Outsourcing Alternative Solution
Offshore Outsourcing Alternative SolutionSynergroup
 
Mi comunidad en trazos. Una propuesta disruptiva ...
Mi comunidad en trazos. Una propuesta disruptiva ...Mi comunidad en trazos. Una propuesta disruptiva ...
Mi comunidad en trazos. Una propuesta disruptiva ...Carlos Luis Gomez Valderrama
 

Destacado (7)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
L0704065070
L0704065070L0704065070
L0704065070
 
E0704019023
E0704019023E0704019023
E0704019023
 
Mal radical-banal
Mal radical-banalMal radical-banal
Mal radical-banal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Offshore Outsourcing Alternative Solution
Offshore Outsourcing Alternative SolutionOffshore Outsourcing Alternative Solution
Offshore Outsourcing Alternative Solution
 
Mi comunidad en trazos. Una propuesta disruptiva ...
Mi comunidad en trazos. Una propuesta disruptiva ...Mi comunidad en trazos. Una propuesta disruptiva ...
Mi comunidad en trazos. Una propuesta disruptiva ...
 

Similar a International Journal of Engineering Research and Development (IJERD)

An Efficient Algorithm for the Segmentation of Astronomical Images
An Efficient Algorithm for the Segmentation of Astronomical  ImagesAn Efficient Algorithm for the Segmentation of Astronomical  Images
An Efficient Algorithm for the Segmentation of Astronomical ImagesIOSR Journals
 
Super Resolution of Image
Super Resolution of ImageSuper Resolution of Image
Super Resolution of ImageSatheesh K
 
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...IJERA Editor
 
Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationIOSR Journals
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1KARTHIKEYAN V
 
A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowAlexander Decker
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
 
E0333021025
E0333021025E0333021025
E0333021025theijes
 
Thesis Manuscript Final Draft
Thesis Manuscript Final DraftThesis Manuscript Final Draft
Thesis Manuscript Final DraftDerek Foster
 
IRJET- Extract Circular Object By Tracing Region Boundary and using Circulari...
IRJET- Extract Circular Object By Tracing Region Boundary and using Circulari...IRJET- Extract Circular Object By Tracing Region Boundary and using Circulari...
IRJET- Extract Circular Object By Tracing Region Boundary and using Circulari...IRJET Journal
 
Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...
Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...
Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...IJTET Journal
 
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONIMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONijma
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentCSCJournals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...eSAT Journals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...eSAT Publishing House
 

Similar a International Journal of Engineering Research and Development (IJERD) (20)

Ijetr011917
Ijetr011917Ijetr011917
Ijetr011917
 
An Efficient Algorithm for the Segmentation of Astronomical Images
An Efficient Algorithm for the Segmentation of Astronomical  ImagesAn Efficient Algorithm for the Segmentation of Astronomical  Images
An Efficient Algorithm for the Segmentation of Astronomical Images
 
Super Resolution of Image
Super Resolution of ImageSuper Resolution of Image
Super Resolution of Image
 
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
 
Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing Segmentation
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1
 
A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial window
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
I010634450
I010634450I010634450
I010634450
 
E0333021025
E0333021025E0333021025
E0333021025
 
2001714
20017142001714
2001714
 
Thesis Manuscript Final Draft
Thesis Manuscript Final DraftThesis Manuscript Final Draft
Thesis Manuscript Final Draft
 
IRJET- Extract Circular Object By Tracing Region Boundary and using Circulari...
IRJET- Extract Circular Object By Tracing Region Boundary and using Circulari...IRJET- Extract Circular Object By Tracing Region Boundary and using Circulari...
IRJET- Extract Circular Object By Tracing Region Boundary and using Circulari...
 
Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...
Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...
Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...
 
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONIMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Lw3620362041
Lw3620362041Lw3620362041
Lw3620362041
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development E-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 7, Issue 3 (May 2013), PP. 78-81 78 Super Active Visual Segmentation Sasi Kumar A.V1 , M.S.Balamurugan2 1. PG Scholar, Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamil Nadu. 2. Assist.Prof./ECE, Sri Shakthi Institute of Engineering and Technology, Coimbatore. Abstract: - Attention is an integral part of the human visual system and has been widely studied in the visual attention literature. The human eyes fixate at important locations in the scene, and every fixation point lies inside a particular region of arbitrary shape and size, which can either be an entire object or a part of it. Using that fixation point as an identification marker on the object, we propose a method to segment the object of interest by finding the “optimal” closed contour around the fixation point in the polar space, avoiding the perennial problem of scale in the Cartesian space. The proposed segmentation process is carried out in two separate steps: First, all visual cues are combined to generate the probabilistic boundary edge map of the scene; second, in this edge map, the “optimal” closed contour around a given fixation point is found. Having two separate steps also makes it possible to establish a simple feedback between the mid-level cue (regions) and the low-level visual cues (edges). In fact, we propose a segmentation refinement process based on such a feedback process. Finally, our experiments show the promise of the proposed method as an automatic segmentation framework for a general purpose visual system. Keywords: - Fixation-based segmentation, polar space, cue integration, visual attention. Region based segmentation. I. INTRODUCTION To see an object in the scene, we look at it. The human visual system makes a series of fixations at various salient locations while it observes the scene and tries to makes sense of it. See Fig. 1.1 for the fixations made by an observer while looking at a still image, as recorded by an eye tracker. The eyes cannot be static. They have to keep moving to a new location either voluntarily or involuntarily. Overview The proposed segmentation framework that takes as its input a fixation (a point location) in the scene and outputs the region containing that fixation. The fixated region is segmented in terms of the area enclosed by the “optimal” closed boundary around the fixation using the probabilistic boundary edge map of the scene (or image). The probabilistic boundary edge map, which is generated by using all available visual cues, contains the probability of an edge pixel being at an object (or depth) boundary. The separation of the cue handling from the actual segmentation step is an important contribution of our work, because it makes segmentation of a region independent of types of visual cues that are used to generate the probabilistic boundary edge map. The proposed segmentation framework is a two step process: first, the probabilistic boundary edge map of the image is generated using all available low level cues (section 3.2); second, the probabilistic edge map is transformed into the polar space with the fixation as the pole (section 3.3), and the path through this polar probabilistic edge map (the blue line in Fig.3.4g) that “optimally” splits the map into two parts (Fig.3.4f) is found. This path maps back to a closed contour around the fixation point. The pixels on the left side of the path in the polar space correspond to the inside of the region enclosed by the contour in the Cartesian space, and those on the right side correspond to the outside of that region. So, finding the optimal path in the polar probabilistic edge map is a binary labeling problem and graph cut is used to find this globally optimal solution to this binary problem (section 3.4) Figure 1.2: Segmentation of a natural scene in (a) using the Normalized Cut algorithm [78] for two different values of its input parameter (the expected number of regions) 10 and 60 are shown in (b) and (c) respectively.
  • 2. Super Active Visual Segmentation 79 The main contributions of the work described in this thesis are as follows; • The proposed automatic method to segment an object (or region) given a fixation on that object (or region) in the scene/image. Segmenting the region containing a given fixation point is a well-posed binary labeling problem in the polar space, generated by transforming the probabilistic boundary edge map from the Cartesian space to the polar space with the fixation point as pole. In the transformed polar edge map, lengths of the possible closed contours around the fixation point are normalized (section 3.1) and thus the segmentation results are not affected by the scale of the fixated region. The proposed framework does not depend upon any user input to output the optimal segmentation of the fixated region. • Since we carry out segmentation in two separate steps, it provides an easy way to incorporate feedback from the current segmentation output to influence the segmentation result for the next fixation by just changing the probabilities of the edge pixels in the probabilistic boundary edge map (see chapter 7 for how it is used to generate a multi-fixation framework). Also, using noisy motion and stereo cues to only modify the boundary probabilities of the static monocular edges provides better localization of the region boundaries while tracing actual depth boundaries around any fixation point in the scene. II. SEGMENTING A FIXATION REGION Segmenting a fixated region is equivalent to finding the “optimal” closed contour around the fixation point. This closed contour should be a connected set of boundary edge pixels (or fragments) in the edge map. However, the edge map contains both types of edges, namely, boundary (or depth) and internal (or texture/intensity) edges. In order to trace the boundary edge fragments through the edge map to form the contour enclosing the fixation point, it is important to be able to differentiate between the boundary edges from the non- boundary (e.g. texture and internal) edges. Polar space is the key The gradient edge map of the disc, shown in Fig. 3.1b, has two concentric circles. The big circle is the actual boundary of the disc whereas the small circle is just the internal edge on the disc. The edge map correctly assigns the boundary contour intensity as 0.78 and the internal contour 0.39 (the intensity values range from 0 to 1). The lengths of the two circles are 400 and 100 pixels. Now, the cost of tracing the boundary and the internal contour in the Cartesian space will be respectively 88 = (400 × (1 - 0.78)) and 61 = (100 × (1 - 0.39)). Clearly, the internal contour costs less and hence will be considered optimal even though the boundary contour is the brightest and should actually be the optimal contour. In fact, this problem of inherently preferring short contours over long contours has already been identified in the graph cut based approaches where the minimum cut usually prefers to take “short cut” in the image. Probabilistic boundary edge map by combining cues In this section, we carry out the first step of the segmentation process: generating the probabilistic boundary edge map using all available visual cues. There are two types of visual cues on the basis of how they are calculated: 1) static monocular cues, that come from just a single image; 2) stereo and motion cues that need more than one image to be computed. III. RESULTS AND SIMULATIONS Segmentation Accuracy Our dataset is a collection of 20 videos with an average length of seven frames and 50 Stereo pairs with respect to their ground-truth segmentation. Table 4.1 shows that after adding motion or stereo cues with color and texture For videos F-measure With Motion 0.95 ± 0.01 Without Motion 0.62 ± 0.02 For stereo pairs With Stereo 0.96 ± 0.02 Without Stereo 0.65 ± 0.02 Table 4.1: The performance of our segmentation for the videos and the stereo pairs.
  • 3. Super Active Visual Segmentation 80 Figure 4.1: Row 1-3: a moving camera and stationary objects. Row 4: an Image from a stereo pair. Row 5: a moving object (car) and a stationary camera. Column 1: the original images with fixations (the green “X”). Column 2: Our segmentation results for the fixation using static monocular cues only. Column 3: Our segmentation results for the same fixation after combining motion or stereo cues with static monocular cues. Region merging algorithm: The goal of image segmentation is to partition an image into a certain number of pieces which have coherent features (color, texture, etc.) and in the mean while to group The meaningful pieces together for the convenience of perceiving. First, regions carry on more information in describing the nature of objects. Second, the number of primitive regions is much fewer than that of pixels in an image and thus largely speeds up the region merging process. Figure 4.2: 1.original image 2. Splitting part By using region merging and splitting algorithm the accuracy of the paper is improved. Stability Analysis Figure 4.3: Stability Analysis of region segmentation with respect to the fixation Locations. REFERENCES [1]. R. Achanta, S. Hemami, F. Estrada, and S. Susstrunk, “Frequency Tuned Salient Region Detection,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2009. [2]. S. Alpert, M. Galun, R. Basri, and A. Brandt, “Image Segmentation by Probabilistic Bottom-Up Aggregation and Cue Integration,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, June 2007. [3]. P. Arbelaez and L. Cohen, “Constrained Image Segmentation from Hierarchical Boundaries,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 454-467, 2008. [4]. S. Bagon, O. Boiman, and M. Irani, “What Is a Good Image Segment?A Unified Approach to Segment Extraction,” Proc. 10th European Conf. Computer Vision, pp. 30-44, 2008. [5]. A. Blake, C. Rother, M. Brown, P. Perez, and P. Torr, “Interactive Image Segmentation Using an Adaptive GMMRF Model,” Proc. European Conf. Computer Vision, pp. 428-441, 2004. [6]. Y.Y. Boykov and M.P. Jolly, “Interactive Graph Cuts for Optimal Boundary and Region Segmentation of Objects in n-d Images,” Proc. Eighth IEEE Int’l Conf. Computer Vision, pp. 105-112, 2001. [7]. Y.Y. Boykov and V. Kolmogorov, “An Experimental Comparison of Min-Cut/Max-Flow Algorithms for Energy Minimization in Vision,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 26, no. 9, pp. 1124-1137, Sept. 2004. [8]. T. Brox, A. Bruhn, N. Papenberg, and J. Weickert, High Accuracy Optical Flow Estimation Based on a Theory for Warping, pp. 25-36. Springer, 2004.
  • 4. Super Active Visual Segmentation 81 [9]. N.D.B. Bruce and J.K. Tsotsos, “Saliency, Attention, and Visual Search: An Information Theoretic Approach,” J. Vision, vol. 9, no. 3, pp. 1-24, 2009. [10]. M. Cerf, J. Harel, W. Einha¨user, and C. Koch, “Predicting Human Gaze Using Low-Level Saliency Combined with Face Detection,” Proc. Neural Information Processing Systems, 2008. [11]. E. Craft, H. Schu¨ tze, E. Niebur, and R. von der Heydt, “A Neural Model of Figure-Ground Organization,” J.Neurophysiology, vol. 6, no. 97, pp. 4310-4326, 2007. [12]. P. Dimitrov, C. Phillips, and K. Siddiqi, “Robust and Efficient Skeletal Graphs,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, vol. 1, pp. 417-423, 2000.