Image Processing Techniques Ali Abdallah University of Rome - Tor - - PowerPoint PPT Presentation

image processing techniques
SMART_READER_LITE
LIVE PREVIEW

Image Processing Techniques Ali Abdallah University of Rome - Tor - - PowerPoint PPT Presentation

Image Processing Techniques Ali Abdallah University of Rome - Tor Vergata 11 April 2016 Ali Abdallah Image Processing Techniques Image Analysis Make computers detect objects of interest in images and video. Medical image analysis. Security


slide-1
SLIDE 1

Image Processing Techniques

Ali Abdallah

University of Rome - Tor Vergata

11 April 2016

Ali Abdallah Image Processing Techniques

slide-2
SLIDE 2

Image Analysis

Make computers detect objects of interest in images and video. Medical image analysis. Security and safety systems. Optical character recognition. Augmented reality. Confort and fun.

Ali Abdallah Image Processing Techniques

slide-3
SLIDE 3

Vision is Extreamly Hard

Why is recognition so hard? Real world is made of a jumble of objects. Objects occlude one another and appear in different poses. Complex non-rigid articulation and extreme variations in shape and appearance. Vision is an amazing capability of natural intelligence. More human brain devoted to vision than anything else (Virtual Cortex)

Ali Abdallah Image Processing Techniques

slide-4
SLIDE 4

Digital Images

The most common way to model colors in images is the RGB color model. The most common general used RGB density is 24-bit implementation, 8 bits per color. 256 × 256 × 256 ≈ 16.7 million colors. In image analysis grayscale is used usually, where every pixel 0.21R + 0.72G + 0.07B

(a) RGB (b) Grayscale

Ali Abdallah Image Processing Techniques

slide-5
SLIDE 5

Linear Correlation

Detects linear correlation between variables. Important in computer vision in order to detect the outlines of rectangular objects.

Figure: Detection of outlines objects

Ali Abdallah Image Processing Techniques

slide-6
SLIDE 6

Edges - Gradiant based

The most common type of edge detection process uses a gradient operator. Given an image function as f (x, y), the magnitude of the gradient is approximated by g(x, y) ∼ = (∆x2 + ∆y 2)

1 2, where

∆x = f (x + n, y) − f (x − n, y) and ∆y = f (x, y + n) − f (x, y − n)

Ali Abdallah Image Processing Techniques

slide-7
SLIDE 7

Zero Cross based method

−6 −4 −2 2 4 6 −0.2 0.0 0.2 0.4 0.6 0.8 1.0 1.2 −10 −5 5 10 −0.01 0.00 0.01 0.02 0.03 0.04 0.05 0.06 −10 −5 5 10 −0.004 −0.002 0.000 0.002 0.004

Zero crossing occurs when the intensity of the image changes

  • rapidly. Typically this happens on edges, but can also happens
  • n some places that are not necessarily associated to edges.

For this, usually a low pass filter is used to ”smooth” other small features. Typical implementation is to blur the image with a Gaussian filter first.

Ali Abdallah Image Processing Techniques

slide-8
SLIDE 8

Edges - Example

Example of an edge detected image.

Ali Abdallah Image Processing Techniques

slide-9
SLIDE 9

Hough Transform

Describe straight lines in polor coordinates, xcos(θ) + ysin(θ) = r. For any ”on” pixel (x0, y0), compute a set of possible (θi, ri).

(a) Input (b) Hough (c) Detected lines

Ali Abdallah Image Processing Techniques

slide-10
SLIDE 10

WRM - Weigthed Resistive Network

Very fast pattern processor technology from high energy physics. By means of resistors, input data is propagated inside the

  • circuit. Pattern in the data are then detected following “a

maximum likelihood function”. No computations are performed in the WRM. ⊲ GOAL: Adapt the WRM device as linear pattern recognizer for computer vision.

Ali Abdallah Image Processing Techniques

slide-11
SLIDE 11

WRM One Layer Example

(a) One layer of the WRM (b) Voltage diffusion

The voltage diffusion inside the circuit is equivalent to a convolution of the binary image Img with a kernel K S = Img ∗ K, Where K = · · · (1 2)n · · · 1 2 1 1 2 · · · (1 2)n · · ·

  • .

Ali Abdallah Image Processing Techniques

slide-12
SLIDE 12

Resistive Layer to Pattern

Connection of the nodes between different layers can be modelized as a bitmap masks. Below are some typical examples.

1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 , 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 , 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 , 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 , 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0

The above bitmaps are equivalent to the looked for patterns.

Ali Abdallah Image Processing Techniques

slide-13
SLIDE 13

WRM Linear Segment Detection

S = (si,j)1in,1jm the n × m matrix output of convolution. pk : M8,8(❘) → M8,8(❘) is the Hadamard product (element-wise product) by the k bitmap 8 × 8 matrix. S∗,ik<i+8 denotes the 8 × 8 matrix from column number i to i + 7 , f k is a vector a sums defined as follows f k

i = eTpk(S∗,ik<i+8)e

where e = (1, 1, 1, 1, 1, 1, 1, 1). The discrete derivatives are computed (

  • d2f k

i

di2

  • th)

Then, arbitrary long segments are constructed from small 8 bits onces using the best fit method.

Ali Abdallah Image Processing Techniques

slide-14
SLIDE 14

WRM - Example input

Figure: Input data example Figure: Second derivatives of the WRM output sums

Ali Abdallah Image Processing Techniques

slide-15
SLIDE 15

EDUSAFE and Augmented Reality

(Wikipedia) Augmented reality (AR) is a live direct or indirect view of a physical, real-world environment whose elements are augmented (or supplemented) by computer-generated sensory input such as sound, video, graphics or GPS data. Develop augmented reality prototypes for safety systems − → Interventions in hazardous areas. Realtime processing and object detection is fundamental − → WRM for fast processing. Fast object’s outline detector Fast scoring computation Fast motion detector

Ali Abdallah Image Processing Techniques

slide-16
SLIDE 16

Convolution Product

For real or complex functions: (f ∗ g)(x) = +∞

−∞

f (x − t).g(t)dt = +∞

−∞

f (t).g(x − t)dt And for series: (f ∗ g)(n) =

+∞

  • m=−∞

f (n − m).g(m) =

+∞

  • m=−∞

f (m).g(n − m) Discrete convolution in 2d: (A ∗ B)(x, y) =

+∞

  • m=−∞

+∞

  • m=−∞

A(x − m, y − m).B(m, m)

Ali Abdallah Image Processing Techniques

slide-17
SLIDE 17

Convolutions in Images

  • 1
  • 1

5

  • 1
  • 1

1 1 1 1 1 1 1 1 1

  • 1

1

(a) Sharpen (b) Blur (c) Edges

Ali Abdallah Image Processing Techniques

slide-18
SLIDE 18

Convolution - Algorithmic Complexity

Convolution between patches (A ∗ B)(x, y) =

+∞

  • m=−∞

+∞

  • m=−∞

A(x − m, y − m).B(m, m) for m do for m do for i do for j do · · · end for end for end for end for Algorithmic complexity of O(m4) − → very expensive.

Ali Abdallah Image Processing Techniques

slide-19
SLIDE 19

Discrete Fourrier Transform - DFT

For {yk}k∈❩ a N-periodic sequence, the DFT of yk, denoted by z = FNy, is the sequence {zk}k∈❩ defined as follows: zk = 1 N

N−1

  • l=0

yle− 2πikl

N .

We have: FN(y ∗ z) = N · FNy · FNy ⇔ y ∗ z = N.F−1

N (FNy · FNz)

A direct computation of FNy requires O(N2).

Ali Abdallah Image Processing Techniques

slide-20
SLIDE 20

Fast Fourrier Transform - DFFT

But there exists an algorithm to compute the the FFT due to Cooley and Tukey (1965), which is the DFFT of complexity O(Nlog2N) To reduce algorithmic complexity the DFFT is used to compute convolutions. O(N4) − → O(Nlog2N) Face detection patch based method using convolution. Patches can be eyes, noses, mouths, ... .

Ali Abdallah Image Processing Techniques

slide-21
SLIDE 21

Thanks for your attention!

Ali Abdallah Image Processing Techniques