A Survey of Feature Extraction Techniques in Content-Based Illicit Image Detection

Total Page:16

File Type:pdf, Size:1020Kb

A Survey of Feature Extraction Techniques in Content-Based Illicit Image Detection View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Universiti Teknologi Malaysia Institutional Repository Journal of Theoretical and Applied Information Technology 10 th May 2016. Vol.87. No.1 © 2005 - 2016 JATIT & LLS. All rights reserved . ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195 A SURVEY OF FEATURE EXTRACTION TECHNIQUES IN CONTENT-BASED ILLICIT IMAGE DETECTION 1,2 S.HADI YAGHOUBYAN, 1MOHD AIZAINI MAAROF, 1ANAZIDA ZAINAL, 1MAHDI MAKTABDAR OGHAZ 1Faculty of Computing, Universiti Teknologi Malaysia (UTM), Malaysia 2 Department of Computer Engineering, Islamic Azad University, Yasooj Branch, Yasooj, Iran E-mail: 1,2 [email protected], [email protected], [email protected] ABSTRACT For many of today’s youngsters and children, the Internet, mobile phones and generally digital devices are integral part of their life and they can barely imagine their life without a social networking systems. Despite many advantages of the Internet, it is hard to neglect the Internet side effects in people life. Exposure to illicit images is very common among adolescent and children, with a variety of significant and often upsetting effects on their growth and thoughts. Thus, detecting and filtering illicit images is a hot and fast evolving topic in computer vision. In this research we tried to summarize the existing visual feature extraction techniques used for illicit image detection. Feature extraction can be separate into two sub- techniques feature detection and description. This research presents the-state-of-the-art techniques in each group. The evaluation measurements and metrics used in other researches are summarized at the end of the paper. We hope that this research help the readers to better find the proper feature extraction technique or develop a robust and accurate visual feature extraction technique for illicit image detection and filtering purpose. Keywords: Feature Extraction, Feature Detector, Feature Extract, Illicit Image, Internet Filtering 1. INTRODUCTION The fundamental step in content-based illicit image detection is extracting Visual Features from In today's world, the Internet became an effective these images. Due to the importance of the matter means in the world that leads to a huge revolution and lack of a comprehensive study in the field, we in people communicating and making business. are motivated to prepare a survey on different visual Different from any other communication medium, it feature extraction techniques on illicit images. The has a great effect to the communities and given an term Feature or Visual Feature which also known International dimension to the world. For many of as Keypoint refer to interest image primitives and today’s youngsters and children, the Internet, structures such as edge, corner, blob and etc. They mobile phones and generally digital devices are are containing the most informative data from an integral part of their life and they can barely image and they are very important within the field imagine their life without a social networking of image processing and computer vision. The systems, online gaming, photographs and videos method and technique of identifying these features sharing [1]–[3]. As much as the positive impact of are named Feature Detector . Once features are Internet is noticeable, it is hard to neglect its detected, it is required to represent them negative impacts. Distributing the illicit contents numerically using Feature Descriptor techniques. and more specific the illicit images is one of the The Feature Extraction actually consists of these most significant negative impacts of the Internet. two main steps Feature Detection and Feature Exposure to illicit contents is very common among Description . In other words, Feature Extraction adolescent and children, with a variety of refers to identifying the meaningful information and significant and often upsetting effects on their features from an image using feature detectors and growth and thoughts [4]. These reasons motivates represents them numerically by feature descriptors. the researchers to develop new methods and Feature extraction techniques are engaged to techniques to counter with ever-growing illicit discover the image anomalies and discontinuities in contents. order to recognize the semantic of an image. 110 Journal of Theoretical and Applied Information Technology 10 th May 2016. Vol.87. No.1 © 2005 - 2016 JATIT & LLS. All rights reserved . ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195 Indeed, these anomalies might give a clue to predict following describes each type of features in more the semantic of an image. details. The following sections explain different types of features and then the categorized of detecting 2.1 Global Features techniques based on these features are performed. Global feature are evaluated over the whole Feature description techniques afterward is image or a sub-area of image. Generally, global presented in more details and exiting state-of-the-art features presents statistical facts of the image and descriptors in the field are explained. Finally, the they are able to generalize the entire image by a evaluation metrics and datasets use for evaluate single vector. Resolution, image size, dimensions, visual feature extraction are reported. and aspect ratio are some examples of spatial-based global features. The image moments and average image intensity are some semantic-based global 2. VISUAL FEATURES TYPES IN features. These features have been used to evaluate CONTENT-BASED ILLICIT IMAGE images in various research fields. For example, Generally, in computer vision society, a Feature image contents are described by colour histograms is referred to a function of one or more in image retrieval applications, although the measurements, each of which identifies some foreground and background are mixed together. informative data and quantifiable property of an Many researchers such as [5] [6][7][8] and etc. used object in image. There have been remarkable works global features for sake of illicit image detection. on different approaches to extract several kinds of Global features have some limitations such as features in these images. From image structure dealing with background clutter and occlusion, perspective these approaches could be classified as consequently misleads the feature extraction global features, pixel-level features and local performance. features. Figure 1 shows different types of features used in the literature to detect illicit images. The Content-Based Illicit Image Features Pixel-based FEatures Local Features Global Features Corner Edge Blob Figure 1: Different Types Of Features In Content-Based Illicit Image Detection 111 Journal of Theoretical and Applied Information Technology 10 th May 2016. Vol.87. No.1 © 2005 - 2016 JATIT & LLS. All rights reserved . ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195 2.2 Pixel-level Feature Shen et al. [16] used local feature for sake of Pixel-level features are evaluating each pixel breast and pubes detection in illicit images. individually. Pixel position and pixel intensity (gray Diversity in shape, color and breast size of different level) are two prominent pixel-level features. Each individuals, makes feature extraction as a pixel in image carries its Spatial-Positioning challenging task. The other study by Chung et information which are represented as pair of scalar al.[17] used the skin textural features to detect the (x, y). These pairs specify the offset of a particular obscene objects in low quality images. The main pixel from the image origin i.e. in image-processing problem of this technique is that textural features the image origin is the top-left corner of the image. are tend to fade away in low quality images. A very Special information of pixels might bring useful similar study by Li et al. [18] used texture and information when the occurrence of the particular shape features to classify illicit images. color cluster is a function of its position. Beside Mofaddel and Sadek [19] also took advantage of pixel position, each pixel has a pixel intensity local features such as edges detection in order to which specifies the value that the corresponding spot the illicit images. They believe that the number pixel carries to represent its illumination and of the edges in the connected skin region helps to chromaticity [9]. Meanwhile, the intensity feature detect illicit images. The authors assumed that skin could have different structure that depends on used regions are tending to contain less edges compare to image color space. For example, the RGB colour other areas. In the other work Zeng et al [20] space presents pixel intensities in range 0 to 255 utilized local feature such as shape features, texture which they are identified by three values Red, coarseness and texture contrast in order to spot Green and Blue [10]. illicit images. In a relatively different fashion Zhang Pixel-level features are unable to directly present et al. [21] used Bag of Visual Word model the sophisticated and high-level structures such as (BoVW) to detect illicit images. A mixture of local area, shape, texture and etc. but these features are and pixel based features including intensity, color, forming the basis for more informative and skin, and texture were extracted in illicit regions. sophisticated features. Despite this fact, the pixel- More recently Zaidan et al. [7] used combination of level features have been utilized in many illicit global , pixel-level and local features in order to image detection techniques as a part of designed detect the illicit images. feature vector. For example, skin color information Since the local feature are the most common and as primary pixel-level feature is indispensable part important feature type in content-based illicit image of many illicit image detector techniques. A number detection techniques, they are explained in more of researches such as [11][5][12][7][13] have been details in the next section separately. used pixel-level features for sake of illicit image detection. To tackle the limitations and weaknesses of global features and pixel-level features, the local features were developed.
Recommended publications
  • Scale Invariant Interest Points with Shearlets
    Scale Invariant Interest Points with Shearlets Miguel A. Duval-Poo1, Nicoletta Noceti1, Francesca Odone1, and Ernesto De Vito2 1Dipartimento di Informatica Bioingegneria Robotica e Ingegneria dei Sistemi (DIBRIS), Universit`adegli Studi di Genova, Italy 2Dipartimento di Matematica (DIMA), Universit`adegli Studi di Genova, Italy Abstract Shearlets are a relatively new directional multi-scale framework for signal analysis, which have been shown effective to enhance signal discon- tinuities such as edges and corners at multiple scales. In this work we address the problem of detecting and describing blob-like features in the shearlets framework. We derive a measure which is very effective for blob detection and closely related to the Laplacian of Gaussian. We demon- strate the measure satisfies the perfect scale invariance property in the continuous case. In the discrete setting, we derive algorithms for blob detection and keypoint description. Finally, we provide qualitative justifi- cations of our findings as well as a quantitative evaluation on benchmark data. We also report an experimental evidence that our method is very suitable to deal with compressed and noisy images, thanks to the sparsity property of shearlets. 1 Introduction Feature detection consists in the extraction of perceptually interesting low-level features over an image, in preparation of higher level processing tasks. In the last decade a considerable amount of work has been devoted to the design of effective and efficient local feature detectors able to associate with a given interesting point also scale and orientation information. Scale-space theory has been one of the main sources of inspiration for this line of research, providing an effective framework for detecting features at multiple scales and, to some extent, to devise scale invariant image descriptors.
    [Show full text]
  • Edge Detection of Noisy Images Using 2-D Discrete Wavelet Transform Venkata Ravikiran Chaganti
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2005 Edge Detection of Noisy Images Using 2-D Discrete Wavelet Transform Venkata Ravikiran Chaganti Follow this and additional works at the FSU Digital Library. For more information, please contact [email protected] THE FLORIDA STATE UNIVERSITY FAMU-FSU COLLEGE OF ENGINEERING EDGE DETECTION OF NOISY IMAGES USING 2-D DISCRETE WAVELET TRANSFORM BY VENKATA RAVIKIRAN CHAGANTI A thesis submitted to the Department of Electrical Engineering in partial fulfillment of the requirements for the degree of Master of Science Degree Awarded: Spring Semester, 2005 The members of the committee approve the thesis of Venkata R. Chaganti th defended on April 11 , 2005. __________________________________________ Simon Y. Foo Professor Directing Thesis __________________________________________ Anke Meyer-Baese Committee Member __________________________________________ Rodney Roberts Committee Member Approved: ________________________________________________________________________ Leonard J. Tung, Chair, Department of Electrical and Computer Engineering Ching-Jen Chen, Dean, FAMU-FSU College of Engineering The office of Graduate Studies has verified and approved the above named committee members. ii Dedicate to My Father late Dr.Rama Rao, Mother, Brother and Sister-in-law without whom this would never have been possible iii ACKNOWLEDGEMENTS I thank my thesis advisor, Dr.Simon Foo, for his help, advice and guidance during my M.S and my thesis. I also thank Dr.Anke Meyer-Baese and Dr. Rodney Roberts for serving on my thesis committee. I would like to thank my family for their constant support and encouragement during the course of my studies. I would like to acknowledge support from the Department of Electrical Engineering, FAMU-FSU College of Engineering.
    [Show full text]
  • Exploiting Information Theory for Filtering the Kadir Scale-Saliency Detector
    Introduction Method Experiments Conclusions Exploiting Information Theory for Filtering the Kadir Scale-Saliency Detector P. Suau and F. Escolano {pablo,sco}@dccia.ua.es Robot Vision Group University of Alicante, Spain June 7th, 2007 P. Suau and F. Escolano Bayesian filter for the Kadir scale-saliency detector 1 / 21 IBPRIA 2007 Introduction Method Experiments Conclusions Outline 1 Introduction 2 Method Entropy analysis through scale space Bayesian filtering Chernoff Information and threshold estimation Bayesian scale-saliency filtering algorithm Bayesian scale-saliency filtering algorithm 3 Experiments Visual Geometry Group database 4 Conclusions P. Suau and F. Escolano Bayesian filter for the Kadir scale-saliency detector 2 / 21 IBPRIA 2007 Introduction Method Experiments Conclusions Outline 1 Introduction 2 Method Entropy analysis through scale space Bayesian filtering Chernoff Information and threshold estimation Bayesian scale-saliency filtering algorithm Bayesian scale-saliency filtering algorithm 3 Experiments Visual Geometry Group database 4 Conclusions P. Suau and F. Escolano Bayesian filter for the Kadir scale-saliency detector 3 / 21 IBPRIA 2007 Introduction Method Experiments Conclusions Local feature detectors Feature extraction is a basic step in many computer vision tasks Kadir and Brady scale-saliency Salient features over a narrow range of scales Computational bottleneck (all pixels, all scales) Applied to robot global localization → we need real time feature extraction P. Suau and F. Escolano Bayesian filter for the Kadir scale-saliency detector 4 / 21 IBPRIA 2007 Introduction Method Experiments Conclusions Salient features X HD(s, x) = − Pd,s,x log2Pd,s,x d∈D Kadir and Brady algorithm (2001): most salient features between scales smin and smax P.
    [Show full text]
  • Topic: 9 Edge and Line Detection
    V N I E R U S E I T H Y DIA/TOIP T O H F G E R D I N B U Topic: 9 Edge and Line Detection Contents: First Order Differentials • Post Processing of Edge Images • Second Order Differentials. • LoG and DoG filters • Models in Images • Least Square Line Fitting • Cartesian and Polar Hough Transform • Mathemactics of Hough Transform • Implementation and Use of Hough Transform • PTIC D O S G IE R L O P U P P A D E S C P I Edge and Line Detection -1- Semester 1 A S R Y TM H ENT of P V N I E R U S E I T H Y DIA/TOIP T O H F G E R D I N B U Edge Detection The aim of all edge detection techniques is to enhance or mark edges and then detect them. All need some type of High-pass filter, which can be viewed as either First or Second order differ- entials. First Order Differentials: In One-Dimension we have f(x) d f(x) dx d f(x) dx We can then detect the edge by a simple threshold of d f (x) > T Edge dx ⇒ PTIC D O S G IE R L O P U P P A D E S C P I Edge and Line Detection -2- Semester 1 A S R Y TM H ENT of P V N I E R U S E I T H Y DIA/TOIP T O H F G E R D I N B U Edge Detection I but in two-dimensions things are more difficult: ∂ f (x,y) ∂ f (x,y) Vertical Edges Horizontal Edges ∂x → ∂y → But we really want to detect edges in all directions.
    [Show full text]
  • Robust Corner and Tangent Point Detection for Strokes with Deep
    Robust corner and tangent point detection for strokes with deep learning approach Long Zeng*, Zhi-kai Dong, Yi-fan Xu Graduate school at Shenzhen, Tsinghua University Abstract: A robust corner and tangent point detection (CTPD) tool is critical for sketch-based engineering modeling. This paper proposes a robust CTPD approach for hand-drawn strokes with deep learning approach, denoted as CTPD-DL. Its robustness for users, stroke shapes and biased datasets is improved due to multi-scaled point contexts and a vote scheme. Firstly, all stroke points are classified into segments by two deep learning networks, based on scaled point contexts which mimic human’s perception. Then, a vote scheme is adopted to analyze the merge conditions and operations for adjacent segments. If most points agree with a stroke’s type, this type is accepted. Finally, new corners and tangent points are inserted at transition points. The algorithm’s performance is experimented with 1500 strokes of 20 shapes. Results show that our algorithm can achieve 95.3% for all-or-nothing accuracy and 88.6% accuracy for biased datasets, compared to 84.6% and 71% of the state-of-the-art CTPD technique, which is heuristic and empirical-based. Keywords: corner detection, tangent point detection, stroke segmentation, deep learning, ResNet. 1. Introduction This work originates from our sketch-based engineering modeling (SBEM) system [1], to convert a conceptual sketch into a detailed part directly. A user friendly SBEM should impose as fewer constraints to the sketching process as possible [2]. Such system usually first starts from hand- drawn strokes, which may contain more than one primitives (e.g.
    [Show full text]
  • View Matching with Blob Features
    View Matching with Blob Features Per-Erik Forssen´ and Anders Moe Computer Vision Laboratory Department of Electrical Engineering Linkoping¨ University, Sweden Abstract mographic transformation that is not part of the affine trans- formation. This means that our results are relevant for both This paper introduces a new region based feature for ob- wide baseline matching and 3D object recognition. ject recognition and image matching. In contrast to many A somewhat related approach to region based matching other region based features, this one makes use of colour is presented in [1], where tangents to regions are used to de- in the feature extraction stage. We perform experiments on fine linear constraints on the homography transformation, the repeatability rate of the features across scale and incli- which can then be found through linear programming. The nation angle changes, and show that avoiding to merge re- connection is that a line conic describes the set of all tan- gions connected by only a few pixels improves the repeata- gents to a region. By matching conics, we thus implicitly bility. Finally we introduce two voting schemes that allow us match the tangents of the ellipse-approximated regions. to find correspondences automatically, and compare them with respect to the number of valid correspondences they 2. Blob features give, and their inlier ratios. We will make use of blob features extracted using a clus- tering pyramid built using robust estimation in local image regions [2]. Each extracted blob is represented by its aver- 1. Introduction age colour pk,areaak, centroid mk, and inertia matrix Ik. I.e.
    [Show full text]
  • A Combined Approach of Harris-SIFT Feature Detection for Image Mosaicing
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 5, May - 2014 A Combined Approach of Harris-SIFT Feature Detection for Image Mosaicing Monika B. Varma, Prof. Kinjal Mistree C.E Department, Chotubhai Gopalbhai Patel Institute of Technology Uka Tarsadia University Gujarat, India. Abstract—This Image Mosaicing is a process of assembling appropriate transformations via a warping operation and multiple overlapping images of the same scene into a large image. merging the overlapping regions of warped Images, it is The output of the image Mosaicing operation is the union of the possible to construct a single image indistinguishable from a two or more overlapping input images. This technology is widely single large image of the same object, covering the entire used in photography, digital video, motion analysis, medical visible area of the scene. The basis of the Image Mosaicing image processing, remote sensing image processing, document technique is to find the common part in the overlap input image processing and other fields. images and then smoothly blend them to produce final Panorama. This paper describes a combined approach of Harris-SIFT feature detection for Image Mosaicing. Firstly, feature points are The procedure of the Image Mosaicing Consists of two basic detected by using Harris corner detector, then after SIFT Concept: 1) Image Registration and 2) Image Blending and descriptor is computed to store feature vector for each detected Warping[6], as shown in the Fig 1. keypoints and then feature matching is applied. The RANSAC Homography algorithm is used to detect wrong matches for improving the stability of the algorithm and for estimating the transformation model.
    [Show full text]
  • Feature Detection Florian Stimberg
    Feature Detection Florian Stimberg Outline ● Introduction ● Types of Image Features ● Edges ● Corners ● Ridges ● Blobs ● SIFT ● Scale-space extrema detection ● keypoint localization ● orientation assignment ● keypoint descriptor ● Resources Introduction ● image features are distinct image parts ● feature detection often is first operation to define image parts to process later ● finding corresponding features in pictures necessary for object recognition ● Multi-Image-Panoramas need to be “stitched” together at according image features ● the description of a feature is as important as the extraction Types of image features Edges ● sharp changes in brightness ● most algorithms use the first derivative of the intensity ● different methods: (one or two thresholds etc.) Types of image features Corners ● point with two dominant and different edge directions in its neighbourhood ● Moravec Detector: similarity between patch around pixel and overlapping patches in the neighbourhood is measured ● low similarity in all directions indicates corner Types of image features Ridges ● curves which points are local maxima or minima in at least one dimension ● quality depends highly on the scale ● used to detect roads in aerial images or veins in 3D magnetic resonance images Types of image features Blobs ● points or regions brighter or darker than the surrounding ● SIFT uses a method for blob detection SIFT ● SIFT = Scale-invariant feature transform ● first published in 1999 by David Lowe ● Method to extract and describe distinctive image features ● feature
    [Show full text]
  • A Comprehensive Analysis of Edge Detectors in Fundus Images for Diabetic Retinopathy Diagnosis
    SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE) – Special Issue ICRTETM March 2019 A Comprehensive Analysis of Edge Detectors in Fundus Images for Diabetic Retinopathy Diagnosis J.Aashikathul Zuberiya#1, M.Nagoor Meeral#2, Dr.S.Shajun Nisha #3 #1M.Phil Scholar, PG & Research Department of Computer Science, Sadakathullah Appa College, Tirunelveli, Tamilnadu, India #2M.Phil Scholar, PG & Research Department of Computer Science, Sadakathullah Appa College, Tirunelveli, Tamilnadu, India #3Assistant Professor & Head, PG & Research Department of Computer Science, Sadakathullah Appa College, Tirunelveli, Tamilnadu, India Abstract severe stage. PDR is an advanced stage in which the Diabetic Retinopathy is an eye disorder that fluids sent by the retina for nourishment trigger the affects the people with diabetics. Diabetes for a growth of new blood vessel that are abnormal and prolonged time damages the blood vessels of retina fragile.Initial stage has no vision problem, but with and affects the vision of a person and leads to time and severity of diabetes it may lead to vision Diabetic retinopathy. The retinal fundus images of the loss.DR can be treated in case of early detection. patients are collected are by capturing the eye with [1][2] digital fundus camera. This captures a photograph of the back of the eye. The raw retinal fundus images are hard to process. To enhance some features and to remove unwanted features Preprocessing is used and followed by feature extraction . This article analyses the extraction of retinal boundaries using various edge detection operators such as Canny, Prewitt, Roberts, Sobel, Laplacian of Gaussian, Kirsch compass mask and Robinson compass mask in fundus images.
    [Show full text]
  • EECS 442 Computer Vision: Homework 2
    EECS 442 Computer Vision: Homework 2 Instructions • This homework is due at 11:59:59 p.m. on Friday October 18th, 2019. • The submission includes two parts: 1. To Gradescope: a pdf file as your write-up, including your answers to all the questions and key choices you made. You might like to combine several files to make a submission. Here is an example online link for combining multiple PDF files: https://combinepdf.com/. 2. To Canvas: a zip file including all your code. The zip file should follow the HW formatting instructions on the class website. • The write-up must be an electronic version. No handwriting, including plotting questions. LATEX is recommended but not mandatory. Python Environment We are using Python 3.7 for this course. You can find references for the Python stan- dard library here: https://docs.python.org/3.7/library/index.html. To make your life easier, we recommend you to install Anaconda 5.2 for Python 3.7.x (https://www.anaconda.com/download/). This is a Python package manager that includes most of the modules you need for this course. We will make use of the following packages extensively in this course: • Numpy (https://docs.scipy.org/doc/numpy-dev/user/quickstart.html) • OpenCV (https://opencv.org/) • SciPy (https://scipy.org/) • Matplotlib (http://matplotlib.org/users/pyplot tutorial.html) 1 1 Image Filtering [50 pts] In this first section, you will explore different ways to filter images. Through these tasks you will build up a toolkit of image filtering techniques. By the end of this problem, you should understand how the development of image filtering techniques has led to convolution.
    [Show full text]
  • Robust Edge Aware Descriptor for Image Matching
    Robust Edge Aware Descriptor for Image Matching Rouzbeh Maani, Sanjay Kalra, Yee-Hong Yang Department of Computing Science, University of Alberta, Edmonton, Canada Abstract. This paper presents a method called Robust Edge Aware De- scriptor (READ) to compute local gradient information. The proposed method measures the similarity of the underlying structure to an edge using the 1D Fourier transform on a set of points located on a circle around a pixel. It is shown that the magnitude and the phase of READ can well represent the magnitude and orientation of the local gradients and present robustness to imaging effects and artifacts. In addition, the proposed method can be efficiently implemented by kernels. Next, we de- fine a robust region descriptor for image matching using the READ gra- dient operator. The presented descriptor uses a novel approach to define support regions by rotation and anisotropical scaling of the original re- gions. The experimental results on the Oxford dataset and on additional datasets with more challenging imaging effects such as motion blur and non-uniform illumination changes show the superiority and robustness of the proposed descriptor to the state-of-the-art descriptors. 1 Introduction Local feature detection and description are among the most important tasks in computer vision. The extracted descriptors are used in a variety of applica- tions such as object recognition and image matching, motion tracking, facial expression recognition, and human action recognition. The whole process can be divided into two major tasks: region detection, and region description. The goal of the first task is to detect regions that are invariant to a class of transforma- tions such as rotation, change of scale, and change of viewpoint.
    [Show full text]
  • Computer Vision: Edge Detection
    Edge Detection Edge detection Convert a 2D image into a set of curves • Extracts salient features of the scene • More compact than pixels Origin of Edges surface normal discontinuity depth discontinuity surface color discontinuity illumination discontinuity Edges are caused by a variety of factors Edge detection How can you tell that a pixel is on an edge? Profiles of image intensity edges Edge detection 1. Detection of short linear edge segments (edgels) 2. Aggregation of edgels into extended edges (maybe parametric description) Edgel detection • Difference operators • Parametric-model matchers Edge is Where Change Occurs Change is measured by derivative in 1D Biggest change, derivative has maximum magnitude Or 2nd derivative is zero. Image gradient The gradient of an image: The gradient points in the direction of most rapid change in intensity The gradient direction is given by: • how does this relate to the direction of the edge? The edge strength is given by the gradient magnitude The discrete gradient How can we differentiate a digital image f[x,y]? • Option 1: reconstruct a continuous image, then take gradient • Option 2: take discrete derivative (finite difference) How would you implement this as a cross-correlation? The Sobel operator Better approximations of the derivatives exist • The Sobel operators below are very commonly used -1 0 1 1 2 1 -2 0 2 0 0 0 -1 0 1 -1 -2 -1 • The standard defn. of the Sobel operator omits the 1/8 term – doesn’t make a difference for edge detection – the 1/8 term is needed to get the right gradient
    [Show full text]