Normal view MARC view ISBD view

A Theory of Shape Identification [electronic resource] /by Frédéric Cao, José-Luis Lisani, Jean-Michel Morel, Pablo Musé, Frédéric Sur.

by Cao, Frédéric [author.]; Lisani, José-Luis [author.]; Morel, Jean-Michel [author.]; Musé, Pablo [author.]; Sur, Frédéric [author.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Mathematics: 1948Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008.Description: online resource.ISBN: 9783540684817.Subject(s): Mathematics | Artificial intelligence | Computer vision | Visualization | Mathematics | Visualization | Image Processing and Computer Vision | Artificial Intelligence (incl. Robotics) | Computer Imaging, Vision, Pattern Recognition and Graphics | Game Theory, Economics, Social and Behav. Sciences | Information and Communication, CircuitsDDC classification: 004 Online resources: Click here to access online
Contents:
Extracting Image boundaries -- Extracting Meaningful Curves from Images -- Level Line Invariant Descriptors -- Robust Shape Directions -- Invariant Level Line Encoding -- Recognizing Level Lines -- A Contrario Decision: the LLD Method -- Meaningful Matches: Experiments on LLD and MSER -- Grouping Shape Elements -- Hierarchical Clustering and Validity Assessment -- Grouping Spatially Coherent Meaningful Matches -- Experimental Results -- The SIFT Method -- The SIFT Method -- Securing SIFT with A Contrario Techniques.
In: Springer eBooksSummary: Recent years have seen dramatic progress in shape recognition algorithms applied to ever-growing image databases. They have been applied to image stitching, stereo vision, image mosaics, solid object recognition and video or web image retrieval. More fundamentally, the ability of humans and animals to detect and recognize shapes is one of the enigmas of perception. The book describes a complete method that starts from a query image and an image database and yields a list of the images in the database containing shapes present in the query image. A false alarm number is associated to each detection. Many experiments will show that familiar simple shapes or images can reliably be identified with false alarm numbers ranging from 10-5 to less than 10-300. Technically speaking, there are two main issues. The first is extracting invariant shape descriptors from digital images. The second is deciding whether two shape descriptors are identifiable as the same shape or not. A perceptual principle, the Helmholtz principle, is the cornerstone of this decision. These decisions rely on elementary stochastic geometry and compute a false alarm number. The lower this number, the more secure the identification. The description of the processes, the many experiments on digital images and the simple proofs of mathematical correctness are interlaced so as to make a reading accessible to various audiences, such as students, engineers, and researchers.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
MAIN LIBRARY
QA76.9.I52 (Browse shelf) Available

Extracting Image boundaries -- Extracting Meaningful Curves from Images -- Level Line Invariant Descriptors -- Robust Shape Directions -- Invariant Level Line Encoding -- Recognizing Level Lines -- A Contrario Decision: the LLD Method -- Meaningful Matches: Experiments on LLD and MSER -- Grouping Shape Elements -- Hierarchical Clustering and Validity Assessment -- Grouping Spatially Coherent Meaningful Matches -- Experimental Results -- The SIFT Method -- The SIFT Method -- Securing SIFT with A Contrario Techniques.

Recent years have seen dramatic progress in shape recognition algorithms applied to ever-growing image databases. They have been applied to image stitching, stereo vision, image mosaics, solid object recognition and video or web image retrieval. More fundamentally, the ability of humans and animals to detect and recognize shapes is one of the enigmas of perception. The book describes a complete method that starts from a query image and an image database and yields a list of the images in the database containing shapes present in the query image. A false alarm number is associated to each detection. Many experiments will show that familiar simple shapes or images can reliably be identified with false alarm numbers ranging from 10-5 to less than 10-300. Technically speaking, there are two main issues. The first is extracting invariant shape descriptors from digital images. The second is deciding whether two shape descriptors are identifiable as the same shape or not. A perceptual principle, the Helmholtz principle, is the cornerstone of this decision. These decisions rely on elementary stochastic geometry and compute a false alarm number. The lower this number, the more secure the identification. The description of the processes, the many experiments on digital images and the simple proofs of mathematical correctness are interlaced so as to make a reading accessible to various audiences, such as students, engineers, and researchers.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha