• Title/Summary/Keyword: Fourier descriptor

Search Result 39, Processing Time 0.021 seconds

Key frame extraction using Fourier transform (퓨리에 변환을 이용한 키 프레임 추출)

  • 이중용;문영식
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.179-182
    • /
    • 2001
  • In this paper. a key frame extraction algorithm for browsing and searching the summary of a video is proposed. Toward this end, important frames representing a shot are selected according to the correlations among frames. by using the Fourier descriptor which is useful for the shot boundary detection. To quantitatively evaluate the importance of selected frames. a new measure based on correlation coefficients of frames is proposed. If there are several frames with a same importance. another criteria is introduced to break the tie. by computing the partial moment of subframes including each candidate key frame so that the distortion rate is minimized Since a key frame extraction algorithm can be evaluated subjectively. the performance of the proposed algorithm has been verified by a statistical test. Experiments show that more than 20% improvement has been obtained by the proposed algorithm compared to existing methods.

  • PDF

A Technique for Shape Features Extraction Using the Discrete Cosine Transform (이산 코사인 변환을 이용한 형태 특징 추출 기법)

  • Kim, Kyung-Su;Lee, Yung-Sin;Kim, Yong-Kuk;Lee, Yun-Bae;Kim, Pan-Ku
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1357-1366
    • /
    • 1998
  • In this paper, we propose the method that extract shape features using the DCT(Discrete Cosine Transform) via simple invariant normalization. To retrieve effectively, we used measures, circularity and eccentricity, as filters to reduce the number of retrieved images. The experimental results show that our method is better than the methods of Fourier Descriptors and Moment Invariant for various leaf images.

  • PDF

Video Based Face Spoofing Detection Using Fourier Transform and Dense-SIFT (푸리에 변환과 Dense-SIFT를 이용한 비디오 기반 Face Spoofing 검출)

  • Han, Hotaek;Park, Unsang
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.483-486
    • /
    • 2015
  • Security systems that use face recognition are vulnerable to spoofing attacks where unauthorized individuals use a photo or video of authorized users. In this work, we propose a method to detect a face spoofing attack with a video of an authorized person. The proposed method uses three sequential frames in the video to extract features by using Fourier Transform and Dense-SIFT filter. Then, classification is completed with a Support Vector Machine (SVM). Experimental results with a database of 200 valid and 200 spoof video clips showed 99% detection accuracy. The proposed method uses simplified features that require fewer memory and computational overhead while showing a high spoofing detection accuracy.

Classification of Tumor cells in Phase-contrast Microscopy Image using Fourier Descriptor (위상차 현미경 영상 내 푸리에 묘사자를 이용한 암세포 형태별 분류)

  • Kang, Mi-Sun;Lee, Jeong-Eom;Kim, Hye-Ryun;Kim, Myoung-Hee
    • Journal of Biomedical Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.169-176
    • /
    • 2012
  • Tumor cell morphology is closely related to its migratory behaviors. An active tumor cell has a highly irregular shape, whereas a spherical cell is inactive. Thus, quantitative analysis of cell features is crucial to determine tumor malignancy or to test the efficacy of anticancer treatment. We use 3D time-lapse phase-contrast microscopy to analyze single cell morphology because it enables to observe long-term activity of living cells without photobleaching and phototoxicity, which is common in other fluorescence-labeled microscopy. Despite this advantage, there are image-level drawbacks to phase-contrast microscopy, such as local light effect and contrast interference ring. Therefore, we first corrected for non-uniform illumination artifacts and then we use intensity distribution information to detect cell boundary. In phase contrast microscopy image, cell is normally appeared as dark region surrounded by bright halo ring. Due to halo artifact is minimal around the cell body and has non-symmetric diffusion pattern, we calculate cross sectional plane which intersects center of each cell and orthogonal to first principal axis. Then, we extract dark cell region by analyzing intensity profile curve considering local bright peak as halo area. Finally, we calculated the Fourier descriptor that morphological characteristics of cell to classify tumor cells into active and inactive groups. We validated classification accuracy by comparing our findings with manually obtained results.

Performance Evaluation of Shape Descriptors for Gait Analysis Based on Silhouette Sequence (실루엣 영상기반 보행 분석을 위한 형태 기술자의 성능 평가)

  • Kim, Seon-Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.53-64
    • /
    • 2009
  • This paper presents a performance evaluation of shape descriptors for gait analysis in case of silhouette sequence images. We used moment descriptors(MD), Fourier descriptors(FD) and Zernike descriptors(ZD) as a shape descriptor. To evaluate their performance, we firstly defined the performance index, that is, AI(asymmetry index) and PI(periodic index) based on the periodic property of the gait images. This is why they are represented by periodic parameters due to periodic gait images. This index means that how the shape is represented periodically. According to these indexes, we evaluated the data sets with periodic images, downloaded from internet. The results showed that Zernike descriptors had better performance of AI = 1.09 and PI = 2.21 than others. And in case of FD and ZD, it's efficient to implement the gait analysis with 5~10 parameters.

  • PDF

Inspection for Inner Wall Surface of Communication Conduits by Laser Projection Image Analysis (레이저 투영 영상 분석에 의한 통신 관로 내벽 검사 기법)

  • Lee Dae-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.9
    • /
    • pp.1131-1138
    • /
    • 2006
  • This paper proposes a novel method for grading of underground communication conduits by laser projection image analysis. The equipment thrust into conduit consists of a laser diode, a light emitting diode and a camera, the laser diode is utilized for generating projection image onto pipe wall, the light emitting diode for lighting environment and the image of conduit is acquired by the camera. In order to segment profile region, we used a novel color difference model and multiple thresholds method. The shape of profile ring is represented as a minimum diameter and the Fourier descriptor, and then the pipe status is graded by the rule-based method. Both local and global features of the segmented ring shaped, the minimum diameter and the Fourier descriptor, are utilized, therefore injured and distorted pipes can be correctly graded. From the experimental results, the classification is measured with accuracy such that false alarms are less than 2% under the various conditions.

  • PDF

Performance Evaluations for Leaf Classification Using Combined Features of Shape and Texture (형태와 텍스쳐 특징을 조합한 나뭇잎 분류 시스템의 성능 평가)

  • Kim, Seon-Jong;Kim, Dong-Pil
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.1-12
    • /
    • 2012
  • There are many trees in a roadside, parks or facilities for landscape. Although we are easily seeing a tree in around, it would be difficult to classify it and to get some information about it, such as its name, species and surroundings of the tree. To find them, you have to find the illustrated books for plants or search for them on internet. The important components of a tree are leaf, flower, bark, and so on. Generally we can classify the tree by its leaves. A leaf has the inherited features of the shape, vein, and so on. The shape is important role to decide what the tree is. And texture included in vein is also efficient feature to classify them. This paper evaluates the performance of a leaf classification system using both shape and texture features. We use Fourier descriptors for shape features, and both gray-level co-occurrence matrices and wavelets for texture features, and used combinations of such features for evaluation of images from the Flavia dataset. We compared the recognition rates and the precision-recall performances of these features. Various experiments showed that a combination of shape and texture gave better results for performance. The best came from the case of a combination of features of shape and texture with a flipped contour for a Fourier descriptor.

A Content-Based Image Retrieval Technique Using the Shape and Color Features of Objects (객체의 모양과 색상특징을 이용한 내용기반 영상검색 기법)

  • 박종현;박순영;오일환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10B
    • /
    • pp.1902-1911
    • /
    • 1999
  • In this paper we present a content-based image retrieval algorithm using the visual feature vectors which describe the spatial characteristics of objects. The proposed technique uses the Gaussian mixture model(GMM) to represent multi-colored objects and the expectation maximization(EM) algorithm is employed to estimate the maximum likelihood(ML) parameters of the model. After image segmentation is performed based on GMM, the shape and color features are extracted from each object using Fourier descriptors and color histograms, respectively. Image retrieval consists of two steps: first, the shape-based query is carried out to find the candidate images whose objects have the similar shapes with the query image and second, the color-based query is followed. The experimental results show that the proposed algorithm is effective in image retrieving by using the spatial and visual features of segmented objects.

  • PDF

Object Recognition by Fourier Descriptor (푸리에 서술자를 이용한 물체 인식)

  • O, Chun-Seok;Park, Yong-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.1
    • /
    • pp.73-80
    • /
    • 1994
  • Fourier Descriptors(FD) is a common way for representing the boundary of an object. In this paper, an algorithm has been implemented to do object recognition by using FD. This is applied to various tool object, and is tested. This implementation contains two parts: image acquisition and object recognition. Appropriate lighting, viewing angle, and strong contrast of background and object are taken into account in this aspect. Minimum distances are calculated by using FD's and boundary matching among objects on the process of object recognition. Rotation, translation and scaling of the object will not influence the performance of the algorithm. Experiments show that we can use only one fourth of 1024 FD coefficients to do raped object recognition.

  • PDF

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

  • Ali, Zahid;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.892-911
    • /
    • 2019
  • Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. We found that the effect of a spoofing attack stands out more prominently in certain regions of the 2D Fourier spectra and, therefore, it is adequate to use the information about those regions to classify the input video or image as real or fake. We adopt a divide-conquer-aggregate approach, where we first divide the frequency domain image into local blocks, classify each local block independently, and then aggregate all the classification results by the weighted-sum approach. The effectiveness of the methodology is demonstrated using two different publicly available databases, namely: 1) Replay Attack Database and 2) CASIA-Face Anti-Spoofing Database. Experimental results show that the proposed method provides state-of-the-art performance by processing fewer frames of each video.