Imagen de Google Jackets

A Theory of Shape Identification [electronic resource] / by FrȨdȨric Cao, JosȨ-Luis Lisani, Jean-Michel Morel, Pablo MusȨ, FrȨdȨric Sur.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Lecture Notes in Mathematics ; 1948 | Lecture Notes in Mathematics ; 1948Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008Descripción: online resourceTipo de contenido:
  • text
Tipo de medio:
  • computer
Tipo de soporte:
  • online resource
ISBN:
  • 9783540684817
Trabajos contenidos:
  • SpringerLink (Online service)
Tema(s): Formatos físicos adicionales: Sin títuloClasificación CDD:
  • 004 23
Clasificación LoC:
  • Libro electrónico
Recursos en línea:
Contenidos:
Springer eBooksResumen: Recent years have seen dramatic progress in shape recognition algorithms applied to ever-growing image databases. They have been applied to image stitching, stereo vision, image mosaics, solid object recognition and video or web image retrieval. More fundamentally, the ability of humans and animals to detect and recognize shapes is one of the enigmas of perception. The book describes a complete method that starts from a query image and an image database and yields a list of the images in the database containing shapes present in the query image. A false alarm number is associated to each detection. Many experiments will show that familiar simple shapes or images can reliably be identified with false alarm numbers ranging from 10-5 to less than 10-300. Technically speaking, there are two main issues. The first is extracting invariant shape descriptors from digital images. The second is deciding whether two shape descriptors are identifiable as the same shape or not. A perceptual principle, the Helmholtz principle, is the cornerstone of this decision. These decisions rely on elementary stochastic geometry and compute a false alarm number. The lower this number, the more secure the identification. The description of the processes, the many experiments on digital images and the simple proofs of mathematical correctness are interlaced so as to make a reading accessible to various audiences, such as students, engineers, and researchers.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Extracting Image boundaries -- Extracting Meaningful Curves from Images -- Level Line Invariant Descriptors -- Robust Shape Directions -- Invariant Level Line Encoding -- Recognizing Level Lines -- A Contrario Decision: the LLD Method -- Meaningful Matches: Experiments on LLD and MSER -- Grouping Shape Elements -- Hierarchical Clustering and Validity Assessment -- Grouping Spatially Coherent Meaningful Matches -- Experimental Results -- The SIFT Method -- The SIFT Method -- Securing SIFT with A Contrario Techniques.

Recent years have seen dramatic progress in shape recognition algorithms applied to ever-growing image databases. They have been applied to image stitching, stereo vision, image mosaics, solid object recognition and video or web image retrieval. More fundamentally, the ability of humans and animals to detect and recognize shapes is one of the enigmas of perception. The book describes a complete method that starts from a query image and an image database and yields a list of the images in the database containing shapes present in the query image. A false alarm number is associated to each detection. Many experiments will show that familiar simple shapes or images can reliably be identified with false alarm numbers ranging from 10-5 to less than 10-300. Technically speaking, there are two main issues. The first is extracting invariant shape descriptors from digital images. The second is deciding whether two shape descriptors are identifiable as the same shape or not. A perceptual principle, the Helmholtz principle, is the cornerstone of this decision. These decisions rely on elementary stochastic geometry and compute a false alarm number. The lower this number, the more secure the identification. The description of the processes, the many experiments on digital images and the simple proofs of mathematical correctness are interlaced so as to make a reading accessible to various audiences, such as students, engineers, and researchers.

ZDB-2-SMA

ZDB-2-LNM

No hay comentarios en este titulo.

para colocar un comentario.