0% found this document useful (0 votes)
11 views104 pages

5 - Unit DIP

Uploaded by

mohanmysore6742
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views104 pages

5 - Unit DIP

Uploaded by

mohanmysore6742
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 104

Unit - 5

Morphology and Image Segmentation


Syllabus
Morphology and Image Segmentation:
Preliminaries, Dilation and Erosion, Opening and Closing, The Hit-or-
Miss Transformation, Some Basic Morphological Algorithms. Detection
of Discontinuities, Edge Linking and Boundary Detection, Thresholding,
Region-Based Segmentation, Patterns and Pattern Classes, Recognition
Based on Decision-Theoretic Methods, Structural Methods.
Preliminaries
• Morphological operations apply a structuring element to an input
image, creating an output image of the same size.
• Morphological Image Processing or morphology describes a range of
image processing techniques that deal with the shape of features in
an image.
• Morphological operations are typically applied to remove the
imperfections introduced during segmentation.
What are the different methods of morphological processing?

• There are four operations for morphological processing:


• which are
• dilation
• erosion
• opening and
• closing.
• They are all non-linear operations, that is to say, different applying
orders of operations generate various results.
Structuring Elements
• It is a small set to probe the image under study
• For each structuring element, we should define the origin
• The shape and size must be adapted to the geometric properties for
the objects.
• Need to check three conditions while applying structuring Element(SE)
• FIT
• HIT
• MISS
• No specific size for SE, unlike mask
Dilation (Expanding)
Any one of the structuring elements should
match: The result is :
Erosion
Erosion result
Problem
Dilation
Result:
Erosion on A complement
Problem on erosion and dilation
Dilation result
Erosion result
Opening and Closing
• Dilation Expands an image and erosion shrinks it.
• Morphological opening and closure is a technique for improving
image quality by manipulating the erosion and dilatation processes.
• In the opening phase, the picture is eroded and then dilates.
• whereas in the closing process, the image is eroded and then dilates.
Opening
• Opening removes small objects from the foreground (usually
taken as the bright pixels) of an image, placing them in the
background.
Example
Example
Closing
Example
Example
HIT and MISS Transformation
• The hit-and-miss transform is a general binary morphological
operation that can be used to look for particular patterns of
foreground

• The hit-or-miss transform finds the locations of a given pattern inside


the input image. Binary image where a pattern is to be detected. Part
of the structuring element to be fitted to the foreground (non-zero
elements) of input. and background pixels in an image.
• X is the object under consideration to be detected
• Whether it is in the original image.
• There are two objects Y and Z in the image.


HIT or MISS is a three step operation
Let us start with the different steps of HIT or
MISS : Given image A, and SE or object is X.
First Step: A is erosion X is performed. The
result is :
Second Step: A Complement Erosion with (w-x)
Step 3: In this result is HIT
Another Example:
Result of A erosion B
Second Step: A complement and also
C is complement of B
A complement C: Result is shown below
• As the intersection of the two erosion produces a result, it is
considered as HIT.
Summary
• If the object X is in A then it is HIT
• Otherwise it is MISS
One more example:
Some Basic Morphological Algorithms
• The following are some of the basic morphological algorithms
• Boundary Extraction
• Region Filling
• Extraction of connected components
• Convex Hull
• Thinning
• Thickening
• Skeletons
• Pruning
Boundary Extraction
Example
Example
Example: Given
Final Result
Region Filling
• Region-Filling is a method to fill a bounded region with a certain color
or image.
Example
Result of first iteration. The result will become
input for next step
Next iteration
Result of second iteration
Result of next iteration
Next step
In the next step the result remains same and
the algorithm stops iteration
Final step in the algorithm : union of original
image with x5: Region filled
Example
Extraction of Connected Component
Algorithm
Result of first iteration X1 generated
Segmentation
Image Segmentation
Detection of discontinuities (Segmentation)
• Discontinuity means abrupt change in the image pattern. Observe the
following images: point and lines are representation for abrupt changes.

• The discontinuity-based segmentation can be classified into three


approaches:
• (1) Point detection,
• (2) Line detection, and
• (3) Edge detection.
Example for point detection
• For horizontal lines
Edge Linking and Boundary detection
Thresholding
Thresholding
Region based segmentation
Pattern and Pattern classes
A pattern is an arrangement of descriptors (or features).

A pattern class is a family of patterns that share some


common properties.
Recognition Based on Decision-Theoretic Methods
Structural Methods
• Structural pattern recognition is a branch of data science that focuses
on identifying patterns in datasets.
• It involves using relational, sequence, and approximate patterns to
recognize objects from featureless representations.
End of Unit 5
End of
Digital Image Processing and
Analysis

I wish you all the best


End of DIP&A
All the Best

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy