SlideShare uma empresa Scribd logo
1 de 18
Edge Detection
What is Edge Detection?
Identifying points/Edges in a digital image at which
the image brightness changes sharply or has
discontinuities.
- Edges are significant local changes of intensity in an image.
- Edges typically occur on the boundary between two
different regions in an image.
Goal of edge detection
Edge detection is extensively used in image segmentation
when we want to divide the image into areas
corresponding to different objects. If we need to extract
different object from an image, we need Edge Detection
Using Edge Detection, we can:
- Produce a line drawing of a scene from an image of that scene.
- Important features can be extracted from the edges of an image
(e.g., corners, lines, curves).
- These features are used by higher-level computer vision algorithms
(e.g., recognition, Image comparizon ).
Unaccepted object can be remove.
Process of Edge Detection
Most of edge detection algorithm are based on one of two basic
properties of intensity values: Discontinuity and similarity.
Typically, there are three steps to perform edge detection:
1. Noise reduction
2. Edge enhancement
3. Edge localization
Process of Edge Detection (...)
Noise reduction
where we try to suppress as much noise as possible, without
smoothing away the meaningful edges.
Original Image After Nois Reduction
Process of Edge Detection (...)
Edge enhancement
where we apply some kind of filter that responds strongly at edges
and weakly elsewhere, so that the edges may be identified as local
maxima in the filter’s output . One suggestion is to use some kind of
high pass filter.
Process of Edge Detection (...)
Edge localization
where we decide which of the local maxima output by the filter are
meaningful edges and which are caused by noise
Process of Edge Detection (...)
There are many algorithm for Edge Detection. Some are:
Robert's edge detector
Prewitt edge detector
Sobel edge detector
Frie Chen edge detector
Canny edge detector
Canny edge detector is giving best output, I am going to explain Canny edge
detector.
Canny Edge Detector
Canny Edge Detector is complex and uses a multi-stage algorithm to
detect a wide range of edges in images. It is most commonly
implemented edge detection algorithm. It has three basic objectives:
Low error rate
Edge points should be well localized
Single edge point response
Canny Edge Detector
As I mention before, canny edge detector have multiple algorithm.
It have 5 steps, those are:
Image Smoothing
Gradient Operation
Nonmaxima Suppression
Hysteresis Thresholding
Connectivity Analysis
Canny Edge Detector
Image Smoothing
Reduce image noise by smoothing with a Gaussian
The choice of σ depends on desired behavior
large σ detects large scale edges
small σ detects fine features
The larger the width of the Gaussian mask, the lower is the detector's sensitivity to
noise.
Canny Edge Detector
Canny Edge Detector
Nonmaxima Suppression
Nonmaxima Suppression reduce thick edge strength responses around true edges
select the single maximum point across the width of an edge. is used to trace along
the edge in the edge direction and suppress any pixel value (sets it equal to 0) that is
not considered to be an edge. This will give a thin line in the output image.
Canny Edge Detector
Hysteresis Thresholding
Large intensity gradients are more likely to correspond to edges than small intensity gradients. It is in most
cases impossible to specify a threshold at which a given intensity gradient switches from corresponding to an
edge into not doing so. Therefore Canny uses thresholding with hysteresis.
Thresholding with hysteresis requires two thresholds – high and low. Select two thresholds TH and TL such that
0 6 TL < TH 6 255
Create two new binary 2-D arrays
• gNH(x; y) = gN(x y) > TH
• gNL(x; y) = gN(x y) > TL
Eliminate from gNL(x; y) all the nonzero
pixels from gNH(x y)
After this operation
• gNH(x y) will contain only the strong edge points
• gNL(x y) will contain only the weak edge points
• They will not contain common points
Ratio of TH to TL should be 2 : 1 or 3 : 1
Canny Edge Detector
Connectivity Analysis
After step #4, gNH(x y) will contain the strong edge pixels { thus are valid edge pixels.
However, there will be discontinuity in the edges. Longer edges are formed using the
following procedure:
1 Add all the edge pixels in gNH(x y) to a list L
2 Do until there are more edge pixels in L
• Locate the next unvisited edge pixel, p
• Mark as valid edge pixels all the weak pixels in gNL(x y) that are connected to p (8
neighbors)
• Remove p from L
3 Set to zero all pixels in gNL(x y) that were not marked as valid edge pixels
4 Combine all nonzero pixels in gNH(x y) and gNL(x y ) to find the final edge pixels
Analysis
Canny Edge Detector
Visually all steps
?
Thank you!
Jakir Hossain.
ID:
CSE-24th Batch.
Southeast University.

Mais conteúdo relacionado

Mais procurados

Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
Smriti Tikoo
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
Indira Nayak
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
Ayaelshiwi
 
Digital image processing question bank
Digital image processing question bankDigital image processing question bank
Digital image processing question bank
Yaseen Albakry
 

Mais procurados (20)

Basics of edge detection and forier transform
Basics of edge detection and forier transformBasics of edge detection and forier transform
Basics of edge detection and forier transform
 
SIFT
SIFTSIFT
SIFT
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Segmentation
SegmentationSegmentation
Segmentation
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Image Enhancement using Frequency Domain Filters
Image Enhancement using Frequency Domain FiltersImage Enhancement using Frequency Domain Filters
Image Enhancement using Frequency Domain Filters
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
 
Feature detection and matching
Feature detection and matchingFeature detection and matching
Feature detection and matching
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processing
 
Smoothing in Digital Image Processing
Smoothing in Digital Image ProcessingSmoothing in Digital Image Processing
Smoothing in Digital Image Processing
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
06 spatial filtering DIP
06 spatial filtering DIP06 spatial filtering DIP
06 spatial filtering DIP
 
Digital image processing question bank
Digital image processing question bankDigital image processing question bank
Digital image processing question bank
 
Frequency domain methods
Frequency domain methods Frequency domain methods
Frequency domain methods
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
 
Hog
HogHog
Hog
 

Semelhante a Edge Detection

Exploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny AlgorithmExploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny Algorithm
Prasad Thakur
 
Comparative study on image segmentation techniques
Comparative study on image segmentation techniquesComparative study on image segmentation techniques
Comparative study on image segmentation techniques
gmidhubala
 

Semelhante a Edge Detection (20)

Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge DetectionEdge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
Edge Drawing - An Heuristic Approach to Robust Real-Time Edge Detection
 
Real time Canny edge detection
Real time Canny edge detectionReal time Canny edge detection
Real time Canny edge detection
 
Exploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny AlgorithmExploring Methods to Improve Edge Detection with Canny Algorithm
Exploring Methods to Improve Edge Detection with Canny Algorithm
 
image segmentation by ppres.pptx
image segmentation by ppres.pptximage segmentation by ppres.pptx
image segmentation by ppres.pptx
 
195706916 i journals-paper-template-2013
195706916 i journals-paper-template-2013195706916 i journals-paper-template-2013
195706916 i journals-paper-template-2013
 
X-Ray Image Acquisition and Analysis
X-Ray Image Acquisition and AnalysisX-Ray Image Acquisition and Analysis
X-Ray Image Acquisition and Analysis
 
PPT s06-machine vision-s2
PPT s06-machine vision-s2PPT s06-machine vision-s2
PPT s06-machine vision-s2
 
Edge detection iOS application
Edge detection iOS applicationEdge detection iOS application
Edge detection iOS application
 
EDGE DETECTION
EDGE DETECTIONEDGE DETECTION
EDGE DETECTION
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Study and Comparison of Various Image Edge Detection Techniques
Study and Comparison of Various Image Edge Detection TechniquesStudy and Comparison of Various Image Edge Detection Techniques
Study and Comparison of Various Image Edge Detection Techniques
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
 
09 cie552 image_featuresi
09 cie552 image_featuresi09 cie552 image_featuresi
09 cie552 image_featuresi
 
YCIS_Forensic_Image Enhancement and Edge detection.pptx
YCIS_Forensic_Image Enhancement and Edge detection.pptxYCIS_Forensic_Image Enhancement and Edge detection.pptx
YCIS_Forensic_Image Enhancement and Edge detection.pptx
 
Image segmentation techniques
Image segmentation techniquesImage segmentation techniques
Image segmentation techniques
 
Comparative study on image segmentation techniques
Comparative study on image segmentation techniquesComparative study on image segmentation techniques
Comparative study on image segmentation techniques
 
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEYALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
 
Fuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge DetectionFuzzy Logic Based Edge Detection
Fuzzy Logic Based Edge Detection
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

Edge Detection

  • 2. What is Edge Detection? Identifying points/Edges in a digital image at which the image brightness changes sharply or has discontinuities. - Edges are significant local changes of intensity in an image. - Edges typically occur on the boundary between two different regions in an image.
  • 3. Goal of edge detection Edge detection is extensively used in image segmentation when we want to divide the image into areas corresponding to different objects. If we need to extract different object from an image, we need Edge Detection Using Edge Detection, we can: - Produce a line drawing of a scene from an image of that scene. - Important features can be extracted from the edges of an image (e.g., corners, lines, curves). - These features are used by higher-level computer vision algorithms (e.g., recognition, Image comparizon ). Unaccepted object can be remove.
  • 4. Process of Edge Detection Most of edge detection algorithm are based on one of two basic properties of intensity values: Discontinuity and similarity. Typically, there are three steps to perform edge detection: 1. Noise reduction 2. Edge enhancement 3. Edge localization
  • 5. Process of Edge Detection (...) Noise reduction where we try to suppress as much noise as possible, without smoothing away the meaningful edges. Original Image After Nois Reduction
  • 6. Process of Edge Detection (...) Edge enhancement where we apply some kind of filter that responds strongly at edges and weakly elsewhere, so that the edges may be identified as local maxima in the filter’s output . One suggestion is to use some kind of high pass filter.
  • 7. Process of Edge Detection (...) Edge localization where we decide which of the local maxima output by the filter are meaningful edges and which are caused by noise
  • 8. Process of Edge Detection (...) There are many algorithm for Edge Detection. Some are: Robert's edge detector Prewitt edge detector Sobel edge detector Frie Chen edge detector Canny edge detector Canny edge detector is giving best output, I am going to explain Canny edge detector.
  • 9. Canny Edge Detector Canny Edge Detector is complex and uses a multi-stage algorithm to detect a wide range of edges in images. It is most commonly implemented edge detection algorithm. It has three basic objectives: Low error rate Edge points should be well localized Single edge point response
  • 10. Canny Edge Detector As I mention before, canny edge detector have multiple algorithm. It have 5 steps, those are: Image Smoothing Gradient Operation Nonmaxima Suppression Hysteresis Thresholding Connectivity Analysis
  • 11. Canny Edge Detector Image Smoothing Reduce image noise by smoothing with a Gaussian The choice of σ depends on desired behavior large σ detects large scale edges small σ detects fine features The larger the width of the Gaussian mask, the lower is the detector's sensitivity to noise.
  • 13. Canny Edge Detector Nonmaxima Suppression Nonmaxima Suppression reduce thick edge strength responses around true edges select the single maximum point across the width of an edge. is used to trace along the edge in the edge direction and suppress any pixel value (sets it equal to 0) that is not considered to be an edge. This will give a thin line in the output image.
  • 14. Canny Edge Detector Hysteresis Thresholding Large intensity gradients are more likely to correspond to edges than small intensity gradients. It is in most cases impossible to specify a threshold at which a given intensity gradient switches from corresponding to an edge into not doing so. Therefore Canny uses thresholding with hysteresis. Thresholding with hysteresis requires two thresholds – high and low. Select two thresholds TH and TL such that 0 6 TL < TH 6 255 Create two new binary 2-D arrays • gNH(x; y) = gN(x y) > TH • gNL(x; y) = gN(x y) > TL Eliminate from gNL(x; y) all the nonzero pixels from gNH(x y) After this operation • gNH(x y) will contain only the strong edge points • gNL(x y) will contain only the weak edge points • They will not contain common points Ratio of TH to TL should be 2 : 1 or 3 : 1
  • 15. Canny Edge Detector Connectivity Analysis After step #4, gNH(x y) will contain the strong edge pixels { thus are valid edge pixels. However, there will be discontinuity in the edges. Longer edges are formed using the following procedure: 1 Add all the edge pixels in gNH(x y) to a list L 2 Do until there are more edge pixels in L • Locate the next unvisited edge pixel, p • Mark as valid edge pixels all the weak pixels in gNL(x y) that are connected to p (8 neighbors) • Remove p from L 3 Set to zero all pixels in gNL(x y) that were not marked as valid edge pixels 4 Combine all nonzero pixels in gNH(x y) and gNL(x y ) to find the final edge pixels Analysis
  • 17. ?
  • 18. Thank you! Jakir Hossain. ID: CSE-24th Batch. Southeast University.