On the WEB. Digital Image Processing ECE 178. B. S. MANJUNATH RM 3157 ENGR I Tel:



Similar documents
CHAPTER 7 CONCLUSION AND FUTURE WORK

Security and protection of digital images by using watermarking methods

!"#$"%&' What is Multimedia?

ECE 468 / CS 519 Digital Image Processing. Introduction

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera

Image Authentication Scheme using Digital Signature and Digital Watermarking

EE3414 Multimedia Communication Systems Part I

Introduzione alle Biblioteche Digitali Audio/Video

Parametric Comparison of H.264 with Existing Video Standards

DICOM Digital Imaging and Communications in Medicine

Introduction to image coding

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

Colorado School of Mines Computer Vision Professor William Hoff

APPLICATIONS AND USAGE

Introduction to Computer Graphics

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Understanding Compression Technologies for HD and Megapixel Surveillance

Embedded Vision on FPGAs The MathWorks, Inc. 1

Digital Image Processing EE368/CS232

Video compression: Performance of available codec software

Digital Image Processing: Introduction

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

Computer and Network Security

JPEG Image Compression by Using DCT

CS-184: Computer Graphics

Video Compression Trends & OUTLOOK. Andreas Pentrelli Solution Consultant

Safer data transmission using Steganography

Limitations of Human Vision. What is computer vision? What is computer vision (cont d)?

A Tool for Multimedia Quality Assessment in NS3: QoE Monitor

Multimedia Document Authentication using On-line Signatures as Watermarks

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

ARTICLE. Image quality: Usability is the real issue How to select the right camera system.

WATERMARKING FOR IMAGE AUTHENTICATION

Figure 1: Relation between codec, data containers and compression algorithms.

How To Test Video Quality With Real Time Monitor

INTRODUCTION IMAGE PROCESSING >INTRODUCTION & HUMAN VISION UTRECHT UNIVERSITY RONALD POPPE

Low-resolution Image Processing based on FPGA

(575) and by prior appointment nmsu. edu

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.

Using fractal compression scheme to embed a digital signature into an image

Dolby Vision for the Home

MovieLabs Specification for Enhanced Content Protection Version 1.0

Immersive Medien und 3D-Video

Workshop: Defining the Medical Imaging Requirements for a Health Center. Teleradiology and Networking

Video Codecs Comparison

Security Based Data Transfer and Privacy Storage through Watermark Detection

MPEG-4 Video Codecs Comparison

anatomage table Interactive anatomy study table

Image Compression and Decompression using Adaptive Interpolation

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

SCIENTIFIC WORKING GROUP ON IMAGING TECHNOLOGIES (SWGIT)

Understanding HD: Frame Rates, Color & Compression

Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2

Computer and Network Security

Course Title: Computer Forensic Specialist: Data and Image Files

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

White paper. HDTV (High Definition Television) and video surveillance

Best practices for producing quality digital video files

Master of Science Graphics, Multimedia and Virtual Reality. Courses description

White paper. An explanation of video compression techniques.

Standard encoding protocols for image and video coding

Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)

Image Compression through DCT and Huffman Coding Technique

Introduction. Selim Aksoy. Bilkent University

Binocular Vision and The Perception of Depth

Choosing a digital camera for your microscope John C. Russ, Materials Science and Engineering Dept., North Carolina State Univ.

DIGITAL IMAGE PROCESSING AND ANALYSIS

CARESTREAM PACS Suite (Client, Server, and CD Direct) Version DICOM Conformance Statement

encoding compression encryption

dr hab. Paweł Strumiłło

MMGD0203 Multimedia Design MMGD0203 MULTIMEDIA DESIGN. Chapter 3 Graphics and Animations

Supports screening, diagnostic, and multimodality workflows

CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP)

Classes of multimedia Applications

WHITE PAPER. H.264/AVC Encode Technology V0.8.0

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Problem-Based Group Activities for a Sensation & Perception Course. David S. Kreiner. University of Central Missouri

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Survey of Video Processing with Field Programmable Gate Arrays (FGPA)

Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)

Digital Image Fundamentals. Selim Aksoy Department of Computer Engineering Bilkent University

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

About the Render Gallery

ARC 3D Webservice How to transform your images into 3D models. Maarten Vergauwen

Computer Vision for Quality Control in Latin American Food Industry, A Case Study

In the two following sections we separately consider hardware and software requirements. Sometimes, they will be offered for sale as a package.

What s New in DICOM. DICOM SPIE MEDICAL IMAGING February Bas Revet, Philips Healthcare (Chair WG 6)

AirCam OD-325HD-2.5MM

ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS

College/School: College of Science Department: Forensics Science Program Submitted by: Jason Kinser Ext:

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

C++ for Image Processing

4K End-to-End. Hugo GAGGIONI. Yasuhiko MIKAMI. Senior Manager Product Planning B2B Solution Business Group

Digital Audio and Video Data

Transcription:

Digital Image Processing ECE 178 B. S. MANJUNATH RM 3157 ENGR I Tel:893-7112 manj@ece.ucsb.edu http://vision.ece.ucsb.edu/manjunath Introduction 1 On the WEB For course information: http://www.ece.ucsb.edu/~manj/ece178 Teaching Assistants Pradeep Koulgi Pratim Ghosh Introduction 2 1

Today Course outline Introduction to image processing Matlab basics and the image processing toolbox Introduction 3 About this course Prerequisites Strong motivation, basic calculus MATLAB is the programming environment, but no prior background in MATLAB is assumed. Who can take this course? Juniors/Seniors/Graduate students in ECE/CE/CS/ME/MATP/ Reference Book: Gonzalez and Woods, 2 nd Edition (2002) or the new edition (2007) http://www.imageprocessingplace.com Read chapters 1 and 2 (available online) Introduction 4 2

Grading H/W* due by 5pm on due date Quiz (surprise!)* in class/discussion sessions HW+Quiz 30% Midterms 20% (two mid-terms) Finals 50% *All homeworks/class participation are required. A non-submission will affect your grade nonlinearly.you will get a fail grade if you miss more than one h/w or prog. assignment. Introduction 5 Why Image Processing? The future is multimedia information processing Images (and video) are everywhere! Many and diverse applications Astronomy, biology, geology, geography, medicine, law enforcement, defense, Industrial inspection, Different imaging modalities: visual, X-ray, ultrasound, Introduction 6 3

Entertainment Digital camcorders HDTV DVDs: High quality image/video compression (MPEG-2: about 5-10 Million bits/second) Digital Cinema New compression technologies are needed Consider a 2 hour movie: 1920 x 1080 x 30 bits/pixel x 24 frames/second ~~ 1.5 billion bits/second 1.3 terra bytes / 2 hr program Introduction 7 Security Person Identification Face recognition Finger print identification Watermarking Copyright protection and authentication Data hiding Secret communication (Steganography) Introduction 8 4

Some Applications X-ray imaging and radiology Computer Tomography [545x700 24-bit color JPEG, 69069 bytes] Section through Visible Human Male - head, including cerebellum, cerebral cortex, brainstem, nasal passages (from Head subset) http://www.nlm.nih.gov/research/visible/photos.html) Introduction 9 An Ultrasound image Profile of a fetus at four months. This face is approximately 4cm long. (http://www.parenthood.com) Introduction 10 5

Computer Tomography Generating 3-D images from 2-D slices. CAD, CAM applications Industrial inspections CT Scanner Picker PQ 6000 Model GE Medical High Speed Advantage scanner Picker PQ 6000 Introduction 11 Image/video Processing Methods Image Enhancement Image Restoration Compression Image reconstruction Morphological image processing Feature extraction and recognition computer vision (next quarter, ECE/CS 181b) Introduction 12 6

Course Outline Introduction 13 Image Enhancement Enhancement: Improve the visual quality of the image. Eg. Noise removal using median filtering (from http://www.nist.gov/lispix/imlab/noise/shotfc.html) Introduction 14 7

Image Restoration same as image enhancement, but you have additional information concerning the quality degradation. Example: removing motion blur in an image of a fast moving object. Matlab site at http://www.mathworks.com/products/demos/ima ge/deblur_wiener/deblur.html Introduction 15 IP methods (cont.) Reconstruction: reconstruction from projections. Used in constructing 3D data from 2D projections in computer tomography. Image representation using features Low level representations using color, texture, shape, motion, etc. High level features for recognitions; e.g., facial features. Recognition and scene understanding Introduction 16 8

Image Processing, Pattern Recognition, Graphics, and Computer Vision Image Processing This is about image to image transformation (image coding, enhancement, restoration, etc.) ECE 178, ECE 278a. Computer Graphics: CS 180/280 Pattern Recognition: ECE 277b Computer Vision: ECE 181b/281b Introduction 17 Course Outline Introduction Chapters 1-2 2-D Linear Systems Class notes; Sampling and Quantization Class notes; Ch 2.4 Image Enhancement Ch. 3, 4 Image and Video Coding JPEG and MPEG standards Ch. 7,8 Introduction 18 9

Course Project: not this year Why project? To learn more about applications of image processing and get hands-on experience. typically, the material (needed) is NOT covered in class - thus requires independent study (ten weeks is too short to cover all interesting topics!.) Previous year projects Streaming video Data hiding JPEG 2000 Introduction 19 Data Hiding Droeshout engraving of William Shakespeare (192x240) Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the "enemy" is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other "harmless" messages in a way that does not allow any "enemy" to even detect that there is a second secret message present [Markus Kuhn 1995-07-03]. A text message (1535 bytes) Introduction 20 10

Results of Embedding Text Embedded image Compressed image (lossy JPEG 85%) Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the "enemy" is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other "harmless" messages in a way that does not allow any "enemy" to even detect that there is a second secret message present [Markus Kuhn 1995-07-03]. Recovered message (loss-less) Introduction 21 Example: Image in Image Renoir s Le Moulin de la Galette (432x320) Embedded Airphoto image (216x160) Embedded and JPEG compression (85%) Introduction Recovered signature image 22 11

Example: Video in Video (a) Host frame (cm1002.02500, 352x240) (b) Embedded frame (2M bps, 30 f/s PSNR 31.5dB) (c) Recovered frame (PSNR 35.7dB) (d) Signature frame (cm1002.11700, 352x240) (e) Recovered signature frame (PSNR 45.0dB) Introduction 23 Project W2005: Image Mosaicing What is mosaicing? Stitching together two or more images taken at different times or using different sensors, so as to create an image with larger viewing area. Video mosacing: stitching together video frames. General procedure Identify control points that are good for matching Match them, thus establishing a correspondence Matching is difficult! Introduction 24 12

Video mosaic Challenges: Identifying robust control points in one or more images, Computing the proper image transformations (affine, projective transformations), and blending the images together. Introduction 25 Change detection Images are taken about two years apart Introduction 26 13

another example Generation of wide field of view in high resolution bypassing microscope limitations Introduction 27 One more..(retina) Introduction 28 14

Week 1: Reading Assignment (Gonzalez book available in Library) Chapter 1. Chapter 2: You should be familiar with the following topics Section 2.1 Structure of human eye Image formation in the eye Brightness adaptation and discrimination Sections 2.2 and 2.3 Introduction 29 A note on human visual perception Both the hardware and software of human visual perception are extremely complex and they work! A good understanding of the acquisition hardware (eyes) Very little known about higher level (perceptual) processing. To this day, the eye gives me a shudder - Charles Darwin Introduction 30 15

Brightness Adaptation The total range that our visual system can discriminate at a given time is rather small. Brightness adaptation refers to this ability to adjust its(eye) sensitivity over a wide range of adaptation levels. Introduction 31 Brightness Discrimination Introduction 32 16

Weber Ratio Introduction 33 Perceived Brightness Introduction 34 17

Simultaneous Contrast Introduction 35 More examples from the web Introduction 36 18

Matlab stuff Introduction 37 19