Authors: Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang Adviser: 席家年 Speaker: 黃敏虔 Date:2010/05/18 received July 29, 2006; revised April 24,2007;

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Zhengyou Zhang Vision Technology Group Microsoft Research
The Extended Cohn-Kanade Dataset(CK+):A complete dataset for action unit and emotion-specified expression Author:Patrick Lucey, Jeffrey F. Cohn, Takeo.
A Graph based Geometric Approach to Contour Extraction from Noisy Binary Images Amal Dev Parakkat, Jiju Peethambaran, Philumon Joseph and Ramanathan Muthuganapathy.
QR Code Recognition Based On Image Processing
Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
Caroline Rougier, Jean Meunier, Alain St-Arnaud, and Jacqueline Rousseau IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 5,
IEEE Transactions on Consumer Electronics, Vol. 45, No. 1, AUGUST 1999 Muhammad Bilal Ahmad and Tae-Sun Choi, Senior Member,IEEE.
A comparison of black and white film and digital photography through grain and noise Chris Betts Mentored by Mr. Norman Tracy Introduction Recently, digital.
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Siddharth Choudhary.  Refines a visual reconstruction to produce jointly optimal 3D structure and viewing parameters  ‘bundle’ refers to the bundle.
Depth from Structured Light II: Error Analysis
July 27, 2002 Image Processing for K.R. Precision1 Image Processing Training Lecture 1 by Suthep Madarasmi, Ph.D. Assistant Professor Department of Computer.
3/5/2002Phillip Saltzman Video Motion Capture Christoph Bregler Jitendra Malik UC Berkley 1997.
Augmented Reality David Johnson.
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
Ai-Mei Huang and Truong Nguyen Image Processing (ICIP), th IEEE International Conference on 1.
COMP322/S2000/L181 Pre-processing: Smooth a Binary Image After binarization of a grey level image, the resulting binary image may have zero’s (white) and.
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
5. Halftoning Newspaper photographs simulate a greyscale, despite the fact that they have been printed using only black ink. A newspaper picture is, in.
Quadtrees, Octrees and their Applications in Digital Image Processing
Augmented Reality: Object Tracking and Active Appearance Model
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of 1-1 HCI Human Computer Interaction Week 10.
EE392J Final Project, March 20, Multiple Camera Object Tracking Helmy Eltoukhy and Khaled Salama.
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
Shape Recognition and Pose Estimation for Mobile Augmented Reality Author : N. Hagbi, J. El-Sana, O. Bergig, and M. Billinghurst Date : Speaker.
Hashim Mir, Peter Xu, and Peter van Beek University of Waterloo.
Bala Lakshminarayanan AUTOMATIC TARGET RECOGNITION April 1, 2004.
Encoding, Validation and Verification Chapter 1. Introduction This presentation covers the following: – Data encoding – Data validation – Data verification.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
1. Introduction Motion Segmentation The Affine Motion Model Contour Extraction & Shape Estimation Recursive Shape Estimation & Motion Estimation Occlusion.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Marco Pedersoli, Jordi Gonzàlez, Xu Hu, and Xavier Roca
September 23, 2014Computer Vision Lecture 5: Binary Image Processing 1 Binary Images Binary images are grayscale images with only two possible levels of.
Visual Inspection Product reliability is of maximum importance in most mass-production facilities.  100% inspection of all parts, subassemblies, and.
بنام خدا کاربرد کامپیوتر در مهندسی صنایع (21774( Lecture 9 The barcode
Lecture notes for Stat 231: Pattern Recognition and Machine Learning 3. Bayes Decision Theory: Part II. Prof. A.L. Yuille Stat 231. Fall 2004.
09/17/02 (C) 2002, University of Wisconsin, CS 559 Last Time Color Spaces File formats.
Source: Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on Author: Paucher, R.; Turk, M.; Adviser: Chia-Nian.
1 Eye Detection in Images Introduction To Computational and biological Vision Lecturer : Ohad Ben Shahar Written by : Itai Bechor.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Machine Vision Introduction to Using Cognex DVT Intellect.
Digital Photography A tool for Graphic Design Graphic Design: Digital Photography.
ERROR DETECTING AND CORRECTING CODES -BY R.W. HAMMING PRESENTED BY- BALAKRISHNA DHARMANA.
Automatic Projector Calibration Using Self-Identifying Patterns Mark Fiala Computational Video Group Institute of Information Technology National Research.
Spring 2007 COMP TUI 1 Computer Vision for Tangible User Interfaces.
Robust and Accurate Surface Measurement Using Structured Light IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 57, NO. 6, JUNE 2008 Rongqian.
Markerless Augmented Reality Platform Design and Verification of Tracking Technologies Author:J.M. Zhong Date: Speaker:Sian-Lin Hong.
Barcodes, MMS, and the Internet’s Cheapest Prices Greg McGrath & Greg Maier Advisors: Professor Cotter, Professor Rudko ECE-499 March 01, 2008.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
October 1, 2013Computer Vision Lecture 9: From Edges to Contours 1 Canny Edge Detector However, usually there will still be noise in the array E[i, j],
MDL Principle Applied to Dendrites and Spines Extraction in 3D Confocal Images 1. Introduction: Important aspects of cognitive function are correlated.
Current Telescope Control System Big Bear Solar Observatory Pointing and Tracking Guiding Light Beam Control.
Edge Segmentation in Computer Images CSE350/ Sep 03.
Reading 1D Barcodes with Mobile Phones Using Deformable Templates.
1 A Statistical Matching Method in Wavelet Domain for Handwritten Character Recognition Presented by Te-Wei Chiang July, 2005.
Barcode/QR Code Technology
Date of download: 9/19/2016 Copyright © 2016 SPIE. All rights reserved. The projection of two coplanar circles. (Color online only.) Figure Legend: From:
Author : Sang Hwa Lee, Junyeong Choi, and Jong-Il Park
Hand Geometry Recognition
FACE RECOGNITION TECHNOLOGY
Face recognition using improved local texture pattern
Media IC & System Lab, GIEE, NTU Introduction to Augmented Reality
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Presented by :- Vishal Vijayshankar Mishra
An Introduction of Marker and Markerless In AR
Source: arXiv preprint arXiv:  (2018)
Presentation transcript:

Authors: Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang Adviser: 席家年 Speaker: 黃敏虔 Date:2010/05/18 received July 29, 2006; revised April 24,2007; Accepted AUGUST 2007

INTRODUCTION MEASURING FIDUCIAL MARKER SYSTEM PERFORMANCE PLANAR MARKER SYSTEMS ARTag REDUCING INTER-MARKER CONFUSION CONCLUSION

 Fiducial Markers needed with a high reliability 。  Despite future improvement in marker-less computer vision, there will probably always be applications

 Preferably, the markers should be passive (not requiring electrical power) planar patterns for convenient printing and mounting 。  The ARTag marker system is a more recent system gaining popularity in AR projects due to its improved performance.

 In this paper have eleven practical evaluation criteria, which other fiducial marker systems do not fully address.  The failure to properly address any of these eleven criteria greatly reduces the usability of a marker system.

 1. the false positive rate  2. the inter-marker confusion rate  3. the false negative rate  4.the minimal marker size

 5. the vertex jitter characteristics  6. the marker library size  7.immunity to lighting conditions  8. immunity to occlusion,

 9. perspective support  10. immunity to photometric calibration  11.the speed performance.

 A. Bar-codes: Fig. 1. A standard one-dimensional bar-code and some two-dimensional barcode systems

 A. Bar-codes:  In general, DataMatrix, Maxicode and QR are useful for encoding information, but are not as useful for fiducial marker systems for two reasons.  1. they are not intended for  2. won’t function well

 B. Fiducial marker systems: Fig. 2. Several fiducial marker systems.

 B. Fiducial marker systems:  Matrix, ARToolkit, ARToolkit Plus, BinARyID, and ARTag all use square markers and their projection in the camera image under perspective projection is a quadrilateral.

 A. Unique Feature Detection: Finding Quads  This quadrilateral border must first be found, in ARTag 。  Using edges replaces the necessity of an absolute threshold value that binarization requires with a threshold on the gradient.  The choice of an absolute threshold is problematic since this value will depend on lighting.

Fig. 3. Left two images show only 3 detected each using thresholding. Right image shows that with identical lighting all the markers are found when using the edge-based method.

Fig. 4. Marker detection with occlusion.

 B. Verification and Identification of ARTag Markers Fig. 5. Top: digital encoding process : creating ARTag markers. A sub-ID number (the lower 10 bits of the ARTag ID) generates a 36-bit pattern of black and white cells. Bottom: digital decoding process: identifying ARTag ID’s in the binary pattern from the interior of an ARTag marker.

Fig. 7. Synthetic experiments: gaussian noise added to test image to produce detection errors.

Fig. 8. Applications of the ARTag fiducial marker system.

 A design approach was described for designing highly reliable fiducial marker systems considering a set of performance criteria.  Of prime importance for many applications is that markers should not be falsely detected, or the wrong ID reported.