University of Connecticut Automated Counterfeit IC Physical Defect Characterization Team 176 Wesley Stevens Dan Guerrera Ryan Nesbit Advisors: Professor.

Slides:



Advertisements
Similar presentations
IC TESTING.
Advertisements

Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
OpenCV Introduction Hang Xiao Oct 26, History  1999 Jan : lanched by Intel, real time machine vision library for UI, optimized code for intel 
Content-Based Image Retrieval
MatchIT Color Inspection System Copyright 2003 – 2006 Vision Machines Inc.
University of Connecticut Automated Counterfeit IC Physical Defect Characterization Team 176 Wesley Stevens Dan Guerrera Ryan Nesbit Advisors: Professor.
Automated Shot Boundary Detection in VIRS DJ Park Computer Science Department The University of Iowa.
TEMPLATE DESIGN © TEMPLATE 2013 by Jifeng Chen Center for Hardware Assurance, Security, and Engineering University.
July 27, 2002 Image Processing for K.R. Precision1 Image Processing Training Lecture 1 by Suthep Madarasmi, Ph.D. Assistant Professor Department of Computer.
Lecture 07 Segmentation Lecture 07 Segmentation Mata kuliah: T Computer Vision Tahun: 2010.
PHP-based Image Recognition and Retrieval of Late 18th Century Artwork Ben Goodwin Handouts are available for students writing summaries for class assignments.
Department of Electrical and Computer Engineering He Zhou Hui Zheng William Mai Xiang Guo Advisor: Professor Patrick Kelly ASLLENGE.
CMSC 345, Version 11/07 SD Vick from S. Mitchell Software Testing.
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
COMP322/S2000/L181 Pre-processing: Smooth a Binary Image After binarization of a grey level image, the resulting binary image may have zero’s (white) and.
Video Object Tracking and Replacement for Post TV Production LYU0303 Final Year Project Spring 2004.
Image Search Presented by: Samantha Mahindrakar Diti Gandhi.
Fingerprint Identification System Final Project Spring 2006 Bashira Chowdhury Cheryl Texin Teaching Assistant: Theodoros Konstantakopoulos.
Processing Digital Images. Filtering Analysis –Recognition Transmission.
Content-Based Image Retrieval (CBIR) Student: Mihaela David Professor: Michael Eckmann Most of the database images in this presentation are from the Annotated.
Traffic Sign Recognition Jacob Carlson Sean St. Onge Advisor: Dr. Thomas L. Stewart.
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
Color a* b* Brightness L* Texture Original Image Features Feature combination E D 22 Boundary Processing Textons A B C A B C 22 Region Processing.
Automatic 2D-3D Registration Student: Lingyun Liu Advisor: Prof. Ioannis Stamos.
Roadway Sign Data Collection Video log image data collection QA/QC Database GIS spatial analysis and presentation, and mapping GeoTranSolution (GTS) Automatic.
Data Mining By Archana Ketkar.
Team Xerox Progress Report Mechanical Engineering Design Team Mechanical Engineering Design Team Jeff Carpenter Charlie Morris David Postel Jeremy Ryatt.
Efficient Path Determining Robot RIT Computer Engineering Senior Design Project Jamie Greenberg Jason Torre October 26, 2004 A motorized robot will navigate.
Traffic Sign Recognition Jacob Carlson Sean St. Onge Advisor: Dr. Thomas L. Stewart.
Automated Inspection Using Machine Vision
MITRE Corporation is a federally-funded research-and- development corporation that has developed their own facial recognition system, known as MITRE Matcher.
PHASE-II MACHINE VISION Machine vision (MV) is the application of computer vision to industry and manufacturing. Whereas computer vision is the general.
University of Connecticut Automated IC Defect Characterization Wesley Stevens Dan Guerrera Ryan Nesbit Professor Mohammad Tehranipoor Electrical and Computer.
CSCE 5013 Computer Vision Fall 2011 Prof. John Gauch
DRS \\ 7jun02 1 Operating Principles for Very small fingerprint sensors.
Texture. Texture is an innate property of all surfaces (clouds, trees, bricks, hair etc…). It refers to visual patterns of homogeneity and does not result.
University of Connecticut Virtual Lab Carl DiFederico, Shane Tobey, Kasim Ward Graduate Student Advisor: Qihang Shi Senior Faculty Advisors: Mohammed Tehranipoor.
Visual Inspection Product reliability is of maximum importance in most mass-production facilities.  100% inspection of all parts, subassemblies, and.
University of Connecticut CDEB Goals Carl DiFederico, Kasim Ward, Shane Tobey Graduate Student Advisor: Qihang Shi Senior Faculty Advisor: Mohammed Tehranipoor.
Use of Aerial Videography in Habitat Survey and Computers as Observers Leonard Pearlstine University of Florida.
Image Processing and Pattern Recognition Jouko Lampinen.
1 Leaf Classification from Boundary Analysis Anne Jorstad AMSC 663 Project Proposal Fall 2007 Advisor: Dr. David Jacobs, Computer Science.
Manufacturing Engineering Statistical Process Control (SPC) Tools: Gantt Chart Copyright © Texas Education Agency, All rights reserved. 1 NO DEFECTS.
Team 03 Department of Electrical and Computer Engineering 6 March 2015 Digital Fitness Trainer CDR.
Automatic License Plate Location Using Template Matching University of Wisconsin - Madison ECE 533 Image Processing Fall 2004 Project Kerry Widder.
Design of PCA and SVM based face recognition system for intelligent robots Department of Electrical Engineering, Southern Taiwan University, Tainan County,
Research Starters in EBSCO Discovery Service Tutorial support.ebsco.com.
Approach Design Definition with Synthesis and Analysis of Alternative Solutions Leading to a Decision.
Wonjun Kim and Changick Kim, Member, IEEE
Image features and properties. Image content representation The simplest representation of an image pattern is to list image pixels, one after the other.
1 Review and Summary We have covered a LOT of material, spending more time and more detail on 2D image segmentation and analysis, but hopefully giving.
CS-EE 481 Spring March, 2007 University of Portland School of Engineering Project ZigZag Team Adam Russell Will French Matt Heye Advisor Dr. Rylander.
 2002 Prentice Hall. All rights reserved. 1 Introduction to the Visual Studio.NET IDE Outline Introduction Visual Studio.NET Integrated Development Environment.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Seminar Using the Cisco Technical Support Website.
License Plate Recognition of A Vehicle using MATLAB
Wednesday NI Vision Sessions
Simulation: Editing Non-Native Geometry. © 2016 Autodesk Design Academy Editing Non-Native Geometry How to edit CAD models using Autodesk® SimStudio Tools.
Zachary Starr Dept. of Computer Science, University of Missouri, Columbia, MO 65211, USA Digital Image Processing Final Project Dec 11 th /16 th, 2014.
A Generic Toolkit for Electronic Editions of Medieval Manuscripts
OCR Reading.
Machine Vision Burr Detection
Digital Video Library - Jacky Ma.
IC Counterfeit Detection Using Physical Inspection Methods
Machine Vision Acquisition of image data, followed by the processing and interpretation of these data by computer for some useful application like inspection,
Scale-Space Representation of 3D Models and Topological Matching
Apple v. Samsung: Product Design
IC Counterfeit Detection Using Physical Inspection Methods
Aim of the project Take your image Submit it to the search engine
Statistical Process Control
Statistical Process Control
Presentation transcript:

University of Connecticut Automated Counterfeit IC Physical Defect Characterization Team 176 Wesley Stevens Dan Guerrera Ryan Nesbit Advisors: Professor Mohammad Tehranipoor Professor Domenic Forte Electrical and Computer Engineering

All Rights Reserved 2 Summary Automated system for identifying physical defects Analyze various images Return relevant data regarding counterfeit status

All Rights Reserved 3 Project Overview Three main steps Acquire images of suspect and/or “golden” ICs Run different algorithms based on image location Algorithms return altered images with highlighted defects Uses images from different locations to find defects Leads/Pins – scratches, bends, corrosion Surface – scratches, discoloration, pattern variation Markings/Text – missing, faded, different location

All Rights Reserved 4 Project Overview

All Rights Reserved 5 Image Capture Locations Overall Top/bottom, sides, corners Features (Markings) Text (part number), Manufacturer Mark Surface Samples of main surfaces (top, bottom, sides) Edges (interface between top and bottom) Leads/Pins Top and bottom Connection with package

All Rights Reserved 6 Algorithms Binary Transformations Text recognition Ghost markings, extraneous markings Scratch detection Compare binary to structuring elements Statistical Analysis Texture comparison Scratches, color variation, different pattern, corrosion, contamination, package damage Feature matching Image alignment

All Rights Reserved 7 Binary Transformations

All Rights Reserved 8 Binary Transformations

All Rights Reserved 9 Object Counting We can use the number of objects in an image It can provide us with an indicator of defects.

All Rights Reserved 10 Scratch Detection

All Rights Reserved 11 Statistical Analysis

All Rights Reserved 12 Feature Matching

All Rights Reserved 13 User Results General algorithm results Pass or Fail List of all detected defects Image highlighting detected defects Summary Authentic/Suspect/Counterfeit

All Rights Reserved 14 User Results

All Rights Reserved 15 Project Plan Integrate as many defects as possible Finalize Golden IC comparison analysis Refine summary and analysis of results Confidence level for counterfeit