0% found this document useful (0 votes)
79 views40 pages

Tour Guide: Image Acquisition Image Generation

The document discusses various techniques in digital image processing (DIP), including image compression, manipulation, analysis, and perception. Image compression is used to reduce image size for storage and transmission. Manipulation techniques modify images for enhancement, restoration, and artistic effects. Analysis extracts information from images through tasks like edge detection, segmentation, and recognition. Perception studies how humans view and interpret images. Overall, DIP aims to automatically process digital images using techniques like these.

Uploaded by

Lal Chand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views40 pages

Tour Guide: Image Acquisition Image Generation

The document discusses various techniques in digital image processing (DIP), including image compression, manipulation, analysis, and perception. Image compression is used to reduce image size for storage and transmission. Manipulation techniques modify images for enhancement, restoration, and artistic effects. Analysis extracts information from images through tasks like edge detection, segmentation, and recognition. Perception studies how humans view and interpret images. Overall, DIP aims to automatically process digital images using techniques like these.

Uploaded by

Lal Chand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 40

Tour Guide

Image Image
Acquisition Generation
D.I.P.
Theme Image
Park Compression

Image Image
Manipulation Analysis

Image Image
Display Perception
Why D.I.P.?
Reasons for compression
– Image data need to be accessed at a different time or
location
– Limited storage space and transmission bandwidth
Reasons for manipulation
– Image data might experience nonideal acquisition,
transmission or display (e.g., restoration, enhancement and
interpolation)
– Image data might contain sensitive content (e.g., fight
against piracy, conterfeit and forgery)
– To produce images with artistic effect (e.g., pointellism)
Reasons for analysis
– Image data need to be analyzed automatically in order to
reduce the burden of human operators
– To teach a computer to “see” in A.I. tasks
Shannon’s Picture on
Communication (1948)
channel channel
source channel destination
encoder decoder
super-channel

source source
encoder decoder

The goal of communication is to move information


from here to there and from now to then

Examples of source:
Human speeches, photos, text messages, computer programs …

Examples of channel:
storage media, telephone lines, wireless transmission …
Source Coding in Image
Communication: Image Compression
 Why do we need image compression?
-Example: digital camera (4Mpixel)
Raw data – 24bits, 5.3M pixels  16M bytes
256M memory card ($30-50)  16 pictures
raw image JPEG compressed JPEG file
(16M bytes) encoder (1M bytes)

compression ratio=16  256 pictures


Lossless Image Compression
 Definition
- Decompressed image will be mathematically
identical to the original one (zero error)
 Compression ratio
- highly depends on the image type and content
synthetic images photographic images
>10 1~3
 Applications

-Storage and transmission of medical images


Popular Lossless Image
Compression Techniques
 WinZip
- Based on the celebrated Lempel-Ziv algorithm
invented nearly 30 years ago
 GIF (Graphic Interchange Format)
-Based on an enhanced version of LZ algorithm
by Welch in 1983
-Was introduced by CompuServe in 1987 and made
popular until it was not royalty-free in 1994
 PNG (Portable Network Graphics)
GIF Liberation Day: June 20, 2003
Lossy Image Compression

compressed JPEG file JPEG


(20,407 bytes) decoder

Q Q decompressed image
100 low compression ratio
high quality

high compression ratio


original raw image
0 low quality
(262,144 bytes)
From JPEG to JPEG2000

discrete cosine transform based wavelet transform based


JPEG (CR=64) JPEG2000 (CR=64)
Image Manipulation (I):
Noise Removal

Noise contamination is often inevitable during the acquisition

salt and pepper (impulse) noise additive white Gaussian noise


Image Manipulation (II):
Deblurring

License plate is barely legible due to motion blurring


Image Manipulation (III):
Contrast Enhancement

under-exposed image
overly-exposed image
Image Manipulation (IV):
Aliasing Reduction
Example: aliasing artifacts in MRI image acquisition

Ideal quality, nonideal quality,


slow scanning fast scanning

Tradeoff between scanning time and image quality


Image Manipulation (V):
Image Interpolation
digital
zooming

small
1M pixels large
4M pixels
Resolution enhancement can be obtained by common image
processing software such as Photoshop or Paint Shop Pro
Image Manipulation (VI):
Image Mosaicing
Merge multiple images of the same scene into one with larger FOV

+ =

There exist several mosaicing software for automatic stitching

F.Y.I.: search “Gigapixel images” by Google


http://triton.tpd.tno.nl/gigazoom/Delft2.htm
Image Manipulation (VII):
Error Concealment

blocks contaminated
by channel errors
Image Manipulation (VIII):
Deblocking/Deringing

Ringing artifacts
Block artifacts
Image Manipulation (IX):
Dejittering

jittering noise
Image Manipulation (X):
Image Inpainting
Image Inpainting Application:
Restore Old Photos
Image Manipulation (XI):
Color Quantization

25,680 colors (24 bits) 256 colors (8 bits)

Applications: video cell-phone, gameboy, portable DVD


Image Manipulation (XII):
Image Halftoning

grayscale: 0-255 halftoned: 0/255


Image Manipulation (XIII):
Image Scrambling/Hashing

original scrambled
Image Manipulation (XIV):
Image Watermarking

Original image Modified image


Image Manipulation (XV):
Image Stylization
Image Manipulation (XVI):
Image Rendering

computer Abyss
generated
Image-based Rendering
Image Analysis (I): Edge Detection
Image Analysis (II): Face Detection
Image Analysis (III): Change Detection
Change Detection in Medical Application
Image Analysis (IV): Image Matching

Antemortem dental X-ray record Postmortem dental X-ray record


Image Matching in Biometrics

Two deceivingly similar fingerprints of two different people


Image Analysis (V):
Image Segmentation
Image Analysis (VI): Object Recognition

License number can be automatically


extracted from the image of license
plate
Object Recognition in Military
Applications
Image Analysis (VII): Event Recognition

Image-based monitoring system prevents drowning


Image Analysis (VIII):
Video Summarization

Only send out “important” motion pictures such as home-runs


Image Analysis (IX):
Content-based Image Retrieval

retrieved building images


Roadmap
Image
enhancement

Image
restoration Image
Image
display/
acquisition
Image perception
analysis

Image
compression
Roadmap II

Binary Image Image Image Image


= + +
Processing analysis compression manipulation

Photographic Image Image Image


= + +
Image Processing analysis compression manipulation

You might also like