Free Essay

Survey over Image Thresholding Techniques

In:

Submitted By coolboy007
Words 16889
Pages 68
Journal of Electronic Imaging 13(1), 146 – 165 (January 2004).

Survey over image thresholding techniques and quantitative performance evaluation
Mehmet Sezgin ¨ ˙ Tubıtak Marmara Research Center Information Technologies Research Institute Gebze, Kocaeli Turkey E-mail: sezgin@btae.mam.gov.tr ¨ Bulent Sankur ˇ ¸ Bogazici University Electric-Electronic Engineering Department Bebek, ˙stanbul I Turkey

Abstract. We conduct an exhaustive survey of image thresholding methods, categorize them, express their formulas under a uniform notation, and finally carry their performance comparison. The thresholding methods are categorized according to the information they are exploiting, such as histogram shape, measurement space clustering, entropy, object attributes, spatial correlation, and local gray-level surface. 40 selected thresholding methods from various categories are compared in the context of nondestructive testing applications as well as for document images. The comparison is based on the combined performance measures. We identify the thresholding algorithms that perform uniformly better over nondestructive testing and document image applications. © 2004 SPIE and
IS&T. [DOI: 10.1117/1.1631316]

1 Introduction In many applications of image processing, the gray levels of pixels belonging to the object are substantially different from the gray levels of the pixels belonging to the background. Thresholding then becomes a simple but effective tool to separate objects from the background. Examples of thresholding applications are document image analysis, where the goal is to extract printed characters,1,2 logos, graphical content, or musical scores: map processing, where lines, legends, and characters are to be found:3 scene processing, where a target is to be detected:4 and quality inspection of materials,5,6 where defective parts must be delineated. Other applications can be listed as follows: cell images7,8 and knowledge representation,9 segmentation of various image modalities for nondestructive testing NDT applications, such as ultrasonic images in Ref. 10, eddy current images,11 thermal images,12 x-ray computed tomography CAT ,13 endoscopic images,14 laser scanning confo-

Paper 02016 received Feb. 7, 2002; revised manuscript received Jan. 23, 2003; accepted for publication May 27, 2003. 1017-9909/2004/$15.00 © 2004 SPIE and IS&T.

cal microscopy,13 extraction of edge field,15 image segmentation in general,16,17 spatio-temporal segmentation of video images,18 etc. The output of the thresholding operation is a binary image whose one state will indicate the foreground objects, that is, printed text, a legend, a target, defective part of a material, etc., while the complementary state will correspond to the background. Depending on the application, the foreground can be represented by gray-level 0, that is, black as for text, and the background by the highest luminance for document paper, that is 255 in 8-bit images, or conversely the foreground by white and the background by black. Various factors, such as nonstationary and correlated noise, ambient illumination, busyness of gray levels within the object and its background, inadequate contrast, and object size not commensurate with the scene, complicate the thresholding operation. Finally, the lack of objective measures to assess the performance of various thresholding algorithms, and the difficulty of extensive testing in a taskoriented environment, have been other major handicaps. In this study we develop taxonomy of thresholding algorithms based on the type of information used, and we assess their performance comparatively using a set of objective segmentation quality metrics. We distinguish six categories, namely, thresholding algorithms based on the exploitation of: 1. histogram shape information, 2. measurement space clustering, 3. histogram entropy information, 4. image attribute information, 5. spatial information, and 6. local characteristics. In this assessment study we envisage two major application areas of thresholding, namely document binarization and segmentation of nondestructive testing NDT images. A document image analysis system includes several image-processing tasks, beginning with digitization of the document and ending with character recognition and natural language processing. The thresholding step can affect quite critically the performance of successive steps such as

146 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

Survey over image thresholding techniques . . .

classification of the document into text objects, and the correctness of the optical character recognition OCR . Improper thresholding causes blotches, streaks, erasures on the document confounding segmentation, and recognition tasks. The merges, fractures, and other deformations in the character shapes as a consequence of incorrect thresholding are the main reasons of OCR performance deterioration. In NDT applications, the thresholding is again often the first critical step in a series of processing operations such as morphological filtering, measurement, and statistical assessment. In contrast to document images, NDT images can derive from various modalities, with differing application goals. Furthermore, it is conjectured that the thresholding algorithms that apply well for document images are not necessarily the good ones for the NDT images, and vice versa, given the different nature of the document and NDT images. There have been a number of survey papers on thresholding. Lee, Chung, and Park19 conducted a comparative analysis of five global thresholding methods and advanced useful criteria for thresholding performance evaluation. In an earlier work, Weszka and Rosenfeld20 also defined several evaluation criteria. Palumbo, Swaminathan and Srihari21 addressed the issue of document binarization comparing three methods, while Trier and Jain3 had the most extensive comparison basis 19 methods in the context of character segmentation from complex backgrounds. Sahoo et al.22 surveyed nine thresholding algorithms and illustrated comparatively their performance. Glasbey23 pointed out the relationships and performance differences between 11 histogram-based algorithms based on an extensive statistical study. This survey and evaluation, on the one hand, represents a timely effort, in that about 60% of the methods discussed and referenced are dating after the last surveys in this area.19,23 We describe 40 thresholding algorithms with the idea underlying them, categorize them according to the information content used, and describe their thresholding functions in a streamlined fashion. We also measure and rank their performance comparatively in two different contexts, namely, document images and NDT images. The image repertoire consists of printed circuit board PCB images, eddy current images, thermal images, microscope cell images, ultrasonic images, textile images, and reflective surfaces as in ceramics, microscope material images, as well as several document images. For an objective performance comparison, we employ a combination of five criteria of shape segmentation goodness. The outcome of this study is envisaged to be the formulation of the large variety of algorithms under a unified notation, the identification of the most appropriate types of binarization algorithms, and deduction of guidelines for novel algorithms. The structure of the work is as follows: Notation and general formulations are given in Sec. 2. In Secs. 3 to 8, respectively, histogram shape-based, clustering-based, entropy-based, object attribute-based, spatial information-based, and finally locally adaptive thresholding methods are described. In Sec. 9 we present the comparison methodology and performance criteria. The evaluation results of image thresholding methods, separately for nondestructive inspection and document process-

ing applications, are given in Sec. 10. Finally, Sec. 11 draws the main conclusions. 2 Categories and Preliminaries We categorize the thresholding methods in six groups according to the information they are exploiting. These categories are: 1. histogram shape-based methods, where, for example, the peaks, valleys and curvatures of the smoothed histogram are analyzed 2. clustering-based methods, where the gray-level samples are clustered in two parts as background and foreground object , or alternately are modeled as a mixture of two Gaussians 3. entropy-based methods result in algorithms that use the entropy of the foreground and background regions, the cross-entropy between the original and binarized image, etc. 4. object attribute-based methods search a measure of similarity between the gray-level and the binarized images, such as fuzzy shape similarity, edge coincidence, etc. 5. the spatial methods use higher-order probability distribution and/or correlation between pixels 6. local methods adapt the threshold value on each pixel to the local image characteristics. In the sequel, we use the following notation. The histogram and the probability mass function PMF of the image are indicated, respectively, by h(g) and by p(g), g 0...G, where G is the maximum luminance value in the image, typically 255 if 8-bit quantization is assumed. If the grayvalue range is not explicitly indicated as g min , g max], it will be assumed to extend from 0 to G. The cumulative probability function is defined as g P g i 0

p i .

It is assumed that the PMF is estimated from the histogram of the image by normalizing it to the total number of samples. In the context of document processing, the foreground object becomes the set of pixels with luminance values less than T, while the background pixels have luminance value above this threshold. In NDT images, the foreground area may consists of darker more absorbent, denser, etc. regions or conversely of shinier regions, for example, hotter, more reflective, less dense, etc., regions. In the latter contexts, where the object appears brighter than the background, obviously the set of pixels with luminance greater than T will be defined as the foreground. The foreground object and background PMFs are expressed as p f (g), 0 g T, and p b (g), T 1 g G, respectively, where T is the threshold value. The foreground and background area probabilities are calculated as:
T G

Pf T

Pf

p g , g 0

Pb T

Pb

p g . g T 1

1

Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 147

Sezgin and Sankur
Table 1 Thresholding functions for the shape-based algorithms. Shape – Rosenfeld24

T opt arg max p(g) Hull( g ) by considering object attributes, such as busyness. T opt first terminating zero of p ( g ) (1 ˜ ) first initiating zero of p ( g ) ˜ 0 1, p ( g ) d / dg p ( g ) * smoothing – kernel( g ) , ˜ where 1 and kernel size is 55 T opt T 0 , valley at the highest resolution T 1 ,... T k , given valleys at k lower resolutions , k 3
T G

Shape – Sezan

32

Shape – Olivio
30

Shape – Ramesh

Topt min g 0

b1 T

g

2

b2 T g T 1

g

2

where b 1 ( T ) m f ( T )/ P ( T ), b 2 ( T ) m b ( T ) 1 P ( T ) Shape – Guo28

Topt min g 1 1 p i 1 p i 1aiexp

j2 g/256

2

,

where a i

the n ’th order AR coefficients

The Shannon entropy, parametrically dependent on the threshold value T for the foreground and background, is formulated as:
T

duced in a paper by Sezan and to the clustering-based thresholding method first proposed by Otsu. Histogram Shape-Based Thresholding Methods This category of methods achieves thresholding based on the shape properties of the histogram see Table 1 . The shape properties come into play in different forms. The distance from the convex hull of the histogram is investigated in Refs. 20, and 24 –27, while the histogram is forced into a smoothed two-peaked representation via autoregressive modeling in Refs. 28 and 29. A more crude rectangular approximation to the lobes of the histogram is given in Refs. 30 and 31. Other algorithms search explicitly for peaks and valleys, or implicitly for overlapping peaks via curvature analysis.32–34 3

Hf T

g 0 G

p f g log p f g , 2 p b g log p b g .

Hb T

g T 1

The sum of these two is expressed as H(T) H f (T) H b (T). When the entropy is calculated over the input image distribution p(g) and not over the class distributions , then obviously it does not depend on the threshold T, and hence is expressed simply as H. For various other definitions of the entropy in the context of thresholding, with some abuse of notation, we use the same symbols of H f (T) and H b (T). The fuzzy measures attributed to the background and foreground events, that is, the degree to which the gray level, g, belongs to the background and object, respectively, and are symbolized by f (g) and b (g). The mean and variance of the foreground and background as functions of the thresholding level T can be similarly denoted as:
T T

mf T

gp g g 0 G

2 f

T g 0

g mf T

2

p g ,

3

mb T

gp g g T 1 G

Convex hull thresholding. Rosenfeld’s method24 Shape – Rosenfeld is based on analyzing the concavities of ` the histogram h(g) vis-a-vis its convex hull, Hull g , that is the set theoretic difference Hull(g) p(g) . When the convex hull of the histogram is calculated, the deepest concavity points become candidates for a threshold. In case of competing concavities, some object attribute feedback, such as low busyness of the threshold image edges, could be used to select one of them. Other variations on the theme can be found in Weszka and Rosenfeld,20,25 and Halada and Osokov.26 Sahasrabudhe and Gupta27 have addressed the histogram valley-seeking problem. More recently, Whatmough35 has improved on this method by considering the exponential hull of the histogram. Peak-and-valley thresholding. Sezan32 Shape – Sezan carries out the peak analysis by convolving the histogram function with a smoothing and differencing kernel. By adjusting the smoothing aperture of the kernel and resorting to peak merging, the histogram is reduced to a two-lobe function. The differencing operation in the kernel outputs the triplet of incipient, maximum, and terminating zerocrossings of the histogram lobe S (e i ,m i ,s i ),i 1,...2 . The threshold sought should be somewhere between the first terminating and second initiating zero crossing, that is:

4 g mb T
2

2 b

T g T 1

p g .

We refer to a specific thresholding method, which was programmed in the simulation analysis and whose formula appears in the table, with the descriptor, ‘‘category – author.’’ For example, Shape – Sezan and Cluster – Otsu, refer, respectively, to the shape-based thresholding method intro148 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

Survey over image thresholding techniques . . .

T opt e 1 (1 )s 2 , 0 1. In our work, we have found that 1 yields good results. Variations on this theme are provided in Boukharouba, Rebordao, and Wendel,36 where the cumulative distribution of the image is first expanded in terms of Tschebyshev functions, followed by the curvature analysis. Tsai37 obtains a smoothed histogram via Gaussians, and the resulting histogram is investigated for the presence of both valleys and sharp curvature points. We point out that the curvature analysis becomes effective when the histogram has lost its bimodality due to the excessive overlapping of class histograms. In a similar vein, Carlotto33 and Olivo34 Shape – Olivio consider the multiscale analysis of the PMF and interpret its fingerprints, that is, the course of its zero crossings and extrema over the scales. In Ref. 34 using a discrete dyadic wavelet transform, one obtains the multiresolution analysis of the histogram, p s (g) p(g) * s (g), s 1,2..., where p 0 (g) p(g) is the original normalized histogram. The threshold is defined as the valley minimum point following the first peak in the smoothed histogram. This threshold position is successively refined over the scales starting from the coarsest resolution. Thus starting with the valley point T (k) at the k’th coarse level, the position is backtracked to the corresponding extrema in the higher resolution histograms p (k 1) (g)...p (0) (g), that is, T (0) is estimated by refining the sequence T (1) ...T (k) in our work k 3 was used .

lobes of a histogram assumed distinct , some authors search for the midpoint of the peaks.38 – 41 In Refs. 42– 45, the algorithm is based on the fitting of the mixture of Gaussians. Mean-square clustering is used in Ref. 46, while fuzzy clustering ideas have been applied in Refs. 30 and 47. See Table 2 for these algorithms.

Iterative thresholding. Riddler38 Cluster – Riddler advanced one of the first iterative schemes based on two-class Gaussian mixture models. At iteration n, a new threshold T n is established using the average of the foreground and background class means. In practice, iterations terminate when the changes T n T n 1 become sufficiently small. Leung and Fam 39 and Trussel40 realized two similar methods. In his method, Yanni and Horne41 Cluster – Yanni initializes the midpoint between the two assumed peaks of the histogram as g mid (g max gmin)/2, where g max is the highest nonzero gray level and g min is the lowest one, so that (g max gmin) becomes the span of nonzero gray values in the histogram. This midpoint is updated using the mean of * the two peaks on the right and left, that is, as g mid (g peak1 g peak2 )/2. Clustering thresholding. Otsu46 Cluster – Otsu suggested minimizing the weighted sum of within-class variances of the foreground and background pixels to establish an optimum threshold. Recall that minimization of withinclass variances is tantamount to the maximization of between-class scatter. This method gives satisfactory results when the numbers of pixels in each class are close to each other. The Otsu method still remains one of the most referenced thresholding methods. In a similar study, thresholding based on isodata clustering is given in Velasco.48 Some limitations of the Otsu method are discussed in Lee and Park.49 Liu and Li50 generalized it to a 2-D Otsu algorithm. Minimum error thresholding. These methods assume that the image can be characterized by a mixture distribution of foreground and background pixels: p(g) P(T).p f (g) 1 P(T) .p b (g). Lloyd42 Cluster – Lloyd considers equal variance Gaussian density functions, and minimizes the total misclassification error via an iterative search. In contrast, Kittler and Illingworth43,45 Cluster – Kittler removes the equal variance assumption and, in essence, addresses a minimumerror Gaussian density-fitting problem. Recently Cho, Haralick, and Yi44 have suggested an improvement of this thresholding method by observing that the means and variances estimated from truncated distributions result in a bias. This bias becomes noticeable, however, only whenever the two histogram modes are not distinguishable. Fuzzy clustering thresholding. Jawahar, Biswas, and Ray47 Cluster – Jawahar – 1 , and Ramesh Yoo, and Sethi30 assign fuzzy clustering memberships to pixels depending on their differences from the two class means. The cluster means and membership functions are calculated as:

Shape-modeling thresholding. Ramesh, Yoo, and Sethi30 Shape – Ramesh use a simple functional approximation to the PMF consisting of a two-step function. Thus the sum of squares between a bilevel function and the histogram is minimized, and the solution for T opt is obtained by iterative search. Kampke and Kober31 have generalized the shape approximation idea. In Cai and Liu,29 the authors have approximated the spectrum as the power spectrum of multi-complex exponential signals using Prony’s spectral analysis method. A similar all-pole model was assumed in Guo28 Shape – Guo . We have used a modified approach, where an autoregressive AR model is used to smooth the histogram. Here one begins by interpreting the PMF and its mirror reflection around g 0, p( g), as a noisy power spectral density, given by ˜ (g) p(g) for g 0, and p( g) for g 0. One p then obtains the autocorrelation coefficients at lags k 0...G, by the inverse discrete fourier transform IDFT of the original histogram, that is, r(k) IDFT ˜ (g) . The aup tocorrelation coefficients r(k) are then used to solve for the n’th order AR coefficients a i . In effect, one smoothes the histogram and forces it to a bimodal or two-peaked representation via the n’th order AR model (n 1,2,3,4,5,6). The threshold is established as the minimum, resting between its two pole locations, of the resulting smoothed AR spectrum.
4 Clustering-Based Thresholding Methods In this class of algorithms, the gray-level data undergoes a clustering analysis, with the number of clusters being set always to two. Since the two clusters correspond to the two

mk

G g 0 g.p g G g 0p g

k k

g g

,

k

f ,b,

Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 149

Sezgin and Sankur
Table 2 Thresholding functions for clustering-based algorithms.

Topt
Cluster – Riddler34

lim n→ mf Tn
2
Tn

mb Tn

where
G

mf Tn g 0

gp g
* gmid

mb Tn g Tn 1

gp g

Cluster – Yanni41 Cluster – Otsu46

T opt

g max gmin g gmin

p g
2

T opt arg max Topt arg min

P T 1 P T mf T mb T 2 PT 2T 1 PT bT f mb T
2

mf T

Cluster – Lloyd24 Cluster – Kittler32

2

2 mf T mb T is the variance of the whole image.

log

1 PT PT

T opt arg min P(T)log f(T) 1 P(T) log b(T) P(T)log P(T) 1 P(T) log 1 P(T) where are foreground and background f ( T ), b ( T ) standard deviations. T opt arg equal g f (g) b( g )

Cluster – Jawahar – 147

where
T

d g,mk g 0

g mk 2, k b,f f (g) b( g )

T opt arg equal g Cluster – Jawahar – 247

where

d g,mk

1 g mk 2 k

2

log

k

log

k,

k b,f

f

g 1

1 d g,m f d g,m b

2/

1,

b

g

1

f

g .

In these expressions, d(...) is the Euclidean distance function between the gray-value g and the class mean, while is 1, one obtains the the fuzziness index. Notice that for K-means clustering. In our experiments we used 2. In a second method proposed by Jawahar, Biswas, and Ray47 Cluster – Jawahar – 2 , the distance function and the membership function are defined as for k f ,b): d g,m k 1 g mk 2 k
G g 0p k G g 0p 2

5 Entropy-Based Thresholding Methods This class of algorithms exploits the entropy of the distribution of the gray levels in a scene. The maximization of the entropy of the thresholded image is interpreted as indicative of maximum information transfer.51–55 Other authors try to minimize the cross-entropy between the input gray-level image and the output binary image as indicative of preservation of information,56 –59 or a measure of fuzzy entropy.60,61 Johannsen and Bille62 and Pal, King, and Hashim63 were the first to study Shannon entropy-based thresholding. See Table 3 for these algorithms.

log g b k

log

k,

g f k

g k k

g

g
2

,

Entropic thresholding. Kapur, Sahoo, and Wong53 Entropy – Kapur consider the image foreground and background as two different signal sources, so that when the sum of the two class entropies reaches its maximum, the image is said to be optimally thresholded. Following this idea, Yen, Chang, and Chang54 Entropy – Yen define the entropic correlation as
TC T Cb T log g 0

2 k

G g 0p g G g 0

g g mk g p g

Cf T
T

.

p g P T

2

G

log g T 1

p g 1 P T

2

In either method, the threshold is established as the crossover point of membership functions, i.e., T opt arg equal f (g) b (g) . g and obtain the threshold that maximizes it. This method corresponds to the special case of the following method in

150 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

Survey over image thresholding techniques . . .
Table 3 Thresholding functions for entropy-based algorithms.

T opt arg max Hf(T) Hb(T) with
Entropy – Kapur53
T

Hf T g 0

pg pg log and H b T PT PT
T
2

G

g T 1

p g pg log P T PT
2

T opt( T ) arg max Cb(T) Cf(T) with
Entropy – Yen54

Cb T Topt T
1

log g 0

pg PT
1 4

G

and C f T
1 4

log g T 1

pg 1 PT
3

PT 1 k •w•B1

•T

2

•w•B2 T
3

3

• 1 PT

1 4

•w•B3

T k

where P T Entropy – Sahoo55

p g , k 1,2,3, w P T g 0

P T
2 2 2

1

and
3 3 3

1,2,1

if T if T if T

1 1 1

T T T

2 2 2

5 5 5

and T and T and T

T T T

5 5 5

or T

1

T

2

5

and T

2

T

3

5

B1 ,B2 ,B3

0,1,3 3,1,0

Entropy – Pun – a51

T opt arg equal H f ( T ) H ( T ) where log P T arg max 1 log max p 1 ,...,p T
T

log 1 P T log max p T 1 ,...p G

Entropy – Pun – b

52

Topt arg g 0

pg

0.5

0.5

optimizing histogram symmetry by tuning .
T

T opt arg min
Entropy – Li
56,57

gp g log g 0

g mf T

G

gp g log g T 1

g mb T

where g T

g g T

m f T and g T

g g T

mb T .

T opt arg min H(T) where H ( T ) is
Entropy – Brink58
T g 0

mf T p g mf T log g
T

g g log mf T pf g qf g

G

p g mb T log
T 1

mb T g

g log

g mb T

T opt arg max Hf(T) Hb(T) where H f T g 0

p f g log pb g log pb g qb g

qf g log qb g pb g

qf g pf g

Entropy – Pal59

G

Hb T g T 1

qb g log

and q f g
T

exp

mf T

mf T g , g 0,...T , q b g g!
G

exp

mb T

mb T g , g T 1,...G . g!

T opt arg min Hf(T) Hb(T) where
Entropy – Shanbag
60

Hf T g 0

pg log PT

f

g , Hb T g T 1

pg log 1 PT

b

g

max H A, a,b,c A

1 Q Af log Q Af log 2

Q Ab log Q Ab

Entropy – Cheng61

where

A

is Zadeh’s membership with parameters a,b,c, and

Q Af g Af

p g , Q Ab g Ab

pg

Ref. 55 Entropy – Sahoo for the Renyi power 2. Sahoo, Wilkins, and Yeager55 combine the results of three different threshold values. The Renyi entropy of the foreground and background sources for some parameter are defined as: 1 1
T

Hb

1 1

G

ln g T 1

p g 1 P T

.

Hf

ln g 0

p g P T

and

They then find three different threshold values, namely, T 1 , T 2 , and T 3 , by maximizing the sum of the foreground and background Renyi entropies for the three ranges of , 0
Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 151

Sezgin and Sankur

1, 1, and 1, respectively. For example T 2 for 1 corresponds to the Kapur, Sahoo and Wong53 threshold value, while for 1, the threshold corresponds to that found in Yen, Chang, and Chang.54 Denoting T 1 , T 2 , and T 3 as the rank ordered T 1 , T 2 , and T 3 values, ‘‘optimum’’ T is found by their weighted combination. Finally, although the two methods of Pun51,52 have been superseded by other techniques, for historical reasons, we have included them Entropy – Pun1, Entropy – Pun2 . In Ref. 51, Pun considers the gray-level histogram as a G-symbol source, where all the symbols are statistically independent. He considers the ratio of the a posteriori enP(T)log P(T) 1 P(T) log 1 P(T) as tropy H (T) a function of the threshold T to that of the source entropy
T G

background regions, as in Pal59 Entropy – Pal . Using the maximum entropy principle in Shore and Johanson,64 the corresponding PMFs are defined in terms of class means: qf g exp mf T mf T g! mb T g! g , g g 0,...T,

qb g

exp

mb T

,

g T 1,...G.

Wong and Sahoo65 have also presented a former study of thresholding based on the maximum entropy principle.

H T g 0

p g log p g g T 1

p g log p g .

This ratio is lower bounded by H T H log P T log max p 1 ,..., p T 1 log 1 P T log max p T 1 ,... p G .

Fuzzy entropic thresholding. Shanbag60 Entropy – Shanbag considers the fuzzy memberships as an indication of how strongly a gray value belongs to the background or to the foreground. In fact, the farther away a gray value is from a presumed threshold the deeper in its region , the greater becomes its potential to belong to a specific class. Thus, for any foreground and background pixel, which is i levels below or i levels above a given threshold T, the membership values are determined by
T i 0.5 p T ... p T 1 i 2P T p T i ,

f

In a second method, the threshold52 depends on the anisotropy parameter , which depends on the histogram asymmetry.

that is, its measure of belonging to the foreground, and by T i 0.5 p T 1 ... p T 1 i 2 1 P T p T i ,

Cross-entropic thresholding. Li, Lee, and Tam Entropy – Li formulate the thresholding as the minimization of an information theoretic distance. This measure is the Kullback-Leibler distance
D q,p q g log q g p g

56,57

b

respectively. Obviously on the gray value corresponding to the threshold, one should have the maximum uncertainty, such that f (T) b (T) 0.5. The optimum threshold is found as the T that minimizes the sum of the fuzzy entropies, T opt arg min H 0 T
T T

of the distributions of the observed image p(g) and of the reconstructed image q(g). The Kullback-Leibler measure is minimized under the constraint that observed and reconstructed images have identical average intensity in their foreground and background, namely the condition g g T g T

H1 T

,

H0 T

g 0 G

p g log P T

0

g ,

mf T

and g T 58

g g T

mb T . H1 T

Entropy – Brink suggest that a Brink and Pendock threshold be selected to minimize the cross-entropy, defined as
T

g T 1

p g log 1 P T

1

g ,

H T g 0

q g log

q g p g

G

p g log g T 1

p g . q g

The cross-entropy is interpreted as a measure of data consistency between the original and the binarized images. They show that this optimum threshold can also be found by maximizing an expression in terms of class means. A variation of this cross-entropy approach is given by specifically modeling the a posteriori PMF of the foreground and
152 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

since one wants to get equal information for both the foreground and background. Cheng, Chen, and Sun’s method61 Entropy – Cheng relies on the maximization of fuzzy event entropies, namely, the foreground A f and background A b subevents. The membership function is assigned using Zadeh’s S function in Ref. 66. The probability of the foreground subevent Q(A f ) is found by summing those grayvalue probabilities that map into the A f subevent: Q Af p g g Af

Survey over image thresholding techniques . . .
Table 4 Thresholding functions for the attribute-based algorithms.

T opt arg equal m 1 b 1 ( T ), m 2 b 2 ( T ), m 1 b 3 ( T )
Attribute – Tsai70
G

where m k g 0

k p g g k and b k P f m fk P b m b

Attribute – Hertz67

T opt arg max Egray E binary( T ) , where E gray : gray-level edge field, E binary( T ) binary edge field Topt arg min
1 N2 log 2 g f G f
0

g,T log

f

g,T

Attribute – Huang82 where Attribute – Pikaz76

1 f g,T log 1 G

I i,j ,T

g,T p g G I i,j mf T f T opt Arg[most stable point of s-sized object function N s ( T )] T opt arg max pf log pf (1 pf)log(1 pf) pf( ff log ff bf log bf) (1 pf)( fb log fb bb log bb) where bf Prob(segmented as background belongs to the foreground) etc. Topt arg max Compactness over all foreground regions.

Attribute – Leung81

Attribute – Pal68

T

Area Perim

T T

2

,

and similarly for the background. Q Ab p g g Ab

as H A,

match the first three moments of the binary image. The gray-level moments m k and binary image moments b k are defined, respectively, as:
G

A

1 Q A f log Q A f log 2

Q A b log Q A b .

mk

p g gk g 0

and b k P f m k P b m k . f b

In other words, Q(A i ), i f ,b corresponds to the probabilities summed in the g domain for all gray values mapping into the A i subevent. One maximizes this entropy of the fuzzy event over the parameters a, b, c of the S function. The threshold T is the value g satisfying the partition for A (g) 0.5. 6 Thresholding Based on Attribute Similarity These algorithms select the threshold value based on some attribute quality or similarity measure between the original image and the binarized version of the image. These attributes can take the form of edge matching,67,15 shape compactness,68,69 gray-level moments,70–72 connectivity,73 texture,74,75 or stability of segmented objects.7,76 Some other algorithms evaluate directly the resemblance of the original gray-level image to binary image resemblance using fuzzy measure77–79 or resemblance of the cumulative probability distributions,80 or in terms of the quantity of information revealed as a result of segmentation.81 See Table 4 for examples.

Cheng and Tsai71 reformulate this algorithm based on neural networks. Delp and Mitchell72 have extended this idea to quantization.

Edge field matching thresholding. Hertz and Schafer67 Attribute – Hertz consider a multithresholding technique where a thinned edge field, obtained from the gray-level image E gray , is compared with the edge field derived from the binarized image E binary(T). The global threshold is given by the value that maximizes the coincidence of the two edge fields based on the count of matching edges, and penalizes the excess original edges and the excess thresholded image edges. Both the gray-level image edge field and the binary image edge field have been obtained via the Sobel operator. In a complementary study, Venkatesh and Rosin15 have addressed the problem of optimal thresholding for edge field estimation. Fuzzy similarity thresholding. Murthy and Pal77 were the first to discuss the mathematical framework for fuzzy thresholding, while Huang and Wang82 Attribute – Huang proposed an index of fuzziness by measuring the distance between the gray-level image and its crisp binary version. In these schemes, an image set is represented as the double 1 array F I(i, j), f I(i, j) , where 0 f I(i, j) represents for each pixel at location i,j its fuzzy measure to belong to the foreground. Given the fuzzy membership
Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 153

Moment preserving thresholding. Tsai70 Attribute – Tsai considers the gray-level image as the blurred version of an ideal binary image. The thresholding is established so that the first three gray-level moments

Sezgin and Sankur

value for each pixel, an index of fuzziness for the whole image can be obtained via the Shannon entropy or the Yager’s measure.78 The optimum threshold is found by minimizing the index of fuzziness defined in terms of class foreground, background medians or means m f (T), m b (T) and membership functions f I(i, j),T , b I(i, j),T . Ramar et al.79 have evaluated various fuzzy measures for threshold selection, namely linear index of fuzziness, quadratic index of fuzziness, logarithmic entropy measure, and exponential entropy measure, concluding that the linear index works best.

N

Perim i, j 1 N

I i, j

I i, j

1

I i, j i, j 1

I i 1,j

,

Topological stable-state thresholding. Russ7 has noted that experts in microscopy subjectively adjust the thresholding level at a point where the edges and shape of the object get stabilized. Similarly Pikaz and Averbuch76 Attribute – Pikaz pursue a threshold value, which becomes stable when the foreground objects reach their correct size. This is instrumented via the size-threshold function N s (T), which is defined as the number of objects possessing at least s number of pixels. The threshold is established in the widest possible plateau of the graph of the N s (T) function. Since noise objects rapidly disappear with shifting the threshold, the plateau in effect reveals the threshold range for which foreground objects are easily distinguished from the background. We chose the middle value of the largest sized plateau as the optimum threshold value. Maximum information thresholding. Leung and Lam81 Attribute – Leung define the thresholding problem as the change in the uncertainty of an observation on specification of the foreground and background classes. The presentation of any foreground/background information reduces the class uncertainty of a pixel, and this information gain is H(p f ) (1 )H(p b ), where H( p) measured by H(p) is the initial uncertainty of a pixel and is the probability of a pixel to belong to the foreground class. The optimum threshold is established as that generating a segmentation map that, in turn, minimizes the average residual uncertainty about which class a pixel belongs after the segmented image has been observed. Such segmentation would obviously minimize the wrong classification probability of pixels, in other words, the false alarms f b pixel appears in the foreground while actually belonging to the background and the miss probability b f . According to this notation f f , bb denote the correct classification conditionals. The optimum threshold corresponds to the maximum decrease in uncertainty, which implies that the segmented image carries as close a quantity of information as that in the original information. Enhancement of fuzzy compactness thresholding. Rosenfeld generalized the concept of fuzzy geometry.69 For example, the area of a fuzzy set is defined as
N

where the summation is taken over any region of nonzero membership, and N is the number of regions in a segmented image. Pal and Rosenfeld68 Attribute – Pal evaluated the segmentation output, such that both the perimeter and area are functions of the threshold T. The optimum threshold is determined to maximize the compactness of the segmented foreground sets. In practice, one can use the standard S function to assign the membership function at I(i, j) S I(i, j);a,b,c , as in the pixel I(i, j): Kaufmann,66 with crossover point b (a c)/2 and bandwidth b b a c b. The optimum threshold T is found by exhaustively searching over the (b, b) pairs to minimize the compactness figure. Obviously the advantage of the compactness measure over other indexes of fuzziness is that the geometry of the objects or fuzziness in the spatial domain is taken into consideration. Other studies involving image attributes are as follows. In the context of document image binarization, Liu, Srihari, and Fenrich74,75 have considered document image binarization based on texture analysis, while Don83 has taken into consideration noise attribute of images. Guo84 develops a scheme based on morphological filtering and the fourth order central moment. Solihin and Leedham85 have developed a global thresholding method to extract handwritten parts from low-quality documents. In another interesting approach, Aviad and Lozinskii86 have introduced semantic thresholding to emulate the human approach to image binarization. The semantic threshold is found by minimizing measures of conflict criteria, so that the binary image resembles most to a verbal description of the scene. Gallo and Spinello87 have developed a technique for thresholding and isocontour extraction using fuzzy arithmetic. Fernandez80 has investigated the selection of a threshold in matched filtering applications in the detection of small target objects. In this application, the Kolmogorov-Smirnov distance between the background and object histograms is maximized as a function of the threshold value. 7 Spatial Thresholding Methods This class of algorithms utilizes not only gray value distribution but also dependency of pixels in a neighborhood, for example, in the form of context probabilities, correlation functions, cooccurrence probabilities, local linear dependence models of pixels, 2-D entropy, etc. One of the first to explore spatial information was Kirby and Rosenfeld,88 who considered local average gray levels for thresholding. Others have followed using relaxation to improve on the binary map as in Refs. 89 and 90, the Laplacian of the images to enhance histograms,25 the quadtree thresholding,91 and second-order statistics.92 Cooccurrence probabilities have been used as indicators of spatial dependence as in Refs. 93–96. The characteristics of ‘‘pixels jointly with their local average’’ have been considered via their second-order entropy as in Refs. 97–100 and via the fuzzy partitioning as in Refs. 101, 102, and 103. The local

Area i, j 1

I i, j

while its perimeter is given by
154 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

Survey over image thresholding techniques . . .
Table 5 Thresholding functions for spatial thresholding methods.

Spatial – Pal – 1 and Spatial – Pal – 294

T opt arg max Hbb(T) Hff(T) or T opt arg max Hfb(T) Hbf(T) where H fb ( T ), H bf ( T ), H ff ( T ), H bb ( T ) are the cooccurrence entropies ¯ ¯ ¯ ( T opt , T opt) arg min log P(T,T) 1 P(T,T) ¯) Hb / 1 P(T,T where
T ¯ T

¯ Hf /P(T,T)

Hf i 1 j 1

p g,g ¯ ¯ P T,T
G

log

p g ,g ¯ ¯ P T,T p g ,g ¯ ¯ 1 P T,T

and
G
97

Hb i T 1j T 1 ¯

p g ,g ¯ ¯ 1 P T,T s s

log

Spatial – Abutaleb

Topt arg min k 0

pblock T •log pblock T k k

Spatial – Beghdadi104

where p block( T ) is the probability of s s size blocks k containing k whites and s 2 k blacks ( s 2,4,8,16)

T opt maxa,b,c Hfuzzy(foreground) H fuzzy(background)
Spatial – Cheng101 where H fuzzy A x,y A

x , y p x , y log p x,y ,

a,b,c , the S-function parameters; A foreground, background ; x , y pixel value, local average value within 3 3 region .

spatial dependence of pixels is captured in Ref. 104 as binary block patterns. Thresholding based on explicit a posteriori spatial probability estimation was analyzed in Ref. 105, and thresholding as the max-min distance to the extracted foreground object was considered in Ref. 106. See Table 5 for these methods.

Cooccurrence thresholding methods. Chanda and Majumder96 have suggested the use of cooccurrences for threshold selection, and Lie93 has proposed several measures to this effect. In this vein, Pal94 Spatial – Pal , realizing that two images with identical histograms can yet have different n’th order entropies due to their spatial structure, considered the cooccurrence probability of the gray values g 1 and g 2 over its horizontal and vertical neighbors. Thus the pixels, first binarized with threshold value T, are grouped into background and foreground regions. The cooccurrence of gray levels k and m is calculated as c k,m , where all pixels

Chang, Chen, Wang and Althouse95 establish the threshold in such a way that the cooccurrence probabilities of the original image and of the binary image are minimally divergent. As a measure of similarity, the directed divergence or the Kullback-Leibler distance is used. More specifically, consider the four quadrants of the cooccurrence matrix as illustrated in Fig. 1, where the first quadrant denotes the background-to-background bb transitions, and the third quadrant to the foreground-to-foreground ff transitions. Similarly, the second and fourth quadrants denote, respectively, the background-to-foreground bf and the foreground-to-background fb transitions. Using the cooccurrence probabilities pij, that is, the score of i to j gray level transitions normalized by the total number of transitions the quadrant probabilities are obtained as:

1 if 1 m ∨ I i, j k ∧ I i 1,j m ,

I i, j

k ∧ I i, j

and 0 otherwise. Pal proposes two methods to use the cooccurrence probabilities. In the first expression, the binarized image is forced to have as many background-toforeground and foreground-to-background transitions as possible. In the second approach, the converse is true, in that the probability of the neighboring pixels staying in the same class is rewarded.

Fig. 1 Co-occurrence matrix.

Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 155

Sezgin and Sankur
T T 0 T G T 1

P bb T

i 0 j G

pij , Pbf T
T 0

i 0 j G

pij ,
G T 1

Pfb T

i T 1 j

pij , P f f T

i T 1 j

pij ,

and similarly for the thresholded image, one finds the quantities
T T 0 T G T 1

Prob block B k . Here p block represents the probability k of the block containing k (0 k s s) whites irrespective of the binary pixel configurations. An optimum gray level threshold is found by maximizing the entropy function of the block probabilities. The choice of the block size is a compromise between image detail and computational complexity. As the block size becomes large, the number of configurations increases rapidly; on the other hand, small blocks may not be sufficient to describe the geometric content of the image. The best block size is determined by searching over 2 2, 4 4, 8 8, and 16 16 block sizes.

Q bb T

i 0 j G

qij ,
T 0

Qbf T

i 0 j G

qij ,
G T 1

Q fb T

i T 1 j

qij ,

Qff T

i T 1 j

qij ,

T opt argmin P bb T log Q bb T P f f T log Q f f T

P b f T log Q b f T

P f b T log Q f b T .

Higher-order entropy thesholding. Abutaleb97 Spatial – Abutaleb considers the joint entropy of two related random variables, namely, the image gray value g at a pixel, and the average gray value ¯ of a neighborhood ceng tered at that pixel. Using the 2-D histogram p(g,g ), for any ¯ ¯ ), one can calculate the cumulative disthreshold pair (T,T ¯ tribution P(T,T ), and then define the foreground entropy as
T ¯ T 1

Thresholding based on random sets. The underlying idea in the method is that each grayscale image gives rise to the distribution of a random set. Friel and Mulchanov106 consider that each choice of threshold value gives rise to a set of binary objects with differing distance property, denoted by F T the foreground according to the threshold T . The distance function can be taken as Chamfer distance.107 Thus, the expected distance function at a pixel location i,j , ¯ (i, j) is obtained by averaging the distance maps d d(i, j;F T ) for all values of the threshold values from 0 to G, or alternately by weighting them with the corresponding histogram value. Then for each value of T, the L norm of the signed difference function between the average distance map and the individual distance maps corresponding to the threshold values is calculated. Finally, the threshold is defined as that gray value that generates a foreground map most similar in their distance maps to the distance-averaged foreground. d T opt min maxi, j ¯ i, j d i, j;F T ,

Hf

p g,g ¯ ¯ P T,T

log

¯ p g,g ¯ P T,T

.

i 1 j

Similarly, one can define the background region’s second order entropy. Under the assumption that the off-diagonal ¯ terms, that is the two quadrants (0,T),(T ,G) and ¯ ) are negligible and contain elements only (T,G),(0,T ¯ due to image edges and noise, the optimal pair (T,T ) can be found as the minimizing value of the 2-D entropy functional. In Wu, Songde, and Hanqing,10 a fast recursive ¯ method is suggested to search for the (T,T ) pair. Cheng and Chen98 have presented a variation of this theme by using fuzzy partitioning of the 2-D histogram of the pixels and their local average. Li, Gong, and Chen99 have investigated the Fisher linear projection of the 2-D histogram. Brink100 has modified Abutaleb’s expression by redefining class entropies and finding the threshold as the value that maximizes the minimum maximin of the foreground and ¯ background entropies: more explicitly, (T opt ,T opt) ¯ ¯ max min H f (T,T),Hb(T,T) . Beghdadi, Negrate, and Lesegno104 Spatial – Beghdadi , on the other hand, exploit the spatial correlation of the pixels using entropy of block configurations as a symbol source. For any threshold value T, the image becomes a set of juxtaposed binary blocks of size s s pixels. Letting B k 2 represent the subset of (s s) blocks out of N 2 s containing k whites and K-k blacks, their relative population becomes the binary source probabilities p block k
156 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

where d(i, j;E T ), Chamfer distance to the foreground obd ject F T , and ¯ (i, j) is the average distance.

2-D fuzzy partitioning. Cheng and Chen101 Spatial – Cheng , combine the ideas of fuzzy entropy and the 2-D histogram of the pixel values and their local 3 3 averages. Given a 2-D histogram, it is partitioned into fuzzy dark and bright regions according to the S function given also in Kaufmann.66 The pixels x i are assigned to A i.e., background or foreground according to the fuzzy rule A (x i ), which in turn is characterized by the three parameters a,b,c . To determine the best fuzzy rule, the Zadeh’s fuzzy entropy formula is used,
H fuzzy A x,y p x,y log p x,y ,

x,y

A

where x and y are, respectively, pixel values and pixel average values, and where A can be foreground and background events. Thus, optimum threshold is established by exhaustive searching over all permissible a,b,c values using the genetic algorithm to maximize the sum of foreground and background entropies, or alternatively, as the crossover point which has membership 0.5, implying the largest fuzziness. Brink102,103 has considered the concept of spatial entropy that indirectly reflects the cooccurrence statistics. The spatial entropy is obtained using the 2-D PMF

Survey over image thresholding techniques . . .
Table 6 Thresholding functions for locally adaptive methods.

Local – Niblack110

T(i,j) m(i,j) k. (i,j) 0.2 and local window size is b 15 where k i,j 1 R where k 0.5 and R 128 T i,j m i,j
1 k. 1

Local – Sauvola111

B i,j
Local – White112

if m w

w

i,j

I i , j * bias

0 otherwise where m w w ( i , j ) is the local mean over a w 15-sized window and bias 2.

Local – Bernsen113

T ( i , j ) 0.5 maxw I(i m,j n) minw I(i m,j n) where w 31, provided contrast C ( i , j ) I high( i , j ) I low( i , j ) 15. B ( i , j ) 1 if I ( i , j ) T 1 or m neighT 3 T 5 m centerT 4 where T 1 20, T 2 20, T 3 0.85, T 4 1.0, T 5 0, neighborhood size is 3 3. limn → T n ( i , j ) T n
1( i , j )

Local – Palumbo21 Local – Yanowitz115

R n ( i , j )/4

where R n ( i , j ) is the thinned Laplacian of the image.

Local – Kamel1

B ( i , j ) 1 if L ( i b , j )∧ L ( i b , j ) ∨ L ( i , j b )∧ L ( i , j b) L ( i b , j b )∧ L ( i b , j b ) ∨ L ( i b , j b )∧ L ( i b , j b ) where 1 if m w w i , j I i , j T0 L i,j , w 17, T 0 40 0 otherwise
Define the optimal threshold value ( T opt) by using a global thresholding method, such as the Kapur53 method, then locally fine tune the pixels between T 0 T 1 considering local covariance ( T 0 T opt T 1 ).

Local – Oh13 Local – Yasuda114

B ( i , j ) 1 if m w w ( i , j ) T 3 or w w ( i , j ) T 4 where w 3, T 1 50, b 16, T 2 16, T 3 128, T 4 35

p(g,g ), where g and g are two gray values occurring at a lag , and where the spatial entropy is the sum of bivariate Shannon entropy over all possible lags. 8 Locally Adaptive Thresholding In this class of algorithms, a threshold is calculated at each pixel, which depends on some local statistics like range, variance, or surface-fitting parameters of the pixel neighborhood. In what follows, the threshold T(i, j) is indicated as a function of the coordinates i,j at each pixel, or if this is not possible, the object/background decisions are indicated by the logical variable B(i, j). Nakagawa and Rosenfeld,108 and Deravi and Pal,109 were the early users of adaptive techniques for thresholding. Niblack110 and Sauvola and Pietaksinen111 use the local variance, while the local contrast is exploited by White and Rohrer,112 Bernsen,113 and Yasuda, Dubois, and Huang.114 Palumbo, Swaminathan, and Srihari,21 and Kamel and Zhao1 built a center-surround scheme for determining the threshold. A surface fitted to the gray-level landscape can also be used as a local threshold, as in Yanowitz and Bruckstein,115 and Shen and Ip.116 See Table 6 for these methods.

b 15 and a bias setting of k 0.2 were found satisfactory. Sauvola and Pietaksinen’s method111 Local – Sauvola is an improvement on the Niblack method, especially for stained and badly illuminated documents. It adapts the contribution of the standard deviation. For example, in the case of text on a dirty or stained paper, the threshold is lowered.

Local variance methods. The method from Niblack110 Local – Niblack adapts the threshold according to the local mean m(i, j) and standard deviation (i, j) and calculated a window size of b b. In Trier and Jain,3 a window size of

Local contrast methods. White and Rohrer112 Local – White compares the gray value of the pixel with the average of the gray values in some neighborhood (15 15 window suggested about the pixel, chosen approximately to be of character size. If the pixel is significantly darker than the average, it is denoted as character; otherwise, it is classified as background. A comparison of various local adaptive methods, including White and Rohrer’s, can be found in Venkateswarluh and Boyle.117 In the local method of Bernsen113 Local – Bernsen , the threshold is set at the midrange value, which is the mean of the minimum I low(i, j) and maximum I high(i, j) gray values in a local window of suggested size w 31. However, if the contrast C(i, j) I high(i, j) I low(i, j) is below a certain threshold this contrast threshold was 15 , then that neighborhood is said to consist only of one class, print or background, depending on the value of T(i, j). In Yasuda, Dubois, and Huang’s method114 Local – Yasuda , one first expands the dynamic range of the image, followed by a nonlinear smoothing, which preserves
Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 157

Sezgin and Sankur

the sharp edges. The smoothing consists of replacing each pixel by the average of its eight neighbors, provided the local pixel range defined as the span between the local maximum and minimum values is below a threshold T 1 . An adaptive threshold is applied, whereby any pixel value is attributed to the background i.e., set to 255 if the local range is below a threshold T 2 or the pixel value is above the local average, both computed over w w windows. Otherwise, the dynamic range is expanded accordingly. Finally, the image is binarized by declaring a pixel to be an object pixel if its minimum over a 3 3 window is below T 3 or its local variance is above T 4 .

resolution analysis,122 foreground and background clustering,123 and joint use of horizontal and vertical derivatives.124

Center-surround schemes. Palumbo, Swaminathan, and Srihari’s algorithm21 Local – Palumbo , based on an improvement of a method in Giuliano, Paitra, and Stringer,118 consists in measuring the local contrast of five 3 3 neighborhoods organized in a center-surround scheme. The central 3 3 neighborhood A center of the pixel is supposed to capture the foreground background , while the four 3 3 neighborhoods, called in ensemble A neigh , in diagonal positions to A center , capture the background. The algorithm consists of a two-tier analysis: if I(i, j) T 1 , then B(i, j) 1. Otherwise, one computes the average m neigh of those pixels in A neigh that exceed the threshold T 2 , and compares it with the average m center of the A center pixels. The test for the remaining pixels consists of the inequality, such that, if m neighT 3 T 5 m centerT 4 , then B(i, j) 1. In Palumbo, Swaminathan, and Srihari,21 the following threshold values have been suggested: T 1 20, T 2 20, T 3 0.85, T 4 1.0, and T 5 0. The idea in Kamel and Zhao’s1 Local – Kamel method is to compare the average gray value in blocks proportional to the object width e.g., stroke width of characters to that of their surrounding areas. If b is the estimated stroke width, averages are calculated over a w w window, where w 2b 1. Their approach, using the comparison operator L(i, j) is somewhat similar to smoothed directional derivatives. The following parameter settings have been found appropriate: b 8, and T 0 40 (T 0 is the comparison value . Recently, Yang and Yan have improved on the method of Kamel and Zhao by considering various special conditions.119 Surface-fitting thresholding. In Yanowitz and Bruckstein’s115 Local – Yanowitz method, edge, and gray level information is combined to construct a threshold surface. First, the image gradient magnitude is thinned to yield local gradient maxima. The threshold surface is constructed by interpolation with potential surface functions using a successive overrelaxation method. The threshold is obtained iteratively using the discrete Laplacian of the surface. A recent version of surface fitting by variational methods is provided by Chan, Lam, and Zhu.120 Shen and Ip116 used a Hopfield neural network for an active surface paradigm. There have been several other studies for local thresholding, specifically for badly illuminated images, as in Parker.121 Other local methods involve Hadamard multi158 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

Kriging method. Oh’s method Local – Oh is a two-pass algorithm. In the first pass, using an established nonlocal thresholding method, such as Kapur, Sahoo, and Wong,53 the majority of the pixel population is assigned to one of the two classes object and background . Using a variation of Kapur’s technique, a lower threshold T 0 is established, below which gray values are surely assigned to class 1, e.g., an object. A second higher threshold T 1 is found, such that any pixel with gray value g T 1 is assigned to class 2, i.e., the background. The remaining undetermined pixels with gray values T 0 g T 1 are left to the second pass. In the second pass, called the indicator kriging stage, these pixels are assigned to class 1 or class 2 using local covariance of the class indicators and the constrained linear regression technique called kriging, within a region with r 3 pixels radius 28 pixels . Among other local thresholding methods specifically geared to document images, one can mention the work of Kamada and Fujimoto,125 who develop a two-stage method, the first being a global threshold, followed by a local refinement. Eikvil, Taxt, and Moen126 consider a fast adaptive method for binarization of documents, while Pavlidis127 uses the second-derivative of the gray level image. Zhao and Ong128 have considered validity-guided fuzzy c-clustering to provide thresholding robust against illumination and shadow effects.
9 Thresholding Performance Criteria Automated image thresholding encounters difficulties when the foreground object constitutes a disproportionately small large area of the scene, or when the object and background gray levels possess substantially overlapping distributions, even resulting in an unimodal distribution. Furthermore, the histogram can be noisy if its estimate is based on only a small sample size, or it may have a comb-like structure due to histogram stretching/equalization efforts. Consequently, misclassified pixels and shape deformations of the object may adversely affect the quality-testing task in NDT applications. On the other hand, thresholded document images may end up with noise pixels both in the background and foreground, spoiling the original character bitmaps. Thresholding may also cause character deformations such as chipping away of character strokes or conversely adding bumps and merging of characters among themselves and/or with background objects. Spurious pixels as well as shape deformations are known to critically affect the character recognition rate. Therefore, the criteria to assess thresholding algorithms must take into consideration both the noisiness of the segmentation map as well as the shape deformation of the characters, especially in the document processing applications. To put into evidence the differing performance features of thresholding methods, we have used the following five performance criteria: misclassification error ME , edge mismatch EMM , relative foreground area error RAE , modified Hausdorff distance MHD , and region nonuniformity NU . Obviously, these five criteria are not all inde-

Survey over image thresholding techniques . . .

pendent: for example, there is a certain amount of correlation between misclassification error and relative foreground area error, and similarly, between edge mismatch and Hausdorff distance, both of which penalize shape deformation. The region nonuniformity criterion is not based on groundtruth data, but judges the intrinsic quality of the segmented areas. We have adjusted these performance measures so that their scores vary from 0 for a totally correct segmentation to 1 for a totally erroneous case.

close to 0, while the worst case of NU 1 corresponds to an image for which background and foreground are indistinguishable up to second order moments.

Misclassification error. Misclassification error ME ,129 reflects the percentage of background pixels wrongly assigned to foreground, and conversely, foreground pixels wrongly assigned to background. For the two-class segmentation problem, ME can be simply expressed as:
ME 1 BO BT BO FO FT , FO 5

Relative foreground area error. The comparison of object properties such as area and shape, as obtained from the segmented image with respect to the reference image, has been used in Zhang31 under the name of relative ultimate measurement accuracy RUMA to reflect the feature measurement accuracy. We modified this measure for the area feature A as follows:
A0 AT A0 AT A0 AT if A T A 0 , if A T A 0 8

RAE

where B O and F O denote the background and foreground of the original ground-truth image, B T and F T denote the background and foreground area pixels in the test image, and . is the cardinality of the set. The ME varies from 0 for a perfectly classified image to 1 for a totally wrongly binarized image.

where A 0 is the area of reference image, and A T is the area of thresholded image. Obviously, for a perfect match of the segmented regions, RAE is zero, while if there is zero overlap of the object areas, the penalty is the maximum one.

Edge mismatch. This metric penalizes discrepancies between the edge map of the gray level image and the edge map obtained from the thresholded image. The edge mismatch metric is expressed as:6
EMM 1 dk D max CE k , , with

Shape distortion penalty via Hausdorff distance. The Hausdorff distance can be used to assess the shape similarity of the thresholded regions to the ground-truth shapes. Recall that, given two finite sets of points, say ground-truth and thresholded foreground regions, their Hausdorff distance is defined as
H F O ,F T max d H F O ,F T ,d H F T ,F O , max d f O ,F T f O FO

CE if d k

k

EO

k

ET

k

where d H F O ,F T

maxdist 6

k

otherwise

max min f O f O FO f T FT

fT ,

where CE is the number of common edge pixels found between the ground-truth image and the thresholded image, EO is the set of excess ground-truth edge pixels missing in the threshold image, ET is the set of excess thresholded edge pixels not taking place in the ground truth, is the penalty associated with an excess original edge pixel, and is the ratio of the penalties associated with an finally excess threshold edge pixel to an excess original edge pixel. Here d k denotes the Euclidean distance of the k’th excess edge pixel to a complementary edge pixel within a search area determined by the maxdist parameter. It has been suggested6 to select the parameter as maxdist 0.025N, where N is the image dimension, D max 0.1N, 10/N, and 2.

and f O f T denotes the Euclidean distance of two pixels in the ground-truth and thresholded objects. Since the maximum distance is sensitive to outliers, we have measured the shape distortion via the average of the modified Hausdorff distances MHD 132 over all objects. The modified distance is defined as: MHD F O ,F T 1 FO d f O ,F T . 9

f O FO

Region nonuniformity. This measure,130,131 which does not require ground-truth information, is defined as
NU FT FT BT
2 f 2,

For example, the MHDs are calculated for each 19 19 pixel character box, and then the MHDs are averaged over all characters in a document. Notice that, since an upper bound for the Hausdorff distance cannot be established, the MHD metric could not be normalized to the interval 0, 1 , and hence is treated separately by dividing each MHD value to the highest MHD value over the test image set NMHD .

7

where 2 represents the variance of the whole image, and 2 f represents the foreground variance. It is expected that a well-segmented image will have a nonuniformity measure

Combination of measures. To obtain an average performance score from the previous five criteria, we have considered two methods. The first method was the arithmetic averaging of the normalized scores obtained from the ME, EMM, NU, NMHD, and RAE criteria. In other words,
Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 159

Sezgin and Sankur

Fig. 2 Sample NDT images and their ground truths.

given a thresholding algorithm, for each image the average of ME, EMM, NU, and RAE was an indication of its segmentation quality. In turn, the sum of these image quality scores determines the performance of the algorithm. In the second method, we used rank averaging, so that, for each test image, we ranked the thresholding algorithms from 1 to 40 according to each criterion separately. Then the ranks not the actual scores were averaged over both the images and the five criteria ME, EMM, NU, RAE, and NMHD. A variation of this scheme could be to first take the arithmetic average over the criteria for each image, then rank the thresholding methods, and finally average the ranks. We experimented with the previous two score averaging methods arithmetic and rank averaging of quality measures , and we found that they resulted in fairly similar ranking of the thresholding algorithms. Consequently, we chose the arithmetic averaging method, as it was more straightforward. Thus the performance measure for the i’th image is written in terms of the scores of the five metrics as:

10

Dataset and Experimental Results

10.1 Dataset Our test data consisted of a variety of 40 NDT and 40 document images.

S i

ME i

EMM i

NU i

RAE i 10

NMHD i /5.
160 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

Nondestructive testing images. The variety of NDT we considered consisted of eight eddy current, for thermal, two ultrasonic, six light microscope, four ceramic, six material, two PCB, and eight cloth images. A few samples of the NDT image set are given in Fig. 2. Eddy current image inspection is frequently used for the detection of invisible small cracks and defects of different materials including aircraft fuselages. A defective eddy current image and its ground-truth segmentation map are illustrated in Figs. 2 a and 2 i , where the dark region, representing the rivet surroundings, must be circular in a healthy case. Infrared thermographs are used, among other applications, for surface defect detection in aircraft materials, such as carbon fiber reinforced composites. A defective thermal image specimen and its segmentation ground truth are illustrated in Figs. 2 b and 2 j . An ultrasonic image of a defective glass-fiber reinforced plastics GFRP image and

Survey over image thresholding techniques . . .

Fig. 3 Sample degraded document images.

Fig. 4 Thresholding results of sample NDT images.

Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 161

Sezgin and Sankur

Fig. 5 Thresholding results of sample document images.

its ground truth are given in Figs. 2 c and 2 k . In material science applications, the microstructure of materials is frequently inspected by light microscopy. These observations yield information on the phases of the material, as well as on porosity, particle sizes, uniformity of distribution, etc. A sample image of light microscopy and its ground-truth segmentation map images are displayed in Figs. 2 d and 2 l . Tile and cloth quality testing application images and their ground truths are given in Figs. 2 e , 2 m , 2 f , and 2 n , respectively. Visual inspection of PCB boards, as practiced today on the production line, is a tedious and error-prone task. Computer-vision-based automatic inspection schemes are increasingly being deployed,133 where the first processing stage is again thresholding. The thresholding and subsequent processing aims to put into evidence such defects as broken lines, undrilled vias, etc. An example PCB image
162 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

and ground truth are given in Figs. 2 g and 2 c . Finally a defective fuselage material image and its ground truth are given in Figs. 2 h and 2 p .

Document image applications. 40 documents containing ground-truth character images were created with different fonts times new roman, arial, comics, etc. , sizes 10,12,14 , and typefaces normal, bold, italic, etc. . Furthermore, to simulate more realistic documents such as the effects of the poor quality of paper, photocopied and faxed documents, etc., degraded documents were set using Baird134 degradation models. The simulated document defects were blur and speckle noise since, among the several other defects proposed in Baird,134 these two had a direct bearing on thresholding. Three levels of document degradation, namely light, medium, and poor, were used. Sample degraded document images a small part of real images are

Survey over image thresholding techniques . . .
Table 7 Thresholding evaluation ranking of 40 NDT images according to the overall average quality score. Average score (AVE) 0.256 0.261 0.269 0.289 0.292 0.318 0.328 0.339 0.351 0.364 0.370 0.383 0.391 0.401 0.423 0.427 0.431 0.433 0.442 0.458 Average ¯ score (S) 0.460 0.481 0.484 0.550 0.554 0.573 0.587 0.588 0.590 0.591 0.619 0.619 0.638 0.642 0.665 0.665 0.697 0.707 0.735 0.753

Rank 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Method Cluster – Kittler Entropy – Kapur Entropy – Sahoo Entropy – Yen Cluster – Lloyd Cluster – Otsu Cluster – Yanni Local – Yanowitz Attribute – Hertz Entropy – Li Spatial – Abutaleb Attribute – Pikaz Shape – Guo Cluster – Ridler Cluster – Jawahar – b Attribute – Huang Shape – Sezan Entropy – Shanbag Shape – Rosenfeld Shape – Olivio

Rank 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

Method Shape – Ramesh Spatial – Cheng Attribute – Tsai Local – Bernsen Spatial – Pal – a Local – Yasuda Local – Palumbo Entropy – Sun Attribute – Leung Entropy – Pun – a Spatial – Beghdadi Local – Oh Local – Niblack Spatial – Pal – b Entropy – Pun – b Local – White Local – Kamel Local – Sauvola Cluster – Jawahar – a Entropy – Brink

Table 8 Thresholding evaluation ranking of 40 degraded document images according to the overall average quality score. Average score (AV) 0.046 0.066 0.08 0.09 0.093 0.110 0.114 0.136 0.144 0.145 0.148 0.149 0.156 0.17 0.18 0.195 0.197 0.251 0.259 0.288 Average ¯ score (S) 0.300 0.308 0.317 0.320 0.336 0.39 0.391 0.463 0.475 0.514 0.515 0.533 0.539 0.566 0.593 0.596 0.605 0.663 0.711 0.743

Rank 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Method Cluster – Kittler Local – Sauvola Local – White Local – Bernsen Shape – Ramesh Attribute – Leung Entropy – Li Cluster – Ridler Entropy – Shanbag Shape – Sezan Entropy – Shaoo Entropy – Kapur Entropy – Yen Entropy – Brink Cluster – Lloyd Local – Palumbo Cluster – Otsu Cluster – Jawahar – b Attribute – Pikaz Local – Yanowitz

Rank 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

Method Cluster – Yanni Attribute – Tsai Attribute – Hertz Spatial – Cheng Local – Yasuda Entropy – Sun Local – Kamel Entropy – Pun – a Local – Niblack Local – Oh Spatial – Abutaleb Spatial – Pal – a Spatial – Beghdadi Attribute – Huang Entropy – Pun – b Shape – Guo Spatial – Pal – b Shape – Rosenfeld Shape – Olivio Cluster – Jawahar – a

Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 163

Sezgin and Sankur

Fig. 6 Sample performance score distributions of best and worst thresholding methods over the NDT images.

shown in Fig. 3. The blur was modeled by a circularly symmetric Gaussian filter, representing the point spread function, with standard error of blur in units of output pixel size. The blur size was chosen, in pixel units, as 5 5.
164 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

10.2 Experimental Results Representative visual results and their quantitative scores are given in Fig. 4 for NDT images and in Fig. 5 for document images. The overall evaluation result of NDT images

Survey over image thresholding techniques . . .

Fig. 7 Sample performance score distributions of best and worst thresholding methods over the document images.

is given in Table 7, while the performance scores for document images are shown in Table 8. In these tables, the final score of each thresholding method is calculated by taking the average of the ME, EMM, NU, NMHD, and RAE mea-

sures over 40 images. It is interesting to point out the following. • As it was conjectured, the rankings of the thresholding
Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 165

Sezgin and Sankur

algorithms differ under NDT and document applications. In fact, only the Cluster – Kittler algorithm was common to both tables, if we only consider the top seven. • For NDT applications, the highest-ranking seven techniques are all from the clustering and entropy category. These scores reflect also our subjective evaluation on the plausibility of the extracted object. • For document applications, techniques from locally adaptive and shape categories appear in the top seven. These results are consistent with those of the Trier and Jain3 study. The performance variability of the algorithms from case to case are illustrated in Figs. 6 and 7. Here the horizontal axis denotes the index of the 40 images, and the vertical axis denotes the corresponding average score. Notice that all methods invariably performed poorly for at least one or two images.135 Thus it was observed that any single algorithm could not be successful for all image types, even in a single application domain. To obtain the robustness of the thresholding method, we explored the combination of more than one thresholding algorithm based on the conjecture that they could be complementary to each other. The combination of thresholding algorithms can be done at the feature level or at the decision level. At the feature level, one could apply, for example, some averaging operation on the Topt values obtained from individual algorithms; on the decision level, one could do fusion of the foreground-background decisions, for example, by taking the majority decision. We could not obtain better results than the Kittler method. 11 Conclusions In this study, we make a categorized survey of image thresholding methods. Furthermore, we select a subset of 40 bilevel image thresholding methods, which have been implemented and for which the thresholding formulas have been expressed in a streamlined fashion. Quantitative evaluation scores have been obtained using a database of 40 NDT and 40 document images. We have observed that the clustering-based method of Kittler and Illingworth43 and the entropy-based methods of Kapur, Sahoo, and Wong,53 and Sahoo, Wilkins, and Yeager,55 are, in that order, the best performing thresholding algorithms in the case of NDT images. Similarly, the clustering-based method of Kittler and Illingworth43 and the local-based methods of Sauvola and Pietaksinen,111 and of White and Rohrer,112 are, in that order, the best performing document binarization algorithms. Note, however, that these results apply only to text document images degraded with noise and blur. On the other hand, documents with patterned backgrounds like checks, documents degraded by nonuniform illumination and shadow, or mixed-type documents85,136 –138 are outside the scope of this comparison. Several other issues remain to be addressed. For example, the increasing number of color documents becomes a new challenge for binarization and segmentation.139,140 Multilevel thresholding, or simply multithresholding, is gaining more relevance in vision applications. A few authors have addressed this issue.5,12,37,54,67,73,138,141 The much needed performance comparison of multithresholding algorithms would necessitate reformulation of the performance
166 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

measures outlined in Sec. 9. To obtain better thresholding results, one should consider application-specific information, for example, an expected foreground region, whether it is on a dark or bright side, for guidance. One should keep on eye on the fact that thresholding should be opted for two-class segmentation problems due to their simplicity whenever they achieve performance similar to more sophisticated methods, like Bayesian schemes and random Markov models.

Acknowledgment
¨ ˙ We would like to thank the Tubıtak Marmara Research Center for supporting the study.

References
1. M. Kamel and A. Zhao, ‘‘Extraction of binary character/graphics images from grayscale document images,’’ Graph. Models Image Process. 55 3 , 203–217 1993 . 2. T. Abak, U. Baris, and B. Sankur, ‘‘The performance of thresholding ¸ algorithms for optical character recognition,’’ Intl. Conf. Document Anal. Recog. ICDAR’97, pp. 697–700 1997 . 3. O. D. Trier and A. K. Jain, ‘‘Goal-directed evaluation of binarization methods,’’ IEEE Trans. Pattern Anal. Mach. Intell. PAMI-17, 1191– 1201 1995 . 4. B. Bhanu, ‘‘Automatic target recognition: state of the art survey,’’ IEEE Trans. Aerosp. Electron. Syst. AES-22, 364 –379 1986 . 5. M. Sezgin and R. Tasaltin, ‘‘A new dichotomization technique to multilevel thresholding devoted to inspection applications,’’ Pattern Recogn. Lett. 21, 151–161 2000 . 6. M. Sezgin and B. Sankur, ‘‘Comparison of thresholding methods for non-destructive testing applications,’’ IEEE ICIP’2001, Intl. Conf. Image Process., pp. 764 –767 2001 . 7. J. C. Russ, ‘‘Automatic discrimination of features in gray-scale images,’’ J. Microsc. 148 3 , 263–277 1987 . 8. M. E. Sieracki, S. E. Reichenbach, and K. L. Webb, ‘‘Evaluation of automated threshold selection methods for accurately sizing microscopic fluorescent cells by image analysis,’’ Appl. Environ. Microbiol. 55, 2762–2772 1989 . 9. P. Bock, R. Klinnert, R. Kober, R. M. Rovner, and H. Schmidt, ‘‘Gray-scale ALIAS,’’ IEEE Trans. Knowl. Data Eng. 4, 109–122 1992 . 10. L. U. Wu, M. A. Songde, and L. U. Hanqing, ‘‘An effective entropic thresholding for ultrasonic imaging,’’ ICPR’98: Intl. Conf. Patt. Recog., pp. 1522–1524 1998 . 11. J. Moysan, G. Corneloup, and T. Sollier, ‘‘Adapting an ultrasonic image threshold method to eddy current images and defining a validation domain of the thresholding method,’’ NDT & E Intl. 32, 79– 84 1999 . 12. J. S. Chang, H. Y. M. Liao, M. K. Hor, J. W. Hsieh, and M. Y. Chern, ‘‘New automatic multi-level thresholding technique for segmentation of thermal images,’’ Image Vis. Comput. 15, 23–34 1997 . 13. W. Oh and B. Lindquist, ‘‘Image thresholding by indicator kriging,’’ IEEE Trans. Pattern Anal. Mach. Intell. PAMI-21, 590– 602 1999 . 14. T. Srikanthan and K. V. Asari, ‘‘Automatic segmentation algorithm for the extraction of lumen region and boundary from endoscopic images,’’ Med. Biol. Eng. Comput. 39 1 , 8 –14 2001 . 15. S. Venkatesh and P. L. Rosin, ‘‘Dynamic threshold determination by local and global edge evaluation,’’ CVGIP: Graph. Models Image Process. 57, 146 –160 1995 . 16. R. Kohler, ‘‘A segmentation system based on thresholding,’’ Graph. Models Image Process. 15, 319–338 1981 . 17. A. Perez and T. Pavlidis, ‘‘An iterative thresholding algorithm for image segmentation,’’ IEEE Trans. Pattern Anal. Mach. Intell. PAMI-9, 742–75 1987 . 18. J. Fan, J. Yu, G. Fujita, T. Onoye, L. Wu, and I. Shirakawa, ‘‘Spatiotemporal segmentation for compact video representation,’’ Signal Process. Image Commun. 16, 553–566 2001 . 19. S. U. Le, S. Y. Chung, and R. H. Park, ‘‘A comparative performance study of several global thresholding techniques for segmentation,’’ Graph. Models Image Process. 52, 171–190 1990 . 20. J. S. Weszka and A. Rosenfeld, ‘‘Threshold evaluation techniques,’’ IEEE Trans. Syst. Man Cybern. SMC-8, 627– 629 1978 . 21. P. W. Palumbo, P. Swaminathan, and S. N. Srihari, ‘‘Document image binarization: Evaluation of algorithms,’’ Proc. SPIE 697, 278 –286 1986 . 22. P. K. Sahoo, S. Soltani, A. K. C. Wong, and Y. Chen, ‘‘A survey of thresholding techniques,’’ Comput. Graph. Image Process. 41, 233– 260 1988 . 23. C. A. Glasbey, ‘‘An analysis of histogram-based thresholding algo-

Survey over image thresholding techniques . . . rithms,’’ Graph. Models Image Process. 55, 532–537 1993 . 24. A. Rosenfeld and P. De la Torre, ‘‘Histogram concavity analysis as an aid in threshold selection,’’ IEEE Trans. Syst. Man Cybern. SMC-13, 231–235 1983 . 25. J. Weszka and A. Rosenfeld, ‘‘Histogram modification for threshold selection,’’ IEEE Trans. Syst. Man Cybern. SMC-9, 38 –52 1979 . 26. L. Halada and G. A. Osokov, ‘‘Histogram concavity analysis by quasicurvature,’’ Comp. Artif. Intell. 6, 523–533 1987 . 27. S. C. Sahasrabudhe and K. S. D. Gupta, ‘‘A valley-seeking threshold selection technique,’’ Comput. Vis. Image Underst. 56, 55– 65 1992 . 28. R. Guo and S. M. Pandit, ‘‘Automatic threshold selection based on histogram modes and a discriminant criterion,’’ Mach. Vision Appl. 10, 331–338 1998 . 29. J. Cai and Z. Q. Liu, ‘‘A new thresholding algorithm based on all-pole model,’’ ICPR’98, Intl. Conf. Patt. Recog., pp. 34 –36 1998 . 30. N. Ramesh, J. H. Yoo, and I. K. Sethi, ‘‘Thresholding based on histogram approximation,’’ IEE Proc. Vision Image Signal Process. 142 5 , 271–279 1995 . 31. T. Kampke and R. Kober, ‘‘Nonparametric optimal binarization,’’ ICPR’98, Intl. Conf. Patt. Recog., pp. 27–29 1998 . 32. M. I. Sezan, ‘‘A peak detection algorithm and its application to histogram-based image data reduction,’’ Graph. Models Image Process. 29, 47–59 1985 . 33. M. J. Carlotto, ‘‘Histogram analysis using a scale-space approach,’’ IEEE Trans. Pattern Anal. Mach. Intell. PAMI-9, 121–129 1997 . 34. J. C. Olivo, ‘‘Automatic threshold selection using the wavelet transform,’’ Graph. Models Image Process. 56, 205–218 1994 . 35. R. J. Whatmough, ‘‘Automatic threshold selection from a histogram using the exponential hull,’’ Graph. Models Image Process. 53, 592– 600 1991 . 36. S. Boukharouba, J. M. Rebordao, and P. L. Wendel, ‘‘An amplitude segmentation method based on the distribution function of an image,’’ Graph. Models Image Process. 29, 47–59 1985 . 37. D. M. Tsai, ‘‘A fast thresholding selection procedure for multimodal and unimodal histograms,’’ Pattern Recogn. Lett. 16, 653– 666 1995 . 38. T. W. Ridler and S. Calvard, ‘‘Picture thresholding using an iterative selection method,’’ IEEE Trans. Syst. Man Cybern. SMC-8, 630– 632 1978 . 39. C. K. Leung and F. K. Lam, ‘‘Performance analysis of a class of iterative image thresholding algorithms,’’ Pattern Recogn. 29 9 , 1523–1530 1996 . 40. H. J. Trussel, ‘‘Comments on picture thresholding using iterative selection method,’’ IEEE Trans. Syst. Man Cybern. SMC-9, 311 1979 . 41. M. K. Yanni and E. Horne, ‘‘A new approach to dynamic thresholding,’’ EUSIPCO’94: 9th European Conf. Sig. Process. 1, 34 – 44 1994 . 42. D. E. Lloyd, ‘‘Automatic target classification using moment invariant of image shapes,’’ Technical Report, RAE IDN AW126, Farnborough, UK Dec. 1985 . 43. J. Kittler and J. Illingworth, ‘‘Minimum error thresholding,’’ Pattern Recogn. 19, 41– 47 1986 . 44. S. Cho, R. Haralick, and S. Yi, ‘‘Improvement of Kittler and Illingworths’s minimum error thresholding,’’ Pattern Recogn. 22, 609– 617 1989 . 45. J. Kittler and J. Illingworth, ‘‘On threshold selection using clustering criteria,’’ IEEE Trans. Syst. Man Cybern. SMC-15, 652– 655 1985 . 46. N. Otsu, ‘‘A threshold selection method from gray level histograms,’’ IEEE Trans. Syst. Man Cybern. SMC-9, 62– 66 1979 . 47. C. V. Jawahar, P. K. Biswas, and A. K. Ray, ‘‘Investigations on fuzzy thresholding based on fuzzy clustering,’’ Pattern Recogn. 30 10 , 1605–1613 1997 . 48. F. R. D. Velasco, ‘‘Thresholding using the isodata clustering algorithm,’’ IEEE Trans. Syst. Man Cybern. SMC-10, 771–774 1980 . 49. H. Lee and R. H. Park, ‘‘Comments on an optimal threshold scheme for image segmentation,’’ IEEE Trans. Syst. Man Cybern. SMC-20, 741–742 1990 . 50. J. Z. Liu and W. Q. Li, ‘‘The automatic thresholding of gray-level pictures via two-dimensional Otsu method,’’ Acta Automatica Sin. 19, 101–105 1993 . 51. T. Pun, ‘‘A new method for gray-level picture threshold using the entropy of the histogram,’’ Signal Process. 2 3 , 223–237 1980 . 52. T. Pun, ‘‘Entropic thresholding: A new approach,’’ Comput. Graph. Image Process. 16, 210–239 1981 . 53. J. N. Kapur, P. K. Sahoo, and A. K. C. Wong, ‘‘A new method for gray-level picture thresholding using the entropy of the histogram,’’ Graph. Models Image Process. 29, 273–285 1985 . 54. J. C. Yen, F. J. Chang, and S. Chang, ‘‘A new criterion for automatic multilevel thresholding,’’ IEEE Trans. Image Process. IP-4, 370–378 1995 . 55. P. Sahoo, C. Wilkins, and J. Yeager, ‘‘Threshold selection using Renyi’s entropy,’’ Pattern Recogn. 30, 71– 84 1997 . 56. C. H. Li and C. K. Lee, ‘‘Minimum cross-entropy thresholding,’’ Pattern Recogn. 26, 617– 625 1993 . 57. C. H. Li and P. K. S. Tam, ‘‘An iterative algorithm for minimum cross-entropy thresholding,’’ Pattern Recogn. Lett. 19, 771–776 1998 . A. D. Brink and N. E. Pendock, ‘‘Minimum cross entropy threshold selection,’’ Pattern Recogn. 29, 179–188 1996 . N. R. Pal, ‘‘On minimum cross-entropy thresholding,’’ Pattern Recogn. 29 4 , 575–580 1996 . A. G. Shanbag, ‘‘Utilization of information measure as a means of image thresholding,’’ Comput. Vis. Graph. Image Process. 56, 414 – 419 1994 . H. D. Cheng, Y. H. Chen, and Y. Sun, ‘‘A novel fuzzy entropy approach to image enhancement and thresholding,’’ Signal Process. 75, 277–301 1999 . G. Johannsen and J. Bille, ‘‘A threshold selection method using information measures,’’ ICPR’82: Proc. 6th Intl. Conf. Patt. Recog., pp. 140–143 1982 . S. K. Pal, R. A. King, and A. A. Hashim, ‘‘Automatic gray level thresholding through index of fuzziness and entropy,’’ Pattern Recogn. Lett. 1, 141–146 1980 . J. E. Shore and R. W. Johnson, ‘‘Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy,’’ IEEE Trans. Inf. Theory IT-26, 26 –37 1980 . A. K. C. Wong and P. K. Sahoo, ‘‘A gray-level threshold selection method based on maximum entropy principle,’’ IEEE Trans. Syst. Man Cybern. SMC-19, 866 – 871 1989 . A. Kaufmann, Introduction to the Theory of Fuzzy Sets: Fundamental Theoretical Elements, Vol. 1, Academic Press, New York 1980 . L. Hertz and R. W. Schafer, ‘‘Multilevel thresholding using edge matching,’’ Comput. Vis. Graph. Image Process. 44, 279–295 1988 . S. K. Pal and A. Rosenfeld, ‘‘Image enhancement and thresholding by optimization of fuzzy compactness,’’ Pattern Recogn. Lett. 7, 77– 86 1988 . A. Rosenfeld, ‘‘The fuzzy geometry of image subsets,’’ Pattern Recogn. Lett. 2, 311–317 1984 . W. H. Tsai, ‘‘Moment-preserving thresholding: A new approach,’’ Graph. Models Image Process. 19, 377–393 1985 . S. C. Cheng and W. H. Tsai, ‘‘A neural network approach of the moment-preserving technique and its application to thresholding,’’ IEEE Trans. Comput. C-42, 501–507 1993 . E. J. Delp and O. R. Mitchell, ‘‘Moment-preserving quantization,’’ IEEE Trans. Commun. 39, 1549–1558 1991 . L. O’Gorman, ‘‘Binarization and multithresholding of document images using connectivity,’’ Graph. Models Image Process. 56, 494 –506 1994 . Y. Liu and S. N. Srihari, ‘‘Document image binarization based on texture analysis,’’ Proc. SPIE 2181, 254 –263 1994 . Y. Liu, R. Fenrich, and S. N. Srihari, ‘‘An object attribute thresholding algorithm for document image binarization,’’ ICDAR’93: Proc. 2nd Intl. Conf. Document Anal. Recog., pp. 278 –281 1993 . A. Pikaz and A. Averbuch, ‘‘Digital image thresholding based on topological stable state,’’ Pattern Recogn. 29, 829– 843 1996 . C. A. Murthy and S. K. Pal, ‘‘Fuzzy thresholding: A mathematical framework, bound functions and weighted moving average technique,’’ Pattern Recogn. Lett. 11, 197–206 1990 . R. Yager, ‘‘On the measure of fuzziness and negation. Part I: Membership in the unit interval,’’ Int. J. Gen. Syst. 5, 221–229 1979 . K. Ramar, S. Arunigam, S. N. Sivanandam, L. Ganesan, and D. Manimegalai, ‘‘Quantitative fuzzy measures for threshold selection,’’ Pattern Recogn. Lett. 21, 1–7 2000 . X. Fernandez, ‘‘Implicit model oriented optimal thresholding using Kolmogorov-Smirnov similarity measure,’’ ICPR’2000: Intl. Conf. Patt. Recog., pp. 466 – 469, Barcelona 2000 . C. K. Leung and F. K. Lam, ‘‘Maximum segmented image information thresholding,’’ Graph. Models Image Process. 60, 57–76 1998 . L. K. Huang and M. J. J. Wang, ‘‘Image thresholding by minimizing the measures of fuzziness,’’ Pattern Recogn. 28, 41–51 1995 . H. S. Don, ‘‘A noise attribute thresholding method for document image binarization,’’ IEEE Conf. Image Process., pp. 231–234 1995 . S. Guo, ‘‘A new threshold method based on morphology and fourth order central moments,’’ Proc. SPIE 3545, 317–320 1998 . Y. Solihin and C. G. Leedham, ‘‘Integral ratio: A new class of global thresholding techniques for handwriting images,’’ IEEE Trans. Pattern Anal. Mach. Intell. PAMI-21, 761–768 1999 . Z. Aviad and E. Lozinskii, ‘‘Semantic thresholding,’’ Pattern Recogn. Lett. 5, 321–328 1987 . G. Gallo and S. Spinello, ‘‘Thresholding and fast iso-contour extraction with fuzzy arithmetic,’’ Pattern Recogn. Lett. 21, 31– 44 2000 . R. L. Kirby and A. Rosenfeld, ‘‘A note on the use of gray level, local average gray level space as an aid in threshold selection,’’ IEEE Trans. Syst. Man Cybern. SMC-9, 860– 864 1979 . G. Fekete, J. O. Eklundh, and A. Rosenfeld, ‘‘Relaxation: evaluation and applications,’’ IEEE Trans. Pattern Anal. Mach. Intell. PAMI3 4 , 459– 469 1981 . A. Rosenfeld and R. Smith, ‘‘Thresholding using relaxation,’’ IEEE Trans. Pattern Anal. Mach. Intell. PAMI-3, 598 – 606 1981 . A. Y. Wu, T. H. Hong, and A. Rosenfeld, ‘‘Threshold selection using

58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91.

Journal of Electronic Imaging / January 2004 / Vol. 13(1) / 167

Sezgin and Sankur quadtrees,’’ IEEE Trans. Pattern Anal. Mach. Intell. PAMI-4 1 , 90–94 1982 . 92. N. Ahuja and A. Rosenfeld, ‘‘A note on the use of second-order graylevel statistics for threshold selection,’’ IEEE Trans. Syst. Man Cybern. SMC-5, 383–388 1975 . 93. W. N. Lie, ‘‘An efficient threshold-evaluation algorithm for image segmentation based on spatial gray level cooccurrences,’’ Signal Process. 33, 121–126 1993 . 94. N. R. Pal and S. K. Pal, ‘‘Entropic thresholding,’’ Signal Process. 16, 97–108 1989 . 95. C. Chang, K. Chen, J. Wang, and M. L. G. Althouse, ‘‘A relative entropy based approach in image thresholding,’’ Pattern Recogn. 27, 1275–1289 1994 . 96. B. Chanda and D. D. Majumder, ‘‘A note on the use of gray level co-occurrence matrix in threshold selection,’’ Signal Process. 15, 149–167 1988 . 97. A. S. Abutaleb, ‘‘Automatic thresholding of gray-level pictures using two-dimensional entropy,’’ Comput. Vis. Graph. Image Process. 47, 22–32 1989 . 98. H. D. Cheng and Y. H. Chen, ‘‘Thresholding based on fuzzy partition of 2D histogram,’’ Intl. Conf. Patt. Recog., pp. 1616 –1618 1998 . 99. L. Li, J. Gong, and W. Chen, ‘‘Gray-level image thresholding based on fisher linear projection of two-dimensional histogram,’’ Pattern Recogn. 30, 743–749 1997 . 100. A. D. Brink, ‘‘Thresholding of digital images using two-dimensional entropies,’’ Pattern Recogn. 25, 803– 808 1992 . 101. H. D. Cheng and Y. H. Chen, ‘‘Fuzzy partition of two-dimensional histogram and its application to thresholding,’’ Pattern Recogn. 32, 825– 843 1999 . 102. A. D. Brink, ‘‘Gray level thresholding of images using a correlation criterion,’’ Pattern Recogn. Lett. 9, 335–341 1989 . 103. A. D. Brink, ‘‘Minimum spatial entropy threshold selection,’’ IEE Proc. Vision Image Signal Process. 142, 128 –132 1995 . 104. A. Beghdadi, A. L. Negrate, and P. V. De Lesegno, ‘‘Entropic thresholding using a block source model,’’ Graph. Models Image Process. 57, 197–205 1995 . 105. C. K. Leung and F. K. Lam, ‘‘Maximum a posteriori spatial probability segmentation,’’ IEE Proc. Vision Image Signal Process. 144, 161–167 1997 . 106. N. Friel and I. S. Molchanov, ‘‘A new thresholding technique based on random sets,’’ Pattern Recogn. 32, 1507–1517 1999 . 107. G. Borgefors, ‘‘Distance transformations in digital images,’’ Comput. Vis. Graph. Image Process. 34, 344 –371 1986 . 108. Y. Nakagawa and A. Rosenfeld, ‘‘Some experiments on variable thresholding,’’ Pattern Recogn. 11 3 , 191–204 1979 . 109. F. Deravi and S. K. Pal, ‘‘Grey level thresholding using second-order statistics,’’ Pattern Recogn. Lett. 1, 417– 422 1983 . 110. W. Niblack, An Introduction to Image Processing, pp. 115–116, Prentice-Hall, Englewood Cliffs, NJ 1986 . 111. J. Sauvola and M. Pietaksinen, ‘‘Adaptive document image binarization,’’ Pattern Recogn. 33, 225–236 2000 . 112. J. M. White and G. D. Rohrer, ‘‘Image thresholding for optical character recognition and other applications requiring character image extraction,’’ IBM J. Res. Dev. 27 4 , 400– 411 1983 . 113. J. Bernsen, ‘‘Dynamic thresholding of gray level images,’’ ICPR’86: Proc. Intl. Conf. Patt. Recog., pp. 1251–1255 1986 . 114. Y. Yasuda, M. Dubois, and T. S. Huang, ‘‘Data compression for check processing machines,’’ Proc. IEEE 68, 874 – 885 1980 . 115. S. D. Yanowitz and A. M. Bruckstein, ‘‘A new method for image segmentation,’’ Comput. Graph. Image Process. 46, 82–95 1989 . 116. D. Shen and H. H. S. Ip, ‘‘A Hopfield neural network for adaptive image segmentation: An active surface paradigm,’’ Pattern Recogn. Lett. 18, 37– 48 1997 . 117. N. B. Venkateswarluh and R. D. Boyle, ‘‘New segmentation techniques for document image analysis,’’ Image Vis. Comput. 13, 573– 583 1995 . 118. E. Giuliano, O. Paitra, and L. Stringer, ‘‘Electronic character reading system,’’ U.S. Patent No. 4,047,15 Sep. 1977 . 119. Y. Yang and H. Yan, ‘‘An adaptive logical method for binarization of degraded document images,’’ Pattern Recogn. 33, 787– 807 2000 . 120. F. H. Y. Chan, F. K. Lam, and H. Zhu, ‘‘Adaptive thresholding by variational method,’’ IEEE Trans. Image Process. IP-7, 468 – 473 1991 . 121. J. Parker, ‘‘Gray level thresholding on badly illuminated images,’’ IEEE Trans. Pattern Anal. Mach. Intell. PAMI-13, 813– 891 1991 . 122. F. Chang, K. H. Liang, T. M. Tan, and W. L. Hwang, ‘‘Binarization of document images using Hadamard multiresolution analysis,’’ ICDAR’99: Intl. Conf. Document Anal. Recog., pp. 157–160 1999 . 123. A. Savakis, ‘‘Adaptive document image thresholding using foreground and background clustering,’’ ICIP’98: Intl. Conf. Image Process., Chicago, October 1998. 124. J. D. Yang, Y. S. Chen, and W. H. Hsu, ‘‘Adaptive thresholding algorithm and its hardware implementation,’’ Pattern Recogn. Lett. 15, 141–150 1994 . 125. H. Kamada and K. Fujimoto, ‘‘High-speed, high-accuracy binarization method for recognizing text in images of low spatial resolution,’’ ICDAR’99, Intl. Conf. Document Anal. Recog., pp. 139–142 1999 . 126. L. Eikvil, T. Taxt, and K. Moen, ‘‘A fast adaptive method for binarization of document images,’’ ICDAR’91, Intl. Conf. Document Anal. Recog., pp. 435– 443 1991 . 127. T. Pavlidis, ‘‘Threshold selection using second derivatives of the gray-scale image,’’ ICDAR’93, Intl. Conf. Document Anal. Recog., pp. 274 –277 1993 . 128. X. Zhao and S. H. Ong, ‘‘Adaptive local thresholding with fuzzyvalidity guided spatial partitioning,’’ ICPR’98, Intl. Conf. Patt. Recog., pp. 988 –990 1998 . 129. W. A. Yasnoff, J. K. Mui, and J. W. Bacus, ‘‘Error measures for scene segmentation,’’ Pattern Recogn. 9, 217–231 1977 . 130. M. D. Levine and A. M. Nazif, ‘‘Dynamic measurement of computer generated image segmentations,’’ IEEE Trans. Pattern Anal. Mach. Intell. PAMI-7, 155–164 1985 . 131. Y. J. Zhang, ‘‘A survey on evaluation methods for image segmentation,’’ Pattern Recogn. 29, 1335–1346 1996 . 132. M. P. Dubuisson and A. K. Jain, ‘‘A modified Hausdorff distance for object matching,’’ ICPR’94, 12th Intl. Conf. Patt. Recog., A-566-569 1994 . ˙ ¨ ¨ ¨ 133. D. Demir, S. Birecik, F. Kurugollu, M. Sezgin, I. O. Bucak, B. Sankur, and E. Anarim, ‘‘Quality inspection in PCBs and SMDs using computer vision techniques,’’ 20th Intl. Conf. Industrial Elec. Control Instrum., pp. 857– 860 1994 . 134. H. S. Baird, ‘‘Document image defect models and their uses,’’ ICDAR’92, Proc. Intl. Conf. Document Anal. Recog., pp. 62– 67 1992 . 135. M. Sezgin, ‘‘Quantitative evaluation of image thresholding methods and application to nondestructive testing,’’ PhD Thesis, Istanbul Technical University, Turkey 2002 . 136. X. Ye, M. Cheriet, and C. Y. Suen, ‘‘Stroke-model-based character extraction from gray-level document images,’’ IEEE Trans. Image Process. IP-10 8 , 1152–1161 2001 . 137. S. Djeziri, F. Nouboud, and R. Plamondon, ‘‘Extraction of signatures from check background based on a filiformity criterion,’’ IEEE Trans. Image Process. IP-7 10 , 1425–1438 1998 . 138. C. Strouthopoulos and N. Papamarkos, ‘‘Multithresholding of mixed type documents,’’ Eng. Applic. Artif. Intell. 13 3 , 323–343 2000 . 139. A. H. Dekker, ‘‘Kohonen neural networks for optimal colour quantization,’’ Network Comput. Neural Syst. 5, 351–367 1994 . 140. C. M. Tsai and H. H. Lee, ‘‘Binarization of color document images via luminance and saturation color features,’’ IEEE Trans. Image Process. IP-11, 434 – 451 Apr. 2002 . 141. N. Papamarkos and B. Gatos, ‘‘A new approach for multithreshold selection,’’ Comput. Vis. Graph. Image Process 56 5 , 357–370 1994 . Mehmet Sezgin graduated from ˙stanbul I Technical University in 1986 from the electronic and communication department. He completed his Msc and Phd at the same university in 1990 and 2002, respectively. His research areas are signal and image processing. He has been working at the Electronic Research Institute and Information Technologies Research Institute of the Turkish Scientific and Technical Research Council since 1991. ¨ Bulent Sankur received his BS degree in electrical engineering at Robert College, Istanbul, and completed his MSc and PhD degrees at Rensselaer Polytechnic Institute, New York. He has been active at ˘ ¸ Bogazici University in the Department of Electric and Electronic Engineering in establishing curricula and laboratories, and guiding research in the areas of digital signal processing, image and video compression, and multimedia systems. He was the chairman of the International Telecommunications Conference and the technical co-chairman of ICASSP 2000. He has held visiting positions at the University of Ottawa, Canada: Istanbul Technical University: Technical University of Delft, The Netherlands: and Ecole ´ Nationale Superieure des Telecommunications, France.

168 / Journal of Electronic Imaging / January 2004 / Vol. 13(1)

Similar Documents

Free Essay

A Survey of Ocr Applications

...International Journal of Machine Learning and Computing, Vol. 2, No. 3, June 2012 A Survey of OCR Applications Amarjot Singh, Ketan Bacchuwar, and Akshay Bhasin Abstract—Optical Character Recognition or OCR is the electronic translation of handwritten, typewritten or printed text into machine translated images. It is widely used to recognize and search text from electronic documents or to publish the text on a website. The paper presents a survey of applications of OCR in different fields and further presents the experimentation for three important applications such as Captcha, Institutional Repository and Optical Music Character Recognition. We make use of an enhanced image segmentation algorithm based on histogram equalization using genetic algorithms for optical character recognition. The paper will act as a good literature survey for researchers starting to work in the field of optical character recognition. Index Terms— Genetic algorithm, bimodal images, Captcha, institutional repositories and digital libraries, optical music recognition, optical character recognition. I. INTRODUCTION Highlight in 1950’s [1], applied throughout the spectrum of industries resulting into revolutionizing the document management process. Optical Character Recognition or OCR has enabled scanned documents to become more than just image files, turning into fully searchable documents with text content recognized by computers. Optical Character Recognition extracts the relevant information...

Words: 3379 - Pages: 14

Free Essay

Self Navigating Bot

...SELF NAVIGATING AUTONOMOUS BOT Major-Project Report by Arjun Surendran B080001EC Deepak Venga B080027EC Nandu Raj B080585EC Priyanka G Das B080312EC Sanjay George B080270EC Under the guidance of Dr. S. M. SAMEER Submitted in Partial Fulfillment of the Requirements for the degree of Bachelor of Technology In ELECTRONICS AND COMMUNICATION ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING NATIONAL INSTITUTE OF TECHNOLOGY CALICUT Kerala, India April 2012 NATIONAL INSTITUTE OF TECHNOLOGY CALICUT DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING CERTIFICATE This is to certify that this report titled SELF NAVIGATING AUTONOMOUS BOT is a bona fide record of the major-project done by Arjun Surendran Deepak Venga Nandu Raj Priyanka G Das Sanjay George B080001EC B080027EC B080585EC B080312EC B080270EC In partial fulfillment of the requirements for the award of Degree of Bachelor of Technology in Electronics and Communication Engineering from National Institute of Technology, Calicut. Dr. S. M. Sameer (Project Advisor) Assistant Professor Dr. P S Sathidevi Professor & Head April 2012 NIT Calicut i ACKNOWLEDGEMENT We would like to thank Dr. S. M. Sameer, Assistant Professor, Department of Electronics and Communication Engineering for his guidance and inspiration in helping us complete this project. We are also grateful to Dr. P S Sathidevi, Professor and Head, Department of Electronics and Communication...

Words: 13508 - Pages: 55

Free Essay

Dsp Textbook

...Digital Image Processing Second Edition Rafael C. Gonzalez University of Tennessee Richard E. Woods MedData Interactive Prentice Hall Upper Saddle River, New Jersey 07458 Library of Congress Cataloging-in-Pubblication Data Gonzalez, Rafael C. Digital Image Processing / Richard E. Woods p. cm. Includes bibliographical references ISBN 0-201-18075-8 1. Digital Imaging. 2. Digital Techniques. I. Title. TA1632.G66 621.3—dc21 2001 2001035846 CIP Vice-President and Editorial Director, ECS: Marcia J. Horton Publisher: Tom Robbins Associate Editor: Alice Dworkin Editorial Assistant: Jody McDonnell Vice President and Director of Production and Manufacturing, ESM: David W. Riccardi Executive Managing Editor: Vince O’Brien Managing Editor: David A. George Production Editor: Rose Kernan Composition: Prepare, Inc. Director of Creative Services: Paul Belfanti Creative Director: Carole Anson Art Director and Cover Designer: Heather Scott Art Editor: Greg Dulles Manufacturing Manager: Trudy Pisciotti Manufacturing Buyer: Lisa McDowell Senior Marketing Manager: Jennie Burger © 2002 by Prentice-Hall, Inc. Upper Saddle River, New Jersey 07458 All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher. The author and publisher of this book have used their best efforts in preparing this book. These efforts include the development, research, and testing of the theories and programs to determine their effectiveness...

Words: 66542 - Pages: 267

Free Essay

Digital Image Processing

...Digital Image Processing: PIKS Inside, Third Edition. William K. Pratt Copyright © 2001 John Wiley & Sons, Inc. ISBNs: 0-471-37407-5 (Hardback); 0-471-22132-5 (Electronic) DIGITAL IMAGE PROCESSING DIGITAL IMAGE PROCESSING PIKS Inside Third Edition WILLIAM K. PRATT PixelSoft, Inc. Los Altos, California A Wiley-Interscience Publication JOHN WILEY & SONS, INC. New York • Chichester • Weinheim • Brisbane • Singapore • Toronto Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or all capital letters. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. Copyright  2001 by John Wiley and Sons, Inc., New York. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic or mechanical, including uploading, downloading, printing, decompiling, recording or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ @ WILEY.COM. This publication is designed...

Words: 173795 - Pages: 696

Premium Essay

Research on Synopsis

...Chapter 9 A SURVEY OF SYNOPSIS CONSTRUCTION IN DATA STREAMS Abstract The large volume of data streams poses unique space and time constraints on the computation process. Many query processing, database operations, and mining algorithms require efficient execution which can be difficult to achieve with a fast data stream. In many cases, it may be acceptable to generate approximate solutions for such problems. In recent years a number of synopsis structures have been developed, which can be used in conjunction with a variety of mining and query processing techniques in data stream processing. Some key synopsis methods include those of sampling, wavelets, sketches and histograms. In this chapter, we will provide a survey of the key synopsis techniques, and the mining techniques supported by such methods. We will discuss the challenges and tradeoffs associated with using different kinds of techniques, and the important research directions for synopsis construction. 1. Introduction Data streams pose a unique challenge to many database and data mining applications because of the computational and storage costs associated with the large volume of the data stream. In many cases, synopsis data structures 170 DATA STREAMS: MODELS AND ALGORITHMS and statistics can be constructed from streams which are useful for a variety of applications. Some examples of such applications are as follows: Approximate Query Estimation: The problem of query estimation...

Words: 17478 - Pages: 70

Free Essay

Blue Eye Technology

...SEMINAR REPORT ON BLUE EYES TECHNOLOGY Submitted by BINYAMIN M In partial fulfillment of the requirements for the Degree of B-TECH DEGRE in COMPUTER SCIENCE AND ENGINEERING SCHOOL OF ENGINEERING COCHIN UNIVERSIY OF SCIENCE AND TECHNOLOGY KOCHI-682022 JULY 2010 Division of Computer Engineering School of Engineering Cochin University of Science & Technology Kochi-682022 _________________________________________________________ CERTIFICATE Certified that this is a bona fide record of the Seminar work entitled BLUE EYES TECHNOLOGY Done by BINYAMIN M of VII semester Computer Science & Engineering in the year 2010 in partial fulfillment of the requirements for the award of Degree of Bachelor of Technology in Computer Science & Engineering of Cochin University of Science & Technology Dr. David Peter S Head of the Division REVATHY .R. Seminar Guide BLUE EYES TECHNOLOGY ACKNOWLEDGEMENTS I express my sincere thanks to Dr. David Peter (Head of the Department, Computer Science and Engineering), Mr. Sudeep P.Elayidom (Staff incharge) and my seminar guide Miss Revathy R. for their kind co-operation for presenting the seminar. I also extend my sincere thanks to all other members of the faculty of Computer Science and Engineering Department and my friends for their cooperation and encouragement. BINYAMIN M DIVISON OF COMPUTER ENGINEERING BLUE EYES TECHNOLOGY ABSTRACT Is it possible to create a computer...

Words: 8762 - Pages: 36

Free Essay

Icttm

...------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ International Conference on Telecommunication Technology and Management (ICTTM 2015) April 11-12, 2015 ORGANIZED BY Bharti School of Telecommunication Technology and Management Indian Institute of Technology Delhi ACADEMIC PARTNERS Telecom Ecole de Management, France GSM Association (GSMA) PUBLICATION PARTNER SPONSORS 1 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ CONFERENCE SCHEDULE Day 1 (11th April, 2015) Registration (9:00 A.M. - 10:00 A.M.) Venue: Seminar Hall, IIT Delhi Inaugural Session (10:00 A.M. - 11:00 A.M.) Venue: Seminar Hall, IIT Delhi Networking High Tea (11:00 A.M.. - 11:30 A.M.) Panel Discussion (11:30 A.M. - 1:00 P.M.) Venue: Seminar Hall, IIT Delhi Lunch (1:00 P.M.- 2:00 P.M.) Venue: Cricket Ground, IIT Delhi Track 1 Venue: Room No 101, Ground Floor, Bharti School, IIT Delhi Session Coordinator: Ms. Shiksha Kushwah Session 1 Session 2 (2:00P.M. to 3:30 P.M.) (4:00P.M. to 6:00 P.M.) Session Chair(s) Session Chair(s) Prof. Sushil Prof. S. S. Yadav Prof. Kirankumar S. Momaya Dr. Sujata Joshi Track 2 Venue: Room No 106, Ground Floor, Bharti School, IIT Delhi Session Coordinator: Ms. Rojalin Pradhan ...

Words: 6478 - Pages: 26

Premium Essay

Hai, How Are U

...Higher Secondary Examination, Kerala or 12th Standard V.H.S.E., C.B.S.E., I.S.C. or any examination accepted by the university as equivalent thereto obtaining not less than 50% in Mathematics and 50% in Mathematics, Physics and Chemistry/ Bio- technology/ Computer Science/ Biology put together, or a diploma in Engineering awarded by the Board of Technical Education, Kerala or an examination recognized as equivalent thereto after undergoing an institutional course of at least three years securing a minimum of 50 % marks in the final diploma examination subject to the usual concessions allowed for backward classes and other communities as specified from time to time. 2. Duration of the course i) The course for the B.Tech Degree shall extend over a period of four academic years comprising of eight semesters. The first and second semester shall be combined and each semester from third semester onwards shall cover the groups of subjects as given in the curriculum and scheme of examination ii) Each semester shall ordinarily comprise of not less than 400 working periods each of 60 minutes duration iii) A candidate who could not complete the programme and pass all examinations within Ten (10) years since his first admission to the B.Tech programme will not be allowed to continue and he has to quit the Programme. However he can be readmitted to the first year of the programme if he/she satisfies the eligibility norms applicable to the regular candidates prevailing at the time of...

Words: 34195 - Pages: 137

Free Essay

Gait Recognition

...This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/copyright Author's personal copy Pattern Recognition 45 (2012) 3414–3426 Contents lists available at SciVerse ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr Silhouette-based gait recognition using Procrustes shape analysis and elliptic Fourier descriptors Sruti Das Choudhury, Tardi Tjahjadi n School of Engineering, University of Warwick, Gibbet Hill Road, Coventry CV4 7AL, United Kingdom a r t i c l e i n f o Article history: Received 6 September 2011 Received in revised form 15 December 2011 Accepted 21 February 2012 Available online 5 March 2012 Keywords: Gait recognition Human identification Procrustes shape analysis Elliptic Fourier descriptor Silhouette Nearest neighbour classifier Classifier combination Hu moments a b s t r a c t ...

Words: 13230 - Pages: 53

Free Essay

Computer Vision

...Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com. Editor: Mike Loukides Production Editor: Rachel Monaghan Production Services: Newgen Publishing and Data Services Cover Designer: Karen Montgomery Interior Designer: David Futato Illustrator: Robert Romano Printing History: September 2008: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Learning OpenCV, the image of a giant peacock moth, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. This book uses Repkover,™ a durable and flexible lay-flat binding. ISBN: 978-0-596-51613-0 [M] Contents Preface . . . . . . . . . . . . . . . . . . ...

Words: 150684 - Pages: 603

Free Essay

Face Recognition

...it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published articles. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Mirna Cvijic Technical Editor Teodora Smiljanic Cover Designer Jan Hyrat Image Copyright hfng, 2010. Used under license from Shutterstock.com First published July, 2011 Printed in Croatia A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org Reviews, Refinements and New Ideas in Face Recognition, Edited by Peter M. Corcoran p. cm. ISBN 978-953-307-368-2 free online editions of InTech Books and Journals can be found at www.intechopen.com Contents Preface IX Part 1 Chapter 1 Statistical Face Models & Classifiers A Review of Hidden...

Words: 33246 - Pages: 133

Free Essay

Nit-Silchar B.Tech Syllabus

...NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR Bachelor of Technology Programmes amï´>r¶ JH$s g§ñWmZ, m¡Úmo{ à VO o pñ Vw dZ m dY r V ‘ ñ Syllabi and Regulations for Undergraduate PROGRAMME OF STUDY (wef 2012 entry batch) Ma {gb Course Structure for B.Tech (4years, 8 Semester Course) Civil Engineering ( to be applicable from 2012 entry batch onwards) Course No CH-1101 /PH-1101 EE-1101 MA-1101 CE-1101 HS-1101 CH-1111 /PH-1111 ME-1111 Course Name Semester-1 Chemistry/Physics Basic Electrical Engineering Mathematics-I Engineering Graphics Communication Skills Chemistry/Physics Laboratory Workshop Physical Training-I NCC/NSO/NSS L 3 3 3 1 3 0 0 0 0 13 T 1 0 1 0 0 0 0 0 0 2 1 1 1 1 0 0 0 0 4 1 1 0 0 0 0 0 0 2 0 0 0 0 P 0 0 0 3 0 2 3 2 2 8 0 0 0 0 0 2 2 2 2 0 0 0 0 0 2 2 2 6 0 0 8 2 C 8 6 8 5 6 2 3 0 0 38 8 8 8 8 6 2 0 0 40 8 8 6 6 6 2 2 2 40 6 6 8 2 Course No EC-1101 CS-1101 MA-1102 ME-1101 PH-1101/ CH-1101 CS-1111 EE-1111 PH-1111/ CH-1111 Course Name Semester-2 Basic Electronics Introduction to Computing Mathematics-II Engineering Mechanics Physics/Chemistry Computing Laboratory Electrical Science Laboratory Physics/Chemistry Laboratory Physical Training –II NCC/NSO/NSS Semester-4 Structural Analysis-I Hydraulics Environmental Engg-I Structural Design-I Managerial Economics Engg. Geology Laboratory Hydraulics Laboratory Physical Training-IV NCC/NSO/NSS Semester-6 Structural Design-II Structural Analysis-III Foundation Engineering Transportation Engineering-II Hydrology &Flood...

Words: 126345 - Pages: 506

Premium Essay

Electrical Electronics

...Higher Secondary Examination, Kerala or 12th Standard V.H.S.E., C.B.S.E., I.S.C. or any examination accepted by the university as equivalent thereto obtaining not less than 50% in Mathematics and 50% in Mathematics, Physics and Chemistry/ Bio- technology/ Computer Science/ Biology put together, or a diploma in Engineering awarded by the Board of Technical Education, Kerala or an examination recognized as equivalent thereto after undergoing an institutional course of at least three years securing a minimum of 50 % marks in the final diploma examination subject to the usual concessions allowed for backward classes and other communities as specified from time to time. 2. Duration of the course i) The course for the B.Tech Degree shall extend over a period of four academic years comprising of eight semesters. The first and second semester shall be combined and each semester from third semester onwards shall cover the groups of subjects as given in the curriculum and scheme of examination ii) Each semester shall ordinarily comprise of not less than 400 working periods each of 60 minutes duration iii) A candidate who could not complete the programme and pass all examinations within Ten (10) years since his first admission to the B.Tech programme will not be allowed to continue and he has to quit the Programme. However he can be readmitted to the first year of the programme if he/she satisfies the eligibility norms applicable to the regular candidates prevailing at the time...

Words: 36386 - Pages: 146

Free Essay

Idrivesa

...2007-2008 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD B.TECH. ELECTRONICS AND COMMUNICATION ENGINEERING I YEAR COURSE STRUCTURE |Code |Subject |T |P/D |C | | |English |2+1 |- |4 | | |Mathematics - I |3+1 |- |6 | | |Mathematical Methods |3+1 |- |6 | | |Applied Physics |2+1 |- |4 | | |C Programming and Data Structures |3+1 |- |6 | | |Network Analysis |2+1 |- |4 | | |Electronic Devices and Circuits |3+1 |- |6 | | |Engineering Drawing |- |3 |4 | | |Computer Programming Lab. |- |3 |4 | | |IT Workshop |- |3 |4 | | |Electronic Devices and Circuits Lab |- |3...

Words: 26947 - Pages: 108

Premium Essay

Phsco

...www.it-ebooks.info www.it-ebooks.info Praise “A must-read resource for anyone who is serious about embracing the opportunity of big data.” — Craig Vaughan Global Vice President at SAP “This timely book says out loud what has finally become apparent: in the modern world, Data is Business, and you can no longer think business without thinking data. Read this book and you will understand the Science behind thinking data.” — Ron Bekkerman Chief Data Officer at Carmel Ventures “A great book for business managers who lead or interact with data scientists, who wish to better understand the principals and algorithms available without the technical details of single-disciplinary books.” — Ronny Kohavi Partner Architect at Microsoft Online Services Division “Provost and Fawcett have distilled their mastery of both the art and science of real-world data analysis into an unrivalled introduction to the field.” —Geoff Webb Editor-in-Chief of Data Mining and Knowledge Discovery Journal “I would love it if everyone I had to work with had read this book.” — Claudia Perlich Chief Scientist of M6D (Media6Degrees) and Advertising Research Foundation Innovation Award Grand Winner (2013) www.it-ebooks.info “A foundational piece in the fast developing world of Data Science. A must read for anyone interested in the Big Data revolution." —Justin Gapper Business Unit Analytics Manager at Teledyne Scientific and Imaging “The authors, both renowned experts in data science before it had a name, have...

Words: 146629 - Pages: 587