Concavity Detection Using a Binary Mask-Based Approach

نویسنده

  • Jean-Michel Jolion
چکیده

We present in this paper a study of concavity detection using binary edge mask information, and consistency links between them. A model for a corner is proposed as a particular arrangement of edge masks. In a second step, we merge these corner in order to build concavities. Enclosures are obtained as a particular case of concavities. Examples are shown in the context of suburban area and more particularly in house images. We also discuss about the limits of this approach in terms of information provided by the edge masks and propose some improvements in order to extend our concavity definition.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Change detection from satellite images based on optimal asymmetric thresholding the difference image

As a process to detect changes in land cover by using multi-temporal satellite images, change detection is one of the practical subjects in field of remote sensing. Any progress on this issue increase the accuracy of results as well as facilitating and accelerating the analysis of multi-temporal data and reducing the cost of producing geospatial information. In this study, an unsupervised chang...

متن کامل

A Bi-Band Binary Mask Based Land-Use Change Detection Using Landsat 8 OLI Imagery

Land use and cover change (LUCC) is important for the global biogeochemical cycle and ecosystem. This paper introduced a change detection method based on a bi-band binary mask and an improved fuzzy c-means algorithm to research the LUCC. First, the bi-band binary mask approach with the core concept being the correlation coefficients between bands from different images are used to locate target ...

متن کامل

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998