当前位置:网站首页>(28) Shape matching based on contour features
(28) Shape matching based on contour features
2022-07-01 16:57:00 【Li Sanhe】
1、 Chain code histogram
Chain code histograms classify objects that look similar to human eyes . Direction chain code is a typical chain code representation used to represent the outline of an object . A discrete curve can be defined as z2 A limited number of 8 Connected . therefore , A digitized binary curve can be represented by direction chain code, which is connected by two adjacent pixels 8 Possible direction values . A curve is discretized by the mesh to form n Chain code direction , Finally, this curve chain code can be expressed as
, Each chain points to 8 One of the directions
,i Is the index value of pixels ,ai By pixels i Point to pixels i+1 Direction chain code .

(a) Direction of coding (b) Simple object shape (c) The chain code of the shape indicates (d) Chain code histogram
2、 Paired geometric histograms
Pairwise geometric histograms describe the target contour through relative angle and relative position features , And use the relationship histogram statistics to index the shape of this pair of geometric features . Using this coding method requires certain preconditions , That is, an irregular object can be approximated as a geometric polygon . This coding method can well describe a polygonal object . Approximate irregular shapes to polygons , And define it as the set of edge points . In this way, the contour edges contained in it can be calculated by continuous edge points .
3、 Combination of simple shape descriptors
Concavity and convexity : The ratio of the circumference of the convex hull of the contour to the circumference of the original contour .
Spindle : The orthogonal axis passing through the centroid of the object , The proportion between the principal axes can be calculated from the covariance matrix of the object contour .
Compactness : The ratio of the area of the object to the circumference of a square with equal area , It can also be a garden .
Difference : Expressed as the proportional mean square error compared with the template .
边栏推荐
- Babbitt | yuan universe daily must read: Naixue coin, Yuan universe paradise, virtual stock game Do you understand Naixue's tea's marketing campaign of "operation pull full"
- Shenyu gateway development: enable and run locally
- Leetcode 77 combination -- backtracking method
- 多线程并发之CountDownLatch阻塞等待
- 【C語言補充】判斷明天是哪一天(明天的日期)
- 模板引擎Velocity 基础
- Redis distributed lock
- Advantages, values and risks of chain games compared with traditional games
- SQL question brushing 584 Looking for user references
- String类
猜你喜欢

How to restore the system with one click on Lenovo laptop

Redis 分布式鎖

SystemVerilog structure (II)

Basic use of MySQL

C语言输入/输出流和文件操作

英特尔开源深度学习工具库 OpenVINO,将加大与本土软硬件方合作,持续开放

How to cancel automatic search and install device drivers for laptops

Soft test network engineer full truth simulation question (including answer and analysis)

National Security Agency (NSA) "sour Fox" vulnerability attack weapon platform technical analysis report

Transition technology from IPv4 to IPv6
随机推荐
National Security Agency (NSA) "sour Fox" vulnerability attack weapon platform technical analysis report
Determine whether the linked list is a palindrome linked list
Gold, silver and four want to change jobs, so we should seize the time to make up
【C语言基础】12 字符串
Rhcsa Road
越来越多地使用 SLO 来实现可观测性|DevOps
Basic use of MySQL
剑指 Offer II 105. 岛屿的最大面积
unity3d扩展工具栏
Redis 分布式鎖
How to solve the keyboard key failure of notebook computer
Ring iron pronunciation, dynamic and noiseless, strong and brilliant, magic wave hifiair Bluetooth headset evaluation
PR basic clip operation / video export operation
Buuctf gold III
How to maintain the laptop battery
[live broadcast appointment] database obcp certification comprehensive upgrade open class
可迭代对象与迭代器、生成器的区别与联系
如何写出好代码 — 防御式编程指南
Hi Fun Summer, play SQL planner with starrocks!
游戏行业安全选择游戏盾,效果怎么样?