Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология Образование Политология Производство Психология Стандартизация Технологии |
Composite Morphological Operators
Opening and Closing Using the elementary erosion and dilation operations we now develop further useful operations to work on the form of objects. While in the previous section we focused on the general and theoretical aspects of morphological operations, we now concentrate on application. The erosion operation is useful for removing small objects. However, it has the disadvantage that all the remaining objects shrink in size. We can avoid this eff ect by dilating the image after erosion with the same structure element. This combination of operations is called an opening operation G ◦ M = ( G ∅ M ) ⊕ M. (18.17) The opening sieves out all objects which at no point completely con- tain the structure element, but avoids a general shrinking of object size (Fig. 18.2c, d). It is also an ideal operation for removing lines with a thickness smaller than the diameter of the structure element. Note also that the object boundaries become smoother. In contrast, the dilation operator enlarges objects and closes small holes and cracks. General enlargement of objects by the size of the structure element can be reversed by a following erosion (Fig. 18.3d and e). This combination of operations is called a closing operation G • M = ( G ⊕ M ) ∅ M. (18.18) The area change of objects with diff erent operations may be summarized by the following relations: G ∅ M ⊆ G ◦ M ⊆ G ⊆ G • M ⊆ G ⊕ M. (18.19) Opening and closing are idempotent operations: G • M = ( G • M ) • M G ◦ M = ( G ◦ M ) ◦ M, (18.20) 18.4 Composite Morphological Operators 487
A b
C d
Figure 18.2: Erosion and opening: a original binary image; b erosion with a 3 × 3 mask; c opening with a 3 × 3 mask; d opening with a 5 × 5 mask.
i. e., a second application of a closing and opening with the same struc- ture element does not show any further eff ects.
Hit-Miss Operator The hit-miss operator originates from the question of whether it is pos- sible to detect objects of a specifi c shape. The erosion operator only removes objects that at no point completely contain the structure ele- ment and thus removes objects of very diff erent shapes. Detection of a specifi c shape requires a combination of two morphological operators. As an example, we discuss the detection of objects containing horizontal rows of three consecutive pixels.
M 1 = [11 1], (18.21) we will remove all objects that are smaller than the target object but retain also all objects that are larger than the mask, i. e., where the shifted mask is a subset of the object G (( M p ⊆ G ), Fig. 18.4d). Thus, we now 488 18 Morphology
A b
C d
Figure 18.3: Dilation and closing: a original binary image; b dilation with a 3 × 3 mask; c closing with a 3 × 3 mask; d closing with a 5 × 5 mask.
need a second operation to remove all objects larger than the target object.
. (18.22)
18.4 Composite Morphological Operators 489
A b c
D e f
defi ned as
G ⊗ ( M 1, M 2) = ( G ∅ M 1) ∩ ( G ∅ M 2 ) = ( G ∅ M 1) ∩ ( G ⊕ M 2)
(18.23)
With the hit-miss operator, we have a fl exible tool with which we can detect objects of a given specifi c shape. The versatility of the hit-miss operator can easily be demonstrated by using another miss mask
. (18.24)
Erosion of the background with this mask leaves all pixels in the binary image where the union of the mask M 3 with the object is zero (Fig. 18.4c). This can only be the case for objects with horizontal rows of one to fi ve 490 18 Morphology
(x) notation. The combined mask is marked by 1 where the hit mask is one, by 0 where the miss mask is one, and by x where both masks are zero. Thus, the hit-miss mask for detecting objects with horizontal rows of 3 to 5 consecutive pixels is
0 0 0 0 0 0 0
If a hit-miss mask has no don’t-care pixels, it extracts objects of an exact shape given by the 1-pixels of the mask. If don’t-care pixels are present in the hit-miss mask, the 1-pixels give the minimum and the union of the 1-pixels and don’t-care pixels the maximum of the detected objects. As another example, the hit-mass mask 0 0 0
detects isolated pixels. Thus, the operation G / G M I removes isolated pixels from a binary image. The / symbol represents the set diff erence operator. The hit-miss operator detects certain shapes only if the miss mask surrounds the hit mask. If the hit mask touches the edge of the hit-miss mask, only certain shapes at the border of an object are detected. The hit-miss mask x 1 0
1 1 0 , (18.27) 0 0 0 for instance, detects lower right corners of objects.
Thinning Often it is required to apply an operator that erodes an object but does not break it apart into diff erent pieces. With such an operator, the topol- ogy of the object is preserved and line-like structures can be reduced to a one-pixel thickness. Unfortunately, the erosion operator does not have this feature. It can break an object into pieces. 18.4 Composite Morphological Operators 491 A proper thinning operator, however, must not erode a point under the following conditions: (i) an object must not break into two pieces, (ii) an end point must not be removed so that the object does not be- come shorter, and (iii) an object must not be deleted. We illustrate this approach with the thinning of an object that has an 8-neighborhood con- nectivity. This corresponds to an erosion by a mask with 4-neighborhood connectivity:
0 1 0
(i) do not break object into two pieces: 0 0 0 0 1 0
(ii) do not remove end point: 0 1 0 0 0 0 0 0 0 0 0 0
and (iii) do not delete an object:
0 0 0
Thus only in 8 out of 16 cases that contain a nonzero central point, it is removed. Because there are only 32 possible patterns, the thinning operator can be implemented in an effi cient way by a 32-entry look-up table with binary output. The addresses for the table are computed in the following way. Each point in the mask corresponds to a bit of the address that is set if the pixel of the binary image on that position is set. The thinning operator is an iterative procedure which can be repeated until no further changes occur. Therefore it makes sense to use a second look-up table that gives a one if the thinning operator results in a change. In this way, it is easy to count changes and detect when no more changes occur. 492 18 Morphology
A b
C d
Figure 18.5: Boundary extraction with morphological operators: a original bi- nary image; b 8-connected and c 4-connected boundaries extracted with M b4 and M b8, respectively, Eq. (18.28); d 8-connected boundary of the background extracted by using Eq. (18.30).
Boundary Extraction Morphological operators can also be used to extract the boundary of a binary object. This operation is signifi cant as the boundary is a complete yet compact representation of the geometry of an object from which further shape parameters can be extracted, as we discuss later in this chapter. Boundary points miss at least one of their neighbors. Thus, an ero- sion operator with a mask containing all possible neighbors removes all boundary points. These masks for the 4- and 8-neighborhood are: 0 1 0 1 1 1 M b4 = 1 1 1 and M b8 = 1 1 1 . (18.28) 18.4 Composite Morphological Operators 493 The boundary is then obtained by the set diff erence (/ operator) between the object and the eroded object: ∂ G = G /( G ∅ M b ) = G ∩ ( G ∅ M b) = G ∩ ( G ¯ ⊕ M b). (18.29) As Eq. (18.29) shows, the boundary is also given as the intersection of the object with the dilated background. Figure 18.5 shows 4- and 8-connected boundaries extracted from binary objects using Eq. (18.28). The boundary of the background is similarly given by dilating the object and subtracting it: ∂ G B = ( G ⊕ M b)/ G. (18.30) Distance transforms The boundary consists of all points with a distance zero to the edge of the object. If we apply boundary extraction again to the object eroded with the mask Eq. (18.28), we obtain all points with a distance of one to the boundary of the object. A recursive application of the boundary extraction procedure thus gives the distance of all points of the object to the boundary. Such a transform is called a distance transform and can be written as b b
This straightforward distance transform has two serious fl aws. First, it is a slow iterative procedure. Second, it does not give the preferred Euclidian distance but — depending on the chosen neighborhood con- nectivity — the city block or chess board distance (Section 2.2.3). Fortunately, fast algorithms are available for computing the Euclidian distance. The Euclidian distance transform is an important transform because it introduces isotropy for morphological operations. All mor- phological operations suff er from the fact that the Euclidian distance is not a natural measure on a rectangular grid. Square-shaped structure elements, for instance, all inherit the chess board distance. Successive dilation with such structure elements makes the objects look more and more like squares, for instance. The Euclidian distance transform can be used to perform isotropic erosion and dilation operations. For an erosion operation with a radius r, we keep only pixels with a distance greater than r in the object. In 494 18 Morphology
a similar way, an isotropic dilation can be performed by computing a Euclidian distance transform of the background and then an isotropic erosion of the background.
18.5 Further Readings‡
The authoritative source for the theory of morphological image processing is a monograph written by the founders of image morphology, see Serra [168]. The more practical aspects are covered by Jä hne and Hauß ecker [82, Chapter 14] and Soille [175]. Meanwhile morphological image processing is a mature research area with a solid theoretical foundation and a wide range of applications as can be seen from recent conference proceeding, e. g., Serra and Soille [169].
|
Последнее изменение этой страницы: 2019-05-04; Просмотров: 213; Нарушение авторского права страницы