Computer Science ›› 2018, Vol. 45 ›› Issue (10): 281-285.doi: 10.11896/j.issn.1002-137X.2018.10.052

• Graphics, Image & Pattern Recognition • Previous Articles     Next Articles

Object Contour Extraction Algorithm Based on Biological Visual Feature

WU Jing1, YANG Wu-nian2, SANG Qiang1   

  1. College of Information Science &Technology,Chengdu University of Technology,Chengdu 610059,China 1
    College of Earth Science,Chengdu University of Technology,Chengdu 610059,China 2
  • Received:2018-02-02 Online:2018-11-05 Published:2018-11-05

Abstract: Object contour extraction from natural scenes plays an important role in computer vision.However,it is difficult to preserve the integrality of the object contour in cluttered scenes because of non-meaningful edges engendered from texture field.Recently,the task benefits from a biologically motivated mechanism called as surround suppression (SS) that can preserve the object boundaries while suppressing the texture edges.Nevertheless,the traditional models just adopt a simple combination method of intersection and union that fails to process the short edges with intensity response.This paper proposed an improved natural images object contour extraction algorithm based on biological visual feature.Firstly,a candidate edge set is obtained by multi-level suppression method.Secondly,an edge combination methodbased on biological visual feature is used to combine candidate edges to a completed contour.Experiments show that theproposed method improves the accuracy and integrality compared to the traditional surround suppression methods.

Key words: Contour extraction, Surround suppression, Visual feature, Edge detection, Natural images

CLC Number: 

  • TP391
[1]CAVANAUGH J R,BAIR W,MOVSHON J A.Orientation-selective setting of contrast gain by the surrounds of macaque st-riate cortex neurons [J].Society for Neuroscience Abstracts,1997(23):567-579.
[2]JONES H E,GRIEVE K L,WANG W,et al.Surround suppression in primate V1 [J].Neurophysiology,2001,86 (10):2011-2028.
[3]CHEN G,YANG Y H.Edge detection by regularized cubic B-spline fitting [J].IEEE Transactions on Systems,Man,and Cybernetics,1995,25(4):635-642.
[4]NALWA V S,BINFORD T O.On detecting edges [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1986,8(6):699-714.
[5]FOLSOM T,PINTER R.Primitive features by steering,quadrature and scale [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1998,20(11):1161-1173.
[6]QU Z G,GAO Y H,WANG P,et al.Contour Detection by Thresholding the Gradient Image in Spatial-frequency Domain [J].Computer Science,2012,39(10):286-289.(in Chinese)
曲智国,高颖慧,王平,等.基于空频域联合阈值分割的轮廓检测方法 [J].计算机科学,2012,39(10):286-289.
[7]BLACKM J,SAPIRO G,MARIMONT D,et al.Robust aniso- tropic diffusion [J].IEEE Transaction on Image Processing,1998,7(3):421-432.
[8]MA W Y,MANJUNATH B S.Edge flow:A technique for boundary detection and image segmentation [J].IEEETransactions on Image Processing,2000,9(8):1375-1388.
[9]GRIGORESCU C,PETKOV N,WESTENBERG M A.Contour detection based on non-classical receptive field inhibition [J].IEEE Transection on Image Processing,2003,12(7):729-739.
[10]GRIGORESCU C,PETKOV N,WESTENBERG M A.Contour and boundary detection improved by surround suppression of texture edges [J].Image Vision Computing,2004,22(8):609-622.
[11]TANG Q,SANG N,ZHANG T.Extraction of salient contours from cluttered scenes [J].Pattern Recognition,2007,40(11):3100-3109.
[12]YAN C,ZHANG J Z.Contour detection based on multilevel inhibition [J].Journal of Image and Graphics,2012,17(6):664-670.(in Chinese)
闫超,张建州.多水平外区抑制的轮廓检测[J].中国图像图形学报,2012,17(6):664-670.
[13]YAN C,ZHANG J Z,JIANG Z M.Contour Detection Based on Surround Inhibition and Markov Model [J].Journal of University of Electronic Science and Technology of China,2016,45(1):135-140.(in Chinese)
闫超,张建州,姜正茂.基于多水平外区抑制与马尔可夫随机场的轮廓检测算法 [J].电子科技大学学报,2016,5(1):135-140.
[14]PAPARI G,PETKOV N.An improved model for surround suppression by steerable filters and multilevel inhibition with application to contour detection [J].Pattern Recognition,2011,44(9):1999-2007.
[15]TANG Q,SANG N,LIU H.Contrast-dependent surround suppression models for contour detection [J].Pattern Recognition,2016,60:51-61.
[16]LIN C,XU G L,CAO Y J.Contour detection model using linear and non-linear modulation based on non-CRF suppression [J].IET Image Processing,2018,12(6):993-1003.
[17]WU J L,LIU Y J.Contour Detection Model Based on Color Opponent Receptive Field [J].Computer Science,2016,43(7):319-323.(in Chinese)
吴璟莉,刘袁静.一种基于颜色拮抗感受野的轮廓检测模型 [J].计算机科学,2016,43(7):319-323.
[18]SANG Q,CAI B,CHEN H.Contour detection improved by context adaptive surround suppression [J].Plos One,2017,12(7):1-13.
[19]GEISLER W S,PERRY J S,SUPER B J,et al.Edge co-occurrence in natural images predicts contour grouping performance [J].Vision Research,2001,41(6):711-724.
[20]HESS R F,DAKIN S C.Contour integration in the peripheral field [J].Vision Research,1999,39(5):947-959.
[21]DAKIN S C.The detection of structure in Glass patterns:psychophysics and computational models [J].Vision Research,1997,37(16):2227-2246.
[1] LIU Jun-qi, LI Zhi and ZHANG Xue-yang. Candidate Region Detection Method for Maritime Ship Based on Visual Saliency [J]. Computer Science, 2020, 47(6A): 237-241.
[2] ZHOU Yue-yong,CHENG Jiang-hua,LIU Tong,WANG Yang,CHEN Ming-hui. Review of Road Extraction for High-resolution SAR Images [J]. Computer Science, 2020, 47(1): 124-135.
[3] HUO Xing, FEI Zhi-wei, ZHAO Feng, SHAO Kun. Application of Deep Learning in Driver’s Safety Belt Detection [J]. Computer Science, 2019, 46(6A): 182-187.
[4] WANG Ya-ge, KANG Xiao-dong, GUO Jun, HONG Rui, LI Bo, ZHANG Xiu-fang. Image Compression Method Combining Canny Edge Detection and SPIHT [J]. Computer Science, 2019, 46(6A): 222-225.
[5] WANG Zhi-hui, LI Jia-tong, XIE Si-yan, ZHOU Jia, LI Hao-jie, FAN Xin. Two-stage Method for Video Caption Detection and Extraction [J]. Computer Science, 2018, 45(8): 50-53.
[6] ZHOU Jian, XU Hai-qin. Image Edge Detection Method Based on Kernel Density Estimation [J]. Computer Science, 2018, 45(6A): 239-241.
[7] LIU Zhao-xia, SHAO Feng, JING Yu and QI Rui-hua. Feature Matching Algorithm Based on Visual Feature Constrained Energy Minimization [J]. Computer Science, 2018, 45(5): 228-231.
[8] LI Shan-shan, CHEN Li, ZHANG Yong-xin and YUAN Ya-ting. Fuzzy Edge Detection Algorithm Based on RPCA [J]. Computer Science, 2018, 45(5): 273-279.
[9] YU Xiao-qing, CHEN Ren-wen, TANG Jie, XU Jin-ting. Edge Detection for Noisy Image Based on Wavelet Transform and New Mathematical Morphology [J]. Computer Science, 2018, 45(11A): 194-197.
[10] SHAO Peng, ZHOU Wei, LI Guang-quan, WU Zhi-jian. Improved Anti-aliasing Algorithm Based on Deferred Shading [J]. Computer Science, 2018, 45(11A): 218-221.
[11] ZHANG Xiu-feng, WANG Juan, DING Qiang. Research on Intelligent Detection Method of Steel Rail Abrasion [J]. Computer Science, 2018, 45(11A): 274-277.
[12] QU Zhong, JU Fang-rong, CHEN Si-qi. Concrete Surface Cracks Detection Combining Structured Forest Edge Detection and Percolation Model [J]. Computer Science, 2018, 45(11): 288-291.
[13] ZHANG Zhi-guo, ZHENG Xi and LAN Jing-chuan. Image Edge Detection Based on Pyramidal Algorithm of Interpolation Wavelet [J]. Computer Science, 2017, 44(Z6): 164-168.
[14] WANG Meng-di, ZHANG You-mei and CHANG Fa-liang. Text Localization Based on Edge Detection and Features Fusion in Natural Scene [J]. Computer Science, 2017, 44(9): 300-303.
[15] WANG Mei, LI Lin, WANG Bin and HE Gao-ming. Study on Watershed Algorithm Applied to Active Contour Model Energy Segmentation Algorithm [J]. Computer Science, 2017, 44(5): 314-319.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .