SlideShare a Scribd company logo
DETECTING LEVELLING RODS
USING SIFT FEATURE MATCHING
GROUP 1
MSc Course 2006-08
25TH
June 2007
Sajid Pareeth
Sonam Tashi
Gabriel Vincent Sanya
Michael Mutale
PHOTOGRAMMETRY STUDIO
Objective
Introduction
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
 To develop a MATLAB procedure for the detection of
levelling rods.
 To carry out matching based on Algorithms proposed by
David Lowe
 Object recognition using invariant features
Transformation
Examples
Summary of Steps
Images
SIFT Key Feature Extraction
Keypoint Matching
Removing Outliers - RANSAC
Transformation
Introduction
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
Background - SIFT
 Published by David Lowe et al. 1999-2004
 Algorithm to extract features that are invariant to
rotation,
scaling and
 partially invariant to
changes in illumination and camera viewpoint
 Resulting features are highly distinctive
Consists of (Major stages of computation):
 Scale-space extrema detection-the Gaussian Widow
 Keypoint localization- 4x4 samples per window in 8
directions
 Orientation assignment
 Keypoint descriptor-feature vector is modified to reduce the effects of illumination
change. The vector is normalized to unit length. large gradient magnitudes by thresholding the
values in the unit feature vector to each be no larger than 0.2, and then renormalizing to unit
length.
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
Introduction
A keypoint descriptor is created by first computing the
gradient magnitude and orientation at each image sample
point in a region around the keypoint location,
These are weighted by a Gaussian window, indicated by
the overlaid circle. These samples are then accumulated
into orientation histograms summarizing the contents over
4x4 subregions,
The length of each arrow corresponding to the sum of the
gradient magnitudes near that direction within
the region.
Scale Invariant Detection
 Consider regions (e.g. circles) of different sizes around
a point
 Regions of corresponding sizes will look the same in
both images SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
SIFT Algorithm
Introduction
 The problem: how do we choose
corresponding circles independently in each
image?
Scale Invariant Detection
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
SIFT Algorithm
Introduction
 Solution:
 Design a function on the region (circle), which is
“scale invariant” (the same for corresponding
regions, even if they are at different scales)
Example: average intensity. For corresponding regions
(even of different sizes) it will be the same.
 For a point in one image, we can consider it as a
function of region size (circle radius)
scale = 1/2
f
region size
Image 1 f
region size
Image 2
Scale Invariant Detection
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
SIFT Algorithm
Introduction
 Common approach
scale = 1/2
f
region size
Image 1 f
region size
Image 2
Take a local maximum of this function
Observation: region size, for which the maximum is achieved,
should be invariant to image scale.
s1 s2
Important: this scale invariant region size is found
in each image independently!
Scale Invariant Detection
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
SIFT Algorithm
Introduction
scale
x
y
← DoG →
←DoG→
SIFT(Lowe)
Maxima and minima of the difference-of-Gaussian
images detected by comparing a pixel (marked with X)
to its 26 neighbors in 3x3 regions at the current and
adjacent scales (marked with circles).
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
SIFT Algorithm
Introduction
Gaussian pyramids
Scale
First Octave
Scale
Next
Octave
Difference of Gaussians
Difference of Gaussian(DoG)
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
SIFT Algorithm
Introduction
Keypoint Descriptors
Feature Vectors
 Thresholded image gradients sampled over:
 16x16 array of locations in scale space
 Histogram of 4x4 samples per window in 8 directions
 Gaussian weighting around center
 8 orientations x 4 x 4 histogram array = 128 dimensional
feature vector
 4x4 Gradient window
SIFT Algorithm
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
SIFT-Keypoints
Extraction
Introduction
Gaussian Gradient Window
Criteria for Selection
 Prominent
 Distinguishable-from neighborhood
 Invariant
 Stable to disturbances
 Rare (exceptional) - from other selected points
 Meaningful - with respect to image interpretation
SIFT Algorithm
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
SIFT-Keypoints
Extraction
Introduction
SIFT keypoints
 Detected Keypoints in reference and candidate image
 Keypoints in both images will be matched
Candidate image with keypointsReference image
with keypoints
SIFT Algorithm
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
SIFT-Keypoints
Extraction
Introduction
Keypoint Matching
 Fundamental aspect in computer vision.
 Based on Euclidean distance of the feature vectors.
 Nearest neighbor algorithms.
 Product between descriptors is calculated.
 Inverse cosine of the products gives the Euclidean distance
 Matches with Ratio of vector angles from the nearest to second
nearest neighbor less than distRatio value are selected.
SIFT Algorithm
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
SIFT-Keypoints
Extraction
Introduction
90% of the false matches are
removed.
False matches due to ambiguos
features or features arise from
background clutter.
Reliable object recognition with
few best Matches
Remove outliers
Matched points
SIFT Algorithm
SIFT-Keypoints
Extraction
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
Keypoints
Matching
Introduction
RANSAC: Algorithm
RANdom SAmple Consensus
 Estimate parameters of a mathematical model from a set of
observed data which contains outliers.
 A model is fitted using hypothetical inliers.
 If other data fits to the model, added to the inliers.
 Reestimated the model with the new set of inliers.
 We used ransac-fit-homography which Robustly fits a
homography to a set of matched points.
SIFT Algorithm
SIFT-Keypoints
Extraction
Work Flow
Advantages/
Limitations
Demo
Transformation
Examples
Keypoints
Matching
RANSAC
Introduction
Ransac
RANSAC: Result
SIFT Algorithm
SIFT-Keypoints
Extraction
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
Keypoints
Matching
Introduction
Make the shortest image the
same height as the other image.
Append Images
Transformation
tform = cp2tform(M1,M2,’affine')
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
Advantages/
Limitations
Demo
Transformation
Examples
RANSAC
Introduction
TStructure
2
3
Rod vs. OpenShrubs
1
Matches: 9
2
Rod: 626 keypoints found
Image: 28958 keypoints found
Matches: 16
…Good Matches
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Examples
Transformation
Introduction
2
Rod Vs Human Occlusion??
1
Rod: 626 keypoints found
Image: 2347 keypoints found
Matches: 155
Rod: 626 keypoints found
Image: 2347 keypoints found
Matches: 144
2
3
…Good Matches
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
Introduction
Limitations
1
Rod: 626 keypoints found
Image: 17927 keypoints found
Matches: 16
Matches: 4
2
Rod: 626 keypoints found
Image: 30505 keypoints found
3
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
Introduction
Advantages
 Locality: features are local, so robust to occlusion and clutter
(no prior segmentation)
 Distinctiveness: individual features can be matched to a large
database of objects
 Quantity: many features can be generated for even small
objects
 Efficiency: close to real-time performance
 Extensibility: can easily be extended to wide range of differing
feature types, with each adding robustness
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Demo
Transformation
Examples
Introduction
Problems/Enhancement
 Only invariant to affine transformations to a certain degree
 Best performance on highly textured images
 Use Principal components analysis PCA instead of Gaussian
weighting for gradients
Demo
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Transformation
Examples
Introduction
Demo
Demo
SIFT Algorithm
SIFT-Keypoints
Extraction
Keypoints
Matching
Work Flow
RANSAC
Advantages/
Limitations
Transformation
Examples
Introduction
THANK YOU!!

More Related Content

What's hot (20)

PDF
Object tracking presentation
MrsShwetaBanait1
 
PPTX
Image enhancement techniques
Saideep
 
PDF
Machine Learning - Object Detection and Classification
Vikas Jain
 
PDF
Depth Fusion from RGB and Depth Sensors II
Yu Huang
 
PPT
Image segmentation ppt
Gichelle Amon
 
PPT
Chapter 2 Image Processing: Pixel Relation
Varun Ojha
 
PDF
[SIGGRAPH 2016] Automatic Image Colorization
Satoshi Iizuka
 
PDF
Lec10: Medical Image Segmentation as an Energy Minimization Problem
Ulaş Bağcı
 
PDF
Single Image Super Resolution Overview
LEE HOSEONG
 
PDF
Image segmentation
Kuppusamy P
 
PPT
Chapter 5 Image Processing: Fourier Transformation
Varun Ojha
 
PDF
Deep Learning’s Application in Radar Signal Data
Yu Huang
 
PPT
digital image processing
N.CH Karthik
 
PDF
digital image processing, image processing
Kalyan Acharjya
 
PPTX
Deep learning for object detection
Wenjing Chen
 
PPTX
Object detection
Jksuryawanshi
 
PPT
brain tumor detection by thresholding approach
Sahil Prajapati
 
PPTX
You Only Look Once: Unified, Real-Time Object Detection
DADAJONJURAKUZIEV
 
Object tracking presentation
MrsShwetaBanait1
 
Image enhancement techniques
Saideep
 
Machine Learning - Object Detection and Classification
Vikas Jain
 
Depth Fusion from RGB and Depth Sensors II
Yu Huang
 
Image segmentation ppt
Gichelle Amon
 
Chapter 2 Image Processing: Pixel Relation
Varun Ojha
 
[SIGGRAPH 2016] Automatic Image Colorization
Satoshi Iizuka
 
Lec10: Medical Image Segmentation as an Energy Minimization Problem
Ulaş Bağcı
 
Single Image Super Resolution Overview
LEE HOSEONG
 
Image segmentation
Kuppusamy P
 
Chapter 5 Image Processing: Fourier Transformation
Varun Ojha
 
Deep Learning’s Application in Radar Signal Data
Yu Huang
 
digital image processing
N.CH Karthik
 
digital image processing, image processing
Kalyan Acharjya
 
Deep learning for object detection
Wenjing Chen
 
Object detection
Jksuryawanshi
 
brain tumor detection by thresholding approach
Sahil Prajapati
 
You Only Look Once: Unified, Real-Time Object Detection
DADAJONJURAKUZIEV
 

Similar to Feature Matching using SIFT algorithm (20)

PDF
Video Stitching using Improved RANSAC and SIFT
IRJET Journal
 
PDF
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
ijfcstjournal
 
PDF
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
ijfcstjournal
 
PPT
PCA-SIFT: A More Distinctive Representation for Local Image Descriptors
wolf
 
PDF
Svd filtered temporal usage clustering
Liang Xie, PhD
 
PPTX
Realtime pothole detection system using improved CNN Models
nithinsai2992
 
PPTX
All projects
Karishma Jain
 
PPTX
Graphics
Nidhi Baranwal
 
PDF
CNN vs SIFT-based Visual Localization - Laura Leal-Taixé - UPC Barcelona 2018
Universitat Politècnica de Catalunya
 
DOCX
Sift detector boosted by adaptive contrast threshold to improve matching robu...
Venkat Projects
 
DOCX
Sift detector boosted by adaptive contrast threshold to improve matching robu...
Venkat Projects
 
PDF
An automatic algorithm for object recognition and detection based on asift ke...
Kunal Kishor Nirala
 
PDF
Lecture 01 frank dellaert - 3 d reconstruction and mapping: a factor graph ...
mustafa sarac
 
PPTX
casestudy_important.pptx
ssuser31398b
 
PDF
Intelligent Auto Horn System Using Artificial Intelligence
IRJET Journal
 
PPT
Using FME for Topographical Data Generalization at Natural Resources Canada
Safe Software
 
PPTX
EGUE Technikrom Final_8_12_13
Paul Brodbeck
 
PDF
Panoramic Imaging using SIFT and SURF
Eric Jansen
 
PPTX
Project Based on MATLAB For Final Year Research Guidance
Matlab Simulation
 
PDF
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
Nooria Sukmaningtyas
 
Video Stitching using Improved RANSAC and SIFT
IRJET Journal
 
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
ijfcstjournal
 
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
ijfcstjournal
 
PCA-SIFT: A More Distinctive Representation for Local Image Descriptors
wolf
 
Svd filtered temporal usage clustering
Liang Xie, PhD
 
Realtime pothole detection system using improved CNN Models
nithinsai2992
 
All projects
Karishma Jain
 
Graphics
Nidhi Baranwal
 
CNN vs SIFT-based Visual Localization - Laura Leal-Taixé - UPC Barcelona 2018
Universitat Politècnica de Catalunya
 
Sift detector boosted by adaptive contrast threshold to improve matching robu...
Venkat Projects
 
Sift detector boosted by adaptive contrast threshold to improve matching robu...
Venkat Projects
 
An automatic algorithm for object recognition and detection based on asift ke...
Kunal Kishor Nirala
 
Lecture 01 frank dellaert - 3 d reconstruction and mapping: a factor graph ...
mustafa sarac
 
casestudy_important.pptx
ssuser31398b
 
Intelligent Auto Horn System Using Artificial Intelligence
IRJET Journal
 
Using FME for Topographical Data Generalization at Natural Resources Canada
Safe Software
 
EGUE Technikrom Final_8_12_13
Paul Brodbeck
 
Panoramic Imaging using SIFT and SURF
Eric Jansen
 
Project Based on MATLAB For Final Year Research Guidance
Matlab Simulation
 
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
Nooria Sukmaningtyas
 
Ad

More from Sajid Pareeth (6)

PDF
PhD defence presentation, 12 July 2016 @ FU-Berlin
Sajid Pareeth
 
PDF
Monitoring and retrieving historical daily surface temperature of sub-alpine ...
Sajid Pareeth
 
PDF
Inter-sensor comparison of lake surface temperatures derived from MODIS, AVHR...
Sajid Pareeth
 
PDF
An open source framework for processing daily satellite images (AVHRR) over l...
Sajid Pareeth
 
PPT
Spatial Data Infrastructure in Europe
Sajid Pareeth
 
PPTX
Irrigated Area Mapping, South Asia
Sajid Pareeth
 
PhD defence presentation, 12 July 2016 @ FU-Berlin
Sajid Pareeth
 
Monitoring and retrieving historical daily surface temperature of sub-alpine ...
Sajid Pareeth
 
Inter-sensor comparison of lake surface temperatures derived from MODIS, AVHR...
Sajid Pareeth
 
An open source framework for processing daily satellite images (AVHRR) over l...
Sajid Pareeth
 
Spatial Data Infrastructure in Europe
Sajid Pareeth
 
Irrigated Area Mapping, South Asia
Sajid Pareeth
 
Ad

Recently uploaded (20)

PDF
Why aren't you using FME Flow's CPU Time?
Safe Software
 
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
PDF
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
PDF
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
PPTX
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
PDF
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPSX
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
PPTX
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
PDF
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
 
PDF
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
PDF
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
PDF
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
PPTX
Smart Factory Monitoring IIoT in Machine and Production Operations.pptx
Rejig Digital
 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PDF
My Journey from CAD to BIM: A True Underdog Story
Safe Software
 
PDF
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 
Why aren't you using FME Flow's CPU Time?
Safe Software
 
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
 
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
Smart Factory Monitoring IIoT in Machine and Production Operations.pptx
Rejig Digital
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Kubernetes - Architecture & Components.pdf
geethak285
 
My Journey from CAD to BIM: A True Underdog Story
Safe Software
 
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 

Feature Matching using SIFT algorithm

  • 1. DETECTING LEVELLING RODS USING SIFT FEATURE MATCHING GROUP 1 MSc Course 2006-08 25TH June 2007 Sajid Pareeth Sonam Tashi Gabriel Vincent Sanya Michael Mutale PHOTOGRAMMETRY STUDIO
  • 2. Objective Introduction SIFT Algorithm SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo  To develop a MATLAB procedure for the detection of levelling rods.  To carry out matching based on Algorithms proposed by David Lowe  Object recognition using invariant features Transformation Examples
  • 3. Summary of Steps Images SIFT Key Feature Extraction Keypoint Matching Removing Outliers - RANSAC Transformation Introduction SIFT Algorithm SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples
  • 4. Background - SIFT  Published by David Lowe et al. 1999-2004  Algorithm to extract features that are invariant to rotation, scaling and  partially invariant to changes in illumination and camera viewpoint  Resulting features are highly distinctive Consists of (Major stages of computation):  Scale-space extrema detection-the Gaussian Widow  Keypoint localization- 4x4 samples per window in 8 directions  Orientation assignment  Keypoint descriptor-feature vector is modified to reduce the effects of illumination change. The vector is normalized to unit length. large gradient magnitudes by thresholding the values in the unit feature vector to each be no larger than 0.2, and then renormalizing to unit length. SIFT Algorithm SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples Introduction
  • 5. A keypoint descriptor is created by first computing the gradient magnitude and orientation at each image sample point in a region around the keypoint location, These are weighted by a Gaussian window, indicated by the overlaid circle. These samples are then accumulated into orientation histograms summarizing the contents over 4x4 subregions, The length of each arrow corresponding to the sum of the gradient magnitudes near that direction within the region.
  • 6. Scale Invariant Detection  Consider regions (e.g. circles) of different sizes around a point  Regions of corresponding sizes will look the same in both images SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples SIFT Algorithm Introduction
  • 7.  The problem: how do we choose corresponding circles independently in each image? Scale Invariant Detection SIFT Algorithm SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples SIFT Algorithm Introduction
  • 8.  Solution:  Design a function on the region (circle), which is “scale invariant” (the same for corresponding regions, even if they are at different scales) Example: average intensity. For corresponding regions (even of different sizes) it will be the same.  For a point in one image, we can consider it as a function of region size (circle radius) scale = 1/2 f region size Image 1 f region size Image 2 Scale Invariant Detection SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples SIFT Algorithm Introduction
  • 9.  Common approach scale = 1/2 f region size Image 1 f region size Image 2 Take a local maximum of this function Observation: region size, for which the maximum is achieved, should be invariant to image scale. s1 s2 Important: this scale invariant region size is found in each image independently! Scale Invariant Detection SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples SIFT Algorithm Introduction
  • 10. scale x y ← DoG → ←DoG→ SIFT(Lowe) Maxima and minima of the difference-of-Gaussian images detected by comparing a pixel (marked with X) to its 26 neighbors in 3x3 regions at the current and adjacent scales (marked with circles). SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples SIFT Algorithm Introduction
  • 11. Gaussian pyramids Scale First Octave Scale Next Octave Difference of Gaussians Difference of Gaussian(DoG) SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples SIFT Algorithm Introduction
  • 12. Keypoint Descriptors Feature Vectors  Thresholded image gradients sampled over:  16x16 array of locations in scale space  Histogram of 4x4 samples per window in 8 directions  Gaussian weighting around center  8 orientations x 4 x 4 histogram array = 128 dimensional feature vector  4x4 Gradient window SIFT Algorithm Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples SIFT-Keypoints Extraction Introduction Gaussian Gradient Window
  • 13. Criteria for Selection  Prominent  Distinguishable-from neighborhood  Invariant  Stable to disturbances  Rare (exceptional) - from other selected points  Meaningful - with respect to image interpretation SIFT Algorithm Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples SIFT-Keypoints Extraction Introduction
  • 14. SIFT keypoints  Detected Keypoints in reference and candidate image  Keypoints in both images will be matched Candidate image with keypointsReference image with keypoints SIFT Algorithm Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples SIFT-Keypoints Extraction Introduction
  • 15. Keypoint Matching  Fundamental aspect in computer vision.  Based on Euclidean distance of the feature vectors.  Nearest neighbor algorithms.  Product between descriptors is calculated.  Inverse cosine of the products gives the Euclidean distance  Matches with Ratio of vector angles from the nearest to second nearest neighbor less than distRatio value are selected. SIFT Algorithm Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples SIFT-Keypoints Extraction Introduction
  • 16. 90% of the false matches are removed. False matches due to ambiguos features or features arise from background clutter. Reliable object recognition with few best Matches Remove outliers Matched points SIFT Algorithm SIFT-Keypoints Extraction Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples Keypoints Matching Introduction
  • 17. RANSAC: Algorithm RANdom SAmple Consensus  Estimate parameters of a mathematical model from a set of observed data which contains outliers.  A model is fitted using hypothetical inliers.  If other data fits to the model, added to the inliers.  Reestimated the model with the new set of inliers.  We used ransac-fit-homography which Robustly fits a homography to a set of matched points. SIFT Algorithm SIFT-Keypoints Extraction Work Flow Advantages/ Limitations Demo Transformation Examples Keypoints Matching RANSAC Introduction
  • 18. Ransac RANSAC: Result SIFT Algorithm SIFT-Keypoints Extraction Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples Keypoints Matching Introduction
  • 19. Make the shortest image the same height as the other image. Append Images Transformation tform = cp2tform(M1,M2,’affine') SIFT Algorithm SIFT-Keypoints Extraction Keypoints Matching Work Flow Advantages/ Limitations Demo Transformation Examples RANSAC Introduction TStructure
  • 20. 2 3 Rod vs. OpenShrubs 1 Matches: 9 2 Rod: 626 keypoints found Image: 28958 keypoints found Matches: 16 …Good Matches SIFT Algorithm SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Examples Transformation Introduction
  • 21. 2 Rod Vs Human Occlusion?? 1 Rod: 626 keypoints found Image: 2347 keypoints found Matches: 155 Rod: 626 keypoints found Image: 2347 keypoints found Matches: 144 2 3 …Good Matches SIFT Algorithm SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples Introduction
  • 22. Limitations 1 Rod: 626 keypoints found Image: 17927 keypoints found Matches: 16 Matches: 4 2 Rod: 626 keypoints found Image: 30505 keypoints found 3 SIFT Algorithm SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples Introduction
  • 23. Advantages  Locality: features are local, so robust to occlusion and clutter (no prior segmentation)  Distinctiveness: individual features can be matched to a large database of objects  Quantity: many features can be generated for even small objects  Efficiency: close to real-time performance  Extensibility: can easily be extended to wide range of differing feature types, with each adding robustness SIFT Algorithm SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Demo Transformation Examples Introduction
  • 24. Problems/Enhancement  Only invariant to affine transformations to a certain degree  Best performance on highly textured images  Use Principal components analysis PCA instead of Gaussian weighting for gradients Demo SIFT Algorithm SIFT-Keypoints Extraction Keypoints Matching Work Flow RANSAC Advantages/ Limitations Transformation Examples Introduction