- Object recognition
**Object recognition**incomputer vision is a task of finding given object in an image or video sequence. Humans recognize a multitude of objects in images with little effort, despite the fact that the image of the objects may vary somewhat in different view points, in many different sizes / scale or even when they are translated or rotated. Objects can even be recognized when they are partially obstructed from view. This task is still a challenge forcomputer vision systems in general. David Lowe pioneered thecomputer vision approach to extracting and using scale-invariant SIFT features from images to perform reliable object recognition.For any object in an image, there are many 'features' which are interesting points on the object, that can be extracted to provide a "feature" description of the object. This description extracted from a training image can then be used to identify the object when attempting to locate the object in a test image containing many other objects. It is important that the set of features extracted from the training image is robust to changes in image scale, noise, illumination and local geometric distortion, for performing reliable recognition. Lowe's patented method [

*US patent|6,711,293, "Method and apparatus for identifying scale invariant features in an image and use of same for locating an object in an image", David Lowe's patent for the SIFT algorithm*] can robustly identify objects even among clutter and under partial occlusion because his SIFT feature descriptor is invariant to scale, orientation, affine distortion and partially invariant to illumination changesLowe, D. G., “Object recognition from local scale-invariant features”, International Conference on Computer Vision, Corfu, Greece, September 1999.] . This article presents Lowe's object recognition method in a nutshell and mentions a few competing techniques available for object recognition under clutter and partial occlusion.**David Lowe's method**SIFT keypoints of objects are first extracted from a set of reference images and stored in a database. An object is recognised in a new image by individually comparing each feature from the new image to this database and finding candidate matching features based on

Euclidean distance of their feature vectors. From the full set of matches, subsets of keypoints that agree on the object and its location, scale, and orientation in the new image are identified to filter out good matches. The determination of consistent clusters is performed rapidly by using an efficienthash table implementation of the generalizedHough transform . Each cluster of 3 or more features that agree on an object and its pose is then subject to further detailed model verification and subsequently outliers are discarded. Finally the probability that a particular set of features indicates the presence of an object is computed, given the accuracy of fit and number of probable false matches. Object matches that pass all these tests can be identified as correct with high confidenceLowe, D. G., “Distinctive Image Features from Scale-Invariant Keypoints”, International Journal of Computer Vision, 60, 2, pp. 91-110, 2004.] .**Key stages****cale-invariant feature detection**Lowe's method for image feature generation called the

**Scale Invariant Feature Transform**(SIFT) transforms an image into a large collection of feature vectors, each of which is invariant to image translation, scaling, and rotation, partially invariant to illumination changes and robust to local geometric distortion. These features share similar properties with neurons ininferior temporal cortex that are used for object recognition in primate vision [*Serre, T., Kouh, M., Cadieu, C., Knoblich, U., Kreiman, G., Poggio, T., “A Theory of Object Recognition: Computations and Circuits in the Feedforward Path of the Ventral Stream in Primate Visual Cortex”, Computer Science and Artificial Intelligence Laboratory Technical Report, December 19, 2005 MIT-CSAIL-TR-2005-082.*] . Key locations are defined as maxima and minima of the result ofdifference of Gaussians function applied inscale-space to a series of smoothed and resampled images. Low contrast candidate points and edge response points along an edge are discarded. Dominant orientations are assigned to localized keypoints. These steps ensure that the keypoints are more stable for matching and recognition. SIFT descriptors robust to local affine distortion are then obtained by considering pixels around a radius of the key location, blurring and resampling of local image orientation planes.**Feature matching and indexing**Indexing is the problem of storing SIFT keys and identifying matching keys from the new image. Lowe used a modification of the

k-d tree algorithm called the**Best-bin-first search**method [*Beis, J., and Lowe, D.G “Shape indexing using approximate nearest-neighbour search in high-dimensional spaces”, Conference on Computer Vision and Pattern Recognition,Puerto Rico, 1997, pp. 1000–1006.*] that can identify thenearest neighbor s with high probability using only a limited amount of computation. The BBF algorithm uses a modified search ordering for thek-d tree algorithm so that bins in feature space are searched in the order of their closest distance from the query location. This search order requires the use of aheap (data structure) basedpriority queue for efficient determination of the search order. The best candidate match for each keypoint is found by identifying itsnearest neighbor in the database of keypoints from training images. Thenearest neighbor s are defined as the keypoints with minimumEuclidean distance from the given descriptor vector. The probability that a match is correct can be determined by taking the ratio of distance from the closest neighbor to the distance of the second closest.**Cluster identification by Hough transform voting**Hough Transform is used to cluster reliable model hypotheses to search for keys that agree upon a particular modelpose .Hough transform identifies clusters of features with a consistent interpretation by using each feature to vote for all objectpose s that are consistent with the feature. When clusters of features are found to vote for the same pose of an object, the probability of the interpretation being correct is much higher than for any single feature. An entry in ahash table is created predicting the model location, orientation, and scale from the match hypothesis.Thehash table is searched to identify all clusters of at least 3 entries in a bin, and the bins are sorted into decreasing order of size.Each of the SIFT keypoints specifies 2D location, scale, and orientation, and each matched keypoint in the database has a record of the keypoint’s parameters relative to the training image in which it was found. The similarity transform implied by these 4 parameters is only an approximation to the full 6 degree-of-freedom pose space for a 3D object and also does not account for any non-rigid deformations. Therefore, Lowe used broad bin sizes of 30 degrees for orientation, a factor of 2 for scale, and 0.25 times the maximum projected training image dimension (using the predicted scale) for location. The SIFT key samples generated at the larger scale are given twice the weight of those at the smaller scale. This means that the larger scale is in effect able to filter the most likely neighbours for checking at the smaller scale. This also improves recognition performance by giving more weight to the least-noisy scale. To avoid the problem of boundary effects in bin assignment, each keypoint match votes for the 2 closest bins in each dimension, giving a total of 16 entries for each hypothesis and further broadening the pose range.

**Model verification by linear least squares**Each identified cluster is then subject to a verification procedure in which a

linear least squares solution is performed for the parameters of theaffine transformation relating the model to the image. Theaffine transformation of a model point [x y]^{T}to an image point [u v]^{T}can be written as below:$egin\{bmatrix\}\; u\; \backslash \; v\; end\{bmatrix\}\; =\; egin\{bmatrix\}\; m1\; m2\; \backslash \; m3\; m4\; end\{bmatrix\}\; egin\{bmatrix\}\; x\; \backslash \; y\; end\{bmatrix\}\; +\; egin\{bmatrix\}\; tx\; \backslash \; ty\; end\{bmatrix\}$

where the model translation is [tx ty]

^{T}and the affine rotation, scale, and stretch are represented by the parameters m1, m2, m3 and m4. To solve for the transformation parameters the equation above can be rewritten to gather the unknowns into a column vector.:$egin\{bmatrix\}\; x\; y\; 0\; 0\; 1\; 0\; \backslash \; 0\; 0\; x\; y\; 0\; 1\; \backslash \; ....\backslash \; ....end\{bmatrix\}\; egin\{bmatrix\}m1\; \backslash \; m2\; \backslash \; m3\; \backslash \; m4\; \backslash \; tx\; \backslash \; ty\; end\{bmatrix\}\; =\; egin\{bmatrix\}\; u\; \backslash \; v\; \backslash \; .\; \backslash \; .\; end\{bmatrix\}$

This equation shows a single match, but any number of further matches can be added, with each match contributing two more rows to the first and last matrix. At least 3 matches are needed to provide a solution.We can write this linear system as

:$Ahat\{mathbf\{x\; approx\; mathbf\{b\},$

where "A" is a known "m"-by-"n" matrix (usually with "m" > "n"),

**x**is an unknown "n"-dimensional parameter vector, and**b**is a known "m"-dimensional measurement vector.Therefore the minimizing vector $hat\{mathbf\{x$ is a solution of the

**normal equation**:$A^T\; !\; A\; hat\{mathbf\{x\; =\; A^T\; mathbf\{b\}.$The solution of the system of linear equations is given in terms of the matrix $(A^TA)^\{-1\}A^T$ , called the pseudoinverse of "A", by

:$hat\{mathbf\{x\; =\; (A^T!A)^\{-1\}\; A^T\; mathbf\{b\}.$

which minimizes the sum of the squares of the distances from the projected model locations to the corresponding image locations.

**Outlier detection**Outlier s can now be removed by checking for agreement between each image feature and the model, given the parameter solution. Given thelinear least squares solution, each match is required to agree within half the error range that was used for the parameters in theHough transform bins. As outliers are discarded, thelinear least squares solution is re-solved with the remaining points, and the process iterated. If fewer than 3 points remain after discardingoutlier s, then the match is rejected. In addition, a top-down matching phase is used to add any further matches that agree with the projected model position, which may have been missed from theHough transform bin due to the similarity transform approximation or other errors.The final decision to accept or reject a model hypothesis is based on a detailed probabilistic model [

*Lowe, D.G., Local feature view clustering for 3D object recognition. IEEE Conference on Computer Vision and Pattern Recognition,Kauai, Hawaii, 2001, pp. 682-688.*] . This method first computes the expected number of false matches to the model pose, given the projected size of the model, the number of features within the region, and the accuracy of the fit. ABayesian probability analysis then gives the probability that the object is present based on the actual number of matching features found. A model is accepted if the final probability for a correct interpretation is greater than 0.98. Lowe's SIFT based object recognition gives excellent results except under wide illumination variations and under non-rigid transformations.**Competing methods for scale invariant object recognition under clutter / partial occlusion**RIFT [

*Lazebnik, S., Schmid, C., and Ponce, J., Semi-Local Affine Parts for Object Recognition, BMVC, 2004.*] is a rotation-invariant generalization of SIFT. The RIFT descriptor is constructed using circular normalized patches divided into concentric rings of equal width and within each ring a gradient orientation histogram is computed. To maintain rotation invariance, the orientation is measured at each point relative to the direction pointing outward from the center.G-RIF [

*Sungho Kim, Kuk-Jin Yoon, In So Kweon, "Object Recognition Using a Generalized Robust Invariant Feature and Gestalt’s Law of Proximity and Similarity," Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06), 2006*] : Generalized Robust Invariant Feature is a general context descriptor which encodes edge orientation, edge density and hue information in a unified form combining perceptual information with spatial encoding. The object recognition scheme uses neighbouring context based voting to estimate object models."

SURF [*Bay, H., Tuytelaars, T., Gool, L.V., "SURF: Speeded Up Robust Features", Proceedings of the ninth European Conference on Computer Vision, May 2006.*] : Speeded Up Robust Features" is a performant scale and rotation-invariant interest point detector / descriptor claimed to approximate or even outperform previously proposed schemes with respect to repeatability, distinctiveness, and robustness.SURF relies on integral images for image convolutions to reduce computation time, builds on the strengths of the leading existing detectors and descriptors (using a fastHessian matrix -based measure for the detector and a distribution-based descriptor). It describes a distribution ofHaar wavelet responses within the interest point neighbourhood. Integral images are used for speed and only 64 dimensions are used reducing the time for feature computation and matching. The indexing step is based on the sign of theLaplacian ,which increases the matching speed and the robustness of the descriptor.PCA-SIFT [

*Ke, Y., and Sukthankar, R., PCA-SIFT: A More Distinctive Representation for Local Image DescriptorsComputer Vision and Pattern Recognition, 2004.*] andGLOH [*Mikolajczyk, K., and Schmid, C., "A performance evaluation of local descriptors", IEEE Transactions on Pattern Analysis and Machine Intelligence, 10, 27, pp 1615--1630, 2005.*] are variants of SIFT. PCA-SIFT descriptor is a vector of image gradients in x and y direction computed within the support region. The gradient region is sampled at 39x39 locations, therefore the vector is of dimension 3042. The dimension is reducedto 36 withPCA . Gradient location-orientation histogram (GLOH ) is an extension of the SIFT descriptor designed to increase its robustness and distinctiveness. The SIFT descriptor is computed for a log-polar location grid with three bins in radial direction (the radius set to 6, 11, and 15) and 8 in angular direction, which results in 17 location bins. The central bin is not divided in angular directions. The gradient orientations are quantized in 16 bins resulting in 272 bin histogram. The size of this descriptor is reduced withPCA . Thecovariance matrix forPCA is estimated on image patches collected from various images. The 128 largesteigenvector s are used for description.**Applications**Object recognition methods has the following applications:

* Image panoramas [*Brown, M., and Lowe, D.G., "Recognising Panoramas," ICCV, p. 1218, Ninth IEEE International Conference on Computer Vision (ICCV'03) - Volume 2, Nice,France, 2003*]

* Image watermarking [*Li, L., Guo, B., and Shao, K., " Geometrically robust image watermarking using scale-invariant feature transform and Zernike moments," Chinese Optics Letters, Volume 5, Issue 6, pp. 332-335, 2007.*]

* Global robot localization [*Se,S., Lowe, D.G., and Little, J.J.,"Vision-based global localization and mapping for mobile robots", IEEE Transactions on Robotics, 21, 3 (2005), pp. 364-375.*]**References****External links*** [

*http://citeseer.ist.psu.edu/lowe04distinctive.html Lowe, D. G., “Distinctive Image Features from Scale-Invariant Keypoints”, International Journal of Computer Vision, 60, 2, pp. 91-110, 2004.*]

* [*http://www.cs.ubc.ca/spider/lowe/pubs.html David Lowe's Publications*]

* [*http://www.cs.ubc.ca/~lowe/keypoints/ David Lowe's Demo Software : SIFT keypoint detector*]

* [*http://www.vision.ee.ethz.ch/~surf/index.html SURF: Speeded up robust features*]

* [*http://lear.inrialpes.fr/pubs/2005/MS05/ Mikolajczyk, K., and Schmid, C., "A performance evaluation of local descriptors", IEEE Transactions on Pattern Analysis and Machine Intelligence, 10, 27, pp 1615--1630, 2005.*]

* [*http://www.cs.cmu.edu/~yke/pcasift/ PCA-SIFT: A More Distinctive Representation for Local Image Descriptors*]

* [*http://www-cvr.ai.uiuc.edu/ponce_grp/publication/paper/bmvc04.pdf Lazebnik, S., Schmid, C., and Ponce, J., Semi-Local Affine Parts for Object Recognition, BMVC, 2004.*]

* [*http://user.cs.tu-berlin.de/~nowozin/libsift/ libsift: Scale Invariant Feature Transform implementation*]**ee also***

3D single object recognition

*Scale-invariant feature transform (SIFT)

*SURF

*Feature detection (computer vision)

*Interest point detection

*Template matching

*Pattern recognition

*Wikimedia Foundation.
2010.*

### Look at other dictionaries:

**object recognition**— noun the visual perception of familiar objects • Hypernyms: ↑visual perception, ↑beholding, ↑seeing … Useful english dictionary**Object recognition (computer vision)**— Feature detection Output of a typical corner detection algorithm … Wikipedia**Cognitive neuroscience of visual object recognition**— Object recognition is the ability to perceive an object’s physical properties (such as shape, colour and texture) and apply semantic attributes to the object, which includes the understanding of its use, previous experience with the object and… … Wikipedia**3D single object recognition**— In computer vision, 3D single object recognition involves recognizing and determining the pose of user chosen 3D object in a photograph or range scan. Typically, an example of the object to be recognized is presented to a vision system in a… … Wikipedia**Object detection**— is a computer technology related to computer vision and image processing that deals with detecting instances of semantic objects of a certain class (such as humans, buildings, or cars) in digital images and videos. Well researched domains of… … Wikipedia**Object categorization from image search**— In computer vision, the problem of object categorization from image search is the problem of training a classifier to recognize categories of objects, using only the images retrieved automatically with an Internet search engine. Ideally,… … Wikipedia**Recognition by Components Theory**— The Recognition by components theory, or RBC theory1, was proposed by Irving Biederman to explain object recognition. According to RBC theory, we are able to recognize objects by separating them into geons . Geons can be composed of various… … Wikipedia**Object hyperlinking**— is a neologism that usually refers to extending the Internet to objects and locations in the real world. The current Internet does not extend beyond the electronic world. Object hyperlinking aims to extend the Internet to the real world by… … Wikipedia**Object Manager (Windows)**— Object Manager in Windows, categorized hierarchically using namespaces Object Manager (internally called Ob) is a subsystem implemented as part of the Windows Executive which manages Windows resources. Each resource, which are surfaced as logical … Wikipedia**Recognition**— (re+cognition) is a process that occurs in thinking when some event, process, pattern, or object recurrs . Thus in order for something to be recognized, it must be familiar. This recurrence allows the recognizer to more properly react, survival… … Wikipedia