Distinctive image features from illumination and scale invariant keypoints

被引:30
|
作者
Tang, Guoliang [1 ,2 ]
Liu, Zhijing [1 ]
Xiong, Jing [3 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Shaanxi, Peoples R China
[2] Henan Univ Chinese Med, Sch Informat & Technol, Zhengzhou 450008, Henan, Peoples R China
[3] Shaanxi Univ Sci & Technol, Coll Elect & Informat Engn, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
LBP; SIFT; Image matching; Object recognition; TEXTURE CLASSIFICATION; GRAY-SCALE; REGISTRATION; PERFORMANCE;
D O I
10.1007/s11042-019-7566-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a novel local feature descriptor of the image, which is named iSIFT (illumination and Scale Invariant Feature Transform), based on SIFT (Scale Invariant Feature Transform) improved by LBP (Local Binary Pattern), in order to combine the robustness advantages of LBP descriptor for illumination change and that of SIFT for scaling. It addresses the following problems: (1) SIFT algorithm is poor in describing the local feature extraction from an image when lighting condition changes; (2) SIFT algorithm cannot accurately extract the feature points or can only extract only few of them from the blurred image and the image of an object with smooth edges. Each of the scale-space representation, namely, L(x, y, k sigma), in Gaussian pyramid of the image I(x, y) on SIFT descriptor is calculated by using LBP in order to obtain the corresponding LBP image, which is denoted by LBP(L(x, y, k sigma)). The obtained LBP(L(x, y, k sigma)) replaces the original corresponding scale-space representation L(x, y, k sigma) to construct the LBP-Gaussian pyramid, and the difference between each two neighboring LBP(L(x, y, k sigma)) in LBP-Gaussian pyramid is used to replace the original DoG pyramid in SIFT descriptor to detect extreme points. The results of the experiments suggest that iSIFT descriptor improves the precision of image feature matching and the robustness under changed lighting conditions compared with that of SIFT algorithm, and iSIFT descriptor can extract more feature points from the blurred image and the image with smooth edges as well as having stronger robustness for lighting, rotation and scaling.
引用
收藏
页码:23415 / 23442
页数:28
相关论文
共 50 条
  • [1] Distinctive image features from illumination and scale invariant keypoints
    Guoliang Tang
    Zhijing Liu
    Jing Xiong
    Multimedia Tools and Applications, 2019, 78 : 23415 - 23442
  • [2] Distinctive Image Features from Scale-Invariant Keypoints
    David G. Lowe
    International Journal of Computer Vision, 2004, 60 : 91 - 110
  • [3] Distinctive image features from scale-invariant keypoints
    Lowe, DG
    INTERNATIONAL JOURNAL OF COMPUTER VISION, 2004, 60 (02) : 91 - 110
  • [4] Distinctive Texture Features from Perspective-Invariant Keypoints
    Gossow, David
    Weikersdorfer, David
    Beetz, Michael
    2012 21ST INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR 2012), 2012, : 2764 - 2767
  • [5] Design and learn distinctive features from pore-scale facial keypoints
    Li, Dong
    Lam, Kin-Man
    PATTERN RECOGNITION, 2015, 48 (03) : 732 - 745
  • [6] USING GRADIENT FEATURES FROM SCALE-INVARIANT KEYPOINTS ON FACE RECOGNITION
    Lin, Shinfeng D.
    Lin, Jia-Hong
    Chiang, Cheng-Chin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (04): : 1639 - 1649
  • [7] Distinctive Image Region Features from Color Invariant Moments
    Guo, L.
    Shi, Z.
    Zhao, J.
    Zhang, R.
    INTELLIGENT INFORMATION PROCESSING IV, 2008, : 165 - +
  • [8] Volumetric Image Registration From Invariant Keypoints
    Rister, Blaine
    Horowitz, Mark A.
    Rubin, Daniel L.
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017, 26 (10) : 4900 - 4910
  • [9] Medical image registration based on distinctive image features from scale-invariant (SIFT) key-points
    Moradi, M
    Abolmaesumi, P
    CARS 2005: COMPUTER ASSISTED RADIOLOGY AND SURGERY, 2005, 1281 : 1292 - 1292
  • [10] A Scale Invariant Keypoints Detector
    Zhou, Tao
    2014 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2014, : 259 - 262