吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (6): 1793-1798.doi: 10.13229/j.cnki.jdxbgxb201406039

Previous Articles     Next Articles

Zircon image matching method based on description of SIFT feature by LBP

QIU Chun-ling1, TAO Qiang1, FAN Run-long2, WANG Pei-zhi1   

  1. 1.College of Instrumentation & Electrical Engineering, Jilin University, Changchun 130022,China;
    2.Institute of Geology Chinese Academy of Geological Sciences, Beijing 100037, China
  • Received:2013-07-26 Online:2014-11-01 Published:2014-11-01

Abstract: In order to solve the problem of high computational complexity and low matching speed of the traditional Scale Invariant Feature Transform (SIFT) algorithm, a new method of feature description using Local Binary Patterns (LBPs) was proposed. This method was used to describe the zircon image feature points detected by SIFT algorithm. The dimensionality of the feature vector was reduced using Principal Component Analysis (PCA), and the descriptor matching was carried out with Euclid Distance. The new description method of LBPs has a more simple calculation, and this algorithm has excellent features of rotation invariance and illumination invariance. The descriptor matching is faster after PCA dimension reduction. Experimental results show that this method meets the requirements of automated sample search, and significantly improves the matching speed of zircon images, improves the efficiency of the instrument.

Key words: computer application, image matching, SIFT algorithm, local binary patterns, principal component analysis(PCA)

CLC Number: 

  • TP391
[1] Lowe D G. Object recognition from local scale-invariant features[C]∥The Proceedings of the Seventh IEEE International Conference on Computer Vision,Indian,1999: 1150-1157.
[2] Lowe D G. Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2): 91-110.
[3] Heikkil M, Pietikinen M, Schmid C. Description of interest regions with local binary patterns[J]. Pattern Recognition, 2009, 42(3): 425-436.
[4] Ke Y, Sukthankar R. PCA-SIFT: a more distinctive representation for local image descriptors[C]∥Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition,Japan,2004: 506-513.
[5] Juan L, Gwun O. A comparison of sift, pca-sift and surf[J]. International Journal of Image Processing, 2009, 3(4): 143-152.
[6] Zhang J, Zhang K, Niu W, et al. SAR image automatic registration based on PCA-SIFT and Mahalanobis distance[C]∥Proceedings of the International Conference on Information Engineering and Applications, London, 2013: 445-452.
[7] Guo Z, Zhang L, Zhang D. A completed modeling of local binary pattern operator for texture classification[J]. IEEE Transactions on Image Processing, 2010, 19(6):1657-1663.
[8] Abdi H, Williams L J. Principal component analysis[J]. Wiley Interdisciplinary Reviews: Computational Statistics, 2010,2(4): 433-459.
[9] 李根,李文辉.基于尺度不变特征变换的平面旋转人脸检测[J].吉林大学学报:工学版,2013,43(1):186-191. Li Gen,Li Wen-hui.Face detection under rotation in image plane based on scale invariant feature transform[J].Journal of Jilin University(Engineering and Technology Edition),2013,43(1):186-191.
[10] Ahonen T, Hadid A, Pietikainen M. Face description with local binary patterns:Application to face recognition[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2006,28(12):2037-2041.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!