Analysis of Image Segmentation Techniques: A Survey: Apurv Vashisht, Shiv Kumar
Analysis of Image Segmentation Techniques: A Survey: Apurv Vashisht, Shiv Kumar
Analysis of Image Segmentation Techniques: A Survey: Apurv Vashisht, Shiv Kumar
42 www.erpublication.org
Analysis of Image Segmentation Techniques: A Survey
43 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869 (O) 2454-4698 (P), Volume-4, Issue-1, January 2016
Step4: sum sum + in [i, j]
Step5: if i = 0 then 4.2.2 Mean Shift Clustering:
Step6: intImg[i, j] sum This is an advanced technique for clustering based-method.It
Step7: else starts by taking a mean for each pixel, using which a kernel
Step8: intImg[i, j] intImg[i1, j] +sum desnity estimator is built. This is shifted throughout the
Step9: end if image. Typical kernel density estimators are Gaussian. By
Step10: end for iteratively shifting the mean based on the kernel, all the pixels
Step11: end for get drawn to a number of local points of convergence.
44 www.erpublication.org
Analysis of Image Segmentation Techniques: A Survey
4.3.2 Sobel edge Detector: The above mentioned algorithms were tested on various
This is widely used first derivative operator to find edges and images. In here we present the results on the medical image
is modification of Prewitts operator, as will be discussed leuk.jpg.
next. It changes the center coefficient by 2. The Sobel
operatiors are given as [12]:
Algorithm [13]:
Step1: Apply mask Gx, Gy to the input image.
Step2: Apply Sobel edge detection algorithm and the
gradient.
Step3: Masks manipulation of Gx, Gy separately on the input
image.
Step4: Results combined to find the absolute magnitude of the
gradient.
45 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869 (O) 2454-4698 (P), Volume-4, Issue-1, January 2016
The experimental results of the algorithms on the outdoor
image outdoor.jpg:
46 www.erpublication.org
Analysis of Image Segmentation Techniques: A Survey
VI. CONCLUSION [8] Otsu, Nobuyuki. "A threshold selection method from gray-level
histograms."Automatica 11.285-296 (1975): 23-27.
On the basis of our experimental observations, we were able [9] Bradley, Derek, and Gerhard Roth. "Adaptive thresholding using the
to come to the following conclusions: integral image." Journal of graphics, gpu, and game tools 12.2
i. Otsus Thresholding performs closely well enough to (2007): 13-21.
[10] Navneet Kaur, Gagan Jindal "A Survey Of K Means Clustering With
Canny Edge Detection Technique on the Paper Image. Modified Gradient Magnitude Region Growing Technique For Lesion
ii. Both Mean Shift and Local Thresholding perform really Segmentation, International Journal Of Innovations In Engineering
closely on the outdoor image. And Technology, April 2013.
iii. Mean Shift clustering outperforms its counterparts under [11] Otsu N, Discriminant and Least Square Threshold
Selection. In: Proc 4IJCPR, 1978, pp.592596.
the survey and particularly on the Medical Image and [12] A. M. Khan, Ravi. S Image Segmentation Methods: A Comparative
Outdoor Image, but lags behind on the mostly black Study, International Journal of Soft Computing and Engineering,
and white Paper Image Volume-3, Issue-4, September 2013.
iv. K-Means is computationally exhaustive, though [13] Vincent, O. R., and Olusegun Folorunso. "A descriptive algorithm
for sobel image edge detection." Proceedings of Informing Science
provides suitable results given the correct number of & IT Education Conference (InSITE). Vol. 40. 2009.
clusters (though not ideal).
v. Edge Detection techniques cant be used independently,
though they give useful information that can be used in Apurv Vashisht, M.Tech Research Scholar, Department of Computer
Science & Engineering, Mewar University, Chittorgarh, Rajasthan
some other step of image segmentation along with
India.
some other technique. Mr. Shiv Kumar, Assistant Professor,Department of Computer Science &
Thresholding is computationally inexhaustive, but does not Engineering, Mewar University, Chittorgarh, Rajasthan., India.
take the spatial features of an image into account and even
though it can be used independently it is more suitable as a
step in some image processing application.
While clustering techniques work quite well, they are
susceptible to noise and are highly dependent on the input
parameters.
The second order edge operators (like Canny) give quite
reliable results, while the first order edge operators give
useful information which can be used as a step in some other
edge detection technique. Also, it is quite clear that no single
operator can be applied to all images and sometimes the edges
obtained are not continuous.
Thus, it seems that as sound as each method may sounds
theoretically, they have their limitations. The biggest one
being, that no method can be applied to all kinds of images,
universally.
REFERENCES
[1] P. S. Liao, T.-S. Chen and P.-C. Chung, A fast algorithm for multilevel
thresholding, J. Inf. Sci. Eng., vol. 17, no. 5, pp. 713727, Sep. 2001
[2] Rajesh Dass, Priyanka, Swapna Devi, Image Segmentation
Techniques, IJECT Vol.3, Issue 1, Jan-March 2012
[3] Smita Patel, Prof.Mrs. A. A. Junnarkar. Overview of Colour Image
Segmentation Techniques International Journal of Advanced
Research in Computer Science and Software Engineering 3.09 (2013):
418-423
[4] Basavaprasad, B., and M. Ravi. "A comparative study on
classification of image segmentation methods with a focus on graph
based techniques."International Journal of Research in Engineering
and Technology 3.03 (2014): 310-314.
[5] Yogamangalam, B. Karthikeyan R., and B. Karthikeyan.
"Segmentation Technique Comparision in Image Processing." IJET
(ISSN: 0975-4024) 5.1 (2013): 307-313.
[6] Bins, L. Santanna, Leila M. Garcia Fonseca, Guaraci Jos Erthal, and
F. Mitsuo Ii. Satellite imagery segmentation: a region growing
approach Simpsio Brasileiro de Sensoriamento Remoto, pp. 677-
680, April 1996.
[7] Raju, P. Daniel Ratna, and G. Neelima. "Image segmentation by using
histogram tresholding." International Journal of Computer Science
Engineering and Technology 2 (2012): 776-779.
47 www.erpublication.org