Gray Cerebrovascular Image Skeleton Extraction Algorithm Using Level Set Model

The ambiguity and complexity of medical cerebrovascular i mage makes the skeleton gained by conventional skeleton algorithm discontinuous, which is sensitive at the weak edges, with poor robust ness and too many burrs. This paper proposes a cerebrovascular image skeleton extraction algorithm based on Level Set model, using Euclidean distance field and improv ed gradient vector flow to obtain two different energy functions. The first energy function control s the obtain of topological node s for the beginning of skeleton curve . T he second energy function control s the extraction of skeleton surface. This algorithm avoids the locating and classifying of the skeleton connection points which guide the skeleton extraction . B ecause all its parameters are gotten by the analysis and reasoning, no artificial interference is needed.

[1]  Christer Ericson,et al.  Real-Time Collision Detection , 2004 .

[2]  Raymond N. J. Veldhuis,et al.  On the accuracy of EERs in face recognition and the importance of reliable registration , 2005 .

[3]  Mie Sato,et al.  Penalized-Distance Volumetric Skeleton Algorithm , 2001, IEEE Trans. Vis. Comput. Graph..

[4]  H.-P. Seidel,et al.  Realtime Ray Tracing on GPU with BVH-based Packet Traversal , 2007, 2007 IEEE Symposium on Interactive Ray Tracing.

[5]  Te-Ming Tu,et al.  Robust spatial watermarking technique for colour images via direct saturation adjustment , 2005 .

[6]  Paul A. Viola,et al.  Robust Real-time Object Detection , 2001 .

[7]  Guy Demoment,et al.  Image reconstruction and restoration: overview of common estimation structures and problems , 1989, IEEE Trans. Acoust. Speech Signal Process..

[8]  Cordelia Schmid,et al.  Indexing Based on Scale Invariant Interest Points , 2001, ICCV.

[9]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[10]  J. E. Fowler,et al.  The redundant discrete wavelet transform and additive noise , 2005, IEEE Signal Processing Letters.

[11]  Xu Xiao The Algorithm of Descriptor Based on Locality Preserving Projections , 2008 .

[12]  Qiang Ji,et al.  Automatic Eye Detection and Its Validation , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.

[13]  R. S. Ledley,et al.  Fundamentals of true-color image processing , 1990, [1990] Proceedings. 10th International Conference on Pattern Recognition.

[14]  Mohammed Bennamoun,et al.  The use of mutual information for rigid medical image registration: a review , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[15]  Te-Ming Tu,et al.  Starmarker- : a fast and robust RGB-based saturation watermarking system for pan-sharpened IKONOS and QuickBird imagery , 2006 .

[16]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[17]  Pat Hanrahan,et al.  Rendering complex scenes with memory-coherent ray tracing , 1997, SIGGRAPH.

[18]  Kaleem Siddiqi,et al.  Flux driven fly throughs , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..

[19]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[20]  Tan Junshan Research on Digital Image Encryption Based on Composite Chaotic System , 2006 .

[21]  Ingo Wald,et al.  Ray tracing deformable scenes using dynamic bounding volume hierarchies , 2007, TOGS.

[22]  Weixue Lu,et al.  Multicriterion maximum entropy image reconstruction from projections , 1992, IEEE Trans. Medical Imaging.

[23]  Mario Bertero,et al.  The Stability of Inverse Problems , 1980 .

[24]  Nasir D. Memon,et al.  Steganalysis based on image quality metrics , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[25]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[26]  Turner Whitted,et al.  An improved illumination model for shaded display , 1979, CACM.

[27]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[28]  Erkki Oja,et al.  Independent component analysis: algorithms and applications , 2000, Neural Networks.

[29]  Liao Yun-tao Correlation tracking using a novel distance measurement as feedback , 2003 .

[30]  Andrew Zisserman,et al.  Regression and classification approaches to eye localization in face images , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[31]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[32]  Thai Duy Hien,et al.  RDWT/ICA for image authentication , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[33]  Thai Duy Hien,et al.  Robust RDWT-ICA based information hiding , 2006, Soft Comput..

[34]  Markus Wagner,et al.  Interactive Rendering with Coherent Ray Tracing , 2001, Comput. Graph. Forum.

[35]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[36]  Narges Ahmidi,et al.  A novel DCT-based approach for secure color image watermarking , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[37]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[38]  Jaejin Lee,et al.  Authentication and correction of digital watermarking images , 1999 .

[39]  Cordelia Schmid,et al.  Local Grayvalue Invariants for Image Retrieval , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[40]  B. Logan The uncertainty principle in reconstructing functions from projections , 1975 .

[41]  Tao Zhang,et al.  A new approach to reliable detection of LSB steganography in natural images , 2003, Signal Process..

[42]  Sushil K. Bhattacharjee,et al.  Towards second generation watermarking schemes , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[43]  Klaus J. Kirchberg,et al.  Robust Face Detection Using the Hausdorff Distance , 2001, AVBPA.

[44]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[45]  Wen Gao,et al.  Image matching based on a local invariant descriptor , 2005, IEEE International Conference on Image Processing 2005.

[46]  Pavel Pudil,et al.  Introduction to Statistical Pattern Recognition , 2006 .

[47]  Jan Kautz,et al.  Packet-based whitted and distribution ray tracing , 2007, GI '07.

[48]  James E. Fowler,et al.  RDWT and Image Watermarking , 2001 .

[49]  Zhang Hong,et al.  Tamper Detection and Self Recovery of Images Using Self-Embedding , 2004 .

[50]  Timothy F. Cootes,et al.  A comparison of shape constrained facial feature detectors , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..

[51]  I. Wald,et al.  On fast Construction of SAH-based Bounding Volume Hierarchies , 2007, 2007 IEEE Symposium on Interactive Ray Tracing.

[52]  F. Natterer,et al.  Mathematical problems of computerized tomography , 1983, Proceedings of the IEEE.

[53]  Yi Shi,et al.  Embedding image watermarks in dc components , 2000, IEEE Trans. Circuits Syst. Video Technol..

[54]  Seongjai Kim,et al.  An O(N) Level Set Method for Eikonal Equations , 2000, SIAM J. Sci. Comput..

[55]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[56]  S. Popov,et al.  Experiences with Streaming Construction of SAH KD-Trees , 2006, 2006 IEEE Symposium on Interactive Ray Tracing.

[57]  Vivek K. Goyal,et al.  Quantized Overcomplete Expansions in IRN: Analysis, Synthesis, and Algorithms , 1998, IEEE Trans. Inf. Theory.

[58]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[59]  Patrick J. Flynn,et al.  Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[60]  Daniel P. Huttenlocher,et al.  Comparing Images Using the Hausdorff Distance , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[61]  Tomás Pevný,et al.  Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.

[62]  W.R. Mark,et al.  Large ray packets for real-time Whitted ray tracing , 2008, 2008 IEEE Symposium on Interactive Ray Tracing.

[63]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[64]  Asker M. Bazen,et al.  Likelihood Ratio-Based Detection of Facial Features , 2003 .

[65]  Wang Meihua,et al.  Novel copyright protection scheme for digital content , 2006 .

[66]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[67]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[68]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[69]  Faouzi Kossentini,et al.  JasPer: a software-based JPEG-2000 codec implementation , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[70]  C.M. Kung,et al.  Visual Robust Oblivious Watermarking Technique Using Error Correcting Code , 2006, 2006 International Conference on Communication Technology.

[71]  C.M. Kung,et al.  A Robust Watermarking and Image Authentication Technique on Block Property , 2008, 2008 International Symposium on Information Science and Engineering.

[72]  Alexander Reshetov,et al.  Faster Ray Packets - Triangle Intersection through Vertex Culling , 2007, 2007 IEEE Symposium on Interactive Ray Tracing.

[73]  H.C. Ferreira,et al.  Watermarking for JPEG image using error correction coding , 2004, 2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590).

[74]  Tim Foley,et al.  KD-tree acceleration structures for a GPU raytracer , 2005, HWWS '05.

[75]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .

[76]  G. Clark,et al.  Reference , 2008 .

[77]  E. Mansson,et al.  Deep Coherent Ray Tracing , 2007, 2007 IEEE Symposium on Interactive Ray Tracing.

[78]  Sun Kang,et al.  Variable characteristics based blind detection of hidden information , 2007 .

[79]  Clark F. Olson Maximum-Likelihood Image Matching , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[80]  Dinesh Manocha,et al.  Interactive collision detection between deformable models using chromatic decomposition , 2005, SIGGRAPH 2005.

[81]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..

[82]  S. Boulos,et al.  Getting rid of packets - Efficient SIMD single-ray traversal using multi-branching BVHs - , 2008, 2008 IEEE Symposium on Interactive Ray Tracing.

[83]  Jessica Fridrich,et al.  Determining the stego algorithm for JPEG images , 2006 .

[84]  Laurent D. Cohen,et al.  Global Minimum for Active Contour Models: A Minimal Path Approach , 1997, International Journal of Computer Vision.

[85]  Andrew Kensler,et al.  SIMD Ray Stream Tracing - SIMD Ray Traversal with Generalized Ray Packets and On-the-fly Re-Ordering - , 2007 .

[86]  Raymond N. J. Veldhuis,et al.  A MAP approach to landmarking , 2007 .

[87]  Arthur W. Toga,et al.  Efficient Skeletonization of Volumetric Objects , 1999, IEEE Trans. Vis. Comput. Graph..

[88]  Tomás Pevný,et al.  Multi-class blind steganalysis for JPEG images , 2006, Electronic Imaging.

[89]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[90]  Alexander Keller,et al.  Instant ray tracing: the bounding interval hierarchy , 2006, EGSR '06.

[91]  Jaejin Lee,et al.  A watermarking sequence using parities of error control coding for image authentication and correction , 2000, IEEE Trans. Consumer Electron..

[92]  Erik Lindholm,et al.  NVIDIA Tesla: A Unified Graphics and Computing Architecture , 2008, IEEE Micro.

[93]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[94]  Timothy F. Cootes,et al.  Facial feature detection and tracking with automatic template selection , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[95]  Raymond N. J. Veldhuis,et al.  A landmark paper in face recognition , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[96]  A. Reshetov Omnidirectional Ray Tracing Traversal Algorithm for kd-trees , 2006, 2006 IEEE Symposium on Interactive Ray Tracing.

[97]  Dan Yu,et al.  A New Blind Watermarking Technique Based on Independent Component Analysis , 2002, IWDW.

[98]  Paola Campadelli,et al.  Precise Eye Localization through a General-to-specific Model Definition , 2006, BMVC.

[99]  S.G. Parker,et al.  Design for Parallel Interactive Ray Tracing Systems , 2006, 2006 IEEE Symposium on Interactive Ray Tracing.

[100]  Timothy F. Cootes,et al.  A Multi-Stage Approach to Facial Feature Detection , 2004, BMVC.

[101]  Luc Van Gool,et al.  Wide Baseline Stereo Matching based on Local, Affinely Invariant Regions , 2000, BMVC.

[102]  Eckhard Koch,et al.  Copyright Protection for Multimedia Data , 1994 .

[103]  Alexander Keller,et al.  Shallow Bounding Volume Hierarchies for Fast SIMD Ray Tracing of Incoherent Rays , 2008, Comput. Graph. Forum.

[104]  Yongdong Wu,et al.  Tamper-Localization Watermarking with Systematic Error Correcting Code , 2006, 2006 International Conference on Image Processing.

[105]  Stanislaw Osowski,et al.  Robust PCA neural networks for random noise reduction of the data , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[106]  Aleksandra Pizurica,et al.  Noise Removal from Images by Projecting onto Bases of Principal Components , 2007, ACIVS.

[107]  R. Fisher THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .

[108]  Hongxia Wang,et al.  Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes , 2006 .

[109]  Aniruddha Sinha,et al.  Pattern based robust digital watermarking scheme for images , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[110]  Pat Hanrahan,et al.  Interactive k-d tree GPU raytracing , 2007, SI3D.

[111]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[112]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[113]  Qian Tao,et al.  Face verification for mobile personal devices , 2009 .

[114]  William A. Pearlman,et al.  Fast additive noise steganalysis , 2004, IS&T/SPIE Electronic Imaging.

[115]  Pat Hanrahan,et al.  Ray tracing on a connection machine , 1988, ICS '88.

[116]  Thomas W. Parks,et al.  Adaptive principal components and image denoising , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[117]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[118]  John C. Hart,et al.  The ray engine , 2002, HWWS '02.

[119]  Russell M. Mersereau,et al.  An oblivious robust digital watermark technique for still images using DCT phase modulation , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[120]  J. Fridrich,et al.  Attacking the OutGuess , 2002 .

[121]  Aly A. Farag,et al.  On the Extraction of Curve Skeletons using Gradient Vector Flow , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[122]  Laurent D. Cohen,et al.  Fast extraction of minimal paths in 3D images and applications to virtual endoscopy , 2001, Medical Image Anal..

[123]  Christopher G. Harris,et al.  A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.

[124]  Yuan Mei Wang,et al.  Multicriterion image reconstruction and implementation , 1989, Comput. Vis. Graph. Image Process..