The paper draws attention to the fundamental nature of the crack coding scheme, shows that the chain code and midcrack code may be derived from the crack code, and proves relationships between simple measures of perimeter and area as obtained from the different codes and from bit quads. An enclosing octagon is introduced.
References
-
-
1)
-
G.R. Wilson
.
Morphological operations on crack coded binary images.
IEE Proc., Vis. Image Signal Process.
,
3 ,
171 -
176
-
2)
-
J. Koplowitz ,
A.M. Bruckstein
.
Design of perimeter estimators for digitizedplanar shapes.
IEEE Trans. Pattern Anal. Mach. Intell.
,
6 ,
611 -
622
-
3)
-
D. Proffitt ,
D. Rosen
.
Metrication errors and coding efficiency of chain-encodingschemes for the representation of lines and edges.
Comput. Graph. Image Process.
,
318 -
332
-
4)
-
Dunkelberger, K.A., Mitchell, O.R.: `Contour tracing for precision measurement', Proc. IEEE Int. Conf. Robotics and automation, 1985, St Louis, p. 22–27.
-
5)
-
F.Y. Shih ,
W.-T. Wong
.
A new single-pass algorithm for extracting the midcrackcodes of multiple regions.
J. Vis. Commun. Image Represent.
,
217 -
224
-
6)
-
G.R. Wilson ,
B.G. Batchelor
.
Moments of a crack coded blob.
IEE Proc. E
,
1 ,
54 -
58
-
7)
-
G.R. Wilson ,
B.G. Batchelor
.
Algorithm for forming relationships betweenobjects in a scene.
IEE Proc. E
,
2 ,
151 -
153
-
8)
-
R.C. Gonzales ,
R.E. Woods
.
(1993)
Digital image processing.
-
9)
-
G.R. Wilson ,
A. De Gloria
.
(1994)
Parallel extraction of the features of a blob, Transputer applications and systems '94.
-
10)
-
B.G. Batchelor ,
B.K. Marlow
.
Fast generation of chain code.
IEE Proc. E
,
143 -
147
-
11)
-
H. Freeman
.
Computer processing of line-drawing images.
Comput. Surv.
,
1 ,
57 -
97
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-vis_19971159
Related content
content/journals/10.1049/ip-vis_19971159
pub_keyword,iet_inspecKeyword,pub_concept
6
6