Professional Documents
Culture Documents
Equivalence Relation Between Intersecting Cortical Model and Binary Mathematic Morphology in Image Processing
Equivalence Relation Between Intersecting Cortical Model and Binary Mathematic Morphology in Image Processing
Equivalence Relation Between Intersecting Cortical Model and Binary Mathematic Morphology in Image Processing
Abstract— Biologically inspired image/signal processing like parallel pulse transmission characteristic of ICM and
the Intersecting Cortical Model (ICM) and Mathematic Mathematic Morphology in binary image processing.
Morphology is described. Under certain operations, the Background material on ICM’s is described in
parallel pulse transmission characteristic of ICM in image Section 2. In Section 3, Granulometry, binary image
processing is equal to the erosion/dilation operation of
binary mathematic morphology. Granulometry, binary image edge detection,thinning and hole filtering algorithms
thinning, edge detection and hole filtering algorithms based based on ICM are proposed. By analyses, this section
on ICM are proposed to further certify the equivalent indicates that under certain operation, binary image
relation between ICM and Mathematic Morphology in binary processing using ICM based on its parallel pulse
image processing. And the results show that ICM can gives transmission characteristic is equivalent to binary
equivalent result as mathematic morphology operation in morphological algorithm. Finally conclusions are
binary image processing. obtained in Section 4.
Keywords—intersecting cortical model; mathematic II. Intersecting Cortical Model (ICM)
morphology; image processing; erosion and dilation
In the ICM the state oscillators of all the neurons
are represented by a 2D array F (the internal neuron
I. Introduction states; initially Fij=0) and the threshold oscillators of
The Intersecting Cortical Model (ICM) [1] is based all the neurons by a 2D array θ (initially θij=0). Thus,
on neural network techniques and is especially the ij-th neuron has state Fij and threshold θij which are
designed for image processing. It was derived from defined: [5]
several visual cortex models. These models are Fij [n + 1] = fFij [ n] + S ij + Wij {Y }
mathematically similar to the Fitzhugh-Nagumo
system [2] in that each neuron consists of coupled ⎧1 Fij [ n] > θ ij [n]
Yij [ n + 1] = ⎨
oscillators. When ICM is used in image processing, the ⎩0 else (*)
significant feature is parallel pulse transmission
behavior which is efficient in edge detection, image ϑij [n + 1] = gθ ij [n] + hYij [n + 1]
thinning and image segmentation [3, 4, 5]. Where Sij is the stimulus (the input image, scaled so
Mathematical morphology was founded in the early that the largest pixel value is 1.0); Yij is the firing state
sixties by Matheron[6] and Serra[7] as a novel geometry- of the neuron(Y is the output image); f, g and h are
based technique for image processing and analysis. scalars (examples of values are 0.9, 08, and 20.0,
Originally, mathematical morphology was developed respectively); Wij is the connection function through
for binary images using simple concepts from set which the neurons communicate; n=1,…,N is the
theory and geometry [8]. The most well-known iteration number. The scalars f and g are decay
operators of mathematical morphology are erosion and constants and thus less than 1. In order to ensure that
dilation. In binary morphology, a series of theories, Fij eventually becomes θij, we have f>g. The firings
such as hit-or-miss transform, granulometry, and computed from Eq.(*) are the output images of ICM.
morphological filters, have been developed. Hence, the images are called pulse images. In Figure1,
Granulometry, binary image edge detection , the ICM appears [1, 4, 5].
thinning and hole filtering algorithms based on the
Intersecting Cortical Model (ICM) are introduced and
analyzed to show the essential connection between the
Authorized licensed use limited to: Ming Chi University of Technology. Downloaded on July 27,2021 at 15:48:03 UTC from IEEE Xplore. Restrictions apply.
f = 0.9, g = 0.7, h = 1500,
h Step2 set w = (010,101,010) ;
g
θij
Y = F =θ = 0
W {} f
Fij Fij [n] = fFij [ n − 1] + S ij + w ⊗ Y
∑ Yij
Step3 Yij [n] = step ( Fij [n] − θ ij [n]) ;
Sij
θ ij [n] = gθ ij [n] + hYij [n]
Figure 1. Structure of ICM neuron
(i = 1,2,..., Height ; j = 1,2,..., Width)
Step4 repeat step3 for k times;
III. Basic applications of binary morphology based on Step5 inverse Yij[k];
ICM Step6 repeat step3 for k times;
The parallel pulse transmission behavior of ICM is Step7 calculation Фp(k);
equivalent to the dilation /erosion operation in binary Step8 if Фp(k)=1, the iteration ends; else, k=k+1,
image processing and the 4/8 neighborhood linking of back to step3.
ICM is equal to the Four/Eight structural element [3]. Using Matlab2008a implementing the algorithm
Various complex operations in morphology can be above, we hypothesize that the input image is idealized
realized by combining certain dilation and erosion and adopt the 4 neighborhood linking type.
operations. Then, how about the ICM? Can it be used
to replace the morphological applications in binary
image processing, such as granulometry, binary image
edge detection, thinning and hole filtering?
A. Granulometry algorithm based on ICM
In particle images, presumption the dark regions are
composed with particles of various size, light regions Original image Result of the 5th
are background. Neurons lie in light regions will fire iteration
fist, then their adjacent neurons in dark regions fire
immediately through coupled linking. In this way,
pulse parallel transmission generated in the whole
image. The dark region particles shrink for one time
with every pulse transmission. And the binary image is
inversed to change the shrinking dark particle regions
into light regions. Here, light regions fire with one
pulse expanding the particles, which have shrinking Result of the 8th Result of the 10th
but haven’t been filtered, for one time. With such iteration iteration
iterations, the area of certain particle shrinks to zero,
Figure 2. Original particle image and screening processing of ICM
which can not be restored even inverse and dilation
operations are done with it, at the N-th erosion. Then
the particles are filtered out. Other particles can be
restored to the original size if only they have nonzero
area. In this way, particles are filtered out from little
ones to large ones as iteration goes on. And the
granulometry analysis ends until all kinds of the
particles are filtered out.
With Фp denoting the granularity distribution vector
of the ICM and Фp(k) denoting the result of the k-th Figure 3. Regulation of ICM particle analysis
iteration, the granulometry algorithm based on ICM is
as follows: B. Binary image edge detection algorithm based
Step1 input binary particle image S, reset pixel
on ICM
values to 0.1 and 1.0;
In ideal binary images, presumption dark regions
are objects, light regions are background. The neurons
which lie in light regions will fire fist. Let the light
491
Authorized licensed use limited to: Ming Chi University of Technology. Downloaded on July 27,2021 at 15:48:03 UTC from IEEE Xplore. Restrictions apply.
region discharged pulse transmit one pixel’s distance C. Binary image thinning algorithm based on
(namely, using certain structure element implement ICM
erosion operation) to get the fire map. And then the Binary image thinning is the operation that minish
target edge of one pixel width will be found by the binary objects into lines of single pixel width with
carrying out exclusive-or operation between the fire the shape information of the original object reserved.
map and the original image. And heavy edge can be In the process of binary image operation with ICM,
got by increasing the transmitting distance of the light light region of background fire first. And the dark
region discharged pulse. region of target begins firing from exterior to interior
Binary image edge detection algorithm based on gradually as iterations increasing. According to the
ICM is as follows (Where E is the output binary matrix character that the ICM pulse transmit parallel along
used to store the edge detection result, and A is a with iteration and firing, the time sequence matrix T
matrix used to store temporary fire matrix, and N is the which contains the time domain information of the
number of iteration.): firing state of corresponding pixels in the binary image
Step1 input binary image S, reset pixel values to 0.1 is defined [9]
and 1.0;
⎧⎪Tij [ n − 1] Yij [ n] ≠ 1
f = 0.9, g = 0.7, h = 1500, Tij [ n] = ⎨ .
Step2 set w = (010,101,010) ; ⎪⎩ n Yij [ n] = 1
Hence, the binary image thinning result is given by
Y = F = θ = 0, n = N
SK ij = (Ti −1, j [n] = m) ∧ (Ti +1, j [n] = m)
Fij [n] = fFij [ n − 1] + S ij + w ⊗ Y ∧ (Ti , j −1 [n] = m) ∧ (Ti , j +1 [n] = m)
Step3 Yij [n] = step ( Fij [n] − θ ij [n]) ; ∧ (Ti , j [n − 1] = m − 1)
θ ij [n] = gθ ij [n] + hYij [n] Where SKij is the result of binary image thinning.
And the thinning process ends until all the neurons fire.
(i = 1,2,..., Height ; j = 1,2,..., Width) The binary image thinning algorithm based on ICM is
Step4 if n=N, A=Y; as follows:
Step5 n=n-1, if n=0, turn to step6, else back to Step1 input binary image S, reset pixel values to 0.1
step3; and 1.0;
Step6 E = A ⊕ S is the edge result. f = 0.9, g = 0.7, h = 1500,
Note that, in this paper an ideal binary image is Step2 set w = (010,101,010) ;
used. If there is noise in the input image a pretreatment
is required. And Figure 4 shows the result of this Y = F =θ = 0
algorithm.
Fij [n] = fFij [ n − 1] + S ij + w ⊗ Y
Step3 Y [n] = step ( F [n] − θ [n]) ;
ij ij ij
492
Authorized licensed use limited to: Ming Chi University of Technology. Downloaded on July 27,2021 at 15:48:03 UTC from IEEE Xplore. Restrictions apply.
H =Y
Fij [ n] = fFij [ n − 1] + S ij + w ⊗ Y
Step3 ;
Yij [ n] = step ( Fij [ n] − θ ij [ n])
θ ij [ n] = gθ ij [ n] + hYij [ n]
(i = 1,2,..., Height ; j = 1,2,..., Width )
Result of thinning Step4 if Y=H; else back to step3;
Original binary image Step5 E=Y is the hole filtering result.
based on ICM
The hole filtering result of our algorithm is given in
Figure 6.
493
Authorized licensed use limited to: Ming Chi University of Technology. Downloaded on July 27,2021 at 15:48:03 UTC from IEEE Xplore. Restrictions apply.
[1] J.M. Kinser, “A simplified pulse-coupled neural [6] Mtheron. G, Random set and integral geometry. John
network”, proc. SPIE1996, pp 563-569. Wiley&Sons, NewYork, 1975.
[2] FitzHugh R, “Impulse and physiological states in [7] Serra,J, Image analysis and mathematical morphology.
theoretical models of nerve membrane”, Biophysics, q061, pp Academic Press, London, 1982.
445-466. [8] Soille. P, Morphological image analysis, Springer-
[3] XU Zhi-ping, ZHONG Yi-ping, “A Binary Image verlage, Berlin, 1999.
Morphological Processing Algorithm Based on Intersecting [9] Ma Yide, “A novel algorithm of image Gaussian noise
Cortical Model”, Journal of Computer-aided Design & filtering based on PCNN time matrix”, IEEE International
Computer Graphics, 2007, vol. 19, no.8, pp 991-995. (in Conference on Signal Processing and Communication, 2007,
Chinese) pp 1499-1502.
[4] Ekblad U, Kinser J M, “The intersecting cortical model in [10] Gu Xiaodong, “Binary image hole filtering algorithm
image processing”, Nuclear Instruments & Methods in based on pcnn”, Computer Application, 2003, vol. 20, no.12,
Physics Research A, 2004, vol. 525, no. 2, pp 392-396. pp 65-66. (in Chinese)
[5] Ekblad U, Kinser J M, “Theoretical foundation of the
intersecting cortical model and its use for detection of
aircraft, cars and nuclear explosion tests”, Signal Processing,
2004, vol. 84, no.7, pp 1131-1146.
494
Authorized licensed use limited to: Ming Chi University of Technology. Downloaded on July 27,2021 at 15:48:03 UTC from IEEE Xplore. Restrictions apply.