Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO.

2, FEBRUARY 2006 331

Shape Representation and Recognition Through


Morphological Curvature Scale Spaces
Andrei C. Jalba, Michael H. F. Wilkinson, Member, IEEE, and Jos B. T. M. Roerdink, Member, IEEE

Abstract—A multiscale, morphological method for the purpose matching method that postulates that one of the two objects
of shape-based object recognition is presented. A connected oper- was made of elastic material and the other served as reference.
ator similar to the morphological hat-transform is defined, and two Under the influence of an external force, the shape of the elastic
scale-space representations are built, using the curvature function
as the underlying one-dimensional signal. Each peak and valley of object deforms to match the reference object over a range of
the curvature is extracted and described by its maximum and av- scales.
erage heights and by its extent and represents an entry in the top or The curvature of a curve has salient perceptual character-
bottom hat-transform scale spaces. We demonstrate object recog- istics [6], [7] and has proven to be useful for shape recogni-
nition based on hat-transform scale spaces for three large data sets, tion [8]–[12]. Asada and Brandy have developed the “curva-
a set of diatom contours, the set of silhouettes from the MPEG-7
database and the set of two-dimensional views of three-dimensional ture primal sketch” descriptor [13], a multiscale structure based
objects from the COIL-20 database. Our approach outperforms on the extraction of changes in curvature. From curvature fea-
other methods for which comparative results exist. tures, a description of the contour in terms of structural prim-
Index Terms—Connected operators, curvature, mathematical itives (e.g., ends, cranks, etc.) is constructed. Mokhtarian and
morphology, pattern classification, scale space, shape retrieval, Mackworth [9], [10] showed that curvature inflection points ex-
top and bottom hat transforms. tracted using a Gaussian scale space can be used to recognize
curved objects. One difficulty with this approach is that curves
without inflection points fall into the same equivalence class.
I. INTRODUCTION
Dudek and Tsotsos [11] presented a technique for shape repre-

I N THIS paper, a general-purpose technique based on mul-


tiscale mathematical morphology for object recognition is
presented. The aim is to build multiscale descriptions of objects
sentation and recognition of objects based on multiscale curva-
ture information. Their method provides a single framework for
both the decomposition and recognition of both planar curves
using shape information and to extract a concise set of attributes as well as surfaces in three-dimensional (3-D) space.
that can be used for recognition. With the advent of wavelet transforms, several approaches
Shape representation is a well-researched domain which to the representation and analysis of planar curves using this
plays an important role in many applications ranging from tool have been introduced. Chuang and Jay Kuo [14] have used
image analysis and pattern recognition, to computer graphics orthogonal and biorthogonal wavelet expansions for multiscale
and computer animation, and, therefore, many methods for representation of curves and studied its properties in the wavelet
shape representation do exist in the literature. As our proposed representation. Yuping and Toraichi [12] presented a curvature-
method is multiscale, we restrict our overview of shape rep- based multiscale shape representation using B-spline wavelets
resentation and analysis methods only to similar techniques. and investigated the properties and behavior of evolving curves
Multiscale techniques for signal and image analysis are moti- in B-spline scale spaces.
vated by studies in psychophysics which showed that the human The basic idea of multiscale representations is to embed the
visual system processes and analyzes image information at original signal into a stack of gradually smoothed signals, in
different resolutions. Witkin [1] proposed a scale-space filtering which the fine scale details are successively suppressed. The as-
approach useful to determine the locations of the zero crossings sumption of this approach is the causality of the features (in-
or extrema of a signal. Fermuller and Kropatsch [2] presented flection points or signal extrema), i.e., their reproducible and
a multiresolution descriptor of planar curves using corners monotonic behavior in scale space, which was found to de-
with a hierarchical structure. Saund proposed a scale space of pend on the scale-space filter [15]. This elegant idea and the
edge elements constructed directly from simple edge fragments mandatory causality of scale-space features was initially devel-
[3]. A similar approach based on the aggregation of primitive oped for one-dimensional (1-D) signals, and it was proved that
elements (points and edge fragments) was presented by Lowe the Gaussian, ensuring causality of inflection points, is the only
[4]. Bajcsy and Kovacic [5] proposed a multiresolution elastic linear kernel that can be used [16]. However, for two-dimen-
sional (2-D) signals the inflection points form closed contours
that can split and evolve independently as the scale increases
Manuscript received October 22, 2003; revised February 2, 2005. The as-
sociate editor coordinating the review of this manuscript and approving it for [16]. In contrast to inflection points, regional extrema have the
publication was Dr. Michel Schmitt. advantage that they represent single points or plateaux rather
The authors are with the Institute for Mathematics and Computing Science, than contours, for 2-D signals. Since there exists no linear filter
University of Groningen, 9700 AV Groningen, The Netherlands (e-mail: an-
drei@cs.rug.nl; michael@cs.rug.nl; roe@cs.rug.nl). that guarantees causality of extrema in images [17], morpholog-
Digital Object Identifier 10.1109/TIP.2005.860606 ical filters ensuring extrema causality have been proposed [18].
1057-7149/$20.00 © 2006 IEEE
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.
332 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 2, FEBRUARY 2006

Several techniques for morphological multiscale shape anal- and by its extent, and represents an entry in the top or bottom hat
ysis exist, such as size distributions or granulometries, which are scale spaces. The shape descriptor is a vector of numbers com-
used to quantify the amount of detail in an image at different puted using the information stored in the scale spaces. Since
scales [19], [20]. A similar method, based on alternating se- the shape descriptors do not explicitly use any information re-
quential filters, has been proposed by Bangham and coworkers garding positions along the contours, finding correspondences
[21], [22]. Their method is used on 1-D signals, though they do between two shapes is simply equivalent to computing some
discuss extensions to higher dimensions. Kimia [23] developed distance measure between the two shape vectors. Also, for clas-
a method for curvature decomposition based on erosion-diffu- sification techniques which require definition of a pattern space,
sion scale spaces. Jang and Chin [24] described a multiple-scale the pattern vectors are simply given by the shape descriptors.
boundary representation based on morphological openings and We demonstrate shape-based object recognition, using
closings using a structuring element of increasing size. Smooth 1-D hat-transform scale spaces, in a wide variety of settings:
boundary segments across a continuum of scales are extracted recognition of diatoms, recognition using silhouettes from the
and linked together creating a pattern called the morphological MPEG-7 database and 3-D object recognition based on 2-D
scale space, whose properties are investigated and contrasted views. Our approach turns out to outperform other methods for
with those of Gaussian scale spaces. Chen and Yan [25] have which comparative data exist.
used a scaled disk for the morphological opening of objects in The organization of the paper is as follows. In Section II,
binary images resulting in a theorem for zero-crossings of ob- we present the morphological curvature scale spaces. First, we
ject boundary curvature. Park and Lee [26] have generalized the discuss some problems inherent to curvature-based recognition
concept of zero-crossing for 1-D gray-scale signals. Meyer and and present approaches to circumvent them. Then, we present
Maragos [27] developed a morphological scale-space represen- the morphological hat-transform scale spaces on which the cur-
tation based on a morphological strong filter, the so-called lev- vature scale spaces rely. Also, we demonstrate causality and
elings. Jackway and Deriche [18] proposed a multiscale mor- monotonicity of the extrema in the scale spaces, which are im-
phological dilation-erosion smoothing operation and analyzed portant characteristics for any scale-space formulation. In Sec-
its associated scale-space expansion for multidimensional sig- tion III, we present the descriptors extracted from the scale-
nals. They showed that scale-space fingerprints from their ap- spaces, and, in Section IV, we report identification and shape re-
proach have advantages over Gaussian scale-space fingerprints trieval results obtained for all three databases mentioned above.
in that they are defined for negative values of the scale param- We draw conclusions in Section V.
eter, have monotonic properties in two and higher dimensions,
do not cause features to be shifted by the smoothing, and allow II. MORPHOLOGICAL CURVATURE SCALE SPACES
efficient computation. As an application, they demonstrated that
reduced multiscale dilation-erosion fingerprints can be used for A. Curvature Definition
surface matching. Let be a smooth planar curve with pa-
At the heart of our scale-space method is a different mul- rameter . It can be shown [31] that the curvature of
tiscale approach to the analysis of 1-D signals, motivated by curve , not restricted to the normalized arc-length param-
the work of Leymarie and Levine [28]. They developed a mor- eter, is given by
phological curvature scale space for shape analysis, based on
sequences of morphological top-hat or bottom-hat filters with (1)
increasing size of the structuring element used. The main dif-
ference between our approach and the initial technique of Ley-
marie and Levine [28] is that our method allows for nested struc- If is the normalized arc-length parameter , then (1) can be
tures (i.e., peaks and valleys of the curvature) whereas their written as
method does not. Allowing for nested structures is important
because small structures nested within a larger one can be ex- (2)
tracted and represented at some levels in the scale space. In ad-
dition, in the 1-D case we do not split the curvature in convex As given in (1), the curvature function is computed only from
and concave parts, but we construct top and bottom hat scale parametric derivatives, and, therefore, it is invariant under rota-
spaces, based on grayscale inversion. A problem not addressed tions and translations. However, the curvature measure is scale
by Leymarie and Levine is that of extracting the most important dependent, i.e., inversely proportional to the scale. A possible
features from the scale space. Our primary contribution in this way to achieve scale independence is to normalize this measure
work is a reformulation of the scale spaces in terms of connected by the mean absolute curvature, i.e.,
operators [29], leading to a very useful technique for -dimen-
sional shape recognition. Shapes are represented by closed con- (3)
tours from which sets of points are sampled. Using a spline rep-
resentation, the curvature is computed at each interpolated point,
and two 1-D morphological hat-transform scale spaces [30] are When the size of the curve is an important discriminative fea-
built, using the curvature function as the underlying 1-D signal. ture, the curvature should be used without the normalization in
For every scale, each peak and valley of the curvature signal (3); otherwise, for the purpose of scale-invariant shape analysis,
is extracted and described by its maximum and average heights the normalization should be performed.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.
JALBA et al.: SHAPE REPRESENTATION AND RECOGNITION 333

B. Computation of the Curvature Function tantly from the initial curve, resulting in a new sampled curve.
Despite its simple definition, computing curvature measures This curve is regularized (i.e., smoothed with a Gaussian kernel)
useful for recognition is not straightforward. The first problem is and fitted using bi-cubic splines. We use relations (4) to generate
that curvature is a purely local attribute, the estimation of which is the knot sequence , and compute the curvature
prone to noise. Second, spatially sampled curves are represented function at each interpolated point, using spline deriva-
by a set of isolated points which are in fact a set of singularities. tives. Finally, a curvature function invariant with respect to
Thus, some regularizing preprocessing, such as smoothed inter- rotations, translations, and scaling transforms is computed using
polation, is needed before curvature can be estimated. In order to relation (3).
circumvent these problems some techniques have been proposed
based on: alternative measures (c-curvature) [32], numerical dif- C. From Curvature to Scale-Space Features
ferentiation and interpolation [12], [33], and convolution with
differential Gaussian kernels [10]. In this paper, we use a different In this section, we present the morphological curvature scale
approach to estimating curvature, based on bi-cubic spline inter- spaces, and demonstrate causality of the extrema in the scale
spaces. We also briefly describe the features extracted from the
polation. Among many interpolation techniques, cubic splines
scale spaces and study the behavior of the scale-space represen-
provide regularityineachpoint ofthecurve. Moreover,splines
have been shown to be efficient approaches to interpolate curves tations under noise conditions.
[34], and appear to represent the best tradeoff between accuracy 1) Morphological Curvature Scale Spaces: We begin with
and computational cost. the definition of the hat-transform scale spaces [30], but unlike
Let be a smooth planar curve on , with sample points in [30], here, we shall formulate the hat scale spaces in terms of
obtained by sampling the the max-tree data structure [37]. The curvature scale spaces are
curve at , with and . The interpo- particular 1-D versions of the hat-transform scale spaces, when
lation problem is to fit cubic polynomials on each interval the underlying 1-D signal is the curvature function.
, . Using continuity requirements Let be an arbitrary nonempty set of vertices, and denote
of the first derivatives of the splines and two further continuity by the collection of subsets of . Also, let
conditions at the endpoints, one obtains a tridiagonal system of be an undirected graph, where is a mapping from to
linear equations, which can be solved in linear time. The process which associates to each point the set of points
of computing the spline coefficients is applied for each compo- adjacent to . It is common in signal processing to assume that
nent of the vector. is a regular grid, i.e., ( , 2), and corresponds
The choice of the knot sequence greatly in- to 2-adjacency when , or to 4-adjacency or 8-adjacency
fluences the shape of each spline segment. Close-distanced in- when . In what follows we assume , , 2.
terpolating knots not only reduce the energy of the resulting A path in a graph from point to point is
curve, but also avoid the occurrence of oscillations and loops [34]. a sequence of points of such that
Among many parameterization methods investigated in [31], the are adjacent for all . Let be a subset of . A
arc-length parameterization seems to achieve the best equal space set is connected when for each pair of points in
effect, because the use of arc length as parameter attains con- there exists a path of points in that joins and . A con-
stant speed of motion along the curve [31], [35]. The simplest nected component of is a connected subset of which
approximation to the arc-length parameterization is the so-called is maximal. A flat zone at level of a grayscale signal is
chord length parameterization, in which the domain is subdivided a connected component of the level set
according to the distribution of the chord lengths. However, ac- . A regional maximum at level is a
cording to results obtained by Lee in [36], a more appropriate flat zone which has only strictly lower neighbors. A peak com-
way to define the parametric knots for the curve would be to use ponent at level is a connected component of the threshold
the centripetal parameterization. This parameterization reduces set . A connected opening
the energy of the resulting curve and avoids (to some extent) the extracts the connected component of to which belongs, if
occurrence of oscillations and loops. Although in the centripetal , and equals otherwise. Given a set (the mask), the
method the knots will in general be nonuniformly spaced with geodesic distance between two pixels and is the
respect to arc length, it is possible to derive an approximation to length of the shortest path joining and which is included
the arc-length parameterization as follows. in . The geodesic distance between a point and a set
Let be the perimeter of the curve and is defined as .
, where is the length of the chord between points A max-tree is a rooted tree, in which each of the nodes
and , . An approximate arc-length at grey-level corresponds to a peak component . However,
parameterization based on the centripetal method is given by contains only those pixels in which have grey level .
the following relations: In other words, it is the union of all flat zones . An
example of a 1-D signal, its peak components and its max-tree
are shown in Fig. 1.
(4) Inspired by the work of Leymarie and Levine [28], we wish
to split the curvature profile at points where the width of a fea-
To summarize, the curvature function given in (2) is com- ture suddenly changes. This can be formalized in terms of max-
puted as follows. A number of points are sampled equidis- imal distances of pixels of a max-tree node from its nearest child
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.
334 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 2, FEBRUARY 2006

Fig. 1. Max-tree structure. Left: 1-D signal. Center: Peak components P of the signal. Right: Its corresponding max-tree.

pixel. If this distance is larger than some threshold , we con- any positive , because is zero for these peak components.
sider this an abrupt change. Let be a grayscale image with an However, any component for which is true in image will
associated max-tree as in Fig. 1. Let be a peak component at have at least one nested peak component at . Let be such
level which has peak components at level , a component. There are two situations: 1) is false for
which is the smallest grey level larger than , with from some all , or 2) is true for at least one . In the
index set . The associated max-tree nodes are of course first case, node in the filtered image will be a regional
and , respectively. Consider the attribute defined as maximum and, therefore, be removed by a second application of
. In the second case, it can easily be verified that there must
exist a , , for which is true and for which the
if (5) first case holds, because all regional maxima have .
Therefore, unless there are no nodes in the max-tree of for
otherwise
which is true, .
where denotes a distance measure from a pixel
to set . This distance might be the Euclidean or geodesic Then, letting in (5) be the geodesic distance within (i.e.,
distance within from to the nearest member of . The ), and setting in (7), the
filter criterion which preserves nodes in the path from leaf to top-hat scale space [30] of a grayscale image is given by the
root where abrupt changes take place is sequence defined by the iteration

(6)
(9)
It is easy to see that this criterion is not increasing, so any
max-tree filter using it is an attribute thinning rather than an with and .
opening. The max filter rule for attribute thinnings proposed by Equation (9) is iterated until for all pixels, where
Breen and Jones [19] will now allow us to remove branches of is the minimum value of . Using the grayscale inversion
the max-tree at those points where the width suddenly changes. , a bottom-hat scale space can be formulated. Note that
The max rule works by descending from each leaf of the max- this formulation differs from that in [30]. However, it can be
tree, removing nodes until a node is found for which the cri- shown to be equivalent.
terion is true. Any node between this node and the root is The curvature scale spaces are obtained by iterating relations
unaffected. A problem with the formulation of this filtering rule (9) on the curvature function (i.e., ) and on its grayscale
is that it is cast in terms of an algorithm. More formally, we can inversion . An example is shown in Fig. 3. Then, each
define a new criterion which takes the max-rule into account extracted residual (i.e., peak of the curvature, represented in the
top-hat scale space, and valley represented in the bottom-hat
scale space) is described by its extremal curvature, mean cur-
(7) vature, extent and location.
Note that extracts a peak component . In The scale spaces can be visualized by “reconstructing” the
other words, peak component is preserved if it meets cri- original signal in the following manner. We start with a con-
terion or if any peak component with stant signal . Then, we stack the boxes corresponding to
meets . An example of filtering a max tree, using criterion the nested features (peaks) on top of one another, i.e., we accu-
according to the max rule, is given in Fig. 2. mulate their maximum (or average) values in , at appropriate
Attribute thinning can now be defined as positions (given by the extents of the peaks) along the axis;
this has been done in Fig. 4.
(8)
The current method is sensitive to differences in the rela-
Unlike most attribute thinnings, is not idempotent. It can tive locations of the curvature features. This means that, for ex-
be seen from (5) that all regional maxima will be removed for ample, an elongated rectangle and a square are distinguishable,
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.
JALBA et al.: SHAPE REPRESENTATION AND RECOGNITION 335

Fig. 2. Pruning a max-tree with the criterion Q(P ) using the max filtering rule. First row: Max-trees at iterations s = 0, 1, 2, 3; attributes A(P ) are shown
in the left-hand side of each node C (the nodes for which the criterion T holds are marked; in every root path, Q holds for all nodes below a node for which T
holds). Second row: Reconstructed signals f .

because the widths of the major valleys in the curvature corre- Obviously, , and . Finally, we define
spond to the distances between major peaks, so it is possible to a set as
discriminate between these. (11)
2) Causality and Monotonicity of the Extrema in the Hat-
In other words, is the set of peak components for which
Transform Scale Spaces: An important characteristic of scale-
holds, but which have no for which holds. It
space theory, in contrast to other multiscale approaches, is the
can be seen that
property that a signal feature present at some scale must be
present all the way through scale-space to zero-scale (i.e., orig- (12)
inal signal) [18]. This is often called the causality principle and
ensures that no new spurious features are created due to the filter. Each feature extracted from by consists of precisely
The stronger property of monotonicity requires that the number one member of , and possibly a set of members of .
of features must decrease with increasing scale. For example, in the leftmost max-tree in Fig. 2, the maximum
There are several morphological scale-space representations associated with also contains nonmaximum node . Un-
which have been shown to obey the causality principle. Jackway less , a feature associated with regional max-
and Deriche [18] proved that their dilation-erosion scale spaces imum is associated with exactly one component
have monotonic properties in two and higher dimensions, and , which is the peak component at the highest
do not cause features to be shifted by the smoothing. Extensive grey level for which and holds. Multiple
analysis of scale-space properties satisfied by -dimensional maxima may be associated with any , and need not be
sieves is given in [38]. a member of . In Fig. 2, is associated with two maxima:
It can be shown that the top-hat scale spaces (9) constitute and . Furthermore, the peak component represented
a special case of levelings [27], [39], a general nonlinear by in Fig. 2 is associated with maximum , but .
scale-space representation which satisfies the causality prin- Should then there exists a component at a coarser scale
ciple. However, since no complete proof was given in [27], than which is nested within it. For these reasons,
[39], we will briefly analyze the behavior of the extrema in , with # denoting cardinality. Further-
the hat-transform scale space and prove that our scale-space more, if there must be at least one regional maximum,
representations fulfill these principles. so . If we have
Let be the set of all peak components, and the set of . This means that because the total number of peak
all regional maxima of , as defined in (9). Furthermore the set components decreases strictly, the number of maxima must de-
is defined as crease for sufficiently large , proving monotonicity. Further-
more, any new maximum of is identical to a
(10) peak component of . Therefore, no new maxima are
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.
336 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 2, FEBRUARY 2006

and shape of regional maxima and flat zones are preserved


all the way through scale-space to zero-scale. By duality, a
similar result can be formulated, regarding local minima in the
bottom-hat scale space.
3) Coping With Noise: We carried out an experiment to test
the stability of the curvature scale spaces under noise conditions.
Fig. 4 shows the initial contour, its curvature function, and
the reconstructed curvature using information extracted from
the top scale space (maximum heights). The computations were
made using sampled points (marked with “ ” in the
contour graph), and Gaussian smoothing of the sampled contour
with .
Fig. 5 shows the same contour affected by significant amounts
of uniform, random noise, added to it. The noisy contours were
obtained by randomly translating the coordinates of each point
in the intervals , and , respectively. As expected,
the scale-space signals show differences in detail, cf., Fig. 5.
However, remarkable similarities of the structures present in
these graphs can be observed. The same behavior is exhibited
by the features extracted from the bottom-hat scale spaces (re-
sults not shown). This experiment shows that the curvature scale
spaces are reliable and stable even when large amounts of noise
corrupt the shape of the original curve.

III. SCALE-SPACE DESCRIPTORS


This section is devoted to the extraction of pattern vectors,
based on the information stored in the scale spaces, and to the
computation of a dissimilarity measure between two shapes,
useful for shape matching.

A. Extraction of Pattern Vectors


In principle, knowledge of the curvature function is suf-
ficient to determine a planar curve, up to a rigid transform.
However, if a curve underwent nonrigid transforms and/or
is affected by a large degree of noise, its curvature function
would be affected accordingly. Although the very purpose of
a scale-space representation is to gain robustness with respect
to such factors, special care must be taken to address these
problems. Since, for regularization purposes, the input curves
are smoothed with Gaussian kernels, selecting a suitable width
for each curve is by no means trivial. To tackle this problem,
a simple yet not very efficient solution is to smooth each
curve successively by Gaussian kernels of increasing widths
(i.e., ), and to build hat scale spaces at
Fig. 3. Building curvature spaces. Top: Binary image representing a complex
object. Center: Curvature function (i.e., f ), residuals  (in bold) and signals each iteration . The final pattern vector is then
f , s = 1; . . . ; 7 represented in the top-hat scale space. Bottom: Curvature constructed by concatenating the pattern vectors obtained at
function, residuals  , and signals f , s = 1; . . . ; 7 represented in the each iteration, from top and bottom scale spaces. Since the
bottom-hat scale space.
curvature function becomes smoother when the width of the
Gaussian kernel increases, decreasing lengths of the pattern
introduced, the number of maxima decreases, and there is an vectors extracted from the scale spaces are used.
explicit nesting relationship between features at small and large Let be the length of the pattern vector extracted at
scales in the scale space. Thus, the localization of the contours is scale from the top scale space and be the length of the
preserved, and the causality principle is verified: Coarser scales pattern vector extracted from the bottom scale space. In order to
can only be caused by what happened at finer scales. further shorten the final pattern vector, we choose and
Hence, the reduction of connected components for de- such that , .
scending grey levels, by filtering the initial signal according Since curvature is a local attribute, additional global shape pa-
to relations (9) ensures causality. This means that the location rameters are also computed at each iteration; we included two
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.
JALBA et al.: SHAPE REPRESENTATION AND RECOGNITION 337

Fig. 4. Left: Original contour and sample points. Right: Curvature function (solid) superimposed on the reconstructed signal (bold) using top-hat scale-space
information. Top and bottom scale spaces represented as curves, showing scale-space features as blocks of the correct width and maximum height.

Fig. 5. Left: Contours affected by noise. Right: (bold) reconstructed noisy curvature signals superimposed on the (solid) reconstruction of the original curvature.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.
338 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 2, FEBRUARY 2006

global curvature-related descriptors and two global shape de- not use a training stage and compute similarity between objects
scriptors. The first global curvature descriptor is the bending based on some distance measure. Contrary to content-based re-
energy, defined as the sum of the squared curvatures along the trieval, in supervised shape identification a classification func-
contour. The second global curvature descriptor is defined as the tion is learned from, or fitted to, training data, and then the clas-
number of scale space entries from both top and bottom scale sifier is tested on unseen (test) data.
spaces having average curvatures above a threshold . This de- For shape retrieval, the performance was measured using the
scriptor is similar to the curvature scalar descriptor, which is so-called “bulls-eye test,” in which each shape contour is used as
defined as the number of contour points where the boundary query and one counts the number of correct hits in the top
changes significantly, divided by the total length of the contour. matches, where is the number of prototypes per class. In our
The two global shape descriptors are eccentricity and elonga- shape identification experiments, we have used the C4.5 algo-
tion [40]. Note that similar global descriptors were also used in rithm [43] for constructing decision trees, with bagging [44] as
[9], [41] and in the MPEG-7 standard [42] to supplement the a method of improving the accuracy of the classifier. The perfor-
curvature scale space (CSS) descriptors. mance was evaluated using the holdout [45] method. We com-
Finally, the pattern vector extracted at iteration , pare the results obtained using our method with those obtained
is given by using Fourier descriptors (FDs) [46], wavelet descriptors (WDs)
[14], and the CSS descriptors developed for the MPEG-7 stan-
dard (CSSD) [42]. In cases for which there are published results,
other than those obtained with the above methods, we will also
(13) refer to them.
where , , , , are eccentricity, elongation, bending A. Preprocessing and Settings of Parameters
energy, and curvature scalar descriptor, respectively. The values
, , represent the features with the For each technique, parameter values have to be determined
largest maximum curvature extracted from the top scale space, that would give the best results for each data set. This involves an
at iteration . Similarly, , , represent the iterative process of initially guessing suitable parameter values,
features with the largest maximum curvature extracted evaluating the results, and then refining the values. Since this is
from the bottom scale space, at iteration . a time-consuming procedure, two points should be made: 1) the
values used are not the result of an exhaustive search of the pa-
B. A Measure of Dissimilarity Between Shapes rameter space, because such a search would be impractical, re-
quiring a very long time, and 2) the parameter values were ad-
Let be the final pattern vector representing the reference justed in an attempt to give best average performance, across all
shape and be the final pattern vector corresponding to a data sets. Although the values may not be optimal (as a conse-
test shape , obtained by concatenating the corresponding vec- quence of the first observation), they produced the best classifi-
tors and , , , as defined in (13); here, is the cation performances in our experiments.
maximum scale index, as defined in Section II. As is common in The parameters of the morphological scale spaces were set
content-based retrieval literature, we define a measure of dissim- as follows. Each input curve is sampled at an equal number of
ilarity between shapes and as the following weighted points, such that the resulting curve has points. This
distance: curve is regularized by smoothing with Gaussian kernels of in-
creasing width. We selected values for the smoothing pa-
rameter 3.0, 6.0, 10.0, 16.0, in an attempt to cover a large in-
terval of smoothing degrees. The numbers of features extracted
from both the top scale space and the bottom hat scale space
were set to 10, 10, 5, 5, and 5, 5, 5, 5, respec-
tively. Finally, the weights were set to , and
, and the threshold parameter was .
(14)
The parameters of the other methods were set according to
[41], [42] for the CSS method, [14] for the WD, and [47] for the
where , , and , , FD.
are weights. The “prime” symbol indicates features corre-
sponding to the test shape . B. Recognition of Diatoms
In the first experiment, we measured identification and shape
IV. CASE STUDIES retrieval results on a large set of diatom images, which consists
To test the reliability of the proposed method for shape-based of 37 different taxa, comprising a total of 781 images. Each class
object recognition, we used three data sets, and for each of them (taxon) has at least 20 representatives.
we performed two types of recognition experiments: shape re- Diatoms are microscopic, single-celled algae, which show
trieval and shape identification. A content-based (or query by highly ornate silica shells or frustules. Some examples of diatom
example) retrieval system contains a database of objects (e.g., images are shown in Fig. 6. Each image represents a single shell
images, shapes) and responds to a query object presented by of a diatom, and each diatom image is accompanied by the out-
the user with ranked similar objects. Usually, these systems do line of its view (see Fig. 6). For additional details on diatoms,
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.
JALBA et al.: SHAPE REPRESENTATION AND RECOGNITION 339

Fig. 6. Examples of contours extracted from the diatoms image set.

TABLE I TABLE II
IDENTIFICATION PERFORMANCES FOR THE DIATOMS DATA SET (DIATOMS), SHAPE RETRIEVAL PERFORMANCES (%) FOR THE DIATOMS DATA SET
MPEG-7 SILHOUETTE DATABASE (MPEG-7), AND COIL-20 (COIL) (DIATOMS), MPEG-7 SILHOUETTE DATABASE (MPEG-7), AND
DATABASE, USING THE C4.5 DECISION TREE CLASSIFIER WITH BAGGING COIL-20 (COIL) DATABASE

project [47]. Fourier and wavelet descriptors performed well,


resulting in identification performances close to 80%, and
retrieval performances of almost 75%. The poor performances
obtained using the CSSD (based on inflection points) can be
explained by the fact that most diatoms in this data set exhibit
convex shapes and there are no inflection points on the contour
of a convex object. Since the MCSS method extracts informa-
tion about both convexities and concavities, our method is not
upset by convex shapes.

C. Recognition Using Silhouettes: The MPEG-7 Database


segmentation of diatom images, or other identification results
than those presented here, we refer to [47], which contains the Our next experiment was performed using the MPEG-7
results of the Automatic Diatom Identification and Classifica- shape silhouette data set, a database of 1400 objects used in
tion (ADIAC) project, aimed at automating the process of di- the MPEG-7 Core Experiment CE-Shape-1 part B [48]. This
atom identification by digital image analysis. database consists of 70 shape categories, with 20 objects per
With the experimental setup given in Section IV-A and category.
the identification technique briefly described at the beginning Using the same setup as in the first experiment, identifi-
of Section IV, the identification performances obtained by cation performances for this data set are shown in Table I,
all methods for each data set are given in Table I. Similarly, and retrieval performances are given in Table II. For this data
retrieval performances obtained using the so-called “bulls-eye set both methods based on curvature information performed
test” are given in Table II. Table I shows identification perfor- much better than Fourier and wavelet descriptors. However,
mances using the C4.5 decision tree classifier with bagging. the MCSS method outperformed the CSS technique, yielding
The column “ ” contains the average number of errors; the performances which are 5% larger than those of the latter.
column “ ” contains the standard deviation of the number of Other published retrieval results for this data set, using the
errors; the columns “min” and “max” contain the minimum same methodology, do exist and range from 75.44% to 78.38%
and maximum number of errors, respectively; the column [41], [48]–[51].
“performance” contains the percentage (average with stan- A possible reason for achieving improved results is that our
dard deviation) of samples identified correctly. In both tables, descriptor is invariant with respect to reflections, whereas shape
MCSSD stands for the morphological curvature scale space contexts [51] and CSS descriptors [41] are not. This reflection
descriptor from Section III-A, CSSD represents the curvature invariance also holds for the method in [49], which has a perfor-
scale space descriptor, Fourier descriptors are denoted by FD, mance of 78.38%, but this method requires substantially more
and the wavelet descriptors are denoted by WD. computation time than ours. Also, as shown in [48], there are
The performances obtained using MCSSD were at least 8% cases in which shapes perceived as conceptually different have
larger than the others, while the identification performance the same positions of the maxima of the CSS image, and, hence,
for this data set is the best result obtained during the ADIAC the CSS method fails.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.
340 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 2, FEBRUARY 2006

D. Three-Dimensional Object Recognition Based on 2-D shape descriptor incorporates both convexities and concavities
Views of shapes, and, hence, it is possible to discriminate between
This experiment involved recognition of objects based on convex shapes. Furthermore, the method is robust to local shape
their 2-D appearances. We used the COIL-20 database [52]. deformations and copes well with large amounts of noise.
Each of the 20 objects from this database is represented by 72 Finally, the method is fast, and the computational complexity
2-D views, corresponding to successive rotations of the object of constructing the scale spaces is linear in the number of
over an angle of 5 . points of the input contour. For example, the CPU time spent to
Closed, outside contours were extracted using the Canny edge compute and collect the shape descriptors for all 1400 contours
detector, followed by a contour-tracing algorithm [40]. Other- of the MPEG-7 dataset is under two minutes on a Pentium
wise, we have used the same experimental setup as with the III machine at 670 MHz.
other experiments.
For this data set, the number of prototypes can be reduced REFERENCES
because some of the views of the objects have approximately
[1] A. P. Witkin, “Scale-space filtering,” in Proc. Int. Joint Conf. Artificial
the same appearance. Belongie et al. [51] report 2.4% error Intelligence, Palo Alto, CA, Aug. 1983, pp. 1019–1022.
rate using only four 2-D views for each object (i.e., 80 proto- [2] C. Fermuller and W. Kropatsch, “Multi-resolution shape description by
types). They used a modified k-means clustering algorithm for corners,” in Proc. CVPR, 1992, pp. 271–276.
[3] E. Saund, “Adding scale to the primal sketch,” in Proc. CVPR, 1989, pp.
adaptively selecting (and, therefore, reducing) prototypes, and 70–78.
a nearest-neighbor classifier. Instead of using more advanced [4] D. G. Lowe, Perceptual Organization and Visual Recognition. Boston,
clustering algorithms in order to further reduce the number of MA: Kluwer, 1985.
[5] R. Bajcsy and S. Kovacic, “Multiresolution elastic matching,” in Proc.
prototypes, we use the same experimental setup as in our pre- CVGIP, vol. 46, 1989, pp. 1–21.
vious experiments, and report the identification and retrieval [6] F. Attneave, “Some informational aspects of visual perception,” Psychol.
performances shown in Tables I and II, respectively. Rev., vol. 61, pp. 183–193, 1954.
[7] J. R. Pomerantz, L. C. Sager, and R. J. Stoever, “Perception of wholes
Once again, the performances obtained using MCSSD were at and their component parts: Some configural superiority effects,” J. Exp.
least 8% larger then the others. For this data set, the CSS method Psychol., vol. 3, pp. 422–435, 1977.
outperformed the Fourier and wavelet methods. [8] T. Pavlidis, “Algorithms for shape analysis of contours and waveforms,”
IEEE Trans. Pattern Anal. Mach. Intell., vol. PAMI-2, no. 3, pp.
301–312, Mar. 1980.
V. CONCLUSION [9] F. Mokhtarian and A. K. Mackworth, “Scale-based description and
recognition of planar curves and two-dimensional shapes,” IEEE Trans.
We have proposed a multiscale method for object recognition, Pattern Anal. Mach. Intell., vol. PAMI-8, no. 1, pp. 34–43, Jan. 1986.
[10] , “A theory of multiscale, curvature-based shape representation for
based on contour information. The method is based on two mor- planar curves,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 14, no. 6,
phological scale-space representations, the hat-transform scale pp. 789–805, Jun. 1992.
spaces, which showed successful applicability for shape-based [11] G. Dudek and J. K. Tsotsos, “Shape representation and recognition
from multiscale curvature,” Comput. Vis. Image Understand., vol. 68,
recognition. These representations of the curvature signal re- pp. 170–189, 1997.
sult in a novel representation, the morphological curvature scale [12] S. L. Y.-P. Wang and K. T. Lee, “Multiscale curvature based shape rep-
spaces. resentation using b-spline wavelets,” IEEE Trans. Image Process., vol.
8, no. 10, pp. 1586–1592, Oct. 1999.
We demonstrated causality of the extrema in the scale spaces, [13] H. Asada and M. Brady, “The curvature primal sketch,” IEEE Trans.
an essential characteristic to any scale-space formulation. Be- Pattern Anal. Mach. Intell., vol. PAMI-8, no. 1, pp. 2–14, Jan. 1986.
sides this theoretical result, we have shown the relevance of [14] G. C.-H. Chuang and C.-C. J. Kuo, “Wavelet descriptor of planar curves:
Theory and applications,” IEEE Trans. Image Process., vol. 5, no. 1, pp.
these representations to object recognition and illustrated their 56–70, Jan. 1996.
usage for identification and shape retrieval. We evaluated the [15] J. J. Koenderink, “The structure of images,” Biol. Cybern., vol. 50, pp.
performance of the method in three recognition experiments: 363–370, 1984.
[16] A. L. Yuille and T. A. Poggio, “Scaling theorems for zero crossings,”
recognition of diatoms based on natural images of diatom shells, IEEE Trans. Pattern Anal. Mach. Intell., vol. PAMI-8, no. 1, pp. 15–25,
recognition using silhouettes from the MPEG-7 database, and Jan. 1986.
3-D object recognition based on 2-D views. Our method out- [17] L. M. Lifshitz and S. M. Pizer, “A multiresolution hierarchical approach
to image segmentation based on intensity extrema,” IEEE Trans. Pattern
performs all shape comparison methods previously reported in Anal. Mach. Intell., vol. 12, no. 4, pp. 529–541, Apr. 1990.
the literature, in both identification and retrieval performances. [18] P. T. Jackway and M. Deriche, “Scale-space properties of the multiscale
The shape descriptor uses only maximum heights of the morphological dilation-erosion,” IEEE Trans. Pattern Anal. Mach. In-
tell., vol. 18, no. 1, pp. 38–51, Jan. 1996.
extrema of the curvature function and some global shape [19] E. J. Breen and R. Jones, “Attribute openings, thinnings and granulome-
descriptors, and no information regarding the positions of the tries,” Comput. Vis. Image Understand., vol. 64, no. 3, pp. 377–389,
extrema along the contour. The advantage of this approach is 1996.
[20] P. F. M. Nacken, “Chamfer metrics in mathematical morphology,” J.
that matching two shapes means simply computing a distance Math. Imag. Vis., vol. 4, pp. 233–253, 1994.
between the two descriptors, without any alignment (i.e., [21] J. A. Bangham, P. Chardaire, C. J. Pye, and P. D. Ling, “Multiscale non-
shifting) of the maxima as is required in the CSS method. Also, linear decomposition: The sieve decomposition theorem,” IEEE Trans.
Pattern Anal. Mach. Intell., vol. 18, no. 4, pp. 529–538, Apr. 1996.
the method can be used for scale-invariant shape analysis, [22] J. A. Bangham, P. D. Ling, and R. Harvey, “Scale-space from nonlinear
e.g., when a nonuniformly scaled square and a rectangle are filters,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 18, no. 4, pp.
assigned to the same class. However, if this is not desired, 520–528, Apr. 1996.
[23] B. B. Kimia and K. Siddiqi, “Geometric heat equation and nonlinear
the descriptor can be augmented with the relative sizes of the diffusion of shapes and images,” Comput. Vis. Image Understand., vol.
extracted features to discriminate between such cases. The 64, pp. 305–322, 1996.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.
JALBA et al.: SHAPE REPRESENTATION AND RECOGNITION 341

[24] B. K. Jang and R. T. Chin, “Morphological scale space for 2d shape [49] C. Grigorescu and N. Petkov, “Distance sets for shape filters and shape
smoothing,” Comput. Vis. Image Understand., vol. 70, pp. 121–141, recognition,” IEEE Trans. Image Process., vol. 12, no. 9, pp. 1274–1286,
1998. Sep. 2003.
[25] M. H. Chen and P. F. Yan, “A multiscale approach based on morpholog- [50] T. B. Sebastian, P. N. Klein, and B. B. Kimia, “On aligning curves,” IEEE
ical filtering,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 11, no. 6, pp. Trans. Pattern Anal. Mach. Intell., vol. 25, no. 1, pp. 116–124, Jan. 2003.
694–700, Jun. 1989. [51] S. Belongie, J. Malik, and J. Puzicha, “Shape matching and object recog-
[26] K.-R. Park and C.-N. Lee, “Scale-space using mathematical mor- nition using shape contexts,” IEEE Trans. Pattern Anal. Mach. Intell.,
phology,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 18, no. 9, pp. vol. 24, no. 4, pp. 509–522, Apr. 2002.
1121–1126, Sep. 1996. [52] H. Murase and S. Nayar, “Visual learning and recognition of 3-d objects
[27] F. Meyer and P. Maragos, “Morphological scale-space representation from appearence,” Int. J. Comput. Vis., vol. 14, no. 1, pp. 5–24, 1995.
with levelings,” in Proc. Scale Space, vol. 1682, Lecture Notes in Com-
puter Science, M. Nielsen, P. Johansen, O. F. Olsen, and J. Weickert,
Eds., Berlin, Germany, 1999, pp. 187–198.
[28] F. Leymarie and M. D. Levine, “Shape features using curvature mor-
phology,” Proc. SPIE Vis. Commun. Image Process. IV, vol. 1199, pp. Andrei C. Jalba received the B.Sc. and M.Sc.
390–401, 1989. degrees in applied electronics and information
[29] P. Salembier and J. Serra, “Flat zones filtering, connected operators, and engineering from the Politehnica University of
filters by reconstruction,” IEEE Trans. Image Process., vol. 4, no. 9, pp. Bucharest, Bucharest, Romania, 1998 and 1999,
1153–1160, Sep. 1995. respectively, and the Ph.D. degree from the Institute
[30] A. C. Jalba, M. H. F. Wilkinson, and J. B. T. M. Roerdink, “Morpholog- for Mathematics and Computing Science, University
ical hat-transform scale spaces and their use in pattern classification,” of Groningen (RuG), Groningen, The Netherlands.
Pattern Recognit., vol. 37, pp. 901–915, 2004. He is currently a Postdoctoral Researcher with
[31] G. Farin, Curves and Surfaces for Computer-Aided Geometric Design: RuG. His research interests include computer
A Practical Guide. San Diego, CA: Academic, 1997. graphics and vision, image processing, and parallel
[32] L. Davis, “Understanding shape: Angles and sides,” IEEE Trans. computing.
Comput., vol. C-26, no. 4, pp. 236–242, Apr. 1977.
[33] G. Medioni and Y. Yasumoto, “Corner detection and curve representa-
tion using cubic b-splines,” Proc. CVGIP, vol. 39, pp. 267–278, 1987.
[34] C. de Boor, A Practical Guide to Splines. New York: Springer-Verlag,
1978. Michael H. F. Wilkinson (M’99) received the M.Sc.
[35] P. J. van Otterloo, A Contour-Oriented Approach to Shape Anal- degree in astronomy from the Kapteyn Laboratory,
ysis. Englewood Cliffs, NJ: Prentice-Hall, 1992. University of Groningen (RuG), Groningen, The
[36] E. T. Y. Lee, “Choosing nodes in parametric curve interpolation,” Netherlands, in 1993, and the Ph.D. degree from the
Comput.-Aided Design, vol. 21, pp. 363–370, 1989. Institute of Mathematics and Computing Science
[37] P. Salembier, A. Oliveras, and L. Garrido, “Anti-extensive connected (IWI), RuG, in 1995
operators for image and sequence processing,” IEEE Trans. Image He was with the Department of Medical Micro-
Process., vol. 7, no. 3, pp. 555–570, Mar. 1998. biology, RuG, where he worked on image analysis
[38] J. A. Bangham, R. Harvey, P. D. Ling, and R. V. Aldridge, “Morpholog- of intestinal bacteria. This work formed the basis of
ical scale-space preserving transforms in many dimensions,” J. Electron. his Ph.D. degree. He was appointed to Researcher at
Imag., vol. 5, pp. 283–299, 1996. the Centre for High Performance Computing, RuG,
[39] F. Meyer, “From connected operators to levelings,” in Mathematical where he worked on simulating the intestinal microbial ecosystem on parallel
Morphology and its Applications to Image and Signal Processing, H. computers. During that time he edited the book Digital Image Analysis of Mi-
Heijmans and J. Roerdink, Eds. Norwell, MA: Kluwer, 1998, pp. crobes (Wiley, 1998) together with F. Schut. He was a Researcher at the IWI
191–199. where he worked on the image analysis of diatoms. He is currently an Assistant
[40] A. K. Jain, Fundamentals of Digital Image Processing. Englewood Professor at the IWI.
Cliffs, NJ: Prentice-Hall, 1989.
[41] F. Mokhtarian, S. Abbasi, and J. Kittler, “Efficient and robust retrieval by
shape content through curvature scale space,” in Image DataBases and
Multi-Media Search, A. W. M. Smeulders and R. Jain, Eds. Singapore:
World Scientific, 1997, pp. 51–58. Jos B. T. M. Roerdink (M’95) received the M.Sc. de-
[42] M. Bober, “MPEG-7 visual shape descriptors,” IEEE Trans. Circuits gree in theoretical physics from the University of Ni-
Syst. Video Technol., vol. 11, no. 4, pp. 716–719, Jun. 2001. jmegen, The Netherlands, 1979, and the Ph.D. degree
[43] J. R. Quinlan, C4. 5: Programs for Machine Learning. San Mateo, CA: from the University of Utrecht, Utrecht, The Nether-
Morgan Kaufmann, 1993. lands, in 1983.
[44] L. Breiman, “Bagging predictors,” Mach. Learn., vol. 24, no. 2, pp. He held a two-year position as a Postdoctoral
123–140, 1996. Fellow at the University of California, San Diego,
[45] R. Kohavi, “A study of cross-validation and bootstrap for accuracy esti- in the area of stochastic processes, from 1983 to
mation and model selection,” in Proc. Int. Joint Conf. Artificial Intelli- 1985. He then joined the Centre for Mathematics and
gence, 1995, pp. 1137–1145. Computer Science in Amsterdam, where he worked
[46] C. T. Zahn and R. Z. Roskies, “Fourier descriptors for plane closed on image processing and tomographic reconstruc-
curves,” IEEE Trans. Comput., vol. C-21, no. 3, pp. 269–281, Mar. 1972. tion from 1986 to 1992. He was appointed to Associate Professor in 1992,
[47] Automatic Diatom Identification, H. du Buf and M. M. Bayer, Eds., then Full Professor in 2003, at the Institute for Mathematics and Computing
World Scientific, Singapore, 2002. Science, University of Groningen, Groningen, The Netherlands, where he
[48] L. J. Latecki, R. Lakimper, and U. Eckhardt, “Shape descriptors for non- currently holds the Chair in Scientific Visualization and Computer Graphics.
rigid shapes with a single closed contour,” in Proc. IEEE CVPR, 2000, His current research interests include biomedical visualization, neuroimaging,
pp. 1424–1429. and bioinformatics.

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BHILAI. Downloaded on November 03,2023 at 17:44:42 UTC from IEEE Xplore. Restrictions apply.

You might also like