423 research outputs found

    Optimum Slice Reduction Algorithm For Fast Surface Reconstruction From Contour Slices

    Get PDF
    Tesis ini memfokus kepada pembinaan semula permukaan daripada siri hirisan kontur, dengan tujuan mempercepatkan proses pembinaan semula di samping mengekalkan kualiti output pada tahap yang boleh diterima. This thesis is concerned with the reconstruction of surface from a series of contour slices, with the aim to speed up the reconstruction process while preserving the output quality at an acceptable level

    Optimum Slice Reduction Algorithm For Fast Surface Reconstruction From Contour slices [QA571. T164 2007 f rb].

    Get PDF
    Tesis ini memfokus kepada pembinaan semula permukaan daripada siri hirisan kontur, dengan tujuan mempercepatkan proses pembinaan semula di samping mengekalkan kualiti output pada tahap yang boleh diterima. Teknik yang dicadangkan dalam tesis ini memproses hirisan-hirisan kontur sebelum pembinaan semula permukaan. This thesis is concerned with the reconstruction of surface from a series of contour slices, with the aim to speed up the reconstruction process while preserving the output quality at an acceptable level. The proposed technique in this thesis, preprocesses the slices of contour prior to surface reconstruction

    Tangent-ball techniques for shape processing

    Get PDF
    Shape processing defines a set of theoretical and algorithmic tools for creating, measuring and modifying digital representations of shapes.  Such tools are of paramount importance to many disciplines of computer graphics, including modeling, animation, visualization, and image processing.  Many applications of shape processing can be found in the entertainment and medical industries. In an attempt to improve upon many previous shape processing techniques, the present thesis explores the theoretical and algorithmic aspects of a difference measure, which involves fitting a ball (disk in 2D and sphere in 3D) so that it has at least one tangential contact with each shape and the ball interior is disjoint from both shapes. We propose a set of ball-based operators and discuss their properties, implementations, and applications.  We divide the group of ball-based operations into unary and binary as follows: Unary operators include: * Identifying details (sharp, salient features, constrictions) * Smoothing shapes by removing such details, replacing them by fillets and roundings * Segmentation (recognition, abstract modelization via centerline and radius variation) of tubular structures Binary operators include: * Measuring the local discrepancy between two shapes * Computing the average of two shapes * Computing point-to-point correspondence between two shapes * Computing circular trajectories between corresponding points that meet both shapes at right angles * Using these trajectories to support smooth morphing (inbetweening) * Using a curve morph to construct surfaces that interpolate between contours on consecutive slices The technical contributions of this thesis focus on the implementation of these tangent-ball operators and their usefulness in applications of shape processing. We show specific applications in the areas of animation and computer-aided medical diagnosis.  These algorithms are simple to implement, mathematically elegant, and fast to execute.Ph.D.Committee Chair: Jarek Rossignac; Committee Member: Greg Slabaugh; Committee Member: Greg Turk; Committee Member: Karen Liu; Committee Member: Maryann Simmon

    Free-form deformation, mesh morphing and reduced-order methods: enablers for efficient aerodynamic shape optimisation

    Get PDF
    The work provides an integrated pipeline for the model order reduction of turbulent flows around parametrised geometries in aerodynamics. In particular, Free-Form Deformation is applied for geometry parametrisation, whereas two different reduced-order models based on Proper Orthogonal Decomposition (POD) are employed in order to speed-up the full-order simulations: the first method exploits POD with interpolation, while the second one is based on domain decomposition. For the sampling of the parameter space, we adopt a Greedy strategy coupled with Constrained Centroidal Voronoi Tessellations, in order to guarantee a good compromise between space exploration and exploitation. The proposed framework is tested on an industrially relevant application, i.e. the front-bumper morphing of the DrivAer car model, using the finite-volume method for the full-order resolution of the Reynolds-Averaged Navier-Stokes equations

    Dense 3D Face Correspondence

    Full text link
    We present an algorithm that automatically establishes dense correspondences between a large number of 3D faces. Starting from automatically detected sparse correspondences on the outer boundary of 3D faces, the algorithm triangulates existing correspondences and expands them iteratively by matching points of distinctive surface curvature along the triangle edges. After exhausting keypoint matches, further correspondences are established by generating evenly distributed points within triangles by evolving level set geodesic curves from the centroids of large triangles. A deformable model (K3DM) is constructed from the dense corresponded faces and an algorithm is proposed for morphing the K3DM to fit unseen faces. This algorithm iterates between rigid alignment of an unseen face followed by regularized morphing of the deformable model. We have extensively evaluated the proposed algorithms on synthetic data and real 3D faces from the FRGCv2, Bosphorus, BU3DFE and UND Ear databases using quantitative and qualitative benchmarks. Our algorithm achieved dense correspondences with a mean localisation error of 1.28mm on synthetic faces and detected 1414 anthropometric landmarks on unseen real faces from the FRGCv2 database with 3mm precision. Furthermore, our deformable model fitting algorithm achieved 98.5% face recognition accuracy on the FRGCv2 and 98.6% on Bosphorus database. Our dense model is also able to generalize to unseen datasets.Comment: 24 Pages, 12 Figures, 6 Tables and 3 Algorithm

    Stegano-Morphing: Concealing Attacks on Face Identification Algorithms

    Full text link
    © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other worksFace identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject's image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects' images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneouslyThis work was supported by the Consejería De Ciencia, Universidad e Innovación, Comunidad de Madri
    corecore