SlideShare a Scribd company logo
International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011
DOI : 10.5121/ijp2p.2011.2201 1
AN ADAPTIVE MESH METHOD FOR OBJECT
TRACKING
Mahdi Koohi1
and Abbas Shakery2
1
Department of Computer Engineering, Islamic Azad University, Shahr-e-Qods Branch,Tehran,Iran
m.kohy@yahoo.com
2
Department of Electronic Engineering, Azad University, SouthTehran Branch, Iran
a.shakery@gmail.com
ABSTRACT
Object tracking is one of the most important problems in modern visual systems and researches are
continuing their studies in this field. A suitable tracking method should not only be able to recognize and
track the related object in continuous frames, but should also provide a reliable and efficient reaction
against the phenomena disturbing tracking process including performance efficiency in real-time
applications. In this article, an effective mesh-based method is introduced as a suitable tracking method in
continuous frames. Also, its preference and limitation is discussed.
KEYWORDS
Tracking, Adaptive Mesh, Polygon Approximation.
1. INTRODUCTION
Object tracking has been regarded as one of the most important problem, that could not be solved
completely and researches are being continued in this field. A desirable tracking method should be
able not only to diagnose and track referred object in consequent frame, but also should include
considerable reliability and power along with implantable capability in real time practices.
Nowadays a new idea regarding "mesh method" has been proposed as utilizing an adaptive mesh
structure instead of a uniform mesh. In other words, instead of following a special complex of the
nodes in each frame, in a distance between two consequent frames, nodes which should be
followed in the later frame are selected adaptively. Such process will provide more power and
reliability of tracking process against minor or major occlusions, appearing new objects in image,
or exiting objects from the image [1], [2]. Although such idea is new and controversial in some
aspects, it is evident that such method will complicate the tracking process. But, a perspective
beyond this issue shows that such method may effectively defeat the above challenges. In this
article, such a method is introduced in more details because of the lack of enough reference;
algorithmic results have performed on artificial and some real images.
2. DISTURBING FACTORS OF TRACKING PROCESS
Among the phenomena which disturb tracking process are listed as:
1) Lack of camera instability regarding to objects causing image magnification, minimization, or
rotation.
2) Light change of image environment.
International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011
2
3) Lack of object movement in a straight direction.
4) Lack of objects with constant speed.
5) Minimal or general occlusion of the related object with other objects.
3. ADAPTIVE MESH DESIGN
Figure 1 shows an object moving in a static background.
Figure. 1. Movement of two moving borders following an object movement.
Assuming an ellipsoid object is transferring to the right side results in two moving borders .The
border moving to the right is Background To Be Covered (BTBC) and Uncovered Background
(UB) is the border moving to the left showing the background movement [2,7].
The structure of an adaptive mesh structure is defined as follows:
1) In current frame, no node should be put in BTBC area because these nodes will be occluded
in the next frame and we cannot calculate any moving vector for them.
2) We may relate more than one moving vector to nodes which are put on objects borders,
because they are set between two or several objects or between the object and common back
ground. For example, if a node is located in the border of the object and the background, two
moving vectors should be referred to it; one for modeling the object movement and another for
modeling the background movement.
3) The structure of intra area mesh or UB areas in the next frame should be introduced for
following up the new areas.
For exact modeling of such areas with a mesh model, a complex of nodes should be set on their
borders, and these nodes are concluded through polygon estimation.
Because of the lack of enough attention of moving vectors around such nodes, BTBC and UB
cannot be estimated exactly and a motion compensation method is used for compensating such
estimation errors.
First the changed area in the current frame is estimated by mesh designing algorithms, and the
movement of frame K is compensated form frame K+1 by estimating the movement field.
In this process, motion failure (MF) is estimated instead of UB area. The reason for this is to adopt
mesh structure with new objects in the image. The MF area in next frame is estimated with a
similar method of BTBC area finding method, from the frame differences as a function of
parametric movement field storage and coding the colors or light intensity of this area as a data
complex. Then, the mesh inside the MF area is reintroduced for following up such areas. MF area
includes objects appearing currently and objects occluding previous objects followed in previous
frames.
International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011
3
4. MOVING FIELD ESTIMATION
For estimating moving field density, methods on light share equations such as Lucas – Kanade [3]
or Horn – Schunck [4] are used. Such methods create a smoother moving field than other methods
such as block matching. In [8,9,10] many existing algorithms’speeds (computing optical flow for
the diverging trees sequence) are compared and compiled in a tabular form.
It is noteworthy that the crystallizing parameters and smoothing levels in such methods are
important (if the movement field is over smoothed, following the movement on small regions will
be impossible).
5. OPTICAL FLOW EQUATION
The light share equation for each node assuming the constant light level of that node in a distance
between two consequent frames is:
0=
∂
∂
+
∂
∂
+
∂
∂
t
E
dt
dy
y
E
dt
dx
x
E
⇒
0=
dt
dE
dt
dx
u =
dt
dy
v = ⇒ 0=++ EvEuE tyx
(1)
Where E denotes the light intensity of node (x, y) and Ex, Ey, and Et are componential derivatives
of light in the x and y directions based on the time in the related node. Situations which are used
for light share calculations are related to the movement field structure and characters.
One of these conditions is the smooth condition of the movement field which is implemented by
minimization of the quadrant amount of the gradient of the "speed" elements:
(2)
22






∂
∂
+





∂
∂
y
u
x
u
22






∂
∂
+





∂
∂
y
v
x
v
Each of the above situations will provide a nonlinear equation. The light share equation is based
on the constant level of the light in a node in a distance between two frames. But, any light
intensity change may alert the light of a node.
For considering noise effects or light change of an image and for preventing the loss of application
of light share equation, such linear equation should be solved by making a system with two
equation, one linear and one nonlinear. But, when all objects in a scene move together or objects
are fixed and the camera is moving in a plate in parallel with its own image plate (without any
limitation in the camera bending movement), then the light share equation will change to a
constant optical flow, and only a quantity of U and V should be calculated for all nodes of the
image and this is done by minimizing the total sum of optical flow:
International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011
4
(3)
6. DEFINING BTBC REGION
Region BTBC is referred to total intra frame pixels which are covered in the next frames and its
borders are estimated by threshold displacement between two consequent frames.
7. ALGORITHMIC STEPS OF BTBC REGION
The procedure is as follows:
1) Calculating the difference between two consequent frame and recognizing the changed region
by processing methods as:
a) Filtering by median filter (5×5).
b) Three consequent implementations of morphologic closing (size 3×3) and then three
consequent implementations of morphologic opening with the same size.
c) Eliminating regions less than a defined size.
2) Estimating the movement field density from frame k to frame k+1.
3) Movement compensation of frame k of frame k+1 for virtual estimation of kI
~
by the density of
the estimated movement field.
4) If the difference between Frame k showing with Ik (x,y) with the compensated frame K
)],(
~
[ yxIK is more than a predefined threshold, then the pixel (x, y) is labeled as occluded
pixel as:
),(),(),(),( 1
~ yxyxyxyxDFD TII kk
⇒>−= (4)
Thresholding may lead to a complex of little pixels eliminating the utilization of filtering and
applying the morphological filtering and covering the little holes results in smooth and
homogenous regions. The size of eliminated pixels or covered holes depends on the filter size. In
Figure 2, the definition result of BTBC region is shown. In the first row a quadrant object is
moving to the right side having occlusion in second frame and in the second position, the quadrant
object moves to the right without occlusion in the second frame [2].
International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011
5
Figure 2. Results of BTBC definition.
8. POLYGON APPROXIMATION
The border of different regions during the adaptive tracking process should be modeled with
limited number of nodes in the related region. Such model should provide the closest
approximation with near regional position. The most common models are among polygons and B-
Spline models. Polygon approximation is used in adaptive mesh tracking process because of its
simple structure.
Figure 3. Polygon algorithm.
9. POLYGON ALGORITHM STEPS
This algorithm includes the following steps:
1) Define all pixels located on the related region border.
2) Find a pair of pixel among them with maximum distance with each other and label them by 1
and 2. The connecting line between them is called the "main axis".
International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011
6
3) Find two nodes with highest vertical distance with the main axis in two sides of the axis as 3
and 4. These four nodes are called "initial vertices". Vertices 3 and 4 should be in two opposite
directions of the main axis.
4) Draw a straight line between two vertices (such as 1-3 in Figure 3).
5) Repeat step 4 for 3 other parts.
The above nodes are used as the building nodes for a two-dimensional structure. Such polygon
algorithm is based on converge regions and also approximates concave region as converge
positions; which is enough for mesh structure. Such algorithm may be expanded for more than 128
nodes. Figure 4 shows the circle that is designed for 4 and 15 nodes.
Figure 4. Results of polygon approximation.
10. SELECTING NODES FOR DIMENSIONAL MESH STRUCTURE
HIERARCHICAL MESH
Such tracking process is as an effective algorithm for designing two-dimensional mesh as a
concept-based manner. It includes a non smooth selection process of a complex of nodes followed
by a triangle creating process on selected nodes. The basic principle is to select nodes in such a
way that mesh cells borders are adopted with the object borders and the density of nodes is
suitable with local activity level. Figure 5 shows the flow chart of the selection of mesh structure
nodes and Figure 6 shows the final results.
The above method needs a high level of calculation and in this reason it is not performed with a
significant speed. Another limitation of this method arises from the lack of occlusion by this
method on all inter nodal areas meaning that we cannot prove such method may make an occlusion
on all intermodal regions by triangle cells. It is also practically observed that, in spite of complete
performance of the process, some position of inter nodal regions, may remain without triangle
occlusion.
International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011
7
Figure 5. Flowchart of selecting two dimensional mesh structure nodes.
Such limitation caused that a suggested method of simple and fast triangulation method is studied.
The strong point of such suggested the method in comparison with the previous method is that we
can prove such method will surely make occlusion on all inter nodal regions. Such algorithm uses
a method called polygon star making.
12. STEPS OF THE SUGGESTED ALGORITHM
The following steps are suggested in this star polygon algorithm:
1) Consider M node. Find a neighbor with distance which is located exactly on the top of M
node.
2) Find another neighbor with lowest distance located exactly under the M node.
3) Consider a circle with M center. Store all nodes located in the right half plate of node M in one
configuration .Review all nodes. If two or several nodes are located on one equal radian, the
node with lowest distance with M should be conserved and other nodes on that radian should
be eliminated. Repeat this step until there isn’t remained any two nodes in the related
configuration. Then arrange the remained nodes in the configuration based on the connecting
line slope among them and the node M From the little to big ones.
4) Repeat step 3 for the nodes located at the left half plate of node M.
5) Now connect the node M as star or radian shape to all nodes recognized as its neighbors. It is
clear that on each of this star, there exists only one node.
6) Sweep star lines in clockwise manner starting from the 12 o'clock site and make a triangle
with each consequent line until the polygon is completed around node M.
International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011
8
Repeat this process for all nodes. It is evident from the above process that after making a polygon
for one node , since other nodes polygons are expanded from its near , the triangle making process
will cover all inter nodes regions . They are shown in figure 7 and figure 8.
Figure 6. Results of the proposed algorithm of selecting the dimensional mesh structure nodes.
Figure7. Some samples of the results of the suggested Triangulation method for a complex of
selected nodes by star polygon method.
13. EXAMPLES AND EXPRIMENTATION
There are various methods for tracking that whichever are problems for example bubble tracking
method that eliminates the background by using a cost factor used in follow up applications. The
weakness of such method is in the separation process of the person from the background when
they have a same limiting the background and Kalman filer color cloth with the background [5].
International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011
9
Figure 8. Some samples of the results of the suggested Triangulation mesh method for a complex
of selected nodes and added nodes in image corners by star – polygon method
Tracking by: In this method, bubbles achieved after elimination process of the background are
used as signs for the object presence. The weakness of such method is that the linear Kalman filter
equations are assumed but it is not applicable in real time situation [6]. Two suggested method are
the principles of finding the object border based on the polygon making .This method prevents
objects to reside in regions causing occlusion after finding the object border and after its tracking
by the algorithm and uses the triangulation method for polygonal.
14. CONCLUSION
Object tracking is considered as one of the most important problem in image processing activities
and machine visual power. Tracking is regarded as monitoring the positional change of an object
and following it in continuous videos based on a special goal. Algorithm proposals are also
considered as the aspect of object tracking in situations such as light change, object occlusions,
lack of objects movements with a constant speed or in a direct line with enough reliability and are
at least applicable in real time applications.Algorithm proposals are also considered as the aspect
of object tracking in situations such as light change and object occlusions.Adaptive mesh
estimating method is a suitable tracking method that not only is able to recognize and track the
related object in continuous frames, but also can provide a reliable and efficient reaction against
the phenomena disturbing tracking process including performance efficiency in real-time
applications. In this article, an effective method called adaptive mesh estimating method is
introduced as a suitable tracking method in continuous frames and its preference and limitation is
discussed.
International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011
10
REFERENCE
[1] Gua, Z., Object detection and tracking in video, TR., Department of Computer Science, Kent
State University, 2001.
[2] Altunbasak, Y., “Occlusion- adaptive, content based mesh design and forward tracking”, IEEE
Trans.Image Process, Vol. 6, pp.1270-1280, 1997.
[3] Lucas, D. B., “An iterative image registration technique with an application to stereo vision”,
in Proc. DARPA Image Understanding Workshop, pp. 121-130, 1981.
[4] Horn, B., “Determining optical flow”, Artificial Intelligence Laboratory, Massachusetts
Institute of Technology, pp. 185-203, 1980.
[5] Owen J.,Hunter A.,Fletcher E., “A fast modelfree morphologybased object tracking”, In
proceeding of british machine vision conference,September,2002.
[6] Masoud O.,Papanikolopoulos N.P., “A novel method for tracking and counting pedestrians in
realtime using a single camera”,IEEE Transaction on Vehicular Technology,50:1267-
1278,2001
[7] Dabo Guo, Zhaoyang Lu and Xingxing Hu,“Content-Based Mesh Design and Occlusion
Adaptive GOP Structure”, IEEE Computer Society and International Conference on Digital
Image Processing,2009.
[8] Barron, J. L., Fleet, D. J. and Beauchemin, S. S., “Performance of Optical Flow Techniques”-
InternationalJournal of Computer Vision, vol. 12, no. 1, pp. 43-77, 1994.
[9] Bober, M. and Kittler, J., “Robust Motion Analysis”, Proceedings of IEEE Conference on
Computer Vision and Pattern Recognition, Seattle, WA, pp. 947-952, 1994.

More Related Content

PDF
3-D FFT Moving Object Signatures for Velocity Filtering
PDF
Removal of Transformation Errors by Quarterion In Multi View Image Registration
PDF
K-Means Clustering in Moving Objects Extraction with Selective Background
PPTX
motion and feature based person tracking in survillance videos
PDF
Fast Full Search for Block Matching Algorithms
PDF
3 video segmentation
PDF
A Comparison of Block-Matching Motion Estimation Algorithms
PDF
International Journal of Engineering Research and Development (IJERD)
3-D FFT Moving Object Signatures for Velocity Filtering
Removal of Transformation Errors by Quarterion In Multi View Image Registration
K-Means Clustering in Moving Objects Extraction with Selective Background
motion and feature based person tracking in survillance videos
Fast Full Search for Block Matching Algorithms
3 video segmentation
A Comparison of Block-Matching Motion Estimation Algorithms
International Journal of Engineering Research and Development (IJERD)

What's hot (19)

PPTX
Arp zmp
PPTX
Scrdet++ analysis
PDF
A Novel Approach for Moving Object Detection from Dynamic Background
PDF
Ay33292297
PPTX
PDF
Sub-windowed laser speckle image velocimetry by fast fourier transform techni...
PDF
Edge detection algorithm based on quantum superposition principle and photons...
PDF
Image confusion and diffusion based on multi-chaotic system and mix-column
PPTX
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
PDF
Object extraction using edge, motion and saliency information from videos
PDF
Final Poster
PDF
Moving object detection using background subtraction algorithm using simulink
PDF
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
PDF
A new block cipher for image encryption based on multi chaotic systems
PDF
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
PDF
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
PDF
I0343065072
PDF
Low complexity features for jpeg steganalysis using undecimated dct
PDF
An Efficient Algorithm for the Segmentation of Astronomical Images
Arp zmp
Scrdet++ analysis
A Novel Approach for Moving Object Detection from Dynamic Background
Ay33292297
Sub-windowed laser speckle image velocimetry by fast fourier transform techni...
Edge detection algorithm based on quantum superposition principle and photons...
Image confusion and diffusion based on multi-chaotic system and mix-column
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
Object extraction using edge, motion and saliency information from videos
Final Poster
Moving object detection using background subtraction algorithm using simulink
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A new block cipher for image encryption based on multi chaotic systems
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
I0343065072
Low complexity features for jpeg steganalysis using undecimated dct
An Efficient Algorithm for the Segmentation of Astronomical Images
Ad

Similar to AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING (20)

PDF
Threshold adaptation and XOR accumulation algorithm for objects detection
PDF
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
PDF
Geometric wavelet transform for optical flow estimation algorithm
PDF
A ROS IMPLEMENTATION OF THE MONO-SLAM ALGORITHM
PDF
E0333021025
PDF
Implementation and performance evaluation of
PDF
D018112429
PDF
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
PDF
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
PDF
Object Distance Detection using a Joint Transform Correlator
PDF
Expert system of single magnetic lens using JESS in Focused Ion Beam
PDF
3 video segmentation
PDF
Object Single Frame Using YOLO Model
PDF
A Novel Background Subtraction Algorithm for Dynamic Texture Scenes
PDF
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...
PDF
IRJET - Dehazing of Single Nighttime Haze Image using Superpixel Method
PDF
Garbage Classification Using Deep Learning Techniques
PPTX
New microsoft power point presentation
DOCX
Motion Object Detection Using BGS Technique
DOCX
Motion Object Detection Using BGS Technique
Threshold adaptation and XOR accumulation algorithm for objects detection
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...
Geometric wavelet transform for optical flow estimation algorithm
A ROS IMPLEMENTATION OF THE MONO-SLAM ALGORITHM
E0333021025
Implementation and performance evaluation of
D018112429
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
Object Distance Detection using a Joint Transform Correlator
Expert system of single magnetic lens using JESS in Focused Ion Beam
3 video segmentation
Object Single Frame Using YOLO Model
A Novel Background Subtraction Algorithm for Dynamic Texture Scenes
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...
IRJET - Dehazing of Single Nighttime Haze Image using Superpixel Method
Garbage Classification Using Deep Learning Techniques
New microsoft power point presentation
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
Ad

More from ijp2p (20)

PDF
12th International Conference on Computer Networks & Communications (CCNET 2025)
PDF
12th International Conference on Computer Networks & Communications (CCNET 2025)
PDF
12th International Conference on Computer Networks & Communications (CCNET 2025)
PDF
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
PDF
12th International Conference on Computer Networks & Communications (CCNET 2025)
PDF
International Journal of Peer to Peer Networks(IJp2p )
PDF
10th International Conference on Information Technology Converge Services (I...
PDF
2nd International Conference on Blockchain, Cybersecurity, and Internet of Th...
PDF
International Journal of Peer to Peer Networks(IJp2p )
PDF
International Journal of Peer to Peer Networks(IJp2p )
PDF
International Journal of Peer to Peer Networks(IJp2p )
DOCX
International Journal of Peer to Peer Networks(IJp2p )
PDF
2nd International Conference on Security & Applications (SECURA 2024)
PDF
International Journal of Peer to Peer Networks(IJp2p )
PDF
5th International Conference on Natural Language Computing Advances (NLCA 2024)
PDF
Renewable and Sustainable Energy : An International Journal (RSEJ)
PDF
International Journal of Peer to Peer Networks(IJp2p )
PDF
5th International Conference on Natural Language Computing Advances (NLCA 2024)
PDF
3rd International Conference on Software Engineering Advances and Formal Me...
PDF
10th International Conference on Networks, Mobile Communications and Telema...
12th International Conference on Computer Networks & Communications (CCNET 2025)
12th International Conference on Computer Networks & Communications (CCNET 2025)
12th International Conference on Computer Networks & Communications (CCNET 2025)
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
12th International Conference on Computer Networks & Communications (CCNET 2025)
International Journal of Peer to Peer Networks(IJp2p )
10th International Conference on Information Technology Converge Services (I...
2nd International Conference on Blockchain, Cybersecurity, and Internet of Th...
International Journal of Peer to Peer Networks(IJp2p )
International Journal of Peer to Peer Networks(IJp2p )
International Journal of Peer to Peer Networks(IJp2p )
International Journal of Peer to Peer Networks(IJp2p )
2nd International Conference on Security & Applications (SECURA 2024)
International Journal of Peer to Peer Networks(IJp2p )
5th International Conference on Natural Language Computing Advances (NLCA 2024)
Renewable and Sustainable Energy : An International Journal (RSEJ)
International Journal of Peer to Peer Networks(IJp2p )
5th International Conference on Natural Language Computing Advances (NLCA 2024)
3rd International Conference on Software Engineering Advances and Formal Me...
10th International Conference on Networks, Mobile Communications and Telema...

Recently uploaded (20)

PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
artificial intelligence overview of it and more
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
E -tech empowerment technologies PowerPoint
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Funds Management Learning Material for Beg
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Testing WebRTC applications at scale.pdf
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Introduction to the IoT system, how the IoT system works
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
artificial intelligence overview of it and more
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
SAP Ariba Sourcing PPT for learning material
Tenda Login Guide: Access Your Router in 5 Easy Steps
PptxGenJS_Demo_Chart_20250317130215833.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
presentation_pfe-universite-molay-seltan.pptx
E -tech empowerment technologies PowerPoint
RPKI Status Update, presented by Makito Lay at IDNOG 10
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
Funds Management Learning Material for Beg
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Slides PDF The World Game (s) Eco Economic Epochs.pdf
international classification of diseases ICD-10 review PPT.pptx
Testing WebRTC applications at scale.pdf
Cloud-Scale Log Monitoring _ Datadog.pdf
Introduction to the IoT system, how the IoT system works

AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING

  • 1. International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011 DOI : 10.5121/ijp2p.2011.2201 1 AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING Mahdi Koohi1 and Abbas Shakery2 1 Department of Computer Engineering, Islamic Azad University, Shahr-e-Qods Branch,Tehran,Iran m.kohy@yahoo.com 2 Department of Electronic Engineering, Azad University, SouthTehran Branch, Iran a.shakery@gmail.com ABSTRACT Object tracking is one of the most important problems in modern visual systems and researches are continuing their studies in this field. A suitable tracking method should not only be able to recognize and track the related object in continuous frames, but should also provide a reliable and efficient reaction against the phenomena disturbing tracking process including performance efficiency in real-time applications. In this article, an effective mesh-based method is introduced as a suitable tracking method in continuous frames. Also, its preference and limitation is discussed. KEYWORDS Tracking, Adaptive Mesh, Polygon Approximation. 1. INTRODUCTION Object tracking has been regarded as one of the most important problem, that could not be solved completely and researches are being continued in this field. A desirable tracking method should be able not only to diagnose and track referred object in consequent frame, but also should include considerable reliability and power along with implantable capability in real time practices. Nowadays a new idea regarding "mesh method" has been proposed as utilizing an adaptive mesh structure instead of a uniform mesh. In other words, instead of following a special complex of the nodes in each frame, in a distance between two consequent frames, nodes which should be followed in the later frame are selected adaptively. Such process will provide more power and reliability of tracking process against minor or major occlusions, appearing new objects in image, or exiting objects from the image [1], [2]. Although such idea is new and controversial in some aspects, it is evident that such method will complicate the tracking process. But, a perspective beyond this issue shows that such method may effectively defeat the above challenges. In this article, such a method is introduced in more details because of the lack of enough reference; algorithmic results have performed on artificial and some real images. 2. DISTURBING FACTORS OF TRACKING PROCESS Among the phenomena which disturb tracking process are listed as: 1) Lack of camera instability regarding to objects causing image magnification, minimization, or rotation. 2) Light change of image environment.
  • 2. International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011 2 3) Lack of object movement in a straight direction. 4) Lack of objects with constant speed. 5) Minimal or general occlusion of the related object with other objects. 3. ADAPTIVE MESH DESIGN Figure 1 shows an object moving in a static background. Figure. 1. Movement of two moving borders following an object movement. Assuming an ellipsoid object is transferring to the right side results in two moving borders .The border moving to the right is Background To Be Covered (BTBC) and Uncovered Background (UB) is the border moving to the left showing the background movement [2,7]. The structure of an adaptive mesh structure is defined as follows: 1) In current frame, no node should be put in BTBC area because these nodes will be occluded in the next frame and we cannot calculate any moving vector for them. 2) We may relate more than one moving vector to nodes which are put on objects borders, because they are set between two or several objects or between the object and common back ground. For example, if a node is located in the border of the object and the background, two moving vectors should be referred to it; one for modeling the object movement and another for modeling the background movement. 3) The structure of intra area mesh or UB areas in the next frame should be introduced for following up the new areas. For exact modeling of such areas with a mesh model, a complex of nodes should be set on their borders, and these nodes are concluded through polygon estimation. Because of the lack of enough attention of moving vectors around such nodes, BTBC and UB cannot be estimated exactly and a motion compensation method is used for compensating such estimation errors. First the changed area in the current frame is estimated by mesh designing algorithms, and the movement of frame K is compensated form frame K+1 by estimating the movement field. In this process, motion failure (MF) is estimated instead of UB area. The reason for this is to adopt mesh structure with new objects in the image. The MF area in next frame is estimated with a similar method of BTBC area finding method, from the frame differences as a function of parametric movement field storage and coding the colors or light intensity of this area as a data complex. Then, the mesh inside the MF area is reintroduced for following up such areas. MF area includes objects appearing currently and objects occluding previous objects followed in previous frames.
  • 3. International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011 3 4. MOVING FIELD ESTIMATION For estimating moving field density, methods on light share equations such as Lucas – Kanade [3] or Horn – Schunck [4] are used. Such methods create a smoother moving field than other methods such as block matching. In [8,9,10] many existing algorithms’speeds (computing optical flow for the diverging trees sequence) are compared and compiled in a tabular form. It is noteworthy that the crystallizing parameters and smoothing levels in such methods are important (if the movement field is over smoothed, following the movement on small regions will be impossible). 5. OPTICAL FLOW EQUATION The light share equation for each node assuming the constant light level of that node in a distance between two consequent frames is: 0= ∂ ∂ + ∂ ∂ + ∂ ∂ t E dt dy y E dt dx x E ⇒ 0= dt dE dt dx u = dt dy v = ⇒ 0=++ EvEuE tyx (1) Where E denotes the light intensity of node (x, y) and Ex, Ey, and Et are componential derivatives of light in the x and y directions based on the time in the related node. Situations which are used for light share calculations are related to the movement field structure and characters. One of these conditions is the smooth condition of the movement field which is implemented by minimization of the quadrant amount of the gradient of the "speed" elements: (2) 22       ∂ ∂ +      ∂ ∂ y u x u 22       ∂ ∂ +      ∂ ∂ y v x v Each of the above situations will provide a nonlinear equation. The light share equation is based on the constant level of the light in a node in a distance between two frames. But, any light intensity change may alert the light of a node. For considering noise effects or light change of an image and for preventing the loss of application of light share equation, such linear equation should be solved by making a system with two equation, one linear and one nonlinear. But, when all objects in a scene move together or objects are fixed and the camera is moving in a plate in parallel with its own image plate (without any limitation in the camera bending movement), then the light share equation will change to a constant optical flow, and only a quantity of U and V should be calculated for all nodes of the image and this is done by minimizing the total sum of optical flow:
  • 4. International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011 4 (3) 6. DEFINING BTBC REGION Region BTBC is referred to total intra frame pixels which are covered in the next frames and its borders are estimated by threshold displacement between two consequent frames. 7. ALGORITHMIC STEPS OF BTBC REGION The procedure is as follows: 1) Calculating the difference between two consequent frame and recognizing the changed region by processing methods as: a) Filtering by median filter (5×5). b) Three consequent implementations of morphologic closing (size 3×3) and then three consequent implementations of morphologic opening with the same size. c) Eliminating regions less than a defined size. 2) Estimating the movement field density from frame k to frame k+1. 3) Movement compensation of frame k of frame k+1 for virtual estimation of kI ~ by the density of the estimated movement field. 4) If the difference between Frame k showing with Ik (x,y) with the compensated frame K )],( ~ [ yxIK is more than a predefined threshold, then the pixel (x, y) is labeled as occluded pixel as: ),(),(),(),( 1 ~ yxyxyxyxDFD TII kk ⇒>−= (4) Thresholding may lead to a complex of little pixels eliminating the utilization of filtering and applying the morphological filtering and covering the little holes results in smooth and homogenous regions. The size of eliminated pixels or covered holes depends on the filter size. In Figure 2, the definition result of BTBC region is shown. In the first row a quadrant object is moving to the right side having occlusion in second frame and in the second position, the quadrant object moves to the right without occlusion in the second frame [2].
  • 5. International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011 5 Figure 2. Results of BTBC definition. 8. POLYGON APPROXIMATION The border of different regions during the adaptive tracking process should be modeled with limited number of nodes in the related region. Such model should provide the closest approximation with near regional position. The most common models are among polygons and B- Spline models. Polygon approximation is used in adaptive mesh tracking process because of its simple structure. Figure 3. Polygon algorithm. 9. POLYGON ALGORITHM STEPS This algorithm includes the following steps: 1) Define all pixels located on the related region border. 2) Find a pair of pixel among them with maximum distance with each other and label them by 1 and 2. The connecting line between them is called the "main axis".
  • 6. International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011 6 3) Find two nodes with highest vertical distance with the main axis in two sides of the axis as 3 and 4. These four nodes are called "initial vertices". Vertices 3 and 4 should be in two opposite directions of the main axis. 4) Draw a straight line between two vertices (such as 1-3 in Figure 3). 5) Repeat step 4 for 3 other parts. The above nodes are used as the building nodes for a two-dimensional structure. Such polygon algorithm is based on converge regions and also approximates concave region as converge positions; which is enough for mesh structure. Such algorithm may be expanded for more than 128 nodes. Figure 4 shows the circle that is designed for 4 and 15 nodes. Figure 4. Results of polygon approximation. 10. SELECTING NODES FOR DIMENSIONAL MESH STRUCTURE HIERARCHICAL MESH Such tracking process is as an effective algorithm for designing two-dimensional mesh as a concept-based manner. It includes a non smooth selection process of a complex of nodes followed by a triangle creating process on selected nodes. The basic principle is to select nodes in such a way that mesh cells borders are adopted with the object borders and the density of nodes is suitable with local activity level. Figure 5 shows the flow chart of the selection of mesh structure nodes and Figure 6 shows the final results. The above method needs a high level of calculation and in this reason it is not performed with a significant speed. Another limitation of this method arises from the lack of occlusion by this method on all inter nodal areas meaning that we cannot prove such method may make an occlusion on all intermodal regions by triangle cells. It is also practically observed that, in spite of complete performance of the process, some position of inter nodal regions, may remain without triangle occlusion.
  • 7. International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011 7 Figure 5. Flowchart of selecting two dimensional mesh structure nodes. Such limitation caused that a suggested method of simple and fast triangulation method is studied. The strong point of such suggested the method in comparison with the previous method is that we can prove such method will surely make occlusion on all inter nodal regions. Such algorithm uses a method called polygon star making. 12. STEPS OF THE SUGGESTED ALGORITHM The following steps are suggested in this star polygon algorithm: 1) Consider M node. Find a neighbor with distance which is located exactly on the top of M node. 2) Find another neighbor with lowest distance located exactly under the M node. 3) Consider a circle with M center. Store all nodes located in the right half plate of node M in one configuration .Review all nodes. If two or several nodes are located on one equal radian, the node with lowest distance with M should be conserved and other nodes on that radian should be eliminated. Repeat this step until there isn’t remained any two nodes in the related configuration. Then arrange the remained nodes in the configuration based on the connecting line slope among them and the node M From the little to big ones. 4) Repeat step 3 for the nodes located at the left half plate of node M. 5) Now connect the node M as star or radian shape to all nodes recognized as its neighbors. It is clear that on each of this star, there exists only one node. 6) Sweep star lines in clockwise manner starting from the 12 o'clock site and make a triangle with each consequent line until the polygon is completed around node M.
  • 8. International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011 8 Repeat this process for all nodes. It is evident from the above process that after making a polygon for one node , since other nodes polygons are expanded from its near , the triangle making process will cover all inter nodes regions . They are shown in figure 7 and figure 8. Figure 6. Results of the proposed algorithm of selecting the dimensional mesh structure nodes. Figure7. Some samples of the results of the suggested Triangulation method for a complex of selected nodes by star polygon method. 13. EXAMPLES AND EXPRIMENTATION There are various methods for tracking that whichever are problems for example bubble tracking method that eliminates the background by using a cost factor used in follow up applications. The weakness of such method is in the separation process of the person from the background when they have a same limiting the background and Kalman filer color cloth with the background [5].
  • 9. International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011 9 Figure 8. Some samples of the results of the suggested Triangulation mesh method for a complex of selected nodes and added nodes in image corners by star – polygon method Tracking by: In this method, bubbles achieved after elimination process of the background are used as signs for the object presence. The weakness of such method is that the linear Kalman filter equations are assumed but it is not applicable in real time situation [6]. Two suggested method are the principles of finding the object border based on the polygon making .This method prevents objects to reside in regions causing occlusion after finding the object border and after its tracking by the algorithm and uses the triangulation method for polygonal. 14. CONCLUSION Object tracking is considered as one of the most important problem in image processing activities and machine visual power. Tracking is regarded as monitoring the positional change of an object and following it in continuous videos based on a special goal. Algorithm proposals are also considered as the aspect of object tracking in situations such as light change, object occlusions, lack of objects movements with a constant speed or in a direct line with enough reliability and are at least applicable in real time applications.Algorithm proposals are also considered as the aspect of object tracking in situations such as light change and object occlusions.Adaptive mesh estimating method is a suitable tracking method that not only is able to recognize and track the related object in continuous frames, but also can provide a reliable and efficient reaction against the phenomena disturbing tracking process including performance efficiency in real-time applications. In this article, an effective method called adaptive mesh estimating method is introduced as a suitable tracking method in continuous frames and its preference and limitation is discussed.
  • 10. International Journal of Peer to Peer Networks (IJP2P) Vol.2, No.2, April 2011 10 REFERENCE [1] Gua, Z., Object detection and tracking in video, TR., Department of Computer Science, Kent State University, 2001. [2] Altunbasak, Y., “Occlusion- adaptive, content based mesh design and forward tracking”, IEEE Trans.Image Process, Vol. 6, pp.1270-1280, 1997. [3] Lucas, D. B., “An iterative image registration technique with an application to stereo vision”, in Proc. DARPA Image Understanding Workshop, pp. 121-130, 1981. [4] Horn, B., “Determining optical flow”, Artificial Intelligence Laboratory, Massachusetts Institute of Technology, pp. 185-203, 1980. [5] Owen J.,Hunter A.,Fletcher E., “A fast modelfree morphologybased object tracking”, In proceeding of british machine vision conference,September,2002. [6] Masoud O.,Papanikolopoulos N.P., “A novel method for tracking and counting pedestrians in realtime using a single camera”,IEEE Transaction on Vehicular Technology,50:1267- 1278,2001 [7] Dabo Guo, Zhaoyang Lu and Xingxing Hu,“Content-Based Mesh Design and Occlusion Adaptive GOP Structure”, IEEE Computer Society and International Conference on Digital Image Processing,2009. [8] Barron, J. L., Fleet, D. J. and Beauchemin, S. S., “Performance of Optical Flow Techniques”- InternationalJournal of Computer Vision, vol. 12, no. 1, pp. 43-77, 1994. [9] Bober, M. and Kittler, J., “Robust Motion Analysis”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Seattle, WA, pp. 947-952, 1994.