<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>New Method of Boundary Points Accuracy for Objects Recognition</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tatyana Ts. Damdinova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>East-Siberia State University of Technology and Management</institution>
          ,
          <addr-line>40 V, Kluchevskaya ul, Ulan-Ude, 670013</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>33</fpage>
      <lpage>39</lpage>
      <abstract>
        <p>Nowadays digital video and image are made with very high speed. The computing power of modern computers allows the development of new methods to automate the data analysis process. The speed of useful information extracting from this digital data are very important. A review of the papers of recent years shows that the methods and means for obtaining and processing of digital image continue to develop. The article deals with the problem of image processing for analyzing video data. High-resolution videocamera increases the number of contour points and re-assigning points with curves or array of points with given permission variable (accuracy) significantly reduces time of processing. A method for the obtaining of boundary points with a given accuracy to select objects with different levels of detailing is proposed.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In information security to organize technical protection against unauthorized access as one of the
key sources video stream data is used. Successful prevention of unauthorized access depends on the
analysis of data. The level of automation of video processing in real time is important. Many scientific
works of recent years are devoted to this topic, aimed at improving the quality of receiving, analyzing
and recognizing of video information. Quality of recognition depends on the speed of processing and
presentation of data, which mainly rely on data about the shape of the suspicious objects.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Image processing in the field of information security</title>
      <p>Technical security includes the installation of video cameras. The processing of data received from
security cameras for searching and recognizing objects remains an important topic, this is a subject of
many works of the last period (e.g. [1-3]). Automation of this task allows to promptly extracting
information about suspicious objects, their actions and anomalous behavior.</p>
      <p>In addition to ordinary video cameras, data from cameras of unmanned aerial vehicles, 3D scanners,
X-ray scanners, terahertz security cameras that are safer for human health, thermal imagers, etc. are
used. [4-7]. In all these video systems, along with the mode of manual search and detection of dangerous
objects, automated data processing in real time is used. The most effective methods for automating
detection and recognition are used in field of artificial intelligence with a neural network [8 - 10].</p>
      <p>Object recognition in the automation of video data processing is based usually on the analysis of
contours; there are a large number of methods for identifying boundary points of objects. In this case,
it is necessary to take into account the influence of interference during image formation and at the stage
of preprocessing and to remove the arisen hardware noise and aberrations [2, 13-15]. Due to the modern
calculating power of computers, the developed methods show high accuracy and reliability of the
intelligent systems.</p>
      <p>One of the key factors for the qualitative object detecting is the determination of such characteristics
of the object as shape, texture, description of the contour and other geometric characteristics of the
object. It is especially important to automate the process of accurate contour obtaining. To do this it is
possible to vary the value of the permissible variation (accuracy) for extracting boundaries while
receiving data on an object. The accuracy is a distance between source and approximate values of
boundary points and provides required accuracy. Changing the value of the contour accuracy at different
stages increases speed of the image search and analysis process. When a suspicious object is detected,
the accuracy value is reduced for more detailed and accurate information extraction.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Edges description</title>
      <p>As one of the most important parts of object recognition segmentation and edges detection, accurate
contour description methods are still developed [16 - 26]. There are many different methods to get
information on contour points of object in problems of object recognition. One of the most popular of
them is curve fitting on the base of boundary points using approximation or interpolation methods. The
curve fitting by approximation method when some points must belong to curve or have to be smooth in
some of them are presented in [27-29].</p>
      <p>Usage of high-resolution camera by one side increases image quality and by another side gives big
array of points for processing. Curves fitting and substitution of boundary points array with other points
allows reducing time of processing, increases speed of object’s recognition. Therefore, the method of
boundary point’s chain determination has been worked out. In this method of geometrical modeling of
object boundary, the array of source points substitutes with a set of points, which provides required
accuracy on object for further processing.</p>
      <p>After obtaining boundary points, we can get more information on the object’s features such as area,
perimeter, etc. One of the main advantages of it is curve’s smoothness. Making approximation of the
object’s boundary with circular arc gives dataset on curvature values for reference objects. Curvature
is a constant characteristic, which does not, depends on the object’s location, or rotation and other
transformations, therefore may be used in recognition problem. The contours of recognizing and
reference objects are compared on their curvature.</p>
      <p>In [27, 28] the method to substitute the boundary of an object with segments of polynomials – a
composite curve – was described. The fitting curve is formed according to requirement of first degree
of smoothness, so this approves obtaining of first derivation in each point. A computational experiments
show that reduction of information of source points was approximately 45 times less. This method
allows to obtain the value of curvature what is invariant to rotation, scale and useful to recognize
partially visible objects. Curvature values are used to measure similarities of shape of recognized object
and reference object.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Boundary points substitution</title>
      <p>In some cases, it is necessary to get reduced array of boundary points. The problem of curve
reassigning with circular arcs also as reassigning with straight-line segments is a task that is relevant
for many computer-aided design and recognition systems. New array of points will reduce noises or not
important parts on image. However, the new points array may have deviation from source points within
given permissible variation – given accuracy ε that is different and depends on tolerance of solving
problem or applied field.</p>
      <p>To solve this problem the method of boundary points’ substitution has been worked out. This task
is implemented during describing array of points as chain of curves [27] and algorithm is presented
below. As a result of previous step we have curve g(x) and the value of given accuracy ε. New points
are defined on arcs of tangent circumference between two offset (equidistant) curves [30-35] on offset
distance of given accuracy ε – tube of tolerance.</p>
      <p>The proposed method is based on a technique that allows finding a conjugate arcs one of the offset
curve and a normal line at a given point. Below the solution of this problem is consider and then
propose a technique for redefining the source points with a points on circular arcs is described.</p>
      <p>The algorithm of this technique is shown on figure 1.
4.1.</p>
    </sec>
    <sec id="sec-5">
      <title>Define the first arc of chain</title>
      <p>1. Determine two equidistant curves g1(x) and g2(x) laying above and below from the source curve
using distance ε (Figure.2) on normal to points of curve g(x). Normal passes through the point
perpendicular to the curve tangent at this point.
2. Define circumference passing through the starting point on g(x) and having tangents to
equidistant curves g1(x) and g2(x). Of all defined tangent circumference, the circumference with
maximal radius or maximal distance from the starting point is selected. For example, on the figure 2
between two green points of the new array are 8 black boundary points of source curve. So
information on this section is reduces 4 times keeping necessary accuracy of the given permissible
variation ε.
4.2.</p>
      <p>Define remaining arcs of the chain
3. Calculate the angle of inclination of the tangent t at the point of tangency to the previous circular
arc on the equidistant curve.
4. The next circumference is selected from the bundle of circumference (Figure 2) passing through
the tangent point of the previous circumference. Centers of bundle circumference are on the normal
n. If several circumference of the bundle are satisfied to the conditions of step 2, and then the
circumference of bundle of the largest radius is selected. On figure 2 the arc of maximal radius of
circumference bundle is inside of the tube of tolerance. So, between the start and the end points of
this arc are six points of source boundary array which are substituted with one new point.
5. Add tangent point to the new array of substitution points and define next arc of tangent
circumference..</p>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusion</title>
      <p>The method of creation of new array of boundary points allows getting information on objects with
different values of given accuracy and decreases time of digital images processing. Moreover, the
implementation of the method of boundary points’ substitution allows changing of fitting curves by
chains of circular arcs with the first degree of smoothness in tube of tolerance and gives dataset on
curvature values. The computational experiments shows that the described algorithm provides high
speed of processing of array of boundary points of objects and reduces array of source points about
20-25 times on curves with complex shape.</p>
    </sec>
    <sec id="sec-7">
      <title>6. References</title>
      <p>[1] Makarov M.A., Berestneva O.G., Andreev S.Yu. Reshenie zadachi opisaniya i klassifikacii
konturov dvizhushchihsya ob"ektov na video. Bulletin of the Tomsk Polytechnic University.</p>
      <p>Information Technology.Vol. 325. No. 5 (2004) 77–83. (In Russ).
[2] Markov A.S. Technical protection of information. M. AISNT. 2020. 234 p. (In Russ).
[23] Novikov A.I., Sablina V.A., Goryachev E.O. Primenenie konturnogo analiza dlya sovmeshcheniya
izobrazhenij. Bulletin of TulSU. Technical science (2013) Issue 9 Part 1 260-269
[24] Tsapko I.V., Vlasov A.V. Vydelenie ob"ektov na izobrazheniyah metodom poiska granic
regionov. Automation. Modern technologies. 2015. No. 9 33-38
[25] Kurlin V. (2015) A Homologically Persistent Skeleton is a Fast and Robust Descriptor of Interest
Points in 2D Images. In: Azzopardi G., Petkov N. (eds) Computer Analysis of Images and Patterns.
CAIP 2015. Lecture Notes in Computer Science, vol 9256. Springer, Cham. DOI:
10.1007/978-3319-23192-1_51
[26] V. Kurlin, G. Muszynski. A persistence-based approach to automatic detection of line segments in
images. Proceedings of CTIC 2019 (Computational Topology in Image Context)
Lecture Notes in Computer Science, v. 11382 (2019), p. 137-150.
[27] Damdinova T.C., Bubeev I.T., Motoshkin P.V. Metod modlirovaniya krivoj pervogo poryaka
gladkosti. Software systems and computational methods. 2019 Issue 17. 12-17
[28] Damdinova T, Bazaron S, Abatnin A. Image Processing in Information Security. CEUR Workshop</p>
      <p>Proceedings, 2020, Vol-2603. pp. 16-19.
[29] S A Bazaron, T Ts Damdinova and E B Bochektueva. Determination of the geometric
characteristics of fatigue cracks by digital image processing method. // IOP Conf. Series: Materials
Science and Engineering 684 (2019) 012022.
[30] Farouki, R.T., Srinathu, J. Feedrate modulation for accurate traversal of trimmed planar offset
paths. Int J Adv Manuf Technol 97, 3325–3337 (2018). DOI: 10.1007/s00170-018-2137-0.
[31] Alderson, T.F., Mahdavi-Amiri, A., &amp; Samavati, F. (2018). Offsetting spherical curves in vector
and raster form. The Visual Computer, 34, 973-984. https://doi.org/10.1007/s00371-018-1525-7
[32] Zhiwei L, Jianzhong F and Wenfeng G 2013 A robust 2D point-sequence curve offset algorithm
with multiple islands for contour-parallel tool path Comp.-Aided Des. 45 3 pp 657–670
[33] Myasoedova T. M., Panchuk K. L. Analysis and trimming operations in the problem of spatial
formation of a family of offset curves given an area with islands //Journal of Physics: Conference
Series. – IOP Publishing, 2020. – Т. 1441. – №. 1. – С. 012069.
[34] Myasoedova T. M., Panchuk K. L. Geometric model of generation of family of contour-parallel
trajectories (equidistant family) of a machine tool //Journal of Physics: Conference Series. – IOP
Publishing, 2019. – Т. 1210. – №. 1. – С. 012104.
[35] Xu, K., Li, Y., Xiang, B.: Image processing-based contour parallel tool path optimization for
arbitrary pocket shape. Int. J. Adv. Manuf. Technol. 102, 1091–1105 (2018).
https://doi.org/10.1007/s00170-018-3016-4</p>
    </sec>
  </body>
  <back>
    <ref-list />
  </back>
</article>