Performance analysis of length estimators for vertex chain code

Oldooz Dianat*, Habibollah Haron

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

    Abstract

    Most of the applications in image analysis are based on Freeman chain code. In this paper, the vertex chain code (VCC) proposed by Bribiesca is applied for estimating the length of the digitized 2D curve. The chain code has some preferences such as stable in shifting, turning, mirroring movement of image, and has normalized starting point. Due to the variety of length estimator methods, we focus on the three specific techniques. First is the way Bribiesca proposed which is based on counting links between vertices, second is based on maximum length digital straight segments (DSSs), and the last is local metrics. We then compare the result of these length estimators with the real perimeter. It is for the first that VCC is implemented in estimating the length of the digitized curve. The result shows that the estimation by applying VCC is near to the real length.

    Original languageEnglish
    Title of host publication5th International Conference on Information Technology and Applications, ICITA 2008
    Pages45-48
    Number of pages4
    Publication statusPublished - 2008
    Event5th International Conference on Information Technology and Applications, ICITA 2008 - Cairns, QLD, Australia
    Duration: 23 Jun 200826 Jun 2008

    Other

    Other5th International Conference on Information Technology and Applications, ICITA 2008
    CountryAustralia
    CityCairns, QLD
    Period23/06/0826/06/08

    Keywords

    • 2D Curve
    • Digitization
    • Length estimator
    • Vertex chain code

    Fingerprint Dive into the research topics of 'Performance analysis of length estimators for vertex chain code'. Together they form a unique fingerprint.

  • Cite this

    Dianat, O., & Haron, H. (2008). Performance analysis of length estimators for vertex chain code. In 5th International Conference on Information Technology and Applications, ICITA 2008 (pp. 45-48)