Texture feature based interaction maps: potential and limits
Motivated by the discovery of the high level texture features responsible for perceptual grouping of textures  and the development of the Markov-Gibbs texture model with pairwise pixel interactions , we have recently proposed the method of feature based interaction maps (FBIM) and applied this new tool to the problem of pattern orientation  and rotation-invariant texture classification . Experimental results have demonstrated that the FBIM approach can be used to recover the basic structural properties and orientation of a wide range of patterns, including weak structures.
KeywordsDocument Image Pattern Orientation High Angular Resolution Texture Object Handwritten Word
Unable to display preview. Download preview PDF.
- D. Chetverikov. Textural anisotropy features for texture analysis. In Proc. IEEE Conf. on Patt. Rec. and Image Processing, pages 583–588, 1981.Google Scholar
- D. Chetverikov. Experiments in the rotation-invariant texture discrimination using anisotropy features. In Proc. International Conf. on Pattern Recognition, pages 1071–1073, 1982.Google Scholar
- D. Chetverikov. GLDH based analysis of texture anisotropy and symmetry: an experimental study. In Proc. International Conf. on Pattern Recognition, pages 444–448. Vol. I, 1994.Google Scholar
- D. Chetverikov. Pattern orientation and texture symmetry. In Computer Analysis of Images and Patterns, pages 222–229. Springer Lecture Notes in Computer Science vol. 970, 1995.Google Scholar
- D. Chetverikov. Texture feature based interaction maps and structural filtering. In Proc. 20th Workshop of the Austrian Pattern Recognition Group, pages 143–157. Oldenbourg Verlag, 1996.Google Scholar
- D. Chetverikov and R.M. Haralick. Texture anisotropy, symmetry, regularity: Recovering structure from interaction maps. In Proc. British Machine Vision Conference, pages 57–66, 1995.Google Scholar
- B.J. Schachter, A. Rosenfeld, and L.S. Davis. Random mosaics models for textures. IEEE Trans. Systems, Man, and Cybernetics, 8: 694–702, 1979.Google Scholar