Beruflich Dokumente
Kultur Dokumente
adjustment depends only on the image undergo- are briefly explained in the following paragraphs. After image preprocess-
ing testing. Moreover, SCT techniques are sensi- Earlier detection methods rely on edge segmen-
tive to lighting conditions, especially those tation followed by linking to obtain a contour ing, shape detection is
occurring on sunny days. representation, from which various parameters
such as perimeter and center are extracted. For
performed. This is begun
Segmentation Based on Color Learning (SCL) — The instance, the authors in [7] apply the Laplacian by extracting feature
disadvantages of SCT techniques can be alleviat- filter to the input image to extract outlines and
ed by using a well-known machine learning tech- edges. Although the application of these tech- representations of
niques such as the support vector machine niques is simple, they produce several ROIs, images for the genera-
(SVM); this provides some improvements over which burden the subsequent stages.
SCT methods [4]. An algorithm based on SVMs The purpose of HT, the second technique, is tion of maps with fea-
was presented in [4] to classify pixels using color to isolate features of a particular shape by a vot-
information. Samples of the targeted color ing procedure. The classic HT technique is con-
tures, after which ROIs
required for detection and some other colors cerned with the identification of regular curves that possibly contain
from training images were labeled and used to such as ellipses. The HT is later extended into a
train the SVM. A lookup table (LUT), in which generalized HT technique to deal with more signs are processed in
the less significant bits were reduced, was used complex shapes. The HT technique is commonly the next stages.
to improve speed; this nevertheless also main- used to detect the shape of signs. For instance,
tained quality. The authors show that segmenta- the authors in [8] combine HT with an iterative
tion based on SVM yields comparatively better process of median filtering and dilation to refine
results than some SCT segmentation methods. the sign candidate set. However, the HT tech-
Neural networks (NNs) are also used to seg- nique remains computationally expensive, espe-
ment images based on their colors. In fact, in [6] cially for large images.
NNs are used in color training to recognize The third technique, FRS, is a variant of the
signs. The basic idea is to segment the input circular HT technique. It was extended to traffic
image by using an NN in eight colors. The ROIs sign application for the yielding of a regular
are then analyzed by a second NN to determine polygon detector in [9]. This method is based on
if their shape corresponds to a TS. Unfortunate- the symmetric nature of sign shapes and the pat-
ly, NNs are slow, especially in the training phase. tern of edge orientations exhibited by equiangu-
Of the SCT and SCL methods used for detec- lar polygons. Compared to HT, this technique is
tion, SVM outperforms SCT methods. Com- fast enough to produce robust systems. As it
pared to NNs, which have multiple solutions detects shapes based on edges, the algorithm is
associated with the local minima, the advantage robust to illumination changes. However, this
of SVM is that it provides a unique solution method may fail when many edges are present in
since the optimality problem is convex [4]. How- images. For the non-frontal viewing of signs, the
ever, the main problem of this technique is its correspondent image is usually transformed
speed, which can be alleviated using the LUT through an accurate transformation (e.g., rota-
proposed in [4]. tion) before detection if the orientation of the
sign is a priori known; otherwise, the detection
DETECTION THROUGH SHAPE fails.
Besides color, shape can be effectively used to A comparative study between different seg-
detect signs, especially when color-based tech- mentation techniques is presented in [4]; in this
niques fail (e.g., changes in illumination). After work, it is pointed out that edge detection meth-
image preprocessing, shape detection is per- ods are not the most appropriate, except when
formed. This is begun by extracting feature rep- applied to achromatic decomposition (white
resentations of images for the generation of color).
maps with features, after which ROIs that possi-
bly contain signs are processed in the next stages. Shape Extraction through Gradient Features — Colors,
From the literature reviewed, image features are edges, or corners are perceivable features usual-
divided into two categories: local features such ly extracted via image filtering or using learning
as edges, and global features such as histograms techniques. Recently, gradient information
of oriented gradients (HOGs) [10]. The choice (directions and magnitudes) have been success-
of features is often coupled with the detection fully used to extract signs. This includes, among
method. Edges are found using some classical other features, HOG [10]. Unlike the HT tech-
edge detection techniques, such as the Canny fil- nique, this approach does not require prior
ter [4]; these techniques are usually followed by knowledge of the target.
edge linking techniques (e.g., Hough Transform, The HOG detector, proposed initially for
HT, matching) or distance transform matching pedestrian detection, starts by dividing the image
for the detection of TS. HOGs are found by cre- into a set of overlapping blocks. Each block is
ating histograms of gradients on images. then divided into non-overlapping cells, and for
Shape is usually extracted by using perceiv- each cell a histogram of the gradient orienta-
able features (e.g., edges), gradient features tions is performed. HOG has been successfully
(e.g., HOG), and template matching (TM); it applied to detect signs in several works (e.g.,
may also extracted using machine learning based [16]). Different sizes of blocks, cells, and strides
techniques. of the HOG descriptor are used in [15] to evalu-
ate the performance of the classification stage. It
Shape Extraction through Edge Features — Most of the is reported that cells and blocks of small sizes
shape detectors are based on two edge detec- achieve higher recall and precision rates. This is
tion/linking techniques: the HT and Fast Radial due to the finer spatial binning of the gradient
Symmetry (FRS) algorithms. These techniques orientations. HOG has proven its efficiency over
HOG detector, proposed other algorithms because of the following desir- After ROI detection, object localization is
able properties: invariance to scale, local con- performed. This is accomplished by using some
initially for pedestrian trast normalization, coarse spatial sampling, and methods like simple circle fitting operation on
fine weighted gradient orientations [15]. circular signs or the bounded area space tech-
detection, starts by nique. With the first technique, once the center
dividing the image into Shape Extraction through Template Matching — Shape of the ROI is localized, the sign is cropped and
can also be extracted by using TM techniques. cross-correlation template matching is applied to
a set of overlapping TM concerns the process of matching a template find the best match in the sign database. With
blocks. Each block is to an image in the database. TM algorithms are the bounded area space technique, small objects
used to search through training samples and (e.g., red traffic lights) or large objects (e.g., red
then divided into non- determine the nearest neighbor of the test sam- cars) are excluded. For instance, the authors in
ple. However, the application of the TM [5] use a limited area with a size that varies
overlapping cells, and approach is unsuitable for real-time systems; the between 200 and 5000 pixels.
for each cell a histogram reason for this is that the technique in question Given the large number of papers found in the
requires many cross-correlation computations literature on detection systems, it is difficult to
of the gradient orienta- between the template and the ROIs for sign select one method among many as the best
tions is performed. HOG detection. option. Nevertheless, gradient feature-based algo-
TM using distance transform (DT) is widely rithms are obviously gaining comparative popular-
has been successfully employed for shape detection. DT represents the ity over other approaches, due to some desirable
distance of each pixel to the nearest edge in the properties such as scale invariance, local contrast
applied to detect signs corresponding image edge. After edge detection, normalization, coarse spatial sampling, and fine
in several works. a DT image is built. To find the shape of inter- weighted gradient orientations [15]. Further
est, a template is matched (e.g., a regular circle) research is needed to improve the quality of
against the DT image. Color-based DT was detection by reducing the number of features and
recently introduced in [11], where a DT was sep- hence speeding up the whole process.
arately computed for every color channel. It is
shown that shape detection through TM offers a TRACKING TECHNIQUES
more suitable description of signs and entails
easy training. However, it is sensitive to occlu- The most evolved TSDR systems use a tracking
sions and rotations. The main advantage of using stage to monitor signs over time. Compared to
TM is that it can be easily modified to recognize individual frame-based systems, this stage has
other objects. This approach is applicable to several advantages, which include the following
both detection and recognition stages. attributes: the reduction of false detections over
time, increasing the robustness of the whole sys-
Shape Extraction through Machine Learning Techniques — tem, and the prediction of future sign positions
Machine learning techniques are used success- in the image; this enables the reduction of the
fully to extract shapes. NNs and SVMs are usu- search space and supplying of the detection
ally used for sign detection due to their efficiency stage with updated candidates. The most com-
in detecting shapes. For instance, two NNs are mon trackers used in TSDR systems are the
trained to extract the shape and color features of Kalman filter (KF), which is discussed, for
signs in [2]. This approach is accurate but com- instance, in [2], and the particle filter (PF) elab-
putationally very expensive. However, the addi- orated on in [3]. The KF is often used for linear
tion of signs to the NN implies a new training of systems, while the PF is more robust in its appli-
the network and the manual selection of the cation for multimodal and nonlinear systems.
training samples. The investigation of SVM for The KF is used to produce a statistically opti-
shape detection is illustrated in [12], where the mal estimate of the position and scale of the sign
system contains three phases: color segmenta- in consecutive frames of an input video. Conse-
tion, shape extraction using linear SVMs, and quently, sign trackers based on the KF usually
recognition based on Gaussian-kernel SVMs. assume a uniform and constant direction motion
The suggested method is invariant to rotation, for the vehicle with a priori known velocity and
scale, and translation, and to partial occlusions. traffic sign size. An example of the adoption of
the KF tracker in the TSDR system is found in
HYBRID METHODS [2]. The same assumptions are used by the afore-
Many detection approaches follow a two-step mentioned authors; that is, the vehicle moves in
sequential strategy. That is, color or shape a straight line and exposed to a constant slope
thresholding segmentation is first performed on while maintaining an approximately constant
the input image to yield some ROIs. This step is speed. Based on these assumptions, they esti-
immediately followed by the sign detection stage mated sign position and velocity in 3D space.
applied on the generated ROIs. Unfortunately, The nonlinearity of the resulting measurement
ROIs that have been inaccurately rejected dur- model was eliminated by adopting the extended
ing segmentation cannot be recovered for fur- KF [2]. The following three limitations of the
ther processing in the detection and recognition system in [2] were identified: unrealistic assump-
stages. In this context, a parallel (joint) process- tions related to the real size of signs; the con-
ing of color and shape has thus been introduced stant speed of vehicles, which have to be known
to overcome this drawback. For instance, the a priori; and the assumption that trajectories are
authors in [2] have built a feature map of the straight.
input image based on the color and model shape In general, the PF is also widely used in
of signs. It is observed that the false rejection object tracking. Very few research works using
ratio is significantly lowered in comparison to the PF to detect signs have been found. Recent-
non-hybrid methods. ly, the authors of [3] used the sequential impor-
To the best of our driver notifies other drivers located within its [8] W.-J. Kuo and C.-C. Lin, “Two-Stage Road Sign Detec-
tion and Recognition,” 2007 IEEE Int’l. Conf. Multime-
transmission range. The communication system
knowledge, recognition of vehicles ensures that data packets are reliably
dia and Expo, 2007, pp. 1427–30.
[9] G. Loy, “Fast Shape-Based Road Sign Detection for a
sent to all vehicles, and hence allows drivers to
and transmission sys- make appropriate decisions.
Driver Assistance System,” IEEE/RSJ Int’l. Conf. Intelli-
gent Robots and Systems (IROS, 2004), pp. 70–75.
tems of signs do not Regarding the communication aspect of [10] N. Dalal and B. Triggs, “Histograms of Oriented Gradients
for Human Detection,” CVPR, vol. 1, 2005, pp. 886–89.
TSDR, inter-vehicle communication is particu-
exist. We expect that larly challenging due to the high rate of vehicle
[11] A. Ruta, Y. Li, and X. Liu, “Real-Time Traffic Sign
Recognition from Video by Class-Specific Discriminative
the new generation of mobility and signal-weakening obstructions, such Features,” Pattern Recognition, vol. 43, no. 1, 2010,
pp. 416–30.
as buildings. To the best of our knowledge,
vehicles will be recognition and transmission systems of signs do
[12] P. Gil-Jiménez, H. Gómez-Moreno, and F. López-Fer-
reras, “Road-Sign Detection and Recognition based on
not exist. We expect that the new generation of
equipped with on-board vehicles will be equipped with onboard units
Support Vector Machines,” S. Maldonado-Bascón, S.
Lafuente-Arroyo, IEEE Trans. Intelligent Transportation
units based on the stan- based on the standard IEEE 802.11p interfaces Systems, 2007.
[13] T. Mangel, O. Klemp, and H. Hartenstein, “5.9 GHz
and antennas that work on a frequency band
dard IEEE 802.11p ranging from 5.8 to 5.9 GHz [13].
Inter-Vehicle Communication at Intersections: A Vali-
dated Non-Line-of-Sight Path-Loss and Fading Model,”
interfaces and antennas EURASIP J. Wireless Comm. and Networking 2011,
papers in these areas. He served as a Guest Editor for the Time Application (DS-RT), Program Chair for the ACM
Journal of Parallel and Distributed Computing Special Workshop on QoS and Security for Wireless and Mobile
Issues on Routing for Mobile Ad Hoc, Wireless Communica- Networks, ACM/IFIPS Europar 2002 Conference, IEEE/SCS
tion and Mobile Computing, and Mobile Ad Hoc Network- Annual Simulation Symposium (ANNS 2002), ACM WWW
ing and Computing, ACM/Kluwer Wireless Networks, 2002, IEEE MWCN 2002, IEEE/ACM MASCOTS 2002, IEEE
ACM/Kluwer Mobile Networks Applications, and Journal of Wireless Local Networks WLN 03-04, IEEE WMAN 04-05,
Wireless Communication and Mobile Computing. He serves and ACM MSWiM 98-99, and a TPC member of numerous
as an Associate Editor of IEEE Transactions on Parallel and IEEE and ACM-sponsored conferences. He served as Vice
Distributed Systems, IEEE Transactions on Vehicular Tech- General Chair for the Third IEEE Distributed Computing for
nology, Elsevier Ad Hoc Networks, Wiley International Jour- Sensor Networks Conference in 2007, as Program Cochair
nal of Wireless Communication and Mobile Computing, for IEEE GLOBECOM 2007–2008 Symposium on Wireless
Wiley’s Security and Communication Network Journal, Else- Ad Hoc and Sensor Networks, and for the 14th IEEE ISCC
vier Pervasive and Mobile Computing Journal, IEEE Wireless 2009 Symposium on Computer and Commmunication, and
Communications, Elsevier’s Journal of Parallel and Dis- as Finance Chair for ACM Multimedia 2008. He also serves
tributed Computing, and SCS Transactions on Simulation. as a Steering Committee Chair for the ACM Modeling,
He was the recipient of the Best Research Paper Award at Analysis, and Simulation for Wireless and Mobile Systems
IEEE/ACM PADS 1997, ACM MobiWac 2006, ICC 2008, ICC Conference, the ACM Symposium on Performance Evalua-
2009, and IWCMC 2009, and the recipient of the Third tion of Wireless Ad Hoc, Sensor, and Ubiquitous Networks,
National Award for Telecommunication Software in 1999 and IEEE/ACM DS-RT.
for his work on a distributed security systems on mobile
phone operations. He has been nominated for the Best MOHAMMED ALMULLA received his B.Sc. and Ph.D. degrees in
Paper Award at the IEEE/ACM PADS 1999 and ACM MSWiM computer science from McGill University, Montreal, Cana-
2001. He is a recipient of an Ontario Early Research Excel- da, in 1986 and 1995, respectively. He is an associate pro-
lence Award (previously known as Premier of Ontario fessor in the Computer Science Department, College of
Research Excellence Award), Ontario Distinguished Computer Sciences and Engineering, Kuwait University.
Researcher Award, and Glinski Research Excellence Award. Currently, he is the director of the Graduate Program at
He is a co-founder of the QShine International Conference the Computer Science Department at Kuwait University and
on Quality of Service for Wireless/Wired Heterogeneous a consultant at Kuwait Central Agency for Information
Networks (QShine 2004). He served as General Chair of the Technology. His research interest is in the areas of dis-
Eighth ACM/IEEE Symposium on Modeling, Analysis, and tributed simulation, distributed computing, modeling and
Simulation of Wireless and Mobile Systems, and the Ninth simulation of parallel methodologies, and artificial intelli-
ACM/IEEE Symposium on Distributed Simulation and Real- gence.