How does Lowe compute the “repeatability” of his SIFT Algorithm?
-
In his paper of 2004, "Distinctive Image Features from Scale-Invariant Keypoints", he gave many figures of "repeatability" as a function of XXX, for example, figure 3,4 and 6, but he did not elaborate how to compute the "repeatability". He actually gave an simple explanation of "repeatability" in figure 3 of page 8, which is "the percent of keypoints that are repeatably detected at the same location and scale in a transformed image". However, 1) how can we know weather a keypoint is detected in the transformed image, simply by checking the keypoints one by one? I do not think it is practical, since there are thousands of keypints. 2) How close can we consider a keypoint being repeatably detected in the SAME LOCATION? 3 pixels, 6 pixels? Or not by pixels at all? I do not know how can I upload the paper "Distinctive Image Features from Scale-Invariant Keypoints". Here is the link: http://www.cs.ubc.ca/~lowe/papers/ijcv04.pdf
-
Answer:
If you notice in the first paragraph on page 9, the author goes into a bit more detail on the tolerance for saying the keypoint is detected in the same location. First, "the same scale" is given as being within a factor of sqrt(2) of the correct scale, which must either be known to the operator or hand labeled in the data set. Secondly, "the same location" is defined as being within σ pixels in the x and y directions, where "σ is the scale of the keypoint (deï¬ned from equation (1) as the standard deviation of the smallest Gaussian used in the difference-of-Gaussian function)" As to your more general question, the answer is unfortunately that one must indeed check the keypoints exhaustively. You gather up all the location/scale pairs where your detector fires on the transformed image, and you compare these to the true locations back in the original image. You need to have hand-recorded keypoint locations, or run a simple algorithm first (like using the basic KLT keypoint detector and just storing a list of the coordinates of the keypoints it finds and pretendting like these are "ground truth"... you'll suffer some accuracy this way but you'll be more able to automate the process). Large scale grunt work like this (writing code to exhaustively check a ton of keypoints) is usually the stuff that gets farmed out to grad students. Blerg.
user1222309 at Stack Overflow Visit the source
Related Q & A:
- If Horner’s rule is used what is the number of multiplications to compute P(n) for an polynomial?Best solution by Mathematics
- How to find contour lines for Appel's Hidden Line Removal Algorithm?Best solution by Computer Science
- How to Code Encryption Algorithm in Java?Best solution by code2learn.com
- What is an Ant colony optimization algorithm?Best solution by Stack Overflow
- How do I develop an algorithm?Best solution by Stack Overflow
Just Added Q & A:
- How many active mobile subscribers are there in China?Best solution by Quora
- How to find the right vacation?Best solution by bookit.com
- How To Make Your Own Primer?Best solution by thekrazycouponlady.com
- How do you get the domain & range?Best solution by ChaCha
- How do you open pop up blockers?Best solution by Yahoo! Answers
For every problem there is a solution! Proved by Solucija.
-
Got an issue and looking for advice?
-
Ask Solucija to search every corner of the Web for help.
-
Get workable solutions and helpful tips in a moment.
Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.