Decomposition of geometric-shaped structuring elements using morphological transformations on binary images

F. Y. Shih, H. Wu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

A unified technique to simplify the decomposition of various types of big geometric-shaped structuring elements into dilations of smaller structuring components by the use of a mathematical transformation is presented. The method can be applied to all types of ID gray-scale structuring elements to decompose them into dilations of smaller structuring components. The desired morphological erosion and dilation are equivalent to a simple inverse transformation over the result of operations on the transformed decomposable structuring elements. A strategy to decompose a large cyclic cosine structuring element is described. A technique for decomposing a two-dimensional convex structuring element into one-dimensional elements is also developed.

Original languageEnglish (US)
Title of host publication11th Annual International Phoenix Conference on Computers and Communication, IPCCC 1992 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages356-363
Number of pages8
ISBN (Electronic)0780306058, 9780780306059
DOIs
StatePublished - Jan 1 1992
Event11th Annual International Phoenix Conference on Computers and Communication, IPCCC 1992 - Scottsdale, United States
Duration: Apr 1 1992Apr 3 1992

Publication series

Name11th Annual International Phoenix Conference on Computers and Communication, IPCCC 1992 - Proceedings

Conference

Conference11th Annual International Phoenix Conference on Computers and Communication, IPCCC 1992
CountryUnited States
CityScottsdale
Period4/1/924/3/92

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Decomposition of geometric-shaped structuring elements using morphological transformations on binary images'. Together they form a unique fingerprint.

Cite this