Program which take input two images by homography, Computer Engineering

Assignment Help:

The goal of this question is to create a program that takes as input two images that are related by a homography, and which "warps" the second image (piscine2.bmp) to align with the first image (piscine1.bmp). Both of these images are on the course web site. The output image that is created should have the original first image, along with the warped version of the second image. I have made the first image big enough to hold both the original first image along with the warped version of the second image. Your program needs to find some features in the two images, match these features to compute a homography, and use this homography to help create the final image which is a combination of the two input images. The simplest way to accomplish this is to use the code from the program findmatch.cpp in the C Samples directory (which you can find in the Windows OpenCV program menu) and modify it as necessary. Send me your source code and the final output image that you create which combines the two input images. In the area of overlap between the two images we have a choice of using pixels from the first image, or the second image. Describe some reasonable strategy for using pixels from both images to create a perceptually pleasing blend (you do not have to implement this strategy, just give a short description).


Related Discussions:- Program which take input two images by homography

Environment of the packet flow, Q. Environment of the Packet Flow? Prot...

Q. Environment of the Packet Flow? Protocol stack used on Internet is referred to as TCP/IP protocol stack. If we were to follow the path that message "Hello computer 5.6.7.8!"

Why is green screen more popular for compositing, Question: (a) Explain...

Question: (a) Explain clearly, from pre-production to post production how you would carry out the scene with multi-camera. (b) What are the there main aspects that should be

Security protocols used for e-commerce applications, Explain dissimilar sec...

Explain dissimilar security protocols used for e-commerce applications.   The e-commerce systems of today are composed of a number of components including: a commerce server, d

?????, c program??????????

c program??????????

Work systems framework - information system, The Work Systems Framework - I...

The Work Systems Framework - Information System Adler writing in 1992 used the phrase 'stumbling backwards into the future' to describe the neglect organisations at that time

Explain the term- viruses, Explain the term- Viruses Use of firewalls a...

Explain the term- Viruses Use of firewalls and ant-virus software to prevent viruses entering a computer. It's also sensible not to open attachments/emails from "unknown" sourc

Researching strategy - artificial intelligence, Researching strategy - arti...

Researching strategy - artificial intelligence: If our search and researching strategy and swot of it is surety to find all types of hints such the solutions eventually, then

Database, er table for hospital management system

er table for hospital management system

What is the significance of technical settings, What is the significance of...

What is the significance of Technical settings (specified while creating a table in the data dictionary)?  By specifying technical settings we can handle how database tables ar

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd