{"version":1,"kind":"Article","sha256":"","slug":"812","location":"","dependencies":[],"doi":"10.54294/5in4gl","frontmatter":{"title":"Creating a 2D Active Shape Model Using itk::ImagePCAShapeModelEstimator","abstract":"Although many variations of active contour segmentation algorithms exist, most are based on solely edge criteria and breakdown or leak at weak boundaries. One solution to this problem is constraining the segmented area to only statistically possible shapes with the guidance of a shape model. The purpose of this document is to fill the void in the ITK user guide on building active shape models. We describe how to create a 2d active shape model of articular femoral knee cartilage using ITK’s ImagePCAShapeModelEstimator. Sample code and example images are provided for displaying the initial principle components of variation. Shape models built with our code can be used for segmentation with itk::GeodesicActiveContourShapePriorLevelSetImageFilter.","license":"You are licensing your work to Kitware Inc. under the\nCreative Commons Attribution License Version 3.0.\n\nKitware Inc. agrees to the following:\n\nKitware is free\n * to copy, distribute, display, and perform the work\n * to make derivative works\n * to make commercial use of the work\n\nUnder the following conditions:\n\\\"by Attribution\\\" - Kitware must attribute the work in the manner specified by the author or licensor.\n\n * For any reuse or distribution, they must make clear to others the license terms of this work.\n * Any of these conditions can be waived if they get permission from the copyright holder.\n\nYour fair use and other rights are in no way affected by the above.\n\nThis is a human-readable summary of the Legal Code (the full license) available at\nhttp://creativecommons.org/licenses/by/3.0/legalcode","keywords":["Active shape model","Segmentation"],"authors":[{"name":"Durkin, John","email":"john.r.durkin@gmail.com","affiliations":[],"corresponding":true},{"name":"Miller, David","affiliations":[]},{"name":"Urish, Kenneth","email":"ken.urish@gmail.com","affiliations":[]}],"date_submitted":"2011-06-14 09:16:27","external_publication_id":812,"revision_cids":["bafkreidtxckhldtey37r6dozfvh36ndidtnht4lysxc72lxhtmvohge5mi"],"github":"https://github.com/midas-journal/midas-journal-812.git"},"mdast":{"type":"root"},"downloads":[{"url":"https://pub.desci.com/ipfs/bafkreigkkikwgh6upvout7hq6z2vg4x2d5odj3s7kfkore22erjlimhvma","title":"root/code/ActiveShapeModel/Creating a 2D Active Shape Model.pdf","filename":"Creating a 2D Active Shape Model.pdf","extra":{"size_bytes":343921,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreiga4t23pm5nxcfihcgltkxhv436kw3bphbwfv44ffdo3h26io2oiy","title":"root/code/ActiveShapeModel/DrawActiveShapeModel/CMakeLists.txt","filename":"CMakeLists.txt","extra":{"size_bytes":403,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreiglno4xbpylkxqimjatlo2ppxswg7rwjygt3gnqb4bekfpailutwa","title":"root/code/ActiveShapeModel/DrawActiveShapeModel/Draw2dasm.cxx","filename":"Draw2dasm.cxx","extra":{"size_bytes":5686,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreica6rxvk27uy3lza722soxiszdywhiq77ojeusptdt4wip2bzyswm","title":"root/code/ActiveShapeModel/DrawActiveShapeModel/README.txt","filename":"README.txt","extra":{"size_bytes":883,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreicelanvml4tw4qbqu3taylf6ukety2m7cljutqh7qeyjucuuli3ue","title":"root/code/ActiveShapeModel/Create2DActiveShapeModel/2dasm.cxx","filename":"2dasm.cxx","extra":{"size_bytes":5251,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreianbzjys33pdbzz73yniz2z222j2iispdxpyqvqrvg6a5rmmnitlq","title":"root/code/ActiveShapeModel/Create2DActiveShapeModel/CMakeLists.txt","filename":"CMakeLists.txt","extra":{"size_bytes":387,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreih3xmvmgwpgd7esd6zbbmb6goxg32qeqtzwjdifmmn3klqhvc6et4","title":"root/code/ActiveShapeModel/Create2DActiveShapeModel/README.txt","filename":"README.txt","extra":{"size_bytes":572,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreif2d5jxnkw2wzfarsylhslpb5ypdzyqkv4fswkvb5ycmahkqucbx4","title":"root/code/ActiveShapeModel/Create2DActiveShapeModel/Images/fixed0.tif","filename":"fixed0.tif","extra":{"size_bytes":147604,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreiczubpbymgrii5oswbxiu6uoh2endmfbuftx3tr4lnthonnlrulhe","title":"root/code/ActiveShapeModel/Create2DActiveShapeModel/Images/fixed1.tif","filename":"fixed1.tif","extra":{"size_bytes":147781,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreibvlkcvtl6pl3jc5l35iixbhjv4jauwz6an44ui2csq5z5wv7myne","title":"root/code/ActiveShapeModel/Create2DActiveShapeModel/Images/fixed2.tif","filename":"fixed2.tif","extra":{"size_bytes":147781,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreictt2kueypqnqxnqq6ou4ktfe2gi7bqxx5k6hc62ysph5v4obnugm","title":"root/code/ActiveShapeModel/Create2DActiveShapeModel/Images/fixed3.tif","filename":"fixed3.tif","extra":{"size_bytes":147781,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreibe7qmpr2nwwutlwofykufyujkomcy22ygfcgbzckb3hdsttjewou","title":"root/code/ActiveShapeModel/Create2DActiveShapeModel/Images/fixed4.tif","filename":"fixed4.tif","extra":{"size_bytes":147781,"type":"file"}},{"url":"https://pub.desci.com/ipfs/bafkreihydkemvhus7uhnhkswq2zqomkaapwtt7vyncld4y23rmwcdhxt24","title":"root/code/ActiveShapeModel/Create2DActiveShapeModel/Images/fixed5.tif","filename":"fixed5.tif","extra":{"size_bytes":147781,"type":"file"}},{"url":"https://ipfs.desci.com/ipfs/bafkreie32ifl47hym5e5lamngkbvnjfxsaxdlbwp2fdtv6dxxkbf7mxiwm","title":"root/insight-journal-metadata.json","filename":"insight-journal-metadata.json","extra":{"size_bytes":5363,"type":"file"}},{"url":"https://dweb.link/ipfs/bafkreigkkikwgh6upvout7hq6z2vg4x2d5odj3s7kfkore22erjlimhvma","title":"root/article.pdf","filename":"article.pdf","extra":{"size_bytes":343921,"type":"file"}}],"references":{"cite":{"order":["ref1","ref2","ref3","ref4","ref5","ref6","ref7","ref8","ref9"]},"data":{"ref1":{"label":"ref1","enumerator":"1","html":"Level Set Methods: An Act of Violance+1996+J.A. Sethian"},"ref2":{"label":"ref2","enumerator":"2","url":"https://doi.org/10.1109/iccv.1995.466871","html":"Geodesic Active Contours”+International Journal of Computer Vision+22+1+61+79+1997+V Caselles+R Kimmel"},"ref3":{"label":"ref3","enumerator":"3","url":"https://doi.org/10.1007/bf00133570","html":"Snakes: Active Contour Models”+International Journal of Computer Vision+1+4+321+331+1988+M Kass+A Witkin+D. Terzopoulos"},"ref4":{"label":"ref4","enumerator":"4","url":"https://doi.org/10.1201/9781482277234-12","html":"The Morphological Approach of Segmentation: The Watershed Transformation”+12+43+481+1992+S Beucher"},"ref5":{"label":"ref5","enumerator":"5","url":"https://doi.org/10.1006/cviu.1995.1004","html":"Active Shape Models-Their Training and Application”+Computer Vision+61+January+38+59+1995+T Cootes+C Taylor+D Cooper"},"ref6":{"label":"ref6","enumerator":"6","html":"Multivariate Statistics a practical approach+1988+Flury+Hall"},"ref7":{"label":"ref7","enumerator":"7","html":"A tutorial on Principal Component Analysis”. 26 February+2002+Lindsay. Smith"},"ref8":{"label":"ref8","enumerator":"8","url":"https://doi.org/10.1109/cvpr.2000.855835","html":"Statistical shape influence in geodesic active contours+In Proc. IEEE Conference on Computer Vision and Pattern Recognition. Volumne 1+316+323+2000+M Leventon+W Grimson"},"ref9":{"label":"ref9","enumerator":"9","html":"The ITK Software Guide Second Edition. November 21+2005+L Ibanez+W Schroeder+L Ng+J Cates"}}}}