# Binary Morphology¶

date: Oct 7, 2007

## Introduction¶

Binary morphology is set of fundamental operations on binary images (2-D sets of boolean values). It is a very simple, nonlinear convolution-like operation between two such sets. Unlike linear convolution, morphology takes the Min and Max of elements in the set. One set is the image per se; the other is the kernel of the convolution, which is called a structuring element and has a defined origin (sometimes called the “center”). Binary morphology is extremely important for fast, low-level image matching operations — every commercial “machine vision” system has it because of its usefulness. Back in the period around 1990, if you wanted to do fast pattern matching, you could buy such a system from any one of several firms (see below). These implemented binary morphological operations on custom systems with wide registers at about 1 billion pixel operations/second. Today, using the destination word accumulation method (implemented in Leptonica) on a 1 GHz CPU, you can do binary morphology up to an order of magnitude faster! So if you need fast matching operations on binary images, read on. And if you are doing image analysis on grayscale or color images, binary morphology can often be used to give quick and spatially detailed “answers” to questions of interest.

## References and meta-references¶

I recommend the following references for initiates and practitioners:

• Image Algebra Using Mathematical Morphology by R. M. Haralick, S. R. Sternberg and X. Zhuang, IEEE Trans. PAMI, vol. 9, pp. 532-550, July 1987. The first 10 pages define the basic binary dilation, erosion, opening and closing operations.

• Image Analysis and Mathematical Morphology by Jean Serra, Academic Press 1982. The classic treatise, by one of the pioneers.

• Morphological Image Analysis, Principles and Applications by Pierre Soille, Springer 1999. A more modern textbook with numerous applications and examples.

• You can have a 2-page summary of the common notation and basic definitions that are used for morphological operators, in ps or pdf.

• Luc Vincent has many excellent publications on applications and efficient implementations of image morphology.

• There is an excellent online bibliography of 643 references in image morphology and related topics, through 2003, compiled by Pierre Soille and Henk Heijmans.

## What is binary morphology?¶

If you are familiar with morphological image processing, you can skip this section.

There are many fields, such as computational linguistics, materials science and biology, that use the term “morphological” to describe the objects they study. To distinguish itself from these, morphological image processing is sometimes called “image morphology” and “mathematical morphology,” the latter perhaps to indicate the degree of abstractness that has been achieved. Image morphology was pioneered in France in the 1960s by Matheron and Serra, and further developed in Europe thereafter. But until the early 1990s, most image processing in the U.S. was linear: linear convolution and invertible transforms. Heavy mathematical machinery can be brought to bear on such linear processing, but there are many situations where non-linear image processing is required, especially in image analysis applications where decisions need to be made. (You can’t make decisions with linear operations, which don’t allow you to say “yes” or “no” — only degrees of “maybe”.) The neglect in the U.S. of these fundamental nonlinear operations reminds me of the old joke about someone who loses his keys at night but only searches for them under a lamp-post because “that’s where the light is.” I believe that the first doctoral thesis on image morphology in the U.S. was the 1985 work on nonlinear filters by Petros Maragos with Ron Schafer at Georgia Tech.

Around that time, several “machine vision” companies were founded in Michigan, largely to provide automated inspection for local auto manufacturers. Binary morphology was used as a principal technique because it is fast, memory efficient and provides general routines for pattern matching. These companies sold special purpose hardware because it was lucrative and it was difficult to put the algorithms on general purpose machines. Why was that? After all, the Motorola 68020 was available in 1985 and the Intel 386 was available in 1986. Each of these supported memory-protected multiprocessing with 32 bit addressing. The main problem was that DOS and Intel lived in a 16 bit world, using a 64K segmented memory model, and it was difficult to handle larger images. And the unix workstations that were built around the 68020 were relatively expensive. They were also slow — these chips ran at a few MHz, several hundred times slower than the ubiquitous 3 GHz chips you can buy for \$100 today. These machine vision systems were also popular because they were designed to be special purpose “turn-key” systems (though it was not always easy to turn the key, especially when you programmed them in an assembly-like language.) And so, into the early ‘90s, there was a market for this special purpose hardware. But the inexorable progress of the basic PC microprocessor, both in speed and in software tools for program development, has greatly reduced the demand for these special systems – just as Silicon Graphics found that its business with special purpose graphics hardware was obliterated by cheap, fast Intel and AMD chips with gigaflop graphics performance. Today, processors are fast, memory is cheap, and we can use binary morphology for pattern matching at speeds that were not imagined even 10 years ago.

Binary morphology is about operations on sets. The sets are ON (black) pixels in a 2-dimensional image. As with all image processing operations, there is a source image that is operated on to produce a destination image. In the following, we use one set of conventions to describe the erosion and dilation operations as set operations. Other conventions exist, and you should keep this in mind when you read the literature.

The basic binary morphology operations are dilation and erosion. In a binary image, we refer to the foreground (black) pixels variously as “black”, “foreground”, “ON” or “1”. We refer to the background (white) pixels variously as “white”, “background”, “OFF” or “0”. Loosely speaking, dilation “smears” the foreground and erosion “thins” the foreground. These two operations are actually dual in that an erosion of the foreground is equivalent to a dilation of the background. Dilation can be implemented as follows: start with a cleared destination image (all OFF pixels). Then do a sequence of logical OR operations of the source image with the destination, each time with a specific shift, as determined by a pattern called a structuring element (Sel). The Sel is a 2-dimensional pattern of hits, all relative to an origin that is often referred to as the center of the Sel. It is a set as well. So there are really two sets involved in a morphological operation: the image and a Sel. For example, consider a Sel that is a horizontal pattern of 5 contiguous hits (x,y) = {(-2,0), (-1,0), (0,0), (1,0) and (2,0)}, with an origin at (0,0). Then a dilation of the image by this Sel involves initializing all dest pixels to OFF and then ORing the source five times with source shifts given by the five hits in the Sel.

An erosion can be implemented in a similar way. For example, you can initialize all dest pixels to ON and then do a set of logical ANDs between the dest and the shifted source. But there is one important difference: you take the shift to be from the hit to the Sel origin, rather than from the origin to the hit. You can think of the Sel as a set of vectors in two dimensions, and for erosion, you use an inversion of these vectors. Because of the AND, you end up with ON pixels in the destination only where the hits of the Sel can all fit on the ON pixels of the source image. In fact, the erosion can be implemented by placing the Sel with its origin at every ON pixel in the source image and, for every location where all hits in the Sel are placed on ON pixels in the image, an ON pixel is produced in the destination at the location of the Sel origin. Thus, the erosion is a pattern matching operation. The inversion of the Sel for erosion is required to make the erosion a dual of the dilation. The prescription for erosion just given is oversimplified; see the discussion in the next section on boundary conditions.

The inversion of the Sel for erosion is also required to make the opening, which is a sequence of erosion followed by dilation, both using the same Sel, have the property called idempotence. This means that if you do a second opening, there is no change after the first one. Operations that are idempotent have a special significance. The opening can be visualized as follows: it gives you only those ON pixels where the Sel is able to fit entirely in the foreground. (The erosion gave on pixels only at the Sel origin location of such a pattern match. Then by dilating those pixels, with the same Sel, you get all the pixels in the match.) So the opening projects out a subset of pixels of the source image, and a second opening gives the same result because the Sel fits in those pixels by construction. The closing, which is a dilation followed by an erosion with the same Sel, is also idempotent. It is the dual to the opening, because you can do a closing by opening the background. Regardless of the convention that is used to define erosion and dilation, the opening and closing operations have a unique definition. All four morphological operations have two important properties:

1. Translational invariance. The operation commutes with translation: if you translate the source and perform an operation, you get the same result as if you performed the operation first and then translated the result.

2. Increasing. If you have two images, one of which has a foreground that is entirely contained in the other, then the results of a morphological operation retain the same order of inclusion.

Unlike dilation and erosion, the result of opening or closing an image does not depend on the location of the origin of the Sel. (This is another reason for inverting the Sel for erosion.) A consequence of this is that opening and closing have special properties besides idempotence not shared by erosion and dilation. Namely, the opening is anti-extensive, which means that the set of ON pixels after opening is contained in the source image. Oppositely, the closing is extensive because the source image ON pixels are all contained in the image that results from closing it. The erosion and dilation do not have these properties because the result depends on the location of the Sel origin. For example, if you dilate an image with a Sel that has a single hit offset from the Sel origin, the result is simply a translation of the original image by the vector from the Sel origin to that hit. For this case, are the ON source pixels all contained in the ON pixels of the destination?

### And there is more to morphology than translationally-invariant, increasing primitives¶

You might think that all important operations are translationally invariant, but this is not true. For example, any operation that scales the image size is not translationally invariant. For example, if an image is reduced by subsampling, the resulting image depends on the subsampling grid (i.e., on the specific pixels that are chosen to represent the reduced image). A translation of the image relative to this grid before subsampling can result in a different (translated) image from that produced by subsampling at the original grid location.

There is another important morphological operation, the hit-miss operation. It is a very general pattern match because it finds matches to parts of the image that have specified OFF pixels as well as ON pixels. For example, the lower edge of a horizontal line in the image can be found with a hit-miss Sel that has a row of misses below a row of hits. For a pixel to be set ON in the destination, all the hits must be on ON pixels and all the misses must be on OFF pixels in the source. (The operation is sometimes called “hit-or-miss”, but the operation is really a hit-and-miss.) Thus in its most general form, the Sel has in each location either a hit, a miss or a don’t-care. The addition of misses to the Sel makes the hit-miss operation very useful, but it loses the increasing property. (Can you see why?). Consequently, it is not of great interest in set theory because without a preservation of image ordering, relatively few general statements can be made.

I should not leave you with the impression that this is all there is to binary morphology. There are many other image operations, such as thinning (with or without preservation of connectivity), that can be formed by sequences of basic operations. There are also many nonlinear transforms from binary to grayscale images, such as a simple distance transform that labels the minimum distance from each pixel to a pixel of opposite color. A more complicated nonlinear function labels connected components (a set of pixels of the same color for which each pixel in the set is adjacent, in either a 4- or 8-connected orientation, to another pixel in the set) by computing a measure of their “length” as the maximum, over all pairs of pixels in the set, of the minimum distance between the two pixels, taken over all paths between them that stay entirely within the set of pixels that constitute the connected component. Further, all the binary morphological operations can be generalized to grayscale, where the dilation is a Max operation and erosion is a Min operation. (Do you see how the binary dilation and erosion are a special case of taking the Max and Min operation? With a binary image, the max value is 1 and the min value is 0. An erosion places a value of 0 at the Sel origin unless all the pixels under the Sel are 1. Therefore, the erosion selects the minimum of the binary pixel values.) And once you go to grayscale, the number of interesting nonlinear operations explodes. For example, much work has been done on image segmentation, typically using seeds and region growing. See the literature for details.

Why have an entire section on boundary conditions? Why not simply adopt a mathematically elegant definition, and use it. For natural images, where there is no a priori bias toward any particular grayscale value for pixels beyond the image proper, this is a perfectly reasonable approach. For document images, however, this can give unexpected results.

What is the mathematically elegant definition? It is the one that treats erosion and dilation as duals, even in the presence of boundaries. We will call it the symmetric boundary condition (SBC): extend an image by the min value (0 for binary images) for dilation and by the max value (1 for binary images) for erosion. This gives strict duality. To avoid confusion, we call the extra pixels that are used to extend the image beyond its actual boundaries the frame pixels.

However, for document images, there is a natural bias toward extending the image with background (0, OFF) pixels, for both dilation and erosion, because we typically have background pixels at the boundaries. So we might want to handle the boundary conditions by requiring that we get the same result as if the image were actually extended sufficiently by 0 pixels, for all morphological operations. This does not give strict duality between dilation and erosion, but I find it preferable for document imaging applications. We will call this the asymmetric boundary condition (ABC).

Erosion is thus different for SBC and ABC. Suppose you have a binary image with all pixels ON. An erosion with a 3x3 Sel flips a 1 pixel wide border around the image to OFF using ABC, and has no effect on the image using SBC.

The most problematic operation on document images is closing. Consider a document imaging application with binary images, and let’s take a specific closing example. Suppose you have an image with one ON pixel, located near the left hand edge at (x=5,y=50), in an image of size 100 x 100, and you dilate with a horizontal structuring element of width 21 pixels with the origin at its center. Here are the three cases:

1. Closing using asymmetric boundary condition convention with no added border pixels. The dilation stops at the image boundary, and you get a line only 16 ON pixels long (5 to the boundary, the original pixel, and 10 to the right of the original pixel). The subsequent erosion with a 21 pixel wide Sel removes it entirely, because there is no location in which all 21 pixels of the Sel are covered by ON pixels. Removal of the original pixel is not typically what you want for a closing operation.

2. Closing using asymmetric b.c. with added OFF border pixels. The dilation expands the orignal pixel into a line of length 21 that includes 5 frame pixels, and the subsequent erosion leaves a single pixel, the same one that you started with.

3. Closing using a symmetric b.c.. As we will see, this can be implemented without any actual frame pixels being added. But for visualization purposes, imagine there is a frame of OFF pixels for the dilation, which expands the original pixel into a line 21 pixels long, including 5 in the frame. Then change the frame pixels to ON and perform the erosion. Because there are now an infinite number of ON pixels in the frame, the erosion only removes the 10 pixels to the right of the original pixel. The original pixel and the five pixels to its left remain ON. (Remember, the erosion leaves the Sel origin ON if all hits in the Sel are covered by ON pixels.)

So we get three different results! The third result, where pixels can be connected with the boundary by the closing, is the mathematically correct one in terms of strict duality (SBC), but for document images, does one really want the closing operation to close gaps from image pixels to the boundary? The first result loses the original pixel, which is also likely to be undesirable. Only the second result gives us an image that seems intuitively correct for a situation where the image seems naturally to be extended by OFF pixels because the foreground pixels are assumed to be localized to the actual image (without a frame). Note that the second result is independent of the location of the actual image boundary. This is the reason that we’re considering boundary conditions in some detail: I prefer ABC for document images.

In Leptonica, you get to choose which convention — ABC or SBC — you want to use. There is a function, resetMorphBoundaryCondition(), that takes one of two values, SYMMETRIC_MORPH_BC and ASYMMETRIC_MORPH_BC. We initialize it to ABC, so that by default all pixels outside the image are assumed to be 0 (OFF) for both dilation and erosion. The disadvantages of this convention are that we lose duality near the boundary, and have to be careful with closing. However, we gain the condition that an erosion cannot bring ON pixels in from the boundary onto an image that is mostly OFF near the boundary, as most binary document image pages are. If you do a translation (which could be implemented as either a dilation or an erosion by a Sel with one hit that is not at the Sel center), and you don’t want to introduce a rectangle of black pixels, you must use the convention that the image is surrounded by OFF pixels. If you use SBC with such a translation, you will introduce a rectangle of ON pixels in an erosion but not in a dilation.

As you can see, the type of boundary conditions you want to use may depend on your application. Most mathematicians would likely argue for using SBC. However, these issues are introduced here because SBC is not the only possible choice, and with Leptonica you can decide which boundary conditions you want to use.

We discuss below exactly how we handle the boundary conditions. It turns out that there is essentially no difference in implementation complexity or efficiency between the two choices, for either of the two implementations we give here. Those implementations are discussed below: full-page rasterops and destination word accumulation.

## The rasterop implementation of binary morphology¶

A general rasterop is an image operation that combines a rectangle of pixels of the source image with a rectangle of pixels in the destination image, where the combination operation can be any of 12 binary logical pixel-wise operations. There are also special case unary rasterops that only affect a rectangle within the destination image. See the page on Rasterop (a.k.a. Bitblt) for details.

As described in the previous section, a morphological operation can be implemented by performing a sequence of logical ORs (for the dilation) or logical ANDs (for the erosion) of the source image, translated each time according to one of the hits in the Sel. The rasterop can be used, where the rectangle chosen is the entire source image. For all rasterops, the source image is clipped so that it does not try to write beyond any edge of the destination. There are other details, of course, such as the initial conditions on the destination image and the handling of the boundary conditions.

We have already introduced the issue of different conventions for choosing boundary conditions for erosion. We can imagine implementing erosion by rasterops in two ways:

1. Start with a dest image that is cleared (all pixels have value 0). Copy the source image to it with a displacement given by (an arbitrary) one of the hits in the Sel. For simplicity, imagine that this copy is made without any shift because the first hit in the Sel is at the Sel origin. The rest of the hits each result in an AND of the shifted and clipped source with the destination.

2. Start with a dest image where all pixels are set to a value 1. For each hit in the Sel, AND the shifted source with the dest. Because we initialize to 1, you can use either a copy operation or and AND for the first hit. This is dual to the implementation of the dilation, where we initialize all pixels to 0 and do a sequence of ORs for each hit in the Sel.

We use the second method because of its simplicity, and because it can be used directly to implement erosion with both SBC and ABC.

Now, when an image is shifted to the right by 2 pixels, the leftmost 2 columns of pixels in the destination are unaffected by the AND. What should happen to these 2 columns? It depends on whether you are using SBC, which logically brings in ON pixels from the frame, or ABC, which logically brings in OFF pixels from the frame. (But if we do full image rasterops without a frame, nothing is actually brought in — the 2 columns of pixels are simply not altered.) If you are using SBC and initialize the image pixels to ON, these 2 columns remain ON, just as if you really pulled ON pixels in from the frame. If you are using ABC, regardless of image content you must clear these columns out later.

Suppose we are using asymmetric boundary conditions, where we require that the result of erosion using rasterops is equivalent to a situation where the source is surrounded by enough OFF pixels to cover the dest for every translation specified by the Sel. Details on this choice of boundary condition convention can be found in a recent paper on the Implementation Efficiency of Binary Morphology. We have two methods for insuring that the pixels near the boundary are properly cleared. We can extend the source image with OFF pixels all around, and clip each rasterop to the destination image. Then those columns of OFF pixels would automatically clear the destination because of the AND operation. Or equivalently, without embedding the source image in a larger image of OFF pixels, we can perform all the rasterops in the erosion with usual clipping to the translated source image and, as a final step, clear the (up to) four rectangles of the appropriate boundary pixels in the destination. For each such rectangle, the size in a direction normal to the boundary is equal to the maximum shift (relative to the Sel origin) in the corresponding one of the four directions. For example, if the maximum shift to the right in the Sel is 4 pixels, the rectangle consisting of the 4 left-most columns of the destination must be cleared. (Remember that for erosion, the vector giving the image shift for each hit in the Sel is from the hit location to the Sel origin.)

We must also clear the edge pixels for the hit-miss transform, because it is a near relative of the erosion. The size of the rectangles to be cleared is determined from the hits in the Sel, exactly as in the erosion. The location of the misses in the Sel are not important for the clearing operation because the pixels that would be brought in from beyond the image boundary (if it were extended) would be ON. This is because for each miss, a translated version of the negative image is ANDed.

Suppose on the contrary that you wish to adopt the symmetric boundary conditions; namely, that the image is surrounded with ON pixels for an erosion, as discussed above. Then you simply use the second method for the erosion given above: set the dest image pixels (to 1); then AND each raster operation, properly shifted and clipped. This operation is dual to the dilation, and you stop there — you don’t clear the edge pixels. For closing, with the example given in the previous section, we do not need to add any surrounding frame pixels for the rasterop implementation. After the dilation, we set all destination pixels ON for the erosion and do the set of ANDs from the source (which is the destination of the previous dilation). Because of rasterop clipping, it’s easy to see that the line of pixels from the original to the left boundary will be preserved by the erosion.

As mentioned in the previous section, you can determine the boundary conditions using the function resetMorphBoundaryCondition(). The effects of the boundary are most striking with the closing operation. Closing is formally extensive, but with the ABC convention without added frame pixels, ON pixels near the image boundary can be removed because the dilation does not extend past the boundary. If you are using the ABC convention, the function pixCloseSafe() will remove this anomaly by adding a frame of minimal required size to every image before closing, and removing the frame pixels at the end. The routines for adding and removing a such a frame are in pix2.c. (In the libarary, we refer to this as adding or removing a border). Note again that if you are using SBC, closing will be extensive without the addition of actual pixels around the boundary, and the anomaly will be avoided automatically.

The source code for the rasterop implementation of binary morphology is in morph.c. A few things to note are:

• Call arguments. The dilation is typical:

```PIX * pixDilate(PIX *pixd, PIX *pixs, SEL *se);
```

The first argument is the dest; if it is NULL, a new dest pix is allocated. The function returns the dest in all circumstances. If pixs and pixd are pointers to the same Pix, the operation is in-place, and pixs will be changed; otherwise, pixs is unaltered.

• Data structure definitions. The Sel is defined in morph.h and the Pix is defined in pix.h. All Pix fields should only be changed using the “get” and “set” accessors provided in pix1.c.

• Construction of Sels. There are many functions for creating a Sel.

1. selCreate() makes a Sel initialized to don’t-care entries.

2. selCreateBrick() makes a Sel initialized to either don’t-care, hit or miss entries.

3. The created Sels can be packaged up into an array (Sela) using selaAddSel() repeatedly.

4. Sels can be extracted from Sela (arrays) by name using selaFindSelByName() or by index using selaGetSel().

5. Sels can be created from either Pix or an array of pts (a Pta).

6. Sels can be created from a compiled string that, when displayed, shows the hits, misses and origin in correct geometrical arrangement.

7. Sels can be created from a simple file format that uses the same format as for the compiled string.

8. Sels can be created from a colored pix generated with a pixmap editor.

• Visualization and archiving of Sels. There are several ways to save or display a Sel or a Sela array.

1. Both Sels and Sela can be written in ascii, either to a stream or to a file (sel1.c).

2. Sels can be written to a string that, when displayed, shows the hits, misses and origin in correct geometrical arrangement (sel1.c).

3. Sels can be displayed in a binary pix in a form suitable for publishing (selDisplayInPix()).

4. A color image of a Sel (in general, a hit-miss Sel) can be generated using pixDisplayHitMissSel() in selgen.c.

## The destination word accumulation implementation of binary morphology¶

Destination word accumulation (dwa) is a much more efficient method of implementing binary morphology. We go through the destination image one (32-bit) word at a time, computing its value based on the source image and the Sel, and then write that word to the destination image. This is more efficient than the rasterop version because the inner loop for each destination word is unrolled into the simplest set of operations, with no branches or iteration loops. Unlike the rasterop implementation, the dwa requires specialized routines for erosion and dilation using each Sel. However, it will be seen that this is not an impediment to its use. Performance comparisons between rasterop and dwa implementations of binary morphology can be found in:

To avoid writing special case functions for words that are at or near the image boundaries, dwa is implemented on interior pixels that are more than 32 pixels from the actual image boundary. The outermost 32 pixel border of pixels within the image are read from but not written to. If in an application it is desired to operate on all pixels in the image, the user must add a border of frame pixels before doing a dwa dilation or erosion. It is also necessary to add the frame pixels with the correct initial color. For dilation, the pixels added to the destination are always 0 (OFF). For erosion, they are OFF for ABC and ON for SBC. This could be automated if the pix had a field specifying the frame size, but I felt that adding this much machinery to slightly simplify the use of dwa morphology was not warranted. Just keep in mind that dwa usage requires a border of extra frame pixels if you don’t want to get get boundary artifacts, and you must initialize the pixels properly according to the convention you are using.

### Auto-generated dwa code interfaces¶

We provide two implementations that automatically generate code for dwa morphology.

• Hit-only Sels. The function fmorphautogen() in fmorphauto.c takes a Sela, an integer and an optional filename, and writes the C code for dilations, erosions, opening and closing, using each of the Sels in the Sela. The integer is used to give all functions a unique name so that the C code created by multiple invocations of fmorphautogen() using different Selas will all compile and link together in an application. For example, the program prog/fmorphautogen makes a Sela of the 58 Sels that are generated by selaAddBasic(), and generates dwa C code for the four morphological operations for each Sel. It uses the integer “1” to generate the code in two files: fmorphgen.1.c and fmorphgenlow.1.c. We have compiled these files into the library. The functions pixMorphDwa_1() and pixFMorphopGen_1() in fmorphgen.1.c are then available to be called by any application to perform a morphological operation:

```PIX * pixMorphDwa_1(PIX *pixd, PIX *pixs, INT32 operation, char *selname);
PIX * pixFMorphopGen_1(PIX *pixd, PIX *pixs, INT32 operation, char *selname);
```

The use of the first two arguments is standard, as described above for the rasterop implementation. The operation is one of the set {L_MORPH_DILATE, L_MORPH_ERODE, L_MORPH_OPEN, L_MORPH_CLOSE}, and the Sel to be used is specified by the name string (the selname) associated with that Sel. The list of allowed name strings for the Sela is automatically extracted and placed in the file fmorphgen.1.c.

• Hit-miss Sels. The function fhmtautogen() in fhmtauto.c takes a Sela, an integer and an optional filename, and writes the C code for the hit-miss transform, using each of the Sels in the Sela. The parameter usage is identical to that of the hit-only Sels. The program prog/fhmtautogen makes a Sela of the 6 Sels that are generated by selaAddHitMiss(), and generates dwa C code for the hit-miss transform for each Sel:

```PIX * pixHMTDwa_1(PIX *pixd, PIX *pixs, char *selname);
PIX * pixFHMTGen_1(PIX *pixd, PIX *pixs, char *selname);
```

The code generated by fhmtautogen() with index = 1 is in files fhmtgen.1.c and fhmtgenlow.1.c, and has been put in the library. The only restriction beyond size on the hit-miss Sels is that each one must have at least one hit; otherwise, the code generated aborts with an error message.

There are several other practical things to note about using the dwa implementations:

• You must add a border before dwa operations and remove it afterwards. Add a 32 pixel border of frame pixels. For symmetric boundary conditions, initialize the added frame pixels to 0 for dilation and 1 for erosion. For asymmetric boundary conditions, always initialize the added frame pixels to 0. The functions pixAddBorder() and pixRemoveBorder() in pix2.c have been provided for this purpose.

• Higher-level autogen’d functions are provided:

1. pixMorphDwa_*() and pixHMTDwa_*() automatically add the border and set the border pixels appropriately.

2. pixFMorphopGen_*() and pixFHMTGen_*() set the border pixels appropriately, but assume that these border pixels exist. If they don’t exist, pixels in the proper image will be treated as border pixels.

• Limit on Sel size. To simplify the code that automatically generates dwa code, the hits in the Sel must not exceed 31 pixels in any direction away from the Sel origin. The autogen code will truncate any Sel that’s larger, and the generated code may not compile. This limit means that with a centered Sel origin, the Sel can not be more than 63x63 pixels. This should be sufficient for most applications.

• Higher-level functions for brick Sels exit. These are in morphdwa.c, and take care of all the grungy low-level details, including border pixels and their initialization.

• Two programs that autogen code are provided.

• Hits-only. The program is prog/fmorphautogen.

• Hit-Miss Transform. The program is prog/fhmtautogen

• Reserved indices for autogen’d code We reserve indices 1-9 for code built with either fmorphauto() and fhmtauto(). Hit-only code using indices 1 and 2, and hit-miss code using index 1 has been generated and inserted in the library. It is suggested that you use numbers larger than 9 in your own code to avoid collisions.

• Autogen’d code can be linked directly into applications. You have the option to add the code to the library and compile it there, or to compile and link the code directly into an executable. The latter is simpler.

• Programs are provided for verification of correctness of autogen code. The programs prog/binmorph*_reg, dwamorph*_reg and fhmtauto_reg do a variety of tests on the morphological functions. Most of these compare the dwa and full image rasterop implementations. Note that when a border is added for dilation, the added border pixels must be initialized to 0; for erosion, the value of the border pixels depends on whether you are using the asymmetric or symmetric boundary condition convention.

• There is more information in the source code. Consult the source for further details on usage.

## Separable atomic operations with block Sels, Sel decomposition, sequence interpreters and simplicity of use¶

With all the mechanisms set up for doing binary morphology with both rasterop and dwa, and for doing Grayscale Morphology, it is important to add some machinery to make it very easy to use for the situation where the Sels are linear operators of all HITS, which is by far the most common usage. These linear operators can be used in “separable” combinations, horizontal and vertical, to implement morphology with 2-dimensional rectangular Sels of all HITS. We call these 2-dimensional Sels “bricks.” Large linear Sels, of which the bricks are composed, can themselves be decomposed for efficiency, and we do this with 2-way composites, giving a computation savings for a linear Sel of length n of about a factor of n / (2 * sqrt(n)) over the unary method without decomposition.

The machinery has two levels that are convenient for use: a lower level where the brick Sel morphologyical operations are directly invoked, and a higher level that is an interpreter to run a sequence of such operations. Specifically,

1. Atomic functions for brick Sels, using separability and optionally 2-way composition.

2. A set of interpreters to implement a sequence of these atomic functions.

### Atomic separable functions¶

There are five sets of atomic functions for brick Sels, all with similar interfaces:

• Grayscale morphological operations (in graymorph.c).

• Binary morphology using rasterops (the pix*Brick() functions in morph.c).

• Binary morphology using rasterops with 2-way Sel composition (the pix*CompBrick() functions in morph.c).

• Binary morphology using dwa (the pix*BrickDwa() functions in morphdwa.c).

• Binary morphology using dwa with 2-way Sel composition (the pix*CompBrickDwa() functions in morphdwa.c).

These all take the sizes of the horizontal and vertical dimensions of the structuring element, and do separable implementions when both dimensions are greater than 1. They are useful in their own right because they implement correct boundary conditions, including safe closing if chosen. They also handle all intermediate images transparently, of which there are several for separable openings and closings. And they don’t require the generation and destruction of Sels, as they make them internally and destroy them after use. See the notes at the beginning of morph.c for usage.

For the operations using 2-way composable Sels, consider pixOpenCompBrick() as an example. The results are identical to to the those of pixOpenBrick(), for sizes that are exactly decomposed such that the product of factors in the former equals the Sel size of the latter. We place constraints and penalties on the functions that choose how to do the decomposition. The regression test prog/binmorph2_reg.c demonstrates the result of decomposition. For large Sels, the pix*CompBrick() functions are much more efficient. prog/binmorph2_reg also tests the dwa composable Sel operations, such as pixOpenCompBrickDwa().

The dwa brick morphological operations work on the set of linear Sels that are generated by selaAddBasic(), and which are implemented in dwa by the functions in fmorphgen.1.c. Look there to see which are available. If for some reason you want some other Sel, such as sel_23h, which is not there, you can follow one of the prescriptions set out in morphdwa.c. However, you will likely find that you don’t need to do this, because the dwa operations that use 2-way composable Sels will implement a close approximation to sel_23h. For convenience, if you call the non-composite dwa version, such as pixCloseBrickDwa(), and the Sel doesn’t exist for it, it will automatically call the 2-way composite dwa version, pixCloseCompBrickDwa().

### Interpreters for sequences of atomic operations¶

To make these atomic functions even simpler to use, we provide interpreters for sequences of morphological operations. For binary morphology, these sequences are combined with rank reductions and replicative expansion. All the interpreters are in morphseq.c. The morphological operations enabled by the sequences all use separable brick Sels. As with the atomic brick dwa functions, the interpreters reduce the complexity of using a dwa implementation to a single function invocation with a simple interface.

How do we test all this? A large regression test, prog/binmorph1_reg.c, tests all the binary brick operations, including the 2-way Sel decomposition, along with their interpreted sequences. Specifically, we test all morphological operations using:

• general rasterop

• brick rasterop (unary Sel)

• morph sequence of brick rasterop (unary Sel)

• morph sequence of composite brick rasterop

• brick dwa

• morph sequence of brick dwa

• morph sequence of composite brick dwa

A second regression test, prog/binmorph2_reg.c, compares the results of the 2-way composite separable brick implementations (both rasterop and dwa) against the unary brick implementations. A third regression test, prog/binmorph3_reg.c, compares rasterop brick (separable and non-separable) with various implementations of separable dwa bricks.

Our default boundary condition is asymmetric (0 for both dilation and erosion), but you can toggle this to test all functions with using the symmetric b.c. as well.

## Summary of available implementations¶

A summary might help describe all these different implementations, and how they are used. The top-level for all these is in morph.c (full image rasterops) and morphdwa.c (destination word accumulation — dwa).

### Full image rasterops¶

• Full image rasterops works with any arbitrary Sel (including, of course, hit-miss Sels). Consider dilating an image with a 40 x 40 brick Sel. pixDilate() will require 1600 full page rasterops, Brute force.

• The next level up in complexity are the brick rasterops, which are separable. pixDilateBrick() will carry out the 40 x 40 dilation with a mere 80 rasterops.

• Next up in complexity are the two-way decomposable brick rasterops. These use two Sels, a linear Sel and a comb Sel. pixDilateCompBrick will perform the 40 x 40 dilation using a linear brick of length 8 and a 5-tine comb in each direction, for a total of 26 rasterops. Separability and decomposability are important for large Sels!

### Destination word accumulation¶

Dwa implementations are typically about 3-5 times faster than full image rasterops. The implementation is perhaps more complicated, but no harder to use for the brick Sels.

• A general Dwa operation on an Sel of all hits or hits and misses can be made using the function fmorphautogen() or fhmtautogen(), respectively. These functions take an array of Sels (a Sela), and generate all the code required for any of the four basic morphological operations. Two interfaces are given: a higher one that adds and removes border pixels to avoid boundary effects, and a lower one that assumes the border pixels already exist. The first is useful for simple operations; the second for sequences where you don’t want to be adding and removing borders multiple times. Once generated, the code can be compiled directly with an program that uses it, or it can be compiled into the library. Your choice.

• Special functions, such as pixDilateBrickDwa(), have been written for Dwa operations using separable brick Sels. Only a small number of linear Sels have been compiled in. However, for operations where the Sel doesn’t exist, the brick Dwa operation defaults to the composite one (next).

• Composite separable functions, such as pixDilateCompBrickDwa(), have been written for all brick Sels up to 63 x 63. (Remember: a Dwa Sel cannot have hits or misses more than 31 pixels on any side of the Sel origin, so putting the origin in the Sel center, this gives a maximum linear Sel size of 63.) Composable brick operations require a sequential operation using a small linear brick and and extended comb; the order does not matter. The characteristics of each are given in a struct in sel1.c. The identical combinations are used in the full image rasterop implementation, which is slower than the Dwa but has the ability to go to arbitrary sizes.

As you can see, much of the machinery is specifically targeted for brick Sels. The reason is that in most applications, the vast majority of morphological operations use brick Sels!

There are a set of 3 regression tests, prog/dwamorph*_reg.c, that show you how to generate and use new Sels. prog/dwamorph1_reg.c calls a function to generate all linear Sels (both horizontal and vertical) from lengths between 2 and 63. This is a lot of code to add to the library, so instead, it compiles and runs two other programs with the code linked in. These programs are:

1. prog/dwamorph2_reg. This runs a regression test comparing dwa to rasterop morphology for all the basic operations and all 122 Sels.

2. prog/dwamorph3_reg. This runs timing for linear and composable operations for both rasterop and dwa, for all the horizontal Sels. The results are shown at the end of this section.

### Sequence interpreters¶

As mentioned above, we supply a number of interpreters in morphseq.c for carrying out these brick operations. The interpreters allow you to do a sequence of operations with a single command. They handle all intermediate images in the pipeline, simplifying the usage and avoiding errors in generating, using and destroying the intermediate images. We have interpreters for:

• Rasterops on separable bricks. These are run using pixMorphSequence().

• Rasterops on composable separable bricks. These are run using pixMorphCompSequence().

• Dwa on separable bricks. These are run using pixMorphSequenceDwa().

• Dwa on composable separable bricks. These are run using pixMorphCompSequenceDwa().

### Performance comparisons¶

Performance of linear and composite operations for rasterops and dwa are given in the four plots below. The time for each is given in milliseconds for operations on an image (feyn.tif), which has about 8 million pixels (300 ppi scan on letter size paper). The operations are done on horizontal brick Sels of lengths between 2 and 63. (Operations on vertical brick Sels are considerably faster for rasterop, but only slightly faster for dwa.) This data was generated directly by prog/dwamorph3_reg on a 3 GHz P4, and should be representative for those machines.

There are several things to notice:

• The composite morphological operation times scales approximately as the square root of the Sel size. The dilation starts above the others because it is necessary to add a border for dilation to avoid boundary effects.

• The speed of dwa is typically about 4 times faster than full image rasterops.

• The time to do a dwa operation can be estimated from the fact that dwa performs about 12 pixel operations for each machine cycle. For example, a linear erosion of size 60 on a 8 x 10^6 pixel image reuires about 5 x 10^8 pixel operations. A 3 GHz machine can perform about 4 x 10^10 pixel operations/sec, so the erosion should take about 13 msec. The comparable composite operation (6 + 10 = 60) is expected to take about 4 msec. As you can see from the plot, there is an additional 2 msec overhead for adding and removing a border, so the composite dwa erosion takes about 6 msec, and the opening and closing require an additional 4 msec (total: 10 msec).

In summary, for the fastest operations on brick Sels, use the dwa composite for sizes less than 64 and the rasterop composite for larger ones.

## Binary morphology and cellular automata¶

I can’t leave this subject without mentioning cellular automata (CAs). Conway’s “Game of Life” is an example of a cellular automaton (CA). In each generation (or iteration), a set of rules is applied to a binary image to generate another image. Conway used a very simple set of rules, where the value of a pixel on the next iteration depends only on the number of ON pixels adjacent to it. Too few neighboring ON pixels (starvation) or too many (overpopulation) caused the pixel to be OFF (die) in the next iteration. The result was a complicated and unexpected evolution of patterns.

Now I find it interesting that people only seem to use 2-D CAs. Not much happens in 1-D. Using a 3-neighborhood consisting of the binary pixel and its two neighbors in 1-D, you can have 2 3 = 8 different patterns, each of which can have a rule that sets the new pixel value to either ON or OFF. Thus, you can have 28 = 256 different sets of rules for how each pixel changes in the next iteration. A large number, but certainly manageable. But in 2-D, if your rule depends on the 3-neighbors, you can have 29 = 512 different patterns, leading to 2512 different sets of rules. That’s a very large set, much too large to be usefully explored at random. With such large numbers, it is easy to see that people might be impressed with the computational power. And the numbers continue to explode in higher dimensions. For example, in 3-D, with a 3-neighborhood you have 227 patterns, and approximately 2130000000 different rule sets! I haven’t seen anything done in 3-D, though I imagine it would be much more interesting than 2-D, though much harder to show visually what is happening.

For amusement, you can see some interesting 2-D CA at this web site. Each CA is described by its rule, which enumerates the output pixel result for each possible combination of neighbor pixels.

There is a simple relation between 2-D CAs and binary morphology. The hit-miss operation is a rule that gives a single pattern of ON and OFF pixels to be matched at each location, with the result that if the pattern is matched the output value is ON, and otherwise it is OFF. Any cellular automaton can thus be built as a generalization of the hit-miss operation, where in general more than one pattern is checked for a match. So in computational power, the hit-miss operation (thus generalized) is equivalent to the cellular automaton!

Things get even more interesting. Alan Turing’s fundamental discovery was that all programmed computers are equivalent to a very simple Turing Machine that could read and write binary data on an infinitely long tape. Any machine that is equivalent to a Turing Machine is called Turing complete. And it is easily shown that cellular automata are Turing complete. Consequently, the hit-miss operator can be used to implement a Turing Machine! In principle, you can compute anything with this generalized hit-miss operator!

People who have spent a lot of time with CAs tend to become captivated by their power. I believe it is because the 2-D CA have both general computational power and, at the same time, are able to show us the computational evolution directly through our visual system, rather than analytically in some abstract mathematical representation.

The laws of physics can be expressed in many ways; among them, a local description of fields and their derivatives being the most common. The fields, which can be related to physical measurements, are the solutions to partial differential equations. These are solved on digital computers, typically by discretizing space onto a lattice and time into discrete increments, as a set of difference equations. A very simple example is the Laplace equation for the electrostatic potential in some region surrounded by a closed boundary on which the potential values are known everywhere. The solution on the lattice points inside is found by applying, over and over, a very simple rule: replace the value of the potential at each point by the average of the four closest neighboring values. This is a relaxation method; eventually the potential at each point arrives at its final value. You can implement this by a CA; for 2-D geometries, you can even implement it on a spreadsheet! (You may be worried because the world — and spreadsheet cells — appear to be described by real numbers instead of binary numbers. We’ll sweep this objection under the rug by noting that real numbers can be approximated to arbitrary precision by binary numbers, patterns of 0s and 1s.) Because the laws of nature seem to be expressible locally by such very simple rules, people naturally wonder if the entire universe is, at the root, one big CA with some very simple rules.

There are two areas of physics in particular that have proven to be very difficult to explain, and that have recently forced physicists to develop new fields of mathematics. One is elementary particles, where things are not understood at the very small scales and mathematical descriptions tend to blow up. The other is in the macroscopic regime where we have particle interactions (e.g., in fluids) leading to complex nonlinear behavior such as turbulence and associated chaotic dynamics. In both cases, people naturally search for a set of simple underlying rules to explain the complex behavior. In particle physics, Wheeler speaks of the “quantum foam” at the scale of the Planck length, about 10-33 cm, where space-time itself is strongly perturbed by quantum gravity. Can rules at that tiny scale, perhaps given by a CA on a lattice, lead to the observed phenomenology of particle physics at much larger scales such as 10-17 cm? Likewise, people have observed chaotic behavior arising out of 2-D CAs, along with universal scaling parameters for the phenomena, such as period-doubling in chaos, that arise from very simple dynamical rules for the system evolution. So it is natural to hope that CAs can model and perhaps even explain the most difficult fields of physics. And why stop there? What about conscious intelligence, a mystery so slippery and deep that the mind is completely boggled at its contemplation? Could we possibly be CAs?

Edward Fredkin, a physicist at Boston University, has spent much of his career on the search for the rules of the universe based on the assumption that space and time are discrete. A good introduction to his thinking is his 1992 paper, A new cosmogony. In 2002, Stephen Wolfram published his Opus Magnus, A new kind of science, a 1200 page treatise on cellular automata based on unpublished work he did over the past 10 years. Wolfram, who got his PhD in physics from CalTech at age 20, has a history of brilliant work, including founding the company (of his name) that makes Mathematica. Like Julian Schwinger, his motto could well be “If you can’t join ‘em, beat ‘em,” but unlike Schwinger, Wolfram is still in the game. I expect Wolfram to make some important observations in this field.