Feeds

Your mind's '.brain' jpeg-like picture file format probed

Cunning noggin algorithm favours curves over flatness

Beginner's guide to SSL certificates

Top boffins say they have gained insights into one of the most amazing capabilities of the human brain – its ability to store and recognise visual images. They say that the noggin compresses pictures in a process roughly as efficient in terms of storage space as turning photos into jpegs – but one much superior for the purpose of using the data subsequently.

“Computers can beat us at math and chess,” says neuroscientist Ed Connor, “but they can’t match our ability to distinguish, recognize, understand, remember, and manipulate the objects that make up our world. For now, at least, the ‘.brain’ format seems to be the best compression algorithm around.”

Human eyes produce roughly megapixel imagery, but the brain doesn't have enough storage to cope with much of this so it needs to turn the info into '.brain' files that it can work with later.

Connor and his colleagues' research involved creating a computer simulation of the cells in the "V4" area of primate brains such as yours and mine. It seems that V4 cells' response to images from the eye is strongly sensitive to to the amount of curve or angle in objects perceived. According to a statement accompanying the research:

High-curvature regions are relatively rare in natural objects, compared to flat and shallow curvature. Responding to rare features rather than common features is automatically economical.

According to the braincell sims, compressing out flat, shallow parts of pictures and keeping the curved or pointy bits can yield "an 8-fold decrease in the number of cells responding to each image, comparable to the file size reduction achieved by compressing photographs into the .jpeg format".

But such .brain pictures, stripped of much of the information on flat bits, are still good for subsequent recognition of objects, faces etc.

“Psychological experiments have shown that subjects can still recognize line drawings of objects when flat edges are erased. But erasing angles and other regions of high curvature makes recognition difficult,” says Connor.

The research is outlined in a paper titled A Sparse Object Coding Scheme in Area V4 which was published yesterday in the journal Current Biology. ®

Internet Security Threat Report 2014

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.