Figure 1
Comparison of the conventional keypoint detection framework and ours. ( |