This work moves beyond closed-set segmentation (Mask2Former) to open-set detection using SAM and Grounding DINO.This work moves beyond closed-set segmentation (Mask2Former) to open-set detection using SAM and Grounding DINO.

Foundation Models for 3D Scenes: DINOv2 vs. CLIP for Instance Differentiation

2025/12/11 02:00

Abstract and 1 Introduction

  1. Related Works

    2.1. Vision-and-Language Navigation

    2.2. Semantic Scene Understanding and Instance Segmentation

    2.3. 3D Scene Reconstruction

  2. Methodology

    3.1. Data Collection

    3.2. Open-set Semantic Information from Images

    3.3. Creating the Open-set 3D Representation

    3.4. Language-Guided Navigation

  3. Experiments

    4.1. Quantitative Evaluation

    4.2. Qualitative Results

  4. Conclusion and Future Work, Disclosure statement, and References

2.2. Semantic Scene Understanding and Instance Segmentation

f 3D scenes. This domain has been thoroughly explored using closed-set vocabulary methods, including our prior work [1], which utilizes Mask2Former [7] for image segmentation. Various studies [18, 19, 20] have adopted a similar approach to achieve object segmentation, resulting in a closed-set framework. While these methods are effective, they are constrained by the limitation of predefined object categories. Our approach employs SAM [21] to acquire segmentation masks for open-set detection. Moreover, our methodology, distinct from many existing techniques that depend heavily on extensive pre-training or fine-tuning, integrates these models to forge a more comprehensive and adaptable 3D scene representation. This emphasizes enhanced semantic understanding and spatial awareness.

\ To improve the semantic understanding of the objects detected within our images, we harness detailed feature representations using two foundational models: CLIP [9] and DINOv2 [10]. DINOv2, a Vision Transformer trained through self-supervision, recognises pixel-level correspondences between images and captures spatial hierarchies. Compared to CLIP, DINOv2 more effectively distinguishes between two distinct instances of the same object type, which poses challenges for CLIP.

\ It’s crucial to differentiate individual instances following the semantic identification of objects. Early methods employed a Region Proposal Network (RPN) to predict bounding boxes for these instances [22]. Alternatively, some strategies suggest a generalized architecture for managing panoptic segmentation [23]. In our preceding approach, we utilized the segmentation model Mask2Former [7], which employs an attention mechanism to isolate object-centric features. Recent research also tackles semantic scene understanding using open vocabularies [24], utilizing multi-view fusion and 3D convolutions to derive dense features from an open-vocabulary embedding space for precise semantic segmentation. Our current pipeline leverages Grounding DINO [25] to generate bounding boxes, which are then input into the Segment Anything Model (SAM) [21] to produce individual object masks, thus enabling instance segmentation within the scene.

\

:::info Authors:

(1) Laksh Nanwani, International Institute of Information Technology, Hyderabad, India; this author contributed equally to this work;

(2) Kumaraditya Gupta, International Institute of Information Technology, Hyderabad, India;

(3) Aditya Mathur, International Institute of Information Technology, Hyderabad, India; this author contributed equally to this work.

(4) Swayam Agrawal, International Institute of Information Technology, Hyderabad, India;

(5) A.H. Abdul Hafez, Hasan Kalyoncu University, Sahinbey, Gaziantep, Turkey;

(6) K. Madhava Krishna, International Institute of Information Technology, Hyderabad, India.

:::


:::info This paper is available on arxiv under CC by-SA 4.0 Deed (Attribution-Sharealike 4.0 International) license.

:::

\

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Vitalik Buterin Suggests Ethereum Security Intact Amid Recent Glitch

Vitalik Buterin Suggests Ethereum Security Intact Amid Recent Glitch

The post Vitalik Buterin Suggests Ethereum Security Intact Amid Recent Glitch appeared on BitcoinEthereumNews.com. Ethereum remains secure despite a recent network glitch caused by a Prysm client bug that temporarily halted block finalization. Vitalik Buterin emphasized that this does not undermine the network’s core security, as blocks continue to be produced and executed, behaving like Bitcoin’s probabilistic model during such pauses. Vitalik Buterin assures that temporary loss of finality does not compromise Ethereum’s overall security model. The glitch primarily impacted secondary systems like bridges and Layer 2 solutions, not the base chain. Experts compare Ethereum’s response to Bitcoin’s, where probabilistic finality prevents chain rewrites while allowing continued operations. Ethereum secure despite recent glitch: Vitalik Buterin explains why the network’s resilience shines through temporary finality pauses. Discover key insights on blockchain reliability. Stay informed on crypto updates—read more now. What Did Vitalik Buterin Say About Ethereum’s Security After the Recent Glitch? Ethereum remains secure even amid the recent network disruption, according to Vitalik Buterin, Ethereum’s co-founder. He clarified that the Prysm client bug, which briefly interrupted block finalization, does not pose a threat to the protocol’s integrity. Instead, it highlights the network’s design for graceful degradation, where core functions persist without deterministic certainty. How Does Ethereum Behave During Finality Pauses? During the incident, Ethereum temporarily shifted to a probabilistic security model similar to Bitcoin’s, as noted by blockchain researchers. Fabrizio Romano Genovese, an Oxford PhD and Ethereum protocol specialist, explained that many blockchains, including Bitcoin, rely on growing difficulty in rewriting history rather than instant finality. In Ethereum’s case, blocks kept being created and executed, preventing any chain halt, though secondary services like cross-chain bridges experienced delays. This behavior underscores the network’s robustness, with no risk of approving incorrect transaction histories. Genovese added that such events reveal the need for better fallback mechanisms in dependent infrastructure, ensuring smoother operations in future occurrences. Statistics from the…
Share
BitcoinEthereumNews2025/12/11 16:40