نتایج جستجو برای: روش jpeg 2000

تعداد نتایج: 541365  

2008
Takatoshi Kato Shun'ichi Honma Yasuo Matsuyama Tetsuma Yoshino Yuuki Hoshino

Sensibility-aware image retrieval methods are presented and their performances are compared. Three systems are discussed in this paper: PCA/ICA-based method called RIM (Retrieval-aware IMage format), JPEG, and JPEG2000. In each case, a query is an image per se. Similar images are retrieved to this query. The RIM method is judged to be the best settlement in view of the retrieval performance and...

2009
Patrick Grother

Abstract: This paper gives performance-based results for the application of a leading recognition algorithm applied to standardized iris imagery. The implementation was evaluated in NIST’s IREX program. The program was conducted in cooperation with the iris recognition industry to evaluated whether standardized image formats can be interoperable and compact. This is required for federated appli...

Journal: :EURASIP J. Adv. Sig. Proc. 2008
Max Agueh Jean-Francois Diouris Magaye Diop François-Olivier Devaux Christophe De Vleeschouwer Benoit M. Macq

1 Institut de Recherche en Electrotechnique et Electronique de Nantes Atlantique (IREENA), Equipe Communications Numériques et Radiofréquences, Rue Christian Pauc, La chantrerie, BP 50609, 44306 Nantes cedex 3, France 2Ecole Supérieure Polytechnique, Université Cheikh Anta Diop de Dakar (UCAD), BP 5085 Dakar, Senegal 3Communications and Remote Sensing Laboratory, FSA/TELE, Bâtiment Stévin, Plac...

2015
Pascal Peter Joachim Weickert

Diffusion-based image compression methods can surpass state-of-the-art transform coders like JPEG 2000 for cartoon-like images. However, they are not well-suited for highly textured image content. Recently, advances in exemplar-based inpainting have made it possible to reconstruct images with non-local methods from sparse known data. In our work we compare the performance of such exemplar-based...

2002
Hui Cheng Guotong Feng Charles A. Bouman

Effective document compression algorithms require scanned document images be first segmented into regions such as text, pictures and background. In this paper, we present a document compression algorithm that is based on the 3-layer (foreground/mask/background) MRC (mixture raster content) model. This compression algorithm first segments a scanned document image into different classes. Then, ea...

Journal: :Information Fusion 2007
Afzel Noore Richa Singh Mayank Vatsa

This paper presents a novel multi-level wavelet based fusion algorithm that combines information from fingerprint, face, iris, and signature images of an individual into a single composite image. The proposed approach reduces the memory size, increases the recognition accuracy using multimodal biometric features, and withstands common attacks such as smoothing, cropping, JPEG 2000, and filterin...

2011
Daniel Pascual Biosca Max Agueh

In this paper we study the impact of interleaving on JPEG2000 images and video transmission through wireless channels. Based on interleaving impact evaluation, we derive a lower bound limit for the successful images decoding rate in wireless environments. Since the successful decoding rate is of central importance to guarantee Quality of Service to wireless clients, we rely on the derived limit...

Journal: :J. Electronic Imaging 2009
Alan C. Bovik

• A complete introduction to the basic and intermediate concepts of image processing from the leading people in the field • A CD-ROM contains 70 highly interactive demonstration programs with user friendly interfaces to provide a visual presentation of the concepts • Up-to-date content, including statistical modeling of natural, anistropic diffusion, image quality, and the latest developments i...

2008
Anindya Sarkar Kenneth Sullivan B. S. Manjunath

In this paper we attempt to quantify the “active” steganographic capacity the maximum rate at which data can be hidden, and correctly decoded, in a multimedia cover subject to noise/attack (hence active), perceptual distortion criteria, and statistical steganalysis. Though work has been done in studying the capacity of data hiding as well as the rate of perfectly secure data hiding in noiseless...

Journal: :IEEE Trans. Multimedia 2003
Jin Li Hong-Hui Sun

A new effective mechanism is proposed for the browsing of large compressed images over the Internet. The image is compressed with the JPEG 2000 into one single bitstream and put on the server. During the browsing process, the user specifies a region of interest (ROI) with certain spatial and resolution constraint. The browser only downloads the portion of the compressed bitstream that covers th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید