نتایج جستجو برای: lossy image compressionreconstruction

تعداد نتایج: 380937  

Journal: :CoRR 2015
V. N. Gorbachev L. A. Denisov E. M. Kaynarova

For watermarking of the digital grayscale image its Gray planes have been used. With the help of the introduced representation over Gray planes the LSB embedding method and detection have been discussed. It found that data, a binary image, hidden in the Gray planes is more robust to JPEG lossy compression than in the bit planes.

Journal: :IEICE Transactions 2010
Taizo Suzuki Masaaki Ikehara

This paper presents a paraunitary filter bank (PUFB) based on a direct lifting structure of a building block and its inverse transform for lossless-to-lossy image coding. Although the conventional liftingbased filter banks (LBFBs), which are constructed by lifting structures with integer coefficients and rounding operations, suffer from degradation of coding performance due to much rounding err...

2006
Yao-Tien Chen Din-Chang Tseng Pao-Chi Chang

A wavelet-based lossy-to-lossless image compression technique with polygon-shaped ROI function is proposed. Firstly, split and mergence algorithms are proposed to separate concave ROIs into smaller convex ROIs. Secondly, row-order scan and an adaptive arithmetic coding are used to encode the pixels in ROIs. Thirdly, a lifting integer wavelet transform is used to decompose the original image in ...

1998
Sami Iren Paul D. Amer Phillip T. Conrad

NETCICATS is a software system for empirically evaluating network-conscious image compression, an approach that does not simply optimize compression, but which optimizes overall performance when compressed images are transmitted over a lossy packet-switched network such as the Internet. Based on Application Level Framing, an image is compressed into path-MTU-size Application Data Units (ADUs) a...

2005
AJITH KUMARAYAPA ZHANG YE

In this paper ,we present an overview of the implementation of navel compound algorithm for efficient low bit rate lossy and ROI lossless Mix Coding of massive three dimensional images. Moreover the compound algorithm can be used for multitasking Remote Sensing field operations and efficient 3-D image transmission applications such as overall image viewing at low bit rate lossy coding , nearly ...

2009
A. Zabala X. Pons F. Aulí-Llinàs Joan Serra-Sagristà

This study deals with the effects of lossy image compression in the visual analysis of remotely sensed images. The experiments consider two factors with interaction: the type of landscape and the degree of lossy compression. Three landscapes and two areas for each landscape (with different homogeneity) have been selected. For every of the six study area, color 1:5000 orthoimages have been submi...

2001
Ionildo José Sanches Eduardo Parente Ribeiro

In this work we apply reversible integer wavelet transform to lossless compression of computerized tomography projections (sinograms). Lossy image compression methods can achieve high compression ratios, but sinograms should not loose information during compression process to not affect the image reconstruction.

2007
J. Malý P. Rajmic

Lossy image compression is a subject of great importance today, as it represents an efficient way of reducing storage requirements. This paper proposes an implementation of discrete-time wavelet transform based image codec using Set Partitioning of Hierarchical Trees (SPIHT) coding in the MATLAB environment.

2017
Alexander N. Zemliachenko Sergey K. Abramov Vladimir V. Lukin Benoit Vozel Kacem Chehdi

We address lossy compression of noisy remote sensing images, where the noise is supposed to be spatially uncorrelated (white), additive originally or after a proper variancestabilizing transformation (VST). In such situations, the so-called optimal operation point (OOP) might exist. The OOP is associated with the parameter that controls compression (e.g., quantization step) for which the compre...

Journal: :IEEE Trans. Circuits Syst. Video Techn. 2001
Ching-Yung Lin Shih-Fu Chang

Image authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some practical applications demand techniques that can ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید