نتایج جستجو برای: psnr

تعداد نتایج: 4218  

2012
Sumathi Poobal G. Ravindran

Image compression is one of the most important applications Digital Image Processing. Advanced medical imaging requires storage of large quantities of digitized clinical data. Due to the constrained bandwidth and storage capacity, however, a medical image must be compressed before transmission and storage. There are two types of compression methods, lossless and lossy. In Lossless compression m...

2004

The following comparative quality analysis uses visual inspection, difference images, and PSNR (peak signal-tonoise ratio) as measures of image quality for comparing CineForm's 10-bit Visually PerfectTM codec to DVCPRO HD. PSNR analysis uses a standard mathematical model to measure an objective difference between two images. It is commonly used in the development and analysis of compression alg...

Journal: :International Journal of Science and Research Archive 2023

Newly World Wide Web technologies, there is need to secure data. For securing data cryptography and other relevant techniques were introduced. Multimedia stream, traditional textual based encryption schemes are not successful so develop new schemes. During transmission storage over a network, multimedia content such as digital images information vulnerable unauthorized access. The used may be g...

Journal: :The Journal of the Korean Institute of Information and Communication Engineering 2010

1995
J Villasenor B Belzer J Liao

k Re[a k ] Im[a k ] Total length = 14, a k = a 10k 6 length, orthogonality, and image quality. [10] D. Le Gall and A. Tabatabai, \Subband coding of digital images using symmetric short kernel lters and arithmetic coding techniques," Proc. ICASSP '88, pp. 761-5, 1988. 5 comparison, the 9-tap/7-tap biorthogonal lter discussed in [2] had a mean PSNR of 29.67 dB and the well-known 5-tap/3-tap biort...

Journal: :Bulletin of Electrical Engineering and Informatics 2022

Internet simplified digital data transferring. This needs to be secured; so securing becomes an important concern. Steganography provides security for by inserting it into a cover and concealing it. In this paper, steganography algorithm was introduced. used the stationary wavelet transform (SWT) اhybrid-matrix decomposition techniques, singular value (SVD) QR factorization conceal video in ano...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1387

امروزه ارسال و دریافت صحیح داده¬ها از طریق کانال¬های غیر ایده¬آل مخابراتی یکی از چالش¬های مهم در علم مخابرات می¬باشد. با توجه به کاربرد روزآفزون روش کدینگ چند نسخه¬ای تصویر(mdc)، از این روش جهت پنهان سازی خطا در هنگام انتقال از کانال¬های غیر ایده¬آل استفاده می¬شود. در این پایان نامه با ترکیب روش کدینگ چند نسخه¬ای با تبدیل lot خطاهای اتفاق افتاده و نسخه¬های گم شده در طول کانال بازسازی می¬شوند. ر...

2007
Andreas Westfeld

We present our results in the first BOWS challenge (Break Our Watermarking System). There were three given digital photos containing an invisible watermark that was introduced using informed coding and embedding. The goal was to remove the watermark from the photos while keeping a minimum quality of at least 30 dB PSNR (peak signal to noise ratio). We focus on the method used to win the second ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید