A comparison Approach in Image Optimization Techniques
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 1
Abstract
The capturing of multiple low-resolution images taken of the same scene results in a distortion between each image. Image registration is the process of determining this distortion. In this paper, we examine the hypothesis that the visual quality of a reconstructed highresolution image improves when accurate image registration is achieved. Here picture images are registered using two algorithms. The first registration algorithm based on an optimization approach while the other is based on the RANSAC algorithm. We find that the optimization approach is severely hampered by higher degree transforms such as affine transforms. This is attributed to the increased number of parameters requiring optimizing. First algorithm involved reconstructing an image when perfect registration was achieved, and comparing the results to when the RANSAC algorithm was employed. The results suggested that the visual quality of the reconstructed images were higher for perfect registration. We also found that the visual quality of reconstructed images was higher when images were registered using the RANSAC algorithm, as compared to an optimization approach.
Authors and Affiliations
S. S. Panda, Arun Kumar Dash
Medium Voltage High-Power Converter Topology for the Large Permanent Magnet Wind Generator Systems
This paper proposes a modular, medium voltage, highpower converter topology for the large permanent magnet wind generator system, eliminating the grid-side step-up transformer, which is desirable for both onshore and o...
Image Compression Technique Using Different Wavelet Function
With the development of Digital image processing technology there are several applications. One of the applications is an image compression. The paper assigned a comparative study has been done using different wavele...
Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure
A Vampire attack is the composition and transmission of a message that sources more power to be consumed by the network than if an open node transmitted a message of the same size to the same destination although usi...
Local Sharing of Multiple Torrents in Peer to Peer System
The rapid growth traffic of Peer-toPeer applications, especially BitTorrent, is putting a lot of pressure to Internet Service Providers. In this paper, we examine the existence of the locality through a large-scale hy...
STBC Transceiver System Using Tomlinson-Harashima pre coding
A precoding configuration for double space-time block coding (STBC) system is investigated in this paper, i.e., the joint process of STBC and dirty paper coding (DPC) methods. These methods are utilized for evading d...