A New Fuzzy Gaussian Noise Removal Method for Gray-Scale Images
Journal Title: International Journal of Computer Science and Information Technologies - Year 2011, Vol 2, Issue 1
Abstract
A New Fuzzy Filter that adopts Fuzzy Logic is proposed in this paper which removes Gaussian Noise from the Corrupted Gray scale Images which is also good for Impulsive and multiplicative Noise. This Method Consists of Two Steps.1) Estimating the Noise 2) Smoothing according to the Noise Level. It uses Fuzzy concepts to decide whether a pixel in the Image is a Noisy one or not for conducting smoothing operation while preserving Image Detail. Many popular Algorithms consider Image Noise Level as an important quantity to adjust the Image Parameters for Image De-noising. i.e. they need an account for variations in image Noise levels. A stronger noise removal setting makes resultant image blurry. There are mainly two problems associated with these Algorithms: Edge Detection and Feature Preserving We Illustrate a new method of De-noising of Images which uses a correction term to de-noise the Images where above mentioned problems are minimized to an acceptable range and we obtained good results for different specified number of Iterations of the Algorithm. These Results illustrates that the proposed method can be used as an effective Noise removal method.
Authors and Affiliations
K. Ratna Babu , Dr K. V. N. Sunitha
A Novel Approach for Data Security Enhancement Using Multi Level Encryption Scheme
In this Information era, where all the transactions and files are digitized, the need for secure channel is eminent for transactions and confidential files. Information security is vital for many systems like core bankin...
Role of soft computing as a tool in data mining
we live in a world where we can be overwhelmed with information; therefore it has become increasingly important to extract relevant information from the explosive amount of data for. Data Mining is the iterative and inte...
Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation
-A protocol is secure if th e parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute th e inputs using the function f and give the re sult t o the respec tive parties...
An Abstract memory model describing the interaction between thread and memory with debugger tools
This paper describe the multithreaded execution and data race detectors which are commonly viewed as debugging tools.The C++ Standard defines single-threaded program execution. Basically, multithreaded execution require...
E-Governance and Effective Deliverance of Information and Services to Citizens Architecture
By Progression of information technology resources in India, great opportunity comes to deliver information and services to citizens and business. Proper distribution and delivery of government information and services t...