A Novel Approach of Using Laplacian Image Enhancement
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 7
Abstract
Contrast enhancement based on multiscale decomposition of images has been proven to be a far versatile and efficient method than other regular techniques. We present here contrast image enhancement by using Laplacian Pyramid. Proposed method enhances the brightness and contrast of an input image by decomposing it into band pass image to improve both local and global contrast of an image. Laplacian Pyramid allows smooth enhancement of large images so that visible artifacts can be avoided that are seen when we apply histogram equalization (HE) technique alone
Authors and Affiliations
Rucha Ashok Deshmukh , Dr. S. A. Ladhake
INTERLEAVED FORWARD ERROR CORRECTING (FEC) CODES BASED ON BINAR SHUFFLE ALGORITHM (B.S.A)
Forward Error Correcting (FEC) is one of the technique is used for controlling errors without sending any retransmission to sender. Example of forward error correcting codes are hamming, lower-density parity-ch...
IDENTIFICATION OF HUMAN THROUGH PALMPRINT: A REVIEW
Palm Print is one of the relatively new physiological biometrics, attracted the researchers due to its stable and unique characteristics. The rich feature information of palm print offers one of the powerful means...
BF-PSO optimized PID Controller design using ISE, IAE, IATE and MSE error criteria
A PID controller is designed using ISE, IAE, ITAE and MSE error criteria for stable linear time invariant continuous system. A BF-PSO PID controller is designed for the plant to meet the desired performance specification...
QARS for Self Reconfiguration Mechanism in Wireless Mesh Networks
Wireless mesh networks (WMNs) are being developed actively and deployed widely for a variety of applications. Wireless Mesh Network (WMN) is a communication network made up of radio nodes organized in a mesh topo...
Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs
Routing in Mobile Ad-Hoc Networks are vulnerable to malicious traffic analysis, harmful attackers can mitigate paths and malicious intermediate nodes breaks security, ineffective reserve of available resources ( u...