An Analytical Study of Different Image Inpainting Techniques
Journal Title: Indian Journal of Computer Science and Engineering - Year 2012, Vol 3, Issue 3
Abstract
Inpainting is the technique of filling in holes in an image to preserve its overall continuity. Applications of this technique include the restoration of old photographs and damaged film; removal of superimposed text like dates, subtitles, or publicity; and the removal of entire objects from the image like microphones or wires in special effects. In this paper, we analyze different digital inpainting algorithms for still images. The simultaneous propagation of texture and structure information achieved. The texture image repaired by the exemplar –based method; for the structure image, the Laplacian operator is used to enhance the structure information. The Laplacian image is inpainted by the exemplar-based algorithm and the Poisson equation based reconstruction is applied thereafter. In 8 pixel neighborhood method, central pixel value is identified by investigating surrounded 8 neighborhood pixel properties like color variation, repetition, intensity and direction. Finally, in 2e based inpainting technique, original image analyzed at encoder side so that some blocks removed during encoding. At decoder side, the image is restored by 2e-based inpainting and texture synthesis. Finally, we compare the computational cost of all the algorithms.
Authors and Affiliations
SUPRIYA CHHABRA , RUCHIKA LALIT , Dr. S. K. SAXENA
Assessment of Breastfeeding practices in Ethiopia using different data mining techniques
Breastfeeding is one of the critical issues in Ethiopia because researches show that 24.0% - 27.0% of infant death in Ethiopia is due to poor breastfeeding practices. UNICEF has been reported that a good promotion of bre...
Refined Anchor Free Localisation for Wireless Sensor Monitoring in Wireless Sensor Networks
Localisation is required for many ad-hoc sensor network applications. In this paper we look at the limitations of the existing localisation technique, Anchor Free Localisation (AFL) with regards to coping with non-unifor...
SHORT SURVEY ON GRAPHICAL DATABASE
This paper explores the features of graph databases and data models. The popularity towards work with graph models and datasets has been increased in the recent decades .Graph database has a number of advantage over the...
VARIABLE RATE STEGANOGRAPH Y IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
In this paper three image steganography methods with variable rate of embedding are proposed. In the first method, called two neighbor method the two neighboring pixels such as upper and left are exploited to take embedd...
NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC
IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts...