An Extended Performance Comparison of Colour to Grey and Back using the Haar, Walsh, and Kekre Wavelet Transforms
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 9
Abstract
The storage of colour information in a greyscale image is not a new idea. Various techniques have been proposed using different colour spaces including the standard RGB colour space, the YUV colour space, and the YCbCr colour space. This paper extends the results described in [1] and [2]. While [1] describes the storage of colour information in a greyscale image using Haar wavelets, and [2] adds a comparison with Kekre’s wavelets, this paper adds a third transform – the Walsh transform and presents a detailed comparison of the performance of all three transforms across the LUV, YCbCr, YCgCb, YIQ, and YUV colour spaces. The main aim remains the same as that in [1] and [2], which is the storage of colour information in a greyscale image known as the “matted” greyscale image.
Authors and Affiliations
Dr. H. B. Kekre , Dr. Sudeep D. Thepade , Adib Parkar
IoT based Temperature and Humidity Controlling using Arduino and Raspberry Pi
Internet of Things (IoT) plays a pivotal part in our mundane daily life by controlling electronic devices using networks. The controlling is done by minutely observing the important parameters which generate vital pieces...
Innovative Framework for e-Government adoption in Saudi Arabia: A Study from the business sector perspective
E-Government increases transparency and im-proves communication between the government and the users. Providing e-Government services to business sector is a fun-damental mission of governmental agencies in Saudi Arabia....
ABCVS: An Artificial Bee Colony for Generating Variable T-Way Test Sets
To achieve acceptable quality and performance of any software product, it is crucial to assess various software components in the application. There exist various software-testing techniques such as combinatorial testing...
New Transport Layer Security using Metaheuristics and New Key Exchange Protocol
The easiness of data transmission is one of the information security flaws that needs to be handled rigorously. It makes eavesdropping, tampering and message forgery by malicious more simple. One of the protocols develop...
A Novel Permutation Based Approach for Effective and Efficient Representation of Face Images under Varying Illuminations
Paramount importance for an automated face recognition system is the ability to enhance discriminatory power with a low-dimensional feature representation. Keeping this as a focal point, we present a novel approach for f...