BLIND SOURCE SEPARATION OF PARTIAL AND FULL TRANSPARENCY IMAGE USING IMAGE SEPARATION ALGORITHM
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 4
Abstract
The problem of blind separation of multiple source layers from their linear mixtures with unknown mixing coefficients and unknown layer motions. Such mixtures or Full Transparency or Superimposed image can occur when one takes photos through a transparent medium, such as window glass, and the camera or the medium moves between snapshots. Blind Source Separation (BSS) algorithm is to estimate both layer motions and linear mixing coefficients and then recover the all layers. In this method can handle general parameterized motions, including rotations, scaling, translations, and other transformations. Additionally the layers numbers are automatically identified and recovered, in the underdetermined cases where mixtures are fewer than layers. The Blind separation algorithm (BSS) is to handle mixtures with not only unknown mixing coefficients but also unknown parameterized layer motions are extended. This work addresses the separation of images that occurs when a document is scanned or photographed and the back page shows through front page (Ink Bleeding). This effect can be removing in partial paper transparency (show-through) and/or to bleeding of the ink through the paper (bleed-through).
Authors and Affiliations
Narayana Murthy D, T. Sukumar
Improvisation of Identity, Trustworthiness and Privacy in Social Network
The expanding notoriety of informal community administrations (SNS), being utilized by a great many individuals ordinary, has emerged some security and protection issues. While clients must be allowed to pick which m...
Traffic Protection against Link and Node Failures Using Fast Re-Route for MPLS Networks
The increase of data transfer over the Internet is complexity process for providing internet services as badly affected the quality of service and the dataflow. To reduce this problem, in this paper I am introducing a...
Secured Bluetooth Authentication Using Artificial Neural Networks
Authentication in wireless networking is a mechanism to proof identities and avoid masking. The use of wireless devices and technology has made rapid growth in the market. In all such devices, user authentication is...
Side-Channel Passive Attacks Implementation to Cryptographic Hardware Using FPGA
This paper dealt with an FPGA based test bed used for injecting faults through clock glitches, to result in setup and hold violations. The UART interface is realized on FPGA to provide PC based controlling for this f...
Enhanced Sparse Coding Technique For Top Image List
Image reranking is successful for enhancing the execution of a content based picture seek. Be that as it may, existing reranking algorithms are constrained for two principle reasons: 1) the literary meta-information...