Comparative analysis between PCA and Fast ICA based Denoising of CFA Images for Single-Sensor Digital Cameras.
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
Denoising of natural images is the fundamental and challenging research problem of Image processing. This problem appears to be very simple however that is not so when considered under practical situations, where the type of noise, amount of noise and the type of images all are variable parameters, and the single algorithm or approach can never be sufficient to achieve satisfactory results. Single-sensor digital color cameras use a process called color demosaicking to produce full color images from the data captured by a color filter array (CFA).Normally the quality of images are degraded because of sensor of camera. In this paper we have developed PCA, FASTICA based algorithm with K-means clustering and compared the both .Performance evaluation is done with PSNR, WPSNR, SSIM, Correlation Coefficient
Authors and Affiliations
Shawetangi kala , Raj Kumar Sahu
Data Integrity and Security in Cloud
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. The important concerns that need to be addressed in cloud computing is to assure the customer of the integrity i.e. correc...
Improving the Efficiency of Ranked keyword Search over Cloud Data
In this paper we define and solve the effective yet secure ranked keyword search over encrypted cloud data. We used order preserving symmetric encryption to protect the cloud data. Even though there are lots of searching...
An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields
AES is the most effective algorithm for network security that is more confidential, reliable and robust. A key step in the Advanced Encryption Standard (AES) algorithm is the subbyte transformation and its inverse . The...
Survey on Network Security, Threats & Firewalls
Network security is an important task that must be seriously considered when designing a network. It defined as the policies and procedures followed by a network administrator to protect the network devices from th...
Mining on Medicine Data
In this paper, we propose an approach for Mining as well as data clustering, we have taken some medical data set we not only able to find out the disease detail as well as clustering. Cluster analysis itself is not...