Comparative study of Gradient based image denoising methods
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 7
Abstract
Images are playing very key role in various applications like medical imaging, remote sensing, and scientificresearch and in all these applications image clarity plays a major role. Any image that is captured has to be processed for noise removal because noise in image is unavoidable and mixes with image either during capturing or during transmission. Various image denoising methods are developed earlier and are also working for better one. Among various methods developed Sparsity based Non local means methods are giving better denoising results. Main drawbacks of image denoising methods are they smoothens the fine details of the denoised image. This drawback can be overcome by using gradient histogram as reference while restoring the image. This paper discuss about some of gradient based image denoising methods and their comparative results.
Authors and Affiliations
SUSHMA KALLURI , Dr. Renuka Devi S. M.
Handwritten Character Recognition with Feedback Neural Network
The ability of a machine to interpret handwritten characters from sources like paper document, photograph, etc. to some editable computerized form is the first and foremost aim of handwritten character recognition system...
IP Network Recovery Based on Security Managements
Computer networks are complex systems, often routing hundreds, thousands, or even millions of data packets every second. Therefore, in order for networks to handle large amounts of data, it is important that the data rou...
USER REQUIREMENTS WEIGHT BASED APPROACH TO IDS SELECTION FOR WLAN
A variety of featured packed Wireless Intrusion Detection System (WIDS) products are available in the market. They include commercial as well as open source products. It is for user to decide which will be the best WIDS...
Stepping Towards Component-Based Software Testing Through A Contemporary Layout
Component- based software development is aimed for developing new software speedily by using minimum resources but outcome the maximum worth. Various components are integrated all together to form the successful software...
Enhancing The Security of Caesar Cipher Using Double Substitution Method
Cryptography comes from the Greek words for “secret writing”. The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for conve...