Deblocking Filtering Method Based on Separate Modes
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 6
Abstract
The compression of digital images has received wide attention of researchers since it reduces the memory, bandwidth and transmission requirements. One of the major drawbacks of the block-based DCT compression methods is that it may result in visible artifacts at block boundaries due to coarse quantization of the coefficients. This paper proposes a new post-filtering algorithm to remove coding artifacts in block-based DCT compressed medical images. The blocking artifact in the smooth and non-smooth regions are removed by modifying a few DCT coefficients while an edge preserving smoothing filter is applied to the intermediate region. Experimental results illustrating the performance of proposed method on the basis of PSNR and SF indices are presented and evaluated. Compared with other methods, the proposed one achieves better detail preservation and artifact removal performance with lower computational complexity.
Authors and Affiliations
Jagroop Singh
Closed Regular Pattern Mining Using Vertical Format
Discovering interesting patterns in transactional databases is often a challenging area by the length of patterns and number of transactions in data mining, which is prohibitively expensive in both time and space. Closed...
Prediction model for bug re-opens in Mozilla Firefox
Bug fixing becomes the most crucial activity in the software development process. Fixing bugs accounts a large amount of time of software development task. Sometimes these bug fixes are incomplete or inappropriate and re...
Vision Based Gesture Recognition for Alphabetical Hand Gestures Using the SVM Classifier
In this paper we discuss how a Gesture Recognition system for Alphabetical Hand Gestures is built. The main motive was to develop a system that can simplify the way humans interact with computers. The system is designed...
Identity-Based Localization Attacks in Wireless Networks
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cry...
Speaker Independent Isolated Tamil Words Recognition System using Different Classifiers
The paper is to build a speaker independent isolated speech recognition system for Tamil Language. The system consists of four steps: first step involves recording of Tamil spoken words using high quality studio micropho...