Edge Preserving MAP Estimation of Images Using Filtering Approach and Wavelet Based Mehods
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 7
Abstract
This paper presents an effective approach for image restoration in the presence of both blur and noise.Here the image is divided into independent regions. Each region is modelled with a WSS Gaussian prior. This algorithm uses wavelet based methods for image denoising. Classical Wiener filter theory is used to generate a set of convex sets in the solution space, with the solution to the MAP estimation problem lying at the intersection of these sets.The algorithm is suitable for a range of image restoration problems. It provides a computationally efficient means to deal with the shortcomings of Wiener filtering without sacrificing the computational simplicity of the filtering approach. This method provides a better restored image.
Authors and Affiliations
Hitha Mohanan , Swagatha
“SPOOFING”……. Headache to IT world.
The whole world is engaged to provide the complete security to information when it is in network. But the techniques somewhere fail to overcome on attacks. One of them is Spoofing. Spoofing is an active security...
Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system
Intrusion detection system must be capable of known and unknown vulnerabilities. We already studied the previous problems which includes detection of known vulnerabilities and unknown vulnerabilities. In order to obtai...
P300 based Brain Computer Interface for Disabled
A Brain Computer Interface (BCI) is a communication system that translates brain signals into commands for a computer. BCI is a communication system that recognizes user’s command only from his or her brainwaves...
An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields
AES is the most effective algorithm for network security that is more confidential, reliable and robust. A key step in the Advanced Encryption Standard (AES) algorithm is the subbyte transformation and its inverse . The...
Effective Load Distribution Over Multipath Networks to Control the Delay
An effective model of delay-controlled Load distribution becomes essential to efficiently utilize such parallel paths for multimedia data transmission and real-time applications, which are commonly known to be...