Foundations of a rapid de-noising technique in real time image processing applications
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 4
Abstract
A noise is an inherent entity of the imaging technologies that tend to deteriorate the quality of processed images at all levels. At the hardware level they appear as the dark current, shot noise etc. however at the imaging side they may involve artefacts arising from interference patterns, undesired shadows, flickering etc. Eliminating such signals are challenging. Though suggesting a hardware changes and improving the imaging technologies is one way, the problem still remains. An ideal de-noising technique should know apriori various estimates of the noisy data both spatially and temporally. In the context of devising an ideal de-noisy method, I chose to estimate the limits of the intensities levels for the raw data and the edges determined by abs-Laplacian, Robert, Sobel, Prewitt and Canny’s method during day time, with incandescent lightning compared with darkness. Results show that the conventional wavelet based de-nosing can only deteriorate the edge profiles and are not useful in real time applications. abs-Laplacian still stands out as the better edge detection technique in comparison but with large bandgap. There is a negligible change in temporal distributions. A change of 12 units was observed during prolonged imaging of a static background that comprises about 4.7% of the maximum intensity. It appears that prolonged imaging has an effect of sharpening the edges or in other words a set of subsequent images would be useful in enhancing edge profiles. Keeping in view the timing constraints for real time applications, the only choice left in formulating rapid de-noising technique would be in learning the ways the noise manifest itself.
Authors and Affiliations
A Ravi Kant
Operations on Signed Numbers
Signed integers are normally represented using 2’s complement representation. Addition and subtraction of signed numbers is done similar to that of unsigned numbers. However carry (or borrow) is simply ignored. Unlike un...
Algorithms for Mining Association Rules: An Overview
In this paper, we provide the basic concepts about association rule mining and compared existing algorithms for association rule mining techniques. Of course, a single article cannot describe all the algorithms in detail...
Reduce Energy Consumption in WSN Using Nature Stimulated Technique
Wireless sensor networks, sometimes called wireless sensor and actuator networks. Wireless Sensor Network comprise of the nodes operated by the batteries. These nodes are generally deployed in human inaccessible areas to...
Elliptic Curve Public-Key Cryptosystem Over Z(i)
A method to implement elliptic curve public-key cryptosystem over Z(i) is discussed. The method is in fact the same as the technique that works on Galois fields but here works on Z(i). The curve under Z(i) generates more...
A Novel Color Image Segmentation Approach Based On K-Means Clustering with Proper Determination of the Number of Clusters and Suitable Distance Metric
K-Means algorithm is the most commonly chosen technique for color image segmentation task. Although this algorithm is famous for its low complexity and easy implementation, but usually it is seen that the segmentation r...