Fractal Image Compression & Algorithmic Techniques
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 4
Abstract
Fractal image compression is a very advantageous technique based on the representation of an image by a contractive transform. Based on fractals Fractal compression is a lossy compression method for digital images. The method is best suited for textures and natural images, relying on the fact that parts of an image often resemble other parts of the same image. In this paper we review and discuss about the Key issues of image compression, need of compression, its principles, and classes of compression and various compression algorithm of image. We review and discuss the advantages and disadvantages of these algorithms for compressing images for lossless and lossy Techniques.
Authors and Affiliations
Dr. K. Kuppusamy , R. Ilackiya
FPGA based implementation of Interoperability of Wireless mesh Network and Wi-Fi
Wireless Mesh Networks (WMNs) is a key technology for next generation wireless networks, showing rapid progress and many new inspiring applications. IEEE 802.11s is the standard defined for WLAN mesh networks.One importa...
Detecting and Alerting Tcp –Ip Packets againt TCP SYN attacks
Transmission Control Protocol Synchronized ( TCP SYN) Flood has become a problem to the network management to maintain the network server from being attacked by the malicious attackers. Possibly one of the problems...
A Brief Survey On Document Clustering Techniques Using MATLAB
Document clustering is a more specific technique for unsupervised document organization, it is generally considered to be a centralized process. Clustering methods can be used to automatically group the retrieved documen...
A K-Anonymity Privacy-Preserving Location Monitoring System for Wireless Sensor Networks with Nymble Secure System
Anonymizing wireless sensor networks allow users to access services privately by using a series of routers to hide the client’s IP address from the server. As a result, administrators block all known exit nodes of...
A Survey On Report Based Secure Payment Scheme For Multihop Wireless Networks
Multihop wireless networks (MWNs) composed of two end nodes is carried out through a number of intermediate nodes whose function is to relay information from one point to another, without using any kind of fixed wired in...