Image Compression using Approximate Matching and Run Length
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 6
Abstract
Image compression is currently a prominent topic for both military and commercial researchers. Due to rapid growth of digital media and the subsequent need for reduced storage and to transmit the image in an effective manner Image compression is needed. Image compression attempts to reduce the number of bits required to digitally represent an image while maintaining its perceived visual quality. This study concentrates on the lossless compression of image using approximate matching technique and run length encoding. The performance of this method is compared with the available jpeg compression technique over a wide number of images, showing good agreements.
Authors and Affiliations
Samir Kumar Bandyopadhyay , Tuhin Utsab Paul , Avishek Raychoudhury
Online Paper Review Analysis
Sentiment analysis or opinion mining is used to automate the detection of subjective information such as opinions, attitudes, emotions, and feelings. Hundreds of thousands care about scientific research and take a long t...
Implementation of Blended Learning in Teaching at the Higher Education Institutions of Pakistan
Blended learning has emerged as one of the solutions to address the various needs of Higher Education Institutions around the world. Blended Learning is the combination of traditional classroom and online endeavour. It p...
Predictive Performance Comparison Analysis of Relational & NoSQL Graph Databases
From last three decades, the relational databases are being used in many organizations of various natures such as Education, Health, Business and in many other applications. Traditional databases show tremendous performa...
GDPI: Signature based Deep Packet Inspection using GPUs
Deep Packet Inspection (DPI) is necessitated for many networked application systems in order to prevent from cyber threats. The signature based Network Intrusion and etection System (NIDS) works on packet inspection and...
Modern Authentication Techniques in Smart Phones: Security and Usability Perspective
A smartphone has more advanced computing ability and connectivity than basic featured phones. Presently, we are moving from the Internet society to a mobile society where more and more access to the information is requir...