Image Contrast Enhancement by Scaling Reconstructed Approximation Coefficients using SVD Combined Masking Technique
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 2
Abstract
The proposed method addresses the general issues of image contrast enhancement. The input image is enhanced by incorporating discrete wavelet transform, singular value decomposition, standard intensity deviation based clipped sub image histogram equalization and masking technique. In this method, low pass filtered coefficients of wavelet and its scaled version undergoes masking approach. The scale value is obtained using singular value decomposition between reconstructed approximation coefficients and standard intensity deviation based clipped sub image histogram equalization image. The masking image is added to the original image to produce a maximum contrast-enhanced image. The supremacy of the proposed method tested over other methods. The qualitative and quantitative analysis is used to justify the performance of the proposed method.
Authors and Affiliations
Sandeepa K S, Basavaraj N Jagadale, J S Bhat, Mukund N Naragund, Panchaxri Panchaxri
Lonospheric Anomalies before the 2015 Deep Earthquake Doublet, Mw 7.5 and Mw 7.6, in Peru
Two major earthquakes separated by ∼5 minutes occurred in the same fault in Peru at depths of 606.2 and 620.6 km on November 24, 2015. By using Global Ionospheric Maps (GIMs) from the Center for Orbit Determination in Eu...
Network Packet Classification using Neural Network based on Training Function and Hidden Layer Neuron Number Variation
Distributed denial of service (DDoS) is a structured network attack coming from various sources and fused to form a large packet stream. DDoS packet stream pattern behaves as normal packet stream pattern and very difficu...
Feasibility of automated detection of HONcode conformity for health-related websites
In this paper, authors evaluate machine learning algorithms to detect the trustworthiness of a website according to HONcode criteria of conduct (detailed in paper). To derive a baseline, we evaluated a Naive Bayes algori...
Continuous Path Planning of Kinematically Redundant Manipulator using Particle Swarm Optimization
This paper addresses a problem of a continuous path planning of a redundant manipulator where an end-effector needs to follow a desired path. Based on a geometrical analysis, feasible postures of a self-motion are mapped...
Application of the Tabu Search Algorithm to Cryptography
Tabu search is a powerful algorithm that has been applied with great success to many difficult combinatorial problems. In this paper, we have designed and implemented a symmetrical encryption algorithm whose internal str...