Image Denoising Using Curvelet Transform Using Log Gabor Filter
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
— In this paper we propose a new method to reduce noise in digital image. Images corrupted by Gaussian Noise is still a classical problem. To reduce the noise or to improve the quality of image we have used two parameters i.e. quantitative and qualitative. For quantity we will compare peak signal to noise ratio (PSNR). Higher the PSNR better the quality of the image. For quality we compare Visual effect of image. Image denoising is basic work for image processing, analysis and computer vision. The Curvelet transform is a higher dimensional generalization of the Wavelet transform designed to represent images at different scales and different angles.In this paper we proposed a Curvelet Transformation based image denoising, which is combined with Gabour filter in place of the low pass filtering in the transform domain. We demonstrated through simulations with images contaminated by white Gaussian noise. Experimental results show that our proposed method gives comparatively higher peak signal to noise ratio (PSNR) value, are much more efficient and also have less visual artifacts compared to other existing methods.
Authors and Affiliations
Assistant Professor Vishal Garg , Scholar Nisha Raheja
Data mining techniques for detecting the crime hotspot by using GIS
A GIS is a computer system capable of capturing, storing, analyzing, and displaying geographically referenced information. GIS works by relating information from different sources. The power of a GIS comes from the...
Survey on Effective Software Effort Estimation Techniques
Software effort estimation is a very important task in the software engineering field. In this paper gives the overview about the software effort estimation techniques. The techniques are expert estimation, paramet...
A Comprehensive Study of Data Mining and Application
Data mining refers to extracting or ―mining‖ knowledge from large amounts of data. Data mining involves an integration of techniques from multiple disciplines such as database technology, statistics, machine learni...
An efficient unobservable routing scheme resistant against DoS attacks
Privacy protection for ad hoc networks with low-power wireless devices and lowbandwidth network connection is a very challenging task. A number of anonymous routing schemes have been proposed for ad hoc networks to...
Open-Source Network Simulation Tools: An Overview
In the network research area, implementation of a whole network in real world is not easily possible because establishing of network in a real world is very difficult. A single test bed containing multiple networked comp...