Enviar búsqueda
Cargar
Developing and comparing an encoding system using vector quantization &
•
0 recomendaciones
•
249 vistas
IAEME Publication
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 9
Descargar ahora
Descargar para leer sin conexión
Recomendados
E017443136
E017443136
IOSR Journals
40120140505005 2
40120140505005 2
IAEME Publication
40120140505005
40120140505005
IAEME Publication
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic scheme
iaemedu
J017426467
J017426467
IOSR Journals
www.ijerd.com
www.ijerd.com
IJERD Editor
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
ijistjournal
13 pradeep kumar_137-149
13 pradeep kumar_137-149
Alexander Decker
Más contenido relacionado
La actualidad más candente
Dj31514517
Dj31514517
IJMER
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
sipij
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IJERA Editor
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
MDABDULMANNANMONDAL
G017444651
G017444651
IOSR Journals
A130104
A130104
irjes
Review paper on segmentation methods for multiobject feature extraction
Review paper on segmentation methods for multiobject feature extraction
eSAT Journals
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ijcsit
Geometric Deep Learning
Geometric Deep Learning
PetteriTeikariPhD
L026070074
L026070074
ijceronline
Visible watermarking using spread spectrum
Visible watermarking using spread spectrum
IAEME Publication
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET Journal
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
ijma
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and secret map techniques
IJECEIAES
K42016368
K42016368
IJERA Editor
La actualidad más candente
(15)
Dj31514517
Dj31514517
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
G017444651
G017444651
A130104
A130104
Review paper on segmentation methods for multiobject feature extraction
Review paper on segmentation methods for multiobject feature extraction
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
Geometric Deep Learning
Geometric Deep Learning
L026070074
L026070074
Visible watermarking using spread spectrum
Visible watermarking using spread spectrum
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and secret map techniques
K42016368
K42016368
Destacado
Decentralized stabilization of a class of large scale linear interconnected
Decentralized stabilization of a class of large scale linear interconnected
IAEME Publication
Experience on using total station surveying for mapping and contouring
Experience on using total station surveying for mapping and contouring
IAEME Publication
Optimization of supply chain logistics cost
Optimization of supply chain logistics cost
IAEME Publication
Comparison of strength properties of bitumen mixed with waste materials as mo
Comparison of strength properties of bitumen mixed with waste materials as mo
IAEME Publication
Effects of surcharge loads on liquefaction parameters of pond ash improved w
Effects of surcharge loads on liquefaction parameters of pond ash improved w
IAEME Publication
Complex dynamics of superior phoenix set
Complex dynamics of superior phoenix set
IAEME Publication
Kekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’s
Kekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’s
IAEME Publication
Optimization of supply chain logistics cost
Optimization of supply chain logistics cost
IAEME Publication
Weight reduction of pressure vessel using frp composite material
Weight reduction of pressure vessel using frp composite material
IAEME Publication
Manifiesto sobre la_literatura_infantil
Manifiesto sobre la_literatura_infantil
vivi8913
Issues in the 21th century sifa arifhodzic - 07061765 - the future of work
Issues in the 21th century sifa arifhodzic - 07061765 - the future of work
07061765
Oscar d monrreal geometria i u3_t2_aa2
Oscar d monrreal geometria i u3_t2_aa2
leppoarts
Jane melisa arzuzar ardila gracias
Jane melisa arzuzar ardila gracias
meloardilla
Guadalinfo actividad 1
Guadalinfo actividad 1
Elisa Isabel Hidalgo Almario
METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...
METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...
Roberto Pepato
Curriculum oculto
Curriculum oculto
Estermartinmartintalavera
Yasuní
Yasuní
josue897
El agua
El agua
Steffi Lok's
01 reales
01 reales
Zuleyma Arroyo
Letramento bibliotecas universitárias
Letramento bibliotecas universitárias
Leonardo Renault
Destacado
(20)
Decentralized stabilization of a class of large scale linear interconnected
Decentralized stabilization of a class of large scale linear interconnected
Experience on using total station surveying for mapping and contouring
Experience on using total station surveying for mapping and contouring
Optimization of supply chain logistics cost
Optimization of supply chain logistics cost
Comparison of strength properties of bitumen mixed with waste materials as mo
Comparison of strength properties of bitumen mixed with waste materials as mo
Effects of surcharge loads on liquefaction parameters of pond ash improved w
Effects of surcharge loads on liquefaction parameters of pond ash improved w
Complex dynamics of superior phoenix set
Complex dynamics of superior phoenix set
Kekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’s
Kekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’s
Optimization of supply chain logistics cost
Optimization of supply chain logistics cost
Weight reduction of pressure vessel using frp composite material
Weight reduction of pressure vessel using frp composite material
Manifiesto sobre la_literatura_infantil
Manifiesto sobre la_literatura_infantil
Issues in the 21th century sifa arifhodzic - 07061765 - the future of work
Issues in the 21th century sifa arifhodzic - 07061765 - the future of work
Oscar d monrreal geometria i u3_t2_aa2
Oscar d monrreal geometria i u3_t2_aa2
Jane melisa arzuzar ardila gracias
Jane melisa arzuzar ardila gracias
Guadalinfo actividad 1
Guadalinfo actividad 1
METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...
METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...
Curriculum oculto
Curriculum oculto
Yasuní
Yasuní
El agua
El agua
01 reales
01 reales
Letramento bibliotecas universitárias
Letramento bibliotecas universitárias
Similar a Developing and comparing an encoding system using vector quantization &
dwm
dwm
Prasanth Vaidya
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
IRJET Journal
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
IJERA Editor
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
IJERA Editor
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
IJERA Editor
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET Journal
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
eSAT Publishing House
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
ijcsit
A0540106
A0540106
IOSR Journals
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
ijsc
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
ijsc
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijripublishers Ijri
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
prjpublications
Influence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processing
iaemedu
An efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using col
IAEME Publication
Compression of Compound Images Using Wavelet Transform
Compression of Compound Images Using Wavelet Transform
DR.P.S.JAGADEESH KUMAR
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
IAEME Publication
Image compression by ezw combining huffman and arithmetic encoder
Image compression by ezw combining huffman and arithmetic encoder
IAEME Publication
Image compression techniques by using wavelet transform
Image compression techniques by using wavelet transform
Alexander Decker
50120130406010
50120130406010
IAEME Publication
Similar a Developing and comparing an encoding system using vector quantization &
(20)
dwm
dwm
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
A0540106
A0540106
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
Influence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processing
An efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using col
Compression of Compound Images Using Wavelet Transform
Compression of Compound Images Using Wavelet Transform
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
Image compression by ezw combining huffman and arithmetic encoder
Image compression by ezw combining huffman and arithmetic encoder
Image compression techniques by using wavelet transform
Image compression techniques by using wavelet transform
50120130406010
50120130406010
Más de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Más de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
Aggregage
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
UiPathCommunity
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Aijun Zhang
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
Matt Ray
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
DianaGray10
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
Seth Reyes
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
Jamie (Taka) Wang
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
DianaGray10
Nanopower In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
Pedro Manuel
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
DianaGray10
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
shyamraj55
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
SkyPlanner
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
Object Automation
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
IES VE
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
GDSC PJATK
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Will Schroeder
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
YounusS2
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
Anna Loughnan Colquhoun
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
David Newbury
Último
(20)
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
Nanopower In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
Developing and comparing an encoding system using vector quantization &
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 503 DEVELOPING AND COMPARING AN ENCODING SYSTEM USING VECTOR QUANTIZATION & EDGE DETECTION Ms. SONALI MEGHARE & Prof. ROSHANI TALMALE Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering, RTMNU, Nagpur ABSTRACT Developing and comparing an encoding system using VQ and edge detection gives a real-time image coding. The edge detection gives the result that the compression is perfect on the basis of finding the edges of the compressed video. The comparison gives the better result than the existing Haar transform with respect to time. The compression ratio is get increased using downsample method as compared to Haar transform. Downsample method also gives the better edge detection than Haar transform. The encoding process applied is independent of the vector dimensions and does not perform any arithmetic operations. The decision tree generated by an offline process. Together with pipeline architecture, high speed encoding is now realizable in a single Chip. A new systolic architecture to realize the encoder of full- search vector quantization (VQ) for high-speed applications. INTRODUCTION Recently a new interest has been arisen in the field of the very low bit rate video application. The motivation of this new interest lies in the development of new applications such as videophones, video conferencing, and many others. The major requirements for these applications are the low capacity for transmission and storage, in order to use the existing Public Switched Telephone Networks (PSTN) or mobile channels numerous algorithms have been explored to implement the high compression system, such as model based and object- based methods. The advent of multimedia has evidenced a merger of computer technology and television technology. This merger has resulted in the emergence of several applications such as teleconferencing, videophone and video-on-demand. These applications would not be possible without an efficient video compression algorithm. Several international standardization activities are aiming at developing high performance video compression INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 503-511 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 504 techniques for different applications, e.g. H.261 for video conferencing, MPEGI for CD- ROM based applications, MPEG2 for broadcast TV etc. Currently the MPEG standardization group has started an investigative effort towards developing a standard (currently referred to as MPEG4) for low bit rate video compression. VQ has been considered as an efficient block- based lossy compression technique. Edge detection provides information on an object’s edge transitions instead of a full picture of the object. RELATED WORK Work done in the area of edge detection and vector quantization is reviewed and focus has been made on detecting the edges of the digital images. Edge detection is a problem of fundamental importance in image analysis. In typical images, edges characterize object boundaries and are therefore useful for segmentation, registration, and identification of objects in a scene. Edge detection of an image reduces significantly the amount of data and filters out information that may be regarded as less relevant, preserving the important structural properties of an image. OVERVIEW OF VECTOR QUANTIZATION Quantization is used to reduced the total number of bits needed for a compressed image. Scalar Quantization: Maps one sample of input signal to one quantized output. Vector Quantization: Set of input Data to single codeword. Vector quantization is a classical quantization technique from signal processing which allows the modeling of probability density functions by the distribution of prototype vectors. It was originally used for data compression. It works by dividing a large set of points (vectors) into groups having approximately the same number of points closest to them. Each group is represented by its centroid point; The density matching property of vector quantization is powerful, especially for identifying the density of large and high-dimensioned data. Since data points are represented by the index of their closest centroid, commonly occurring data have low error, and rare data high error. This is why VQ is suitable for lossy data compression. It can also be used for lossy data correction and density estimation. Vector quantization, also called "block quantization" or "pattern matching quantization" is often used in lossy data compression. It works by encoding values from a multidimensional vector space into a finite set of values from a discrete subspace of lower dimension. A lower-space vector requires less storage space, so the data is compressed. Due to the density matching property of vector quantization, the compressed data have errors that are inversely proportional to their density Overview of Edge Detection Edge detection refers to the process of identifying and locating sharp discontinuities in an image. The discontinuities are abrupt changes in pixel intensity which characterize boundaries of objects in a scene.Edge detecting an image significantly reduces the amount of data and filters out useless information, while preserving the important structural properties in an image.
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 505 Canny Edge Detector Edges characterize boundaries and are therefore a problem of fundamental importance in image processing. list of criteria to improve current methods of edge detection. The first and most obvious is low error rate. It is important that edges occurring in images should not be missed and that there be NO responses to non-edges. The second criterion is that the edge points be well localized. In other words, the distance between the edge pixels as found by the detector and the actual edge is to be at a minimum. A third criterion is to have only one response to a single edge. This was implemented because the first 2 were not substantial enough to completely eliminate the possibility of multiple responses to an edge. Low Bit Rate Picture Coding Very low bit rate image coding is an important problem regarding applications such as storage on low memory devices or streaming data on the internet. The state of the art in image compression is to use 2D wavelets. The advantages of wavelet base multiscale nature and in their ability to separtly present functions that are Piecewise smooth.Their main problem on the other hand, is that in 2D wavelets are not able to deal with the natural geometry of images, i.e they cannot separately represent objects that are smooth away from regular sub manifolds ability to present functions that are piecewise smooth. Their main problem on the other hand, is that in 2D wavelets are not able to deal with the natural geometry of images, i.e they cannot sparsely represent objects that are smooth away from regular sub manifolds Object Extraction Enables structured object based coding at different bit streams , and Vector Quantizer is to encode blocks by simple numbering. The block-based coding has been conventionally employed by a number of picture coding algorithms such as MPEG1/2, H.263, etc. However, usually the edges of an object in a picture spread over numbers of blocks. This is the reason why the block-based coding causes the so-called block distortion in coded images which considerably degrades the picture quality. To overcome this drawback of the block-based coding, the object-based coding is adopted so that at the subsequent stage the objects in a picture can be classified into a number of groups according to their motions and sizes. Motion Compensator A motion compensator is a device that decreases the undesirable effects of the relative motion between two connected objects. Motion compensators are usually placed between a floating object and a more stationary object, such as a vessel or a structure fixed to the seabed. The motion compensator does not prevent the motion, but tries to eliminate the negative effects of the movement. Geometric Vector Quantization Geometric Vector Quantization (GVQ), is one type of product vector quantization methods, in this method the code vectors are inspired by edge related features of the high- frequency sub bands. The code vectors for a two-level GVQ that we used are composed of binary-valued blocks reflecting the basic shapes found in the upper sub bands and two locally adapted intensity values, which indicate minimum and maximum intensities for each coded block.
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 506 System Flow for Image Basic step for Simulation of a Image Initially generate Do image file in MATLAB Run Do file in MATLAB Enter the name of entity in MATLAB Select the path for input image in MATLAB in temporary folder Create new project in modelsim Run VHDL file After compiling the VHDL code generate Text file Run Text file then generate matrix Put the matrix in MATLAB command window Run the matrix to get the output result Result of Vector Quantization using image Fig 1. Input Image After giving input image in matlab. Import this do file in modelsim for applying VQ and generate the text file for this input video. Fig 2. Text matrix for image After creating the text file copy the text matrix in command window of matlab and run the file. Fig 3. Output Result of compress image
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 507 Result Of Edge Detection Fig 4. Original image Fig 5. Result of edge detection by Canny Operator on Image System Flow for Video Initially generate Do Video file in MATLAB Run Do video file in MATLAB Enter the name of entity in MATLAB Enter number of frames to be extracted Select the path for input Video in MATLAB in temporary folder Create new project in modelsim Run VHDL file After compiling the VHDL code generate Text file Run Text file then generate matrix Put the matrix in MATLAB command window Run the matrix to get the output result Result of Vector Quantization and Edge detection using Video Fig 6. Input video
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 508 Initially create Do file in Matlab. For creating the do file firstly enter the name of entity that must be match with the entity name of the modelsim. Eg. the entity name in modelsim is E_LowBitRateEncoding. This entity name is gives in single quotation. Eg. ‘E_LowBitRateEncoding’. Fig 7. Input frames in modelsim After giving the do file in modelsim the input frames is done in binary format. Fig 8. Matrix for input video After copying the text file in matlab window then run the video player for view the output compressed video Fig 9. Output Compressed video
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 509 Fig 10. Edge detection of compressed video Result of compressed video using Haar Transform Comparisons between Haar and Downsample method with respect to time and compression ratio Video Time Compression Ratio Downsample aamir 2 us 94.67% Haar aamir 1.58 s 75% Downsample Flower 6 us 99.67% Haar Flower 10.75 s 75% Downsample Car 15 us 94.67% Haar Car 12.81 s 75% Downsample Man 12 us 94.67% Haar Man 12.81 s 75% Downsample Traffic 9 us 78.67% Haar Traffic 8.38 s 75% Haar aamir 1.58 s 75% From the table and the output of the videos it has been cleared that the compression quality of the downsample method is much good compared with the Haar transform and the compression ratio also get increased. The edge detection part is also done very accurately in the downsample method.
8.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 510 CONCLUSION This paper contain Vector Quantization used for lossy data compression, lossy data correction, and coding parts. it also measure image compression ratio with specified extracting number of frame which have been selected by input image with image size by generating text matrix in VHDL run at MATLAB command window. This paper also describes an edge detection technique which recognize the edges of an image to show that compression is perfect. REFERENCES [l] “A very low bit rate video coding system using adaptive region classified vector quantization”, National Taiwan University, by Yee-Wen Chen and Mei-Juan chen. [2] ”Low bit-rate video streaming for face to face teleconference”, by Zhen Wen and Tomas Huang. [3] F. Bartolini, V. Cappellini, A. Mecocci, and R. Vagheggi: “A segmentation-based motion compensated scheme for low-bit video coding”. [4] Journal of Information Hiding and Multimedia Signal Processing © 2010 ISSN 2073- 4212, by Zhe-Ming Ln [5] Chanyul kim and Noel E. O’Connor “Low complexity video compression using moving edge detection based on DCT coefficients” [6] International Journal of Recent trends in engineering, vol, 1, No. 2, May 2009 on “edge detection techniques for image segmentation of soft computing approaches”. [7] University of Strathclyde, U.K., by the GEC Marconi Hirst Research centre by Stathis P.Voukelatos and John J. Soraghan on “very low bit rate color video coding using vector quantization”. [8] International Journal of Image Processing by Raman maini and Dr.Himanshu Aggarwal on “Study and coparision of various Image edge detection techniques” [9] N.S. Jayant, P. Noll, Digital Coding of Waveform,Principle and Application to Speech and Video ,Prentice-Hall [10] G. Karlsson and M. Vetterli, “Subband Coding ofVideo Signals for Packet Switched Networks,”Proceeding of SPIE Conf. on visual communicationand image processing 11, Vol. 845, Cambridge, MA [11] Z. Li and Z. M. Lu, Fast code vector search scheme for 3D mesh model vector quantization,IETElectronics Letters, vol. 44, no. 2, pp. 104–105, 2008 [12] Z. M. Lu and Z. Li, Dynamically restricted codebook based vector quantization scheme for mesh geometry compression” Signal, Proc. of Image and Video Processing, vol. 2, no. 3 pp. 251–260, 2008. [13] Z. M. Lu and H. Pei, Hybrid Image Compression Scheme Based on PVQ and DCTVQ,IEICE Trans.Information and Systems, vol. E88-D, no. 10, pp. 2422–2426, 2005. [14] Raman Maini and J. S. Sobel, "Performance Evaluation of Prewitt Edge Detector for Noisy Images", GVIP Journal, Vol. 6, Issue 3, December 2006 [15] Li Dong Zhang; Du Yan Bi; "An improved morphological gradient edge detection algorithm”, Communications and Information Technology, ISCIT 2005. IEEEInternational Symposium on Volume 2, (s):1280 – 1283, 12-14 Oct. 2005.
9.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 511 [16] B. Yang, Z. M. Lu, D. G. Xu, and S. H. Sun, Neighboring pixels based low complexity predictive vector quantization algorithms for image coding, ACTA ELECTRONICA SINICA, vol. 31, no. 5, pp. 707–710, 2003 [17] Rital, S.; Bretto, A.; Cherifi, H.; Aboutajdine, D.; combinatorial edge detection algorithm on noise images", Video/Image Processing and Multimedia Communications 4thEURASIPIEEE Region 8 International Symposium on VIPromCom, (s):351 – 355, 16-19 June 2005. [18] Gonzalez, R and Woods, R., "Digital Image Processing" 2/E, Prentice Hall Publisher, 2002 [19] Zhao Yu-qian; Gui Wei-hua; ChenZhen-cheng; Tang Jing-tian; Li Ling-yun; "Medical Images Edge Detection Based on Mathematical Morphology" Engineering in Medicine and Biology Society, IEEE-EMBS. 27th Annual International Conference, (s):6492 – 6495, 01- 04 Sept. 2004. [20] S. A. Rizvi and N. M. Nasrabadi, Predictive residual vector quantization, IEEE Trans. Image Processing, vol. 4, no. 11, pp. 1482–1495, 2003. [21] P. Gerken,” Object-Based Analysis-Synthesis Coding of Image Sequences at Very Low Bit Rates,” IEEE Trans. on Circuits and Systems for Video Tech.pp. 228-235 ,June 2001. [22] C. S. Choi and K.Aizawa,” Analysis and Synthesis of Facial Image Sequences in Model-Based Image Coding,” IEEE Trans. on Circuits and Systems for Video Tech. pp. 257-275 ,June 2001. [23] Y. Linde, A. Buzo and R.M. Gray, ” An algorithm for vector quantizer design,”IEEE Trans.Commun,Vol. COM-28, pp. 84-95, January 2001 [24] J. Canny, A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI-8 6 2000, [25] S.Anandanarayanan and Dr.S.K.Srivatsa, “A High Performance Novel Image Compression Technique using Huffman Coding with Edge Dection”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 17 - 22, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [26] R. Pushpavalli and G.Sivaradje, “Nonlinear Filtering Technique for Preserving Edges and Fine Details of Digital Images”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 1, 2012, pp. 29 - 40, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
Descargar ahora