Results 11 to 20 of about 60,075 (226)

High PSNR based Image Steganography [PDF]

open access: yesInternational Journal of Advanced Engineering Research and Science, 2019
Steganography is a method for inserting digital data within a different digital medium like text, pictures, sound signals, or film signals, while not exposing its occurrence in the medium.
Namrata Singh
openaire   +2 more sources

A subpixel registration algorithm for low PSNR images [PDF]

open access: yes2012 IEEE Fifth International Conference on Advanced Computational Intelligence (ICACI), 2012
This paper presents a fast algorithm for obtaining high-accuracy subpixel translation of low PSNR images. Instead of locating the maximum point on the upsampled images or fitting the peak of correlation surface, the proposed algorithm is based on the measurement of centroid on the cross correlation surface by Modified Moment method.
Feng, Song   +5 more
openaire   +4 more sources

Improving Psnr-Based Quality Metrics Performance For Point Cloud Geometry [PDF]

open access: yes2020 IEEE International Conference on Image Processing (ICIP), 2020
An increased interest in immersive applications has drawn attention to emerging 3D imaging representation formats, notably light fields and point clouds (PCs). Nowadays, PCs are one of the most popular 3D media formats, due to recent developments in PC acquisition, namely with new depth sensors and signal processing algorithms.
Javaheri, Alireza   +3 more
openaire   +4 more sources

Fixed-PSNR Lossy Compression for Scientific Data [PDF]

open access: yes2018 IEEE International Conference on Cluster Computing (CLUSTER), 2018
Error-controlled lossy compression has been studied for years because of extremely large volumes of data being produced by today's scientific simulations. None of existing lossy compressors, however, allow users to fix the peak signal-to-noise ratio (PSNR) during compression, although PSNR has been considered as one of the most significant indicators ...
Tao, Dingwen   +4 more
openaire   +4 more sources

Improving PSNR and computational efficiency in orthogonal ghost imaging

open access: yesScientific Reports
In this paper, we present an orthogonal ghost imaging (OGI) method based on two-dimensional discrete cosine transform (2D-DCT) patterns. Unlike traditional methods that are based on random or sinusoidal patterns, our method relies on structured ...
Kobra Hassanzadeh   +3 more
doaj   +3 more sources

PSNR Improvement Using Different Prediction Coding

open access: yesTikrit Journal of Engineering Sciences, 2015
Differential Pulse Code Modulation (DPCM) is one of the predictive coding techniques. The number of previous pixels employed in the estimate operation is referred to as the order of the predictor. Predictor using one pixel for estimation is called “first
Khamies Khalaf Hasan
doaj   +1 more source

PSNR Improvement using Different Prediction Coding in Image Compression

open access: yesTikrit Journal of Engineering Sciences, 2010
Differential Pulse Code Modulation (DPCM) is one of the predictive coding techniques. The number of previous pixels employed in the estimate operation is referred to as the order of the predictor. Predictor using one pixel for estimation is called “first
Khamies K. Hasan
doaj   +2 more sources

On the Computation of PSNR for a Set of Images or Video [PDF]

open access: yesPicture Coding Symposium, 2021
When comparing learned image/video restoration and compression methods, it is common to report peak-signal to noise ratio (PSNR) results. However, there does not exist a generally agreed upon practice to compute PSNR for sets of images or video.
Onur Keles   +4 more
semanticscholar   +1 more source

Analysis of Video CODEC Performance Using Different Softphone Applications

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2021
In a video call there are several components, such as IP phone or softphone, CODEC, and server. Selection of softphone and CODEC is a consideration in building a video communication network because it will affect the quality of video call.
Dandun Kusuma Yudha, Ahmad Ashari
doaj   +1 more source

Dual Hiding in Digital Image Files [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
The technique of information hiding is one of information security techniques, which works on embedding information on media in such a way that avoid bringing suspicion of discovering transmission between two ends.
Farah Mohammed
doaj   +1 more source

Home - About - Disclaimer - Privacy