Fractal Image Compression & Algorithmic Techniques
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 4
Abstract
Fractal image compression is a very advantageous technique based on the representation of an image by a contractive transform. Based on fractals Fractal compression is a lossy compression method for digital images. The method is best suited for textures and natural images, relying on the fact that parts of an image often resemble other parts of the same image. In this paper we review and discuss about the Key issues of image compression, need of compression, its principles, and classes of compression and various compression algorithm of image. We review and discuss the advantages and disadvantages of these algorithms for compressing images for lossless and lossy Techniques.
Authors and Affiliations
Dr. K. Kuppusamy , R. Ilackiya
A Novel Approach of a n effective image retrieval scheme using color, texture and shape features
In this paper, we present a new and effective color image retrieval scheme for combining all the three i.e. color, texture and shape information, which achieved higher retrieval efficiency. Firstly, the image is predeter...
Robust Data Clustering Algorithms for Network Intrusion Detection
IDS (Intrusion Detection system) is an active and driving defense technology. Intrusion detection is to detect attacks against a computer system. This project mainly focuses on intrusion detection based on data min...
A Survey Of Key Management Schemes In Wireless Sensor Networks
In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is m...
Content Filtering using Internet Proxy Servers
Content filtering has been around since the internet has been around. Content filtering is the process of removing certain content from the internet before it gets to the user that requested that page. There are many dif...
Fingerprint Validation and Outlier Detection Using Minutiae Approach in Network Security
In this recent information technology biometric techniques are being used increasingly against identity theft. The basic need of biometric applications provides a measurable physical characterstics is a more reli...