Comparative Study between DCT and WaveletTransform Based Image Compression Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Discrete cosine transform emerged as a popular mathematical tool in past decade and widely used inimage compression algorithm due to its high energy compaction capacity. But this energy compaction has somelimitation in blocking artifacts that overcome by another mathematical tool wavelet transform basedcompression which have both frequency and spatial component study at same time. In this paper we study acomparison between DCT based image compression and wavelet based image compression using CDF9/7wavelet as used in JPEG-2000 Standards based on common encoding scheme known as Huffman encoding forboth. We also analyzed a trend based on different level of wavelet transform on image size and image qualitybased on mean square error.
Authors and Affiliations
Piyush Kumar Singh , Neha Singh , Kabindra Nath Rai
On Combined Approach for mining FSG in Transactionized Graph Datasets
Abstract: Graph Data mining has ushered into new era with advanced data mining techniques. Mining Frequent Sub Graphs is the crucial area which appeals the ease of extracting the patterns in the graph. Typical grap...
High Accuracy Detection and Tracking of Objects
One of the critical tasks in Computer Vision is Detection and Tracking of objects. But still now, the issues related to this are developing. For the automatic detection of moving objects, some of the monitoring s...
Mobile Agents for Wireless Network Security
Abstract: Wireless sensor networks (WSNs) have widely applied in many applications. But, a security is considered one of their main problems. There are many different types of the security attacks faced WSNs. The suggest...
An optimized link state routing protocol based on a cross layer design for wireless mesh network
Analysis of routing in Mesh Network reveals that Proactive routes are fast but suffers vulnerability of route failure under high mobility. Reactive routes on the other hand add extra overhead in the network for o...
Lip Recognition for Authentication and Security
Abstract: Lip is used as an identifier from person to person as the size of the upper and lower lips, furrows, grooves, the distances between the lines and the edges vary individualistically. These unique parameter...