3,360 results on '"psnr"'
Search Results
2. A comprehensive evaluation of multiple video compression algorithms for preserving BVP signal quality
- Author
-
Zhou, Caiying, Ye, Xiaolang, Wei, Yuanwang, De Florio, Vincenzo, Sun, Hong, Zhan, Xinlong, Li, Yonggang, Wang, Chaochao, and Zhang, Xianchao
- Published
- 2025
- Full Text
- View/download PDF
3. A 2-level meta-heuristic aware adaptive watershed technique based optimized convolutional deep neural network for lung cancer segmentation and classification using explainable AI
- Author
-
Aelgani, Vivekanand, Gupta, Suneet Kumar, and Narayana, V.A.
- Published
- 2025
- Full Text
- View/download PDF
4. Application of Retinex and histogram equalisation techniques for the restoration of faded and distorted artworks: A comparative analysis
- Author
-
Dutta, Manoj Kumar and Sarkar, Ram Krishna
- Published
- 2023
- Full Text
- View/download PDF
5. Alpha Blending-Based Adaptive Color Image Watermarking Technique
- Author
-
Ujwala, Nadella, Kumar, Sanjay, Sri Ram, Jayyavarapu Yaswanth, Kumar, Jetti Lakshmi Prasanna, Choudhary, Katragadda Heman Rai, Bansal, Jagdish Chand, Series Editor, Sharma, Harish, Series Editor, Lim, Meng-Hiot, Series Editor, Virmani, Deepali, editor, Castillo, Oscar, editor, Balas, Valentina Emilia, editor, and Elngar, Ahmed A., editor
- Published
- 2025
- Full Text
- View/download PDF
6. Research on the Application of Audio and Video Coding and Decoding Techniques in Wireless Collaborative Communication Networks
- Author
-
Sun, Qinyu, Jiang, Enzhu, Lin, Yusheng, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Kountcheva, Roumiana, editor, and Nakamatsu, Kazumi, editor
- Published
- 2025
- Full Text
- View/download PDF
7. Efficient Technique for Image Enhancement Using Generative Adversarial Network
- Author
-
Jawdekar, Anand, Dixit, Manish, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Gupta, Manish, editor, Agrawal, Shikha, editor, Gupta, Kamlesh, editor, Agrawal, Jitendra, editor, and Cengis, Korhan, editor
- Published
- 2025
- Full Text
- View/download PDF
8. Dual Scrambling Based Non Blind Robust and Secure Color Watermarking Technique
- Author
-
Patsariya, Sanjay, Dixit, Manish, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Gupta, Manish, editor, Agrawal, Shikha, editor, Gupta, Kamlesh, editor, Agrawal, Jitendra, editor, and Cengis, Korhan, editor
- Published
- 2025
- Full Text
- View/download PDF
9. Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform
- Author
-
Patsariya, Sanjay, Dixit, Manish, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Gupta, Manish, editor, Agrawal, Shikha, editor, Gupta, Kamlesh, editor, Agrawal, Jitendra, editor, and Cengis, Korhan, editor
- Published
- 2025
- Full Text
- View/download PDF
10. Enterprise of Fusion Cryptography-Steganographic Method for Cloud Loading Refuge with Social Spider Optimization Algorithm
- Author
-
Mishra, Rahul, Mishra, Saket, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Gupta, Manish, editor, Agrawal, Shikha, editor, Gupta, Kamlesh, editor, Agrawal, Jitendra, editor, and Cengis, Korhan, editor
- Published
- 2025
- Full Text
- View/download PDF
11. Implementation of a Comparative Study of Convolutional Neural Network Architectures for Image Blind Noise Elimination
- Author
-
Anzal, Oumaima, Guessous, Najib, Ouakrim, Youssef, Li, Gang, Series Editor, Filipe, Joaquim, Series Editor, Xu, Zhiwei, Series Editor, Bennour, Akram, editor, Bouridane, Ahmed, editor, Almaadeed, Somaya, editor, Bouaziz, Bassem, editor, and Edirisinghe, Eran, editor
- Published
- 2025
- Full Text
- View/download PDF
12. Advancements in Image Deblurring and Performance Metrics Using Deep Learning Technique
- Author
-
Dhavalagimath, Shankramma S., Rajesh, T. M., Singh, Rakesh Kumar, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Mahapatra, Rajendra Prasad, editor, Peddoju, Sateesh K., editor, and Karthick, S., editor
- Published
- 2025
- Full Text
- View/download PDF
13. Enhancing Grayscale Image Clarity Through Blind Deconvolution and PSF Estimation With Total Variation Regularization
- Author
-
Narasimharao, Jonnadula, Kumar, Voruganti Naresh, Kirankumar, Adepu, Pooja, Bejjanki, Rambabu, D., Joshi, Ganpat, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Reddy, V. Sivakumar, editor, Prasad, V. Kamakshi, editor, Wang, Jiacun, editor, and Rao Dasari, Naga Mallikarjuna, editor
- Published
- 2025
- Full Text
- View/download PDF
14. A Novel Dual Watermarking Scheme Based on K-Level For Medical Images
- Author
-
Kahla, Mohammed ElHabib, Beggas, Mounir, Laouid, Abdelkader, Ferik, Brahim, Kara, Mostefa, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Vishnevsky, Vladimir M., editor, Samouylov, Konstantin E., editor, and Kozyrev, Dmitry V., editor
- Published
- 2025
- Full Text
- View/download PDF
15. High-Payload RDH Technique for Secure Data Transmission Through Improved Context Pixel-Based PVO Exploiting Center-Folding Strategy
- Author
-
Meikap, Sudipta, Jana, Biswapati, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Giri, Debasis, editor, Islam, S. K. Hafizul, editor, Vasilakos, Athanasios V., editor, and Khan, Muhammad Khurram, editor
- Published
- 2025
- Full Text
- View/download PDF
16. Robust Image Steganography Using DCT, GrabCut, and Quantization
- Author
-
Kumar, Gatram Sravan, Sethi, Kamalakanta, Joshi, Piyush, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Giri, Debasis, editor, Islam, S. K. Hafizul, editor, Vasilakos, Athanasios V., editor, and Khan, Muhammad Khurram, editor
- Published
- 2025
- Full Text
- View/download PDF
17. Enhanced Security and Robustness of Data Using Steganography
- Author
-
LaxmiKanth, P., Nagesh, O. Sri, Balaji Lanka, V. S. S. P. L. N., Rao, P. Ramamohan, Patel, Ashokkumar, editor, Kesswani, Nishtha, editor, Mishra, Madhusudhan, editor, and Meher, Preetisudha, editor
- Published
- 2025
- Full Text
- View/download PDF
18. An Efficient Image Denoising Using Convolutional Neural Network
- Author
-
Bodhale, Vaishali, Vijayalakshmi, M., Chopra, Shalu, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Kumar, Sandeep, editor, Hiranwal, Saroj, editor, Garg, Ritu, editor, and Purohit, S.D., editor
- Published
- 2025
- Full Text
- View/download PDF
19. Comprehensive Study of Algorithms for Suppressing Impulse Noise in Digital Color Images
- Author
-
Naidu, Chukka Demudu, Kaviti, Prasad, Samuel G., Pandit, Bonu, Satish Kumar, Chlamtac, Imrich, Series Editor, Bhattacharyya, Debnath, editor, and Ghosh, Rajib, editor
- Published
- 2025
- Full Text
- View/download PDF
20. VGG-Inspired Convolutional Neural Network Denoiser for the Enhancement of Mammogram Images
- Author
-
Saini, Vandana, Khurana, Meenu, Challa, Rama Krishna, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Khurana, Meenu, editor, Thakur, Abhishek, editor, Kantha, Praveen, editor, Shieh, Chin-Shiuh, editor, and Shukla, Rajesh K., editor
- Published
- 2025
- Full Text
- View/download PDF
21. HySeg-Net: A Robust Interactive Hybrid Technique for Image Segmentation and Classification in Hand Gesture Recognition
- Author
-
Narayan, Satya, Gajrani, Jyoti, Jain, Vinesh Kumar, Jat, Dharm Singh, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Goar, Vishal, editor, Kuri, Manoj, editor, Kumar, Rajesh, editor, and Senjyu, Tomonobu, editor
- Published
- 2025
- Full Text
- View/download PDF
22. 순차적 영역 확장을 이용한 지능형 임펄스 잡음 제거 기법.
- Author
-
Hyunsoo Jeong, Jihyun Park, and Kyu-Chil Park
- Abstract
This study proposes an intelligent impulse denoising technique that utilizes sequential region expansion to address the limitations of traditional denoising methods such as mean and median filters. The proposed algorithm selectively identifies noisy pixels and adaptively expands the filtering region based on local noise density. This adaptive approach minimizes the processing of non-noisy pixels, thereby preserving important image details and maintaining visual fidelity. Extensive experiments on grayscale and color images validate the effectiveness of the proposed method. The algorithm shows improved performance in noise reduction and detail preservation compared to conventional techniques, including adaptive and weighted median filters. Quantitative evaluations using Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index Measure (SSIM) metrics demonstrate reliable performance across varying noise intensities, maintaining high image quality. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
23. A Qualitative Approach for Enhancing Fundus Images with Novel CLAHE Methods.
- Author
-
V., Vijaya Madhavi and Surya Kumari, P. Lalitha
- Subjects
IMAGE analysis ,IMAGE intensifiers ,EYE diseases ,DISEASE progression ,GLAUCOMA - Abstract
Glaucoma is a progressive eye disease. This study presents a custom technique to enhance retinal fundus images to detect glaucoma. Contrast enhancement is a crucial stage in medical image analysis to improve the visual impression of diseases. CLAHE is a common technique to improve images. Clip Limit (CL) and subimages may restrict the potential benefits of the typical approach and pose difficulties. This study introduces Enhanced CLAHE and Automated CLAHE to address the shortcomings of the base method. These methods demonstrate progress in improving retinal landmarks in various ways by looking directly at the in-depth description of retinal images. The proposed methods, along with the baseline CLAHE, were compared using quality assessment tools such as the Peak-Signal-to-Noise Ratio (PSNR). The results help to determine the degree of contrast enhancement and the overall richness of the image. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
24. Enhancing Real-Time Video Streaming Quality via MPT-GRE Multipath Network.
- Author
-
Al-Imareen, Naseer and Lencse, Gábor
- Subjects
STREAMING video & television ,SIGNAL-to-noise ratio ,USER experience ,BANDWIDTHS ,PERCENTILES - Abstract
The demand for real-time 4K video streaming has introduced technical challenges due to the high bandwidth, low latency, and minimal jitter required for high-quality user experience. Traditional single-path networks often fail to meet these requirements, especially under network congestion and packet loss conditions, which degrade video quality and disrupt streaming stability. This study evaluates Multipath tunnel- Generic Routing Encapsulation (MPT-GRE), a technology designed to address these challenges by enabling simultaneous data transmission across multiple network paths. By aggregating bandwidth and adapting dynamically to network conditions, MPT-GRE enhances resilience, maintains quality during network disruptions, and offers throughput nearly equal to the sum of its physical paths' throughput. This feature ensures that even if one path fails, the technology seamlessly continues streaming through the remaining path, significantly reducing interruptions. We measured key video quality metrics to assess MPT-GRE's performance: Structural Similarity Index Measure (SSIM), Mean Squared Error (MSE), and Peak Signal-to-Noise Ratio (PSNR). Our results confirm that the MPT-GRE tunnel effectively improves SSIM, PSNR, and reduces MSE compared to single-path streaming, offering a more stable, high-quality viewing experience. Our results indicate that analyzing the SSIM, MSE, and PSNR values for 4K video streaming using the MPT tunnel demonstrates a significant performance improvement compared to a single path. The improvement percentages of the SSIM and PSNR values for the MPT tunnel are (29.05% and 29.04%) higher than that of the single path, while MSE is reduced by 81.17% compared to the single path. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
25. A secure data hiding system in biomedical images using grain 128a algorithm, logistic mapping and elliptical curve cryptography.
- Author
-
George, Nimmy and Manuel, Manju
- Subjects
ELLIPTIC curve cryptography ,PEARSON correlation (Statistics) ,ART techniques ,IMAGE processing ,ARTIFICIAL intelligence - Abstract
Telemedicine and teleconsultations have become rampant today, consequent to the pandemic scenario as well as the availability of seamless internet connectivity. In this context, maintaining the integrity and confidentiality of a medical record has become more significant than ever before. A novel data-hiding methodology based upon Grain 128a algorithm and two-dimensional logistic mapping for the security of biomedical images in applications of telemedicine is proposed in this research article. In this endeavor, the name of the medical practitioner and diagnosis results are embedded into the MRI brain image of a patient with astrocytoma. A highlight of this work is the use of a multilevel system for enhanced security. Initially, Grain 128a is used for deriving the initial factors of the logistic mapping using a 512-bit confidential key. Grain 128a is able to withstand various types of single-key attacks. Logistic Mapping is used to generate two sequences, one for the X and the other for the Y direction. Grain 128a algorithm and logistic mapping are combined to enhance the security as well as the sensitivity of the data hiding system for a single variation in the secret key. A bit diffusion and confusion process is used to identify the pixel locations in which the name of the practitioner and the diagnosis result must be embedded. The doctor's name and diagnosis result are converted into binary and introduced into the least significant bit positions (LSBs) of those pixel locations. Finally, encryption is done on the data-hided image using Elliptical Curve Cryptography (ECC) for enhanced security. The system performance is analyzed using different measures such as histogram analysis, structural similarity index (SSIM), universal image quality index (UIQI), Pearson's correlation coefficient (PCC), entropy, peak signal-to-noise ratio (PSNR), etc. The novel system is compared with two existing techniques and observed that it has better performance in terms of PSNR and SSIM. The security of the encryption system is measured by means of histogram analysis, correlation coefficient, PSNR, entropy, etc. The performance of the encryption system has been compared with the current state of art technique and it is found that the proposed system outperforms the current state of art techniques in every performance measure. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
26. Noise reduction in brain magnetic resonance imaging using adaptive wavelet thresholding based on linear prediction factor.
- Author
-
Pereira Neto, Ananias and Barros, Fabrício J. B.
- Subjects
NOISE control ,MAGNETIC resonance imaging ,DATA transmission systems ,SIGNAL-to-noise ratio ,IMAGE processing - Abstract
Introduction: Wavelet thresholding techniques are crucial in mitigating noise in data communication and storage systems. In image processing, particularly in medical imaging like MRI, noise reduction is vital for improving visual quality and accurate analysis. While existing methods offer noise reduction, they often suffer from limitations like edge and texture loss, poor smoothness, and the need for manual parameter tuning. Methods: This study introduces a novel adaptive wavelet thresholding technique for noise reduction in brain MRI. The proposed method utilizes a linear prediction factor to adjust the threshold adaptively. This factor leverages temporal information and features from both the original and noisy images to determine a weighted threshold. This dynamic thresholding approach aims to selectively reduce or eliminate noise coefficients while preserving essential image features. Results: The proposed method was rigorously evaluated against existing state-of-the-art noise reduction techniques. Experimental results demonstrate significant improvements in key performance metrics, including mean squared error (MSE), peak signal-to-noise ratio (PSNR), and structural similarity index (SSIM). Discussion: The proposed adaptive thresholding technique effectively addresses the limitations of existing methods by providing a more efficient and accurate noise reduction approach. By dynamically adjusting the threshold based on image-specific characteristics, this method effectively preserves image details while effectively suppressing noise. These findings highlight the potential of the proposed method for enhancing the quality and interpretability of brain MRI images. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
27. Effective dehazing of night‐time images using open dark channel prior and wavelet transform.
- Author
-
Dharmalingam, Vivekanandan, Palivela, Lakshmi Harika, and Elangovan, Pugazhendi
- Subjects
- *
LIGHT sources , *SIGNAL denoising , *MULTIPLE scattering (Physics) , *WAVELET transforms , *SIGNAL filtering - Abstract
Existing night‐time dehazing methods had been attempting to process light and non‐light source regions based on dark channel prior (DCP). Since the bright and non‐bright regions exhibit different features, the same daytime method cannot be applied to night images because light scatter from the multiple objects non‐uniformly and DCP tends to over‐estimate the depth of the scene making the image unrealistic. To overcome this limitation, wavelet decomposition was performed so that haze remains in the low occurrence region and noise in the high occurrence region and noise was removed by soft thresholding method. In the presented approach, the open DCP (ODCP) transmission map was computed for handling light source regions and estimated transmission was refined to enhance the texture in high‐frequency part. Bilinear interpolation method of fast‐guided filtering and recursive filter in the domain transform was used for edge preservation, enhancement of texture details and smoothness. The dehazed image was constructed by correlating the coefficients of low occurrence part recovered from haze and high occurrence component. The performance analysis was compared against state‐of‐the‐art methods in terms of peak signal‐to‐noise ratio (PSNR) and Structural Similarity Index (SSIM). [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
28. A novel RGB image steganography algorithm using type-1 fuzzy logic.
- Author
-
Dhaka, Navita, Hooda, Meenakshi, Yadav, Vinita, and Gill, Sumeet
- Subjects
FUZZY logic ,SIGNAL-to-noise ratio ,ALGORITHMS ,SIMPLICITY ,HISTOGRAMS - Abstract
Steganography aims to conceal secret data within images without affecting image quality. Traditional methods often struggle with balancing simplicity, effectiveness and payload capacity while maintaining imperceptibility. Proposed algorithm: the paper proposed a novel steganographic mshEdgeRGB_T1 algorithm that combines Mamdani fuzzy type-1 logic with the least significant bit (LSB) method. The LSB method is chosen for its simplicity and effectiveness in hiding messages. The mshEdgeRGB_T1 algorithm focuses on embedding secret messages in edge pixels, detecting more edge pixels compared to other methods, thus increasing payload capacity. Findings: the algorithm's performance is evaluated using metrics such as peak signal-to-noise ratio (PSNR), mean squared error (MSE) and histogram analysis to measure the similarity between the cover and Stego images, quantifying the level of imperceptibility. Experimental analysis demonstrates that the mshEdgeRGB_T1 algorithm offers improved payload capacity, enhanced security and reduced imperceptibility compared to many existing methods. Conclusion: the proposed mshEdgeRGB_T1 algorithm effectively balances simplicity, payload capacity and image quality, making it a better use for image steganography. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
29. An Overview of Quantum Circuit Design Focusing on Compression and Representation.
- Author
-
Haque, Ershadul, Paul, Manoranjan, Tohidi, Faranak, and Ulhaq, Anwaar
- Subjects
QUANTUM gates ,QUANTUM computing ,IMAGE representation ,IMAGE processing ,QUANTUM states - Abstract
Quantum image computing has attracted attention due to its vast storage capacity and faster image data processing, leveraging unique properties such as parallelism, superposition, and entanglement, surpassing classical computers. Although classical computing power has grown substantially over the last decade, its rate of improvement has slowed, struggling to meet the demands of massive datasets. Several approaches have emerged for encoding and compressing classical images on quantum processors. However, a significant limitation is the complexity of preparing the quantum state, which translates pixel coordinates into corresponding quantum circuits. Current approaches for representing large-scale images require higher quantum resources, such as qubits and connection gates, presenting significant hurdles. This article aims to overview the pixel intensity and state preparation circuits requiring fewer quantum resources and explore effective compression techniques for medium and high-resolution images. It also conducts a comprehensive study of quantum image representation and compression techniques, categorizing methods by grayscale and color image types and evaluating their strengths and weaknesses. Moreover, the efficacy of each model's compression can guide future research toward efficient circuit designs for medium- to high-resolution images. Furthermore, it is a valuable reference for advancing quantum image processing research by providing a systematic framework for evaluating quantum image compression and representation algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
30. Efficient Data Security Using Differential Expansion & Metamorphic Cryptography
- Author
-
Gopika Rajan J. and R. S. Ganesh
- Subjects
data hiding ,data security ,differential expansion ,PSNR ,RC4 cryptography ,steganography ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
With the advancement in information technology confidential data security and privacy in data transmission have long been a top priority because of the increase in cybercrime. A number of cryptographic and steganography methods were put up to resolve the issues. Reversible data hiding, due to its versatility and ability to be used in a variety of settings, is a great strategy for protecting sensitive information. However, it can handle only little payloads with good quality image carrying data.This paper introduces a novel spatial image steganography scheme that combines Differential Expansion (DE) and RC4 cryptography to significantly improve data security. The methodology involves embedding sensitive information into the difference values of pixel pairs using DE, followed by RC4 encryption to ensure robust data protection. Our approach leverages the strengths of DE for high-capacity data embedding and the robust encryption capabilities of RC4 to protect against unauthorized access and tampering.To evaluate the effectiveness of our proposed method, we conducted extensive experiments using a variety of image datasets. The results demonstrate that our method achieves significant improvements in payload capacity, security, and image quality compared to traditional techniques. Specifically, our method outperforms existing methods such as LSB, Hamming code, and GAN-based approaches in key metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), and Structural Similarity Index Metric (SSIM). These metrics indicate that our method maintains high image quality while providing enhanced data security.
- Published
- 2025
- Full Text
- View/download PDF
31. Text Data Security Using LCG and CBC with Steganography Technique on Digital Image
- Author
-
Muhammad Wildan and Wahid Miftahul Ashari
- Subjects
aes-256 ,cryptography ,linear congurential generator ,steganography ,psnr ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This research proposes a text data security method using a combination of Linear Congruential Generator (LCG), Advanced Encryption Standard (AES) Cipher Block Chaining (CBC) mode, and Least Significant Bit (LSB) steganography technique on digital images. The message scrambling process using LCG produces ASCII characters as noise that is inserted in the original message. After that, the message is encrypted using AES-256 CBC to provide additional security. The encryption result is then hidden in the digital image through LSB steganography technique. Tests were conducted on images with JPEG and BMP formats to measure the visual quality after the data insertion process, as measured by PSNR (Peak Signal-to-Noise Ratio). The test results show a PSNR value of 56.60 dB for JPEG images and 70.84 dB for BMP images. In addition, the insertion process in JPEG images degrades the image quality, mainly due to lossy compression, compared to the lossless BMP format. This study concludes that the proposed combination of methods is effective in hiding messages in images, but is susceptible to compression on lossy formats such as JPEG. The use of lossless image formats such as BMP or PNG is recommended to maintain data integrity.
- Published
- 2024
- Full Text
- View/download PDF
32. Attention-based lightweight deep hybrid CNN framework for image restoration.
- Author
-
Karthikeyan, V. and Visu, Y. Palin
- Subjects
- *
CONVOLUTIONAL neural networks , *IMAGE reconstruction , *IMAGE intensifiers , *IMAGE processing , *ERROR functions - Abstract
Underwater image enhancement and processing have gained prominence in the field of image processing due to marine scientists' interest in uncovering new species and environments. This work presented a lightweight, attention-based, deep hybrid convolutional neural network (LW-AB-DHCNN) architecture to enhance overall efficiency. The traditional CNNs use subnetworks to enhance model depth and achieve the same functionality, but the proposed method employs multiple depth-wise separable convolutions, thereby reducing the computational complexity of the system. The proposed approach integrates Deep CNN with CBAM to provide an enhanced U-Net model. CBAM employs a self-attention method to acquire both local and global data in underwater images, thereby augmenting their semantic interpretation. This work also employed a unified error function to direct the training and optimization of the model. When the presented scheme was evaluated against benchmark datasets, it achieved an average PSNR of 25.69 dB and an average SSIM of 0.8624. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Adaptive Lossy Color Image Compression System Based on Hybrid Algorithm.
- Author
-
Khammas, Husam Khalid and Türkben, Ayça Kurnaz
- Subjects
IMAGE compression ,JPEG (Image coding standard) ,DISCRETE cosine transforms ,DISCRETE wavelet transforms ,DIGITAL technology - Abstract
Copyright of Baghdad Science Journal is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
34. Generative Adversarial Network-Based Distortion Reduction Adapted to Peak Signal-to-Noise Ratio Parameters in VVC.
- Author
-
Deng, Weihao and Yang, Zhenglong
- Subjects
IMAGE stabilization ,VIDEO coding ,IMAGE reconstruction ,SIGNAL-to-noise ratio ,GENERATIVE adversarial networks ,VIDEO compression - Abstract
In order to address the issues of image quality degradation and distortion that arise in the context of video transmission coding and decoding, a method based on an enhanced version of CycleGAN is put forth. The lightweight attention module is integrated into the residual block of the generator module structure, thereby facilitating the extraction of image details and motion compensation. Furthermore, the perceptual function LPIPS loss is increased to align the image restoration effect more closely with human perception. Additionally, the network training method is modified, and the original image is divided into 128 × 128 small blocks for training, thus enhancing the network's accuracy in restoring details. The experimental results demonstrate that the algorithm attains an average PSNR value of 30.1147 on the publicly accessible YUV sequence dataset, YUV Trace Dataset, which is a 9.02% enhancement compared to the original network. Additionally, the LPIPS value reaches 0.2639, representing a 10.42% reduction, and effectively addresses the issue of image quality deterioration during transmission. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. A novel deep unsupervised approach for super-resolution of remote sensing hyperspectral image using gompertz-function convergence war accelerometric-optimization generative adversarial network (GF-CWAO-GAN).
- Author
-
Deepthi, K., Shastry, Aditya K., and Naresh, E.
- Subjects
- *
GENERATIVE adversarial networks , *REMOTE sensing , *ARTIFICIAL intelligence , *IMAGE processing , *HIGH resolution imaging - Abstract
Hyperspectral remote sensing images obtained from cameras are characterized by high-dimensions and low quality, which makes them unfavorable for various analytics purposes. This is due to the presence of visible and invisible frequencies of the reflected light making it poorly reveal the spectral signatures of the image. Visual communication advancement has paved the need for Image Super-Resolution (SR) which recovers high-resolution images from low-resolution images. Several works were carried out earlier on image SR using variants of supervised and unsupervised models that still lack accuracy. In this paper, we propose an unsupervised learning model titled Gompertz Function–based Convergence War Accelerometric Optimization–GAN framework for generating of High-Resolution (HR) images. The framework comprises a pre-processing stage, where the incoming Low-Resolution (LR) image is preprocessed for noise removal by applying Shannon-Gaussian Filter (S-GF). Following is the Gradient Domain Approach based Tone-Mapping (TM). Skew correction is done to remove distortion and maintain original resolution that may change during TM stage. The next stage comprises the boundary and edge enhancement of the resulting preprocessed image generated by the method of Inverse Gradient Mapping (IGM) followed by patch extraction to extract minute low-frequency information from the resulting boundary and edge-enhanced image. The contrast of the enhanced patches is improved by removing blurriness effect. The preprocessed image patches are then fed into the Gompertz Function-based Convergence War Accelerometric Optimization – GAN for feature mapping on the trained SR Image features that are clustered using Krzanowski and Li- Kantorovich Metric-K-Means clustering Algorithm (KL-KM-KMA) for effective generation of SR image. The developed model is validated for both qualitative and quantitative measurements. Comparisons are made with several other state-of -the-art methods for accuracy of 98.05%, precision of 97.98%, inception score of 8.71, Fréchet Inception Distance of 36.4 with reduced clustering and training time proving the efficiency of the proposed model. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Performance evaluation of linear and nonlinear filters for despeckling B mode foetal heart ultrasound images.
- Author
-
Sriraam, N., Punya Prabha, V., Sushma, T. V., and Suresh, S.
- Subjects
- *
SPECKLE interference , *ULTRASONIC imaging , *CONGENITAL heart disease , *CARDIAC imaging , *HUMAN abnormalities - Abstract
Early detection of congenital heart disease (CHD), one of the most commonly occurring congenital defects, is important to reduce mortality rates. The major drawback of ultrasound imaging is the inherent speckle noise, making visual examination of anatomical structures a challenging task. This study discusses the effect of denoising using different linear and nonlinear filters on B mode foetal cardiac ultrasound images. The exhaustive study of the performance of linear filters such as mean, Laplacian, and Wiener, and nonlinear filters such as median, anisotropic diffusion, non-local means, and bilateral filters has been carried out. Performance of the filtering technique is evaluated using various fidelity measures and a new assessment parameter edge preserving index (EPI) is also used for evaluation. Non-local means filter outperforms other filtering techniques with average fidelity values as follows: PSNR: 67.97 dB, MSE: 0.01283, RMSE: 0.109, average difference (AD): 0.005, normalized absolute error (NAE): 2 × 10−4, mean absolute error (MAE): 0.011, EPI: 0.999. This work serves as a reference on pre-processing techniques that can be applied to foetal cardiac ultrasound images for beginners. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Watermarking technique for document images using discrete curvelet transform and discrete cosine transform.
- Author
-
Singh, Balkar and Sharma, M. K.
- Subjects
DISCRETE cosine transforms ,CURVELET transforms ,ARTIFICIAL intelligence ,IMAGE processing ,WATERMARKS - Abstract
In this paper, a watermarking technique based on discrete curvelet transform and discrete cosine trans- form is proposed to protect the color document images. The six layers of the document image are created using the Discrete Curvelet Transform (DCuT). The sixth layer is chosen for the embedding process, while the remaining layers are discarded. Discrete Cosine Transform (DCT) is applied on the 8 × 8 blocks of the real part of sixth layer. DCT coefficients from low to medium are selected for the embedding process, excluding the first one. To choose the Direct Current (DC) coefficients of DCT to embed the watermark bits, a zigzag function is used. The same process is applied on the receiver side watermark image is extracted. Since this is a non-blind method, we require both a cover image and a watermarked image. DCT of watermarked image and the cover image are compared to extract the watermark image. The resistivity of the watermarked image against image processing attacks is measured using the Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM), Mean Square Error (MSE), Normalization Correlation (NC), Bit Error Rate (BER) and Universal Quality Index (UQI). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. 3D Model Fragile Watermarking Scheme for Authenticity Verification.
- Author
-
Kozieł, Grzegorz and Malomuzh, Liudmyla
- Subjects
DIGITAL watermarking ,MESSAGE authentication codes ,SIGNAL-to-noise ratio ,CULTURAL property ,FORGERY - Abstract
With the development of new technologies, 3D models are becoming increasingly important. They are used to design new models, document cultural heritage and scan valuable artefacts or evidence. They are also used in medicine. For these reasons, they are vulnerable to forgery. Protection against forgery done by encrypting the model or signing it digitally may restrict access to the data or require additional files to store the signatures. A good way to confirm the originality of 3D models is fingerprinting. This technique involves attaching a fragile watermark directly to the watermarked data. In the paper, we propose a new fingerprinting method for 3D models. The method hides the fingerprint in the least significant digits of the coordinates of the selected vertices. The fingerprint is created by calculating the hash-based message authentication code (HMAC) from the model textures and all vertex coordinates except the digits intended to attach the fingerprint. These digits are processed using discrete wavelet transform (DWT). The HMAC is attached to the selected DWT coefficients. The inverse discrete wavelet transform is then performed to obtain the new values of the modified digits. The digits are put back into the 3D model coordinates and the model is reassembled. Verification of the model originality is done according to the used steganographic key and consists of comparing the HMAC value extracted from the fingerprinted model with the HMAC value calculated from it. The same values of both HMAC results indicate that the model has not been modified. The proposed method allows efficient model fingerprinting and detection of changes made to any part of the model. The included fingerprints are transparent - the peak signal-to-noise ratio (PSNR) of a fingerprinted model can reach 150dB and its structural similarity can be over 99.8%. This paper presents a novel, computationally efficient fragile watermarking scheme that is capable of detecting the smallest changes in any part of a 3D model. The presented solution can be used to confirm the originality of 3D models. In particular, it will work well for fingerprinting large models such as 3D scans of architectural objects. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. HDVQ-VAE: Binary Codebook for Hyperdimensional Latent Representations.
- Author
-
Bryant, Austin J. and Aygun, Sercan
- Abstract
Hyperdimensional computing (HDC) has emerged as a promising paradigm offering lightweight yet powerful computing capabilities with inherent learning characteristics. By leveraging binary hyperdimensional vectors, HDC facilitates efficient and robust data processing, surpassing traditional machine learning (ML) approaches in terms of both speed and resilience. This letter addresses key challenges in HDC systems, particularly the conversion of data into the hyperdimensional domain and the integration of HDC with conventional ML frameworks. We propose a novel solution, the hyperdimensional vector quantized variational auto encoder (HDVQ-VAE), which seamlessly merges binary encodings with codebook representations in ML systems. Our approach significantly reduces memory overhead while enhancing training by replacing traditional codebooks with binary (−1, +1) counterparts. Leveraging this architecture, we demonstrate improved encoding-decoding procedures, producing high-quality images within acceptable peak signal-to-noise ratio (PSNR) ranges. Our work advances HDC by considering efficient ML system deployment to embedded systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. A video compression-cum-classification network for classification from compressed video streams.
- Author
-
Yadav, Sangeeta, Gulia, Preeti, Gill, Nasib Singh, Yahya, Mohammad, Shukla, Piyush Kumar, Pareek, Piyush Kumar, and Shukla, Prashant Kumar
- Subjects
- *
ARTIFICIAL neural networks , *STREAMING video & television , *VIDEO compression , *USER-generated content , *DEEP learning , *VIDEO coding - Abstract
Video analytics can achieve increased speed and efficiency by operating directly on the compressed video format, thereby alleviating the decoding burden on the analytics server. The encoded video streams are rich in semantic binary information and this information can be utilized more efficiently to train the classifiers. Motivated by the same notion, a deep learning-based video compression-cum-classification network has been proposed. In the proposed work, the binary-coded semantic information is extracted by using an auto encoder-based video compression component and the same fed to the MobileNetv2-based classifier for the classification of the given video streams based on their content. Using large-scale user-generated content provided by YouTube UGC dataset, it has been demonstrated that using deep neural networks for compression not only provides on-par compression results to traditional methods, it makes analytical processing of these videos faster. Video content tagging of YouTube UGC dataset has been used as the analytics task. The proposed DLVCC approach performs 10 × faster with 30 × fewer parameters than MobileNetv2 in video tagging of compressed video with no loss in accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. Secured communication of multiple compressed infrared images using 6D hyper-chaotic encryption.
- Author
-
Das, Banhi Dutta Choudhuri, Patra, Anirban, Saha, Arijit, and Sikder, Somali Sanyal
- Abstract
Transmission of images over a long distance is a need of the day for different applications. As a lot of information is carried by high-resolution images, huge bandwidth is required to transmit them. So, to make efficient transmissions, compression of images is very important. Again, images involved in various applications carry confidential information and need to be highly secured before transmission. For the purpose of secured transmission, images must be encrypted with robust encryption schemes. In this communication, an effective and secured method for frequency-domain compression and transmission of infrared images is developed which is equally applicable for any other images. It is shown in this communication that the compression ratio can be improved by the proposed technique without compromising the PSNR value. In this technique, the compression ratio is improved from 2.79 to 11.13 without degradation in PSNR value of retrieved images (around 34). Our compression technique involves the modulation of images using amplitude grating. Different orientation angles and grating frequencies are selected for modulation. Security of transmitted images is ensured by 6-D hyper-chaotic encryption. This method is efficient enough to encrypt, transmit, and recover multiple infrared images without the occurrence of aliasing errors. The algorithm shows satisfactory performance for applications where huge image data are to be transmitted in a highly secure way. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. A Proposed Text Encryption inside Video Using Harris Corner Detection and Salas20 Encryption Algorithm.
- Author
-
Fadhil, Fadhil Abbas, Abdul Hussien, Farah Tawfiq, Aldeen Khairi, Teba Walaa, and Safiullin, Nikolai
- Subjects
STREAM ciphers ,ENTROPY ,CIPHERS ,DETECTORS ,ALGORITHMS - Abstract
Copyright of Baghdad Science Journal is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
43. Efficient single image-based dehazing technique using convolutional neural networks.
- Author
-
Gade, Harish Babu, Odugu, Venkata Krishna, B., Janardhana Rao, B., Satish, N., Venkatram, and K., Revathi
- Subjects
CONVOLUTIONAL neural networks ,DEEP learning ,ENTROPY - Abstract
This research proposes a learning-based efficient single-image dehazing method. Dehazing, discriminator, and fine-tuning networks build the end-to-end network model. These three techniques are independently trained on suitable datasets. An end-to-end network architecture improves dehazing. The dehazing network model estimates transmission map, atmospheric light, and parallel convolution layers to analyze the input hazy image. The discrimination network extracted a discriminated dehazing image. Finally, discriminator network model findings are used for fine-tuning. The suggested model is tested using foggy images from various datasets and performance measures including PSNR, SSIM, MSE, and Entropy. The suggested learning-based image dehazing is compared to existing approaches qualitatively and quantitatively. The suggested approach improves PSNR by 34.3% to 3.65% over previous works. The proposed work has a 24.9% higher average SSIM and a 76% lower MSE than current efforts. The entropy of the proposed work is improved by a maximum of 9.38%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. Effective hybridization approach for noise removal in magnetic resonance imaging.
- Author
-
Jaglan, Poonam, Dass, Rajeshwar, Duhan, Manoj, and Rana, Suraj
- Subjects
MAGNETIC resonance imaging ,IMAGE processing ,IMAGE intensifiers ,MAGNETIC noise ,MAGNETIC resonance - Abstract
Medical image processing generally contains high components of noise produced by interference, compression and use of imperfect instrument during acquisition or transmission. An effective imaging devicei.e. Magnetic Resonance Imagingmay diagnose the disease by acute analysis of dissectional anatomical soft tisses of human. In general, MR images are of poor contrast in lieu of blurriness, out of focused and lack of brightness iside the machine. In this paper, hybridization approaches i.e. Median-Wiener filter (MW), Wiener-Median filter (WM) and other combinations like WMWM & MWMW are proposed for MR image enhancement. The results are further compared with various filtering algorithms i.e. Average filter, Median Filter, Wiener Filter &Gaussian filter and in terms of MSE, PSNR, RMSE, MAE. The proposed hybridization filtering technique gives better outcomes comparatively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. PSNR and SSIM: Evaluation of the Imperceptibility Quality of Images Transmitted over Wireless Networks.
- Author
-
SIMOES, W. and DE SÁ, M.
- Subjects
WIRELESS channels ,SIGNAL-to-noise ratio ,LOCAL mass media ,SMARTPHONES ,COMPUTERS - Abstract
Currently, evaluators assess the quality of content transmitted by computing devices, such as smartphones and computers, based on the success or failure of the human visual system. However, many failures go unnoticed because of the flow of frames and the large volume of information transmitted. This paper proposes automatic monitoring of the quality of multimedia content transmitted between a smartphone and a digital TV via a wireless transmission channel. The methodology combines two tools: the peak signal-to-noise ratio (PSNR) and the structural similarity index (SSIM). To receive the transmitted data, we establish intermediation through a hotspot and monitor it using the Wireshark tool. The results indicate a 99.42% accuracy rate for local media and 99.02% accuracy in processing media consumed from streaming channels. Based on test and analysis results, this research concludes that the proposed architecture allowed a better measure of imperceptibility in aspects where human vision is more sensitive, such as color changes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Combining CBAM and Iterative Shrinkage-Thresholding Algorithm for Compressive Sensing of Bird Images.
- Author
-
Lv, Dan, Zhang, Yan, Lv, Danjv, Lu, Jing, Fu, Yixing, and Li, Zhun
- Subjects
ARTIFICIAL neural networks ,THRESHOLDING algorithms ,WAVELET transforms ,IMAGE reconstruction ,SPECIES diversity - Abstract
Bird research contributes to understanding species diversity, ecosystem functions, and the maintenance of biodiversity. By analyzing bird images and the audio of birds, we can monitor bird distribution, abundance, and behavior to better understand the health of ecosystems. However, bird images and audio involve a vast amount of data. To improve the efficiency of data transmission and storage efficiency and save bandwidth, compressive sensing can overcome this challenge. Compressive sensing is a technique that uses the sparsity of signals to recover original data from a small number of linear measurements. This paper introduces a deep neural network based on the Iterative Shrinkage Thresholding Algorithm (ISTA) and a Convolutional Block Attention Module (CBAM), CBAM_ISTA-Net
+ , for the compressive reconstruction of bird images, audio Mel spectrograms and wavelet transform spectrograms. Using 45 bird species as research subjects, including 20 bird images, 15 audio-generated Mel spectrograms, and 10 audio wavelet transform (WT) spectrograms, the experimental results show that CBAM_ISTA-Net+ achieves a higher peak signal-to-noise ratio (PSNR) at different compression ratios. At a compression ratio of 50%, the average PSNR of the three datasets reaches 33.62 dB, 55.76 dB, and 38.59 dB, while both the Mel spectrogram and wavelet transform spectrogram achieve more than 30 dB at compression ratios of 25–50%. These results highlight the effectiveness of CBAM_ISTA-Net+ in maintaining high reconstruction quality even under significant compression, demonstrating its potential as a valuable tool for efficient data management in ecological research. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
47. Development of Adaptive Gaussian Filter Based Denoising as an Image Enhancement Technique.
- Author
-
D, Aarthi, A, Panimalar, S, Santhosh Kumar, and K, Anitha
- Subjects
STANDARD deviations ,IMAGE denoising ,ADAPTIVE filters ,SIGNAL-to-noise ratio ,DIGITAL preservation - Abstract
Image denoising is crucial for enhancing image quality, especially in medical applications where noise can significantly impact the accuracy of analysis and interpretation. This paper presents the development of an adaptive Gaussian filter-based denoising technique that effectively enhances images corrupted by various types of noise. By incorporating the adaptive adjustment of filter parameters based on local image characteristics, the proposed method achieves superior denoising performance. The algorithm analyzes the noisy image to estimate the noise characteristics, dynamically adjusting the Gaussian filter parameters to ensure optimal preservation of image details while effectively suppressing noise artifacts. Optimized strategies for parameter selection and filtering operations are employed to ensure computational efficiency. A comparative analysis demonstrates that the adaptive Gaussian filter outperforms traditional methods, achieving a higher Peak Signal-to-Noise Ratio (PSNR) and a lower Root Mean Square Error (RMSE). The technique also exhibits robustness against different noise distributions, making it a versatile solution for various image enhancement applications. These findings highlight the potential of the adaptive Gaussian filter to significantly improve image quality, facilitating more accurate and reliable analysis across diverse domains. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Enhancing Image Quality in Facial Recognition Systems with GAN-Based Reconstruction Techniques
- Author
-
Beni Wijaya, Arief Suryadi Satyawan, Mokh. Mirza Etnisa Haqiqi, Helfy Susilawati, Khaulyca Arva Artemysia, Sani Moch. Sopian, M. Ikbal Shamie, and Firman
- Subjects
Facial Recognition Systems ,Image Reconstruction ,Generative Adversarial Networks (GANs) ,PSNR ,SSIM ,Information technology ,T58.5-58.64 ,Computer software ,QA76.75-76.765 - Abstract
Facial recognition systems are pivotal in modern applications such as security, healthcare, and public services, where accurate identification is crucial. However, environmental factors, transmission errors, or deliberate obfuscations often degrade facial image quality, leading to misidentification and service disruptions. This study employs Generative Adversarial Networks (GANs) to address these challenges by reconstructing corrupted or occluded facial images with high fidelity. The proposed methodology integrates advanced GAN architectures, multi-scale feature extraction, and contextual loss functions to enhance reconstruction quality. Six experimental modifications to the GAN model were implemented, incorporating additional residual blocks, enhanced loss functions combining adversarial, perceptual, and reconstruction losses, and skip connections for improved spatial consistency. Extensive testing was conducted using Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) to quantify reconstruction quality, alongside face detection validation using SFace. The final model achieved an average PSNR of 26.93 and an average SSIM of 0.90, with confidence levels exceeding 0.55 in face detection tests, demonstrating its ability to preserve identity and structural integrity under challenging conditions, including occlusion and noise. The results highlight that advanced GAN-based methods effectively restore degraded facial images, ensuring accurate face detection and robust identity preservation. This research provides a significant contribution to facial image processing, offering practical solutions for applications requiring high-quality image reconstruction and reliable facial recognition.
- Published
- 2025
- Full Text
- View/download PDF
49. Noise reduction in brain magnetic resonance imaging using adaptive wavelet thresholding based on linear prediction factor
- Author
-
Ananias Pereira Neto and Fabrício J. B. Barros
- Subjects
wavelet transform ,wavelet thresholding ,image noise reduction ,adaptive thresholding ,MSE ,PSNR ,Neurosciences. Biological psychiatry. Neuropsychiatry ,RC321-571 - Abstract
IntroductionWavelet thresholding techniques are crucial in mitigating noise in data communication and storage systems. In image processing, particularly in medical imaging like MRI, noise reduction is vital for improving visual quality and accurate analysis. While existing methods offer noise reduction, they often suffer from limitations like edge and texture loss, poor smoothness, and the need for manual parameter tuning.MethodsThis study introduces a novel adaptive wavelet thresholding technique for noise reduction in brain MRI. The proposed method utilizes a linear prediction factor to adjust the threshold adaptively. This factor leverages temporal information and features from both the original and noisy images to determine a weighted threshold. This dynamic thresholding approach aims to selectively reduce or eliminate noise coefficients while preserving essential image features.ResultsThe proposed method was rigorously evaluated against existing state-of-the-art noise reduction techniques. Experimental results demonstrate significant improvements in key performance metrics, including mean squared error (MSE), peak signal-to-noise ratio (PSNR), and structural similarity index (SSIM).DiscussionThe proposed adaptive thresholding technique effectively addresses the limitations of existing methods by providing a more efficient and accurate noise reduction approach. By dynamically adjusting the threshold based on image-specific characteristics, this method effectively preserves image details while effectively suppressing noise. These findings highlight the potential of the proposed method for enhancing the quality and interpretability of brain MRI images.
- Published
- 2025
- Full Text
- View/download PDF
50. Extended fractional transformation based S-box and applications in medical image encryption
- Author
-
Ali, Javed, Jamil, Muhammad Kamran, Ali, Rashad, and Gulraiz
- Published
- 2025
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.