An improved generalized K-L transform and applications in image compression

被引:0
|
作者
Shi, Yuexiang [1 ,2 ]
Tao, Zhiping [2 ]
Gong, Ping [2 ]
机构
[1] Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education, Xiangtan University, Xiangtan 411105, China
[2] School of Information Engineering, Xiangtan University, Xiangtan 411105, China
来源
Journal of Information and Computational Science | 2013年 / 10卷 / 01期
关键词
10;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:167 / 173
相关论文
共 50 条
  • [31] Implementation of wavelet transform for image compression applications
    Khekhenchery, M
    Salama, P
    Rizkalla, M
    2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II, CONFERENCE PROCEEDINGS, 2002, : 9 - 12
  • [32] Nuclide identification algorithm based on K-L transform and neural networks
    Chen, Liang
    Wei, Yi-Xiang
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 2009, 598 (02): : 450 - 453
  • [33] ON THE (K-L)-KERNELS
    KWASNIK, M
    LECTURE NOTES IN MATHEMATICS, 1983, 1018 : 114 - 121
  • [34] Feature extraction based on perturbation method and generalized K-L transformation
    School of Information Engineering, Southern Yangtze University, Wuxi 214036, China
    不详
    不详
    Xitong Fangzhen Xuebao, 2006, SUPPL. 2 (906-908):
  • [35] Processing of wavelet transform data for improved image compression
    Muzaffar, T
    Choi, TS
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 1065 - 1068
  • [36] Applications of generalized computing in image compression coding
    Yao, M
    Luo, JH
    Wu, M
    IMAGE COMPRESSION AND ENCRYPTION TECHNOLOGIES, 2001, 4551 : 102 - 106
  • [37] Adaptability of K-L expansion technique for ambiguous face image retrieval
    Oda, M
    Akamatsu, S
    Fukamachi, H
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 1996, 79 (10): : 35 - 46
  • [38] Bearing fault diagnosis based on K-L transform and support vector machine
    Lu, Shuang
    Yu, Fujin
    Liu, Jing
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 1, PROCEEDINGS, 2007, : 522 - +
  • [39] Secret key extraction algorithm for wireless channel based on K-L transform
    Li G.
    Hu A.
    Hu, Aiqun (aqhu@seu.edu.cn), 2017, Southeast University (47): : 203 - 208
  • [40] EXPERIMENTAL-STUDY OF THE RARE DECAYS K-L(0)-]MU-E, K-L(0)-]EE, K-L(0)-]MU-MU, AND K-L(0)-]EEEE
    AKAGI, T
    FUKUHISA, R
    HEMMI, Y
    INAGAKI, T
    ISHIKAWA, K
    KISHIDA, T
    KOBAYASHI, M
    KOMATSUBARA, TK
    KUZE, M
    SAI, F
    SATO, T
    SHINKAWA, T
    SUEKANE, F
    TAKAMATSU, K
    TOYOURA, J
    YAMAMOTO, SS
    YOSHIMURA, Y
    PHYSICAL REVIEW D, 1995, 51 (05): : 2061 - 2089