2019
DOI: 10.1016/j.compeleceng.2019.05.001
|View full text |Cite
|
Sign up to set email alerts
|

Chain code compression with modified interpolative coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
1
3
0
Order By: Relevance
“…The interval between L and H is filled simply by incrementing the value . A similar case was recognized in [ 32 , 33 ]. If ), where D is the maximal value of the domain, then the encoder also does not emit any bits.…”
Section: Methodssupporting
confidence: 66%
See 2 more Smart Citations
“…The interval between L and H is filled simply by incrementing the value . A similar case was recognized in [ 32 , 33 ]. If ), where D is the maximal value of the domain, then the encoder also does not emit any bits.…”
Section: Methodssupporting
confidence: 66%
“…The compression pipeline is classical, consisting of only two parts: the prediction (the JPEG LS predictor turned out to be the most successful) and the entropy encoder. Interpolative coding, a technique developed by Moffat and Stuiver [ 31 ], is less known and has not been used in image compression, except for bi-level images [ 32 , 33 , 35 ]. It turned out to be as good as the widely used arithmetic coding for images with continuous tones as well.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Freeman proposed two chain codes known as Freeman chain code in eight (F8) and four (F4) directions. Other chain codes were discovered by Bribiesca (Vertex Chain Code, VCC) [28], Sánchez-Cruz and Rodríguez-Dagnino (Three-Orthogonal chain code, 3OT) [29],Žalik et al (Unsigned Manhattan Chain Code, UMCC) [30],and Dunkelberger and Mitchell (Mid-crack Chain Code) [31]. In general, there are two types of chain codes: those operating on raster pixels and those working with raster edges.…”
Section: Methodsmentioning
confidence: 99%
“…The most time-consuming task is performed by the last function in Line 9, which needs to replace the first l − 1 values in L. It can be realised in various ways. Four different implementations were proposed and analysed in [31].…”
Section: Move-to-front Transformmentioning
confidence: 99%