2007
DOI: 10.1016/j.compeleceng.2006.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Haar wavelet based processor scheme for image coding with low circuit complexity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…The application of the Haar wavelets [14] on two scales makes it possible to extract vertical, horizontal, and diagonal edges.…”
Section: The Localization Of Iris and The Two Eyelidsmentioning
confidence: 99%
See 1 more Smart Citation
“…The application of the Haar wavelets [14] on two scales makes it possible to extract vertical, horizontal, and diagonal edges.…”
Section: The Localization Of Iris and The Two Eyelidsmentioning
confidence: 99%
“…The Haar wavelets [14] can decompose the image to find the vertical and horizontal details for the two eyelids and the iris. Wavelet is characterized by its multi-resolution analysis.…”
Section: The Localization Of Iris and The Two Eyelidsmentioning
confidence: 99%
“…FPGAs were originally developed for hardware circuit designs. They may be used as powerful computing systems for image processing algorithms [6,[10][11][12]. These computations can be performed much faster than on the host PC, mainly because of the high parallelism allowed by the internal structure of the component.…”
Section: Introductionmentioning
confidence: 99%
“…Fourier Descriptors (FD) are used as feature vector components in various applications, such as object classification, and image retrieval [5,6]. Gauthier et al [7] proposed a family of invariants in translation, rotation, and scale.…”
Section: Introductionmentioning
confidence: 99%
“…For example, a mathematical remainder operation might be used to build a robust watermarking technique that will modify the low-frequency coefficients in the DCT frequency domain (Rafi et al 2013). However, it has been observed that, in some cases, an image file that has not undergone any watermarking process shows to an attacker that the image file contains a watermark (Javier and Angel 2007); this scenario could mean that the attacking techniques are sensitive. In other approaches, watermarking techniques over a network should be based on partial encryption, which will decrease computation and bandwidth consumption in an effort to increase the robustness (Fan et al 2013).…”
Section: Introductionmentioning
confidence: 99%