2017
DOI: 10.1088/1757-899x/263/4/042082
|View full text |Cite
|
Sign up to set email alerts
|

Image compression using singular value decomposition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…SVD has been successfully applied to signal processing (speaker verification systems) [19], image processing (noise filtering, watermarking) [20], image compression [21], and big data, e.g., in genomic signal processing (transforming genome-wide expression data and analysis of genome-scale data) [22,23]. PCA is also used in signal processing (diagnosing and predicting machine damage) [24,25], image processing (extracting image features) [26], and analysis (pattern recognition and image compression) [27].…”
Section: Methods and Techniques For Generating Workplace Proceduresmentioning
confidence: 99%
“…SVD has been successfully applied to signal processing (speaker verification systems) [19], image processing (noise filtering, watermarking) [20], image compression [21], and big data, e.g., in genomic signal processing (transforming genome-wide expression data and analysis of genome-scale data) [22,23]. PCA is also used in signal processing (diagnosing and predicting machine damage) [24,25], image processing (extracting image features) [26], and analysis (pattern recognition and image compression) [27].…”
Section: Methods and Techniques For Generating Workplace Proceduresmentioning
confidence: 99%
“…As stated by the 2016 portable reality congress [27], An horde of sorts about phishing strike exist for instance: beguiling phishing, Malware-based phishing, Key loggers What's more screen loggers, session hijacking, Web Trojans, Hosts recordpoisoning, framework reconfiguration attacks, information theft, DNS-based phishing, Content-injection phishing, Man-in-the-middle phishing, and internet searcher phishing.…”
Section: Methodsmentioning
confidence: 99%
“…The general method of image representation is in matrix, made up of size m*n. where, m signifies the number of rows, which is the pixel height of the image and n is the number of columns which shows the pixel width of the image. Every element of the matrix gives the representation to each pixel that makes up the image [4].…”
Section: Image Compressionmentioning
confidence: 99%
“…The SVD is essentially factorizing the given matrix into multiple matrices. SVD factorizes the given matrix with m number of rows and n number of columns it into three matrices; which can be written as M=UΣVT where U and VT are orthogonal matrices of the order m*m and n*n respectively and Σ is a diagonal matrix of the order m*n. Diagonal matrix Σ consists of nonnegative real numbers which are called as singular values of M. The m columns of U and n columns of VT are known as the left and right singular vectors of M respectively [4] The steps involved in the SVD process are shown in figure 2.…”
Section: Singular Value Decomposition (Svd)mentioning
confidence: 99%