Preview

Digital Image Processing Techniques

Satisfactory Essays
Open Document
Open Document
1255 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Image Processing Techniques
APCOMS | DIGITAL IMAGE PROCESSING | ASSIGMNENT | | SIR SHAHID ISMAIL | 29-May-13 |

|
GROUP MEMBERS:
USAID SHUAIB F-3313
AHMED TAUQIR F-3324
HAMMAD SHEIKH F-3325
GROUP MEMBERS:
USAID SHUAIB F-3313
AHMED TAUQIR F-3324
HAMMAD SHEIKH F-3325

Representation
Segmentation techniques yield raw data in the form of pixels along a boundary or pixels contained in a region. These data sometimes are used directly to obtain descriptors. Standard uses techniques to compute more useful data (descriptors) from the raw data in order to decrease the size of data.
Chain Codes

A chain code is a lossless compression algorithm for monochrome images. The basic principle of chain codes is to separately encode each connected component, or "blob", in the image. For each such region, a point on the boundary is selected and its coordinates are transmitted. The encoder then moves along the boundary of the region and, at each step, transmits a symbol representing the direction of this movement. This continues until the encoder returns to the starting position, at which point the blob has been completely described, and encoding continues with the next blob in the image.
This encoding method is particularly effective for images consisting of a reasonably small number of large connected components.
Some popular chain codes include the Freeman Chain Code of Eight Directions (FCCE), Vertex Chain Code (VCC), Three Orthogonal symbol chain code (3OT) and Directional Freeman Chain Code of Eight Directions (DFCCE).

Code chains are unacceptable because the resulting chain of codes tends to be quite long. Any small disturbances along the boundary due to noise or imperfect segmentation cause changes in the code that may not be related to the shape of the boundary. Solve the problems by resample the boundary by selecting a larger grid spacing however, different grid can generate different chain codes starting point is arbitrary. The chain code of a boundary is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. Using the red, blue, yellow and green beads, devise and lay out a three color code for each of the following letters (codon). For example Z = green : red : green.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    it 345 study guide final

    • 1027 Words
    • 5 Pages

    inter character gap serves as a break between the characters of a discrete encoded bar code… The width of the gaps should not be more than 4x dimensions…

    • 1027 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cse 373 Final Note

    • 955 Words
    • 4 Pages

    Path Compression- Every Node on the path from x to the root has its parents changed to the root.…

    • 955 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    2: Redundant via Hamming code; an error-correcting code is calculated across corresponding bits on each data disk, and the bits of the code are stored in the corresponding bit positions on multiple parity disks. 3: Bit-interleaved parity; similar to level 2 but instead of an error-correcting code, a simple parity bit is computed for the set of individual bits in the same position on all of the data disks. 4: Block-interleaved parity; a bit-by-bit parity strip is calculated across corresponding strips on each data disk, and the parity bits are stored in the corresponding strip on the parity disk. 5: Block-interleaved distributed parity; similar to level 4 but distributes the parity strips across all disks. 6: Block interleaved dual distributed parity; two different parity calculations are carried out and stored in separate blocks on different…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    How would the pieces and components of this network relate to each other? Define all the components of this type of network.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lan operating systems

    • 404 Words
    • 2 Pages

    How would the pieces and components of this network relate to each other? Define all the components of this type of network.…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 726 Words
    • 3 Pages

    Network encoding scheme = set of rules that define how to change the pattern of the waveforms of energy to represent binary 0’s and 1’s (how it is transmitted and interpreted by both nodes)…

    • 726 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Ict Unit 30

    • 2076 Words
    • 9 Pages

    JPG file - JPG files, also known as JPEG files, are a common file format for digital photos and other digital graphics. When JPG files are saved, they use "lossy" compression, meaning image quality is lost as file size decreases.…

    • 2076 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Hansen, R., Harris, A., Phenix, A., Thornton, D. (2003). STATIC 99 Coding Rules – Revised 2003. Retrieved June 18, 2009 from http://ww2.ps-sp.gc.ca/publications/corrections/pdf/Static-99-coding-Rules_e.pdf…

    • 2465 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Medical Coding

    • 450 Words
    • 2 Pages

    I. The first step in coding is to locate the main term in the Alphabetic Index.…

    • 450 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cardiac Pacemaker Essay

    • 10594 Words
    • 43 Pages

    by a series of three or four letters. (There is a fifth position in the code, which…

    • 10594 Words
    • 43 Pages
    Powerful Essays
  • Powerful Essays

    Digital Media and Society

    • 5379 Words
    • 22 Pages

    * The amount of capacity that digital information takes up on any network can be reduced dramatically through compression and decompressed when needed…

    • 5379 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Cavlc example

    • 2036 Words
    • 9 Pages

    residue is also of size 4x4. Then this transformed residue is quantized (dividing by some…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Lossy compression

    • 1713 Words
    • 6 Pages

    In this section we describe a number of compression techniques that allow loss of information, hence the name lossy compression. We begin with a look at quantization which, in one way or another, is at the heart of all lossy compression schemes.…

    • 1713 Words
    • 6 Pages
    Better Essays

Related Topics