Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348)
DOI: 10.1109/icip.1999.817132
|View full text |Cite
|
Sign up to set email alerts
|

High performance scalable image compression with EBCOT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
310
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 253 publications
(310 citation statements)
references
References 14 publications
0
310
0
Order By: Relevance
“…Table 2 illustrates the PSNR results of three algorithms over a wide range of compression ratios. The three algorithms are our proposed algorithm, the EBCOT algorithm of JPEG2000 [21], and Martin's algorithm [6]. From Table 2, we can see that compression with our algorithm always yields a higher PSNR than compression with Martin's algorithm, and a lower (about 0.4-0.5 dB) PSNR than that of the JPEG2000 algorithm.…”
Section: Resultsmentioning
confidence: 79%
See 2 more Smart Citations
“…Table 2 illustrates the PSNR results of three algorithms over a wide range of compression ratios. The three algorithms are our proposed algorithm, the EBCOT algorithm of JPEG2000 [21], and Martin's algorithm [6]. From Table 2, we can see that compression with our algorithm always yields a higher PSNR than compression with Martin's algorithm, and a lower (about 0.4-0.5 dB) PSNR than that of the JPEG2000 algorithm.…”
Section: Resultsmentioning
confidence: 79%
“…Then we compare these results with those of JPEG2000 and Martin's algorithm. The kernel algorithm of JPEG2000 is EBCOT [21]. JPEG2000 is currently the most popular algorithm for image coding.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The model given by (13) and (14) is an LP problem and thus is easily solvable by the modified simplex method [9, p. 175]. In this model, the decision variables x i,b are assumed to be continuous, and hence the optimal solutions x * i,b can take any fractional or real values within the specified bounds [0, u i,b −u i,b−1 ].…”
Section: Methodsmentioning
confidence: 99%
“…There are two kinds of watermarks: visible and invisible. For this paper, we are only interested in the invisible watermarks [1,[8][9][10][11][12]. An invisible watermark is an image embedded in a host image that cannot be easily detected by the raw human visual.…”
Section: Introductionmentioning
confidence: 99%