Image Quality Evaluation in Security Imaging Systems

@article{Klima2007ImageQE,
  title={Image Quality Evaluation in Security Imaging Systems},
  author={Milos Klima and Petr P{\'a}ta and Karel Fliegel and Petr Hanzl{\'i}k},
  journal={IEEE Aerospace and Electronic Systems Magazine},
  year={2007},
  volume={22},
  pages={22-25}
}
The subjective image quality of image or video information is a crucial item in security imaging systems. During the last five years our lab has tested and verified various approaches to the image compression for security purposes and the evaluation of subjective image quality. In the paper we discuss selected important facts related to the subjective image quality evaluation and we present some anomalous experimental behavior of image compression techniques. An object-defined approach is… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 15 CITATIONS

Resource Allocation for NOMA-based V2V System

  • 2018 International Conference on Network Infrastructure and Digital Content (IC-NIDC)
  • 2018

The video people detection based on neural network

  • 2015 IEEE 16th International Conference on Communication Technology (ICCT)
  • 2015

Handwritten digit recognition based on DCT features and SVM classifier

  • 2014 Second World Conference on Complex Systems (WCCS)
  • 2014
VIEW 1 EXCERPT
CITES METHODS

A new fast interpolation method based on edge extraction

  • 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
  • 2012

Multi-focus image fusion algorithm based on UDCT

  • 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content
  • 2012
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-4 OF 4 REFERENCES

BT.500-10, Methodology for the Subjective Assessment of the Quality of Television Pictures

Rec. rITU-R
  • Diploma thesis, CTU Prague,
  • 2000
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Image compression techniques in the field of security technology: examples and discussion

  • 38th Annual 2004 International Carnahan Conference on Security Technology, 2004.
  • 2004
VIEW 2 EXCERPTS

Efficient method for security image data compression

  • IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
  • 2003
VIEW 3 EXCERPTS

Hwyang, Handbook of Neural Network Signal Processing, 'he Electrical Engineering and Applied Signal Processing

Y. H. Hu, i.-N
  • 2002
VIEW 2 EXCERPTS