Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,325,574 papers from all fields of science
Search
Sign In
Create Free Account
Lossy Compressed Image
An image that has been encoded using a lossy compression algorithm.
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
1 relation
DICOM Terminology
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Position Dependence of Fractional Derivative Models for Loudspeaker Voice Coils with Lossy Inductance
A. W. King
,
F. Agerkvist
2017
Corpus ID: 114342533
Lossy Inductance DTU Orbit (08/12/2018) Position Dependence of Fractional Derivative Models for Loudspeaker Voice Coils with…
Expand
2009
2009
Wavelet compression techniques for digital image optimization
Ida Laila Ahmad
,
Norhidayah Mat Sout
2009
Corpus ID: 55983031
A visual information given by a digital image consumes enormous storage capacity. Moreover, the memory, bandwidth and…
Expand
2006
2006
Methods for Lossy Compression of Images Corrupted by Multiplicative Noise
N. Ponomarenko
,
V. Lukin
,
M. Zriakhov
,
O. Pogrebnyak
International Conference - Modern Problems of…
2006
Corpus ID: 14671737
Compression of images corrupted by multiplicative noise is characterized by some specific features. First, lossy image…
Expand
2005
2005
Delay-extraction-based sensitivity analysis of multiconductor transmission lines with nonlinear terminations
N. Nakhla
,
A. Dounavis
,
M. Nakhla
,
R. Achar
IEEE transactions on microwave theory and…
2005
Corpus ID: 2711487
An efficient approach is presented for time-domain sensitivity analysis of lossy multiconductor transmission lines with respect…
Expand
2004
2004
A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ
Ren-Junn Hwang
,
T. Shih
,
Chuan-Ho Kao
2004
Corpus ID: 11453363
A lossy compression tolerant data hiding method is proposed in this paper. The image which hides data is named a stego-image…
Expand
2004
2004
Robust image authentication using hash function
H. Kobayashi
,
H. Kiya
IEEE Region 10 Conference TENCON .
2004
Corpus ID: 22967262
We propose an image monitoring scheme for detecting malicious alternation and broadcast monitoring. This method has a property…
Expand
1999
1999
Suppression of ringing artifacts with an adaptive shrinkage algorithm
N. Law
,
W. Siu
,
Degan Feng
IEEE Pacific Rim Conference on Communications…
1999
Corpus ID: 61666410
A non-iterative wavelet-based algorithm was proposed to reduce the ringing artifacts associated with a lossy compressed image…
Expand
1997
1997
Detection of small targets in compressed imagery: I. Performance of edge detectors over VQ- and VPIC-compressed imagery
M. Schmalz
Defense, Security, and Sensing
1997
Corpus ID: 62618147
The cost of processing imagery that exhibits a large data burden can be reduced by compressive processing, which computes over a…
Expand
1990
1990
Radiation from an antenna near an arbitrarily shaped resistive sheet
A. Glisson
Symposium on Antenna Technology and Applied…
1990
Corpus ID: 38792921
The radiation characteristics of a wire antenna located near an arbitrarily shaped resistive sheet are investigated, A triangular…
Expand
1958
1958
Variational principles for guided electromagnetic waves in anisotropic materials
W. Hauser
1958
Corpus ID: 126110441
It is the purpose of this paper to develop a general method for obtaining approximate solutions to the problems of the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE