Downloads: 107 | Views: 266
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016 | Popularity: 6.7 / 10
A Colorization Algorithm with Artifacts Suppression on Real Time Video
Sneha P. Mete, Mayur S. Dhait
Abstract: color manipulation is a very common activity in now a day. Color transfers between images are difficult operation in images editing but easily suffers from some corruptive artifacts in the mapping process. In this paper, a color transfer approach with corruptive artifacts suppression is represent, which performs iterative probabilistic color mapping and this Paper extend the technique to colorize the videos. It is done with the help of self-learning filtering scheme and multiscale detail manipulation scheme, which minimizes Kullback-Leibler distance. This will help us to colorize both already colored and gray scale videos. This method achieves a sound grain suppression which means it prevent from being published then a color fidelity that means the degree of exactness with which something is copied or reproduced and detail appearance. First, an iterative probabilistic color mapping is applied to construct the mapping relationship between the reference and target frames. Then, a self learning filtering scheme is applied into the transfer process to prevent from artifacts and extract details. The transferred output and the extracted multi-levels details are integrated. This is done by the measurement minimization to yield the final result.
Keywords: Colored/ gray scale videos, Corruptive Artifacts, Grain, Color Fidelity
Edition: Volume 5 Issue 4, April 2016
Pages: 1126 - 1131
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera