• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xie Wenda, Qiu Junhong, and Wang Lei. A Practical and Efficient Contrast Enhancement Method[J]. Journal of Computer Research and Development, 2013, 50(4): 787-799.
Citation: Xie Wenda, Qiu Junhong, and Wang Lei. A Practical and Efficient Contrast Enhancement Method[J]. Journal of Computer Research and Development, 2013, 50(4): 787-799.

A Practical and Efficient Contrast Enhancement Method

More Information
  • Published Date: April 14, 2013
  • The principle of image enhancement is based on increasing the contrast between adjacent pixels, which enables enabling viewers to visually perceive images with more details in the textures and edges. Many contrast enhancement methods have been proposed to improve the quality of images and most of them are based on histogram equalization (HE). This paper proposes a contrast enhancement technique modified by previous study to keep the brightness of the enhanced image. The implementation of the modified version is also simplified. The proposed method is not only suitable for the requirement of video images, the adjustment for clear display made by viewers, but also simplified for the real world. In the hardware implementation, the proposed method can reach 43.6 MSps(million sample per second) which is 3.23 times faster than the demand of SDTV NTSC 720×480i specification and 1.61 times faster than the demand of EDTV NTSC 720×480p specification. Moreover, for evaluating the efficiency of the related techniques by more fairly and complete observations, the paper makes comprehensive evaluations based on several subjective and objective evaluation metrics for various famous contrast enhancement techniques. The several important issues about the efficiency characters are also included in this paper.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (1900) PDF downloads (928) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return