2. Donoho D L, Johnstone I M. Ideal spatial adaptation by wavelet shrinkage. Biometrika, 1994, 81(3): 425-455
4. Ali S M, Javed M Y, Khattak N S. Wavelet-based despeckling of synthetic aperture radar images using adaptive and mean filters. Proceedings of World Academy of Science: Engineering and Technology, 2007, 25(11): 39-43
5. Chochia P A. Application of image frequency filtering to elimination of the noise caused by the embossing of the photographic paper. Journal of Communications Technology and Electronics, 2011, 56(12): 1518-1521
6. Li H B, Yu C B, Zhang D M, et al. Study on finger vein image enhancement based on ridgelet transformation. Journal of Chongqing University of Posts and Telecommunications: Natural Science, 2011, 23(2): 224-230 (in Chinese).
11. Jung C R, Scharcanski J. Wavelet transform approach to adaptive image denoising and enhancement. Journal of Electronic Imaging, 2004, 13(2): 289-285
12. Sudha S, Suresh G R, Sukanesh R. Wavelet based image denoising using adaptive thresholding. Proceedings of the 7th IEEE International Conference on Computational Intelligence and Multimedia Applications (ICCIMA’07): Vol 3, Dec 13-15, 2007, Shivakasi, India. Los Alamitos, CA, USA: IEEE Computer Society, 2007: 296-300
13. Phinyomark A, Limsakul C, Phukpattaranont P. Optimal wavelet functions in wavelet denoising for multifunction myoelectric control. ECTI Transactions on Electrical, Electronics, and Communications, 2010, 8(1): 43-52
14. Manjón J V, Coupé P, Buades A, et al. New methods for MRI denoising based on sparseness and self-similarity. Medical Image Analysis, 2012, 16(1): 18-27
15. Li Q W, Chen X G. Maximum likelihood estimation-based denoising of magnetic resonance images using restricted local neighborhoods. Physics in Medicine and Biology, 2011, 56(10): 5221-5234
16. Freire S L, Ulrych T J. Application of singular value decomposition to vertical seismic profiling. Geophysics, 1988, 53(6): 778-785
17. Hedaoo P, Godbole S S. Wavelet thresholding approach for image denoising. International Journal of Network Security & Its Applications, 2011, 3(4): 16-21 |