Advancements in image quality assessment: a comparative study of image processing and deep learning techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.39Keywords:
Image quality assessment, Image processing, Deep learning, Machine learning, Neural networks, Peak signal-to-noise ratio, Structural similarity index measure.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Image quality assessment (IQA) is a crucial field in image processing that ensures optimal performance in various applications such as medical imaging, surveillance, and multimedia systems. The evolution of IQA methods spans from traditional image processing techniques to the incorporation of advanced deep learning algorithms. This literature review aims to provide a comprehensive analysis of the methodologies used in image quality assessment, focusing on both full-reference, reduced-reference, and no-reference approaches. Traditional methods such as peak signal-to-noise ratio (PSNR) and structural similarity index (SSIM) are discussed alongside more recent deep learning-based approaches that leverage convolutional neural networks (CNNs), generative adversarial networks (GANs), and transformers for feature extraction and prediction. Deep learning models have demonstrated enhanced performance in complex tasks like noise reduction, image reconstruction, and compression artifacts correction. Additionally, this review highlights the challenges in IQA, including the subjectivity of human visual perception and the limitations of various algorithms in handling different types of distortions. It concludes by suggesting future research directions that integrate hybrid models combining classical techniques with deep learning to achieve more robust and efficient image quality evaluation.Abstract
How to Cite
Downloads
Similar Articles
- Suresh Kumar, AGRO-WASTE MANAGEMNT BY VERMICOMPOSTING USING EISENIA FETIDA AND PERIONYX SANSIBARICUS EARTHWORMS , The Scientific Temper: Vol. 9 No. 1&2 (2018): The Scientific Temper
- M. Prabhu, A. Chandrabose, Optimization based energy aware scheduling in wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Selva Kumar D, Revisiting the challenges of disinvestment practices and central public sector enterprises (CPSEs): Indian empirical evidence , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Chirag Darji, Rajesh Chauhan, Views of undergraduates on Vikshit Bharat@2047 , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Finney D. Shadrach, Harsshini S, Darshini R, Grapevine leaf species and disease detection using DNN , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- P. Rajkumar, B. Vijay Bhaskar, Assessing the impact of indoor air pollution on respiratory health: A survey of home residents in rural area , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Sony Kumari, Prashant Kumar, HYDROBIOLOGY AND PHYTOPLANKTON POPULATION IN CERTAIN PONDS OF NORTH BIHAR , The Scientific Temper: Vol. 9 No. 1&2 (2018): The Scientific Temper
<< < 16 17 18 19 20 21 22 23 24 25 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Improving image quality assessment with enhanced denoising autoencoders and optimization methods , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper