We classify the different ghost detection and removal methods using several criteria as below:
Methods | Ghost detection | Ghost removal | ||||
Reference image needed | Detect domain | Fusion domain | ||||
No | Yes | Radiance | Image | Radiance | Image | |
Reinhard[1] | √ | √ | ||||
Jacobs[2] | √ | √ | ||||
Sidibe[3] | √ | √ | √ | |||
Grosch[4] | √ | √ | √ | |||
Pece[5] | √ | √ | √ | |||
Zhang[6] | √ | √ | √ | |||
Gallo[7] | √ | √ | √ | |||
Min[8] | √ | √ | √ | |||
Sung[9] | √ | √ | ||||
Hu[10] | √ | √ | ||||
Zheng[11] | √ | √ | ||||
Sen [12] | √ | √ | ||||
Zhang[13] | √ | √ | √ | |||
Heo[14] | √ | |||||
Khan[15] | √ | |||||
Pedone[16] | √ | |||||
Kang[17] | √ | |||||
Zimmer[18] | √ | |||||
Hu[19] | √ | |||||
Lee[20] | √ | √ | √ |
You can view the deghosting performance of the methods mentioned above at Dataset.
Reference: