Pattern-based Chain Code for Bi-level Shape Image Compression

Size: px
Start display at page:

Download "Pattern-based Chain Code for Bi-level Shape Image Compression"

Transcription

1 Pattern-based Chain Code for Bi-level Shape Image Compression Y. Arockia Raj Assistant Professor, Department of Computer Science and Engineering, PSNA College of Engineering and Technology, Dindigul, Tamil Nadu, India. P. Alli Principal, Vellamal College of Engineering and Technology, Madurai, Tamil Nadu, India. Abstract Contour based shape coding schemes are outperforming other compression methods. This paper focuses on shape compression with bi-level images, where the edge follows fine curvatures unlike natural images. In general shape contour is saved either as Digital Straight Line Segments (DSLS) or in the form of chain codes. The DSLS techniques are working based on approximating the line segments and the chain code are constructed by finding the redundant patterns. This paper follows the chain code based approach and presents a novel shape coding scheme based on Pattern-based Chain Coding (PCC) to achieve better compression ratio. Initially the contours are extracted and coded with Binary Chain Code (BCC) based on 8-adjacent pixel neighborhood. Then the subsequent binary coding are searched to identify the patterns and their run-lengths. The patterns are replaced with new symbols along with their run-lengths to reduce the size of BCC. The performance of the proposed edge pattern based image compression method is analyzed with two benchmark datasets of shapes and compared with state-of-art edge encoders. The investigation shows that the proposed compression scheme achieves better compression ratio. Keywords: image compression, edge detection, shape coding, edge decoding, compression rate. I. INTRODUCTION Advances in object-oriented video coding using shape information [1], [2], [22] are increasingly facilitating more efficient retrieval, manipulation and interactive editing functionality for both natural and synthetic images. An efficient coder is expected to make of limited bandwidth for the applciations like medical imaging, surviellence, online streaming, multimedia contents, mobile video transmissions and smart televsions. For example, in object-oriented image retrieval applications, since shape is a key feature of objects, the accuracy of shape greatly impact the retrieval efficiency and accuracy. In medical image applications, accurate shape of an organ object can also help to diagnose a disease or undergo an operation. An effcetive shape coder can significantly improve the performance such applications and devices. In general, objects in the image are defined by their shape as well as texture [10], hence shape coding has become an integral part of object-oriented image coding. There are two major approaches for shape coding: bitmap-based where every pixel within the shape is encoded, contour-based, here only the boundary pixels are encoded. 3064

2 (a) (b) (c) Figure 1. Shape Coding example, (a) the object shape, (b) the shape contour, and (c) shape coding For example, consider an object shape in Figure 1(a), the contour is displayed in Figure 1(b), and the resulting shape contour is displayed in Figure 1(c). The main objective of shape coding is to reduce the number of vertices to represent the contour. As shown in the figure 1(c), the decoded shape (solid line) requires only 13 vertices compared with the original 297 vertices (dotted line) with a small distortion. Reference [10] presented a review of shape coding approaches including the Context-based Arithmetic Encoding (CAE), and conclude that the vertex-based polynomial shape coding is optimal in an Operational Rate Distortion (ORD) sense. Reference [28] studied both distortion metrics and geometric distortion measurement techniques. Generally, bitmap-based methods are fast and simple and can be used for both lossy and lossless shape coding. However, their coding efficiency usually is not high. Unlike bitmap-based techniques, contour-based methods only extract and encode the contours of objects and their coding efficiency are usually high. Typical methods of this kind include the chain coding techniques [17], the curve fitting techniques such as the polygon approximation techniques and the spline approximation techniques [11]; [26]. Generally, the curve fitting techniques can acquire higher compression efficiency than both the chain coding techniques and the bitmapbased techniques. However, both the chain coding techniques and the bitmap-based techniques can be used for both lossy and lossless applications, while the curve fitting techniques can only be used for lossy purposes. This paper follows chain coding approach, proposed a Pattern-based Chain Coding (PCC) technique to compress the shapes effectively. Here the redundant patterns in the chain codes are identified and replaced with a new symbol and its run-length to reduce the size of the original chain codes. The rest of the paper is organized as follows: the following section presents the related works for shape coding. Section 3 explains the proposed PCC technique. Section 4 discusses the experimental setup and the results. Section 5 concludes the paper. II. RELATED WORKS There are two categories of techniques are available for shape coding: (i) straight line approximation and (ii) chain coding. This section presents a brief review on both techniques. A. Straight Line Approximation based Techniques Reference [30] proposed a shape-coding method based on skeleton and the boundary distance from the skeleton. The merit of this method is that it has lower approximation error and bit rate. Since the independent skeleton and distance signals are uncorrelated with each other, this encoding method is efficient. Reference [12] models the edges by Digital Straight Line Segments (DSLS). Compare to conventional algorithms like JBIG, JBIG-2 and MPEG4 CAE [10], DSLSC provides better results, as it fully explores the information given by the local straightness of the contour, which is not the case for the other methods. Reference [16] proposed an imagedependent shape coding algorithm, which encodes shape as dependent meta-data. Both the coding and the decoding processes are designed to be dependent on the underlying image. The correlation between image and shape can be effectively removed and the coding efficiency is improved on average by 300% over most of the 3065

3 existing techniques such as the JBIG, JBIG2, and MPEG-4 CAE. However, this is also a lossy coding scheme and cannot be used for lossless applications. Reference [2] presented an efficient compression scheme for bi-level images containing locally straight edges. This method is based on a local analysis of the DSLS of the causal part of the object boundary, which is used in the context definition for arithmetic encoding. Coding is achieved in one single pass in raster scan order, which is possible because the local analysis of the source geometry is executed on the fly, without requiring a preprocessing step of vectorizing the source data. The result indicate the acceptable performance improvement. Reference [4] proposed to generate an optimal n-ary incomplete context tree by first constructing a complete tree up to a predefined path and creating the optimal tree by pruning out nodes that do not provide improvement in compression. This scheme is tested with map images, and the result indicate that this method achieves lowest bit rate comparatively. Reference [3] extended DSLSC coding method for gray-level alpha planes in object-based video. Here, the alpha plane is segmented into three layers: binary shape layer, opaque layer and intermediate layer. Different encoding methods are applied to code each layer and cross-layer correlations is utilized to reduce the bit-rate. Conventionally, the Sliding Window (SW) has been applied in vertex-based ORD to improve compression rate, as its length directly impacts upon the bit-rate. Reference [31] proposed a shape coding scheme that can deal with shapes with holes based on vertex chain code. Both polygon and quadratic B-spline based shape encoding strategies were developed ([27]; [13]; [10]) by selecting the set of control points that incurred the lowest bit rate. Reference [14] addressed the issue of distortion measurement for B-spline-based shape coding and proposed a new metric that is fairly perceptually consistent. Reference [29] presented a technique to estimate the optimum SW-length within a rate-distortion framework. Investigation results show the significance improvement in shape coding. Reference [33] proposed a contour-based framework for near lossless shape coding. Here, for a given shape image, object contours are extracted and thinned first, then the contour is transformed into chain codes. The chain segments are encoded with two different coding modes, and the code with shorter length is chosen as final code. The result indicate the superior performance of the chain code. Recently, some new contour-based methods have also been proposed. Reference [8] presented a line fitting algorithm based on split-and-merge approach to fits a number of elongated ellipses to 2D points (DSaM). The major and minor axes of the ellipses are used to represent the points and the collinear major axes of the adjacent ellipses are merged together to reduce their number. This method does not require an ordering of the points and exactly represents the contour chains that contain joints and mixed structures. Reference [7] proposed a method for the efficient encoding and decoding of a shape with application to edge map image compression. The coder relies on starting and ending points of each contour segments and their length. The results indicate that this coder can achieve better results by making use of efficient line detection algorithm. B. Chain Code based Techniques Chain coding is widely used in contour-based shape coding as they effective, however, they require more memory space to store the chain codes. Hence, it is ubiquitous to reduce the chain code length. Reference [6] introduced the concept of chain code for shape encoding, it considers the correlation between successive pixels with length of the line segments and direction, followed by numerous techniques. Chain code is a sequence of symbols. The set in the Freeman Eight Directional Chain Code (FEDCC) consists of eight possible directions for each pixel s neighbor, while the set in the Freeman Four Directional Chain Code (FFDCC) explores only four possible adjacent. Reference [5] proposed a cell based chain code rather than pixel based, called as Vertex Chain Code (VCC), here only three symbols are used to represent the contour. Further it is modified to reduce the storage space using compressed VCC (C_VCC). Reference [19] presented a proof that JBIG can be a successful coder with transition points. The simulation results indicate that Joint Bi-level Image experts Group (JBIG) image encoding outperforms the other chain coding approaches. This is important because it offers a straightforward approach for the implementation of the contour coding method based on transition points, avoiding the step of designing and implementing non-standard ad-hoc codecs. Reference [18] attempted to perform shape coding using a multiple grid chain code was proposed, which can support both lossless and quasilossless coding. Reference [20] presented an efficient method for encoding arbitrary contours based on symbol based Adaptive Context-based Arithmetic Encoder (CAE) in binary domain. The simulation results indicate the superior performance over MPEG-4 shape coder. Reference [21] presented a near-lossless compression based on regions and boundaries. The boundaries are encoded with transition points, and the regions are encoded based on entropy measures. The results indicate the significant improvement in compression ratio. 3066

4 Reference [15] proposed an Angle Freeman Chain Code (AF8), which considers eight possible adjacent along with Huffman coding to compress the chain code. Pattern substrings analysis to find high redundancy in binary shapes is carried out to improve compression levels in binary objects. Reference [24] proposed a code contour shape, called 3OT, and they found better compression properties than Freeman codes. An effort to improve C_VCC was done in [25], in which small strings of less than five ones and zeros were used to extend the alphabet in a called M_3OT code. Reference [23] further proposed the modified directional Freeman Chain code in eight directions by a set of nine symbols (MDF9), which modifies the contour at first and adapts the symbols to represent contours efficiently and improvement of the comrpession rate is reached by carrying out a pattern substrings analysis to find high redundancy in binary shapes. The comparative study with other exiting approaches state the significance of MDF9 coder. Reference [32], used the move-to-front transform and adaptive run-length encoding to compress VCC and other chain codes in a lower bit rate. Reference [9] modified the AF8 code with chain division and symbol substitution. Reference [9] applied a morphological operation to reduce the chain code, and the distribution transform is applied to rearrange the binary stream. Experimental results show that the morphological operation can reduce the code length. III. PATTERN-BASED CHAIN CODING This section illustrates the proposed shape coding for edge map based compression as depicted in Figure 2. At the first step, the contour of the shape is extracted and segmented to maintain the contours without overlap or intersection points. For every contour the starting point and their length are store into a vector. Then the contours are transformed into chain code and further compressed with pattern based coding. Bi-level Image Contour Detection Classify the contour points Segment the contours Store the contour starting points (ES) Prepare the header for compressed image Construct the Patternbased Chain Code Construct the Binary Chain Code Figure 2. The Proposed Pattern-based Chain Coding Framework A. Contour Extraction There are numerous methods available to extract the object contours. Here we have used zero-cross edge detection operator to extract the object contours. Figure 3 shows a sample shape and its contour, where the bilevel image pixels values for foreground points and background points are 0 and 1 respectively. (a) (b) 3067

5 (c) Figure 3. Shape Contour, (a) fish shape, (b) fish contour, (c) apple shape, (d) apple contour (d) After extracting the contour map, the contour points are collected by storing their (x, y) position into an array CP. Each row of CP contains two columns to store the x- and y-location of the contour point. Then the contour points are classified into three classes: end-points (starting points), boundary-points, and intersectionpoints. The 4-connected (c4) and 8-connected (c8) count of each contour points is estimated to classify them as given below: If c8 <2 then the contour point is an end-point for a contour segment. If c8 == 2, If the neighbors are adjacent, and c8 c4 0, then the contour point is an end-point, else it is a boundary point. If the neighbors are not adjacent, the contour point is also a boundary point. In case, if c8 > 2, If c4 >= 3, then the contour point is an intersection point else if c8 c4 <=2, then the contour point is also a boundary point, else the contour point is labeled as intersection point. Figure 4 explains the class label assignment, the black pixels represent the contour points, the green, blue and red pixels represent the labels end-point, boundary-point and intersection-point respectively. For P1, c8 = 1 end-point For P2, c8 = 2, but the neighbors are not adjacent boundary point For P3, c8 = 2, but the neighbors are not adjacent boundary point For P4, c8 = 2, but the neighbors are not adjacent boundary point For P5, c8 = 1 end-point 3068

6 For P1, c8 = 1 end-point For P2, c8 = 2, but the neighbors are not adjacent boundary point For P3, c8 = 2, but the neighbors are not adjacent boundary point For P4, c8 = 2, but the neighbors are not adjacent boundary point For P5, c8 = 2, but the neighbors are not adjacent boundary point For P6, c8 = 1 end-point For P1, c8 = 1 end-point For P2, c8 = 2, but the neighbors are not adjacent boundary point For P3, c8 = 3, c4 < 3, c8 c4 = 2 boundary point For P4, c8 = 2, neighbors are adjacent, c8 c4 == 0 boundary point For P5, c8 = 4, c4 < 3, c8 c4 =2 boundary point For P6, c8 = 2, neighbors are adjacent, c8 c4 == 0 boundary point For P7, c8 = 3, c4 < 3, c8 c4 = 1 boundary point For P8, c8 = 2, neighbors are adjacent, c8 c4 == 0 boundary point For P9, c8 = 2, neighbors are adjacent, c8 c4 0 end-point For P1, c8 = 1 end-point For P2, c8 = 3, c4 < 3, c8 c4 = 2 boundary point For P3, c8 = 3, c4 == 3 intersection point For P4, c8 = 3, c4 < 3, c8 c4 = 1 boundary point For P5, c8 = 2, but the neighbors are not adjacent boundary point 3069

7 For P6, c8 = 1 end-point For P7, c8 = 4, c4 < 3, c8 c4 = 3 intersection point For P8, c8 = 2, but the neighbors are not adjacent boundary point For P9, c8 = 1 end-point Figure 4. Contour points class label assignment B. Contour Segmentation The contours with intersection or crossing points should be identified and segmented to construct efficient chain codes. At first, a label matrix of size same as the contour image is created and initialized with 0 for all the points. The corresponding location of every contour point in the label matrix is marked as either 1, 2, or 3 to represent the contour point is either as end-point, boundary-point or intersection point respectively. Basically the chain code is a sequence of symbols representing the contour direction from the starting point. It is necessary to segment the contours which has intersection points for efficient chain codes. Figure 5. 8-connected Freeman chain code traversal order of the pixels With the label matrix, for an intersection point at (p, q) with the label 3, the list of 8-connected neighbors has label 2 are collected in the counter clockwise order according to 8-connected Freeman chain code. The length of the list is estimated, and if it has two adjacent boundary point, then the current contour point s label is changed to 2 (mark it as boundary point), and change the other adjacent intersection points label as 1 (mark them as new contours). For example, consider the following contour map as shown in Figure 6(a). (a) (b) (c) Figure 6. Contour Segmentation sample1 (a) sample contour, (b) intersection point removal, (c) contours after segmentation The intersection point at (6, 5), has two boundary points, hence the point is changed with the label 2, and the other adjacent intersection points are changed as starting-point as shown in Figure 6(b), thus the contour map is clearly marked as it has 4 contours as shown in Figure 6(c). Suppose, if the intersection point has only one adjacent boundary point and the others are intersection points, then the intersection point which comes first in the traversal order is marked as boundary point, and the current 3070

8 intersection point label is also changed as 2, and the rest of the adjacent intersection points label are marked as 1 (represent them as new contours). For example, consider a sample contour map as shown in Figure 7(a), for the intersection point at (6, 5), it has only one adjacent boundary point, so, the adjacent intersection point which is at (6, 6) is marked as boundary point, and the current intersection point is also marked as boundary point. The rest of the adjunct intersection points are marked as starting point as shown in Figure 7(b), hence the contours is segmented with 3 contours as depicted in Figure 7(c). (a) (b) (c) Figure 7. Contour Segmentation sample2 (a) sample contour, (b) intersection point removal, (c) contours after segmentation The label matrix after the segmentation shown in Figure 6(c) & 7(c)indicates that the overlapped contours are segmented properly, so that the chain code construction can be done effectively. C. Chain code representation The chain codes are generated as sequence of symbols to represent the flow of the contours. In general, a contour point P, can have 8-adjancet points. Figure 8(a) shows the all possible direction of 8 neighbors. In the proposed chain code representation, the neighbors are marked with the numbers starts from 0 to 7, later encoded into binary strings of 3-bits each. Figure 8(b) depicts the binary string. (a) (b) Figure 8. Contour-Point Neighbors (a) 8-adjancent directions, (b) Binary string for chain code The possibilities are explored in the order of E, N, W, S, NE, NW, SW, and SE, as it never skips the contour pixels for the following condition. If the neighbors are explored either in clockwise or counter clockwise direction, the chain code might skip the pixels in the original path. Figure 9(a) shows a sample contour, P is the current contour point. If the adjacent pixels are visited in clockwise direction, then the traversal is P P2 P3, where the contour point P1 is missed as shown in Figure 9(b). Whereas, based on the proposed order of visit, the traversal is P P1 P2 P3, which covers all the pixels in the path as shown in Figure 9(c). 3071

9 (a) (b) (c) Figure 9. Binary Chain Code construction (a) contour points, (b) Traversal in CW direction, (c) Traversal based on proposed order of directions. D. Binary Chain Coding After contour segmentation, the chain codes are constructed for each contour. Initially, from the label matrix, the starting points which has label 1 are collected and stored into an array called ES, where it stores the (x, y) position of the label and the length of the contour in third column. The length column is initialized with zero. For every starting point in E, the contour starts by finding and coding the next point in the contour. For a contour point P, the adjacent boundary-points are collected as given in the traversal order, and the one which comes first in the list is considered as the next point in the contour. Based on its traversal order index, the corresponding binary string is added to the chain code. It is noted that, as the adjacency is considered only with the boundary points, the other starting points are ignored automatically. Once the contour point is added to chain code, its label will be updated as zero, to mark that the contour point is already visited. While continuing the contour, when a contour point ends up no adjacent boundarypoints, it means that the contour ends at the next point. The last point is identified by finding the adjacent starting-point, and add the corresponding binary string to the chain code. At the same time, the corresponding starting-point entry is removed from the array ES. And for every contour, the number of contour points are calculated as length of the contour and updated in the third column of ES. This procedure is repeated for all the contours, and their binary chain codes are collected to form the complete chain code. Consider a sample contour as shown in Figure 10. Figure 10. Sample contour map The contour starts with P1, and it has the next adjacent at 111, P2 has its adjacent at 111 (as P1 has been visited already), P3 has the first adjacent at 000 (as P5 comes later in list) P4 has the adjacent at 011 (as P3 has visited already), P5 has the first adjacent at 011 (it has 4-adjacents, where, P3 & P4 are already visited, and for P6 & P7, P6 comes first in the adjacent list), P6 has its adjacent at 010, P7 has its adjacent at 010, P8 has its adjacent at 011, 3072

10 Contour ends at P9. With these adjacent location, the Binary Chain Code (BCC) is constructed by arranging them in sequence as given below: {111, 111, 000, 011, 011, 010, 010, 011} E. Pattern-based Chain Coding The chain codes are efficient than DSLS method, however it suffers with redundancy. The redundant chain codes can be simplified by finding the pattern in the chain code and replace them with special symbols. A simple and efficient Pattern-based Chain Coding(PCC) approach to remove the redundant code is proposed here. It is a four step algorithm to reduce the chain code length, the basic idea of this pattern finding approach is replace the successive multiple occurrences with its run-length and finding the pattern of two successive symbols with another new symbol. Initially the binary chain code is replaced with uppercase alphabets starting from A to H. This is to avoid the when the binary strings are replaced with its run-length. Table 1 shows the uppercase alphabet substituted for each binary string in the chain code. TABLE I. ALPHABETS FOR BINARY CHAIN CODES Binary String Alphabet 000 A 001 B 010 C 011 D 100 E 101 F 110 G 111 H At the first step of chain code compression, for each alphabet, its successive count is calculated and the chain code is replaced with the alphabet-symbol followed by its run-length. The run-length coding is done only for the symbol-alphabet which has more than one count. For example, consider the following chain code of 90 symbols, it has 6 different symbols {A, B, C, D, E, F}, requires 3-bits to code each, hence it takes 90 3 = 270 bits of storage space. AAAAAAFFDADADADADADADADADADADADADADADABBBBBBBBBBBBBBEBEBEBCCEE EEEEEFFBBBAAABBBAAABBBFFABCD changed the following chain code as A occurs 6 times, F occurs 2 times, B occurs 14 times, C occurs 2 times, and E occurs 7 times, etc., for the alphabets which are occurring without successive occurrence, are copied once without their run length. The reduced chain code is 'A6F2DADADADADADADADADADADADADADADAB14EBEBEBC2E7F2B3A3B3A3B3F2ABCD' For the memory usage, the code has 12 distinct symbols {1, 2, 3, 4, 6, 7, A, B, C, D, E, F} needs 4-bits to code each, and for the length of 65 symbols it takes, 65 4 = 260 bits of memory space. 3073

11 In the next step, the reduced chain code is searched for two-symbol pattern and if it has multiple occurrence, then the pattern is replaced with a next symbol estimated from the ASCII sequence. A symbol table T1 is constructed to store the two-symbol pattern, and the starting ASCII symbol for T1 is stored as pattern symbol s1. For example, consider the chain code from the previous step, 'A6F2DADADADADADADADADADADADADADADAB14EBEBEBC2E7F2B3A3B3A3B3F2ABCD' The two-symbol patterns identified from the above chain code are DA and EB, they are replaced with the next ASCII symbols I and J respectively, since we have reserved the alphabets A to H for binary coding. Hence the code is changed as 'A6F2IIIIIIIIIIIIIIIB14JJJC2E7F2B3A3B3A3B3F2ABCD' where the symbol table, T1 is constructed as shown below, DA EB and the pattern symbol s1 is assigned with the symbol I. For the memory usage, the current code has 14 unique symbols {1, 2, 3, 4, 6, 7, A, B, C, D, E, F, I, J} requires 4 bits to code, so for the length of 47 symbols it occupies, 47 * 4 = 188 bits of space, with 20 bits of space for two symbol table and one pattern symbol entries. In total, this code would take = 208 bits. Further, the pattern with one symbol followed by a number is identified and if it has more than one occurrence, then the pattern is replaced with the next ASCII symbol in the sequence. Another symbol table T2 is created to store the new patterns identified in this step, and the starting ASCII symbol for T2 is stored as pattern symbol s2. For example, consider the previous chain code, the identified symbol-number pattern are F2, B3 and A3, they will be replaced with the next ASCII symbols K, L and M, and the pattern-symbol is stored with K. 'A6KIIIIIIIIIIIIIIIB14JJJC2E7KLMLMLKABCD' And the symbol table T2, will be updated as F2 B3 A3 For the memory usage, the reduced code has 15 distinct symbols {1, 2, 4, 6, 7, A, B, C, D, E, I, J, K, L, M}, takes a memory space 39 * (for T1 & s1) + 28 (for T2 & s2) = 204 bits of storage space, and still it is costlier than the original. In the final step, the reduced chain code is further searched for symbols with multiple occurrences. The identified symbols are then replaced with their run-length as discussed in the first step. Consider the previous chain code, it will be reduced as 'A6KI15NB14J3NC2E7KLMLMLKABCD' In the overall, the reduced chain code has 18 distinct symbols {1, 2, 3, 4, 5, 6, 7, A, B, C, D, E, I, J, K, L, M, N}, which requires 5 bits to code each. For the memory usage, for the length of 28 symbols, it takes, 28 * 5 + 5*5 + 7*5 = 200 bits of memory space, which is 26% less than the original chain code of 270 bits of storage. Thus the pattern based chain code reduces the length & memory space effectively. The pattern based compression ends up with the reduced chain code after 4 levels of reduction, the code will have the following data for the compressed file. Image dimension 3074

12 Edge array ES, contains starting point & length of each contour Reduced chain coded after pattern based compression Symbol tables T1, T2, and the pattern-symbols s1 & s2. The following text summarizes the proposed chain coding technique. Input the shape image Output the compressed file with the corresponding headers 1. Read a shape image 2. Find its contour by applying zero-crossing edge detection operator 3. Store the edge contour points into an array, CP 4. Label the edge points into three classes: starting-points, boundary-points & intersection-points 5. Collect the intersection-points and label them effectively to segment the contours 6. Store all the starting points into an array, ES 7. For each starting point in E a. Construct the binary chain code with adjacent boundary-points b. Mark the last point as end-point, and remove this point from ES c. Also, store the length of the contour in ES 8. Collect the binary codes of each contour to form the complete chain code 9. Pattern-based chain code compression a. Replace the binary strings with the uppercase alphabets from A to H b. Find the successive occurrence of each alphabet and replace them with the symbol followed by its run-length c. Find the two-symbol pattern and replace them with a new symbol d. Find the symbol-number pattern and replace them with a new symbol e. Find the successive occurrence of each symbol and replace them with the symbol and its runlength. 10. Store the appropriate headers: image dimension, ES, reduced chain code, symbol tables and the patternsymbols. The decoding step starts with the pattern-based chain code. At the first step, the symbols followed with a run-length are identified and they are replaced by duplicating the symbol for the specified number of times. For example, consider the PCC at the last step of pattern-based chain code, 'A6KI15NB14J3NC2E7KLMLMLKABCD' will be decoded as 'A6KIIIIIIIIIIIIIIIB14JJJC2E7KLMLMLKABCD' Similarly the remaining levels of PCC are performed in reverse order to reach the original chain code. A blank image is constructed with white background to draw the contours. For each starting point in ES, the contour starts by plotting the contour point at initial (x,y) followed by finding the next contour points direction from the binary chain code and plot them till the end of the contour length. And this procedure is repeated to decode the original shape. IV. EXPERIMENTS & RESULTS The experiments are carried out with two benchmark shape datasets: Gatorbait contains the silhouettes of 38 fishes belonging to 8 categories, and the MPEG7 dataset contains 1400 object contours belonging to 70 categories, with 20 members per each category. All the images are in binary form. Figure 11 & 12 shows the random shape samples taken from both the dataset

13 Figure 11. Shapes from Gatorbait Dataset Figure 12. Shapes from MPEG7 Dataset Table 2 presents the performance comparison between Binary Chain Coding (BCC) and Pattern-based Chain Coding (PCC) based on length of the code, number of symbols used and its memory size for a set of sample shapes from Gatorbait dataset. The lower length and the minimal memory space requirement of PCC states the significant performance improvement. TABLE II. PERFORMANCE COMPARISON BETWEEN BCC AND PCC Binary Chain Coding Pattern-based Chain Coding Chain code Length No. of symbols Memory size (in kb) Chain code Length No. of symbols Memory size (in kb) Fish Fish Fish Fish Fish Fish Fish Fish Fish Fish The coding performance is measured with the compression ratio achieved by the proposed method and compared with the existing methods JBIG, MJBIG, MDF9, DSLSC and DSaM where the first three approaches are lossless compression methods and the later are lossy compressions. Table 3 and 4 depicts the compression ratio of the shape coding method for Gatorbait and MPEG7 datasets. The average performance for each dataset is shown in Table 5. Figures 13 & 14 depicts the performance comparison for both dataset. The proposed PCC method has lower compression ratio than any other method, indicates the superior performance of it 3076

14 . TABLE III. PERFORMANCE COMPARISON ON COMPRESSION RATIO FOR GATORBAIT DATASET SHAPES PCC MDF9 MJBIG JBIG DSaM DSLSC Fish Fish Fish Fish Fish Fish Fish Fish Fish Fish TABLE IV. PERFORMANCE COMPARISON ON COMPRESSION RATIO FOR MPEG7 DATASET SHAPES PCC MDF9 MJBIG JBIG DSaM DSLSC Apple Bat Butterfly Camel Chicken Crown Deer Elephant Tree Turtle TABLE V. AVERAGE PERFORMANCE COMPARISON ON COMPRESSION RATIO PCC MDF9 MJBIG JBIG DSaM DSLSC Gatorbait MPEG PCC MDF9 MJBIG JBIG DSaM DSLSC Figure 13. Compression Performance Analysis for Gatorbait dataset 3077

15 PCC MDF9 MJBIG JBIG DSaM DSLSC Figure 14. Compression Performance Analysis for MPEG7 dataset V. CONCLUSIONS A novel shape coding is proposed here for edge contour based image compression. At first the shape contour is extracted and segmented. Then the initial contour is constructed with binary strings to represent the adjacent contour points. The Binary Chain Code (BCC) is compressed further by finding the redundant pattern in it. The Pattern-based Chain Code (PCC) is performed at four different levels to reduce the length and size of BCC. The experiments are carried out with two benchmark datasets, and the compression ratio of the proposed PCC based shape coding is compared with other recently proposed shape coding techniques. The simulation results indicate that the proposed PCC outperforms the shape coding methods. References [1] Aghito, S. M., &Forchhammer, S. (2004, March). Context based coding of binary shapes by object boundary straightness analysis In Data Compression Conference, Proceedings. DCC 2004 (pp ). IEEE. [2] Aghito, S. M., &Forchhammer, S. (2006). Context-based coding of bilevel images enhanced by digital straight line analysis IEEE Transactions on Image Processing, 15(8), [3] Aghito, S. M., &Forchhammer, S. (2007). Efficient coding of shape and transparency for video objects IEEE Transactions on Image Processing, 16(9), [4] Akimov, A., Kolesnikov, A., &Fränti, P. (2007). Lossless compression of map contours by context tree modeling of chain codes Pattern Recognition, 40(3), [5] Bribiesca, E. (1999). A new chain code Pattern Recognition, 32(2), [6] Freeman, H. (1974). Computer processing of line-drawing images ACM Computing Surveys (CSUR), 6(1),

16 [7] Gerogiannis, D. P., Nikou, C., &Kondi, L. P. (2015, September). Shape encoding for edge map image compression In Image Processing (ICIP), 2015 IEEE International Conference on (pp ). IEEE. [8] Gerogiannis, D., Nikou, C., &Likas, A. (2014). Modeling sets of unordered points using highly eccentric ellipses EURASIP Journal on Advances in Signal Processing, 2014(1), 11. [9] Hsiao, C. W., Ding, J. J., & Chen, P. J. (2015, December). Lossless contour compression using morphology, chain coding, and distribution transform In Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2015 Asia-Pacific (pp ). IEEE. [10] Katsaggelos, A. K., Kondi, L. P., Meier, F. W., Ostermann, J., & Schuster, G. M. (1998). MPEG-4 and rate-distortion-based shape-coding techniques Proceedings of the IEEE, 86(6), [11] Kim, K. J., Suh, J. Y., & Kang, M. G. (2000). Generalized interframe vertex-based shape encoding scheme for video sequences IEEE transactions on image processing, 9(10), [12] Klette, R., & Rosenfeld, A. (2004). Digital straightness a review Discrete Applied Mathematics, 139(1-3), [13] Kondi, L. P., Melnikov, G., &Katsaggelos, A. K. (2004). Joint optimal object shape estimation and encoding IEEE Transactions on Circuits and Systems for Video Technology, 14(4), [14] Lai, Z., Zuo, Z., Wang, Z., Yao, Z., & Liu, W. (2011, September). Accurate distortion measurement for B-spline-based shape coding. In Image Processing (ICIP) th IEEE International Conference on (pp ). IEEE. [15] Liu, Y. K., &Žalik, B. (2005). An efficient chain code with Huffman coding Pattern Recognition, 38(4), [16] Luo, H. (2005). Image-dependent shape coding and representation IEEE transactions on circuits and systems for video technology, 15(3), [17] Neuhoff, D., & Castor, K. (1985). A rate and distortion analysis of chain codes for line drawings IEEE Transactions on Information Theory, 31(1), [18] Nunes, P., Marqués, F., Pereira, F., &Gasull, A. (2000). A contour-based approach to binary shape coding using a multiple grid chain code Signal Processing: Image Communication, 15(7-8), [19] Pinho, A. J. (2000). A JBIG-based approach to the encoding of contour maps IEEE transactions on image processing, 9(5), [20] Pinho, A. J. (2001a). Adaptive context-based arithmetic coding of arbitrary contour maps IEEE Signal Processing Letters, 8(1), 4-6. [21] Pinho, A. J. (2001b). Region-based near-lossless image compression In Acoustics, Speech, and Signal Processing, Proceedings.(ICASSP'01) IEEE International Conference on (Vol. 3, pp ). IEEE. [22] Richardson, I. E. (2004). H. 264 and MPEG-4 video compression: video coding for next-generation multimedia John Wiley & Sons. [23] Sanchez-Cruz, H. (2010). Proposing a new code by considering pieces of discrete straight lines in contour shapes Journal of Visual Communication and Image Representation, 21(4), [24] Sanchez-Cruz, H., & Rodriguez-Dagnino, R. M. Compression bi-level images by means of a 3-bit chain code Optical Engineering SPIE. 44 (9) (2005)

17 [25] Sanchez-Cruz, H., López-Cruces, M., &Puga, H. (2008, February). A proposal modification of the 3OT chain code In Proceedings of the 10th IASTED International Conference on Computer Graphics and Imaging (pp. 6-11). ACTA Press. [26] Schuster, G. M., &Katsaggelos, A. K. (1998). An optimal polygonal boundary encoding scheme in the rate distortion sense IEEE Transactions on Image Processing, 7(1), [27] Sohel, F. A., Dooley, L. S., &Karmakar, G. C. (2007). New dynamic enhancements to the vertexbased rate-distortion optimal shape coding framework IEEE Transactions on Circuits and Systems for Video Technology, 17(10), [28] Sohel, F. A., Karmakar, G. C., Dooley, L. S., &Bennamoun, M. (2011). Geometric distortion measurement for shape coding: A contemporary review ACM Computing Surveys (CSUR), 43(4), 29. [29] Sohel, F. A., Karmakar, G. C., Dooley, L. S., &Bennamoun, M. (2012). Sliding-window designs for vertex-based shape coding IEEE Transactions on Multimedia, 14(3), [30] Wang, H., Schuster, G. M., Katsaggelos, A. K., & Pappas, T. N. (2003). An efficient rate-distortion optimal shape coding approach utilizing a skeleton-based decomposition IEEE Transactions on Image Processing, 12(10), [31] Wulandhari, L. A., &Haron, H. (2009, April). Characteristic of rectangular vertex chain code for shapes with hole In Information Management and Engineering, ICIME'09. International Conference on (pp ). IEEE. [32] Žalik, B., &Lukac, N. (2014). Chain code lossless compression using move-to-front transform and adaptive run-length encoding Signal Processing: Image Communication, 29(1), [33] Zhu, Z., & Jiang, G. (2014). Hybrid scheme for efficient shape coding Digital Signal Processing, 30,

SHAPE ENCODING FOR EDGE MAP IMAGE COMPRESSION. Demetrios P. Gerogiannis, Christophoros Nikou, Lisimachos P. Kondi

SHAPE ENCODING FOR EDGE MAP IMAGE COMPRESSION. Demetrios P. Gerogiannis, Christophoros Nikou, Lisimachos P. Kondi SHAPE ENCODING FOR EDGE MAP IMAGE COMPRESSION Demetrios P. Gerogiannis, Christophoros Nikou, Lisimachos P. Kondi Department of Computer Science and Engineering, University of Ioannina, 45110 Ioannina,

More information

Removing Spatial Redundancy from Image by Using Variable Vertex Chain Code

Removing Spatial Redundancy from Image by Using Variable Vertex Chain Code EUROPEAN ACADEMIC RESEARCH Vol. II, Issue 1/ April 2014 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.1 (UIF) DRJI Value: 5.9 (B+) Removing Spatial Redundancy from Image by Using Variable Vertex Chain

More information

Context based optimal shape coding

Context based optimal shape coding IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,

More information

A Compressed Representation of Mid-Crack Code with Huffman Code

A Compressed Representation of Mid-Crack Code with Huffman Code I.J. Image, Graphics and Signal Processing, 2015, 10, 11-18 Published Online September 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijigsp.2015.10.02 A Compressed Representation of Mid-Crack

More information

Enhanced Hybrid Compound Image Compression Algorithm Combining Block and Layer-based Segmentation

Enhanced Hybrid Compound Image Compression Algorithm Combining Block and Layer-based Segmentation Enhanced Hybrid Compound Image Compression Algorithm Combining Block and Layer-based Segmentation D. Maheswari 1, Dr. V.Radha 2 1 Department of Computer Science, Avinashilingam Deemed University for Women,

More information

Compressing 2-D Shapes using Concavity Trees

Compressing 2-D Shapes using Concavity Trees Compressing 2-D Shapes using Concavity Trees O. El Badawy 1 and M. S. Kamel 2 1 Dept. of Systems Design Engineering. 2 Dept. of Electrical and Computer Engineering. Pattern Analysis and Machine Intelligence

More information

GLOBAL SAMPLING OF IMAGE EDGES. Demetrios P. Gerogiannis, Christophoros Nikou, Aristidis Likas

GLOBAL SAMPLING OF IMAGE EDGES. Demetrios P. Gerogiannis, Christophoros Nikou, Aristidis Likas GLOBAL SAMPLING OF IMAGE EDGES Demetrios P. Gerogiannis, Christophoros Nikou, Aristidis Likas Department of Computer Science and Engineering, University of Ioannina, 45110 Ioannina, Greece {dgerogia,cnikou,arly}@cs.uoi.gr

More information

The Evolution and Trend of Chain Code Scheme

The Evolution and Trend of Chain Code Scheme The Evolution and Trend of Chain Scheme 1 Lili Ayu Wulandhari, 2 Habibolah Haron Department of Modelling and Industrial Computing Faculty of Computer Science and Information Systems Universiti Teknologi

More information

Wavelet Based Image Compression Using ROI SPIHT Coding

Wavelet Based Image Compression Using ROI SPIHT Coding International Journal of Information & Computation Technology. ISSN 0974-2255 Volume 1, Number 2 (2011), pp. 69-76 International Research Publications House http://www.irphouse.com Wavelet Based Image

More information

Optimization of Bit Rate in Medical Image Compression

Optimization of Bit Rate in Medical Image Compression Optimization of Bit Rate in Medical Image Compression Dr.J.Subash Chandra Bose 1, Mrs.Yamini.J 2, P.Pushparaj 3, P.Naveenkumar 4, Arunkumar.M 5, J.Vinothkumar 6 Professor and Head, Department of CSE, Professional

More information

A COMPRESSION TECHNIQUES IN DIGITAL IMAGE PROCESSING - REVIEW

A COMPRESSION TECHNIQUES IN DIGITAL IMAGE PROCESSING - REVIEW A COMPRESSION TECHNIQUES IN DIGITAL IMAGE PROCESSING - ABSTRACT: REVIEW M.JEYAPRATHA 1, B.POORNA VENNILA 2 Department of Computer Application, Nadar Saraswathi College of Arts and Science, Theni, Tamil

More information

Mixed Raster Content for Compound Image Compression

Mixed Raster Content for Compound Image Compression Mixed Raster Content for Compound Image Compression Final Project Presentation EE-5359 Spring 2009 Submitted to: Dr. K.R. Rao Submitted by: Pritesh Shah (1000555858) MOTIVATION In today s world it is impossible

More information

Chain Coding Streamed Images through Crack Run-Length Encoding

Chain Coding Streamed Images through Crack Run-Length Encoding Chain Coding Streamed Images through Crack Run-Length Encoding D.G. Bailey School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand. Email: D.G.Bailey@massey.ac.nz

More information

Digital Image Processing Fundamentals

Digital Image Processing Fundamentals Ioannis Pitas Digital Image Processing Fundamentals Chapter 7 Shape Description Answers to the Chapter Questions Thessaloniki 1998 Chapter 7: Shape description 7.1 Introduction 1. Why is invariance to

More information

Practical Image and Video Processing Using MATLAB

Practical Image and Video Processing Using MATLAB Practical Image and Video Processing Using MATLAB Chapter 18 Feature extraction and representation What will we learn? What is feature extraction and why is it a critical step in most computer vision and

More information

Code Transformation of DF-Expression between Bintree and Quadtree

Code Transformation of DF-Expression between Bintree and Quadtree Code Transformation of DF-Expression between Bintree and Quadtree Chin-Chen Chang*, Chien-Fa Li*, and Yu-Chen Hu** *Department of Computer Science and Information Engineering, National Chung Cheng University

More information

Volume 2, Issue 9, September 2014 ISSN

Volume 2, Issue 9, September 2014 ISSN Fingerprint Verification of the Digital Images by Using the Discrete Cosine Transformation, Run length Encoding, Fourier transformation and Correlation. Palvee Sharma 1, Dr. Rajeev Mahajan 2 1M.Tech Student

More information

Multimedia Networking ECE 599

Multimedia Networking ECE 599 Multimedia Networking ECE 599 Prof. Thinh Nguyen School of Electrical Engineering and Computer Science Based on B. Lee s lecture notes. 1 Outline Compression basics Entropy and information theory basics

More information

IMAGE COMPRESSION TECHNIQUES

IMAGE COMPRESSION TECHNIQUES IMAGE COMPRESSION TECHNIQUES A.VASANTHAKUMARI, M.Sc., M.Phil., ASSISTANT PROFESSOR OF COMPUTER SCIENCE, JOSEPH ARTS AND SCIENCE COLLEGE, TIRUNAVALUR, VILLUPURAM (DT), TAMIL NADU, INDIA ABSTRACT A picture

More information

signal-to-noise ratio (PSNR), 2

signal-to-noise ratio (PSNR), 2 u m " The Integration in Optics, Mechanics, and Electronics of Digital Versatile Disc Systems (1/3) ---(IV) Digital Video and Audio Signal Processing ƒf NSC87-2218-E-009-036 86 8 1 --- 87 7 31 p m o This

More information

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

More information

G 2 Interpolation for Polar Surfaces

G 2 Interpolation for Polar Surfaces 1 G 2 Interpolation for Polar Surfaces Jianzhong Wang 1, Fuhua Cheng 2,3 1 University of Kentucky, jwangf@uky.edu 2 University of Kentucky, cheng@cs.uky.edu 3 National Tsinhua University ABSTRACT In this

More information

CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS

CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS B.Vanajakshi Department of Electronics & Communications Engg. Assoc.prof. Sri Viveka Institute of Technology Vijayawada, India E-mail:

More information

(Refer Slide Time: 00:02:00)

(Refer Slide Time: 00:02:00) Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 18 Polyfill - Scan Conversion of a Polygon Today we will discuss the concepts

More information

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University CS443: Digital Imaging and Multimedia Binary Image Analysis Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines A Simple Machine Vision System Image segmentation by thresholding

More information

IMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression

IMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression IMAGE COMPRESSION Image Compression Why? Reducing transportation times Reducing file size A two way event - compression and decompression 1 Compression categories Compression = Image coding Still-image

More information

MPEG-4 and Rate-Distortion-Based Shape-Coding Techniques

MPEG-4 and Rate-Distortion-Based Shape-Coding Techniques MPEG-4 and Rate-Distortion-Based Shape-Coding Techniques AGGELOS K. KATSAGGELOS, FELLOW, IEEE, LISIMACHOS P. KONDI, STUDENT MEMBER, IEEE, FABIAN W. MEIER, JÖRN OSTERMANN, AND GUIDO M. SCHUSTER, MEMBER,

More information

A New Compression Method Strictly for English Textual Data

A New Compression Method Strictly for English Textual Data A New Compression Method Strictly for English Textual Data Sabina Priyadarshini Department of Computer Science and Engineering Birla Institute of Technology Abstract - Data compression is a requirement

More information

Spatial Scene Level Shape Error Concealment for Segmented Video

Spatial Scene Level Shape Error Concealment for Segmented Video Spatial Scene Level Shape Error Concealment for Segmented Video Luis Ducla Soares 1, Fernando Pereira 2 1 Instituto Superior de Ciências do Trabalho e da Empresa Instituto de Telecomunicações, Lisboa,

More information

Lecture 06. Raster and Vector Data Models. Part (1) Common Data Models. Raster. Vector. Points. Points. ( x,y ) Area. Area Line.

Lecture 06. Raster and Vector Data Models. Part (1) Common Data Models. Raster. Vector. Points. Points. ( x,y ) Area. Area Line. Lecture 06 Raster and Vector Data Models Part (1) 1 Common Data Models Vector Raster Y Points Points ( x,y ) Line Area Line Area 2 X 1 3 Raster uses a grid cell structure Vector is more like a drawn map

More information

Topic 6 Representation and Description

Topic 6 Representation and Description Topic 6 Representation and Description Background Segmentation divides the image into regions Each region should be represented and described in a form suitable for further processing/decision-making Representation

More information

Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach

Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach O. El Badawy, M. S. Kamel Pattern Analysis and Machine Intelligence Laboratory, Department of Systems Design Engineering,

More information

CS 335 Graphics and Multimedia. Image Compression

CS 335 Graphics and Multimedia. Image Compression CS 335 Graphics and Multimedia Image Compression CCITT Image Storage and Compression Group 3: Huffman-type encoding for binary (bilevel) data: FAX Group 4: Entropy encoding without error checks of group

More information

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106 CHAPTER 6 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform Page No 6.1 Introduction 103 6.2 Compression Techniques 104 103 6.2.1 Lossless compression 105 6.2.2 Lossy compression

More information

ISSN: An Efficient Fully Exploiting Spatial Correlation of Compress Compound Images in Advanced Video Coding

ISSN: An Efficient Fully Exploiting Spatial Correlation of Compress Compound Images in Advanced Video Coding An Efficient Fully Exploiting Spatial Correlation of Compress Compound Images in Advanced Video Coding Ali Mohsin Kaittan*1 President of the Association of scientific research and development in Iraq Abstract

More information

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation

More information

DEPTH MAPS CODING WITH ELASTIC CONTOURS AND 3D SURFACE PREDICTION

DEPTH MAPS CODING WITH ELASTIC CONTOURS AND 3D SURFACE PREDICTION DEPTH MAPS CODING WITH ELASTIC CONTOURS AND 3D SURFACE PREDICTION Marco Calemme 1, Pietro Zanuttigh 2, Simone Milani 2, Marco Cagnazzo 1, Beatrice Pesquet-Popescu 1 1 Télécom Paristech, France 2 University

More information

Topic 5: Raster and Vector Data Models

Topic 5: Raster and Vector Data Models Geography 38/42:286 GIS 1 Topic 5: Raster and Vector Data Models Chapters 3 & 4: Chang (Chapter 4: DeMers) 1 The Nature of Geographic Data Most features or phenomena occur as either: discrete entities

More information

A Vertex Chain Code Approach for Image Recognition

A Vertex Chain Code Approach for Image Recognition A Vertex Chain Code Approach for Image Recognition Abdel-Badeeh M. Salem, Adel A. Sewisy, Usama A. Elyan Faculty of Computer and Information Sciences, Assiut University, Assiut, Egypt, usama471@yahoo.com,

More information

A split-and-merge framework for 2D shape summarization

A split-and-merge framework for 2D shape summarization A split-and-merge framework for 2D shape summarization Demetrios Gerogiannis Christophoros Nikou Aristidis Likas Department of Computer Science, University of Ioannina, PO Box 1186, 45110 Ioannina, Greece

More information

Image Compression for Mobile Devices using Prediction and Direct Coding Approach

Image Compression for Mobile Devices using Prediction and Direct Coding Approach Image Compression for Mobile Devices using Prediction and Direct Coding Approach Joshua Rajah Devadason M.E. scholar, CIT Coimbatore, India Mr. T. Ramraj Assistant Professor, CIT Coimbatore, India Abstract

More information

Fast Motion Estimation for Shape Coding in MPEG-4

Fast Motion Estimation for Shape Coding in MPEG-4 358 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 4, APRIL 2003 Fast Motion Estimation for Shape Coding in MPEG-4 Donghoon Yu, Sung Kyu Jang, and Jong Beom Ra Abstract Effective

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Direction-Length Code (DLC) To Represent Binary Objects

Direction-Length Code (DLC) To Represent Binary Objects IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. I (Mar-Apr. 2016), PP 29-35 www.iosrjournals.org Direction-Length Code (DLC) To Represent Binary

More information

Georgios Tziritas Computer Science Department

Georgios Tziritas Computer Science Department New Video Coding standards MPEG-4, HEVC Georgios Tziritas Computer Science Department http://www.csd.uoc.gr/~tziritas 1 MPEG-4 : introduction Motion Picture Expert Group Publication 1998 (Intern. Standardization

More information

JBEAM: Coding Lines and Curves via Digital Beamlets

JBEAM: Coding Lines and Curves via Digital Beamlets JBEAM: Coding Lines and Curves via Digital Beamlets Xiaoming Huo, Jihong Chen David L. Donoho School of ISyE, 765 Ferst Dr. Department of Statistics Georgia Institute of Technology Stanford University

More information

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 4, April 2012)

International Journal of Emerging Technology and Advanced Engineering Website:   (ISSN , Volume 2, Issue 4, April 2012) A Technical Analysis Towards Digital Video Compression Rutika Joshi 1, Rajesh Rai 2, Rajesh Nema 3 1 Student, Electronics and Communication Department, NIIST College, Bhopal, 2,3 Prof., Electronics and

More information

Image coding and compression

Image coding and compression Image coding and compression Robin Strand Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University Today Information and Data Redundancy Image Quality Compression Coding

More information

Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction

Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction Yongying Gao and Hayder Radha Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI 48823 email:

More information

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

SHAPE CODING IN MPEG-4: AN OVERVIEW Signal Compression, ECE 242, Project Report

SHAPE CODING IN MPEG-4: AN OVERVIEW Signal Compression, ECE 242, Project Report -1- SHAPE CODING IN MPEG-4: AN OVERVIEW Signal Compression, ECE 242, Project Report Sandeep Bhat sandeepkbhat@ece.ucsb.edu -2- Contents Contents... 2 1. Introduction... 3 2. Shape Coding... 5 2.1 Overview...

More information

Interactive Progressive Encoding System For Transmission of Complex Images

Interactive Progressive Encoding System For Transmission of Complex Images Interactive Progressive Encoding System For Transmission of Complex Images Borko Furht 1, Yingli Wang 1, and Joe Celli 2 1 NSF Multimedia Laboratory Florida Atlantic University, Boca Raton, Florida 33431

More information

Lecture 18 Representation and description I. 2. Boundary descriptors

Lecture 18 Representation and description I. 2. Boundary descriptors Lecture 18 Representation and description I 1. Boundary representation 2. Boundary descriptors What is representation What is representation After segmentation, we obtain binary image with interested regions

More information

Partial Video Encryption Using Random Permutation Based on Modification on Dct Based Transformation

Partial Video Encryption Using Random Permutation Based on Modification on Dct Based Transformation International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 6 (June 2013), PP. 54-58 Partial Video Encryption Using Random Permutation Based

More information

Introduction. Computer Vision & Digital Image Processing. Preview. Basic Concepts from Set Theory

Introduction. Computer Vision & Digital Image Processing. Preview. Basic Concepts from Set Theory Introduction Computer Vision & Digital Image Processing Morphological Image Processing I Morphology a branch of biology concerned with the form and structure of plants and animals Mathematical morphology

More information

A LOW-COMPLEXITY AND LOSSLESS REFERENCE FRAME ENCODER ALGORITHM FOR VIDEO CODING

A LOW-COMPLEXITY AND LOSSLESS REFERENCE FRAME ENCODER ALGORITHM FOR VIDEO CODING 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) A LOW-COMPLEXITY AND LOSSLESS REFERENCE FRAME ENCODER ALGORITHM FOR VIDEO CODING Dieison Silveira, Guilherme Povala,

More information

Morphological Image Processing

Morphological Image Processing Morphological Image Processing Ranga Rodrigo October 9, 29 Outline Contents Preliminaries 2 Dilation and Erosion 3 2. Dilation.............................................. 3 2.2 Erosion..............................................

More information

Lossless Compression Algorithms

Lossless Compression Algorithms Multimedia Data Compression Part I Chapter 7 Lossless Compression Algorithms 1 Chapter 7 Lossless Compression Algorithms 1. Introduction 2. Basics of Information Theory 3. Lossless Compression Algorithms

More information

MRT based Fixed Block size Transform Coding

MRT based Fixed Block size Transform Coding 3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using

More information

Pattern based Residual Coding for H.264 Encoder *

Pattern based Residual Coding for H.264 Encoder * Pattern based Residual Coding for H.264 Encoder * Manoranjan Paul and Manzur Murshed Gippsland School of Information Technology, Monash University, Churchill, Vic-3842, Australia E-mail: {Manoranjan.paul,

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

Bi-Level Image Compression

Bi-Level Image Compression Bi-Level Image Compression EECE 545: Data Compression by Dave Tompkins The University of British Columbia http://spmg.ece.ubc.ca Overview Introduction to Bi-Level Image Compression Existing Facsimile Standards:

More information

Three Dimensional Motion Vectorless Compression

Three Dimensional Motion Vectorless Compression 384 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 9 Three Dimensional Motion Vectorless Compression Rohini Nagapadma and Narasimha Kaulgud* Department of E &

More information

Hybrid Image Compression Using DWT, DCT and Huffman Coding. Techniques

Hybrid Image Compression Using DWT, DCT and Huffman Coding. Techniques Hybrid Image Compression Using DWT, DCT and Huffman Coding Techniques Veerpal kaur, Gurwinder kaur Abstract- Here in this hybrid model we are going to proposed a Nobel technique which is the combination

More information

Classification and Generation of 3D Discrete Curves

Classification and Generation of 3D Discrete Curves Applied Mathematical Sciences, Vol. 1, 2007, no. 57, 2805-2825 Classification and Generation of 3D Discrete Curves Ernesto Bribiesca Departamento de Ciencias de la Computación Instituto de Investigaciones

More information

EECS490: Digital Image Processing. Lecture #23

EECS490: Digital Image Processing. Lecture #23 Lecture #23 Motion segmentation & motion tracking Boundary tracking Chain codes Minimum perimeter polygons Signatures Motion Segmentation P k Accumulative Difference Image Positive ADI Negative ADI (ADI)

More information

1 2 Two-Dimensional Shape Coding

1 2 Two-Dimensional Shape Coding 1 2 Two-Dimensional Shape Coding Joern Ostermann and Anthony Vetro CONTENTS 12.1 Introduction 299 12.1.1 Shape Coding Overview 301 12.1.2 Related Work 301 12.1.2.1 Implicit Shape Coding 301 12.1.2.2 Bitmap-Based

More information

DATA MODELS IN GIS. Prachi Misra Sahoo I.A.S.R.I., New Delhi

DATA MODELS IN GIS. Prachi Misra Sahoo I.A.S.R.I., New Delhi DATA MODELS IN GIS Prachi Misra Sahoo I.A.S.R.I., New Delhi -110012 1. Introduction GIS depicts the real world through models involving geometry, attributes, relations, and data quality. Here the realization

More information

Encoding. A thesis submitted to the Graduate School of University of Cincinnati in

Encoding. A thesis submitted to the Graduate School of University of Cincinnati in Lossless Data Compression for Security Purposes Using Huffman Encoding A thesis submitted to the Graduate School of University of Cincinnati in a partial fulfillment of requirements for the degree of Master

More information

Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay

Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Source Coding (Part 1) Hello everyone, we will start a new module today

More information

A Novel Image Compression Technique using Simple Arithmetic Addition

A Novel Image Compression Technique using Simple Arithmetic Addition Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC A Novel Image Compression Technique using Simple Arithmetic Addition Nadeem Akhtar, Gufran Siddiqui and Salman

More information

Compression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction

Compression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction Compression of RADARSAT Data with Block Adaptive Wavelets Ian Cumming and Jing Wang Department of Electrical and Computer Engineering The University of British Columbia 2356 Main Mall, Vancouver, BC, Canada

More information

Image Compression: An Artificial Neural Network Approach

Image Compression: An Artificial Neural Network Approach Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and

More information

Linear Quadtree Construction in Real Time *

Linear Quadtree Construction in Real Time * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 26, 1917-1930 (2010) Short Paper Linear Quadtree Construction in Real Time * CHI-YEN HUANG AND YU-WEI CHEN + Department of Information Management National

More information

IMAGE COMPRESSION TECHNIQUES

IMAGE COMPRESSION TECHNIQUES International Journal of Information Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 265-269 Uchale Bhagwat Shankar The use of digital images has increased at a rapid pace

More information

Lecture 10: Tutorial Sakrapee (Paul) Paisitkriangkrai Evan Tan A/Prof. Jian Zhang

Lecture 10: Tutorial Sakrapee (Paul) Paisitkriangkrai Evan Tan A/Prof. Jian Zhang Lecture : Tutorial Sakrapee (Paul) Paisitkriangkrai Evan Tan A/Prof. Jian Zhang NICTA & CSE UNSW COMP959 Multimedia Systems S 9 jzhang@cse.unsw.edu.au Part I: Media Streaming Evan Tan Acknowledgement:

More information

CoE4TN4 Image Processing

CoE4TN4 Image Processing CoE4TN4 Image Processing Chapter 11 Image Representation & Description Image Representation & Description After an image is segmented into regions, the regions are represented and described in a form suitable

More information

Topic 5 Image Compression

Topic 5 Image Compression Topic 5 Image Compression Introduction Data Compression: The process of reducing the amount of data required to represent a given quantity of information. Purpose of Image Compression: the reduction of

More information

International Journal of Advancements in Research & Technology, Volume 2, Issue 8, August ISSN

International Journal of Advancements in Research & Technology, Volume 2, Issue 8, August ISSN International Journal of Advancements in Research & Technology, Volume 2, Issue 8, August-2013 244 Image Compression using Singular Value Decomposition Miss Samruddhi Kahu Ms. Reena Rahate Associate Engineer

More information

Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding

Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding Seishi Taka" and Mikio Takagi Institute of Industrial Science, University of Tokyo Abstract Lossless gray scale

More information

9. Three Dimensional Object Representations

9. Three Dimensional Object Representations 9. Three Dimensional Object Representations Methods: Polygon and Quadric surfaces: For simple Euclidean objects Spline surfaces and construction: For curved surfaces Procedural methods: Eg. Fractals, Particle

More information

RESEARCH ON OPTIMIZATION OF IMAGE USING SKELETONIZATION TECHNIQUE WITH ADVANCED ALGORITHM

RESEARCH ON OPTIMIZATION OF IMAGE USING SKELETONIZATION TECHNIQUE WITH ADVANCED ALGORITHM 881 RESEARCH ON OPTIMIZATION OF IMAGE USING SKELETONIZATION TECHNIQUE WITH ADVANCED ALGORITHM Sarita Jain 1 Sumit Rana 2 Department of CSE 1 Department of CSE 2 Geeta Engineering College 1, Panipat, India

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

SUPPLEMENTARY FILE S1: 3D AIRWAY TUBE RECONSTRUCTION AND CELL-BASED MECHANICAL MODEL. RELATED TO FIGURE 1, FIGURE 7, AND STAR METHODS.

SUPPLEMENTARY FILE S1: 3D AIRWAY TUBE RECONSTRUCTION AND CELL-BASED MECHANICAL MODEL. RELATED TO FIGURE 1, FIGURE 7, AND STAR METHODS. SUPPLEMENTARY FILE S1: 3D AIRWAY TUBE RECONSTRUCTION AND CELL-BASED MECHANICAL MODEL. RELATED TO FIGURE 1, FIGURE 7, AND STAR METHODS. 1. 3D AIRWAY TUBE RECONSTRUCTION. RELATED TO FIGURE 1 AND STAR METHODS

More information

APPLICATION OF FLOYD-WARSHALL LABELLING TECHNIQUE: IDENTIFICATION OF CONNECTED PIXEL COMPONENTS IN BINARY IMAGE. Hyunkyung Shin and Joong Sang Shin

APPLICATION OF FLOYD-WARSHALL LABELLING TECHNIQUE: IDENTIFICATION OF CONNECTED PIXEL COMPONENTS IN BINARY IMAGE. Hyunkyung Shin and Joong Sang Shin Kangweon-Kyungki Math. Jour. 14 (2006), No. 1, pp. 47 55 APPLICATION OF FLOYD-WARSHALL LABELLING TECHNIQUE: IDENTIFICATION OF CONNECTED PIXEL COMPONENTS IN BINARY IMAGE Hyunkyung Shin and Joong Sang Shin

More information

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

ISSN (ONLINE): , VOLUME-3, ISSUE-1, PERFORMANCE ANALYSIS OF LOSSLESS COMPRESSION TECHNIQUES TO INVESTIGATE THE OPTIMUM IMAGE COMPRESSION TECHNIQUE Dr. S. Swapna Rani Associate Professor, ECE Department M.V.S.R Engineering College, Nadergul,

More information

IMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG

IMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG IMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG MANGESH JADHAV a, SNEHA GHANEKAR b, JIGAR JAIN c a 13/A Krishi Housing Society, Gokhale Nagar, Pune 411016,Maharashtra, India. (mail2mangeshjadhav@gmail.com)

More information

A Parallel Reconfigurable Architecture for DCT of Lengths N=32/16/8

A Parallel Reconfigurable Architecture for DCT of Lengths N=32/16/8 Page20 A Parallel Reconfigurable Architecture for DCT of Lengths N=32/16/8 ABSTRACT: Parthiban K G* & Sabin.A.B ** * Professor, M.P. Nachimuthu M. Jaganathan Engineering College, Erode, India ** PG Scholar,

More information

Chapter 11 Representation & Description

Chapter 11 Representation & Description Chain Codes Chain codes are used to represent a boundary by a connected sequence of straight-line segments of specified length and direction. The direction of each segment is coded by using a numbering

More information

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Prashant Ramanathan and Bernd Girod Department of Electrical Engineering Stanford University Stanford CA 945

More information

09/11/2017. Morphological image processing. Morphological image processing. Morphological image processing. Morphological image processing (binary)

09/11/2017. Morphological image processing. Morphological image processing. Morphological image processing. Morphological image processing (binary) Towards image analysis Goal: Describe the contents of an image, distinguishing meaningful information from irrelevant one. Perform suitable transformations of images so as to make explicit particular shape

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

Detection of Edges Using Mathematical Morphological Operators

Detection of Edges Using Mathematical Morphological Operators OPEN TRANSACTIONS ON INFORMATION PROCESSING Volume 1, Number 1, MAY 2014 OPEN TRANSACTIONS ON INFORMATION PROCESSING Detection of Edges Using Mathematical Morphological Operators Suman Rani*, Deepti Bansal,

More information

CMPT 365 Multimedia Systems. Media Compression - Image

CMPT 365 Multimedia Systems. Media Compression - Image CMPT 365 Multimedia Systems Media Compression - Image Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Facts about JPEG JPEG - Joint Photographic Experts Group International

More information

A New Approach to Fractal Image Compression Using DBSCAN

A New Approach to Fractal Image Compression Using DBSCAN International Journal of Electrical Energy, Vol. 2, No. 1, March 2014 A New Approach to Fractal Image Compression Using DBSCAN Jaseela C C and Ajay James Dept. of Computer Science & Engineering, Govt.

More information

Everyday Mathematics

Everyday Mathematics Content Strand: Number and Numeration Understand the Meanings, Uses, and Representations of Numbers Understand Equivalent Names for Numbers Understand Common Numerical Relations Place value and notation

More information

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Prashant Ramanathan and Bernd Girod Department of Electrical Engineering Stanford University Stanford CA 945

More information

Image Segmentation Techniques for Object-Based Coding

Image Segmentation Techniques for Object-Based Coding Image Techniques for Object-Based Coding Junaid Ahmed, Joseph Bosworth, and Scott T. Acton The Oklahoma Imaging Laboratory School of Electrical and Computer Engineering Oklahoma State University {ajunaid,bosworj,sacton}@okstate.edu

More information