A new lossless compression scheme based on Hu!man coding scheme for image compression
|
|
- Samantha Wells
- 6 years ago
- Views:
Transcription
1 Signal Processing: Image Communication 16 (2000) 367}372 A new lossless compression scheme based on Hu!man coding scheme for image compression Yu-Chen Hu, Chin-Chen Chang* Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi 621, Taiwan, ROC Received 25 August 1998 Abstract A novel lossless image-compression scheme is proposed in this paper. A two-stage structure is embedded in this scheme. A linear predictor is used to decorrelate the raw image data in the "rst stage. Then in the second stage, an e!ective scheme based on the Hu!man coding method is developed to encode the residual image. This newly proposed scheme could reduce the cost for the Hu!man coding table while achieving high compression ratio. With this algorithm, a compression ratio higher than that of the Lossless JPEG method for images can be obtained. In other words, the newly proposed algorithm provides a good means for lossless image compression Elsevier Science B.V. All rights reserved. Keywords: Lossless image compression; Hu!man coding; JPEG 1. Introduction * Corresponding author. Tel.: /6011; fax: address: ccc@cs.ccu.edu.tw (C.-C. Chang). Lossless image compression [9}12] is very important in many "elds such as biomedical image analysis, medical images, art images, security and defense, remote sensing, and so on. During the past few years, several schemes have been developed for lossless image compression. Usually, a twostage coding technique is embedded in these schemes. In the "rst stage, a linear predictor such as di!erential pulse code modulation (DPCM) [2,8] or some linear predicting functions, is used to decorrelate the raw image data. In the second stage, a standard coding technique, such as Hu!man coding [3,5], arithmetic coding [6,14] or Lempel Ziv coding, is used to encode the residual magnitudes. Such a two-stage scheme is useful because the high correlation between neighboring pixels in most images can be decorrelated, which results in a signi"- cant entropy reduction. To date, the Lossless JPEG [12] is one of the most e!ective compression schemes for gray scale images. The Lossless JPEG has two basic versions: DPCM with arithmetic coding and DPCM with Hu!man coding. The DPCM with arithmetic coding version typically provides slightly better compression results than the DPCM with Hu!man coding version, but it requires a higher computation cost. Some modi"ed methods [1,4,7] have been proposed to improve the linear predictor in the "rst stage. Besides, the Hu!man coding of most-likely magnitude (MLM) [13] had been developed to improve the coding performance in the /00/$ - see front matter 2000 Elsevier Science B.V. All rights reserved. PII: S ( 9 9 )
2 368 Y.-C. Hu, C.-C. Chang / Signal Processing: Image Communication 16 (2000) 367}372 second stage. However, achieving a better compression ratio for lossless image compression is still an important issue. In this paper, we shall propose a new coding technique based on the MLM scheme for lossless image compression. The rest of this paper is organized as follows. In Section 2, we shall review the Hu!man coding scheme and the MLM coding scheme. In Section 3, the newly proposed method shall be proposed. In Section 4, some experimental results shall show that our newly proposed algorithm indeed produces good image quality. The discussion and conclusion shall be given in Section Previous works The Hu!man coding technique is a commonly used scheme for data compression because it is very simple and e!ective. It requires the statistical information about the distribution of the data to be encoded. Besides, an identical coding table is used in both the encoder and the decoder. The details of the Hu!man coding technique are described in the following. Hu4man Coding Algorithm Step 1. Build a Hu!man tree by sorting the histogram and successively combine the two bins of the lowest value until only one bin remains. Step 2. Encode the Hu!man tree and save the Hu!man tree with the coded value. Step 3. Encode the residual image. In Step 1, the Hu!man tree of the given data is built by successively combining the two bins with the lowest value. The Hu!man coding table is then constructed to record the mapping of the data of each bin and the corresponding encoding bit pattern. The performance of the Hu!man coding technique relies on the distribution of the input data. If the input data has a large dynamic range, the Hu!man coding technique requires a higher computation cost. The Hu!man coding of the most-likely magnitude (MLM) is thus proposed to solve this problem since the fundamental goal of MLM is to encode the residual image generated for the linear predictor. It exploits two properties of image residual distribution: 1. The distribution of these residual magnitudes is symmetrical to the origin. 2. The number of the small residual magnitudes is much larger than that of the large residual magnitudes. By exploiting Property 1, the MLM scheme cuts down the number of code calculations by half by creating Hu!man codes only for the residual magnitudes and then adds a sign bit. By exploiting Property 2, the MLM scheme uses the Hu!man coding technique only for the most-likely (or small) residual magnitudes and employs another special pre"x code to identify the least-likely (or large) residual values. The details of the MLM scheme are described in the following. The MLM Method Step 1. Compute the residual histogram H, such that H(x)"the number of pixels having residual magnitudes. Step 2. Compute the symmetry histogram S such that S(y)"H(y)#H(!y), where y*0. Step 3. Find the range threshold R such that S(j))P N( S(j), where N is the total number of the pixels in the input residual image and P is the desired proportion of the most-likely magnitudes. Note that 0)P)1 and 0)R. Step 4. Construct the modi"ed symmetry histogram S with R#1 entries, where S (y)" if0)y)r!1, S(y) N! S(j) ify"r. Note that S (R) stores the total number of the least-likely occurrences. Step 5. Construct the Hu!man tree and generate the Hu!man table C for histogram S using the traditional Hu!man coding tech- nique. Step 6. Encode each residual magnitude x by the following three rules. Rule 1. If 0)x)R!1 then output conc(c(x), 0).
3 Y.-C. Hu, C.-C. Chang / Signal Processing: Image Communication 16 (2000) 367} Rule 2. If!(R!1))x(0 then output conc(c( x ), 1). Rule 3. If x*r or x)!r then output conc(c(r), x). Here the function conc(x, z) concatenates the bit representations of x and z. Here C(x) denotes the encoded bit pattern for input x stored in the Hu!man coding table. In Step 1, the residual histogram H is computed and to be transformed into the symmetry histogram S in Step 2. The range of symmetry histogram S is about half of the original residual histogram H. However, the information about the sign value should be kept for residual re-production in the decoder. That is, to record the sign value of each residual, one sign bit should be added in the encoding step. Given a prede"ned proportion threshold P, where 0)P)1, the range threshold R to classify the most-likely magnitude and the least-likely magnitude is decided in Step 3. If P is set to 0.9, it means that we want to encode 90% of the residual magnitudes using the Hu!man coding technique with slight modi"cation. Thus, a switch value should be added in front of these least-likely magnitudes to accommodate the encoding technique. So, these least-likely magnitudes are collected together in Step 4. At present, there are R#1 entries in the modi"ed symmetry histogram. After completing the computation of histogram, the standard Hu!man coding technique is applied to the construction of the Hu!man tree and the Hu!man coding table for in Step 5. The actual encoding process for input residual x is done in Step 6. If x is a most-likely magnitude, the coding output is composed of the encoded bit pattern for C( x ) followed by a sign bit. Otherwise, if x is a least-likely magnitude, the coding output is composed of the encoded bit pattern for C(R) followed by the binary representation of x. The parameter P provides a means of trading o! speed for compression performance. The authors claim that P"0.99 is a good compromise for a wide variety of images. A large value of P generally leads to more computation cost though a Hu!- man table with more entries can be stored. On the other hand, if the parameter P is small, the MLM scheme has some loss in encoding these least-likely magnitudes. 3. The newly proposed scheme In this section, we shall propose an enhanced Hu!man coding algorithm based on the MLM method. We call it the enhanced MLM method (EMLM). In the MLM method described in Section 2, the output of the most-likely magnitude x is composed of the bit pattern of C( x ) followed by a sign bit. In such an arrangement, there is one unused entry for the residual magnitude x when x equals zero. In other words, this entry is not used in the MLM scheme. To make use of this entry, two solutions are found. First, we can omit the sign bit when x equals zero because Hu!man code is a pre- "x code, or alternatively we can utilize this entry by storing the switch value of these least-likely magnitudes and thus lower the required bit length for the switch value. Therefore, the required bit length of these least-likely magnitudes can be reduced and the range of modi"ed symmetry histogram can be decreased by one. From the description of the MLM method in Section 2, we know that the output of each leastlikely residual magnitude x is composed of the switch value, namely C(R), followed by the binary representation of x. The output length of the leastlikely magnitude may be longer than that when the standard Hu!man coding scheme is used instead. To reduce the required bit length and the size of Hu!man table, we integrate the folding technique into the EMLM method. The details of the EMLM method are described in the following. Our EMLM Method Step 1. Compute the residual histogram H, such that H(x)"the number of the pixels having residual magnitude x. Step 2. Compute the symmetry histogram S such that S(y)"H(y)#H(!y), where y*0. Step 3. Given the prede"ned range threshold R. The symmetry histogram with the folding technique is constructed according to the following sub-steps.
4 370 Y.-C. Hu, C.-C. Chang / Signal Processing: Image Communication 16 (2000) 367}372 Step 3.1. If 0)y)R!1, then (y)" S(y). Step 3.2. If R)y and y"q R#r, then the following three sub-steps are executed sequentially to build the histogram. Step (R)" (R)#S(y). Step (q)" (q)#s(y). Step (r)" (r)#s(y). Now, there are R#1 entries in the modi- "ed symmetry histogram. Step 4. Rearrange the modi"ed symmetry histogram with the unused zero entry by computing S " (0)# (R) S (y) if y"0, if 1)y)R!1. At present, the modi"ed symmetry histogram has only R entries. Step 5. Construct the Hu!man tree and generate the Hu!man table C for histogram using the traditional Hu!man coding technique. Step 6. Encode each residual magnitude x by the following four rules. Rule 1. If 0)x)R!1, then output conc(c(x), 0). Rule 2. If!(R!1))x, then output conc(c( x ), 1). Rule 3. If x*r and x"q R#r, where q and r are among the integers, then output conc(conc(conc(c(0), 1),0), conc(c(q), C(r))). Rule 4. If x)!r and x "q R#r, where q and r are among the integers, then output conc(conc(conc(c(0),1),1), conc(c(q), C(r))). Here, C(x) denotes the encoded bit pattern for x in the Hu!man table, and the function conc(x, z) concatenates the bits of x and z together. In this method, the residual histogram H and the symmetry histogram S are computed in Steps 1 and 2, respectively. Given a prede"ned range threshold R, the whole magnitudes can be divided into a group of the most-likely magnitudes and of the least-likely magnitudes. Then the modi"ed symmetry histogram can be constructed using the folding technique in Step 3. Now, the modi"ed symmetry histogram has R#1entries.InStep4, the modi"ed symmetry histogram is rearranged by making use of the unused entry for magnitude zero. Now, the modi"ed symmetry histogram has R entries. The Hu!man tree and the Hu!man coding table for are constructed in Step 5. In Step 6, the actual encoding process for input residual x is described. If x is a most-likely magnitude, the coding output is composed of the encoded bit pattern for C( x ) followed by a sign bit. If x is a least-likely magnitude, the coding output is composed of the encoded bit pattern for the switch element followed the sign bit and the encoded bit pattern for the quotient and the remainder of x. Here the encoded bit pattern of the switch element makes use of the unused zero entry to reduce the required bit length. In our EMLM, we use the wasted entry in MLM originally meant for the zero magnitude. The required bit length of the switch element to justify the most-likely magnitudes and least-likely magnitudes is much smaller that that in MLM. Besides, a folding technique for histogram rearrangement is developed. The goal of the folding technique is to reduce the bit length for each least-likely magnitude. By rearranging the histogram, the entropy of these residual magnitudes can be further lowered down. A better compression ratio and a smaller Hu!man table can thus be obtained. 4. Experimental results All our experiments are done upon SUN SPARC10. In these simulations, we apply the DPCM method to compute the residual image in the "rst stage and then use the EMLM scheme to encode the residuals in the second stage. In this section, we shall compare the performances of the DPCM/Hu!man, DPCM/MLM scheme and our DPCM/EMLM scheme using still images with 256 gray levels. The criterion used to compare them is compression ratio (with respect to the number of bits), which is de"ned as follows: original file size Compression Ratio (CR)" compressed file size.
5 Y.-C. Hu, C.-C. Chang / Signal Processing: Image Communication 16 (2000) 367} Table 1 The performance comparison of the compression ratios using images Images Methods Hu!man Compress Gzip DPCM/ Hu!man DPCM/ MLM DPCM/ EMLM Airplane Boat Family Lenna Ti!any Toys Table 2 The total number of nonzero entries needed to be processed in di!erent methods Methods Hu!man DPCM/ DPCM/ DPCM/ Images Hu!man MLM EMLM Airplane Boat amily Lenna Ti!any Toys The experimental results of six images are listed in Table 1. The Hu!man method shown in Table 1 uses the Hu!man coding technique to encode each image without decorating the raw image data. Compress and Gzip, on the other hand, are two popular compression tools. Also, the DPCM/Hu!man method is one of the two basic versions of the JPEG standard. Furthermore, the proportion threshold P of the MLM method is set to This indicates that we want to encode 99% of the most-likely magnitudes using the traditional Hu!man coding technique and encode 1% of the least-likely magnitudes by transmitting the switch value along with the binary representation of the residual to the decoder. It is shown that the best compression ratios for these images are obtained using the DPCM/ EMLM method. Note that the storage cost of the Hu!man table is included when computing the compression ratios. The total number of nonzero entries from these four di!erent methods using six images are shown in Table 2. Here, the proportion threshold P of the MLM method is set to 0.99, and the range threshold R of the EMLM method is set to 12. The nonzero entries of the Hu!man method show the raw distribution of the input raw image. The nonzero entries of the DPCM/Hu!man method include the positive and the negative residual magnitudes after the DPCM scheme is used to decorate the raw image. The DPCM/MLM method uses the concept of symmetry origin to reduce the nonzero entries. Thus, the number of nonzero entries from DPCM/MLM is about half of that in DPCM/Hu!man. The DPCM/EMLM employs the folding technique to lower the nonzero entries further. The DPCM/EMLM method has the fewest nonzero entries as shown in Table 2. In general, large numbers of nonzero entries imply bigger storage spaces and higher computation complexities are demanded. The problem can be very serious if the images to be encoded are with high residual dynamic ranges. For example, if each pixel in the image is stored using 12 bits, the dynamic range of the residual image will be bigger than when 8 bits are used to represent each pixel. The issue about the selection of a good range threshold for the EMLM method is very important. Since these least-likely magnitudes are encoded by the folding technique instead of being encoded by the switch value along with their residual magnitudes, the bit patterns for the quotient and the remainder should be as small as possible. Thus, the selection of the range threshold tends to be a small value. However, the range threshold should be larger than the square root of the nonzero entries of
6 372 Y.-C. Hu, C.-C. Chang / Signal Processing: Image Communication 16 (2000) 367}372 the symmetry histogram. Therefore, the range threshold is set to 12 in our EMLM method to meet the two conditions halfway. 5. Discussion and conclusion The compression ratio is an important criterion in choosing a compression scheme for lossless image compression. Currently, the Lossless JPEG is the most common scheme for lossless image compression. It has two basic versions: the DPCM/ arithmetic coding and the DPCM/Hu!man coding. The DPCM/Hu!man coding scheme is more popular than the DPCM/Arithmetic scheme because it needs less computation cost. The Hu!- man coding technique is simple and e!ective, but it needs a lot of computation time if the dynamic range is very large. Therefore, the MLM scheme is proposed to resolve this problem. The DPCM/MLM scheme reduces computation time by reducing code computation while reaching high compression performance. This is because it saves a much smaller code tree with the encoded value. The DPCM/MLM scheme turns out to be an algorithm with signi"cant improvements in computation time and compression performance compared with the DPCM/Hu!man method of Lossless JPEG. These advantages of the DPCM/ MLM scheme become most apparent for images with high residual dynamic ranges. In this paper, an EMLM scheme based on the MLM scheme has been proposed to further improve the compression ratio in lossless image compression. By employing the folding technique and making use of the originally unused entry for zero magnitude in the MLM scheme, our EMLM scheme can achieve a higher compression ratio while keeping all the advantages of the MLM scheme. In other words, our method inherits the advantages when encoding images for high residual dynamic ranges. From the experimental results, it is shown that our newly proposed method outperforms the DPCM/Hu!man method and the DPCM/MLM method in compression ratio. Moreover, this DPCM/EMLM method reduces the number of generated codes because the number of the nonzero entries used is smaller than those of the DPCM/ Hu!man method and of the DPCM/MLM scheme. In other words, the newly proposed method indeed serves well as an e$cient and e!ective scheme for lossless image compression. References [1] M.F. Carreto-Castro, J.M. Ramirez, J.L. Ballesteros, D. Baez-Lopez, Comparsion of lossless compression techniques, in: IEEE Proceedings of the 36th Midwest Symposium on Circuits and System, Vol. 2, 1993, pp. 1268}1270. [2] C.C. Cutler, Di!erential quantization of communication signals, U.S. Patent 2,605,361, [3] R.G. Gallager, Variations on a theme by Hu!man, IEEE Trans. Inform. Theory 24 (1978) 668}674. [4] M. Giridhar, A. Nasir, D.S. Samuel, A two-stage scheme for lossless compression of images, in: IEEE Symposium on Circuits and System, Vol. 2, 1995, pp. 1102}1105. [5] D.A. Hu!man, A method for the construction of minimum redundancy codes, Proc. IRE 40 (1952) 1098}1101. [6] G.G. Langdon, An introduction to arithmetic coding, IBM J. Res. Develop. 28 (1984) 135}149. [7] Y.W. Nijim, S.D. Stearns, Di!erentiation applied to lossless compression of medical images, IEEE Trans. Med. Imaging 15 (4) (1996) 555}559. [8] J.B. O'Neil, Entropy coding in speech and television di!erential PCM systems, IEEE Trans. Inform. Theory IT-17 (1971) 758}761. [9] M. Rabbani, P.W. Jones, Digital image compression techniques, Tutorial Texts in Optical Engineering, Vol. TT7, SPIE Optical Eng. Press. [10] K. Sayood, K. Anderson, A di!erential lossless image compression scheme, IEEE Trans. Signal Process. 40 (1) (1992) 236}241. [11] S.D. Stearns, L. Tan, N. Magotra, Lossless compression of waveform data for e$cient storage and transmission, IEEE Trans. Geosci. Remote Sensing 31 (3) (1993) 645}654. [12] G.K. Wallace, The JPEG still picture compression standard, Comm. ACM 34 (4) (1991) 30}40. [13] J.C. Wehnes, H.T. Pai, A.C. Bovik, Fast lossless image compression, in: Proceedings of the IEEE Southwest Symposium on Image Analysis and Interpretation, 1996, pp. 145}148. [14] I.H. Witten, R.M. Neal, J.G. Cleary, Arithmetic coding for data compression, Comm. ACM 30 (1987) 520}540.
A Novel Image Compression Technique using Simple Arithmetic Addition
Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC A Novel Image Compression Technique using Simple Arithmetic Addition Nadeem Akhtar, Gufran Siddiqui and Salman
More informationAn On-line Variable Length Binary. Institute for Systems Research and. Institute for Advanced Computer Studies. University of Maryland
An On-line Variable Length inary Encoding Tinku Acharya Joseph F. Ja Ja Institute for Systems Research and Institute for Advanced Computer Studies University of Maryland College Park, MD 242 facharya,
More informationImage compression. Stefano Ferrari. Università degli Studi di Milano Methods for Image Processing. academic year
Image compression Stefano Ferrari Università degli Studi di Milano stefano.ferrari@unimi.it Methods for Image Processing academic year 2017 2018 Data and information The representation of images in a raw
More informationIMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression
IMAGE COMPRESSION Image Compression Why? Reducing transportation times Reducing file size A two way event - compression and decompression 1 Compression categories Compression = Image coding Still-image
More informationCompression of Stereo Images using a Huffman-Zip Scheme
Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract
More informationIMAGE COMPRESSION TECHNIQUES
IMAGE COMPRESSION TECHNIQUES A.VASANTHAKUMARI, M.Sc., M.Phil., ASSISTANT PROFESSOR OF COMPUTER SCIENCE, JOSEPH ARTS AND SCIENCE COLLEGE, TIRUNAVALUR, VILLUPURAM (DT), TAMIL NADU, INDIA ABSTRACT A picture
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationImage Compression for Mobile Devices using Prediction and Direct Coding Approach
Image Compression for Mobile Devices using Prediction and Direct Coding Approach Joshua Rajah Devadason M.E. scholar, CIT Coimbatore, India Mr. T. Ramraj Assistant Professor, CIT Coimbatore, India Abstract
More informationTopic 5 Image Compression
Topic 5 Image Compression Introduction Data Compression: The process of reducing the amount of data required to represent a given quantity of information. Purpose of Image Compression: the reduction of
More informationSo, what is data compression, and why do we need it?
In the last decade we have been witnessing a revolution in the way we communicate 2 The major contributors in this revolution are: Internet; The explosive development of mobile communications; and The
More informationTHE RELATIVE EFFICIENCY OF DATA COMPRESSION BY LZW AND LZSS
THE RELATIVE EFFICIENCY OF DATA COMPRESSION BY LZW AND LZSS Yair Wiseman 1* * 1 Computer Science Department, Bar-Ilan University, Ramat-Gan 52900, Israel Email: wiseman@cs.huji.ac.il, http://www.cs.biu.ac.il/~wiseman
More informationA new predictive image compression scheme using histogram analysis and pattern matching
University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching
More informationWelcome Back to Fundamentals of Multimedia (MR412) Fall, 2012 Lecture 10 (Chapter 7) ZHU Yongxin, Winson
Welcome Back to Fundamentals of Multimedia (MR412) Fall, 2012 Lecture 10 (Chapter 7) ZHU Yongxin, Winson zhuyongxin@sjtu.edu.cn 2 Lossless Compression Algorithms 7.1 Introduction 7.2 Basics of Information
More informationCS 335 Graphics and Multimedia. Image Compression
CS 335 Graphics and Multimedia Image Compression CCITT Image Storage and Compression Group 3: Huffman-type encoding for binary (bilevel) data: FAX Group 4: Entropy encoding without error checks of group
More informationLossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding
Lossless Image Compression with Lossy Image Using Adaptive Prediction and Arithmetic Coding Seishi Taka" and Mikio Takagi Institute of Industrial Science, University of Tokyo Abstract Lossless gray scale
More informationEE67I Multimedia Communication Systems Lecture 4
EE67I Multimedia Communication Systems Lecture 4 Lossless Compression Basics of Information Theory Compression is either lossless, in which no information is lost, or lossy in which information is lost.
More informationA Simple Lossless Compression Heuristic for Grey Scale Images
L. Cinque 1, S. De Agostino 1, F. Liberati 1 and B. Westgeest 2 1 Computer Science Department University La Sapienza Via Salaria 113, 00198 Rome, Italy e-mail: deagostino@di.uniroma1.it 2 Computer Science
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 6: Image Instructor: Kate Ching-Ju Lin ( 林靖茹 ) Chap. 9 of Fundamentals of Multimedia Some reference from http://media.ee.ntu.edu.tw/courses/dvt/15f/ 1 Outline
More informationJPEG: An Image Compression System. Nimrod Peleg update: Nov. 2003
JPEG: An Image Compression System Nimrod Peleg update: Nov. 2003 Basic Structure Source Image Data Reconstructed Image Data Encoder Compressed Data Decoder Encoder Structure Source Image Data Compressed
More informationCHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106
CHAPTER 6 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform Page No 6.1 Introduction 103 6.2 Compression Techniques 104 103 6.2.1 Lossless compression 105 6.2.2 Lossy compression
More informationHybrid image coding based on partial fractal mapping
Signal Processing: Image Communication 15 (2000) 767}779 Hybrid image coding based on partial fractal mapping Zhou Wang, David Zhang*, Yinglin Yu Department of Electrical and Computer Engineering, University
More informationImage Compression Algorithm and JPEG Standard
International Journal of Scientific and Research Publications, Volume 7, Issue 12, December 2017 150 Image Compression Algorithm and JPEG Standard Suman Kunwar sumn2u@gmail.com Summary. The interest in
More informationFeatures. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy
JPEG JPEG Joint Photographic Expert Group Voted as international standard in 1992 Works with color and grayscale images, e.g., satellite, medical,... Motivation: The compression ratio of lossless methods
More informationIntro. To Multimedia Engineering Lossless Compression
Intro. To Multimedia Engineering Lossless Compression Kyoungro Yoon yoonk@konkuk.ac.kr 1/43 Contents Introduction Basics of Information Theory Run-Length Coding Variable-Length Coding (VLC) Dictionary-based
More informationResearch Article Does an Arithmetic Coding Followed by Run-length Coding Enhance the Compression Ratio?
Research Journal of Applied Sciences, Engineering and Technology 10(7): 736-741, 2015 DOI:10.19026/rjaset.10.2425 ISSN: 2040-7459; e-issn: 2040-7467 2015 Maxwell Scientific Publication Corp. Submitted:
More information7.5 Dictionary-based Coding
7.5 Dictionary-based Coding LZW uses fixed-length code words to represent variable-length strings of symbols/characters that commonly occur together, e.g., words in English text LZW encoder and decoder
More informationA Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
More informationImplementation and Analysis of Efficient Lossless Image Compression Algorithm
Implementation and Analysis of Efficient Lossless Image Compression Algorithm Megha S. Chaudhari 1, S.S.Shirgan 2 Department of Electronics & Telecommunication, N.B.Navale college of engineering, Solapur,
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICIP.1996.
Redmill, DW., & Bull, DR. (1996). Error resilient arithmetic coding of still images. In Unknown (Vol. 2, pp. 109 112). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/icip.1996.560614
More informationFundamentals of Multimedia. Lecture 5 Lossless Data Compression Variable Length Coding
Fundamentals of Multimedia Lecture 5 Lossless Data Compression Variable Length Coding Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Fundamentals of Multimedia 1 Data Compression Compression
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationSINCE arithmetic coding [1] [12] can approach the entropy
1278 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 9, SEPTEMBER 1999 A Fast and Efficient Lossless Data-Compression Method Jer Min Jou and Pei-Yin Chen, Member, IEEE Abstract This paper describes an
More informationA Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization
Informatica 29 (2005) 335 341 335 A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Hsien-Wen Tseng Department of Information Management Chaoyang University of Technology
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,
More informationContext based optimal shape coding
IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,
More informationAn Order-2 Context Model for Data Compression. With Reduced Time and Space Requirements. Technical Report No
An Order-2 Context Model for Data Compression With Reduced Time and Space Requirements Debra A. Lelewer and Daniel S. Hirschberg Technical Report No. 90-33 Abstract Context modeling has emerged as the
More informationImage Compression - An Overview Jagroop Singh 1
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issues 8 Aug 2016, Page No. 17535-17539 Image Compression - An Overview Jagroop Singh 1 1 Faculty DAV Institute
More informationDigital Image Representation Image Compression
Digital Image Representation Image Compression 1 Image Representation Standards Need for compression Compression types Lossless compression Lossy compression Image Compression Basics Redundancy/redundancy
More informationA HYBRID DPCM-DCT AND RLE CODING FOR SATELLITE IMAGE COMPRESSION
A HYBRID DPCM-DCT AND RLE CODING FOR SATELLITE IMAGE COMPRESSION Khaled SAHNOUN and Noureddine BENABADJI Laboratory of Analysis and Application of Radiation (LAAR) Department of Physics, University of
More informationLossless Compression Algorithms
Multimedia Data Compression Part I Chapter 7 Lossless Compression Algorithms 1 Chapter 7 Lossless Compression Algorithms 1. Introduction 2. Basics of Information Theory 3. Lossless Compression Algorithms
More informationAN ANALYTICAL STUDY OF LOSSY COMPRESSION TECHINIQUES ON CONTINUOUS TONE GRAPHICAL IMAGES
AN ANALYTICAL STUDY OF LOSSY COMPRESSION TECHINIQUES ON CONTINUOUS TONE GRAPHICAL IMAGES Dr.S.Narayanan Computer Centre, Alagappa University, Karaikudi-South (India) ABSTRACT The programs using complex
More informationMultimedia Networking ECE 599
Multimedia Networking ECE 599 Prof. Thinh Nguyen School of Electrical Engineering and Computer Science Based on B. Lee s lecture notes. 1 Outline Compression basics Entropy and information theory basics
More informationAn Optimum Approach for Image Compression: Tuned Degree-K Zerotree Wavelet Coding
An Optimum Approach for Image Compression: Tuned Degree-K Zerotree Wavelet Coding Li Wern Chew*, Wai Chong Chia, Li-minn Ang and Kah Phooi Seng Abstract - This paper presents an image compression technique
More information1.Define image compression. Explain about the redundancies in a digital image.
1.Define image compression. Explain about the redundancies in a digital image. The term data compression refers to the process of reducing the amount of data required to represent a given quantity of information.
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYIGHT POTECTION OF PALETTE IMAGES BY A OBUST LOSSLESS VISIBLE WATEMAKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) and Wen-Hsiang Tsai ( 蔡文祥 ), Dept of Computer Science, National Chiao Tung University, Hsinchu,
More informationOn Data Latency and Compression
On Data Latency and Compression Joseph M. Steim, Edelvays N. Spassov, Kinemetrics, Inc. Abstract Because of interest in the capability of digital seismic data systems to provide low-latency data for Early
More informationUse of Local Minimization for Lossless Gray Image Compression
Narendra Kumar et al. / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 Use of Local Minimization for Lossless Gray Image Compression Narendra Kumar 1, Dr. Sachin
More informationOutline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami
to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline
More informationModified SPIHT Image Coder For Wireless Communication
Modified SPIHT Image Coder For Wireless Communication M. B. I. REAZ, M. AKTER, F. MOHD-YASIN Faculty of Engineering Multimedia University 63100 Cyberjaya, Selangor Malaysia Abstract: - The Set Partitioning
More informationJPEG: An Image Compression System
JPEG: An Image Compression System ISO/IEC DIS 10918-1 ITU-T Recommendation T.81 http://www.jpeg.org/ Nimrod Peleg update: April 2007 Basic Structure Source Image Data Reconstructed Image Data Encoder Compressed
More informationMultimedia Signals and Systems Still Image Compression - JPEG
Multimedia Signals and Systems Still Image Compression - JPEG Kunio Takaya Electrical and Computer Engineering University of Saskatchewan January 27, 2008 ** Go to full-screen mode now by hitting CTRL-L
More informationPerformance analysis of Integer DCT of different block sizes.
Performance analysis of Integer DCT of different block sizes. Aim: To investigate performance analysis of integer DCT of different block sizes. Abstract: Discrete cosine transform (DCT) has been serving
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationRandom spatial sampling and majority voting based image thresholding
1 Random spatial sampling and majority voting based image thresholding Yi Hong Y. Hong is with the City University of Hong Kong. yihong@cityu.edu.hk November 1, 7 2 Abstract This paper presents a novel
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationCMPT 365 Multimedia Systems. Media Compression - Image
CMPT 365 Multimedia Systems Media Compression - Image Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Facts about JPEG JPEG - Joint Photographic Experts Group International
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationDCT Based, Lossy Still Image Compression
DCT Based, Lossy Still Image Compression NOT a JPEG artifact! Lenna, Playboy Nov. 1972 Lena Soderberg, Boston, 1997 Nimrod Peleg Update: April. 2009 http://www.lenna.org/ Image Compression: List of Topics
More informationA Comparative Study of Entropy Encoding Techniques for Lossless Text Data Compression
A Comparative Study of Entropy Encoding Techniques for Lossless Text Data Compression P. RATNA TEJASWI 1 P. DEEPTHI 2 V.PALLAVI 3 D. GOLDIE VAL DIVYA 4 Abstract: Data compression is the art of reducing
More informationSource Coding Basics and Speech Coding. Yao Wang Polytechnic University, Brooklyn, NY11201
Source Coding Basics and Speech Coding Yao Wang Polytechnic University, Brooklyn, NY1121 http://eeweb.poly.edu/~yao Outline Why do we need to compress speech signals Basic components in a source coding
More informationInteractive Progressive Encoding System For Transmission of Complex Images
Interactive Progressive Encoding System For Transmission of Complex Images Borko Furht 1, Yingli Wang 1, and Joe Celli 2 1 NSF Multimedia Laboratory Florida Atlantic University, Boca Raton, Florida 33431
More informationA New Configuration of Adaptive Arithmetic Model for Video Coding with 3D SPIHT
A New Configuration of Adaptive Arithmetic Model for Video Coding with 3D SPIHT Wai Chong Chia, Li-Minn Ang, and Kah Phooi Seng Abstract The 3D Set Partitioning In Hierarchical Trees (SPIHT) is a video
More informationInternational Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 4, April 2012)
A Technical Analysis Towards Digital Video Compression Rutika Joshi 1, Rajesh Rai 2, Rajesh Nema 3 1 Student, Electronics and Communication Department, NIIST College, Bhopal, 2,3 Prof., Electronics and
More informationOptimization of Bit Rate in Medical Image Compression
Optimization of Bit Rate in Medical Image Compression Dr.J.Subash Chandra Bose 1, Mrs.Yamini.J 2, P.Pushparaj 3, P.Naveenkumar 4, Arunkumar.M 5, J.Vinothkumar 6 Professor and Head, Department of CSE, Professional
More informationOn the Selection of Image Compression Algorithms
On the Selection of Image Compression Algorithms Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 300, Taiwan e-mail: cchen@cs.nthu.edu.tw Abstract This paper attempts
More informationStatistical Image Compression using Fast Fourier Coefficients
Statistical Image Compression using Fast Fourier Coefficients M. Kanaka Reddy Research Scholar Dept.of Statistics Osmania University Hyderabad-500007 V. V. Haragopal Professor Dept.of Statistics Osmania
More informationFingerprint Image Compression
Fingerprint Image Compression Ms.Mansi Kambli 1*,Ms.Shalini Bhatia 2 * Student 1*, Professor 2 * Thadomal Shahani Engineering College * 1,2 Abstract Modified Set Partitioning in Hierarchical Tree with
More informationA LOW-COMPLEXITY AND LOSSLESS REFERENCE FRAME ENCODER ALGORITHM FOR VIDEO CODING
2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) A LOW-COMPLEXITY AND LOSSLESS REFERENCE FRAME ENCODER ALGORITHM FOR VIDEO CODING Dieison Silveira, Guilherme Povala,
More informationCoding of Coefficients of two-dimensional non-separable Adaptive Wiener Interpolation Filter
Coding of Coefficients of two-dimensional non-separable Adaptive Wiener Interpolation Filter Y. Vatis, B. Edler, I. Wassermann, D. T. Nguyen and J. Ostermann ABSTRACT Standard video compression techniques
More informationStereo Image Compression
Stereo Image Compression Deepa P. Sundar, Debabrata Sengupta, Divya Elayakumar {deepaps, dsgupta, divyae}@stanford.edu Electrical Engineering, Stanford University, CA. Abstract In this report we describe
More informationIMAGE PROCESSING (RRY025) LECTURE 13 IMAGE COMPRESSION - I
IMAGE PROCESSING (RRY025) LECTURE 13 IMAGE COMPRESSION - I 1 Need For Compression 2D data sets are much larger than 1D. TV and movie data sets are effectively 3D (2-space, 1-time). Need Compression for
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationChapter 5 Lempel-Ziv Codes To set the stage for Lempel-Ziv codes, suppose we wish to nd the best block code for compressing a datavector X. Then we ha
Chapter 5 Lempel-Ziv Codes To set the stage for Lempel-Ziv codes, suppose we wish to nd the best block code for compressing a datavector X. Then we have to take into account the complexity of the code.
More informationImage Compression Using BPD with De Based Multi- Level Thresholding
International Journal of Innovative Research in Electronics and Communications (IJIREC) Volume 1, Issue 3, June 2014, PP 38-42 ISSN 2349-4042 (Print) & ISSN 2349-4050 (Online) www.arcjournals.org Image
More informationH.264/AVC BASED NEAR LOSSLESS INTRA CODEC USING LINE-BASED PREDICTION AND MODIFIED CABAC. Jung-Ah Choi, Jin Heo, and Yo-Sung Ho
H.264/AVC BASED NEAR LOSSLESS INTRA CODEC USING LINE-BASED PREDICTION AND MODIFIED CABAC Jung-Ah Choi, Jin Heo, and Yo-Sung Ho Gwangju Institute of Science and Technology {jachoi, jinheo, hoyo}@gist.ac.kr
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationLecture Information Multimedia Video Coding & Architectures
Multimedia Video Coding & Architectures (5LSE0), Module 01 Introduction to coding aspects 1 Lecture Information Lecturer Prof.dr.ir. Peter H.N. de With Faculty Electrical Engineering, University Technology
More informationCode Transformation of DF-Expression between Bintree and Quadtree
Code Transformation of DF-Expression between Bintree and Quadtree Chin-Chen Chang*, Chien-Fa Li*, and Yu-Chen Hu** *Department of Computer Science and Information Engineering, National Chung Cheng University
More informationIMAGE COMPRESSION. Chapter - 5 : (Basic)
Chapter - 5 : IMAGE COMPRESSION (Basic) Q() Explain the different types of redundncies that exists in image.? (8M May6 Comp) [8M, MAY 7, ETRX] A common characteristic of most images is that the neighboring
More informationBinary vector quantizer design using soft centroids
Signal Processing: Image Communication 14 (1999) 677}681 Binary vector quantizer design using soft centroids Pasi FraK nti *, Timo Kaukoranta Department of Computer Science, University of Joensuu, P.O.
More informationA Miniature-Based Image Retrieval System
A Miniature-Based Image Retrieval System Md. Saiful Islam 1 and Md. Haider Ali 2 Institute of Information Technology 1, Dept. of Computer Science and Engineering 2, University of Dhaka 1, 2, Dhaka-1000,
More informationA QUAD-TREE DECOMPOSITION APPROACH TO CARTOON IMAGE COMPRESSION. Yi-Chen Tsai, Ming-Sui Lee, Meiyin Shen and C.-C. Jay Kuo
A QUAD-TREE DECOMPOSITION APPROACH TO CARTOON IMAGE COMPRESSION Yi-Chen Tsai, Ming-Sui Lee, Meiyin Shen and C.-C. Jay Kuo Integrated Media Systems Center and Department of Electrical Engineering University
More informationCompression of Image Using VHDL Simulation
Compression of Image Using VHDL Simulation 1) Prof. S. S. Mungona (Assistant Professor, Sipna COET, Amravati). 2) Vishal V. Rathi, Abstract : Maintenance of all essential information without any deletion
More informationMulti-View Image Coding in 3-D Space Based on 3-D Reconstruction
Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction Yongying Gao and Hayder Radha Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI 48823 email:
More informationEngineering Mathematics II Lecture 16 Compression
010.141 Engineering Mathematics II Lecture 16 Compression Bob McKay School of Computer Science and Engineering College of Engineering Seoul National University 1 Lossless Compression Outline Huffman &
More informationA Quantized Transform-Domain Motion Estimation Technique for H.264 Secondary SP-frames
A Quantized Transform-Domain Motion Estimation Technique for H.264 Secondary SP-frames Ki-Kit Lai, Yui-Lam Chan, and Wan-Chi Siu Centre for Signal Processing Department of Electronic and Information Engineering
More informationSteganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram
, October 24-26, 2012, San Francisco, USA Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain, Jaideep Singh, Ishan Dayma, Rajesh Meena The authors are
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationEfficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest.
Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. D.A. Karras, S.A. Karkanis and D. E. Maroulis University of Piraeus, Dept.
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationEmbedded Descendent-Only Zerotree Wavelet Coding for Image Compression
Embedded Descendent-Only Zerotree Wavelet Coding for Image Compression Wai Chong Chia, Li-Minn Ang, and Kah Phooi Seng Abstract The Embedded Zerotree Wavelet (EZW) coder which can be considered as a degree-0
More informationLossless Predictive Compression of Medical Images*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 8, No. 1, February 2011, 27-36 UDK: 004.92.032.2:616-7 Lossless Predictive Compression of Medical Images* Aleksej Avramović 1, Slavica Savić 1 Abstract: Among
More informationChapter 7 Lossless Compression Algorithms
Chapter 7 Lossless Compression Algorithms 7.1 Introduction 7.2 Basics of Information Theory 7.3 Run-Length Coding 7.4 Variable-Length Coding (VLC) 7.5 Dictionary-based Coding 7.6 Arithmetic Coding 7.7
More informationCompression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction
Compression of RADARSAT Data with Block Adaptive Wavelets Ian Cumming and Jing Wang Department of Electrical and Computer Engineering The University of British Columbia 2356 Main Mall, Vancouver, BC, Canada
More informationEmbedded Rate Scalable Wavelet-Based Image Coding Algorithm with RPSWS
Embedded Rate Scalable Wavelet-Based Image Coding Algorithm with RPSWS Farag I. Y. Elnagahy Telecommunications Faculty of Electrical Engineering Czech Technical University in Prague 16627, Praha 6, Czech
More informationISSN: An Efficient Fully Exploiting Spatial Correlation of Compress Compound Images in Advanced Video Coding
An Efficient Fully Exploiting Spatial Correlation of Compress Compound Images in Advanced Video Coding Ali Mohsin Kaittan*1 President of the Association of scientific research and development in Iraq Abstract
More informationDIFFERENTIAL IMAGE COMPRESSION BASED ON ADAPTIVE PREDICTION
DIFFERENTIAL IMAGE COMPRESSION BASED ON ADAPTIVE PREDICTION M.V. Gashnikov Samara National Research University, Samara, Russia Abstract. The paper describes the adaptive prediction algorithm for differential
More informationSIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P
SIGNAL COMPRESSION 9. Lossy image compression: SPIHT and S+P 9.1 SPIHT embedded coder 9.2 The reversible multiresolution transform S+P 9.3 Error resilience in embedded coding 178 9.1 Embedded Tree-Based
More information